23.10.2012 Views

icegov2012 proceedings

icegov2012 proceedings

icegov2012 proceedings

SHOW MORE
SHOW LESS

Transform your PDFs into Flipbooks and boost your revenue!

Leverage SEO-optimized Flipbooks, powerful backlinks, and multimedia content to professionally showcase your products and significantly increase your reach.

2012<br />

ALBANY, NEW YORK<br />

UNITED STATES<br />

6 INTERNATIONAL CONFERENCE<br />

ON THEORY AND PRACTICE OF<br />

ELECTRONIC GOVERNANCE<br />

TH<br />

22 - 25 OCTOBER 2012<br />

EDITED BY J. RAMON GIL-GARCIA, NATALIE HELBIG & ADEGBOYEGA OJO


The Association for Computing Machinery<br />

2 Penn Plaza, Suite 701<br />

New York New York 10121-0701<br />

Copyright © 2012 by the Association for Computing Machinery, Inc. (ACM) Permission to make digital or hard copies of<br />

portions of this work for personal or classroom use is granted without fee provided that the copies are not made or distributed for<br />

profit or commercial advantage and that copies bear this notice and the full citation on the first page in print or the first screen in<br />

digital media. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is<br />

permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or<br />

a fee. Send written requests for republication to ACM Publications, Copyright & Permissions at the address above or fax +1<br />

(212) 869-0481 or email permissions@acm.org.<br />

For other copying of articles that carry a code at the bottom of the first or last page, copying is permitted provided that the percopy<br />

fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.<br />

Notice to Past Authors of ACM-Published Articles. ACM intends to create a complete electronic archive of all articles and/or<br />

other material previously published by ACM. If you wrote a work that was previously published by ACM in any journal or<br />

conference <strong>proceedings</strong> prior to 1978, or any SIG Newsletter at any time, and you do NOT want this work to appear in the ACM<br />

Digital Library, please inform permissions@acm.org, stating the title of the work, the author(s), and where and when published.<br />

ACM ISBN: 978-1-4503-1200-4<br />

ii


Foreword<br />

The 6 th International Conference on Theory and Practice of Electronic Governance, ICEGOV2012, was held in Albany, New<br />

York, United States (US) from October 22-25, 2012. It was hosted by the Center for Technology in Government, University at<br />

Albany, State University of New York under the patronage of the United States National Archives and Record Administration.<br />

The conference was supported by the Center for Electronic Governance of the United Nations University - International Institute<br />

for Software Technology (UNU-IIST), Macao SAR, which is the ICEGOV Series Organizer.<br />

The ICEGOV (International Conference on Theory and Practice of Electronic Governance) series focuses on the use of<br />

technology to transform relationships between government and citizens, businesses, civil society and other governments<br />

(Electronic Governance). Established in 2007 by the Center for Electronic Governance, UNU-IIST, the series looks beyond the<br />

traditional focus on technology-enabled transformation in government (Electronic Government) towards new forms, new<br />

paradigms, and new foundations for technology-enabled governance, collaboration and sustainable development. ICEGOV is a<br />

forum where researchers and practitioners meet to test theories, share insights and report their experiences. It facilitates networkand<br />

capacity-building through a diversity of presentation formats. The conference also provides a unque developmental<br />

opportunity for participants from developing countries, nations in transition, United Nations agencies, and from a range of<br />

governmental and non-governmental organizations. Since its establishment, the series has traveled the globe from Macao SAR<br />

(ICEGOV2007), to Cairo (ICEGOV2008), Bogota (ICEGOV2009), Beijing (ICEGOV2010), Tallinn (ICEGOV2011), and now<br />

to Albany (ICEGOV2012); with each edition generating significant local interest and stakeholder engagement.<br />

Continuing the ICEGOV tradition, ICEGOV2012 featured a rich academic, capacity-building and network-building program of<br />

keynote lectures, tutorials, doctoral colloquium, plenary sessions, thematic sessions, paper sessions, poster session and discussion<br />

panels. All these session were built on the contributions from researchers and practitioners from around the world. Individuals<br />

from over 60 countries were involved in the preparations for ICEGOV2012, as authors, reviewers or committee members. The<br />

2012 edition provided a unique forum for rich interactions between digital government researchers in the United States and North<br />

America and peers from Africa, Asia, Latin America and Europe.<br />

The conference featured three keynote lectures by distinguished experts who offered government, academic and international<br />

perspectives on Electronic Governance. David Ferriero, the Archivist of the United States, National Archives and Records<br />

Administration, presented the first keynote. Nigel Shadbolt, Co-founder of the Open Data Initiative, Professor of Artificial<br />

Intelligence at the University of Southampton, and Head of the Web and Internet Science Group, presented the second keynote<br />

on Open Data Ecosystems. The third keynote was presented by Dr. Beth Simone Noveck, former United States Deputy Chief<br />

Technology Officer on the Future of Governance in the Digital Age.<br />

Seven tutorials were provided as part of the conference exploring areas such as Contests and Prizes in the Age of Social Media,<br />

Digital Curation for Public Sector Professionals, Open Data, Fraud Detection using Modeling and Simulation for Practice and<br />

Research, Public Value Assessment of Open Government Efforts, and Smart Cities, Smart Government: A Research and Practice<br />

Consortium..<br />

Six plenary sessions were organized on topics including: Value Creation through Open Data Ecosystem moderated by Alex<br />

Howard from O’Reilly Media; Open Government: Vision, Value and the Way Forward moderated by Chris Vein, US Deputy<br />

Chief Technology Officer; Information Stewardship: Policy Foundations for Open Government moderated by Miriam Nisbet,<br />

Director of the Office of Government Information Services (OGIS), US National Archives and Records Administration; Smart<br />

Innovation for Sustainable Urban Growth and Development moderated by Meghan Cook, Program Manager, Center for<br />

Technology in Government; Women and ICTs: Access and Empowerment moderated by Dina Refki, D.A., Executive Director<br />

for the Center for Women in Government & Civil Society, University at Albany; and Celebrating 20 Years of UNU-IIST: A<br />

Conversation about the Future of Government in the Digital Age moderated by Tomasz Janowski, Senior Research Fellow, IIST<br />

Center for Electronic Governance.<br />

An interactive Doctoral Colloquium was co-organized by Elsa Estevez, UNU-IIST Center for Electronic Governance, Macao<br />

SAR and Lei Zheng from Fudan University, China providing doctoral students from different countries and disciplines an<br />

opportunity to discuss a variety of themes related to electronic governance research and topics and issues associated with their<br />

dissertation research and career plans. The colloquium included a keynote presentation from Wojciech Cellary, Professor and<br />

Head of Department of Information Technology, Poznan University of Economics and a representative of Elsevier on how to<br />

publish scholarly articles.<br />

Eight thematic sessions were organized by invited experts from academia, government, industry, non-governmental organizations<br />

(NGO), the World Bank, the United Nations, and New York State Government. Each session drew attention to specific electronic<br />

governance concerns in a particular country or on an issue of particular topical interest.. These sessions cover the following<br />

topics.<br />

iii


• Civic Platforms and Coalitions<br />

• Regional Integration through e-Governance in UN-ESCWA region organized by UN Economic and Social<br />

Commission for Western Asia<br />

• Smart Cities - Sustainable Urban Innovation organized by European Commission, JRC-IPTS, Information Society Unit<br />

• Financial Transparency and the Role of Government organized by the OrgPedia Project;<br />

• Developing Public Value Metrics for Return on Government ICT Investments organized and sponsored by Microsoft<br />

• Big Data Analytics organized and sponsored by EMC<br />

• Bridging the North and South Gap in ICT-enabled Policy Modeling and Governance co-organized by UN-IIST Center<br />

for Electronic Governance, Center for Technology in Government, and the EgovPoliNet/Crossover project<br />

In response to the call for submissions, the conference received 166 submissions from 68 countries. Five kinds of contributions<br />

were sought in the call – (1) Completed research or practice papers (2) Short research or practice papers , (3) Demonstrations – 2<br />

pages in length, (4) Posters and (5) Tutorials proposals. The conference organizers received a total of 98 completed works, 49<br />

ongoing works, 2 demonstrations, 11 posters and 5 tutorial. The members of the program committee and expert colleagues<br />

anonymous peer review (on average, three reviews were carried out for each submission). This process resulted in, 23<br />

submissions accepted as Completed Research work, 10 as Completed Practice/Policy work, 24 as Ongoing Research Work, 14 as<br />

ongoing Practice Work, 33 as Posters, 2 as Tutorials and 1 as Demonstration. This was an acceptance rate of 34%. All accepted<br />

submissions have been included, in revised form, in this volume, which is organized into 15 paper sessions, a poster section and<br />

a tutorial section.<br />

Many people and institutions contributed to the organization of ICEGOV2012. We wish to express our most sincere thanks to the<br />

official host of ICEGOV2012 – the Center for Technology in Government, University at Albany, and particularly to the Dr.<br />

Nancy Zimpher, Chancellor of the State University of New York (SUNY), and George M. Phillip, President of the University at<br />

Albany, for creating the enabling environment to turn ICEGOV 2012 into a reality. We also wish to thank Gerald D. Jennings,<br />

the Mayor of the City of Albany, for supporting and hosting the conference in the beautiful city of Albany, New York. We also<br />

wish to thank the conference patron, The U.S. National Archives and Records Administration for endorsing the conference.<br />

We would like to thank our Silver Sponsors Accenture and the Macau Foundation whose contributions have allowed ICEGOV to<br />

be one the premier international conferences in electronic governance. We would also like to recognize Microsoft and EMC for<br />

their dedication to ICEGOV since its inception—it could not have grown without their support. Special gratitude is due to Macao<br />

SAR Government, Public Administration and Civil Service Bureau (SAFP) and Macao Foundation, particularly to Ms. Florinda<br />

da Rosa Silva Chan, Secretary for Administration and Justice; Mr. José Chu, Director of SAFP and the President of the Macao<br />

Foundation; for supporting ICEGOV2012, the ICEGOV global conference series, and the e-Macao Program as the origin of the<br />

series.<br />

Our sincere thank you goes to the host of ICEGOV2012: the Center for Technology in Government (CTG), University at Albany.<br />

In particular we would like to recognize the efforts of Theresa Pardo, Jana Hrdinova, Jane Krumm-Schwan, Meghan Cook,<br />

Alison Heaphy, Paula Rickert, Jim Costello, and the whole CTG team for their time, energy, and dedication to ICEGOV2012.<br />

We are grateful to the General Conference Chairs in particular, David Ferriero, Archivist of the United States, National Archives<br />

and Records Administration and Haiyan Qian, Director of the Division for Public Administration and Development Management,<br />

United Nations Department of Economic and Social Affairs. We are appreciative of the guidance and support provided by the<br />

International Steering Committee and the National Steering Committee at various stages of the conference planning. We thank<br />

Sharon Dawes for chairing the Best Paper Awards Committee and the members of the committee for conducting a thoughtful and<br />

rigorous selection process. We would like to thank all of the members of the Program Committee and additional reviewers for<br />

their efforts in carrying out a quality review process which is the foundation of a strong conference program. We are most<br />

grateful to the keynote speakers, to the organizers and chairs of tutorials, doctoral colloquium, plenary sessions, thematic<br />

sessions, paper sessions and discussion panels, and to all panelists and speakers for their contributions. We are most thankful to<br />

all authors for their efforts in preparing, submitting and presenting papers at ICEGOV2012. Last but not least, we would like to<br />

acknowledge the efforts of the ICEGOV2012 Conference Committee and the team at the Electronic Governance Center, UNU-<br />

IIST towards organizing ICEGOV2012.<br />

We believe ICEGOV2012 has contributed to the ongoing efforts of building a global community of research and practice for<br />

Electronic Governance that is able to cross not only national but also institutional and thematic borders, and that the contacts,<br />

discussions and ideas in Albany in October 2012 will continue well after the conference is over and continue to build as we<br />

approach ICEGOV2013.<br />

Albany, NY October 2012 J. Ramon Gil-Garcia, Centro de Investigación y Docencia Económicas, Mexico<br />

Natalie Helbig, Center for Technology in Government, SUNY, United States<br />

Adegboyega Ojo, United Nations University, Macao<br />

Program Co-Chairs<br />

ICEGOV 2012<br />

iv


Table of Contents<br />

Forward .......................................................................................................................................................................................... iii<br />

Table of Contents ........................................................................................................................................................................... v<br />

Conference Organization ................................................................................................................................................................ x<br />

Session 1: Open Government Data<br />

o Beyond Open Government: Ontologies and Data Architectures to Support Ethical Consumption ........................................ 1<br />

Luis Luna-Reyes, Djoko Sigit Sayogo, Jing Zhang, Theresa Pardo, Giri Kumar Tayi, Jana Hrdinova, David Andersen<br />

o Exploring Process Barriers to Release Public Sector Information in Local Government ....................................................... 5<br />

Peter Conradie, Sunil Choenni<br />

o Implementation Framework for Open Data in Columbia ........................................................................................................ 14<br />

Lydia Marleny Prieto, Ana Carolina Rodriguez, Johanna Pimiento<br />

o Increasing Kenyan Open Data Consumption: A Design Thinking Approach ......................................................................... 18<br />

Leonida Mutuku, Jessica Colaco<br />

o New Perspectives for Electronic Government in Brazil: The Adoption of Open Government Data in National and Subnational<br />

Governments of Brazil ............................................................................................................................................................. 22<br />

Ricardo Matheus, Manuella Maia Ribeiro, José Carlos Vaz<br />

o Open Government 2.0: Citizen Empowerment through Open Data, Web and Mobile Apps .................................................. 30<br />

Rodrigo Sandoval-Almazan, Luis Luna-Reyes, J. Ramon Gil-Garcia, Dolores E. Luna, Yaneileth Rojas-Romero<br />

Session 2 - E-democracy & Participation 1<br />

o A Logistic Multilevel Model for Civic Engagement and Community Group Impact in the Digital Age ............................... 34<br />

B. Joon Kim, Stephen Kleinschmit<br />

o Designing Online Deliberation Using Web 2.0 Technologies: Drafting a Bill of Law on Internet Regulation in Brazil ....... 38<br />

Fabro Steibel<br />

o E-Participation in the Era of Web 2.0: Factors Affecting Citizens' Active E-Participation in Local Governance ................. 44<br />

Jooho Lee, Soonhee Kim<br />

o Genres of Communication in Activist eParticipation: A Comparison of New and Old Media ............................................... 48<br />

Marius Rohde Johannessen<br />

o Internet Voting: Fatally Torn Between Conflicting Goals? ..................................................................................................... 58<br />

Marco Prandini, Marco Ramilli<br />

Session 3: Policies 1<br />

o A New Roadmap for Next-Generation Policy-Making ........................................................................................................... 62<br />

Francesco Mureddu, David Osimo, Gianluca Misuraca, Stefano Armenia<br />

o Best International Practices for Access, Ownership and Use of Information and Communication Technologies for People<br />

with Sensory Disabilities ......................................................................................................................................................... 67<br />

Marco Peres, Paula Suárez<br />

o E-Government Education at the Public Administration Departments in Turkey .................................................................... 71<br />

Cenay Babaoglu, H. Serkan Akilli, Mehmet Akif Demircioglu<br />

o e-Government in Latin American Countries: Are they Building National Policies with a Regional Perspective? ................. 75<br />

J. Ignacio Criado<br />

o e-Government in Russia: Is or Seems? .................................................................................................................................... 79<br />

Lyudmila Bershadskaya, Andrei Chugunov, Dmitrii Trutnev<br />

Session 4 - EGOV Adoption and Usage<br />

o Framework for Useful Transparency Websites for Citizens .................................................................................................. 83<br />

Josune Arcelus<br />

o The Circular Continuum of Agencies, Libraries, and Users: A Model of E-Government in Practice .................................. 87<br />

Natalie Greene Taylor, Paul Jaeger, Ursula Gorham, John Bertot, Ruth Lincoln, Elizabeth Larson<br />

o The Critical Success Factors for Websites for Chinese Migrant Farmer Workers: A Multi-case Study ............................... 95<br />

Fang Wang, Lihong Gu<br />

o The Development of Public Smart Phone Apps in Korea: Empirical Approach ................................................................... 105<br />

Eom Seok-Jin, Mi Yeon Lee, Jun Houng Kim<br />

o Understanding Citizens' Perceptions of E-Government Services in Mexico ......................................................................... 109<br />

Juan M. Gomez Reynoso, Celene Navarrete, Rodrigo Sandoval Almazan<br />

v


Session 5 - Information Sharing, Models, & Platforms<br />

o Factors Influencing Exchange Activities in Transnational Knowledge Networks: The Case of the Hajj-MDSS ................. 113<br />

Mohammed Gharawi, Theresa Pardo<br />

o Information Sharing and Financial Market Regulation: Understanding the Capability Gap ................................................. 123<br />

Djoko Sayogo, Theresa Pardo, Peter Bloniarz<br />

o On Public Service Provision Informative Phase: A Dialogue-based Model and Platform .................................................... 132<br />

Efthimios Tambouris, Vassiliti Outsetari, Konstantinos Tarabanis<br />

o The Complexity of Cross-Boundary Information Sharing: An Organizational Perspective on Taiwan E-Government ....... 143<br />

Tung-Mou Yang<br />

Session 6: Digital Records & Information Management<br />

o A Patent System Ontology for Facilitating Retrieval of Patent Related Information ............................................................ 147<br />

Siddharth Taduri, Gloria Lau, Kincho Law, Jay Kesan<br />

o Digitisation of Electoral Rolls: Analysis of a Multi-Agency E-Government Project in Pakistan ......................................... 158<br />

Hasnain Bokhari, Mustafa Maqsood Khan<br />

o Integrating Argumentation Technologies and Context-Based Search for Intelligent Processing of Citizens' Opinion in Social<br />

Media ...................................................................................................................................................................................... 166<br />

Carlos Chesñevar, Ana Maguitman, Elsa Estévez, Ramón Brena<br />

o Preparing for Digital Curation Governance: Educating Stewards of Public Information ...................................................... 171<br />

Christopher Lee, Helen Tibbo<br />

o REGNET: Regulatory Information Management, Compliance and Analysis ....................................................................... 175<br />

Kincho Law, Gloria Lau<br />

Session 7: Policies 2<br />

o From Information-poor to Information-rich: Bridging Regional Economic Disparities in Nigeria through e-Governance<br />

................................................................................................................................................................................................. 184<br />

Sanjo Faniran, Kayode Olaniyan<br />

o ICT for Development and the MuNet Program: Experiences and Lessons Learnt from an Indigenous Municipality in<br />

Guatemala ............................................................................................................................................................................... 188<br />

Jorge López-Bachiller, Javier Sáenz-Coré, Diego Cardona<br />

o ICT Policy in Africa a Comparative Study of Ghana and Kenya: Drawing on Lessons from Developed Countries ........... 192<br />

Agnes Odongo<br />

o Laggards or Victims of Socioeconomic Conditions? Findings from Ongoing Survey of Female Slum-dwellers Without Cell<br />

Phone Ownership ................................................................................................................................................................... 202<br />

Devendra Potnis, Kanchan Deosthali<br />

o Promoting User Uptake of E-Government in Colombia ........................................................................................................ 206<br />

Diana Parra Silva, Johanna Pimiento Quintero<br />

Session 8: Measurement 1<br />

o From Failure to Success: Using Design-Reality Gap Analysis as a Mid-implementation Assessment Tool for e-Government<br />

................................................................................................................................................................................................. 210<br />

Lemma Lessa, Solomon Negash, Mesfin Belachew<br />

o Measuring Organizational Interoperability in Practice: The Case Study of Population Welfare Department of Government of<br />

Sindh, Pakistan ....................................................................................................................................................................... 216<br />

Devender Maheshwari, Marijn Janssen<br />

o Ranking and Hotspot Detection Methods on Infant Health for Districts in Java, Indonesia: E-Governance Micro Tools ... 226<br />

Yekti Widyaningsih, Wayne Myers<br />

o Technological Assessment of e-government Web presence in Nigeria ................................................................................. 236<br />

O. Michael Awoleye, Blessing Ojuloge, Willie Siyanbola<br />

Session 9: Social Media in Government<br />

o Exploring Social Media Usage in Saudi E-Government Websites ........................................................................................ 243<br />

Hend Al-Khalifa, Muna Al-Razgan, Nora Al-Rejebah, Ameera Al-Masoud<br />

o Government Crisis Communication on the Microblog: A Theory Framework and the Case of Shanghai Metro Rear-End<br />

Collision ................................................................................................................................................................................. 248<br />

Xiao Liang<br />

o Government Official Microblogs: An Effective Platform for Facilitating Inclusive Governance ........................................ 258<br />

Xinping Liu, Lei Zheng<br />

o Managing Chinese Government Microblogs: Enablers and Barriers ..................................................................................... 262<br />

Lei Zheng<br />

o Study on Social Media Applications by Government in Hong Kong .................................................................................... 267<br />

Huina Xu, Qian Chen<br />

vi


Session 10: ICTs & Governance Transformation<br />

o E-Government and Transformation of Governance and Service Delivery in Bangladesh: A Developing Country Perspective<br />

................................................................................................................................................................................................. 271<br />

Noore Siddiquee<br />

o Evaluating and Assessing a Typology of Ubiquitous City Services by Classifying and Assigning Actual Services from an<br />

Inventory of Identified Services ............................................................................................................................................. 279<br />

Jungwoo Lee, Hyejung Lee, Taesung Kim<br />

o Explaining the E-Government Paradox: An Analysis of Two Decades of Evidence from Scientific Literature and Practical<br />

on Barriers to E-Government ................................................................................................................................................. 287<br />

Alberto Savoldelli, Cristiano Codagnone, Gianluca Misuraca<br />

o Investigating the Relationships between Accountability and Governments' Transformation to E-Government .................. 297<br />

M. Sirajul Islam, Åke Grönlund<br />

o Technologies, Tools & Web 2.0 in Support of Public Administration Workplace Communications ................................... 301<br />

Milena Krumova<br />

o Transforming City Government: A Case Study of Philly311 ................................................................................................ 310<br />

Taewoo Nam, Theresa Pardo<br />

Session 11: IT Governance & Policy<br />

o A Literature Review: IT Governance Guidelines and Areas ................................................................................................. 320<br />

Ruben Pereira, Miguel Mira da Silva<br />

o Assessment of Success Factors of e-Government Project Implementation: Challenges for the Kosovo e-Government<br />

Perspective ............................................................................................................................................................................. 324<br />

Artan Rexhepi, Blerim Rexha, Agni Dika<br />

o Computer Supported Contractor Selection for Public Administration Ventures ................................................................... 332<br />

Zbigniew Paszkiewicz, Wojciech Cellary<br />

o E-Government Success Factors in the Context of an IT-enabled Budget Reform: A Questionnaire Report ........................ 336<br />

Gabriel Puron-Cid<br />

o Public CIO, Figurehead or Decision-Maker? The Case of Germany .................................................................................... 346<br />

Niels Proske, Moreen Heine, Norbert Gronau<br />

Session 12: Implementation & Impact<br />

o Design and Implementation of a Public School Government-to-Employee System ............................................................. 350<br />

Carl Strang, Ira Goldstein<br />

o E-Governance and Millennium Development Goals: Sustainable Development Perspective in Rural India ....................... 354<br />

Harekrishna Misra<br />

o Harnessing Renewable Energy Technologies for ICT and e-Governance Services in Un-electrified Communities in Rural<br />

Nepal ...................................................................................................................................................................................... 364<br />

Mona Sharma<br />

o ICT-enabled Delivery of Maternal Health Services ............................................................................................................... 369<br />

Johanna Awotwi<br />

o If We Build It, Will They Come? A Mixed-Method Exploration of High Speed Broadband Access and Economic<br />

Development .......................................................................................................................................................................... 379<br />

Amy Huffman<br />

Session 13: E-democracy & Participation 2<br />

o An e-Democracy Experience: Digital Cabinet Office of Rio Grande do Sul State (Brazil) .................................................. 385<br />

Marie Anne Macadar, Gabriela Viale Pereira, Vanessa Marques Daniel<br />

o Social Inclusion and Digital Divide: eParticipation Dilemmas in Municipalities ................................................................. 389<br />

Lukasz Porwol, Padraic O'donoghue, John Breslin, Chris Coughlan, Brendan Mulligan<br />

o Studying Chinese Government Microblogs: Content and Interactions .................................................................................. 393<br />

Tuo Zheng, Lei Zheng<br />

Session 14: Information Structure<br />

o CRHIS: Cloud-based Rural Healthcare Information System ................................................................................................. 402<br />

Manas Ranjan Patra, Rama Krushna Das, Rabi Prasad Padhy<br />

o Data collection in a degraded network: case of developing countries or countries in crisis .................................................. 406<br />

Jiomekong Azanzi Azanzi, Broto Laurent, Hagimont Daniel, Tchuente Maurice<br />

o The Secure Platform Problem: Taxonomy and Analysis of Existing Proposals to Address this Problem ............................ 410<br />

Michael Schläpfer, Melanie Volkamer<br />

vii


Session 15: Measurement 2<br />

o Anti-Corruption Online Monitoring Systems in Brazil .......................................................................................................... 419<br />

Ricardo Matheus, Manuella M. Ribeiro, José Carlos Vaz, Cesar A. de Souza<br />

o E-Government Portals in Central America: A Preliminary Evaluation and Ranking (2011-2012) ....................................... 426<br />

Rodrigo Sandoval-Almazan, J. Ramon Gil-Garcia, Nancy Karina Saucedo Leyva<br />

o Evolving e-government Benchmarking to Better Cover Technology Development and Emerging Societal Needs ............. 430<br />

Jeremy Millard, Kim Andreasson, Mikael Snaprud<br />

o Impacts of the Public Procurement Reform in Chile on the Municipal Level ....................................................................... 440<br />

Gaston Concha, Roberto Anrique<br />

Posters<br />

o A Crowdsourcing Model for Public Consultations on Draft Laws ........................................................................................ 450<br />

Vasiliy Burov, Evgeny Patarakin, Boris Yarmakhov<br />

o A Novel Scheme of Government Information Sharing System for Implementing Paperless Government ........................... 452<br />

John (Jong Uk) Choi, Joowon Cho, Dong Hwa Kim, Chang Hun Yoo<br />

o A structure oriented evaluation model for readiness of e-governance ................................................................................... 454<br />

Uranchimeg Tudevdagva, Uyanga Sambuu<br />

o An Initial Exploration of Hyperlinks of African Government Portal Websites ..................................................................... 456<br />

Abebe Rorissa<br />

o C-DAC Pan India Strategy in High Performance Computing for Human Advancement ...................................................... 458<br />

Kapil Mathur, Sandeep Agrawal, Sucheta Pawar, Abhishek Das, Goldi Misra<br />

o Crowdsourcing as Data Sharing: A Regional Web-based Real Estate Development Database ............................................ 460<br />

Robert Goodspeed, Christian Spanring, Timothy Reardon<br />

o Drivers for Public Sector Contests ......................................................................................................................................... 460<br />

Claudia Louis<br />

o E-Reconciliation in Rwanda ................................................................................................................................................... 464<br />

Erika Bagambiki<br />

o Electronic Participation System: The Nigerian Perspective .................................................................................................. 468<br />

Ibrahim Aliyu<br />

o Enterprise Systems and Government Organizational Changes: A Socio-materiality Analysis ............................................. 470<br />

Loni Hagen, Donghee Sinn<br />

o Evaluation of E-Governance Projects of Nepal ..................................................................................................................... 472<br />

Ganesh Adhikari<br />

o Exploiting the FLOSS Paradigm in Collaborative e-Learning: Application to e-Government ............................................. 474<br />

Sara Fernandes, Antonio Cerone, Luis Barbosa<br />

o From Inter-agency Information Sharing to Open Data: A Case Study of Taiwan E-Government ........................................ 477<br />

Tung-Mou Yang<br />

o From International Open Government Dataset Search to Discovery: A Semantic Web Service Approach ......................... 480<br />

Eric Rozell, John Erickson, Jim Hendler<br />

o Implementation of Integrated Tax System COTS Product .................................................................................................... 483<br />

Uyanga Sambuu, Zolbayar Chuluunbat, Esbold Unurkhaan<br />

o Information Sharing in Inter-departmental Collaboration: A Conceptual Framework for Local Government Authorities .. 485<br />

Alinaghi Ziaee Bigdeli, Muhammad Kamal, Sergio de Cesare<br />

o Interagency Collaboration in Providing Public Services in Russia: A Legal Perspective ..................................................... 487<br />

Evgeny Styrin, Andrey Zhulin<br />

o Monitoring Methods of e-Governance Development Assessment: Comparative Analysis of International and Russian<br />

Experience .............................................................................................................................................................................. 490<br />

Lyudmila Bershadskaya, Andrei Chugunov, Dmitrii Trutnev<br />

o Moroccan E-government Ten years Evolutions ..................................................................................................................... 492<br />

Mohamed Mohyi Eddine El Aichi<br />

o Opportunities for Improving eGovernment: Using Language Technology in Workflow Management ................................ 495<br />

Ola Knutsson, Eriks Sneiders, Alyaa Alfalahi<br />

o Prioritization and Geo-spatiotemporal Hotspot Detection of Forest Loss Hotspot Using NDVI as a Response Variable .... 497<br />

Koli Rajesh E., Rao Anil G., Ranei Guari M., Joshi Manish R.<br />

o Quality Assurance Case Study of an ICT Supported Legally Binding Election in Austria ................................................... 500<br />

Klaus John, Andreas Ehringfeld<br />

o Quality Assurance Model for e-Governance Projects: A Case Study on e-Counseling ........................................................ 502<br />

Rama Krushna Das Pabitrananda Patnaik, Manas Ranjan Patra<br />

o Regulation Room: Moving Towards Civic Participation 2.0 ................................................................................................. 504<br />

Josiah Heidt, Jackeline Solivan<br />

viii


o Revival of Farming Community with M-Agriculture ............................................................................................................ 506<br />

Swapna Veldanda<br />

o Social Media Usage Guidelines for the Government of the United Arab Emirates .............................................................. 508<br />

Ibrahim Elbadawi<br />

o System For Measuring E-Gov: A Multi-Stakeholder Approach ............................................................................................ 511<br />

Camilo Cristancho Mantilla, Juan Carlos Noriega Silva<br />

o The Digital Divide's Devaluing of Local E-Government ...................................................................................................... 513<br />

Richard Huff, Liana Kleeman<br />

o The Importance of Electronic Accessibility in Brazilian Juridical Electronic Process .......................................................... 516<br />

Adriana Simeao Ferreira, Daniel Goncalves de Melo, Leondeniz Freitas<br />

o The Use of Mobile and Wireless Technology and Food Quality Control in China ............................................................... 518<br />

Shuhua Monica Liu, Qianli Yuan, Danyao Li, Lei Zheng<br />

o The Use of Recursive Bisection in the Mapping of Sample New York State Electoral Districts ......................................... 520<br />

David Molik, Michelle Sharer<br />

o Toward Interoperable Government: A case of Bangladesh ................................................................................................... 522<br />

M. Shakhawat Hossain Bhuiyan<br />

o Trust Issues in the E-Government Implementation in Nepal ................................................................................................. 524<br />

Garima Dhakal, Prajwal Amatya, Bal Krishna Bal<br />

o eGovernance Implementation Model for Public Sector Innovation ........................................................................................ 526<br />

M. Irfanullah Arfeen, Nawar Khan<br />

Tutorials<br />

o Tutorial: Digital Curation for Public Sector Proffesionals ..................................................................................................... 528<br />

Christopher A. Lee and Helen Tibbo<br />

o Use of Agent-Based Modeling for e-Governance Research ................................................................................................... 531<br />

Yushim Kim, Callie McGraw<br />

ix


Conference Organization<br />

Host<br />

Center for Technology in Government, University at Albany, State University of New York (SUNY)<br />

Patron<br />

U.S. National Archives and Records Administration<br />

Conference Committee<br />

David FERRIERO, Conference Co-Chair - Archivist of the United States, National Archives and Records<br />

Administration, USA<br />

Theresa PARDO, Conference Co-Chair - Director and Research Professor, Center for Technology in Government,<br />

University at Albany, USA<br />

Haiyan QIAN, Conference Co-Chair - Director, Division for Public Administration & Development Management<br />

(DPADM), UN Department of Economic and Social Affairs, USA<br />

Jose Ramon GIL-GARCIA, Program Co-Chair - Associate Professor and Director, Data Center for Applied<br />

Research in Social Sciences, Centro de Investigacion y Docencia Economicas, Mexico<br />

Natalie HELBIG, Program Co-Chair - Senior Program Associate, Center for Technology in Government, University<br />

at Albany, USA<br />

Adegboyega OJO, Program Co-Chair - Academic Program Officer, Center for Electronic Governance, UNU-IIST,<br />

Macao SAR<br />

Jana Hrdinova, Organization Chair - Program Associate, Center for Technology in Government, University at<br />

Albany, USA<br />

Meghan Cook, Fundraising Chair - Program Manager, Center for Technology in Government, University at Albany,<br />

USA<br />

Alison Heaphy, Publicity Chair - Communication Manager, Center for Technology in Government, University at<br />

Albany, USA<br />

xii


International Steering Committee<br />

John Carlo BERTOT, Professor and Co-Director, Information Policy and Access Center (iPAC), University of<br />

Maryland, USA<br />

Francisco CAMARGO, Director General Programa Gobierno en Linea, Colombia<br />

Wojciech CELLARY, Professor, Department of Information Technology, Poznan University of Economics, Poland<br />

Samuel CHAN, Member of Administrative Committee, Science and Technology Development Fund, Macao SAR,<br />

China<br />

Jim DAVIES, Professor and Director, Software Engineering Programme, Department of Computer Science and<br />

Governing Body Fellow, Computing Laboratory, University of Oxford, UK<br />

Sharon DAWES, Senior Fellow & Professor Emeritus of Public Administration, Center for Technology in<br />

Government, University at Albany, USA<br />

Matthias FINGER, Professor, Faculty of Technology and Management, Ecole Polytechnique Federale de Lausanne,<br />

Switzerland<br />

Tomasz JANOWSKI, Senior Research Fellow and Head, UNU-IIST Center for Electronic Governance, Macao<br />

SAR, China (Series Coordinator)<br />

Lorenzo MADRID, Chief Technology Officer for the Latin America Region and World Wide Director for the<br />

Government Interoperability Initiative, Microsoft Corporation, USA<br />

Henk G. SOL, Professor and Founding Dean, University of Groningen, The Netherlands<br />

Maurice TCHUENTE, Pro-Chancellor University of Buea, Cameroon<br />

Saleem ZOUGHBI, Regional Adviser (ICT), UN Economic and Social Commission for Western Asia, Lebanon<br />

National Advisory Committee<br />

Cary COGLIANESE, Penn Program on Regulation, University of Pennsylvania Law School<br />

Mitch LEVENTHAL, Global Affairs, State University of New York<br />

Kim McKINNEY, New York State Office of Information Technology Services (ITS)<br />

Beth NOVECK, Democracy Design Workshop, New York Law School<br />

Robert SAMSON, New York State Spending and Government Efficiency (SAGE) Commission<br />

Jim HENDLER, Departments of Computer Science and Cognitive Science, Rensselaer Polytechnic Institute<br />

David L. McCLURE, Citizen Services and Innovative Technologies, GSA<br />

Miriam NISBET, Government Information Services (OGIS), National Archives and Records Administration<br />

Douglas ROBINSON, National Association of State Chief Information Officers<br />

Chris VEIN,The White House Office for Science and Technology Policy<br />

xiii


Awards Committee<br />

Sharon S. DAWES, University at Albany, SUNY – USA, Committee Chair<br />

Nicolau REINHARD -- Universidade de Sao Paulo, Brasil<br />

Enrico FERRO – Istituto Superiore Mario Boella, Italy<br />

Marijn JANSSEN - Delft University of Technology, The Netherlands<br />

Lei ZHENG – Fudan University, China<br />

Luis F. LUNA REYES – Universidad de las Amércias Puebla, Mexico<br />

Rejean ROY – CEFRIO, Canada<br />

Gbenga ADEBUSUYI, Nigeria<br />

Johanna AWOTWI, Ghana<br />

Program Committee<br />

Gustav AAGESON, Norwegian University of Science and Technology, Norway<br />

Gbenga ADEBUSUYI, National e-Government Strategies, Nigeria<br />

Rodrigo SANDOVAL-ALMAZAN, Universidad Autonoma del Estado de México, Mexico<br />

Kim ANDERSEN, Copenhagen Business School, Denmark<br />

Jean-Pierre AUFFRET, International Academy of CIO, USA<br />

Johanna Ekua AWOTWI, Center for e-Governance, Ghana<br />

Frank BANNISTER, Trinity College Dublin, Ireland<br />

Joerg BECKER, University of Illinois at Chicago, School of Art and Design, USA<br />

Jaro BERCE, University of Ljubljana, Slovenia Deepak BHATIA, World Bank, USA<br />

Melanie BICKING, University of Koblenz-Landau, Germany<br />

Nikolaj BJORNER, Microsoft Corporation, USA<br />

Brian BURKE, Center for Technology in Government, University at Albany, USA<br />

Luis CAMARINHA-MATOS, UNINOVA, Portugal<br />

Donna CANESTRARO, Center for Technology in Government, University at Albany, USA<br />

Lemuria CARTER, Mississippi State University, USA<br />

Alejandra CECHICH, National University of Comahue, Argentina<br />

Wojciech CELLARY, Poznan University of Economics, Poland<br />

Yannis CHARALABIDIS, National Technical University of Athens, Greece<br />

Venkatesh CHOPPELLA, IIIT Hyderabad, India<br />

Eleni CHRISTODOULOU, University of Ciprus, Ciprus<br />

Gabriel PURON-CID, Centro de Investigación y Docencias Económicas, México<br />

Soon Ae CHUN, University of New York, USA<br />

Meghan COOK, Center for Technology in Government, University at Albany, USA<br />

Antonio CORDELLA, Information Systems and Innovation Group at the Department of<br />

Management at the London School of Economics, UK<br />

Anthony CRESSWELL, Center for Technology in Government, University at Albany, USA<br />

Ignacio CRIADO, Universidad Autonoma de Madrid, Spain<br />

xiv


Jim DAVIES, Computing Laboratory, University of Oxford, UK<br />

Sharon DAWES, Center for Technology in Government, University at Albany, USA<br />

Rahul DE, Indian Institute of Management, Bangalore, India<br />

Zamira DZHUSUPOVA, Center for Electronic Governance, UNU-IIST, Macao SAR<br />

Sara ERIKSEN, Blekinge Institute of Technology, Sweden<br />

Elsa ESTEVEZ, Center for Electronic Governance, UNU-IIST, Macao SAR<br />

Enrico FERRO, Istituto Superiore Mario Boella, Italy<br />

Pablo FILLOTRANI, National University of the South, Argentina<br />

Simon FONG, University of Macau, Macao SAR<br />

Jose FORMAZ, Swiss Graduate School of Public Administration, Switzerland<br />

Mila GASCO, Institute of Governance and Public Management, ESADE, Spain<br />

Rimantas GATAUTIS, Kaunas University of Technology, Lithuania<br />

Jeremy GIBBONS, University of Oxford, UK<br />

Robert GOODSPEED<br />

Mary GRIFFITHS, The University of Adelaide, Australia<br />

Thad HALL, University of Utah, USA<br />

Steve HARRIS, Computing Laboratory, University of Oxford, UK<br />

Karim HAMZA, Maastricht school of Management, Netherlands<br />

Paul HENMA, University of Queensland, Australia<br />

Andrew HOPPIN, New Amsterdam Ideas LLC, USA<br />

Princely IFINEDO, Cape Breton University, Shannon School of Business, Canada<br />

Sirajul ISLAM, Bangledesh Center for eGovernance & Örebro University, Sweeden<br />

Tomasz JANOWSKI, Center for Electronic Governance, UNU-IIST, Macao SAR<br />

Marijn JANSSEN, Delft University of Technology, Netherlands<br />

Atreyi KANKANHALLI, School of Computing, National University of Singapore, Singapore<br />

Andrea KAVANAUGH, Virginia Tech, USA<br />

Jay KESAN, University of Illinois, USA<br />

Ralf KLISCHEWSKI, German University in Cairo, Egypt<br />

Trond KNUDSEN, Research Council of Norway, Norway<br />

Padmanabhan KRISHNAN, Bond University,<br />

Kincho LAW, Stanford University, USA<br />

Deidre LEE, National University of Ireland, DERI, Ireland<br />

Christine LEITNER, Center for European Public Administration, Danube University Krems, Austria<br />

Calvin LEONG, SAFP, Macao SAR Government, Macao SAR<br />

Miriam LIPS, Victoria University of Wellington, New Zealand<br />

Nikos LOUTAS, Digital Enterprise Research Institute, Ireland<br />

Luis LUNA-REYES, Universidad de las Americas-Puebla, Mexico<br />

Ann MACINTOSH, University of Leeds, Institute of Communication Studies, United Kingdom<br />

Egle MALINAUSKIENE, Mykolas Romeris University, Lithuania<br />

Albert MEIJER, University of Utrecht, Netherlands<br />

Vassilis MENEKLIS, University of Piraeus, Greece<br />

Ines MERGEL, Syracuse University, USA<br />

Jeremy MILLARD, Danish Technological Institute, Centre for Policy and Business Analysis,<br />

Denmark<br />

Gianluca MISURACA, EC Joint Research Centre, Institute for Prospective Technological Studies,<br />

Spain<br />

Hrushikesha MOHANTY, University of Hyderabad, India<br />

Fawzi MULKI, Social and Economic Directorate, Royal Hashemite Court, Jordan<br />

Taewoo NAM, University at Albany, USA<br />

Toshio OBI, Waseda University, Japan<br />

Theresa PARDO, University at Albany, USA<br />

xv


Marco PERES USECHE, Universidad Externado de Colombia, Colombia<br />

Vasillios PERISTERAS, Digital Enterprise Research Institute, Ireland<br />

Chris REDDICK, The University of Texas at San Antonio, USA<br />

Scott ROBERTSON, University of Hawaii, USA<br />

Tomáš SABOL, Technical University of Košice, Slovak Republic<br />

Steve SAWYER, Syracuse University, USA<br />

Apetipe SEAKOW, Stamford International University, Thailand<br />

Bory SENG, Seoul National University, South Korea<br />

Jochen SCHOLL, University of Washington, USA<br />

Charles SCHWEIK, University of Massachusetts at Amherst, USA<br />

Aadya SHUKLA, Harvard University, USA<br />

Stuart SHULMAN, University of Massachusetts, Amherst, USA<br />

Henk SOL, University of Groningen, Netherlands<br />

Alberto Savoldelli<br />

Marco Prandini<br />

Maurizio Leo<br />

Eleni Panopoulou<br />

Efthimios Tambouris<br />

Alberto Savoldelli<br />

Walter Cerroni<br />

Marco Ramilli<br />

Franco Callegati<br />

Hans-Dieter Zimmermann<br />

Maddalane SORRENTINO, University of Milan, Italy<br />

Evgeny STYRIN, Higher School of Economics (HSE), Russia<br />

Ivar TALLO, e-Governance Academy, Estonia<br />

Efthimios TAMBOURIS, University of Macedonia, Greece<br />

Vishanth WEERAKKODY, Brunel University, UK<br />

Maria WIMMER, University of Koblenz and Landau, Germany<br />

Gamel WIREDU, University of London, UK<br />

Peter WINSTANLEY, Scottish Government, UK<br />

Jing ZHANG, Clark University, USA<br />

Lei ZHENG, Fudan University, China<br />

Jozef ZURADA, University of Louisville, USA<br />

Additional Reviewers<br />

xvi<br />

Jörg Becker<br />

Petra Wolf<br />

Eleni Kaliva<br />

Efthimios Tambouris<br />

Carl Erik Moe<br />

Brunella Caroleo<br />

Elisa Pautasso<br />

Enrico Ferro<br />

Evangelos Kalampokis<br />

Manabu Nakashima<br />

Djoko Sayogo


Session 1<br />

Open Government Data


Beyond Open Government: Ontologies and Data<br />

Architectures to Support Ethical Consumption<br />

Luis F. Luna-Reyes<br />

Universidad de las Americas-Puebla<br />

luisf.luna@udlap.mx<br />

Theresa A. Pardo<br />

University at Albany – SUNY<br />

tpardo@ctg.albany.edu<br />

ABSTRACT<br />

Two important trends on openness are promoting improved<br />

accountability from government and private organizations. The<br />

case of private transparency finds its roots in consumer and other<br />

stakeholder movements. The open government movement in the<br />

US is looking for alternatives to “smart disclosure,” which implies<br />

providing consumers with better information to make better<br />

buying choices. We explore current knowledge on ethical<br />

consumption, as well as two influential technological tools to<br />

support consumer decisions. Our initial discussion suggests that<br />

the use of ontologies and data architectures, together with the<br />

appropriate policy environment and governance system, may<br />

solve some of the current problems identified.<br />

Categories and Subject Descriptors<br />

K.4.1 [Public Policy Issues]: Private Sector Transparency and<br />

Ethical Consumption<br />

General Terms<br />

Management, Design, Human Factors, Standardization,<br />

Languages, Theory, Legal Aspects<br />

Keywords<br />

Sustainability, Supply-Chain, Ethical Consumption, Private Sector<br />

Transparency<br />

1. INTRODUCTION<br />

In the last years we have witnessed two parallel but closely related<br />

trends. First, governments around the world have increasingly<br />

worked to make their operations and decisions more open [17].<br />

On the other hand, a there is a trend pushing corporate<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Djoko Sigit Sayogo<br />

University at Albany – SUNY<br />

dsayogo@ctg.albany.edu<br />

Giri Kumar Tayi<br />

University at Albany – SUNY<br />

g.tayi@albany.edu<br />

David F. Andersen<br />

University at Albany – SUNY<br />

fadum@albany.edu<br />

1<br />

Jing Zhang<br />

Clark University<br />

jizhang@clarku.edu<br />

Jana Hrdinova<br />

University at Albany – SUNY<br />

jhrdinova@ctg.albany.edu<br />

organizations to be more accountable, transparent, and ethical<br />

[2,6]. Although the first documented stakeholder actions to hold<br />

corporations accountable and transparent took place in the early<br />

1600’s [2], the movement has intensified in the last decades<br />

through grassroots movements lead by NGOs to address perceived<br />

failures by States to protect workers [6], and more recently,<br />

because of an increased consumer interest in the environment and<br />

sustainability [14]. In the US, government has also included as<br />

part of its open government initiative, the need to take regulatory<br />

approaches to “smart disclosure” of information needed to help<br />

consumers to make better choices 1 [19].<br />

Although there are many formal attempts to measure and<br />

communicate corporate practices to consumers (surveys, indexes,<br />

or technology applications), there is no agreement on what<br />

information should be disclosed to consumers to better help their<br />

decision making. Moreover, there is even less agreement in terms<br />

of how to ensure data availability, reliability, and validity, as well<br />

as transparency of the processes to disclose such information [14].<br />

Thus, the purpose of this paper is to explore what is the relevant<br />

information for consumers, as well as feasible ways of pulling the<br />

information together to fulfill consumers’ needs. To accomplish<br />

this objective, we explore the literature on ethical consumption<br />

and two prominent tools for ethical consumption in the US and<br />

the European Union. The paper ends by proposing the use of open<br />

architecture and innovative governance systems not only to enable<br />

interoperability along the supply chain, but also to improve<br />

consumer access to information to make better buying decisions.<br />

2. LITERATURE REVIEW<br />

2.1 Understanding Ethical Consumer Values<br />

and Preferences<br />

A large body of literature focusing on ethical consumption is<br />

based on the premise that consumer behavior is “rational”. As a<br />

rational actor, a consumer will seek a product that satisfies his/her<br />

needs by optimally considering all available alternatives and<br />

information [7]. The consumer consumption behavior is guided by<br />

1 http://www.whitehouse.gov/sites/default/files/omb/inforeg/foragencies/informing-consumers-through-smart-disclosure.pdf


the combination of their moral sentiments and economic motives,<br />

especially for the sustainable products [1].<br />

Based on their information seeking behavior, consumers can be<br />

categorized into: the “super-informed” and the “ignorant” [12].<br />

The “super-informed” consumers actively search for product<br />

information related to social and environmental values. These<br />

types of consumers consider social attributes such as fair labor<br />

practices [13], environmental attributes such as climate change,<br />

carbon footprint, recycling, energy conservation and other. The<br />

“ignorant” consumers have to rely on the information provided by<br />

supply-chain actors and government. Disclosure of organizational<br />

and industry information becomes a valuable tool to guide ethical<br />

consumption decisions [5].<br />

Other streams of literature depict some ethical consumers as<br />

altruistic actors. These consumers adopt their ethical values into<br />

their life styles [13], and adjust their behavior to consume<br />

environmental friendly, ethical or fairly traded products and show<br />

pro-environment behaviors [3,13,16]. Consumers who are more<br />

involved in ethical lifestyles perceived higher benefits from<br />

additional information [18].<br />

Other research shows that the degree of commitment to the ethical<br />

values also depends on economic factors. Ethical consumers have<br />

to make a compromise due to conflicting and competing priorities<br />

[16]. The social and environmental attributes and consumer<br />

lifestyles serve as interacting and/or moderating variables in the<br />

determinants of ethical consumption behavior. Research show that<br />

consumers deal with three interacting factors in ethical<br />

consumption behavior, price, quality and convenience [3].<br />

2.2 Sustainability Liability<br />

Following ethical consumption could become a liability for the<br />

consumers. In general, although consumers might shift their<br />

purchasing preference from cheaper non-labeled products, they<br />

may not venture to choose more expensive alternatives [16].<br />

Buying unethical products is usually cheaper than buying better<br />

equivalent products thus hindering the proliferation of ethical<br />

consumption [5]. Researchers argue that this is due to the fact that<br />

higher costs to the environment does not translate into higher<br />

price to consumers, and capturing all social and environmental<br />

costs associated with a product is hard to accomplish [5].<br />

2.3 The Role of Trust for Ethical Consumer<br />

Trust in information plays also a key role in consumption<br />

decisions. Trust formation is affected by shared values and joint<br />

beliefs held by consumers and companies about certain social or<br />

ethical behavior [15]. Consumers rely on existing information to<br />

assess the conformance of ethical values practiced by particular<br />

companies [15]. Findings from these streams of research suggest<br />

that consumer’s trust in the product depends partly on consumer’s<br />

trust in the company’s ethical conduct and partly on product<br />

labeling. Thus, some research explores the role of trust in the<br />

context of corporate social responsibility (CSR). This research<br />

found that ethical conduct reflected in the CRS report influences<br />

consumers’ perception of trust toward the company [4,15].<br />

However, trust based on the CSR practices does not always<br />

account for corporate success in the market [4]. The positive<br />

impact of trust depends on factors such as consumers’ perceptions<br />

of the social reputation of a company [4], product quality and<br />

consumer satisfaction [15].<br />

2<br />

Other stream of research assesses consumers’ trust based product<br />

labeling or certification. This research explores the values that<br />

consumers attach to certification and labels. For instance,<br />

consumers positively correlate organic certification with values<br />

such as stricter production standards and control system, domestic<br />

origination of product, and familiarity with the logo as source of<br />

trust [8]. Customers rely on the label regardless of their<br />

understanding of the meaning behind label [3].<br />

3. METHOD<br />

We used a convenience sampling approach to identify the current<br />

tools providing consumers with information for value-based<br />

purchasing. We chose to evaluate Barcoo and GoodGuide based<br />

on the following considerations: 1) each tool was developed and is<br />

primarily used on a different continent, thus enabling us to make a<br />

comparison. Barcoo was established and widely used in Europe<br />

while GoodGuide was established and extensively used in North<br />

America. 2) Both tools are currently popular tools used for valuebased<br />

purchasing considerations.<br />

4. RESULTS<br />

4.1 Ethical Consumption – Online<br />

Information Strategy<br />

This section evaluates the above mentioned tools that are designed<br />

to help consumers make ethical purchasing decisions. The<br />

evaluation focuses on examining the data problems related to<br />

building the tool, identifying the source of trust on the<br />

measurements used in each tool and delineating the possible<br />

limitations of each tool.<br />

4.1.1 GoodGuide (www.goodguide.com)<br />

GoodGuide was founded in 2007 by Dara O’Rourke, a professor<br />

specializing in global supply chain at the University of California<br />

at Berkeley. The mission of GoodGuide is to transform the<br />

marketplace by helping consumers make value-based purchasing<br />

decisions. It provides expert judgment about the health,<br />

environment, and social performance of products and companies<br />

with a team of scientific and technology experts. GoodGuide<br />

gives four 1-10 numeric ratings, with one general score and three<br />

sub-scores for health, environmental and social performance of<br />

the product or the company respectively.<br />

4.1.2 Barcoo (www.barcoo.com)<br />

Barcoo is an independent service that offers consumers product<br />

information on their mobile phone. Consumer can use their<br />

mobile phone to scan the barcode of products and obtain<br />

background information about the product. Barcoo has a customer<br />

base of more than two million in Germany. It is used mostly in<br />

Europe. The information provided by Barcoo includes ingredients,<br />

nutrition value, certification, and other environmental<br />

information, as well as price comparison and users reviews.<br />

A summary of the evaluation on GoodGuide and Barcoo is<br />

presented in Table 1. The assessment on both tools indicates<br />

several limitations that exist in both tools: 1) lack of clarity in the<br />

mechanism to generate the score, 2) data collection, matching, and<br />

processing is manual resulting in limited scalability, 3) the<br />

transparency and accuracy is limited in the sense that both tools<br />

cannot drill down to the data at product level, and 4) because of<br />

the lack of source data and verification capacity, the construction<br />

of trusted information is primarily based on human judgment,


such as users based assessment in the case of Barcoo or<br />

combination of users and experts in the case of GoodGuide. These<br />

limitations are arguably affecting the trustworthiness of the<br />

information provided to the users. In addition, their inability to<br />

integrate information across the supply-chain impacts the validity<br />

of their result. In the next section, we will argue for the case of I-<br />

Choose as an architecture that could assist web tools such as<br />

Barcoo and GoodGuide with increasing the credibility and<br />

trustworthiness of the information produced.<br />

Table 1. Comparison of Barcoo and GoodGuide<br />

Indicators GoodGuide Barcoo<br />

Information<br />

elements &<br />

scoring<br />

Data Source<br />

Source of<br />

Trust<br />

Data<br />

Problem<br />

1 – 10 numeric ratings:<br />

General score, Health,<br />

Environment, and Social<br />

scores<br />

• Over 1,000 third party<br />

sources<br />

• Comprehensiveness of<br />

data sources<br />

• Experts and Users<br />

judgment<br />

• Company image<br />

• Clarity of scoring<br />

• Manual data collection<br />

• Human judgment<br />

biases<br />

• Limited granularity of<br />

data<br />

• Credibility of data<br />

source<br />

Product background<br />

information:<br />

Ingredients, nutrients,<br />

certifications, price<br />

• Third party providers<br />

• Independent sources<br />

• Data sources – facts<br />

• Legitimacy of partners<br />

& their database<br />

• Users judgment<br />

• Limited granularity of<br />

data<br />

• Reliance on 3rd party<br />

• Credibility of data<br />

source<br />

4.2 I-Choose As An Architecture to Empower<br />

Current Tools and Trends<br />

In this section, we develop a proposal that could make a<br />

contribution to research and practice of ethical consumption.<br />

4.2.1 Main Gaps from the Literature<br />

Although there is an agreement in the literature that the main<br />

consumer concerns are associated with both environmental and<br />

social impacts of corporate activities, there is not an agreement on<br />

how to measure such impact. Rahman and Post [14] found 15<br />

different ways to define environmental impacts, and different<br />

ways to measure them.<br />

Another gap is the difficulty in creating transparent and reliable<br />

measures. Data is not equally available for all corporations, and<br />

because of that, all available scores require the intensive use of<br />

expert judgment, making them highly costly. Moreover, many of<br />

the either publicly available or proprietary data are not transparent<br />

enough, and do not report on reliability and validity [14].<br />

Research in the area has also shown the importance of labeling in<br />

buying decisions [11]. However, labels that certify low<br />

environmental or social impacts may present very similar<br />

information to the consumer at the point of sale, but use very<br />

different criteria or processes in order to get the certification.<br />

3<br />

Researchers have explored extensively key factors affecting<br />

consumer buying decisions, however, we could not find literature<br />

on the impacts of the use of tools such as Barcoo or GoodGuide in<br />

these decisions. More research in the area is needed. This research<br />

may benefit from current efforts on understanding adoption of<br />

software to aid consumer decision making [17]. Some of the<br />

research that we found suggested that incorporating the cost of<br />

externalities in price is yet another way to promote ethical<br />

consumption [5]. However, there is little research on ways to<br />

account for externalities such as environmental impact. There is<br />

still less research exploring the economic impacts of a policy of<br />

this nature.<br />

Finally, a potentially important problem with this area of research<br />

is the fact that most is looking for ways to promote ethical<br />

consumption, without exploring the possibility of consuming less<br />

or changing significantly current consumption patterns.<br />

4.2.2 A Pathway Forward: A Socio-Technical System<br />

for Opening Private Sector Information to<br />

Support Consumer Choice<br />

Our current research suggests that some of the current gaps and<br />

shortcomings of tools that support ethical consumption can be<br />

addressed by the creation of a socio-technical system such as I-<br />

Choose to facilitate information sharing and interoperability<br />

among stakeholders in the supply chain [10]. Our current efforts<br />

are focusing on coffee produced and traded in the NAFTA region.<br />

Coffee producers and consumers have made an effort to attach<br />

additional information to specific kinds of coffee –such as organic<br />

or Fair Trade—to differentiate them and to allow consumers to<br />

make ethical decisions. Lessons from our current project have the<br />

potential to be used by other industries and in different<br />

geographical areas.<br />

We envision that I-Choose should include at least three different<br />

components: a set of data standards to share information across<br />

the supply chain, a set of Application Programming Interface<br />

(API) standards to make it possible for developers and other<br />

interested groups to create specific applications to make this<br />

information usable by regular consumers, and a governance<br />

system, which will be in charge of creating and modifying the<br />

standards over time. We are calling this system the I-Choose<br />

system [9].<br />

In terms of the data standards for information sharing and<br />

interoperability, we are currently developing an ontology-based<br />

set of standards to integrate information from the coffee supply<br />

chain. There are already many higher order ontologies or data<br />

classifications that can be used to support this interoperability<br />

such as the XBRL standard for financial information. Because of<br />

that, our focus is on data components that are related to<br />

certification, which will link to other data standards.<br />

Shared data promoted by I-Choose will benefit efforts such as<br />

GoodGuide or Barcoo by providing better and wider information.<br />

However, this kind of ventures will need to have a way to access<br />

the information. Thus, the second component of I-Choose should<br />

be an API to ease the development of these kinds of applications.<br />

Finally, those two technical components need to meet the<br />

requirements of usability, utility, trust and openness to be widely<br />

adopted and used. To accomplish this objective, we believe that a<br />

multi-stakeholder group needs to collaborate to set the standards,<br />

but also to maintain and adjust them over time. Our current efforts


involve the creation of a Network of coffee stakeholders that we<br />

believe can constitute a very first group to promote this kind of<br />

standards. The group must include government regulators,<br />

industry associations, consumers, consumer associations,<br />

producers and other stakeholders. The group will need to have in<br />

place a series of policies and procedures to ensure the fairness of<br />

the process, avoiding standards that become driven only by the<br />

larger players in the supply chain.<br />

5. CONCLUDING REMARKS<br />

This paper aims to explore feasible ways of drawing relevant<br />

information to fulfill consumers’ needs in making ethical<br />

purchasing decision. To do this, we explore extant literature on<br />

ethical consumption and evaluate two existing tools available to<br />

support consumers’ ethical consumption. Our exploration<br />

identifies some of the current gaps and shortcomings of the<br />

existing tools supporting ethical consumption. We then proposed<br />

a scalable socio-technical system to facilitate information sharing<br />

and interoperability among stakeholders in the supply chain. This<br />

system comprises of three different but interrelated components,<br />

namely: 1) a set of data standards to share information across the<br />

supply chain, 2) a set of Application Programming Interface (API)<br />

standards to make it possible for developers and other interested<br />

groups to create specific applications to make this information<br />

usable by regular consumers, and 3) a governance system, which<br />

will be in charge of creating and modifying the standards over<br />

time. We are calling this system the I-Choose system. We further<br />

call for more attention to the role of government in the<br />

management of an architecture such as I-Choose.<br />

6. ACKNOWLEDGMENTS<br />

Research reported in this paper is supported in part by the US-<br />

NSF (Grant No. IIS-0540069), CONACYT-Mexico (Grant No.<br />

133670), and COMEXUS-Fulbright Commission in Mexico. The<br />

views and conclusions expressed in this paper are those of the<br />

authors alone and do not necessarily reflect the views of<br />

COMEXUS, CONACYT or NSF.<br />

7. REFERENCES<br />

[1] Barnett, C., Cloke, P., Clarke, N., and Malpass, A. Consuming<br />

Ethics: Articulating the Subjects and Spaces of Ethical<br />

Consumption. Antipode 37, 1 (2005), 23–45.<br />

[2] Baue, B. and Murninghan, M. The Accountability Web:<br />

Weaving Corporate Accountability and Interactive<br />

Technology. Journal of Corporate Citizenship, 41 (2011), 27–<br />

49.<br />

[3] Carrigan, M. and Attalla, A. The myth of the ethical consumer<br />

– do ethics matter in purchase behaviour? Journal of<br />

Consumer Marketing 18, 7 (2001), 560–578.<br />

[4] Castaldo, S., Perrini, F., Misani, N., and Tencati, A. The<br />

missing link between corporate social responsibility and<br />

consumer trust: the case of fair trade products. Journal of<br />

Business Ethics 84, 1 (2009), 1–15.<br />

4<br />

[5] Chouinard, Y., Ellison, J., and Ridgeway, R. The Sustainable<br />

Economy. Harvard Business Review 89, 10 (2011), 52–62.<br />

[6] Doorey, D. The Transparent Supply Chain: from Resistance<br />

to Implementation at Nike and Levi-Strauss. 2011.<br />

[7] Freestone, O.M. and McGoldrick, P.J. Ethical positioning<br />

and political marketing: the ethical awareness and concerns<br />

of UK voters. Journal of Marketing Management 23, 7-8<br />

(2007), 651–673.<br />

[8] Janssen, M. and Hamm, U. Consumer perception of different<br />

organic certification schemes in five European countries.<br />

Organic Agriculture, (2011), 1–13.<br />

[9] Luna-Reyes, L.F., Andersen, D.F., Andersen, D.L., Derrick,<br />

D., and Jarman, H. Full Information Product Pricing (FIPP)<br />

Regimes: Policy Implications for US-Mexico Sustainable<br />

Commerce. (2012).<br />

[10] Luna-Reyes, L.F., Zhang, J., Whitmore, A., et al. Full<br />

Information Product Pricing: An Information Strategy for<br />

Harnessing Consumer Choice to Create a More Sustainable<br />

World. 2011.<br />

[11] De Magistris, T. and Gracia, A. Do Consumers Pay Attention<br />

to the Organic Label When Shopping Organic Food in Italy?<br />

In M. Reed, ed., Organic Food and Agriculture - New Trends<br />

and Developments in the Social Sciences. Janeza Trdine,<br />

Croatia, 2011.<br />

[12] McEachern, M.G. and McClean, P. Organic purchasing<br />

motivations and attitudes: are they ethical? International<br />

Journal of Consumer Studies 26, 2 (2002), 85–92.<br />

[13] Michaelidou, N. and Hassan, L.M. Modeling the factors<br />

affecting rural consumers’ purchase of organic and freerange<br />

produce: A case study of consumers’ from the Island<br />

of Arran in Scotland, UK. Food Policy 35, 2 (2010), 130–<br />

139.<br />

[14] Rahman, N. and Post, C. Measurement Issues in<br />

Environmental Corporate Social Responsibility (ECSR):<br />

Toward a Transparent, Reliable, and Construct Valid<br />

Instrument. Journal of Business Ethics 105, 3 (2012), 307–<br />

319.<br />

[15] Swaen, V. and Chumpitaz, C.R. Impact of Corporate Social<br />

Responsibility on consumer trust. Recherche et Applications<br />

en Marketing (English Edition) 23, 4 (2008), 7–33.<br />

[16] Szmigin, I., Carrigan, M., and McEachern, M.G. The<br />

conscious consumer: taking a flexible approach to ethical<br />

behaviour. International Journal of Consumer Studies 33, 2<br />

(2009), 224–231.<br />

[17] Xiao, B. and Benbasat, I. E-Commerce Product<br />

Recommendation Agents: Use, Characteristics and Impact.<br />

MIS Quarterly 31, 1 (2007), 137–209.<br />

[18] Zander, K. and Hamm, U. Consumer preferences for<br />

additional ethical attributes of organic food. Food Quality<br />

and Preference 21, 5 (2010), 495–503.<br />

[19] MOU for the Heads of Executive Departments and Agencies<br />

- Informing Consumers through Smart Disclosure. Executive<br />

Office of The President - Office of Management and Budget,<br />

Washington, DC, 2011.


Exploring Process Barriers to Release Public Sector<br />

Information in Local Government<br />

Peter Conradie<br />

Creating 010<br />

Rotterdam University of Applied Sciences,<br />

P.O. Box 3001 HA Rotterdam<br />

The Netherlands<br />

003110 794 4801<br />

p.d.conradie@hr.nl<br />

ABSTRACT<br />

Due to expected benefits such as citizen participation and<br />

innovation, the release of Public Sector Information is getting<br />

increased attention on various levels of government. However,<br />

currently, data release by governments is still novel, with little<br />

experience and knowledge thus far about the benefits and barriers<br />

of release. This is compounded by a lack of understanding about<br />

how internal processes influence data release. Our aim in this<br />

paper is to get a better understanding of these processes and how<br />

they influence data release, i.e, to find determinants for the release<br />

of public sector information. For this purpose, we conducted<br />

workshops, interviews, questionnaires and desk research. We find<br />

that the way data is used by a department, the way data is<br />

obtained, how data is stored, and the suitability of data to become<br />

open, as crucial indicators for open data release. We conclude<br />

with lessons learned based on the research findings. These are that<br />

we should take a nuanced approach towards data release, avoid<br />

releasing data for it’s own sake and take small incremental steps<br />

to explore data release.<br />

Categories and Subject Descriptors<br />

H.3 [Information Systems]: Information Storage and Retrieval;<br />

K.4 [Computers and Society]: Public Policy Issues<br />

General Terms<br />

Design, Experimentation<br />

Keywords<br />

Open Data, PSI, Participatory Action Research<br />

1. INTRODUCTION<br />

The release of Public Sector Information by governmental<br />

organisations is getting increasing attention from government on<br />

several levels, local, national and international. For example, early<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

5<br />

Sunil Choenni<br />

Research and Documentation Centre<br />

Ministry of Security and Justice<br />

P.O. Box 20301 2500 EH, The Hague<br />

The Netherlands<br />

0031648100301<br />

r.choenni@hr.nl<br />

in his presidency, United States President Obama called for<br />

increased release of public sector information [24]. Similarly,<br />

European Commissioner for Digital Agenda, Neelie Kroes is a<br />

strong advocate for the release of Public Sector Information in the<br />

European Union, by its member states, but also by the<br />

commission [21]. Her view is supported by the 2003 PSI<br />

Directive the European Parliament and the European Council<br />

[11].<br />

Oft cited motivations for data release are hopes of increased<br />

citizen involvement in government, increased transparency and<br />

improved decision making [2, 21, 24]. Besides the premise of<br />

increased citizen involvement, open data is also seen as fuel for<br />

innovation. To illustrate, the MEPSIR study places the estimated<br />

value of the PSI market at 27 billion within the EU [10].<br />

Furthermore, open data may give also a boost to the field of egovernance.<br />

However, this increased call for data release by governmental<br />

agencies presents data professionals with tasks that are as of yet<br />

unknown, in addition to having side effects that are hard to predict<br />

on a large scale. The cost associated with data release is also not<br />

always known, while the benefits that open data can have need to<br />

be explored. Having said that, the directives from higher levels of<br />

government are putting pressure onto local governments to find<br />

answers to pressing questions in relation to open data, such as<br />

what are the challenges, potentials, barriers and impact of open<br />

data?<br />

In The Netherlands the calls for the re-use of data has not gone<br />

unheard. On various levels of national government in The<br />

Netherlands initiatives have been launched to free data for re-use<br />

in the public domain. These include local city councils, ministries<br />

and provincial governments. To illustrate: recent months has seen<br />

the launch of a national platform of data release [20], but also<br />

platforms on metropolitan level, as the that of the Dutch city<br />

Enschede [19].<br />

While possible barriers and potentials of open data are reported by<br />

several researchers (see Section 2), a deep understanding of the<br />

underlying processes for these barriers is missing. In this paper,<br />

we study the underlying processes that pertain to data release in a<br />

local context, i.e., we search for crucial determinants for the<br />

release of open data. We have studied the processes involved in<br />

releasing data at four organizations of the municipal Rotterdam,<br />

which is the second largest city in the Netherlands, with a<br />

population of 680 000. The municipality currently has 12 000<br />

employees. We have implemented a participatory action research


approach [28] to expose indicators that play a significant role in<br />

releasing data for public at the four organizations. Important<br />

elements in this approach are desktop research, workshops,<br />

questionnaires, and in-depth interviews with key persons at<br />

different levels of the organizations. We have found that<br />

important indicators for data release are the way data is stored in<br />

an organization (distributed/decentralized versus centralized),<br />

whether data is internally produced or externally gathered, the use<br />

of data, and the availability of guidelines to determine whether<br />

data is suitable for release. We discuss how these indicators may<br />

contribute to shape an open data policy at a local level.<br />

We note that while the combination of the indicators may be<br />

considered as a predictor of data release by an organization, the<br />

focus of the paper is rather to identify these indicators.<br />

The remainder of this paper is organized as follows. In Section 2,<br />

we embed our work in the field of open data in more detail. In<br />

Section 3, we motivate the use of a participatory action research<br />

approach for our purpose, while we implement this approach in<br />

Section 4. In Section 5, we present our findings from the<br />

participatory action research sessions. Section 6 is devoted to the<br />

lessons that we have learned so far. Section 7 reports about our<br />

future activities, while Section 8 concludes the paper.<br />

2. RELATED WORK<br />

Despite the pressures from higher levels of (federal) government<br />

to realise data release on local level, there are barriers along<br />

several dimensions to open data release. From a user perspective,<br />

major barriers are the access to proper datasets and the adequate<br />

use of datasets. The access to proper datasets is aggravated by the<br />

fact that the datasets are fragmented and offered at several<br />

websites, which are in some case hard to find [3, 17]. Moreover,<br />

access to datasets are in some cases restricted to specific user<br />

groups. Adequate use of datasets is hindered since metadata with<br />

regard to datasets are poorly documented, and therefore the<br />

semantics of the data may be ambiguous. Furthermore, how to<br />

determine the quality of a dataset is an open question. In [29] an<br />

overview of the barriers that users may encounter in using public<br />

sector information is provided.<br />

Along with barriers from a user perspective, data providers also<br />

encounter barriers to data release. From this perspective, major<br />

barriers are the lack of knowledge to deposit data, the economical<br />

loss that data release may entail, and the lack of knowledge to<br />

decide which datasets are eligible to release. In order to deposit a<br />

dataset, often this dataset should be formatted and processed<br />

according to the system requirements that accepts the dataset.<br />

Especially dataset providers who are not familiar with the<br />

technical aspects of data processing should deliver a lot of effort<br />

to deposit a dataset.<br />

The economic impact of data release becomes clear when taking<br />

into account that some European public sector bodies used a cost<br />

recovery model to fund data collection. For example, the Dutch<br />

Business Register (KvK), knows a cost recovery ratio of 19,50%<br />

[25]. By releasing data that is currently sold, certain agencies<br />

loose a valuable source of income [27].<br />

Organizations need practical frameworks that support them to<br />

decide whether a dataset is eligible to release or not [30]. In these<br />

frameworks, special attention should be given to privacy issues.<br />

Nowadays, organizations are struggling with the questions<br />

whether a dataset is or may become privacy sensitive [7]. For<br />

6<br />

example, according to [16, 18], combining datasets could lead to<br />

undesirable results such as revealing the identity of persons.<br />

Additionally, publishing data that was gathered and managed for a<br />

one purpose might lead to different conclusions if implemented in<br />

an unrelated context [16]. The potential violation of privacy, has<br />

especially gained a lot of attention in the literature, see for<br />

example [1, 5, 13, 16, 22, 23, 26].<br />

In [5] a study is devoted on the impact that information<br />

technology has on several privacy issues. While the field of<br />

database security [1] mainly focuses to technical solutions that<br />

enforce the “need to know principle” i.e., access control policies,<br />

which may prevent the disclosure of privacy, more comprehensive<br />

alternatives to prevent the disclosure of privacy are proposed in<br />

[4, 16, 26]. In [26] a framework is proposed to protect the privacy<br />

of citizens, while in [4] and [16] comprehensive architectures are<br />

proposed to minimize the violation of privacy law and regulations.<br />

In [13], the authors plea for a so-called ambient law that<br />

articulates fundamental legal protections, including privacy,<br />

within the socio-technical infrastructure. In [23] privacy concerns<br />

about using cameras and solutions to these concerns are discussed<br />

in the context of monitoring dementia patients, while [8, 22] do<br />

the same in the context of public safety.<br />

However, PSI, is not always personally bound. Moreover, the<br />

barriers that may be encountered depends on the type of data at<br />

hand to be released. Therefore, for different types of data,<br />

different kind of barriers may be encountered. At a national level,<br />

there are also barriers to data release above and beyond privacy. A<br />

comparative study by [15] highlights these issues. Barriers to data<br />

release on national level are cited as traditionally closed<br />

government culture, but also limited data quality or uncertain<br />

economic impact of data release.<br />

These studies, while providing a view to data release on a national<br />

level, lack the focus on issues as experienced on a local level by<br />

public sector information professionals. There is a lack of<br />

understanding on local government levels on the impact, barriers<br />

and opportunities of open data release. Our study focus on the<br />

understanding of the underlying processes entailed by open data at<br />

a municipal level. The rationale to choose this level instead of a<br />

national level is that data is mainly gathered at local levels, and<br />

therefore their support are of crucial importance for the success of<br />

open data. To prevent that the understanding of the underlying<br />

processes will be dominated by privacy issues, we will place our<br />

emphasis in this study on the release of data that not are<br />

personally bound, and therefore the chance that data is privacy<br />

sensitive is minimized. For example, we focus on the underlying<br />

process that are entailed by the release of data that pertains to all<br />

trees in Rotterdam, such as the number of trees in a street, the<br />

kind of trees in the street, the year that a tree is planted and so on.<br />

3. APPROACH<br />

As mentioned above, there is a lack of understanding of how data<br />

should be released, what the effects of release might be, and the<br />

processes needed to facilitate data release. This applies not only to<br />

national or federal governments, but also on a local level. Within<br />

our education program experience has also shown that data<br />

release is not self-evident.<br />

In order to explore data release, the University of Applied<br />

Sciences in Rotterdam initiated a research project with four<br />

services that form part of the Municipality of Rotterdam. They are


Figure 1. Stakeholders in the Participatory Action<br />

Research<br />

City Development (Stadsontwikkeling), City Works<br />

(Gemeentewerken), Library (Bibliohteek) and City Archive<br />

(Gemeentearchief).<br />

The participating services form part of a consortium exploring the<br />

barriers and benefits of open data for the local council and<br />

represent one of the clusters that comprises the municipality. The<br />

Library and the City Archive focuses on clients accessing its<br />

services, City Development is more involved with executing and<br />

developing urban policy, while City Works makes products such<br />

as detailed city maps in addition to maintaining objects and<br />

infrastructure in the city. These roles will be elaborated on later in<br />

Section 4. First, we motivate in the following the choice for a<br />

participatory action research approach and describe how we will<br />

apply this approach.<br />

3.1 Participatory Action Research<br />

In order to understand barriers of data release, we employ a<br />

participatory approach to research, where stakeholders from the<br />

various public services are co-researching through action and<br />

participation how an open data policy can be implemented.<br />

Formally referred to as Participatory Action Research (PAR), this<br />

approach focuses on co-research with participants [28].<br />

From the previous sections, it is clear that the barriers – e.g.:<br />

technical issues, privacy or law - associated with data release<br />

require expertise from different branches of knowledge. Seen<br />

from this perspective, PAR can be an appropriate methodology,<br />

due to its applicability in multidisciplinary research [28].<br />

Furthermore, PAR is often a combination of theory and practice<br />

and thus brings together academic researchers and practitioners as<br />

problem solvers. PAR research aims to advance practical<br />

knowledge and is often built on an understanding that results from<br />

field experience [6]. According to [14], where knowledge<br />

embedded in local context, a PAR approach can be beneficial.<br />

What also speaks to more methodologically flexible approaches<br />

such as PAR is the context in which research is taking place.<br />

Organizations such as the local council are not found in a<br />

7<br />

laboratory environment where variables can be tightly controlled<br />

in order to conduct experiments. Instead, individuals are busy<br />

conducting their regular tasks. Given this, a more flexible<br />

approach to research is required, where results can be quickly<br />

incorporated into the research.<br />

While [28] has expressed the benefits of PAR from a sociological<br />

point of view, [12] mentions that such an approach also benefits<br />

the development of information systems. For instance, the<br />

participatory process can elicit increased commitment, while<br />

helping create support for proposed solutions. This resonates with<br />

the recommendation of [28] that PAR can help to prevent<br />

misconceptions about research results and interpretations, because<br />

participants are involved in research. [12] further mentions that a<br />

more participative approach is less likely to result in change to<br />

resistance from users (i.e.: data professionals in the local council)<br />

during implementation, which is also relevant in the context of the<br />

implementation of open data policy.<br />

In practice, PAR thus means a more involved approach by all<br />

participating stakeholders. In the context of our research, this has<br />

meant not only conducting interviews with our participants, but<br />

also organization of workshops to discuss emerging themes about<br />

data release on a local level. Researchers also aim to be involved<br />

with discussions relating to PSI release by attending internal<br />

events at the council about PSI and data release. Furthermore,<br />

events are organized to involve external stakeholders in the<br />

process, by giving a platform from which issues related to open<br />

data could be discussed.<br />

Throughout the project, there is also a strong focus on the use of<br />

cases that will guide data release. These cases are thematically<br />

tied to the middle and long-term goals of the local council. These<br />

themes were distilled down to projects, to be performed in our<br />

education program by students. The goal is to let the projects act<br />

as driver for data release in the local council, first by animating<br />

the participating partners to quickly supply data for project<br />

purposes, but also to highlight the type of data that is most<br />

wanted, and the potential re-uses of data. Results from the<br />

education program can subsequently be used by participants why<br />

data re-use can be valuable.<br />

Data release cannot be seen in isolation. In the long term, the goal<br />

of open data is to foster innovation, transparency and<br />

participation. This is achieved with actors found externally from<br />

the municipality. Additionally, the municipality, through its very<br />

nature serves goals of others. As such, PSI release is not in and of<br />

itself the goal. The aim is also to explore the value of data for the<br />

city, whether expressed financially, or through other metrics such<br />

as social cohesion o participation.<br />

This prescribes the involvement of stakeholders from outside the<br />

public sector, such as the local creative industry. Several<br />

commercial companies partake in exploring, through their active<br />

involvement in our educational program. The cooperation<br />

between Creative Industry as potential user of data, the Public<br />

Sector as data supplier, education and research is shown in Figure<br />

1. We believe that in bringing these four stakeholders together, a<br />

broad view of the issues can sketched, with education and creative<br />

industry acting as data users, while the public sector<br />

experimentally supplies data, with researchers cataloguing data<br />

release.


4. IMPLENTING PAR<br />

In order to come to a deeper understanding of the underlying<br />

processes for the barriers to data release, we have studied the<br />

participating services provided by the four organizations at the<br />

municipality. This happened first through an exploratory<br />

workshop with consortium partners where earlier experiences<br />

with regards to data release within each service was highlighted.<br />

This was attended by a representative of the four services, plus a<br />

member of the Management Service (Bestuursdienst) (n=6). In<br />

addition to this, we performed desk research about the services.<br />

This was followed up with a questionnaire with all the participants<br />

(n=11). Subsequently, the questionnaire was also filled in by other<br />

civil servants (n=50). Questions were based around five themes,<br />

introduced by [15]: internal; judicial, social cultural, economic<br />

and technical barriers to data release. The statements relating to<br />

these themes were given, asking respondents to agree or disagree,<br />

on a 5-point Likert scale. Examples include: Because my<br />

department generates income through licensing data, I think my<br />

department should retain the right to license the data, or, Within<br />

my department, too much of the data is too privacy sensitive to<br />

release.<br />

The answers from the questionnaire formed the input for<br />

subsequent in-depth interviews with participants (n=11). As part<br />

of the project, a workshop was also attended, where statements<br />

regarding data use was introduced and discussed by attendees<br />

(n=8). Following this, a second workshop was organized where<br />

the benefits and barriers of data release was discussed (n=6).<br />

These various investigations were used to construct the indicators<br />

for the underlying processes. Below we present the results from<br />

these investigations.<br />

Participants work at various departments within the local council<br />

and were recruited as a result of previous engagement with<br />

projects at the University. Respondents also came from services<br />

outside of the project consortium, in order to give a broader<br />

impression of open data. Interviews were loosely structured and<br />

conducted on site.<br />

The goal of these initial interviews was to explore how data<br />

release is currently facilitated within the organization. It also<br />

helped in connecting the internal processes of the council with the<br />

barriers, leading to a better understanding of how data is managed.<br />

Interviews were created based on themes that emerged from a first<br />

open workshop about data release, where participants reflected on<br />

earlier experiences. These results were compared with existing<br />

research on data release by national governments, to form a better<br />

picture of the subject. Respondents also filled out a questionnaire<br />

prior to the interview, which helped to focus the interview themes<br />

and identify some barriers as expressed by the participants<br />

The first impression gathered from the interviews is the large<br />

variety between the profiles of the services and how this impacts<br />

data treatment. City Development executes and develops urban<br />

development policies such as new housing complexes, or new<br />

traffic routes. For this task, City Development uses data<br />

extensively. The organization has a traditional decentralized data<br />

structure, where data is used to execute policy, but is subsequently<br />

often not re-used. The sources of the data also varies. In some<br />

cases, it is gathered by a certain department, for example through<br />

sensors on the road. In other cases, data might be bought<br />

externally, or requested from a service of department controlling<br />

8<br />

the data. Illustrative of this is the use of quantitative interview<br />

data from 17000 citizens in Rotterdam. These interviews,<br />

conducted by an external bureau, is subsequently analysed and<br />

presented in booklet form. This booklet might influence policy,<br />

but the underlying data: interview results with 17 000, or even the<br />

data interpretation that results from an analysis of the data is not<br />

necessarily used again for different purposes within the<br />

department, nor is it centrally controlled. Ownership of the data is<br />

also opaque, in addition to its status as public sector information,<br />

due to the fact that it was bought from an external agency.<br />

While City Development creates policy, City Works has as task to<br />

maintain the objects and infrastructure of the city. This includes<br />

trimming trees, maintaining garbage bins, or removing unwanted<br />

growth from bicycle paths, but also large infrastructure project<br />

planning and advice. Additionally, City Works also produces a<br />

variety of products, such as detailed maps of the city. These tasks<br />

require intensive use of data, either because data is needed to<br />

identify the location of objects due for maintenance, or simply<br />

because it is a core aspect of created products such as maps. City<br />

Works also supplies data to organizations inside the local council.<br />

This would include sharing data with City Development to assist<br />

policy development. For all these tasks City Works has<br />

traditionally been very reliant on data management. Data must be<br />

easily accessible and findable because not only is it important for<br />

the internal functioning of the department, it is also one of the<br />

core services offered.<br />

The Library relates to City Works and City Development in the<br />

sense that data is essential for the internal functioning of the<br />

service. Data is collected about books to make them findable<br />

online or in a local catalogue, but the library also keeps data about<br />

all their customers, to ensure efficient service delivery. However,<br />

data is either personally bound, or might be subjected to copyright<br />

law. For example, meta data about books might contain<br />

descriptions supplied by publishers, unavailable for re-use.<br />

However, the Library is also in the midst of reorganization and<br />

might in the future not be part of the city council, at least not in its<br />

current form. This essentially means that the data gathered and<br />

used by the library might not be considered as PSI. Subsequently,<br />

the legal frameworks, as recommended on European and national<br />

level might not be applicable. This creates uncertainty about the<br />

status of the data and to what extent in might be made available.<br />

The last service, the City Archive, is fundamentally already an<br />

active participant in open data, albeit in a largely non-digital form.<br />

Currently, the archive consists of almost 20 kilometres of archived<br />

material, stretching back 800 years. The legacy of, until recent<br />

years, always working with physical artefacts means that<br />

digitization is not traditionally part of the role of the Archive.<br />

However, the Archive has already digitized more than 150TB<br />

worth of data. This data has not been imported into any<br />

centralised system for easy retrieval. There is thus a significant<br />

amount of available information, but a proportionally small<br />

amount is currently accessible through the digital archive. A scan<br />

on demand services has also been launched, but it seems illusory<br />

that the entire archive will be available online soon. Additionally,<br />

certain objects are not easily scanned: these would include objects<br />

that are of unusual format, or very fragile. The City Archive also<br />

possesses very little geographical information about catalogued<br />

objects, prohibiting its use in maps, or other geographic<br />

applications.


This sketches the picture of the four services participating in the<br />

research. Through our interviews we also identified certain<br />

recurring themes, as identified by respondents. What follows is a<br />

closer look at the most important subjects.<br />

5. OBSERVATIONS<br />

The data collection in our PAR results in a number of interesting<br />

observations. In the following two subsections we report on these<br />

observations. We have classified the observations in two<br />

mainstreams. Observations that pertain to underlying thresholds of<br />

data release, and therefore indirectly determine the release of data,<br />

and observations that directly determine the release of data. From<br />

the latter observations, we derive a set of indicators that are<br />

relevant for the release of data. In Section 5.1, we outline the main<br />

underlying thresholds that play a role in data release. Section 5.2<br />

is devoted to the observations and a set of indicators that directly<br />

determine the release of data.<br />

5.1 Underlying Thresholds<br />

5.1.1 Fear of False Conclusions<br />

A recurring theme was the fear of false conclusions being drawn<br />

from released data. An example of this would be the potential<br />

decrease in property value if details would surface about policy<br />

plans of new city developments, even if these were not yet<br />

finalised. Interpretations of data by outsiders without prior<br />

knowledge about the goal of data gathering could also lead<br />

unwanted situations. For example, research performed on the<br />

demographic profile of certain neighbourhoods might not appear<br />

nuanced enough to an outsider without knowledge about statistical<br />

methods. In the case that there are judicial frameworks in place to<br />

mitigate such issues, there might not be known to individuals<br />

dealing with a particular data request.<br />

5.1.2 Financial Effects of PSI Release<br />

On the economic front, licensing fees also formed a barrier to<br />

release. As mentioned earlier, some public bodies charge usage<br />

fees for data. This is also the case for City Works. While research<br />

has shown that the data recovery model results in proportionally<br />

low amounts of income and that less restrictive data release can in<br />

some cases lead to increases in revenue and or, in the case of free<br />

data, lower transaction costs [25], services find themselves in a<br />

transitional phase. Even proportionally low amounts of income<br />

from data licenses need compensation. The current climate of<br />

decreased government spending aggravates the problem since it is<br />

not a given that lost income from releasing previously licenced<br />

data for free will be compensated by the national government or<br />

the council.<br />

5.1.3 Opaque Ownership and Unknown Data<br />

Locations<br />

There are also significant questions regarding ownership of data.<br />

Due to vertical data management in the past, data sharing between<br />

departments has historically not always been the case. As a result,<br />

services and, in extreme cases, departments within a service, lack<br />

a complete picture about which data others control. Additionally,<br />

even if the location of data is known, its ownership remains<br />

opaque, inhibiting release. Merely identifying a dataset that would<br />

strictly speaking be suitable for release does not warrant its<br />

appropriateness as open data.<br />

9<br />

5.1.4 Priority<br />

Finally, from our interviews and workshops, it transpired that<br />

open data is not necessarily a priority within the council and does<br />

not form part of existing tasks. This is not a consequence of<br />

unwillingness, but simply because data release is not part of the<br />

regular work for many data professionals. In combination with<br />

this, the immediate benefits of data release are not always explicit,<br />

making it an extra task, without clear incentives.<br />

While the interviews conducted provide insights into the<br />

experience of data release by the data professionals in the city<br />

council, it neglects exploring the actual process of data release in<br />

an empirical form. In the following section, we elaborate on the<br />

released data, but also on the data that has, as of yet, not been<br />

easily released. From these observations, we derive a set of<br />

indicators that determines the release of data.<br />

5.2 Indicators for Data Release<br />

For our educational program, the focus has been to release data<br />

that can be described as the low hanging fruit. This was for the<br />

most part non-personal data related to objects in the city, for<br />

reasons elaborated on earlier. A majority of data relates to public<br />

property – in essence everything controlled by the municipality<br />

that can be observed in the public space. Given this, a major<br />

supplier has been City Works. The data released includes data<br />

such as the locations of objects like trees, roads, or parks.<br />

However, release has not only been swift because of the types of<br />

data, but also due to the central data storage at City Works.<br />

However, data released by the City Works was not made available<br />

for re-use outside of our education program. The reason behind<br />

this is the lack of clear judicial rules with regards to data re-use on<br />

a wider scale. This effectively means that the data cannot strictly<br />

be referred to as open data: it may not be used without restrictions<br />

outside of our education program.<br />

Despite the ease with which data about objects was released, other<br />

types of data that relate to the internal processes of the council is<br />

much more sensitive. For example, data about the maintenance<br />

costs of objects has not been released, even within the education<br />

program. This would include data about how often trees are<br />

treated for various disease and the costs associated with cutting<br />

the grass in public parks, or what the budgets are for keeping the<br />

city maintained. Anecdotal evidence from our education program<br />

suggests that this type of data (such as the maintenance cycle of<br />

objects, or the costs associated with taking care of trees), can form<br />

interesting input for applications. Also from the perspective of<br />

transparent government, this data seems valuable. However, in the<br />

short term, this is not forthcoming.<br />

The lack of judicial frameworks and the ease of release stands in<br />

stark contrast with data from City Development. This department<br />

has made explicit decisions about data release, by classifying data<br />

released under Creative Commons Zero (CC0) license. Applying<br />

this license means that, unless otherwise indicated, the contents of<br />

data objects such as traffic information is available for any type of<br />

reuse. An exception to this might be the presence of copyrighted<br />

material inside a document. For example, a policy document<br />

could be supplied, unless it contains a photograph that does not<br />

fall under the CC0 license. Furthermore, it is not required to state<br />

the source of the data by the re-user. However, it is prohibited to<br />

create the impression that the local council agrees with any


conclusions that might arise rom the data, when interpreted by<br />

external parties [9].<br />

Notwithstanding, despite having seemingly unambiguous<br />

permission to release data to the public, the City Development<br />

department is often in the dark as to where data actually resides.<br />

Even if the data location is fully known, it does not warrant<br />

release. Illustrative of this is a request for the locations of public<br />

transport data. While this data is controlled by City Development,<br />

the data is owned on a metropolitan regional level. As a result,<br />

requests for the data’s release needs to go to metropolitan level,<br />

even though the data location is known. Due to its ownership<br />

being external, it is subsequently unclear whether the data can be<br />

classified under the CC0 license mentioned above. This illustrates<br />

that defining the judicial aspects of data release does not translate<br />

to release. Practical or technical issues remain.<br />

Due to the product focussed work process present at City<br />

Development, the extreme decentralization is not conducive to an<br />

open data policy. Additionally, departments within City<br />

Development are controllers of datasets, but do not necessarily<br />

own them. This potentially creates uncertainty as to the<br />

applicability of the license, but also ambiguity as to who has the<br />

final word in releasing the data.<br />

Furthermore, while City Development has been very clear in<br />

taking care of the judicial side of open data, the data that is<br />

currently classified for re-use does not compromise all data. The<br />

real-time status of many parking garages in the city is such an<br />

example. This data, whilst known and shown in certain locations<br />

in the city, is not available to third parties.<br />

While City Development and City Works both deal for a big part<br />

with data in a digital format, the City Archive is historically much<br />

more focussed on physical artefacts. Data release by City Archive<br />

has up until now been limited to the opening up of the search<br />

Application Programming Interface (API), in order to access the<br />

object metadata. There is thus no raw, unedited data about<br />

archived objects such as high-resolution images, or historical<br />

maps available in digital form, for reasons discussed earlier.<br />

Table 1. Indicators of data release based on observations<br />

Themes City Development City Works Library City Archive<br />

Use of data Execute development policy. Maintain public<br />

objects, producing<br />

geographical products.<br />

Support core services,<br />

internally and<br />

externally<br />

Source of data Externally gathered Internally produced Internally produced<br />

through services<br />

processes and<br />

externally bought<br />

Enhance services,<br />

catalogue objects<br />

Metadata internally<br />

created, artefacts<br />

externally supplied<br />

Data storage Decentralized Central Central Central (meta data<br />

only)<br />

Suitability of data for Medium: combination of High: many sets related Low: data personally High: data not<br />

release personally identifiable to public objects, non- identifiable or subject personally identifiable<br />

information, live sensor data personal.<br />

to copyright<br />

and owned by the<br />

and object data.<br />

Archive<br />

Data released None Object data of public Book metadata Search API of archive<br />

artefacts<br />

metadata<br />

Biggest threshold Decentralized data storage No legal framework for Personally identifiable Costs associated with<br />

and internal data<br />

the supply of data, data, uncertain digitalization of<br />

management processes. commercial interests. organizational status,<br />

copyright.<br />

archive artefacts.<br />

10<br />

As mentioned before, the Library has more comprehensive digital<br />

service provision, due to the reliance on data to manage the<br />

collection and serve the public. However, the only set of<br />

information that is currently available for use contains book meta<br />

data. The use of this data currently falls into a grey zone:<br />

bibliographic information gets bought from a commercial<br />

organization, which has implications on its release as open data,<br />

while for education purposes, re-use would be allowed. While the<br />

library is also in possession of other data that is without copyright<br />

restrictions, this comprises information about book lending, or<br />

statistics about members. This data could theoretically be<br />

personally identifiable, which complicates its use as open data.<br />

Even in cases where data is anonymized it might still be possible<br />

to extract personally identifiable data, through methods discussed<br />

by [18].<br />

From these observations, we note that the judicial issues, which<br />

include privacy and copyright concerns, the way data is collected<br />

and how it is stored, play an important role in data release.<br />

Therefore, we distinguish the following indicators that may be<br />

important for data release:<br />

o Use of data, i.e., the way data is used by the department.<br />

o Source of data, i.e., how is a set of data obtained?<br />

o Data Storage, i.e., is data stored centrally, or decentralized?<br />

o Suitability of data for release, i.e., are there rules and<br />

regulations that determine whether a dataset may be released<br />

or not, such as privacy or copyright.<br />

In Table 1, we summarize how the several departments score on<br />

each of the indicators together with the results of dependent<br />

variable “data released”. Based on the research performed, we<br />

also name the biggest threshold to data release. These relate to<br />

indicators important for data release.<br />

This overview of the release of data for use within the education<br />

program provides an initial view to the barriers of data release as<br />

experienced by the various participating partners. In the following


section we will elaborate more on how these findings can impact<br />

open data policy on local level.<br />

6. LESSONS LEARNED<br />

First and foremost, the act of freeing up data is new to the services<br />

at the city council. This results in many questions by public<br />

servants about how data requests should be handled. Because<br />

there is, as of yet, no real framework in place to answer these<br />

questions, data release stumbles. However, beyond the fact that<br />

data professionals lack clear guidelines to support data release to<br />

external parties, there are some more fundamental issues<br />

concerned with data release.<br />

Due to the urgency of the education program, the most effort has<br />

also been on acquiring easy datasets, without prioritizing data<br />

according to demand. As a result, our inquiry reveals where data<br />

is most easily retrieved, but also, by virtue of not being easily<br />

accessible, what types of data needs further exploration. This<br />

revealed that the easiest data to technically and practically release<br />

was non-personal object data and especially due to the centralized<br />

data storage of such data.<br />

Below we will elaborate more in depth about the main lessons<br />

learned from the research.<br />

6.1 Nuanced Approach to Data Release<br />

While the municipality typically presents itself as one entity to the<br />

outside world, there is a much more complex organisational<br />

reality. Even though our focus had merely been on four services,<br />

the heterogeneous character of these services are immediately<br />

apparent. This ranges from the types of tasks conducted, such as<br />

servicing the public (Library), to developing policy (City<br />

Development). Additionally, while some of the services are<br />

involved with interacting with the public as a core task (City<br />

Archive), others focus more on maintaining objects in the public<br />

space. Our attempts at data release further emphasized this view.<br />

This complex picture effectively also means that these services<br />

deal with data in different ways. City Development, as a service<br />

that is primarily concerned with developing and executing policy,<br />

uses data for the creation of a product (such as a policy<br />

recommendation). The data itself in this context merely supports a<br />

task. As a result, data requested by the service remain unused,<br />

except for the times when it is being applied in policy<br />

development or creation of various products such as informational<br />

publications about the city.<br />

These processes of data usage thus impacts data release. Services<br />

where data is used and stored very centrally has shown to be much<br />

quicker in being able to release data, as the Library and City<br />

Works have shown. This does not take into effect the suitability of<br />

the data for release. The converse is true of City Development,<br />

where data is important, but where the emphasis is on the products<br />

that result from the data. Data storage is decentralized and<br />

ownership opaque, complicating data release.<br />

The suitability of PSI for release as open data also varies. Based<br />

on two factors, privacy sensitivity and copyright restrictions, we<br />

identify that internally produced data about public objects are the<br />

most suitable, while at the other end, Library data, which is partly<br />

bought from third parties and pertains to persons have a lower<br />

suitability.<br />

11<br />

Different barriers to data re-use apply. While only one service,<br />

City Development, has made explicit arrangements with regards<br />

to judicial matters, this service, as our interviews and data release<br />

shows, is not in a position to release data under a CC0 licence for<br />

reuse because of how it treats data.<br />

This too would be the case for data release by the City Archive. In<br />

the event that the Archive has a legal framework about data<br />

release it still might not possess the types of data that is easily<br />

released, due to physical limitations to what the archive can<br />

digitize, or financial restrictions. Conversely, the library can, and<br />

has, released data for re-use. However, this data is not widely<br />

reusable due to copyright, and the data that is not subject to<br />

copyright law can be sensitive to privacy.<br />

Given this, it seems that a nuanced view is needed to data release<br />

strategies on a local level, with all the implications this has for<br />

associated policy. Prior to formulating policy it remains important<br />

to look at how services deal with data storage by taking into<br />

account whether data is easily accessible, stored centrally, or<br />

available in digital formats and what the other financial, internal<br />

or judicial aspects might be.<br />

6.2 Data Release for its Own Sake<br />

The difficulties of data release, either as a result of technical<br />

issues, uncertain judicial frameworks, uncertain economic<br />

outcomes or simply not being able to find the data, means that<br />

data release can still be a costly, labour intensive activity. Our<br />

experience up until now has been that simply requesting “all” data<br />

yields no results.<br />

This means that choices are necessary to decide which data should<br />

be released. In reflecting back on the motivation behind PSI<br />

release, it is clear that the aim should not be merely the release of<br />

data for its own sake. Rather, the ambition of PSI release policy is<br />

to contribute to transparent government, innovation and increased<br />

public participation. This however, is easier said than done. The<br />

current state of affairs mean that to ensure efficient use of released<br />

data, it is important to consider the return on investment, not<br />

merely in a financial sense, but in the context of highest re-use<br />

achieved by datasets when compared to effort needed to realise its<br />

release. A more focused approach to data release has the potential<br />

to mitigate some of the problems identified earlier. For example,<br />

if finding the location of data is currently prohibiting release, as is<br />

indeed currently the case, a demand-based approach to data<br />

release might be applicable.<br />

To facilitate the release of data based on demand, it remains<br />

necessary to inform potential end users of the types of data<br />

currently controlled by a service or department. This is currently<br />

attempted within the department of Traffic and Mobility at City<br />

Development. Through our education program, students are given<br />

insight into the types of data that is regularly used at the<br />

department. Request for data can then be performed with much<br />

more focus and results of release, whether failure or success, can<br />

be documented. Through this, the demand is articulated and effort<br />

spent on data release yields quicker results.<br />

Additionally a stronger focus can be achieved without big<br />

investments into infrastructure: by exploring data release on a<br />

small scale, data is released with clearer end-goals, which also<br />

explicitly demonstrates the benefits of PSI.


6.3 Large Scale Implementation<br />

In relation to the heterogeneity of the separate public sector<br />

organizations and in combination with the transaction costs<br />

associated with data release we identify that the large-scale<br />

implementation of open data infrastructure is likely to encounter<br />

significant difficulties. First and foremost, such an<br />

implementation would be troublesome to achieve due to the<br />

inherent heterogeneity of the services as discussed earlier. For<br />

example, significant efforts would first need to take place to<br />

ensure efficient data release and due to the differences in place at<br />

the various services this process could be lengthy and costly. In<br />

our context, merely clearing the judicial hurdles for the four<br />

participating services in cases where data is deemed usable could<br />

slow down development significantly. Even more illustrative of<br />

this is the change needed in internal processes, as would be the<br />

case in organizations with very fragmented data storage.<br />

Furthermore, a large-scale implementation implicitly requires<br />

large amounts of data to be made available. As discussed above,<br />

even where there are judicial frameworks in place and data release<br />

is technically feasible, there are still transaction costs related to<br />

the release of data, such as locating datasets, or digitization. The<br />

resources needed to build op a large-scale infrastructure that could<br />

facilitate data release, might not be justified in relation to the<br />

uncertainty of the actual re-use of the data that is finally released.<br />

This holds especially true in a time when governments on local<br />

and national scale in industrialized countries are seeking to reduce<br />

expenditures.<br />

This sketches the conclusions of the research. In the following<br />

section we will reflect on how these barriers might be addressed<br />

in our own work.<br />

7. OUTLOOK<br />

This research up until now presents a complicated picture with<br />

regards to open data release. We believe that the appropriate way<br />

to deal with data release on the local level is to run small pilots<br />

and cases where there is a continual focus on data release where<br />

direct effects of the value of data can be illustrated. Below we will<br />

elaborate on a practical case that acts as driver for data release.<br />

The data thus far collected is restricted to the easiest to release<br />

information. While this provides insights into what the low<br />

hanging fruit are, it does not answer questions about data that is<br />

harder to release, and what changes the underlying processes will<br />

have to undergo to facilitate release. In order to get a fuller<br />

understanding of data release, more effort should be placed on<br />

harder to release data.<br />

To achieve this we have identified a portion inside the city that<br />

can act as city laboratory for open data. Named the 1km3, this is a<br />

space where an Open Data experiment is being conducted.<br />

Located in the centre of the city, the 1km3 encompasses a place<br />

where people live, shop, play and work. Within the confines of<br />

this area, the goal is to gather as much data as possible. The case<br />

acts to motivate participants by showing the role PSI is playing<br />

for the city and its potential for interaction between residents and<br />

local government. This should also highlight, in addition to the<br />

barriers to data release, the potential benefits that PSI can have on<br />

a local scale. Because the 1km3 is a limited area, a more focused<br />

approach can be taken. Additionally, the limited scope is<br />

appropriate to analyse the process of data release by local<br />

12<br />

authorities, allowing the research results to be applied on a<br />

broader scale.<br />

The results from the first exploratory phases of the project and the<br />

barriers introduced in Table 1 currently forms a basis from which<br />

stakeholders can attempt data release within their own<br />

department. Additionally, the results from the education program<br />

is assistive in illustrating data re-use in the municipality as a<br />

whole.<br />

In referring back to the PAR approach, this city lab provides<br />

conditions where stakeholders can actively play a role to explore<br />

efficient data release. Due to its small size, we can also focus on<br />

the barriers of individual services, whilst releasing data with<br />

explicit goals in mind. Such a pilot also precludes large<br />

information systems, but rather allows smaller explorations.<br />

8. CONCLUSION<br />

In this paper, we explored data release on a local level. For this<br />

purpose, we conduct interviews, workshops, questionnaires and<br />

desk research. Through this we identified underlying thresholds<br />

that inhibit data release, summarized in Section 5.1. Most<br />

importantly, we identified indicators for data release, seen in<br />

Table 1, based on our observations. These include the use of data<br />

within a service, where data is stored and the suitability of data for<br />

release. More studies could show whether there is a dependency<br />

between indicators. This could assist in focussing efforts of<br />

process change to best suit an organization, based on discovered<br />

themes.<br />

To realise the ambition of open data on a wide scale on local<br />

level, there needs to be more questions answered about data<br />

release. Clear examples are needed that illustrate the benefit of an<br />

open data policy to civil servants, on a small scale. Large ICT<br />

projects that attempt to solve all these problems in one attempt<br />

might, in the current financial climate, not feasible. The focus<br />

should be on using pilot projects that illustrate, on a local,<br />

measurable level, the potential impact of open data.<br />

9. ACKNOWELDGEMENTS<br />

We thank our colleagues of the Rotterdam University, both the<br />

researchers of the research lab Creating 010 and the teachers and<br />

students of the School of Communication, Media and Information<br />

Technology involved in the Rotterdam Open Data projects and the<br />

participants from the council of Rotterdam. Special thanks to<br />

Judith Lemmens. The work has been partly funded by the<br />

Rotterdam Media Commission and RAAK Publiek.<br />

10. REFERENCES<br />

[1] Bertino, E. and Sandhu, R. 2005. Database security -<br />

concepts, approaches, and challenges. IEEE.<br />

[2] Bertot, J.C., Jaeger, P.T. and Grimes, J.M. 2010. Using ICTs<br />

to create a culture of transparency: E-government and social<br />

media as openness and anti-corruption tools for societies.<br />

Government Information Quarterly. 27, 3 (Jul. 2010), 264–<br />

271.<br />

[3] Boulton, G., Rawlins, M., Vallance, P. and Walport, M.<br />

2011. Science as a public enterprise: the case for open data.<br />

The Lancet. 377, 9778 (2011), 1633–1635.


[4] Braak, S. van den, Choenni, R. and Verwer, S. Combining<br />

and Analyzing Judicial Databases. Discrimination and<br />

Privacy in the Information Society: Effects of Data Mining<br />

and Profiling Large Databases. Springer.<br />

[5] Broeders, D., Cijpers, C. and Prins, C., (eds) 2011. De Staat<br />

van Informatie. Wetenschappelijke Raad voor het<br />

Regeringsbeleid.<br />

[6] Chesler, M. 1991. Participatory action research with self-help<br />

groups: An alternative paradigm for inquiry and action.<br />

American Journal of Community Psychology. 19, 5 (Oct.<br />

1991), 757–68.<br />

[7] Choenni, S., Dijk, J. van and Leeuw, F. 2010. Preserving<br />

privacy whilst integrating data: Applied to criminal justice.<br />

Information Polity. 15, 1-2 (2010), 125–138.<br />

[8] Choenni, S. and Leertouwer, E. 2010. Public safety mashups<br />

to support policy makers. Proceedings of the First<br />

international conference on Electronic government and the<br />

information systems perspective. Springer-Verlag.<br />

[9] Creative Commons — CC0 1.0 Universal: 2011.<br />

http://creativecommons.org/publicdomain/zero/1.0/.<br />

Accessed: 2012-04-10.<br />

[10] Dekkers, M., Polman, F., Velde, R. te and Vries, M. de 2006.<br />

Mepsir: Measuring European Public Sector Information<br />

Resources.<br />

[11] European Commission 2003. Communication of the Re-use<br />

of Public Sector Information – Review of Directive<br />

2003/98/EC. Regulation.<br />

[12] Fitzgerald, B., Russo, N. and Stolterman, E. 2002.<br />

Information Systems Development: Methods-in-Action.<br />

McGraw-Hill Higher Education.<br />

[13] Hildebrandt, M. and Koops, B.-J. 2010. The Challenges of<br />

Ambient Law and Legal Protection in the Profiling Era.<br />

Modern Law Review. 73, 3 (2010), 428–460.<br />

[14] Hughes, J. 2003. Commentary: Participatory action research<br />

leads to sustainable school and community improvement’.<br />

School Psychology Review. 32, 1 (2003), 38–43.<br />

[15] Huijboom, N. and Broek, T.V.D. 2011. Open data: an<br />

international comparison of strategies. European Journal of<br />

ePractice. 12, April (2011), 1–13.<br />

[16] Kalidien, S., Choenni, S. and Meijer, R. 2010. Crime<br />

statistics online: potentials and challenges. Proceedings of<br />

the 11th Annual International Conference on Digital<br />

Government Research (2010), 131–137.<br />

[17] McLaren, R. and Waters, R. 2011. Governing Location<br />

Information in the UK. Cartographic Journal, The. 48, 3<br />

(2011), 7.<br />

13<br />

[18] Ohm, P. 2009. Broken Promises of Privacy: Responding to<br />

the Surprising Failure of Anonymization. Social Science<br />

Research Network. 57, 6 (2009), 1–64.<br />

[19] Open Data Enschede: 2012. http://opendata.enschede.nl/.<br />

Accessed: 2012-04-10.<br />

[20] Open data | Overheid.nl Open Data: 2012.<br />

https://data.overheid.nl/. Accessed: 2012-04-10.<br />

[21] Public data for all – opening up Europe’s public sector: 2011.<br />

http://blogs.ec.europa.eu/neelie-kroes/public-data-for-all-–opening-up-europes-public-sector/.<br />

Accessed: 2012-04-10.<br />

[22] Reiman, J. 2012. Driving to the Panopticon: A Philosophical<br />

Exploration of the Risks to Privacy Posed by the Highway<br />

Technology of the Future Santa Clara Symposium on Privacy<br />

and IVHS. Clara Computer &amp; High Technology. 11, 1<br />

(2012).<br />

[23] Schikhof, Y., Mulder, I.J. and Choenni, S. 2010. Who will<br />

watch (over) me? Humane monitoring in dementia care.<br />

International Journal of Human-Computer Studies. 68, 6<br />

(Jun. 2010), 410–422.<br />

[24] Transparency and Open Government | The White House:<br />

2009.<br />

http://www.whitehouse.gov/the_press_office/Transparency_a<br />

nd_Open_Government. Accessed: 2012-04-10.<br />

[25] Vries, M. de, Kapff, I., Achiaga, M.N., Wauters, A., Osimo,<br />

D., Foley, P., Szkuta, K., O’Connor, J. and Whitehouse, D.<br />

2011. POPSIS: Pricing Of Public Sector Information Study.<br />

[26] Warner, J. and Chun, S.A. 2008. A Citizen Privacy<br />

Protection Model for E-Government Mashup Services.<br />

Proceedings of the 2008 international conference on Digital<br />

government research (2008), 188–196.<br />

[27] Weiss, P. 2002. Borders in Cyberspace : Conflicting Public<br />

Sector Information Policies and their Economic Impacts.<br />

Federal Register. February 2002 (2002).<br />

[28] Whyte, W.F. 1989. Advancing scientific knowledge through<br />

participatory action research. Sociological Forum. 4, 3 (Sep.<br />

1989), 367–385.<br />

[29] Zuiderwijk, A., Janssen, M. and Choenni, S. 2012. Open<br />

Data Policies: Impediments and Challenges. 12th European<br />

Conf. On E-government, June 14-15 (Barcelona, Spain,<br />

2012), 794–80.<br />

[30] Zuiderwijk, A., Janssen, M., Meijer, R., Choenni, R.,<br />

Charalabidis, Y. and Jeffery, K. 2012. Issues and Guiding<br />

Principles for Opening Governmental Judicial Research<br />

Data. Proc. EGOV 2012, 11th European Conf. On Electronic<br />

Government, September 3 - 6, LNCS (Kristiansand, Norway,<br />

2012).


Implementation Framework for Open Data in Colombia<br />

Lydia Marleny Prieto<br />

IT Development Manager<br />

GEL Programme, Ministry of ICT<br />

Cr 8 12-00 Bogotá, Colombia<br />

+57 (1) 3442270 x1501<br />

lydia.prieto@<br />

gobiernoenlinea.gov.co<br />

ABSTRACT<br />

This document contains an executive summary of the Open Data<br />

strategy for Colombia represented in an open data model fit into<br />

the Government online strategy, which allows operating and<br />

managing the supply, as well as the demand, of public access data.<br />

Colombian Open Data Model has been made with the objective of<br />

supporting the generation of economic and social progress in the<br />

country, by allowing citizens and business to have access to<br />

public information, so that it can be used for developing<br />

government services that create value to society in general; and to<br />

promote transparency in the country, through information and<br />

data available to citizens and businesses.<br />

Categories and Subject Descriptors<br />

K.4. [Computers and Society]: Public Policy Issues<br />

General Terms<br />

Documentation, standardization, legal aspects, management<br />

Keywords<br />

Open data, open data strategy, open data model, online<br />

government, transparency, public data, support and operation.<br />

1. INTRODUCTION<br />

Information generated by public agencies can be considered as a<br />

public asset. According to the Colombian Constitution citizens<br />

have the right to access such information. The concept of open<br />

government data arises as part of the efforts made to structure<br />

information. Governments can have more effective<br />

administrations by means of being more transparent and by<br />

working on improving citizen’s quality of life.<br />

In Colombia, the e-government program has been implemented in<br />

a systematic and coordinated way in all public agencies. Starting<br />

in 2000 with Presidential Directive No. 02 [4], followed in 2008<br />

with Decree 1151 [3], a general framework for e-government<br />

strategy was defined. With the growth of the e-government<br />

strategy, from 2011, a new maturity model was developed, and<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Ana Carolina Rodríguez<br />

Research and Politics Manager<br />

GEL Programme, Ministry of ICT<br />

Cr 8 12-00 Bogotá, Colombia<br />

+57 (1) 3442270 x 1007<br />

ana.rodriguez@<br />

gobiernoenlinea.gov.co<br />

14<br />

Johanna Pimiento<br />

General Manager<br />

GEL Programme, Ministry of ICT<br />

Cr 8 12-00 Bogotá, Colombia<br />

+57 (1) 3442270 x 1500<br />

johanna.pimiento@<br />

gobiernoenlinea.gov.co<br />

new topics such as Open Government [2] and Open Data have<br />

been included in the file of topics to develop, by taking concrete<br />

actions.<br />

Article 230 of the National Development Plan 2010 - 2014,<br />

introduced this directive: "Government online as a strategy of<br />

good governance: All public agencies shall forward the actions<br />

identified by the national government through the Ministry of<br />

Information Technologies and Communications" [5].<br />

"Gobierno en Linea" (GEL) is the Colombian online strategy,<br />

led by a program with the same name, that contributes to<br />

developing a more efficient, transparent and participative<br />

government, which provides better services by means of ICT<br />

(http://www.gobiernoenlinea.gov.co). This strategy guides the<br />

delivery of online services by public agencies at both national and<br />

local levels.<br />

GEL strategy contributes to build an efficient, transparent and<br />

participative government which provides better services with the<br />

collaboration of the whole society through the use of information<br />

technologies in order to increase competitiveness and to improve<br />

the quality of life for the prosperity all throughout Colombia.<br />

Heading towards such objective, the open government data model<br />

for Colombia has been developed. International best practices,<br />

grounded on political and legal principles as well as technological,<br />

cultural, organizational and budgetary perspectives have been<br />

used to enable the publication of data by government agencies.<br />

The openness of information publicly available has been<br />

leveraged by citizens, academia, developer communities and<br />

agencies, along with some policy framework.<br />

Such work aims to introduce the open government data<br />

framework in Colombia, plus the strategic guidelines needed for<br />

its implementation. Chapters two and three describe the research<br />

methodology and the model design. In chapter four current results<br />

are described: a technical prototype for data and application<br />

catalogs implementation, a regulatory framework, and a road map<br />

to continue working until 2014. Lastly, conclusions and lessons<br />

learned are addressed.<br />

2. RESEARCH METHODOLOGY<br />

This research was developed combining a mix approach of<br />

quantitative and qualitative components. It focused on the<br />

construction of the information that would support the formulation<br />

of guidelines and regulations for the open data strategy in the<br />

Republic of Colombia.


In order to have elements of analysis to produce knowledge,<br />

experiences of other countries in the implementation of actions<br />

and policies of open data were studied. Focus groups led by<br />

experts on specific topics were carried out, as well as case studies<br />

were conducted in eight local national public institutions, mainly<br />

ministries and administrative departments.<br />

Case studies aimed to assess the implementation of the strategic<br />

framework along with the methodological and technological tools<br />

developed by GEL program. This analysis involved a catch effort<br />

through interpretation by the research team against focus groups<br />

and case studies.<br />

A benchmarking study including United Kingdom, Canada, USA,<br />

Australia, Spain and Chile open data models, helped to identify<br />

the main steps needed to develop the framework: a) definition of<br />

the objective situation; b) gap analysis between the objective<br />

situation and the current situation; c) definition of the necessary<br />

components for the model; d) definition of the proposed<br />

architecture for each of the perspectives; e) identification of<br />

elements and organizational structure, actors and components<br />

required to implement the initiative; f) identification of<br />

technological and regulatory elements; g) identification of sociocultural<br />

elements to cope with change; and h) identification of the<br />

mechanisms, actions and budgets required to implement the<br />

initiative.<br />

Through quantitative analysis, results of case studies were<br />

evaluated using surveys to officials of the organizations involved.<br />

Such surveys measured the quality of the concepts, content and<br />

language used in the proposed framework, which were studied<br />

through scales from 1 to 5. Concepts were transformed variables,<br />

identifying areas of improvement used for the formulation of the<br />

final version of the framework toolkit.<br />

3. OPEN DATA MODEL<br />

3.1 Objectives<br />

The open government data model in Colombia seeks to fulfill the<br />

following objectives:<br />

o Support the generation of economic and social progress in<br />

the country by allowing citizens and business to have access<br />

to public information, so that it can be used or transformed<br />

for developing government services that create value to<br />

society in general.<br />

o Promote transparency in the country by means of information<br />

available to citizens and businesses.<br />

3.2 Principles<br />

Taking into account the objectives, the expectations of the<br />

Colombian Government, and the best practices identified, the<br />

following are the fundamental principles for open government<br />

data, illustrated in Figure 1. Basic principles are grouped into<br />

four perspectives: politic and legal, socio-cultural, organizational<br />

and budgetary, and technological.<br />

Politic and legal principles guide the policies handling political<br />

and legal efforts, and establish responsibilities and competences<br />

for its enforcement; sociocultural principles lead strategies, tools<br />

and actions necessary for the promotion and appropriation of good<br />

practices, and guidelines for policy massification by public bodies<br />

and third party application developers; Organizational principles<br />

give directives in policies, business processes, competencies,<br />

roles, organizational structures and resources required to<br />

15<br />

implement the initiative in public administration; and<br />

technological principles guide the definition of protocols,<br />

standards, tools and methodological guidelines necessary to<br />

implement the strategy.<br />

Socio-cultural principles<br />

§� Pursue balance between supply and demand.<br />

§� Seek for support from software development<br />

communities, private companies and<br />

academia.<br />

§� Promote of interaction and feedback from<br />

citizens and businesses about the relevance,<br />

quality and timeliness of published data.<br />

§� Focus on the satisfaction level of citizens,<br />

businesses, the public and the media.<br />

Strategic lines<br />

and<br />

fundamental<br />

principles<br />

Politic and legal principles<br />

§� Support from all levels of government.<br />

§� Phase out restrictions that limit access and use of<br />

public information (such as payments or licenses).<br />

§� Legal establishment of responsibilities and<br />

competencies.<br />

§� Progressive coverage of the initiative, for all<br />

branches of government and private agencies<br />

exercising public functions.<br />

§� Agencies responsible and autonomously publishing,<br />

hosting, maintaining and updating data<br />

§� Support from a legal system that integrates open<br />

data guidelines and policies.<br />

Organizational and budgetary principles Technological principles<br />

§� Leadership, control and monitoring of the<br />

implementation strategy from the central level.<br />

§� Encouraging and supporting generation of local<br />

and thematic initiatives.<br />

§� Considered a common practice throughout<br />

public agencies.<br />

§� Supported by a sustainable budget.<br />

§� Aligned with e-government GEL maturity model.<br />

§� Encouraging quality of data being published.<br />

§� Data easily found by others at a central point.<br />

§� One main data catalog for the country and<br />

multiple synchronized federate catalogs at local<br />

and thematic levels.<br />

§� When possible, government should guarantee the<br />

authenticity of published data.<br />

§� Multiple publication mechanisms to suit the<br />

conditions of the different public agencies.<br />

Figure 1. Fundamental principles for open government data<br />

3.3 Model components<br />

Based on the principles outlined before, Colombian open<br />

government data model has been structured. It was organized for<br />

describing the elements that should be considered at the strategic,<br />

tactical, operational and support levels, as displayed in Figure 2.<br />

This model seeks to generate value-added services to society<br />

through the development of applications made by third parties<br />

(development communities, infomediaries industry, and<br />

academia), using open government data from public agencies.<br />

The elements associated with the model are described below.<br />

3.3.1. Strategic Elements<br />

Strategic elements describe the articulation that must exist<br />

between the proposed open data strategy and the general GEL<br />

strategy. It contributes to the achievement of GEL vision under<br />

the following considerations:<br />

1) Facilitate the efficiency and collaboration within and<br />

between state agencies as well as society as a whole.<br />

2) Strengthen the conditions for increasing competitiveness and<br />

improving the quality of life.<br />

3) Contribute to increase transparency in public administration.<br />

4) Promote citizen participation using electronic media.<br />

3.3.2. Tactical Elements<br />

Tactical elements sought to link operational and strategic<br />

components. For materializing this, an element of institutional<br />

articulation and public policy was formulated through which the<br />

responsibilities and powers of each of those involved in the open<br />

government data initiative in Colombia were defined. Three main<br />

indicators that allow the monitoring and continuous evaluation of<br />

the open data initiative were defined:<br />

1) Compliance: Monitoring the level of compliance of open<br />

data policies and regulations by government agencies,<br />

through the criteria defined in GEL manual.


2) Usage: Assessed by quantifying the use of published data,<br />

taking into account feedback provided by users.<br />

3) Impact: Evaluated considering the applications that had been<br />

built using published data.<br />

Evaluation<br />

Strategic<br />

Tactic<br />

Operational<br />

Support<br />

Open Data Offer<br />

Preparation<br />

Identification<br />

Analysis and Prioritization<br />

Documentation<br />

Structuration, uploading and publishing<br />

Promotion and follow up<br />

Access and use of<br />

information and data<br />

Legal and regulation<br />

Information and<br />

data publishing<br />

Open Data Objectives and alignment with GEL<br />

strategy<br />

Institutional and public policy articulation<br />

Publishing<br />

responsibility<br />

Responsibility of<br />

information /data<br />

access and use<br />

Continued<br />

Feedback<br />

Culture<br />

Strengthening<br />

Publishing<br />

management<br />

Demand and value-added<br />

services generation<br />

Demand identification<br />

Published data access<br />

Applications development<br />

and registration<br />

Processes<br />

Support and<br />

maintaining<br />

Technology<br />

Non-functional<br />

Conceptual model<br />

requirements<br />

Monitoring<br />

Services<br />

consumption<br />

Citizens<br />

Sectors, unions,<br />

NOGs<br />

Stekeholders<br />

GEL Developers,<br />

Infomediary<br />

Agencies<br />

Academy Allies<br />

Figure 2. Open Government Data Model for Colombia<br />

3.3.3. Operational Elements<br />

Operating elements are those which bear with the “day to day”<br />

implementation of the open data model. These elements are solely<br />

responsible for promoting the provision of open government data,<br />

the generation of services around them and the balance between<br />

supply and demand through continuous public feedback and<br />

reinforcement of cultural strategies.<br />

Data supply is the backbone of the operation by which<br />

information is published by public agencies (and private<br />

companies with public functions) at national and local levels in<br />

structured and reusable formats under defined quality parameters.<br />

The demand for data that supports the operation allows<br />

identifying the needs that users have of open data and the<br />

requirements of added value services needed by citizens and<br />

companies.<br />

3.3.4. Support Elements<br />

Support elements include the legal and regulatory framework,<br />

business processes and technological components.<br />

Legal framework establishes determination and the institutional<br />

mandate not only to formulate an open data policy, but also to<br />

implement that policy across the government, including the legal<br />

mechanism that establishes the fundamental principles, rights and<br />

obligations related to open government data. It focuses on four<br />

pillars: access to and use of information; publication of<br />

information; responsibility for publication; and responsibility for<br />

access and use of information.<br />

Technological framework comprises: a conceptual view that<br />

illustrates the different functional modules; a logical view that<br />

identifies the principal components of the required software<br />

structured by means of a layered architecture in which the external<br />

resources, the integration components, the presentation<br />

components, the business logics and the transversal and support<br />

components are identified; and a deployment view that identifies<br />

the possible physical distribution of the technical infrastructure<br />

components and some non-functional requirements identified as<br />

quality attributes of the required platform.<br />

16<br />

For the correct operation of the proposed model, two activities to<br />

support initiative processes were created: release management, for<br />

accompaniment of the implementation, and support and<br />

maintenance, a process including management of the catalog data<br />

portal, plus the promotion and distribution of data dissemination<br />

and application development.<br />

3.4 Road Map<br />

The road map proposed for the implementation on the open data<br />

initiative in Colombia comprises an incremental strategy that is<br />

aligned with GEL maturity model [9]:<br />

The initial level refers to having the institutional conditions that<br />

are necessary to establish open data. At this level some public<br />

agencies start publishing their information inventory, best<br />

practices are shared and an intra-governmental community of<br />

open data advocates starts to be created.<br />

At the basic level, all data sets are prioritized, collaborative<br />

focused events are performed, and feedback from citizens and<br />

organizations start to be significant.<br />

At the advanced level, the open data process has moved beyond<br />

the simple fulfillment of baseline requirements. Impact<br />

measurement, quality assurance, collaboration platforms and<br />

massive collaborative events will be performed.<br />

The maximum level will be reached with continuous processes of<br />

innovation, transparency, and public/private cooperation.<br />

Sustainability of the best applications is reached, key performance<br />

indicators are monitored and the use of semantic components is<br />

achieved [1].<br />

3.5 User Guidelines<br />

A guide for public servants interested in easily acquiring open<br />

data knowledge and a toolkit were developed. It was structured in<br />

five stages of an ongoing process that guide them to publish data<br />

in open formats:<br />

o Identification of information: At this stage the identification<br />

and characterization of all the information held by entities is<br />

performed.<br />

o Analysis of publishable information: At this phase<br />

o<br />

information is classified by filtering what is publishable from<br />

what it is not, according to legal framework policies.<br />

Prioritization of data: This phase organizes the data that<br />

needs to be published according to a strategic analysis which<br />

generates the inventory and working plan of public data to be<br />

published.<br />

o Documentation: This phase fully describes data to be<br />

published, producing useful metadata to make it<br />

o<br />

understandable and easy to find and use.<br />

Structuring, upload and publishing: This phase performs the<br />

preparation of data in open formats, and the execution of<br />

ETL processes to load and release data on the technology<br />

platform for subsequent open access.<br />

3.6 Government data and application catalogs<br />

The primary tool for data supply is the Colombian Government<br />

data catalog prototype available at http://www.datos.gov.co, a<br />

web portal that allows citizens and enterprises to centralize search<br />

and access to all public data – illustrated in Figure 3. This<br />

platform meets two goals: 1) It should make it as easy as possible<br />

for citizens – especially developers—to discover interesting


datasets and to reuse them. 2) It should make it as easy as possible<br />

for government data stewards to make their datasets available for<br />

public consumption. As a pilot case study, nine datasets provided<br />

by national agencies including Transport, ICT and Education<br />

Ministries, Planning Department were identified and published.<br />

Data supply involved the development of a prototype of an online<br />

government operated clearinghouse for publishing third party<br />

applications using open government data, now available at<br />

http://ww.aplicaciones.gov.co. This tool allows third party agents<br />

(volunteers, civil society groups, government itself) to upload<br />

apps, and citizens to search and download apps that provide<br />

government services, using open published datasets.<br />

3.7 Legal Framework<br />

Definitions and actions associated with open data strategy in<br />

national regulations were absent and needed to be developed in<br />

order to implement the mandatory compliance of the model by<br />

public agencies in Colombia. In this sense the inclusion of a law,<br />

a draft decree and two manuals guiding public policy are being<br />

prepared.<br />

National Open Data<br />

Plataform<br />

Citizens<br />

Local and<br />

Thematic Open<br />

Data Platforms<br />

GEL Storage<br />

Datasets<br />

www.datos.gov.co<br />

National Open<br />

Data Catalog<br />

Data load website<br />

www.datosentidad.gov.co<br />

Federated<br />

Storage<br />

Datasets<br />

Federated<br />

Open Data<br />

Platform<br />

Agency Data<br />

Base National, thematic and local web sites<br />

Figure 3. Open Government data platform<br />

First, the draft "Law on Transparency and the Right to Access<br />

National Public Information" [9], included the enforcement for<br />

agencies to allow access to and use of public information, rules<br />

for information publication, accountability in the publication, and<br />

responsibility in access to and use of information.<br />

Second, the draft "Decree for establishing general guidelines<br />

for GEL strategy for the Republic of Colombia" [7],<br />

establishes the open data strategy as one of the priorities for the<br />

country, and identifies the rules for the disposal of information<br />

from public institutions to citizens, free of charge.<br />

Third, the matter of open data was incorporated into the<br />

guidelines contained in the "Manual for the Implementation of<br />

GEL strategy in Colombia" [8], as well as in the "Unique<br />

Manual of Accountability" [6], as mechanisms to promote<br />

openness, transparency and accountability in the Colombian<br />

Government.<br />

4. DISCUSSION & CONCLUSIONS<br />

Open data model developed by GEL provides a framework for<br />

data opening in a structured and organized manner, establishing<br />

balance and sustainability between supply and demand of data,<br />

and outlining a clear route for accomplishing a transparent,<br />

participative and collaborative strategy. Added value must be<br />

obtained from solutions that solve citizens’ needs and agencies<br />

required services for them.<br />

17<br />

At the moment, results from Colombian open government data<br />

initiative are still incipient. Complexity perceived by public<br />

agencies regarding the openness process is one of the main<br />

barriers for the model implementation. Agencies face diverse<br />

problems when trying to comply with the model. Those problems<br />

are mainly related to human behavior and fright to change: fear of<br />

losing control over data, lack of legal responsibility for<br />

publishing, and concern and distrust of third parties that would<br />

market or use the information to publish, summarize the main<br />

concerns.<br />

Currently GEL open data team is working on improving the<br />

technological platform, optimizing the existing instruments,<br />

defining the uptake model, setting the initial legal framework and<br />

developing training campaigns to disseminate the strategy.<br />

In the near future some actions need to be included in the work<br />

agenda: quick gathering of data to be published that can be easily<br />

identified, such as data from national research statistics, already<br />

published at web portals; engage citizens themselves in the<br />

decisions about what data to publish; creation of open channels<br />

for developers to provide information about the use and impact of<br />

the data; and the design of an environment that gives developers<br />

the flexibility to use a full range of software tools to manipulate,<br />

and to add value to, government information, among others.<br />

5. ACKNOWLEDGMENTS<br />

This research was performed in the framework of the Inter-<br />

Administrative Cooperation Agreement No. 308-2011, subscribed<br />

between “Fondo de Tecnologías de la Información - FONTIC and<br />

Centro de Investigación de las Telecomunicaciones – CINTEL”,<br />

with participation of “Everys Colombia” in its development.<br />

6. REFERENCES<br />

[1] Cantera Fonseca, J. M., Hierro Sureda, J. J. and Romo<br />

Zabala, P.A. Web semántica: Tecnologías y arquitectura.<br />

Revista Comunicaciones de Telefónica I+D. ISSN 1130-<br />

4693, Nº. 39, 2006, 211-221.<br />

[2] Corojan, A. and Campos, Eva. Gobierno abierto: alcance e<br />

implicaciones. Fundación Ideas. ISBN: 978-84-15018-73-5.<br />

2011.<br />

[3] Decreto 1151 de 2008. Ministerio de Comunicaciones de la<br />

República de Colombia. Diario Oficial No. 46.960 de 14 de<br />

abril de 2008.<br />

[4] Directiva Presidencial No. 02 de 2000: Gobierno en Línea<br />

del 28 de Agosto de 2008<br />

[5] Ley 1450 de 2011. Por la cual se expide el Plan Nacional de<br />

Desarrollo, 2010-2014. Congreso de la República de<br />

Colombia. Diario Oficial No. 48.102 de 16 de junio de 2011.<br />

[6] Manual Único de Rendición de Cuentas. Proyecto de ley<br />

estatutaria no. 133/11 cámara– Por la cual se desarrollan<br />

disposiciones para la promoción, protección y garantía del<br />

derecho a la participación ciudadana en Colombia<br />

[7] Proyecto de Decreto para establecer los lineamientos de la<br />

Estrategia Gobierno en Línea para la República de Colombia.<br />

2012.<br />

[8] Programa Agenda de Conectividad – Estrategia de Gobierno<br />

en línea. Manual 3.0 para la Implementación de la<br />

Estrategia de Gobierno en Línea en las entidades del orden<br />

nacional de la República de Colombia. Junio 2011.<br />

[9] Proyecto de Ley 156 de 2011 Senado, 228 de 2012 Cámara.<br />

Por medio de la cual se crea la ley de transparencia y del<br />

derecho de acceso a la información pública nacional y se<br />

dictan otras disposiciones. 2011.


Increasing Kenyan Open Data Consumption: A Design<br />

Thinking Approach<br />

Leonida N. Mutuku<br />

iHub Research<br />

Bishop Magua Centre, Ngong Road<br />

P.O. Box 58275 – 00200 Nairobi<br />

+254 732792987<br />

leo@ihub.co.ke<br />

ABSTRACT<br />

In July 2011, the Kenyan Government became the twenty-second<br />

government worldwide and the second in Africa to release many<br />

of its data sets in an open and reusable format on the Open Kenya<br />

portal. This open data portal has presented great opportunities to<br />

develop applications, especially on the mobile platform. There<br />

have been, however, challenges in engaging the technical and<br />

industry experts in conversations around the open data. We are<br />

conducting an ethnographic study on an experiment that brings<br />

together subject matter experts in the Water, Education,<br />

Transport, and Local County sectors, together with open data<br />

evangelists and software developers to guide them through a<br />

design thinking approach to identifying, idea-ting, and<br />

prototyping open data applications. The main objective of this<br />

study is to identify best practices in increasing open data<br />

consumption through scalable mass appeal mobilization and civic<br />

engagement tools and applications.<br />

Categories and Subject Descriptors<br />

A.1 [General Literature]: General – Conference Proceedings<br />

General Terms<br />

Documentation, Design<br />

Keywords<br />

Kenya, Open Data, Design Thinking, Ethnography<br />

1. INTRODUCTION<br />

Over the past couple of years, various governments and public<br />

institutions have launched numerous initiatives to make their data<br />

sets open. Open data is data that is freely accessible, easily<br />

redistributed and reused [8]. The US Government and the World<br />

Bank were among the first of these institutions to release, in 2009,<br />

numerous data sets in an open format for access by all.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

18<br />

Jessica Colaco<br />

iHub Research<br />

Bishop Magua Centre, Ngong Road<br />

P.O. Box 58275 – 00200 Nairobi<br />

+254 735203733<br />

jessica@ihub.co.ke<br />

Since then, we have seen more than 20 governments and other<br />

major institutions around the world release their data, in a bid to<br />

democratize this public information by making it accessible to all<br />

citizens; and to promote innovation of local solutions to socioeconomic<br />

development issues that afflict the respective countries<br />

[13]. By providing this public information to citizens, the<br />

governments empower them to query this data and in this way<br />

promote accountability, transparency and innovation in service<br />

delivery.<br />

2. THE KENYA OPEN DATA INITIATIVE<br />

In July 2011, the Kenyan Government became the twenty-second<br />

country worldwide and the second in Africa [16] to release many<br />

of its data sets in an open and reusable format on the Open Kenya<br />

[13] portal. The Vision given for this initiative is that “with the<br />

launch of Open Kenya, Africa will have its own story of<br />

promoting transparency through open data to celebrate, learn from<br />

and share” [13]. At the launch of the portal, there were over 400<br />

data sets released to the public in easily manipulated formats.<br />

2.1 Potential of the Open Data Initiative<br />

The Kenya Open Data Initiative enables Kenyans to interact with<br />

government data at different levels and use this information to<br />

engage [11] further with the government in accordance with the<br />

new Constitution’s provisions on access to information [14]. The<br />

government has released many more large data sets since the<br />

launch of the portal, ranging from national census data to statistics<br />

on government spending at national and county level [9].<br />

Various opportunities to develop applications that use the newly<br />

available open data as a basis to represent information have<br />

emerged. Over 90 dataset requests surfaced within the first month<br />

of the launch by developers and other stakeholders, which<br />

indicates a great interest to explore this data in meaningful ways<br />

and represent it visually, while providing useful insights into the<br />

information that lies within this data.<br />

This opportunity could be explored further in the mobile space to<br />

create mobile open data applications. With over 99% of users that<br />

access Internet in Kenya doing so through their mobile phones,<br />

[4] a much faster and more efficient tool to disseminate open data<br />

information to citizens may be through mobiles. It is therefore<br />

worth considering mobile applications as an important<br />

dissemination method of open data information [9].


Giving Kenya’s citizens greater access to government data<br />

enables communities to mobilize and demand better services<br />

based on evidence provided by open data. [1]<br />

2.2 Importance of Open Data to Governance<br />

Through continuous interaction and providing feedback on the<br />

platform and its data sets, in the long term, open data promotes<br />

not only transparency and accountability, but also democracy. As<br />

previously highlighted, improved service delivery will be<br />

promoted by the feedback loops that arise through frequent<br />

querying of the open data by both citizens and government<br />

agencies. For example, the resource allocations and government<br />

expenditures could be queried and insights obtained by analyzing<br />

the open data accessed. In this manner, open data will allow for a<br />

paradigm shift from a centralized governance model to a citizencentric<br />

governance model.<br />

The government realizes these important values of the open data<br />

platform and has been a strong advocate for the platform,<br />

evangelizing about its potential and benefits at various events and<br />

public functions. In return, many developers and journalists have<br />

embraced the Open Data Portal with a number of applications that<br />

query the database being developed. Examples of such<br />

applications include: Huduma [10], MsemaKweli [12],<br />

CountyScoreCard [5] and CDF Review [3]. Further, the<br />

government has promoted interaction with these data sets by<br />

providing grants of up to $30,000 for the development of<br />

applications based on open data. [6]<br />

The World Bank has also been instrumental in the education and<br />

awareness campaigns on the importance and opportunities of the<br />

open data portal by sending in their own open data evangelists and<br />

members of the finances’ open data team to officiate at boot<br />

camps with a focus on data journalism and open data<br />

visualization.<br />

Despite these numerous efforts, the potential of the open data<br />

portal has only barely been realized.<br />

3. OPEN DATA CONSUMPTION<br />

3.1 Open Data Evangelism<br />

The openness of the platform is subject to interpretation because,<br />

though the data sets are available online, this does not necessarily<br />

translate to the data being available to all Kenyan citizens. This is<br />

because currently, the data is only available on a web or mobilebased<br />

portal. Less-educated citizens may not be comfortable<br />

accessing information through the Internet or mobile phones.<br />

Alternatively, the less educated citizens may not be Englishliterate.<br />

These less educated citizens may be the users who have<br />

the most need for the open data information. Therefore, for the<br />

portal to be a success, citizens, end users, and beneficiaries must<br />

be made aware of what information lies on the data platform and<br />

its relevance and usefulness. This awareness can be raised through<br />

direct interpretation of the data on the portal, but perhaps more<br />

importantly, from easily-digestible information created by<br />

intermediary parties from analysis and visualization of the open<br />

data.<br />

These intermediary parties essentially interact directly with the<br />

platform creating applications based on the data. To reap<br />

maximum benefits from the open data sets, the applications<br />

19<br />

created must address real needs and not just be fancy visuals with<br />

no real value behind them.<br />

Despite the many efforts discussed above, there has been no real<br />

measurable engagement of industry and sector experts in these<br />

open data conversations to date. These are important stakeholders<br />

when it comes to formulate problem statements based on these<br />

data sets and advice on the solution development [2]. While<br />

software developers may create great visualization tools, great<br />

value is derived from their engagement with industry experts who<br />

together, will assist to build necessary service to serve the likes of<br />

those who will not readily accept or understand the data on the<br />

platform.<br />

Figure 1: How different stakeholders engage with<br />

opendata.go.ke<br />

There is a need to bridge the gap between those who can make<br />

sense of the data sets and interpret the seemingly random numbers<br />

to software developers, in a manner that can then be easily<br />

adapted and captured in innovative useful products and<br />

applications. This research aims to test the hypothesis that the<br />

realization of the full potential of open data will be achieved when<br />

easily interpretable open data products are made for the general<br />

public, the final end user of these data sets.<br />

3.2 Design Thinking Approach<br />

3.2.1 The Open Data Pre-Incubator<br />

We are currently carrying out this research study around a sixmonth<br />

experiment, a pre-incubator, which aims to accelerate the<br />

ability for the public to make sense of open data in order to<br />

increase their engagement around critical public issues: in the<br />

sectors of Water, Education, Transport, and Local Counties. The<br />

Pre-incubator experiment will test a model that will be put to use<br />

in a broader two-year Incubator effort, endorsed and supported by<br />

the highest levels of government, which will be led by public<br />

mobilization agents with support from the technological<br />

community.<br />

In this Pre-Incubator, four Open Data Fellows have been<br />

embedded in civil society and media organizations and are<br />

working to build an application or service or platform around key<br />

thematic issues. These host organizations and fellows are<br />

conducting a close consultation process with issue expert working<br />

groups who provide insight into specific use cases and technical


insight into available data resources. The specific outcomes of this<br />

experiment are the creation of analytical dashboards and data tool<br />

kits for knowledge professionals; and the creation of mass appeal<br />

mobilizations applications/platforms for civic engagement.<br />

The multi-stakeholder groups will then follow a Design Thinking<br />

approach to ideate the solutions and create meaningful and useful<br />

applications based on these insights from the data. This will be<br />

done in five steps, following concepts derived from the Stanford<br />

D. School Design Thinking methodologies [15], namely:<br />

o Empathizing - observing, engaging, and immersing the<br />

developers and subject matter experts together so as to<br />

understand the needs of the general citizens. This will take<br />

place in a workshop where there will be brainstorm sessions<br />

around four thematic areas: Water, Education, Transport and<br />

Local County Data.<br />

o Defining -Problem statements will be formulated by the<br />

fellows and the working groups formed. These problem<br />

statements will be based on the synthesis of the empathy<br />

findings in terms of compelling needs and insights, scoping<br />

specific and meaningful challenges to solve. This will take<br />

place in another workshop where a number of projects will<br />

be selected with which to proceed.<br />

o Idea-ting - This will be done around the numerous problem<br />

statements and go further into strengthening solutions for the<br />

selected projects. The idea-tion will be supported by a boot<br />

camp where an initial prototype will be designed to be built<br />

in selected teams. This event will also have a public outreach<br />

component to help educate researchers and the broader<br />

public about the use of open data.<br />

o Prototyping and testing - The actual prototyping will then<br />

follow where all the ideas generated are actualized as<br />

applications and technology services to address the problems<br />

identified to be solved using open data. This step will involve<br />

different levels of prototyping and showcasing demos of the<br />

published data applications.<br />

3.2.1.1 The Research Process<br />

The specific objectives of the research are to:<br />

1) Document the Open Data Outreach process in order for it to<br />

be replicable in other communities and countries<br />

2) Use evaluation mechanisms of the design thinking approach<br />

and the documentation to understand how to make the Open<br />

Data Outreach initiative sustainable and scalable.<br />

This research is being conducted as an intense study that involves<br />

active participation and observation in the entire process of ideation<br />

and development of the open data applications through the<br />

pre-incubator model. Specifically, the study is using ethnographic<br />

models in order to fully understand this pre-incubator model in the<br />

development of open data applications, and uncover new and<br />

consequential variables [7] to consider in the construction of the<br />

larger incubator model.<br />

This research includes an exploratory survey and initial literature<br />

review to help determine scope of the project and verifiable<br />

metrics for success to aid in this evaluation and analyze the<br />

replicability of the open data pre-incubation process so as to<br />

provide targeted recommendations for scaling up the initiative.<br />

These have been identified so far, at a high level, as the successful<br />

20<br />

development of open data applications that will be scaled in the<br />

region or continent of Africa; and the creation of an ecosystem at<br />

the grass root level (the communities) around open data, through<br />

the use of these applications.<br />

The research will continue to review the documentation of event<br />

<strong>proceedings</strong> and activities related to the process as well as<br />

qualitative research conducted through ethnographic observation<br />

and participatory approach, in-depth interviews and audience<br />

analysis.<br />

The documents of the process of building and running the open<br />

data pre-incubator will then be critically analyzed and used to<br />

deliver use cases and recommendations that can be used for<br />

actionable planning in a larger incubator model. This may call for<br />

a review strategy for sustaining such open data incubator model<br />

by analyzing successes, weaknesses, opportunities & challenges<br />

for making this data more ‘mainstream’.<br />

The findings will then be presented at the end of the experiment as<br />

use cases, recommendations, tool kits and a critical analysis of the<br />

process that can be used for actionable planning of a similar open<br />

data consumption product.<br />

Overall, the specific goals of the Pre-Incubator process are to<br />

create one app or service or platform that used at scale across<br />

Kenyan society and drastically increases the use of open data and<br />

the research will support this further by the recommendations<br />

delivered for a sustainable and scalable model.<br />

4. CONCLUSIONS<br />

This project will contribute in creating a knowledge community<br />

on this open data of experts and non-experts alike and spurring<br />

conversations around this open data. The research process will not<br />

only inform the underlying project, the pre-incubation model, but<br />

hopes to raise new questions on how further to promote<br />

engagement of the ordinary citizen with their government through<br />

the usage of other mass appeal applications. This research hopes<br />

to come up with an effective sustainable toolkit on how subject<br />

experts and developers can interact with the Open Kenya portal<br />

and in collaboration, build tools and services around the datasets<br />

that can benefit all citizens in spite of their literacy levels with<br />

regards to the platform.<br />

As we embrace new ideas of living, applications revolving around<br />

various sectors like Water, Education and Health will go a long<br />

way to assist the country in transitioning to more citizen<br />

engagement and efficient service delivery. Consequently, this will<br />

lead to identification of proper open data innovations that solve<br />

real problems within the society and essentially assist in achieving<br />

the objectives with regards to the release of open data.<br />

5. REFERENCES<br />

[1] Beeman, H. 2011. Uses for open data<br />

http://hadleybeeman.net/2011/01/26/uses-for-open-data/<br />

Accessed August 2012<br />

[2] Business Daily, Government portal must have the required<br />

impact, 2011<br />

http://www.businessdailyafrica.com/Opinion+++Analysis/G<br />

overnment+portal+must+have+the+required+impact/-<br />

/539548/1199730/-/10sesc1/-/index.html Accessed in April<br />

2012


[3] CDF Review website, http://cdfreview.on.co.ke/ Accessed in<br />

April 2012<br />

[4] CCK Quarterly Sector Statistics Report. 2012, 19<br />

http://www.cck.go.ke/resc/downloads/SECTOR_STATISTI<br />

CS_REPORT_Q1_11-12.pdf<br />

[5] CountyScoreCard website, http://countyscorecard.on.co.ke/<br />

Accessed in April 2012<br />

[6] Daily nation. Kenya frees Government data on the internet,<br />

2011. http://www.nation.co.ke/sports/-/1090/1196768/-<br />

/item/0/-/bdooo5z/-/index.html Accessed in April 2012<br />

[7] Genzuk M, PH.D. A Synthesis Of Ethnographic Research,<br />

Center for Multilingual, Multicultural Research, University<br />

of Southern California. 1999.<br />

[8] Halonen, A. Being Open About Data. Finnish Institute in<br />

London, London, 2012<br />

[9] Howard, A. Open government data to fuel Kenya's app<br />

economy, 2011,http://radar.oreilly.com/2011/07/open-kenyagovernment-data.html<br />

Accessed in April 2012<br />

[10] Huduma Website, http://huduma.info/ Accessed in April<br />

2012<br />

21<br />

[11] Madera, C. 2010 Solving Urban Challenges With Open Data<br />

http://americancity.org/daily/entry/solving-urban-challengeswith-open-data<br />

Accessed in August 2012<br />

[12] MsemaKweli website,<br />

http://msemakweli.ihub.co.ke/pages/home.php Accessed in<br />

April 2012<br />

[13] Open Kenya Portal. https://opendata.go.ke/ Accessed in<br />

April 2012<br />

[14] Rahemtulla, H., Kaplan, J., Gigler, B., Cluster, S., Kless, J.<br />

and Brigham, C. Open Data Kenya: Case Study of the<br />

Underlying Drivers, Principal Objectives and Evolution of<br />

One of the First Open Data Initiatives in Africa. Open<br />

Development Technology Alliance, 2011.<br />

[15] Stanford D. School, Design Thinking<br />

http://dschool.stanford.edu/use-our-methods/ , Accessed in<br />

April 2012<br />

[16] Were, D. Ushahidi Welcomes Kenya Open Data Initiative.<br />

http://blog.ushahidi.com/index.php/2011/07/12/ushahidiwelcomes-kenya-open-data-initiative/<br />

accessed in April 2011


New Perspectives for Electronic Government in Brazil:<br />

The Adoption of Open Government Data in National and<br />

Subnational Governments of Brazil<br />

Ricardo Matheus<br />

University of São Paulo<br />

ricardomatheus@gmail.com<br />

ABSTRACT<br />

The development of information and communication technologies<br />

(ICTs) enabled production of bases containing raw data which can<br />

be freely manipulated, filtered or being crossed to build new<br />

applications. These possibilities of using this raw data and its<br />

manipulation have been called Open Government Data (OGD).<br />

The aim of this paper is to present the State of Art of the Open<br />

Government Data in Brazilian National, State and Municipal<br />

governments. Some benefits that OGD have been promoted are:<br />

transparency promotion, and, improvements of social control and<br />

citizen participation. The methodology used is the literature<br />

review mainly about concepts of Open Government Data and<br />

three case studies about Brazilian governmental initiatives of<br />

OGD Portals. It was conducted an exploratory study of Brazilian<br />

initiatives National and Subnational governments that aims to<br />

verify the Brazilian level of OGD based on the eight principles of<br />

OGD and the five stars of open linked data, the last one was<br />

created by Tim Berners-Lee to measure the level of open data in<br />

websites. The final considerations reveal Brazilian initiatives<br />

adopt almost the entire principles of OGD. Further, the initiatives<br />

are in the third stage of a completely open linked data (three<br />

stars).<br />

Categories and Subject Descriptors<br />

J.1 [Computer Applications]: Administrative Data Processing –<br />

Government<br />

General Terms<br />

Management, Theory<br />

Keywords<br />

Electronic Government; Transparency; Social Control; Citizen<br />

Participation; Open Government Data<br />

1. INTRODUCTION<br />

Recently, the Information and communications technology (ICT)<br />

development have been bringing new possibilities for promotion<br />

of transparency and availability of public data, mainly through the<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Manuella Maia Ribeiro<br />

Fundação Getúlio Vargas<br />

maiamanuella@gmail.com<br />

22<br />

José Carlos Vaz<br />

University of São Paulo<br />

vaz@usp.br<br />

internet. Through ICTs the promotion of transparency has been<br />

increased because ICTs allowed an easier ambient to access data<br />

and information of public information from governments. The<br />

possibilities of using new technologies by governments to<br />

promote transparency, social control and citizen participation are<br />

constantly presented in the literature [1, 2, 3, 4, 5].<br />

The first phase of the transparency process of governments was<br />

governmental portals of transparency, where several kind of<br />

information, especially financial information, was published in<br />

zipped format. This kind of publication is characterized by the<br />

fact that it is the government who decides what and how it will be<br />

seen. This applies to the publication of financial reports or data<br />

non-interactively. A second phase is characterized by the<br />

possibility of performing custom queries to databases. Some<br />

interested parties could access government databases and interact<br />

with them. This implies they could order structured queries<br />

producing crossed researched of specific data or, at least allowing<br />

filtering databases in search of detailed information. For example,<br />

this applies to appointments to the financial implementation of the<br />

Union, States and Municipalities in Brazil [2, 6, 7, 8, 9].<br />

A new phase becomes possible more recently: the open<br />

government data (OGD). Afforded by the development of ICTs,<br />

OGD can go further publication of reports or queries to access the<br />

databases. It became possible to offer database in its raw state, to<br />

be freely manipulated, filtered or mixed with others, including<br />

allowing the construction of new knowledge and applications by<br />

civil society. Some of consequences of this new possibility of<br />

governmental transparency are social control and citizen<br />

participation through collaboration [10, 11, 12, 13, 14, 15, 16].<br />

However, the limits of them are not yet fully known. Neither its<br />

boundaries were fully exploited [17, 18, 19].<br />

Several new applications are emerging in some developed<br />

countries such as United States, New Zealand, United Kingdom<br />

and Australia, as well as movements on the part of organized<br />

sectors of society who are pressing for its implementation [11, 12,<br />

16, 17, 18]. The pioneering example is United States of America.<br />

The federal government created a level of openness of<br />

government information by creating unprecedented memo on<br />

transparency and open government requires that all actions of the<br />

ministries themselves were based on transparency, citizen<br />

participation and collaboration between government and society.<br />

In addition, the Ministry of Science and Technology created the<br />

Open Government Initiative ("Open Government Initiative") to<br />

effect the availability of open government data [20, 21].<br />

While civil society organizations have emerged around the world<br />

that pressure governments to open their data in open format. In<br />

according with [21], in the United States, the Sunlight Foundation,<br />

OMB Watch and the League of Women Voters have created a


movement to pressure for open government data and creating<br />

applications for society from these data. Thus, also received<br />

support from large organizations in the country as the Open<br />

Society Institute, the Omidyar Foundation and the Ford<br />

Foundation.<br />

Despite the limited knowledge available on the subject, it is<br />

possible to envisage the emergence of OGD is appearing in many<br />

countries of the world.<br />

This article will explore the state of the art of using OGD in<br />

Brazil. The methodology used was literature on subject of OGD<br />

and an exploratory study of some of the few experiences in Brazil.<br />

Due to its recent creation, websites that provide open data were<br />

not analyzed by its impacts, but only their potential for promoting<br />

transparency, social control and citizen participation by offering<br />

OGD.<br />

First, the paper presents a concept discussion about OGD. Then, it<br />

was chosen three Brazilians cases to analyze through two methods<br />

of analysis of Brazilian initiatives: the eight principles of OGD<br />

and the five stars of linked data ranking. The data collection<br />

occurred through structured inspection of these three OGD<br />

Portals.<br />

Regardless of open data might be considered in both the public<br />

and in private, this article, as a matter of focus, is only open to<br />

government data in government. Once the conceptual discussion,<br />

the article identifies some of the experiences of reference and uses<br />

them to make an exploratory reflection on the limits and<br />

possibilities of the OGD contribute in social struggle around the<br />

transparency practices and the relationship between government<br />

and civil society, because the data open not only relate to the<br />

dissemination of information but also to encourage new uses for<br />

the citizens of public data.<br />

2. LITERATURE REVIEW<br />

2.1 Open Government Data<br />

Open Government Data (OGD) is a term used to denote<br />

governmental information available via the Internet in the public<br />

domain for free use by society [17]. This concept refers to the<br />

protection of public data as belonging to the citizen, which should<br />

have unrestricted access to government information, advocated by<br />

several authors [22, 17, 23], among others. It also refers to the<br />

context of recent development of ICT, where the Internet,<br />

databases, tools, standards and open formats allow and facilitate<br />

the provision and access to this information.<br />

The idea of the OGD is developed from the discussion on open<br />

data engendered by Tim O'Reilly, owner of O'Reilly Media in<br />

mid-2007. In the same year, along with O’Reilly’s with others<br />

specialists joined by 30 supporters of open government to discuss<br />

OGD and its importance to democracy [24]. At this meeting of<br />

experts and advocates of OGD, it was developed the eight<br />

principles OGD. These principles state that the OGD should be:<br />

1) Complete: All public data is made available. Public data is<br />

data that is not subject to valid privacy, security or privilege<br />

limitations.<br />

2) Primary: Data is as collected at the source, with the highest<br />

possible level of granularity, not in aggregate or modified<br />

forms.<br />

3) Timely: Data is made available as quickly as necessary to<br />

preserve the value of the data.<br />

23<br />

4) Accessible: Data is available to the widest range of users for<br />

the widest range of purposes.<br />

5) Machine understandable: Data is reasonably structured to<br />

allow automated processing.<br />

6) Non-discriminatory: Data is available to anyone, with no<br />

requirement of registration.<br />

7) Non-proprietary: Data is available in a format over which no<br />

entity has exclusive control.<br />

8) License-free: Data is not subject to any copyright, patent,<br />

trademark or trade secret regulation. Reasonable privacy,<br />

security and privilege restrictions may be allowed.<br />

Civil society organizations are using these principles of<br />

governments to levy the availability of government information.<br />

[25] presented at an event in 2009, the three laws of open<br />

government data:<br />

1) A blog about the project;<br />

2) If data is not found and indexed on the web, it does not<br />

exist;<br />

3) If not already open and available in machine-understandable<br />

format, it cannot be exploited;<br />

4) If any legal provision does not allow its replication, it is<br />

useless.<br />

Benefits of adopting the OGD in the field of transparency and<br />

social control are, at least in theory, evident. The provision of<br />

OGD tends to contribute to the increased transparency of<br />

government, creating better opportunities for social control of<br />

government actions. However, given the relative newness of the<br />

topic, yet there have been no studies that show the whole of this<br />

possibility.<br />

A second category of benefits can also be addressed. It is the<br />

possibility of creating new information and applications from the<br />

open government data. In this case, transparency is not only<br />

encouraged, but also new services may originate from the<br />

interaction between government and society through the<br />

exploitation of OGD. These services can be generated through<br />

new ways of working collaboratively across the participatory<br />

government and private institution, since the concept of OGD<br />

avoids the vision of the citizen as a mere recipient of public<br />

information.<br />

The focus on the concept of citizen open government data is<br />

emphasized by [26], pointing the concept relates to an<br />

understanding that the way governments have their information<br />

available allows the intelligence collectively create better ways to<br />

work with them than the governments themselves could do. As an<br />

example, [26] says that “it would be possible to optimize<br />

resources in public administration, if they leach from the traffic<br />

data in urban open format”. Thus, citizens who would take care<br />

through the use of ICT to produce charts and graphs on traffic.<br />

To [23], "the provision of open government data allows<br />

information to be used in the manner and convenience of the<br />

person concerned so that they can be mixed and matched to add<br />

more value to the data." For this author, the purpose of the public<br />

information is made available under the rules of open data is<br />

overcome the limitations that exist for users of public information<br />

can easily find, access, understand and use the public data<br />

according to their interests and convenience [23].


Not without reason therefore that the World Wide Web<br />

Consortium (W3C), an international consortium that aims to<br />

develop Web standards, defines government data as open: the<br />

publication and dissemination of public sector information on the<br />

web , shared in raw format and open, understandable of course, to<br />

allow its reuse in digital applications developed by society [27]. In<br />

addition, the W3C considers that governments should encourage<br />

citizens to use the open data available by governments, ie, they<br />

should be encouraged to reuse the data according to their needs<br />

and wants. The [23] summarizes the purpose of this incentive:<br />

"There is value in providing open government data if the company<br />

has no interest in re-use them".<br />

Likewise, the Declaration on the Public Service Open Europe<br />

believes that public bodies must provide the government data: in<br />

open formats and reusable, public institutions should seek to act<br />

as a platform for building of public value. Public organizations<br />

should offer citizens the ability to solve problems for themselves<br />

by providing them the proper tools to do so [17]. Protection of<br />

open data as a promoter of transparency is due to the possibilities<br />

of making government records accessible to eliminating all<br />

restrictions concerning technology, accessibility and legislation to<br />

International Initiatives of Portals of Open Government Data<br />

Worldwide, activists, international organizations and governments<br />

are thinking about access to public information from the data<br />

open. Although the discussion on this topic is new, there are<br />

already some experience of government provision of open data.<br />

Several national and subnational governments now provide their<br />

data from the orientations of open government. Among the<br />

countries that have policies of open data include: United States,<br />

United Kingdom, Australia and New Zealand [26, 17]. These<br />

countries have developed national policies on access to public<br />

data and created web portals that provide public information in<br />

different formats. Moreover, they often encourage citizens to<br />

create new applications and ways of using information published<br />

in their portals.<br />

2.1.1 The Australian, New Zealand and United<br />

Kingdom Portals of Open Government Data<br />

The Australian government created the portal Data Australia in<br />

February 2010. The objective of the portal of transparency is to be<br />

the database of public information government of this country.<br />

They encourage us to use the information contained within the<br />

portal to create gadgets and computer programs by users who do<br />

social control of all information within the portal. The website of<br />

the New Zealand government was created this year to offer<br />

information and intelligence agencies and public bodies of<br />

government. It has space for discussion through forums that may<br />

be proposed by citizens.<br />

The example of the United Kingdom intends to offer data and<br />

information to citizens in public administration for the expansion<br />

of government social control. It has space for the wiki, online<br />

community, and sends in new web applications, among others. In<br />

2008, Britain ceded public information to a competition to<br />

develop solutions to public data named Show us a better way.<br />

2.1.2 The United States Portal of Open Government<br />

Data<br />

The flagship plan for adoption of open data is the U.S. Initiatives<br />

in this country can also be found in the sub-national governments.<br />

According to [26], Washington DC was one of the pioneers in<br />

developing the incentive to collaborative work between<br />

24<br />

government and society with public data. President Obama early<br />

in the mandate, set policies for the promotion of transparency that<br />

encourages the provision of government data in open format.<br />

The memo sent by the president on January 21, 2009 to all heads<br />

of government called the Federal Transparency and Open<br />

Government. This memo pledged to create "unprecedented levels<br />

of openness" in government. The president called the<br />

representatives of the executive to work to ensure trust and<br />

establish a system of transparency, public participation and<br />

collaboration. The opening will strengthen democracy and will<br />

promote efficiency and effectiveness to government "[20, 26].<br />

The Open Government Initiative policy aimed to guarantee the<br />

realization of this memo. Among its actions, is the portal<br />

Data.gov, created in May 2009. The aim of Data.gov, portal<br />

transparency of the federal government is offering information<br />

and expand the creative use of government data through web<br />

applications, encouraging innovative ideas to provide greater<br />

transparency of governmental actions. The site contains<br />

information about hundreds of government agencies and offices<br />

separated by organ. Statistics tell visitors monthly, daily, yearly. It<br />

also has space for participation of citizens wishing to express their<br />

will.<br />

2.1.3 Private Portals of Open Government Data<br />

Besides the government experiences, there are already nongovernmental<br />

organizations that seek to promote and support the<br />

adoption of open data policy. For example, the Sunlight<br />

Foundation and Project Open Government Data, Access the Open<br />

Knowledge Foundation Info. These experiences advocate in favor<br />

of adopting the policy of open data by governments and perform a<br />

variety of activities from research to encourage the creation of<br />

solutions and standards for open formats. In short, despite the<br />

recent discussion of existence and availability of open government<br />

data, there are already examples of governments that adopt this<br />

theory as a public policy to promote transparency and<br />

collaboration between government and society.<br />

2.2 How to Measure the Level of OGD in<br />

Governmental Portals?<br />

One of the methods to measure the level of OGD in governmental<br />

Portals was created by Tim Berners-Lee. It was denominated the<br />

five stars of open linked data [27].<br />

Actually, this method was created to “(…) categorise the<br />

publication of open data on the Web in levels of increasing<br />

usefulness, that encapsulate the present shared vision of the<br />

Semantic Web as a Web of Linked Open Data, and that<br />

individuals can use to rate their own data publication” [27].<br />

It was divided in five categories [28]:<br />

1) One star: available on the web (whatever format) but with an<br />

open licence, to be open data.<br />

2) Two stars: available as machine- readable structured data<br />

(e.g. excel instead of image scan of a table).<br />

3) Three stars: as (2) plus non proprietary format (e. g. CSV<br />

instead of excel).<br />

4) Four star: all the above plus, use of open standards from<br />

W3C (RDF or SPARQL) to identify things, so that people<br />

can point at your stuff.<br />

5) Five stars: all the above, plus: link your data to other<br />

people’s data to provide context.


3. RESEARCH APPROACH<br />

The objective of this article is to present the State of Art of the<br />

OGD in Brazilian National and Subnational governments. To<br />

achieve this goal, firstly, it was done a literature review that<br />

guided this study focused on the key concept: Open Government<br />

Data (OGD) and its main examples in governments (United<br />

States, Australia, United Kingdon and New Zealand) and entities<br />

that promote OGD (Sunlight Foundation and Open Knowledge<br />

Foundation). This allowed us to highlight the possibilities that, in<br />

theory, the DGA can offer as tools for promoting transparency,<br />

social control, and reuse by civil society, among others. However,<br />

the virtually nonexistent literature on DGA in Brazil has required<br />

an exploratory study to identify the initiatives already undertaken<br />

by governments.<br />

It was decided to perform preliminary research from experts and<br />

publicity materials on the Internet, which identified experiences<br />

promoted by the federal, state and municipal governments. After<br />

identifying the set of experiences available, it was decided to<br />

carry out structured visits to the following government websites<br />

that publish open government data (one from each level of<br />

government): DadosGov Project (Federal Government),Open<br />

Government SP (Government of the State of São Paulo) and São<br />

Paulo City Council (Municipal level).<br />

Other initiatives were found such as the portal of the State of<br />

Ceará Municipalities Court of Audits (TCM-CE) and the Public<br />

Security Secretariat of Rio Grande do Sul State. These two<br />

initiatives it was not chosen to a further analysis because they are<br />

isolated experiences in their states. We were looked for initiatives<br />

such as portals and initiatives from Executive or Legislative.<br />

In Brazil there is still no transparency portal experience that is<br />

associated totally with a central policy of open government data<br />

available [26, 17, 23]. In general, cases in Brazil are far short of<br />

international experiences, such as the United States and United<br />

Kingdom. Therefore, the availability of open government data in<br />

Brazil does not have a systematic policy as the United States.<br />

Nevertheless, there are individual experiments and partial<br />

availability of public data by some government agencies and<br />

specific laws that encourage the adoption of open data by<br />

governments.<br />

The objectives of the structured inspections in these three<br />

initiatives were to verify that the Brazilian OGD Portals achieve<br />

the eight principles of OGD and the five stars of open linked data<br />

presented above in the literature review.<br />

A series of structured inspections on these websites was done<br />

between 02/08/2012 e 04/01/2012. Data collected were used to<br />

assess how the eight principles of open government data proposed<br />

by [24] and the five stars of open linked data are presented in<br />

these cases. The exploratory study was conducted because the<br />

cases we found are recent experiences, once OGD are a very<br />

recent issue in Brazil. Therefore, there was no way to make an<br />

analysis of its impacts yet.<br />

Thus, the steps of this research were:<br />

1) An exploratory research of Brazilian governmental initiatives<br />

of OGD through Internet search;<br />

2) Definition of the studies cases. The conditions were:<br />

different levels of governments, preferably of Executive or<br />

Legislative and preferably portals.<br />

3) Structured inspections in these cases to find how many<br />

principles of OGD and stars they have.<br />

25<br />

4) Defining the results and State of Art in Brazilian OGD.<br />

4. RESULTS OF THE EIGHT PRINCIPLES<br />

4.1 Open Government Data in Brazilian<br />

Federal Government<br />

In December 2010, the federal government launched the first site<br />

that aims to provide public data on this being an open format. The<br />

Brazilian Portal of OGD was denominated DadosGov<br />

(http://beta.dados.gov.br/). The project was developed by<br />

Information Organizing Committee from the Presidency of the<br />

Republic (IOC-PR) which consists of the following Federal<br />

Government agencies: Office of Deputy Information for Decision<br />

Support, President's Chief of Staff, Institutional Relations<br />

Secretariat (SRI-PR), Department of Logistics and Information<br />

Technology , and two federal government-owned IT companies<br />

that provide services to government.<br />

The aim of this website is to organize and make available to the<br />

President, general government agencies and society governmental<br />

information, a reliable and easily accessible. For this, DadosGov<br />

website is structured to provide data in open format to be taken by<br />

anyone interested. The data come from federal government<br />

agencies, ministries and other public organizations. The table<br />

below shows the main government agencies that provided data to<br />

the project:<br />

Table 1. Main data provided by DadosGov Project<br />

Government<br />

Organization<br />

Ministry of<br />

Education<br />

(MEC)<br />

Ministry of<br />

Social Welfare<br />

(MPS)<br />

Ministry of<br />

Agrarian<br />

Development<br />

(MDA)<br />

Ministry of<br />

Justice<br />

(MJ)<br />

Ministry of<br />

Agriculture<br />

(MAPA)<br />

Time<br />

Series<br />

252<br />

132<br />

131<br />

127<br />

110<br />

Examples of content<br />

Childhood Education, School<br />

Health Program, University<br />

Scholarships (PROUNI), Student<br />

Loans Fund for Higher<br />

Education (FIES), among others.<br />

Ministry branches.<br />

Rural microcredit, Family Farm<br />

Insurance, among others.<br />

Services to women victims of<br />

domestic violence, Amnesty<br />

Commission deliberations,<br />

among others.<br />

Contracts for urban food<br />

suppliyng.<br />

Source: DADOSGOV Project (2012)<br />

DadosGov portal like the site of the U.S. federal government,<br />

cataloging data that were already available in public bodies, but<br />

were not systematized in a single portal and open format. Over 30<br />

agencies have provided historical series of public information for<br />

use of both governments and citizens. Among the sites studied is<br />

the one that provides more information. Due to the large amount<br />

of data available was not possible to verify that all data presented<br />

were the raw data.<br />

Data are presented usually by historical series that can be<br />

analyzed by the user via graphics, tables or records. Extractions of<br />

the series are in the following formats: CSV, RTF, PDF, XLS, and<br />

XML.


Another principle adopted by this site is that user identification is<br />

not required for data extraction. Although there is no space on site<br />

to discuss applications and other uses of the available information,<br />

there is an incentive for citizens to use these: "The idea of linked<br />

data formats is to allow civil society to development tools able to<br />

read data supplied by the government and make comparisons and<br />

analysis" [31]. Regarding to license to use the data, the site is not<br />

clear what are the chances of reproduction and use of information<br />

available.<br />

In 2010, federal government, through the Secretariat of Logistics<br />

and Information Technology of the Ministry of Planning has<br />

initiated a project to create the Open Data National Infrastructure<br />

(ODNI). The initiative focuses on interoperability and<br />

standardization of information resources. It also intends to<br />

promote best practices for the provision of open government data.<br />

It is defined as an "integrated set of technologies, policies,<br />

procedures and mechanisms for coordination and monitoring,<br />

standards and agreements necessary to facilitate the storage,<br />

access, sharing, dissemination and use of open data" [31].<br />

Factors that motivated the ODNI launching were difficulties for<br />

searching, accessing and reusing government data, both for the<br />

society and the government itself. The initiative seeks to support<br />

demands of changes in relationship between government and<br />

society, promoting transparency, control of government by<br />

citizens and citizen participation in policymaking. The ODNI will<br />

use existing experiences in the dissemination of public data<br />

available in the federal government as a starting point, including<br />

some isolated actions in federal agencies and two centralized<br />

operations of the federal government: the aforementioned<br />

DadosGov portal and federal government's Transparency Portal<br />

(http://www.portaltransparencia.gov.br/).<br />

ODNI's staff points out as a challenge to the success of the<br />

initiative the federal agencies involvement and a successful<br />

consensus around a single set of concepts. Implementation<br />

strategy for ODNI has some main elements: launching a virtual<br />

community for collaborative work involving officials of various<br />

public agencies, scripts and roadmaps for publishing open data,<br />

voluntary membership by various public agencies, technical<br />

training of civil servants in ontology modeling and<br />

implementation of a pilot project on public procurement.<br />

Portal was based on the availability of summary information and<br />

statistical series in a single location on the Internet. ODNI means<br />

a step forward from the experience of DadosGov. The ODNI's<br />

proposal takes a different approach: to create conditions for the<br />

various agencies to make available their data in a decentralized<br />

way. With this, ODNI will provide integrated data with a high<br />

level of interoperability through technologies such as Linked<br />

Data,. This strategy will make ODNI able to foster the opening of<br />

a much larger volume of data.<br />

A beta version was launched in the beginning of 2012. This<br />

version was done by civil servants and hackativists. One of the<br />

goals of creating this new portal is to guarantee the commitment<br />

proposed in the Open Government Partnership (OGP), a global<br />

effort to make governments better through open government.<br />

4.2 Open Government Data in Brazilian State<br />

Government<br />

The São Paulo State Government Portal created SP Open<br />

Government portal in 2010. Its goal is to make available to civil<br />

society, via the Internet, copies of databases and information<br />

which is not confidential and gives unrestricted access to the<br />

26<br />

organs and entities of the State Public Administration. The decree<br />

that created the portal provides the rules of data and creation of<br />

the portal, summarized in its second article:<br />

o Rules of provision, information, guidance and providing<br />

access to databases, as well as to the responsibilities of the<br />

parties.<br />

o Conditions of use of these bases provided, supposed to be<br />

free for any purpose or activity, safeguarding the legal<br />

restrictions and associated regulations.<br />

o Register of available bases, containing the identification and<br />

detailed description of each one and identify the agency or<br />

entity responsible.<br />

o Tools to facilitate collaboration between users of the<br />

available databases, including self-identification for who<br />

obtains a copy of available basis, including information of<br />

purpose for which the base was required; and registration and<br />

publication of products generated through the use of bases,<br />

identifying their authors.<br />

The São Paulo law falls largely to the principles of open<br />

government data to ensure the free reuse of all available nonsensitive<br />

state data. The Open Government SP portal was released<br />

in January 2011. The website seeks to stimulate launching of new<br />

electronic services, promoting transparency and improving the<br />

quality of information of interest to society by providing updated<br />

copies of their public databases, on a free and open basis, using<br />

the Internet. Databases provided are produced by the State<br />

Statistical Agency (SEADE Foundation), which has most state<br />

social and economic indicators, the Department of Treasury and<br />

the Court of Auditors. However, the website does not provide data<br />

from other agencies in São Paulo, i.e. not all data are available on<br />

site. Among the information available are: Elections (information<br />

concerning the elections in São Paulo between 1998 and 2008);<br />

state indicators (Sao Paulo State Social Responsibility Index -<br />

IPRS), catalogue of public services offered through the Internet;<br />

Information from municipalities. Unlike other sites, rules<br />

regarding use and availability of data are clear. All data available<br />

on the site are non-sensitive and have unrestricted access. The<br />

only requirements are that users accept the rules set out in this.<br />

Registration is optional for accessing the data. Developers can<br />

register applications built within the portal itself. However, for<br />

sending and accessing applications created registering is<br />

mandatory.<br />

4.3 Open Government Data in Municipal<br />

Level<br />

The São Paulo City Council Portal has a space to present the<br />

project “Open Data Parliament Program”. The project was created<br />

with the purpose of making databases and non-confidential<br />

information in electronic open format, in accordance with the<br />

principles of public administration and observance of<br />

internationally accepted recommendations, such as those<br />

presented by the Open Knowledge Foundation and the<br />

International World Wide Web Consortium (W3C).<br />

The idea of a OGD Portal in the São Paulo Parliament was<br />

defined after the seminar “The Era of Open Data” in October<br />

2011, conducted by the São Paulo City Council.<br />

The Portals presents:<br />

1) International manuals of OGD such as the Open Data<br />

Handbook [29].


2) An explanation about how civil society can open and read<br />

archive in open format;<br />

3) A blog about the project;<br />

4) Some City Council data in open format.<br />

The open data presented in the website is: a) Presence of<br />

councilors at ordinary and extraordinary plenary sessions; b) Vote<br />

of councilors in ordinary and extraordinary plenary sessions; c)<br />

Budget of the Municipality of São Paulo in 2011; d) Budget<br />

allocations from the Municipal Education in 2011; e) Ratio of<br />

employees (updated monthly); f) Budget Execution of the<br />

Municipality of São Paulo (since January 2010);g) Monthly<br />

Balance of Performance Budget Revenues - Direct<br />

Administration; and, h) Historical Series of the benefits of Aid<br />

Accounts-General Charges In Office.<br />

The data presented in this Portal are few in relation to all<br />

information that has a City Council. But it is a primary and timely<br />

data. They use mainly XML format. Despite claiming that they<br />

follow the recommendations of international organizations, it is<br />

not clear what are the licenses used. They also do not have a<br />

space to present applications that use their data. The following<br />

table summarizes how open government data principles of are<br />

adopted by the Brazilian experiences:<br />

Table 2. OGD principles adoption in Brazilian cases<br />

Principles<br />

Dados<br />

Gov<br />

Governo<br />

Aberto SP<br />

São Paulo<br />

City<br />

Council<br />

No<br />

Complete<br />

Data<br />

No No<br />

Primary<br />

Data<br />

No No<br />

X<br />

Timely<br />

Data<br />

X X<br />

X<br />

Accessible<br />

Data<br />

X X<br />

X<br />

Machine<br />

understandable<br />

X X<br />

X<br />

Non<br />

Discriminatory<br />

X X<br />

X<br />

Non<br />

Proprietary<br />

X X<br />

X<br />

Free License X X<br />

Info not<br />

provided<br />

Source: Created by authors from cases website<br />

Therefore, when we compare these cases and the principles of<br />

open government data, we can realize that most of the principles<br />

are used in the examples of Brazil. Data are not complete and<br />

most are not primary. However, there was still little information<br />

available. There is also lack of clarity about the license of the data<br />

presented in the case of São Paulo City Council.<br />

A positive point is that they all have current data, accessible and<br />

understandable by machines. Furthermore, it is not necessary a<br />

register to data access.<br />

27<br />

5. OGD in Brazil and the Five Stars of Open<br />

Linked Data<br />

In the case of Tim Berners-Lee method, the Brazilian cases are in<br />

the following phase:<br />

1) One Star: the first stage requires that the website contains<br />

data available independently of the format, but with an open<br />

license. All the cases studies presented data available and an<br />

open license. For example, Dados Gov from Federal<br />

Government uses Creative Commons License. We found<br />

three problems to guarantee the excellence of the first stage<br />

in Brazilian initiatives: a) There are few data presented in<br />

these Open Data Portals in relation to public data that<br />

governments have; b) São Paulo City Council does not<br />

explain clearly what open license they use; and c) DadosGov<br />

has some data that is not open license.<br />

2) Two Stars: All portals presented data available as machinereadable<br />

structured data.<br />

3) Three Stars: The Portals use mainly non-proprietary archives<br />

such as XML, CSV and HTML, so, they achieved the third<br />

stage.<br />

Unfortunately, it was not found the four and five stars. To achieve<br />

these stars, the governmental portals have to: i)Use URIs, so<br />

people can point at their stuff, and; ii) Link their data to other data<br />

to provide context.<br />

6. FINAL CONSIDERATIONS<br />

The emergence of the OGD requires a shift in thinking about the<br />

transparency of governmental actions and information. This need<br />

is not just theoretical. The very practice of social actors involved<br />

is creating new demands for transparency, not served by<br />

traditional practices in electronic government.<br />

There is a major change in the principles that guide the handling<br />

of demands for transparency. So far, everything that was not<br />

confidential should be made available to the public upon request,<br />

or kept available as possible. The new framework gives rise to a<br />

new level of demand for transparency: everything that is not<br />

confidential should be available on the internet as open data in a<br />

way people cannot just access data, but also create new services<br />

and analysis with these open data.<br />

Logically, implementing broader OGD programs will face huge<br />

barriers, because most governments wouldn't be mobilized to<br />

increase the level of social control over them. However, the<br />

complexity of the issue makes it impossible to reduce it only to<br />

the interest of governments in promoting transparency through the<br />

OGD. Civil society has an important role, too.<br />

In addition, comprehensive programs to spread open government<br />

data require using data formats and technologies are not always<br />

employed by governments themselves. Therefore it will be a<br />

difficult task even for well-intentioned governments and surely<br />

will took many years to reach a high level of open government<br />

data availability.<br />

According to [17] technology already exists for governments and<br />

civil society to use government data as they decide. Available<br />

technology can support new ways and new indicators of thinking<br />

about public administration. In this way, civil society could<br />

generate more innovation from unrestricted access to public data.<br />

For these authors, the development of open government data<br />

depends on: a clear policy of the Administration in regard to


access to public information, changes in public sector strategies<br />

aiming to foster transformation of relations between state and<br />

society. Moreover, it depends on a change in the central locus of<br />

public organizations as interpreters of social needs” and also as<br />

service delivery agents [17].<br />

[30] argues that to achieve the goal of providing open government<br />

records should be observed three fronts:<br />

o Map of Youth and Adults School (EJA): map showing the<br />

openings of adult education in public schools in Brazil;<br />

o Tr3e: website that crosses over the information of<br />

deforestation in Brazil;<br />

o Open Parliament: website designed to facilitate access to<br />

information about MPs in Brazil.<br />

These civil society initiatives demonstrate how the issue is<br />

increasingly taking up space on the agenda of organizations and<br />

groups interested in using IT to promote democratic developments<br />

in Brazil. Taken together with the emergence of new government<br />

initiatives, these initiatives show a clear sign of an expanding<br />

supply of OGD in the coming years.<br />

Despite the existence of few theoretical and empirical data on<br />

open government in Brazil, there is a clear expansion of national<br />

experiences and discussions.<br />

If we take the experience of Transparency Portal of the federal<br />

government as a reference, it can be said that the ODNI has great<br />

potential to accelerate the adoption of open government data<br />

initiatives in the country. Its impact should go beyond the limits of<br />

the Federal Government and stimulate initiatives at the<br />

subnational level, by giving greater visibility to the idea of the<br />

OGD, and by offering standards and roadmaps that may be<br />

adopted by states and municipalities.<br />

Besides the few public sites that adopt the open government data,<br />

there is a law that deals with open data in known Freedom<br />

Information Act, which regulate access to government<br />

information as provided in the Constitution.<br />

The Brazilian law on transparency emphasizes the information<br />

technologies and communication (ICTS), in particular the<br />

Internet, encouraging and requiring public organizations to make<br />

the information on the World Wide Web. The internet is regarded<br />

as a means of easy access and opportunities to reach a large<br />

number of people.<br />

Among the required data are public expenditures and the general<br />

data for the monitoring of programs, activities, projects and public<br />

works. There is an obligation of public agencies not only to<br />

disclose such information, but also make them available so that<br />

they are easily accessed, understood and updated.<br />

Open government means that public data should be disclosed in<br />

the most disaggregated level possible and in different formats.<br />

Disclosure must attain the raw data which should be able to be<br />

viewed on any type of machine for anyone who want to make use<br />

of such data. Thus, the law has principles of open government<br />

(even if not explicitly quote) for the dissemination of public<br />

information.<br />

Future additional studies would be useful for better understanding<br />

demands for OGD and evaluate impacts of present and new cases<br />

of OGD to promote transparency, social control and citizen<br />

participation. In future studies, it would be also important to check<br />

what are the challenges of Brazilian governments to achieve the<br />

five stars.<br />

28<br />

7. REFERENCES<br />

[1] Ribeiro, Manuella Maia. Transparency on the portals of<br />

Federal Government: The cases of Comprasnet and portal of<br />

transparency. University of São Paulo (USP), 2009.<br />

[2] Pinho, José Antonio Gomes. Investigating states portals of<br />

electronic government in Brazil: Lots of technology, poor<br />

Democracy. Journal Public Administration (RAP), 42 (3):<br />

471-93, MAY/JUN. 2008.<br />

[3] Welp, Yanina. Democracy and the digital divide in Latin<br />

America. International Conference of Direct Democracy in<br />

Latin America, 14-15.MAR. 2007.<br />

[4] Prado, Otávio & Loureiro, Maria Rita. Electronic<br />

Government and transparency: evaluation of advertising the<br />

public accounts of the Brazilian capitals. Reach Magazine,<br />

vol.13, n.3, p. 355-372, SEP/DEC 2006.<br />

[5] Vaz, José Carlos. Prospects and challenges for the expansion<br />

of electronic government in the municipalities. International<br />

Seminar on Electronic Government and Local Governments.<br />

Brasília, 2003.<br />

[6] Ferrer, F. & Borges, Z.. Electronic government:<br />

transparency, efficiency and inclusion. In: E-gov.br: the next<br />

revolution in Brazil: efficiency, quality and democracy:<br />

electronic government in Brazil and abroad. Prentice Hall.<br />

2004.<br />

[7] Ruediger, Marco Aurelio. Electronic Government and<br />

Electronic Governance - Alternative Concepts in the Use of<br />

Information Technologies for Providing Access to<br />

mechanisms of Civic Government and State Reform. Contest<br />

XVI Ensayos y Monografías del CLAD Reforma del Estado y<br />

on Modernización de la Administración Pública "Electronic<br />

Government”. Caracas, 2002.<br />

[8] Diniz, Eduardo Henrique et al. Electronic government in<br />

Brazil: a historical perspective from a structured model of<br />

analysis. Journal Public Administration (RAP). 43( 1):23-48,<br />

JAN./FEB. 2009.<br />

[9] Mello, Gilmar Ribeiro de & Slomski, Valmor. Electronic<br />

Governance Index of Brazilian States : Within The<br />

Executive Branch. JISTEM J.Inf.Syst. Technol. Manag.<br />

(Online) [online]. 2010, vol.7, n.2, pp. 375-408. ISSN 1807-<br />

1775.<br />

[10] Yildiz, Mete. E-government research: Reviewing the<br />

literature, limitations, and ways forward. Government<br />

Information Quarterly. Volume 24, Issue 3, July 2007.<br />

[11] Althrop D. & Ruma, L. Open Government: Collaboration,<br />

Transparency, and Participation in Practice. O’Reilly Media.<br />

P11-39. 2010.<br />

[12] Nam, Taewoo. New Ends, New Means, but Old Attitudes:<br />

Citizens’ Views on Open Government and Government 2.0.<br />

Proceedings of the 44 th Hawaii International Conference on<br />

System Sciences. 2011.<br />

[13] Parks, W.. The open government principle: Applying the<br />

right to know under the constitution. The George Washington<br />

Law Review. 26(1), 1-22, 1957.<br />

[14] Parycek, P. & Sachs, M. Open Government: Information<br />

flow in Web 2.0. European Journal of ePractice. 9(1), 59-70.<br />

2009.


[15] Robinson, David, Yu, Harlan, Zeller, William P. & Felten,<br />

Edward W.. Government Data and the invisible hand. Yale<br />

Journal of Law and technology, 160. 2008.<br />

[16] Sheridan, John & Tennison, Jeni. Linkin UK Government<br />

Data. LDOW 2010, April 27, 2010, Raleigh, North Carolina.<br />

2010.<br />

[17] Agune, Roberto Meizi; Gregorio Filho, Alvaro Santos &<br />

Bolliger, Sergio Pinto. Open government SP: provision of<br />

databases and information in an open format. III Congress<br />

Consad of Public Management, 2010.<br />

[18] Vaz, J. C., Matheus, R. & Ribeiro, M. M.. Open government<br />

data and its impact on the concepts and practices of<br />

transparency in Brazil. Cadernos PPG-AU/FAUFBA, 2010.<br />

[19] Torkington, N.. Rethinking Open Data - O'Reilly Radar.<br />

O'Reilly Radar. 2010.<br />

[20] Obama, B., Memo from President Obama on Transparency<br />

and Open Government. In D. Lathrop & L. Ruma, eds. Open<br />

Government.<br />

http://www.whitehouse.gov/open/documents/opengovernment-directive.<br />

2010.<br />

[21] Fung, A. & Weil, D.. Open Government and Open Society.<br />

In: Open Government: Collaboration, Transparency, and<br />

Participation in Practice. O'Reilly Media. 2010.<br />

[22] Laporte, T.; Demchak, C., Friis, C.. Webbing governance:<br />

national differences in constructing the face of public<br />

29<br />

organizations. In: GARSON, G. Handbook of public<br />

information systems. Marcel Dekker Publishers. 2000.<br />

[23] Diniz, Vagner. How to achieve open government data. In III<br />

Congress Consad of Public Management, 2010.<br />

[24] Open Gov Data. Eight principles of open government data.<br />

http://resource.org/8_principles.html. 2010.<br />

[25] Eaves, David. The three laws of open government.<br />

http://eaves.ca/. 2010<br />

[26] Silva, Daniela Bezerra. Transparency in public<br />

interconnected. College Casper Libero, 2010.<br />

[27] Berners-Lee, Tim. Linked Data.<br />

http://www.w3.org/DesignIssues/LinkedData.html. 2011.<br />

[28] Shotton, David. The five stars of online journal articles – a<br />

framework for article evaluation.<br />

http://www.dlib.org/dlib/january12/shotton/01shotton.html.<br />

2012.<br />

[29] Open Data Handbook. http://opendatahandbook.org/. 2011.<br />

[30] World Wide Web Consortium (W3C).<br />

http://www.w3c.br/divulgacao/. 2010.<br />

[31] Miranda, C. & Silva, N. National Infrastructure Open Data.<br />

www.w3c.br/conferenciaegov/05_ODNI_Christian_Nitai.pdf<br />

. Brasília. 2010


Open Government 2.0: Citizen Empowerment through<br />

Open Data, Web and Mobile Apps<br />

Rodrigo Sandoval-Almazan<br />

Universidad Autonoma del Estado<br />

de México<br />

rsandovala@uaemex.mx<br />

J. Ramon Gil-Garcia<br />

Centro de Investigación y Docencia<br />

Económicas<br />

joseramon.gil@cide.edu<br />

ABSTRACT<br />

Although the open government concept is not new, current trends<br />

in open government imply a change in focus from the traditional<br />

principle of accountability to a concept of citizen empowerment,<br />

collaboration and information sharing. In this paper, we explore<br />

the use of open data and mobile apps in the top countries<br />

according to the UN 2010 e-Government Survey. Our exploration<br />

suggests that, although not all countries yet offer mobile apps to<br />

their citizens, there is a great diversity of apps to create citizen<br />

value. Moreover, private companies and citizens are getting<br />

involved in the creation of such apps. More research is needed to<br />

understand ways to promote the development of this kind of<br />

government applications.<br />

Categories and Subject Descriptors<br />

Design, performance, human factors<br />

General Terms<br />

Performance, Design, Human Factors<br />

Keywords<br />

Government apps, apps, mobile apps<br />

1. INTRODUCTION<br />

During the last years, governments around the world have<br />

emphasized the need of a more open and transparent government<br />

[1]. Although the idea of freedom of information and open<br />

government can be traced back to the 50s[2], the principle has<br />

been invigorated with the Open Government initiative from the<br />

Obama administration. Moreover, the traditional focus for open<br />

government was accountability, while current efforts are<br />

emphasizing on information sharing and citizen empowerment<br />

[3]. In fact, the US government has made available about 390,000<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Luis F. Luna-Reyes<br />

Universidad de las Américas-Puebla<br />

luisf.luna@udlap.mx<br />

Dolores E. Luna<br />

Universidad de las Américas-Puebla<br />

dolorese.luna@udlap.mx<br />

30<br />

Yaneileth Rojas-Romero<br />

Universidad Autonoma del Estado<br />

de México<br />

yrojasr@uaemex.mx<br />

data sets of raw and geospatial datasets to the public through the<br />

data.gov website. Many other States are following the US<br />

initiative, making raw data available to the public. On the other<br />

hand, the popularization of mobile devices and social media tools<br />

and platforms have promoted the emergence of new forms of<br />

interaction between organizations and the public, or even among<br />

the public themselves[4].<br />

Small applications running on web pages or in mobile devices (or<br />

mobile apps) have become a wide-adopted way of interaction.<br />

Mobile apps stores were estimated to serve 17.7 billion downloads<br />

in 2011, and it is expected that they will serve 185 billion<br />

downloads by 2014 [5]. It is expected that mobile computing will<br />

replace desktop computing by 2015 [6] . Again, just in data.gov,<br />

about 1,500 web and mobile applications (apps for short) have<br />

been developed, more than 200 by citizens themselves. We<br />

believe that these two trends together have the potential to<br />

transform the relationships between government and the public.<br />

Despite this emerging context, we still know very little about the<br />

level of adoption of apps in government websites anrd their use.<br />

In this way, the purpose of this paper is to give a first step to<br />

answer this set of questions, looking for an initial categorization<br />

of practices among top-rated governments in terms of the use of<br />

information technologies, as well as providing some examples of<br />

current app use in government websites. To accomplish this<br />

objective, the paper will be divided in five main sections. This<br />

introduction constitutes the first section. The second section<br />

includes a literature review. The third section describes the<br />

method that we followed to survey the websites and to classify the<br />

apps. The fourth section includes initial results, and the final<br />

section discusses the findings and provides some future research.<br />

2. LITERATURE REVIEW<br />

The literature review includes social media in government, and<br />

the trend of web and mobile apps.<br />

2.1 Web 2.0 in Government<br />

At least since 2008 government web sites have been including<br />

web 2.0 tools to become more interactive with citizens [7] [8] [9]<br />

[10]. All of these applications, although may be very different in<br />

purpose and function, they share some common features like the<br />

collective generation and classification of content, the integration<br />

of communities, and the production and consumption of socially<br />

distributed knowledge. Web 2.0 is a social network platform


ecause some of its content is user-generated –as if it were a<br />

collective intelligence— converting into co-producers of content<br />

and not just passive subjects who only receive information.<br />

Interaction plays a vital role in this platform [11], and offers a<br />

great opportunity as a way of approaching citizens and making<br />

sure their participation enriches government efforts [12].<br />

Wilson and colleagues proposes that web 2.0 must be understood<br />

as “the second generation of the Web, wherein interoperable,<br />

user-centered web applications and services promote social<br />

connectedness, media and information sharing, user-created<br />

content, and collaboration among individuals and organizations”<br />

[13] (p. 2).<br />

The Web 2.0 tools and applications have been used in government<br />

websites in several countries [14] , [Eliason, 2006 #10752].<br />

Lerman and his colleagues researched about social tagging using<br />

the example of Digg [15]. They find that the use of these tools<br />

depends on context events and not ordinary or common use for<br />

activities.<br />

In the near future, it looks like mobile government will adopt<br />

more web 2.0 tools and features The different programs of the<br />

Somus project suggest a promising trend for the use of these tools<br />

on citizen-government interaction in the following years [16].The<br />

use of web 2.0 in the current activities of citizens and politicians<br />

is an ongoing work.<br />

2.2 Desktop and Mobile Apps<br />

Research on the development of apps is not as extensive as the<br />

number of domains for which them have been developed. There is<br />

some evidence that the current app movement is promoting new<br />

development approaches and delivery channels allowing small<br />

ventures to compete globally [5]. However, there is still<br />

dominance of the global mobile media corporations in the market<br />

[17]. The Apple store was the first to open on July 2008. Nine<br />

months later one billion of apps were downloaded. On April 2010,<br />

just 185,000 apps were available for the Iphone [18]. The offer of<br />

apps grew with Android market (346,526 apps until January 21,<br />

2012), the windows phone marketplace, the Samsung apps, the<br />

blackberry App World, and Nokia Ovi Store.<br />

In this environments, independent software developers, as well as<br />

private and public organizations, design tailor apps with almost<br />

any imaginable objective. In fact, many professional areas are<br />

encouraging their members to write their own applications, by<br />

showing its value as well as how-to guides and approaches [19]<br />

[20] .<br />

On the government side, apps have been proposed to provide G2G<br />

inter-agency collaboration [21] and public services [22]. Mobile<br />

applications have the potential to improve service delivery, as<br />

well as efficiency and efficacy in government operations[4] .<br />

Furthermore, mobile apps create the capability of creating<br />

Location-based Services (LBS), such as traffic, bus or parking<br />

applications[4]<br />

Nowadays there are several websites and organizations that<br />

promote the use of apps in the government. However, maybe the<br />

most high impact applications of these mobile technologies come<br />

when government partners with NGOs or private organizations to<br />

allow citizens to get information, add value to it, giving it back to<br />

government to solve important problems and create value [3] .<br />

This implies that government will need to find creative ways of<br />

promoting the creation of ecosystems where vendors, developers,<br />

and citizen hackers use public information made available by<br />

31<br />

government or promoted to be public by government regulations<br />

to solve important problems [3].<br />

In summary, we think that apps expand the potential for egovernment<br />

to allow citizens to access content, create content,<br />

send communications to government officials, adding in some<br />

cases value to information and allowing citizens to create<br />

ecosystems interested in solve important public problems. One<br />

first step that we want to do in this paper is to explore some of the<br />

current applications that exist in government websites.<br />

3. METHOD<br />

In this paper, we follow the approach of Internet-mediated<br />

research (IMR) [23], which consists of “the gathering of novel,<br />

original data to be subjected to analysis in order to provide new<br />

evidence in relation to a particular research question” (p. 58).In<br />

order to make our exploration on the current adoption and use of<br />

government apps more systematic, we decided to look for current<br />

applications in the top 10 countries in the 2010 UNPAN e-<br />

Government Survey [24]. Given that we did not find enough<br />

examples in these initial countries, we decided to increase the<br />

sample size, exploring the first 35 countries in the list,, finding<br />

applications only in 7 out of the 35. We started our search on the<br />

main country websites, exploring to find mobile applications<br />

and/or publicly available data sets. We visited the English<br />

versions of each website during January and February 2012.<br />

4. Government Apps: an Exploratory Survey<br />

The current section of the paper presents an overview of the use of<br />

apps and some examples of how governments are making<br />

available apps for citizens.<br />

4.1 App use by Governments<br />

Results from our initial survey are shown on Table 1. US apps are<br />

mainly linked to the Data.gov website. The apps from U.K. are<br />

linked to the Direct Gov site. In the case of Canada, we did not<br />

found the official number of apps, but we identified some apps<br />

that match our criteria. Similar cases are New Zealand and Japan.<br />

We have four main findings from this sample. The first one, is<br />

that the total number of apps in each country is not easy to find<br />

given that they are not always readily available in a single<br />

repository. On the other hand, only 7 out of 35 countries are<br />

apparently using this kind of applications, which still seems as a<br />

low level of adoption. The second finding is related to the use of<br />

the apps, most of them are focus on access government content, a<br />

very few enable citizens to interact with government sending data,<br />

reusing it, or collaborate making comments using the apps.<br />

Table 1. Apps and categories on egov websites in our sample<br />

Country #Apps<br />

UNITED<br />

KINGDOM<br />

Mobile<br />

Apps<br />

Web-based<br />

Apps<br />

1854 103 1751<br />

UNITED STATES 1164 153 1011<br />

CANADA N.A. N.A. N.A.<br />

AUSTRALIA 80 25 55<br />

SINGAPORE N.A. 61 N.A.<br />

KOREA N.A. 6500 N.A.<br />

SWEDEN N.A. 1 N.A.


As a third finding, we also found a limited number of apps related<br />

to citizens’ relevant issues such as health or finances. We found<br />

also a number of apps for personal development, and not related<br />

to government information. Finally, the fourth finding is that<br />

some apps are created not only by government, but also by<br />

citizens, non-government organizations or consultants. Some of<br />

these apps are developed with marketing purposes such as<br />

acquiring clients, recognition or just to contribute for government.<br />

In this way, open data is in fact opening the opportunity of<br />

sharing, collaborating and disseminating knowledge through this<br />

kind of applications.<br />

4.2 Selected Examples of Government Apps<br />

on Several Application Domains<br />

In order to give a better sense of the kinds of applications that are<br />

being made available for mobile devices, we introduce in this<br />

section several examples of the different kinds of apps that is<br />

possible to find in government web sites in our sample.<br />

One kind of applications that we found involves apps addressing<br />

the needs of individuals to search and manage information. The<br />

example we selected is Ask Karen from the US Department of<br />

Agriculture (see Figure 1a). Ask-Karen provides 24/7 virtual<br />

assistance and tips on preventing foodborne illness, safe food<br />

handling and storage, and safe preparation of meat, poultry, and<br />

egg products.<br />

The Accounting and Corporate Regulatory Authority (ACRA) has<br />

developed the ACRA app. This app searchs on the agency<br />

database to check if a business firm, company, has limited liability<br />

partnership (LLP), limited partnership (LP), Public Accounting<br />

Corporation (PAC) or Public Accounting Firm (PAF) is registered<br />

in Singapore in order to validate this data. One of the main<br />

features is to search by name or business registration number (see<br />

Figure 1b).<br />

(a) (b)<br />

Figure 1. Information App: Ask Karen and Content Access<br />

App: ACRA<br />

A different version is the ACRA iPhone app which provides the<br />

business community free information that would help users in<br />

their decision-making and planning. This application is a mobile<br />

directory search function facilitates the search of names of all<br />

business firms, local companies, foreign companies, limited<br />

liability partnerships (LLP). A complementary feature is<br />

ASKACRA Mobile, which allows to have easy access to a FAQs<br />

section on related business.<br />

We found applications that can be used for educational purposes.<br />

“Libraries for Ottawa” is an application providing access to the<br />

information of different libraries in the region (Figure 2a). The<br />

application provides name, address, phone number and location<br />

32<br />

using Google Maps, hours of operation. It is important to mention<br />

that this application is an independent development that uses data<br />

from the official website. The author is SKB Wireless<br />

Technology.<br />

Another kind of applications we found can be categorized as<br />

simulation apps. For example, an online financial health checker<br />

has been launched to help people make the most of their money in<br />

the UK website. The application offers money advice on the basis<br />

of a series of queries to the user. Application developers declare<br />

that they care about confidentiality of the user answers. The<br />

author is Direct Recruit LTD (see Figure 2b).<br />

(a) (b)<br />

Figure 2. Educational App: Public Libraries and Simulation<br />

Software: Health Check<br />

One last type of apps that we were able to identify constitutes a<br />

mobile enterprise application. GovPro is a remarkable example<br />

for e-procurement and purchasing of Government. This<br />

application delivers news, product trends and events in the<br />

government market place. The Author is Penton Inc (see Figure<br />

3).<br />

Figure 3. Enterprise Software: GovPro<br />

These are only few examples of the current diversity of mobile<br />

applications and its use in government.<br />

5. FINAL REMARKS<br />

In this paper we have presented some initial findings related to the<br />

use of mobile apps on e-government portals of the top countries<br />

according to the United Nations 2010 survey on e-Government<br />

[24]. Only 7 of the 35 selected countries have adopted this kind of<br />

applications by the time we did the review. Similarly to main<br />

corporations, governments may consider to include a single<br />

repository of government apps to improve discoverability, as it is<br />

one of the main determinants of app adoption by the citizen. Even<br />

this small sample size, governments are fostering the use of apps<br />

to interact with open data. We can not measure this impact yet,<br />

because only a few government websites make available the


information of their apps. However, further research could show<br />

this new trend as a facing change on the government strategy for<br />

interact with citizens.<br />

Previous research reports that government portals expand their<br />

capabilities by using web 2.0 tools, empowering citizens to<br />

collaborate with government and other NGOs to produce relevant<br />

information and solve important citizen problems. That is to say,<br />

governments expands their own limits when a citizen can send<br />

reports of problems with public services or safety problems,<br />

allowing government to respond faster, and overtime,<br />

accumulating information to respond better [3]. Our initial<br />

exploration suggests that most common applications are still those<br />

to access information, and that we are still short of applications<br />

that will increase government-citizen collaboration.<br />

If analysts are correct in their predictions of the predominance of<br />

mobile over desktop devices by 2015[6], the initial trend reported<br />

here has the potential of transforming the current ways in which<br />

government attempts to get in touch with their constituencies,<br />

moving to a digital convergence of voice, text and multimedia in<br />

the citizen’s smartphone. More research is needed on the new<br />

roles that government portals should play in this transformation<br />

process.<br />

Our research provides some preliminary evidence that suggests<br />

government portals are changing direction [7]. Also citizens are<br />

using open data for their own purposes and developing new apps<br />

to interact with government data. This change on the relationship<br />

among citizen-Government interaction must be analyzed and<br />

promoted as a new trend of collaboration and coproduction.<br />

Finally, current trends and analysis suggest that ecosystems of<br />

citizens, vendors and developers will be created around<br />

government open data, and most analysis are quite optimistic [3].<br />

There are also other potential constraints related to attitudes of<br />

citizens towards privacy, credit card adoption or language [25].<br />

This paper is then a first step in the direction to understand the use<br />

of government mobile apps, its evolution and impact on<br />

government innovation.<br />

6. ACKNOWLEDGMENTS<br />

This research is partially supported by the Consejo Nacional de<br />

Ciencia y Tecnología (CONACYT) in Mexico under grant No.<br />

107154. Any opinions expressed in this material are those of the<br />

authors and do not necessarily reflect the views of CONACYT.<br />

7. REFERENCES<br />

[1] Scholl, H. J. and Luna-Reyes, L. F. Transparency and<br />

openness in government: a system dynamics perspective. In<br />

Proceedings of the Proceedings of the 5th International<br />

Conference on Theory and Practice of Electronic Governance<br />

(Tallinn, Estonia, 2011).<br />

[2] Parks, W. The Open Government Principle: Applying the<br />

Right to Know under the constitution. The George Washington<br />

Law Review, 26, 1 1957), 1-22.<br />

[3] Nath, J. Reimagining government in the digital age. Fall, City,<br />

2011.<br />

[4] Trimi, S. and Sheng, H. Emerging trends in M-government.<br />

Communications of the ACM, May2008), 53-58.<br />

[5] Anthes, G. Invasion of the mobile apps 2011, p 18-18.<br />

[6] Milam, L. and Avery, E. J. Apps4Africa: A new State<br />

Department public diplomacy initiative. Public Relations Review,<br />

38, 2 2012), 328-335.<br />

33<br />

[7] Sandoval-Almazan, R. and Gil-Garcia, J. R. Are E-<br />

Government Portals Becoming Central Components for Public<br />

Information Sharing Networks? An Initial Exploration of Local<br />

Governments in Mexico. Government Information Quarterly,<br />

Forthcoming2011).<br />

[8] Reynolds, W. N., Weber, M. S., Farber, R. M., Corley, C.,<br />

Cowell, A. J. and Gregory, M. Social media and social reality.<br />

City.<br />

[9] Mennecke, B. E., Mc Neill, D., Roche, E. M., Bray, D. A.,<br />

Townsend, A. M. and Lester, J. Second Life and Other Virtual<br />

Worlds: A Roadmap for Research. Communications of the<br />

Association for Information Systems2008), 371-388.<br />

[10] Kavanaugh, A., Fox, E. A., Sheetz, S., Yang, S., Li, L. T.,<br />

Whalen, T., Shoemaker, D., Natsev, P. and Xie, L. Social Media<br />

Use by Government : From the Routine to the Critical. Computers<br />

and Society2011).<br />

[11] Haythornthwaite, C. Democratic Processs in Online Crowds<br />

and Communities. In Proceedings of the Conference for<br />

Democracy and Open Government (Austria, May 2011, 2011),<br />

[insert City of Publication],[insert 2011 of Publication].<br />

[12] Woods, E. Web 2.0 and the public sector - Public Sector -<br />

Breaking Business and Technology silicon.com Driving Business<br />

Through technology, City, 2007.<br />

[13] Wilson, D., Lin, X., Longstreet, P. and Sarker, S. Web 2.0: A<br />

Definition, Literature Review, and Directions for Future Research.<br />

AISNET.org, City, 2011.<br />

[14] de Kool, D. and van Wamelen, J. Web 2.0: A New Basis for<br />

E-Government? , City, 2008.<br />

[15] Lerman, K. User Participation in Social Media: Digg Study.<br />

2007 IEEEWICACM International Conferences on Web<br />

Intelligence and Intelligent Agent Technology Workshops,<br />

02007), 255-258.<br />

[16] Näkki, P., Bäck, A., Ropponen, T., Kronqvist, J., Hintikka,<br />

K. A. and Harju, A. Social media for citizen participation Report<br />

on the Somus project. City, 2011.<br />

[17] Mascaro, C. M., Novak, A. and Goggins, S. Shepherding and<br />

Censorship: Discourse Management in the Tea Party Patriots<br />

Facebook Group. IEEE, City.<br />

[18] Isaacson, W. Steve Jobs Biography. Simon & Schuster;,<br />

2011.<br />

[19] Pocatilu, P. Developing Mobile Learning Applications for<br />

Android using Web Services. City, 2010.<br />

[20] B. Boardman No app for that? Write one! Industrial<br />

Engineer: IE, 44, 3 (Marzo 2012.), 44–48.<br />

[21] Beer, D., Kunis, R. and Runger, G. A component based<br />

software architecture for e-government applications. Ieee, City,<br />

2006.<br />

[22] Estevez, E. and Janowski, T. Programmable Messaging for<br />

Electronic Government - Building A Foundation. LNCS,<br />

Springer, City, 2007.<br />

[23] Hewson, C. Internet-mediated research as an emergent<br />

method and its potential role in facilitating mixed methods<br />

research. Guilford Press, City, 2008.<br />

[24] United Nations Global E-Government Development Report<br />

2010. City, 2010.


Session 2<br />

E-democracy & Participation 1


A Logistic Multilevel Model for Civic Engagement and<br />

Community Group Impact in the Digital Age<br />

B. Joon Kim<br />

Department of Public Policy<br />

Indiana University-Purdue University Fort Wayne<br />

Fort Wayne, Indiana, 46805<br />

+1-260-481-0133<br />

ABSTRACT<br />

kimbj@ipfw.edu<br />

Prior research has demonstrated that a citizens’ socioeconomic<br />

status is a significant determinant of the extent of citizen<br />

involvement via ICT [18]. Others have focused on its impact on<br />

civic engagement in terms of community group impacts, finding<br />

that such groups play an important role in increasing citizen<br />

involvement within democratic processes [8]. Thus, previous<br />

research has examined effects aggregated at the ‘individual level’<br />

and ‘group level,’ respectively. This paper seeks to reconcile these<br />

levels in order to assess the impact of ICT on civic engagement.<br />

Our study examines the interplay of individual level and<br />

community group level factors through analysis of the data from a<br />

household survey (N=717) taken in Blacksburg, Virginia in 2005.<br />

This study identifies the idiosyncratic influences at both levels by<br />

applying a multilevel model (specifically, a logistic hierarchical<br />

linear model). In particular, we verify the positive impact of<br />

community groups utilizing ICT in increasing civic engagement.<br />

This research will be used to form the basis of a comparative<br />

study of civic engagement through eGovernment portals, mobile<br />

technology and social media, and to assess their impact on<br />

facilitating group communication and sensemaking.<br />

Categories and Subject Descriptors<br />

H.5.3 [Information Interfaces and Presentation]: Group and<br />

Organization interfaces-Collaborative Computing.<br />

General Terms<br />

Measurement, Human Factors, Theory<br />

Keywords<br />

E-governance, Civic Engagement, Information and<br />

Communication Technology, Community Group Impact,<br />

Hierarchical Linear Model.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

34<br />

Stephen W. Kleinschmit<br />

Department of Public Policy<br />

Indiana University-Purdue University Fort Wayne<br />

Fort Wayne, Indiana, 46805<br />

+1-260-481-6351<br />

kleinscs@ipfw.edu<br />

1. INTRODUCTION<br />

Information and communication technology (ICT) has the<br />

potential to significantly increase citizen participation within<br />

democratic community processes [6, 9]. Such technology has also<br />

been credited with establishing new forms of social interaction<br />

among citizens and governmental agencies. Web 2.0 technologies<br />

are also providing new mechanisms for civic engagement,<br />

political expression and public discussion [19], while others have<br />

found that these technologies are important for facilitating and<br />

augmenting the dynamics of political and civic engagement [9,<br />

12]. The use of ICT can be used to as a mechanism to reverse the<br />

decline of social capital in community groups. Putnam [13]<br />

describes the steady decline of group membership in the United<br />

States, which has led to a complimentary decrease in community<br />

involvement. Though he attributes some of this decline to the<br />

isolation effect of internet communication, paradoxically online<br />

communication can also be used to foster civic engagement and<br />

political expression, particularly when it is used to acquire and<br />

share information within community groups. [8, 9].<br />

Previous research has focused on exploring the effect of ICT on<br />

civic engagement, modeling its effects at the ‘individual level’<br />

and ‘group level’ respectively. This study applies a multilevel<br />

model to analyze the community group impact on civic<br />

engagement, in an effort to reconcile their effects. Therefore, the<br />

main research question is; Does the use of ICT affect the nature of<br />

civic engagement for citizens affiliated with community groups?<br />

Additionally, this study also examines; What effects do different<br />

types of community group affiliations, group ICT use (email,<br />

listserv, online discussion boards and websites, including blogs)<br />

have on the civic engagement of individual citizens? To study and<br />

discuss these questions in more detail, this paper is divided into<br />

four sections. First, this paper explores previous studies about the<br />

relationship between ICTs and online civic engagement in<br />

general. Next, we provide an overview of our research methods,<br />

with an emphasis on our explaining our hierarchical linear<br />

models. Then, the preliminary findings are presented before we<br />

discuss the implications of these findings.<br />

2. CONCEPTURAL BACKGROUND<br />

2.1 Civic Engagement in the Digital Age<br />

This study focuses on the civic engagement through the use of<br />

Information and Communication Technology (ICT). When we<br />

discuss the relationship between ICT and civic engagement, there<br />

are three different perspectives we use to explore this relationship:


two polarized (optimistic or utopian and negative or pessimistic)<br />

views and a skeptical standpoint [1, 7]. Optimists insist that<br />

interactive ICT improve connections between citizens and public<br />

bureaucrats, improve public policy-making processes and grow<br />

trust by promoting government transparency and accountability.<br />

With the adoption of interactive technology, improvements to<br />

public deliberation and participatory democracy can be realized [2,<br />

17]. Therefore, ICT is viewed as a means for invigorating<br />

democracy. Conversely, pessimists argue that such mechanisms<br />

for discourse are less likely to mobilize citizens and more likely to<br />

reinforce the power and status of political elites [4, 12]. The<br />

promise of true participatory democracy online is thus undercut<br />

by the problem of demographic representativeness; those who use<br />

it are significantly younger, wealthier and more educated than the<br />

average person [4].<br />

Finally, scholars representing the skeptical standpoint argue that<br />

the ICT neither improves nor reduces civic engagement [1, 14].<br />

Margolis and Resnick suggest that ICT is taking on the features of<br />

ordinary life [11], and Putnam [14] insists that such measures are<br />

likely to displace personal engagement and thus may fail to<br />

generate social capital. Furthermore, some argue there is little<br />

evidence to support a significant relationship between the<br />

evolution of ICT use and levels of civic engagement [1]. As<br />

suggested by the dispute among the polarized perspectives and the<br />

skeptical view, the nature and extent of the impacts of the ICT on<br />

civic engagement are not yet fully understood. Each point of view<br />

has shortcomings. Nevertheless, it can serve a useful<br />

supplementary function. The ICT had not yet profoundly<br />

impacted social trends, but felt it would play an important part of<br />

explaining the contemporary context of a person’s overall civic<br />

and political life. Subsequent developments such as Facebook,<br />

iPods, instant messaging, and text messaging have shown that<br />

citizens, particularly younger generations, are particularly<br />

“plugged in.”<br />

2.2 Bridging Individual and Group Levels of<br />

Analysis: A Logistic Multilevel Model<br />

Past studies have investigated the relationship between ICT use<br />

and civic engagement by modeling behavior at the individual<br />

level, while also considering effects at the group (contextual)<br />

level. By examining both levels through the same level of<br />

analysis, the results were potentially insignificant or<br />

underestimation of variability across levels. According to Katz<br />

and Rice’s panel study of national survey data in the United States<br />

(1995, 1996, 1997, and 2000), internet users were significantly<br />

more likely to belong to at least one local group than non-internet<br />

users. At the same time, on an individual level, the internet has<br />

provided a platform for a significant number of additional forms<br />

of political activity [7].<br />

This paper focuses on detecting the group effects on individual<br />

citizens’ level of civic behavior. In other words, how much their<br />

community group (aggregate) level of ICT use and political<br />

interests affect an individual’s level of civic engagement, while<br />

controlling for their demographic characteristics. Explaining this<br />

effect requires a statistical model that addresses a hierarchically<br />

structured data problem. For example, a multistage sample must<br />

be used to model the effects of the group: first, we aggregate data<br />

at higher levels of organization (e.g., community groups), and<br />

next we sample the sub-units from the available units (e.g.,<br />

individual members from each community group). In such the<br />

35<br />

individual observations are clustered, thus are not truly<br />

independent. To accurately assess their effects, there is a need to<br />

differentiate fixed group effects from the random effects of<br />

individuals. Citizens within the same community group tend to<br />

share similar traits. Because of selection processes (e.g., groups<br />

aggregate those with similar socioeconomic status or interest) and<br />

because of common history, many citizens share the same<br />

affiliation. As a result, the average correlation (the so-called<br />

intraclass correlation) between variables shared by individual<br />

members of the same group will be higher than the average<br />

correlation between variables shared by those from different<br />

groups. Standard statistical tests lean heavily on the assumption<br />

of the independence of the observation. If this assumption is<br />

violated (and in multilevel data this is almost always the case), the<br />

estimates of the standard errors of conventional statistical tests are<br />

much too small, resulting in many spuriously significant results.<br />

Hierarchical linear model estimation accounts for nonindependent<br />

observation at the group level [15]. In this study, a<br />

logistic multilevel model is used, then this study estimates<br />

the effects of group level characteristics on an individuals’<br />

level of volunteerism, after controlling for other demographic<br />

variables 1 . Level two consists of group variables and level one<br />

consists of individual variables. The equations estimated for the<br />

base model of this study are:<br />

Level 1:<br />

π ij =logistic ( β 0 j + β1<br />

j poleff ij + β 2 jrtrust<br />

ij + β 3 jedu<br />

ij + β 4 jage<br />

)<br />

ij<br />

Level 2:<br />

β0 j = γ 00 +γ 01grpictuj + u0 j<br />

β 1 j = γ 10 + u 1<br />

β 2 j = γ 20 + u 2<br />

β 3 j = γ 30 + u 3<br />

β 4 j = γ 40 + u 4<br />

3. METHODS<br />

In order to achieve a more in depth investigation of citizens<br />

affiliated with community groups, this paper uses a logistic<br />

multilevel analysis (a two level model) with a single binomial<br />

dependent variable, volunteer. The outcome individual averages<br />

that are used as 1group level variables are often interpreted as<br />

‘direct and contextual effects.’ To facilitate contributions to the<br />

reconciliation between these levels of analysis, the following<br />

hypothesis is examined:<br />

o Hypothesis: Individual civic engagement (volunteer work)<br />

would be greater in local groups with higher group ICT<br />

(email, listserv, online discussion boards, and websites,<br />

including blogs) use, taking into account individual<br />

citizens’ psychological characteristics (the level of political<br />

efficacy and the extent of social trust) and socioeconomic<br />

variables (age and education).<br />

1 To develop a parsimonious model, we included variables which focused on<br />

our research question. However, we also tested control variables which<br />

were revealed significant effects in prior studies such as education, income<br />

and age. We then excluded statistically insignificant controlling variables.


3.1 Dependent Variable<br />

Civic Engagement: (Variable name: volunteer 2 ): “whether you<br />

(individual citizens) are doing volunteer works or not” (Scale:<br />

0=no, 1=yes).<br />

3.2 Independent Variables<br />

3.2.1 Individual Level Variables<br />

Political Efficacy (Variable name: poleff): the extent to<br />

agreement that “sometimes local politics and government seem so<br />

complicated that person like me can’t truly understand what’s<br />

going on (Scale: 1- 4) (1=strongly agree, 2=somewhat agree,<br />

3=somewhat disagree, 4=strongly disagree)<br />

Social Trust (Variable name: rtrust): the likelihood of answering<br />

to “what extent do you think most people in the local area can be<br />

trusted” (Scale: 1-4) (1=not at all, 2=not very much, 3=somewhat,<br />

4=very much)<br />

Control variables (education and age): the answer of “what is the<br />

highest level of formal education you have completed” (converted<br />

scale: years) and the answer of “in what year were you born”<br />

(converted scale: years)<br />

3.2.2 Group Level Variables<br />

Group ICT Use: (Variable name: grpictu) within your local<br />

group, group use of ICT for communication (email/listserv, online<br />

discussion boards, and websites including blogs) (scale: 0=never<br />

used all three items at any groups - 9=used all items at all three<br />

groups)<br />

3.3 Data and Measures<br />

This study is based on household telephone survey data from the<br />

town of Blacksburg, Virginia and surrounding areas in 2005<br />

(spring 2005; N=717; 40% response rate). As part of larger<br />

research project (National Science Foundation IIS-0429274),<br />

survey questions cover current ICTs use and practice among local<br />

citizens, local community groups and government representatives.<br />

In particular, the author is interested differences among individual<br />

citizens affiliated with local groups and their ICT use for civic<br />

engagement.<br />

4. FINDINGS<br />

This study examined a logistic multilevel model for detecting the<br />

local group effects on civic engagement, with respect to the<br />

individual citizens’ likelihood of doing volunteer work. To<br />

understand the effect of ICT use of community groups, the model<br />

takes into account individual citizens’ political efficacy, level of<br />

trust on other local people, the level of education and age in the<br />

lower individual level. Group Internet use constitutes the group<br />

level variable. The following shows the results of logistic<br />

multilevel model without two.<br />

x<br />

Applying the logistic transformation e<br />

g(<br />

x)<br />

=<br />

to these estimates<br />

x<br />

1+<br />

e<br />

1.<br />

5107<br />

produces an estimated volunteer rate of 81.9% ( e<br />

= ) based on<br />

1.<br />

5107<br />

1+ e<br />

all individual citizens (typical probability). The result shows that<br />

2 In this study, we used the volunteerism as a measure of civic engagement.<br />

36<br />

there is statically significant intraclass correlation (random effect:<br />

p


through aggregating, shaping, and cultivating collective public<br />

interest, will, and competence via ICT in the digital ages. The<br />

results suggest a positive association between citizens’<br />

involvement in community groups of their civic engagement with<br />

group ICT use. Although there are several limitations such as<br />

small sample size and limited group level data, this paper presents<br />

ways to adapt and to present the potential use of multilevel<br />

analysis to examine civic engagement through logistic multilevel<br />

models. This study seeks to contribute to the understanding of<br />

growing evidence that ICT can be used as a useful mechanism for<br />

increasing the civic engagement of citizens affiliated with<br />

community groups.<br />

6. REFENCES<br />

[1] Bimber, B., Information and American Democracy:<br />

Technology in the Evolution of Political Power. New York:<br />

Cambridge University Press, New York, 2003.<br />

[2] Browning, G., Electronic Democracy: Using the Internet to<br />

Transform American Politics, 2nd ed. Medford, NJ: Cyber<br />

Age Books, Medford, NJ, 2002.<br />

[3] Castells, M. The Rise of the Network Society. The<br />

Information Age: Economy, Society and Culture, 1,<br />

Blackwell, Oxford, 1996.<br />

[4] Davis, R., Politics Online: Blogs, Chartrooms, and<br />

Discussion Groups in American Democracy. Routledge, New<br />

York, NY, 2005.<br />

[5] Gallant, L. M., Boone, G. M., and Heap, A. Five heuristics<br />

for designing and evaluating web-based communities. First<br />

Monday: Peer-Reviewed Journal on the Internet, 12, 3, 2007,<br />

1-15.<br />

[6] Galston, W.A. Civic education and potlical participation.<br />

American Political Science Assocaition, College Park, MD,<br />

2004.<br />

[7] Katz, J. E., and Rice, R.E., Social Consequences of Internet<br />

Use: Access, Involvement, and Interaction. Cambridge, MA:<br />

MIT Press, Cambridge, MA, 2002.<br />

[8] Kavanaugh, A., Zin, T.T., Rosson, M. B., Carroll, J. M.,<br />

Schmitz, J., and Kim, B. J., Local groups online: Political<br />

learning and participation. Journal of Computer Supported<br />

Cooperative Work (Published Nov. 16). 2006. Available<br />

online at:<br />

http://www.springerlink.com/content/tk770mu72w4v6483/fu<br />

lltext.pdf.<br />

[9] Kim, B. J, Kavanaugh, A, and Hult, K. Local Community<br />

Groups and Internet Use: Examining Contents of Local<br />

Community Groups’ Websites. The International Journal of<br />

Technology, Knowledge and Society, 2, 7, 2007, 207-221.<br />

[10] Lukensmeyer C. J. and Torres, L. H. Public Deliberation: A<br />

Manager’s Guide to Citizen Engagement. IBM Center for the<br />

Business of Government, 2006.<br />

[11] Margolis, Michael., and David Resnick, D., 2000. Politics As<br />

Usual: The Cyberspace. Sage Publications, Thousand Oaks,<br />

CA: Sage Publications,. 2000.<br />

37<br />

[12] Norris, P., Digital divide: Civic engagement, information<br />

poverty and the Internet. Cambridge University Press, New<br />

York, 2001.<br />

[13] Putnam, R. D. Bowling Alone: America’s Declining Social<br />

Capital. Journal of Democracy, 6, 1995, 65-87.<br />

[14] Putnam, R.D. Bowling Alone: The collapse and revival of<br />

American community. Simon and Schuster, New York, NY,<br />

2000.<br />

[15] Raudenbush, S., Bryk, A., and Congon, R. HLM:<br />

Hierarchical linear and nonlinear modeling. Sage, Newbury<br />

Park, CA, 1998.<br />

[16] Raudenbush, S., and Bryk, A. Hierarchical Liner Models:<br />

Application and Data Analysis Methods (2 nd ed.) Sage,<br />

Thousand Oak, CA, 2004.<br />

[17] Rheingold, H., The Virtual Community. Addison-Wesley<br />

Publishing, 1993.<br />

[18] Schlozman, K. L., Verba, S., and Brady, H. E. 2010. Weapon<br />

of the strong? Participatory inequality and the internet.<br />

Perspectives on Politics, 8(2), 487-509.<br />

[19] Shah, D. V., Cho, J., Everland, W. P., and Kwak, N.<br />

Information and Expression in a Digital Age: Modeling<br />

Internet Effects on Civic Engagement. Communication<br />

Research, 32, 5 (Oct. 2005), 531-565.


Designing Online Deliberation Using Web 2.0<br />

Technologies: Drafting a Bill of Law on Internet Regulation<br />

in Brazil<br />

ABSTRACT<br />

In this paper, we describe the formatting guidelines for the role of<br />

institutions and political practitioners in designing online<br />

consultation projects. As a case study we evaluate the Brazilian<br />

government-run initiative known as Marco Civil Regulatório that<br />

used web 2.0 tools to draft a bill of law on Internet legislation<br />

with the aid of citizen’s participation. Findings presented in this<br />

article are based on a set of interviews held with policy makers<br />

responsible for designing and promoting the aforementioned<br />

project.<br />

This article contributes to the debates on how deliberative rules<br />

and technology overlap in early stages of policy design. Our case<br />

study supports the argument that Internet has potential to provide<br />

a democratic space, but public consultations need to be<br />

established, funded, promoted and regulated; tasks that are<br />

performed by institutions (not by technology or citizens alone).<br />

For that reason, institutions are key to understand how web 2.0<br />

technologies can be useful for citizens and governments in<br />

designing tools for consultation, deliberation and decision-making<br />

Categories and Subject Descriptors<br />

K.4.1 [Computers and society]: Public Policy Issues<br />

General Terms<br />

Management, Design, Theory, Legal Aspects<br />

Keywords<br />

Online consultation; E-democracy; web 2.0<br />

1. INTRODUCTION<br />

Previous research on the use of web 2.0 tools for online<br />

consultations has argued that design matters. As Wright and Street<br />

claim, “political choices are made both about the format and<br />

operation of the online discussion … we should view deliberation<br />

as dependent on design and choice, rather than a predetermined<br />

product of the technology” [12]. At the same time, authors have<br />

argued that institutions matter to a great extent. As Fischer argues<br />

“not that institutions cause political action; rather, it is their<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Fabro Steibel<br />

LAMIDE/PPGCOM/ UFF (Brazil)<br />

CTS/FGV/RJ (Brazil)<br />

ofabro@ofabro.com<br />

38<br />

discursive practices that shape the behaviors of actors who do …<br />

structural relationships give shape to both social and political<br />

expectations and the possibility of realizing them” [4].<br />

Inspired by both arguments, this article explores the conceptual<br />

gap between focusing either on design or on institutions and<br />

presents an analysis of the role played by institutions in designing<br />

deliberative tools. Our evidence is based on interviews held with<br />

political practitioners who participated in the design of the Marco<br />

Civil Regulatório case (hereafter noted as MCR). The MCR was a<br />

government-run initiative that during 90 days of online<br />

consultation received more than two thousand contributions from<br />

the general public, which were later “translated” by interviewees<br />

into a Bill of Law sent to Congress. This article focuses on policy<br />

decisions political practitioners concerning the design of web 2.0<br />

tools for online deliberation, and we explore how institutional<br />

characteristics affects the role of technology used for online<br />

consultations.<br />

This article is divided in three sections: the first section presents<br />

our theoretical framework on the role of design and institutions in<br />

online consultations, our methodological framework and presents<br />

the case study here addressed. The second section discussed the<br />

influence of institutions and institutional context in the design of<br />

online consultation portals. The last section presents the emerged<br />

conceptual framework to analyze similar cases and some lessons<br />

learned.<br />

We expect this article to contribute to the debate about the role of<br />

institutions in using technology for development and democracy.<br />

Our evidence shows that institutions sponsoring the MCR<br />

initiative were key to understand how web 2.0 technologies were<br />

made useful for citizens and governments to collaborate,<br />

deliberate, take decisions and – hopefully – to connect.<br />

1.1 Methodology<br />

Findings presented in this article are based on a set of interviews<br />

held with policy makers responsible for designing and promoting<br />

the MCR project. The three main objectives of this research are:<br />

(a) formulating hypotheses on what contextual elements favored<br />

the launch of the MCR project; (b) evaluating how deliberative<br />

rules and technology overlapped in early stages of policy design;<br />

and (c) mapping good practices regarding the mix of different web<br />

2.0 technologies on designing online deliberation experiences for<br />

drafting legislation purposes. The source of data used in this<br />

project comes from eight in-depth interviews conducted with six<br />

public servants, academics and web designers responsible for<br />

planning and executing the MCR project, selected based on a tworound<br />

sampling procedure. All interviews were semi-structured


in-depth expert interviews, and were analyzed based on a mixedmethod<br />

approach to qualitative data analysis [10].<br />

1.2 About the Case Study<br />

Generally speaking, the Marco Civil Regulatório project (MCR) is<br />

seen as enormously successful. Defining what “success” means in<br />

terms of deliberative practices requires defining normative<br />

standards by which democracy is being evaluated, which is far<br />

from being a settled matter [3, 5, 6, 8]. Nonetheless, considering<br />

that the MCR project is the first of its kind in Brazil, that during<br />

the consultation project their webpage received around two<br />

thousand contributions from the general public, that later projects<br />

refer to it as a keystone reference, and most importantly, that the<br />

project succeeded in translating the concerns received online into<br />

a draft legislation to be sent to Congress, we can argue that the<br />

MCR project was indeed enormously successful.<br />

The government’s decision to run public consultations projects to<br />

make informed decisions is far from a novelty in public<br />

administration. In Brazil, for example, they are even regulated in<br />

specific legislation (D4176/2000). However, what makes the<br />

MCR project new is not the government’s decision to run a public<br />

consultation on how to regulate the Internet, but rather the<br />

decision to run it with the aid of Internet itself. Expanding the<br />

locus of debate from physical spaces (such as the hearing rooms<br />

located in the capital city of Brasilia) to an open and public URL,<br />

capable of hosting a policy debate online, is something<br />

interviewees perceive to have never been before. Interviewees<br />

recall some isolated cases where online technology has been used<br />

by government to “consult” experts or common citizens, and they<br />

remember cases of the government considering running public<br />

consultations online, but the MCR project is perceived as the<br />

pioneer of its kind, something so important that interviewees<br />

describe it as an event that “upgraded” how public consultations<br />

are run in the country.<br />

The MCR project is a joint initiative of the Ministry of Justice (the<br />

project's initiator) and the Centre for Technology and Society<br />

(CTS, hosted at the think thank foundation Getúlio Vargas, in Rio<br />

de Janeiro). Apart from these two organizations, the project also<br />

received direct support from the Ministry of Culture, and indirect<br />

assistance from other governmental bodies (i.e., the Ministry of<br />

International Relations), and ad hoc contributions from civil<br />

society organizations and several Internet activists. As such, the<br />

MCR project was a government initiative, which, with the aid of<br />

an important think thank, and of civil society, established itself as<br />

a one-of-a-kind online policy debate forum.<br />

The general objective of the MCR project was to draft an Internet<br />

Law to be submitted to Congressional vote. The bill was designed<br />

to suggest a set of legal principles and rights to guide future<br />

Internet legislation in the country, and the whole consultation<br />

experience was designed to be based on online collaborative<br />

practices. The project ran from October 2009 to May 2010, and it<br />

resulted in an online forum where politicians, academics, artists,<br />

NGOs, companies, individuals and other stakeholders with an<br />

interest in the topic could post, blog, debate and comment on the<br />

possible design of the future Internet legislation.<br />

1.3 The Use of Technology for Deliberation<br />

The MCR project made use of several web 2.0 tools (mainly<br />

Wordpress platform, Twitter, rss feeds, and blog) and it was<br />

39<br />

divided in two rounds of discussion: during the former people<br />

were invited to comment on a “white paper” with a set of general<br />

ideas that broadly oriented the future draft; during the latter<br />

people were invited to comment on the draft legislation as<br />

formatted to be sent to Congress. As interviewees describe the<br />

process, the first round of debate tested a set of normative<br />

standards, pre-defined by those sponsoring the initiative, that were<br />

considered important to be included in future legislation; while<br />

the second round focused on receiving feedback on the draft law<br />

itself.<br />

What is important to notice is that during both periods of<br />

consultations users could comment only on pre-defined topics,<br />

said by interviewees to focus on three axes of discussions:<br />

individual and collective rights (i.e., privacy, freedom of speech,<br />

and access to rights), principles related to intermediaries (i.e., net<br />

neutrality and civil liability), and governmental directives (i.e.,<br />

openness, infrastructure, and capacity building). Therefore,<br />

although the online consultation project was a collaborative<br />

practice, one initiative open for the general public to engage and<br />

share their opinions, citizens were invited mostly to offer<br />

suggestions, but not to decide on what topics were open for<br />

debate, nor on what writing the final draft would have.<br />

According to interviewees, the MCR project started in<br />

September/2009, when public servants from the Ministry of<br />

Justice invited policy experts from the Centre of Technology and<br />

Society to design the online platform. Two months later, the<br />

website was launched and the consultation period started<br />

(remaining open until mid 2010, when the final draft of the law<br />

draft was concluded). During the two periods of consultation over<br />

2,000 contributions from individual users, governmental and nongovernmental<br />

entities were received. Policy makers were<br />

responsible for gathering comments and writing the final draft<br />

bill, which, as concluded, includes 25 articles divided into 5<br />

chapters concerning users’ rights and general principles for the<br />

regulation of the Internet.<br />

Analyzing the interviews we can argue that the MCR project was<br />

based on three main tenets: first, it aimed to design legislation<br />

based on solid judicial grounds, a legal piece of work ready to be<br />

sent for Congressional hearings; two, it aimed to create policies<br />

capable of securing existing and future individual rights over the<br />

web; third, it intended from the start to be based on collaborative<br />

practices and public debate constructed with aid of web 2.0 tools.<br />

Interviewees constantly refer to the union of these three tenets<br />

(judicial grounds, oriented to secure individual rights and based<br />

on a collaborative online debate) as key motivations behind the<br />

MCR project and as the keystones of their online consultation<br />

initiative.<br />

2. INSTITUTIONAL CONTEXT<br />

Analyzing data referring to this topic, we identify four contextual<br />

elements that need to be taken into consideration, namely: the<br />

engagement of cyber activists around the social movement known<br />

as “Mega não”; the think tank activities of CTS in opposing the<br />

Lei Azeredo’s legal principles; the political agenda of the new<br />

executive branch who welcomed defining Internet as a social<br />

right; a shared understanding amongst policy makers that<br />

regulating a collaborative environment such as the Internet<br />

required the use of collaborative practices such as the ones found<br />

in the online world.


2.1 The Lei Azeredo<br />

If we analyze the main reasons mentioned by interviewees to<br />

justify why the MCR initiative emerged, most of events and<br />

contexts mentioned by interviewees make direct reference to the<br />

Lei Azeredo. The Lei Azeredo was a Bill of Law sent to the<br />

Lower chamber in 1999 (PL 84/99), and to the Senate in 2003<br />

(PLS 89/03). The Bill focused on regulating crimes over the<br />

Internet, framing Internet policy mainly from a Criminal Law<br />

perspective rather than from a Civil Law framework. The Lei<br />

Azeredo was heavily criticized by cyber activists, think thank<br />

organizations and particularly by Luiz Inácio Lula da Silva’s<br />

(Lula) government (2002-2010) for trying to regulate crimes over<br />

the Internet in a context where civic rights over the web were still<br />

not defined. In fact, as interviewees claim, the projects name<br />

“Marco Civil” (“Civil Regulatory Framework” in English) was<br />

chosen precisely to make clear their opposition to discussing<br />

criminal codes of conduct prior to securing civil rights and<br />

obligations related to Internet use.<br />

2.2 Cyber Activism<br />

The Lei Azeredo attracted, from the start, fierce criticism inside<br />

and outside online forums of debate, but it was mostly after 2009,<br />

with the launch of a blog know as “Mega não”, by the cyber<br />

activist João Caribé, that social opposition to the Lei Azeredo<br />

gained a coherent voice. The “Mega não” movement fuelled an<br />

intense activism in blogs, twitter and other social media that not<br />

only attracted even more online activists to the cause, but also<br />

received media coverage from niche national media and also<br />

motivated protest marches in a number of cities, having also<br />

themed important Internet-related events of the year [9].<br />

Interviewees argue that the existence of the “Mega não” social<br />

movement played a key role in the overall success of the MCR<br />

project. It is argued that those who were closely engaged with the<br />

“Mega não” movement were also those who pioneered the<br />

comment section of the project’s website; not only, activists<br />

linked to the “Mega não” movement were also said to be the ones<br />

who helped to publicize the MCR initiative by using their own<br />

twitter hashtags and blog networks to comment on the initiative.<br />

Interviewees mention that, at first, cyber activists were suspicious<br />

that their “bottom up” movement would be overlooked by the “top<br />

down” initiative they were being invited to join; nonetheless,<br />

interviewees say that gradually most “Mega não” supporters<br />

started to trust the MCR initiative as a real opportunity to push<br />

forward their own policy interests what, in return, attracted even<br />

more contributors and publicity to the MCR website.<br />

2.3 Policy Activism<br />

Another key element mentioned by interviewees refers to the<br />

policy activism of CTS. CTS was already known nationally and<br />

internationally for its policy agenda in favor of open source<br />

software, creative commons license, and other topics related to<br />

technology, law and society. Specifically in relation to the Lei<br />

Azeredo’s debate, CTS was also known for their two reports<br />

criticizing the draft bill proposal, which is perceived by<br />

interviewees to have increased their influence on government<br />

bodies, academics, and cyber activist networks.<br />

As interviewees from the Ministry of Justice claim, CTS’s public<br />

policy views were amongst the top reasons why they were called<br />

to co-author the MCR project. The Ministry of Justice was said to<br />

welcome CTS not only due to their opposition to the Lei Azeredo,<br />

40<br />

but also based on their shared ideas of designing online<br />

collaborative venues for policy making. And as interviewees from<br />

CTS argue, they welcomed the Ministry of Justice’s invitation<br />

because they perceived the initiative as an opportunity to push<br />

forward their own policy agenda, as much as a promising<br />

opportunity to influence politicians to support in the future policy<br />

debates based on collaborative online practices.<br />

2.4 Government’s Support<br />

The third element mentioned by interviewees as decisive in<br />

launching the MCR project was the executive government’s<br />

support. President Lula’s speech at the 2009 FILS international<br />

open-source conference is mentioned as the starting event for the<br />

entire initiative. During his speech, the president explicitly<br />

opposed to the Lei Azeredo’s proposal calling instead for an<br />

alternative bill securing Internet civic rights. Lula’s speech<br />

however was far from an isolated event; it simply illustrated a<br />

broad agenda pushed forward by the incumbent government to<br />

understand Internet as a challenging way of thinking civic social<br />

relations and governance. Experiences using Internet for policy<br />

making precede Lula’s government, backing to 1999 when IRC<br />

chat technology and blogs have been pilot for policy making<br />

inside government. Interviewees nonetheless stress that it was<br />

after Lula’s presidency start in 2002 that uses of Internet for<br />

policy development expanded. The role of the Ministry of Culture<br />

is mentioned as illustrative of this point, two projects in particular.<br />

The first, known as “Pontos de cultura”, linked government’s<br />

financial support to local cultural centers to the provision of<br />

Internet access to local community. The second, know as<br />

CulturaDigital.br, invited citizens to create and share their blogs<br />

and digital identities in a public and open-source Wordpress-based<br />

platform in order to foment policy deliberation online.<br />

2.5 Collaborative Policy Making Framework<br />

The last contextual element mentioned by interviewees refers to<br />

the emergence of new ways of combining law, society and<br />

technology. Due to the emergence of collaborative and networkbased<br />

technology, interviewees needed to re-conceptualize how<br />

their institutions understood knowledge production. CTS, the<br />

Ministry of Justice and the Ministry of Culture had pioneered in<br />

previous years several experiments investigating alternative<br />

governance models based on technology. CTS, for example, had<br />

been influential in supporting the use of the Creative Commons<br />

License; the Ministry of Justice and the Ministry of Culture<br />

piloted the portal Culturadigital.br, inviting cyber activists and<br />

hackers to share their opinions online. It is within this panorama<br />

that interviewees said to have welcomed the MCR project: as an<br />

opportunity to try out alternatives to the traditional governmentcentered,<br />

closed-doors process of policy making. As one<br />

interviewee phrases it, the MCR initiative was a “symbiotic<br />

movement between the way you define policy making, and the<br />

object of policy regulation … and it is within this ‘happy<br />

marriage’ between these two elements that we define what we<br />

aimed to achieve”.<br />

3. DESIGNING TECHNOLOGY FOR<br />

DELIBERATION<br />

One way to understand how policy forums are affected by web 2.0<br />

tools is evaluating, when public consultations are over, what<br />

answers citizens provided to government and what uses


government made of citizens’ contributions. These questions refer<br />

to the analysis of later stages of policy making, and do not reflect<br />

the analysis provided here. From a different starting point, this<br />

section focuses on earlier stages of deliberative processes,<br />

specifically evaluating how policy makers decided before the<br />

public was invited to contribute online what policy questions were<br />

open or closed for deliberation, and what technologies would be<br />

used to mediate such debate.<br />

In the case of the MCR project, understanding what policy issues<br />

were open or closed was straightforward – the MCR website<br />

reserved one page to list all topics open for discussion (i.e., civil<br />

responsibility of Internet users, right of expression, privacy and<br />

net neutrality) and another to list all topics closed for debate (i.e.,<br />

copyright, data protection and child pornography). The list of<br />

issues mentioned in the webpage was included in the interview’s<br />

questionnaire, and interviewees confirmed that in general terms<br />

these topics were the ones actually open and closed for<br />

deliberation.<br />

Nonetheless, beyond defining what issues are open or closed for<br />

discussion in policy debates (i.e., beyond defining on what people<br />

deliberate over), designing rules for policy debates requires also<br />

identifying and selecting tools to aid people and institutions to<br />

share their opinions with each other (i.e.., deciding on how people<br />

deliberate). In “offline” policy forums, such as the ones regularly<br />

run by the Congress with the aid of public meetings rooms, policy<br />

makers have to decide how large meeting venues have to be, what<br />

time and date meetings will take place and how present speakers<br />

can effectively share their opinions. In policy forums held online,<br />

similar decisions need to be made, addressing other issues such<br />

as: how people will have access to the forum’s website, what<br />

coding language will the webpage be written in, how comments<br />

will be visualized online, and how people will post their opinions.<br />

3.1 Designing Rules for Technology Use<br />

Due to the pioneer nature of online projects like the MCR<br />

initiative, we notice that designing rules to decide what people can<br />

debate over is a much simpler task than deciding on how<br />

technology is used for deliberation. As interviewees argue, they<br />

made decisions on what issues to deliberate over based on several<br />

background research tools they had at hand: they identified policy<br />

topics already under discussion in other spheres of government,<br />

planned to select topics that would increase chances of receiving<br />

support inside Congress, and favored topics that were likely to<br />

increase their project’s audience. Based on such analyses (which,<br />

by the way, are very similar to those available in “offline” policy<br />

consultations), policy makers had plenty of sources of input to<br />

strategically decide on what mix of policy issues was likely to<br />

increase the overall success of the project.<br />

The same does not apply when we analyze policy makers’<br />

decisions about how technology should be used for deliberation.<br />

As interviewees repeatedly point, the MCR project was a very<br />

experimental and challenging initiative. Interviewees report none -<br />

or at the most very few - previous projects to serve as models,<br />

relying mostly on their own private experience or ad hoc<br />

inspiration. Above all, interviewees say to have mainly decided on<br />

what technology to use based on a trial-and-error basis, reason<br />

why the most important source of input information mentioned in<br />

this regard is feedback provided by users reflecting decisions they<br />

had already taken.<br />

41<br />

Interviewees say for example to have chosen to use Wordpress<br />

based on the open-source nature of this technology; moreover,<br />

they also say they took this decision based on their personal<br />

expertise in running blogs of their own, as well as based on their<br />

awareness of the initiative Culturadigital.br run by the Ministry of<br />

Culture (that was later used to host the project website). The<br />

decision to create a comment section based on a “paragraph-byparagraph”<br />

lay-out, for example, was also generally inspired on<br />

some previous knowledge they had of the “The public index”<br />

project [11], which required, nonetheless, several improvements<br />

before it met their needs. Even decisions on what technology<br />

decisions to continue or discontinue were made based on ad hoc<br />

information: the overall lay-out of the comment section for<br />

example received positive feedback, which resulted in an<br />

improved lay-out implemented for the second phase of<br />

consultation; the use of a “thumbs up/down” voting system<br />

however was removed shortly after implementation due to bad<br />

feedback received.<br />

3.2 Emerged Conceptual Framework<br />

Based on the interviews’ analyses, designing online consultation<br />

with the aid of web 2.0 is a very innovative task. However, we can<br />

find at least three common themes around the uses of Internet for<br />

policy making that have been largely documented before [7],<br />

namely: (a) the will to use of the Internet as a platform for<br />

political discourse, (b) the collective intelligence emergent from<br />

political Web use, and (c) perpetual experimentalism in the public<br />

domain. The former two themes describe quite well interviewees’<br />

expectation during the early stages of the MCR project. For<br />

example: selecting the CulturaDigital.br portal to host the<br />

project’s webpage is justified based on the will to foster new<br />

Internet forums of political debate; inviting citizens to deliberate<br />

online is justified based on the will to follow CTS’s goal of<br />

designing new collaborative ways of knowledge production.<br />

It is however the last theme (i.e., the perpetual experimentalism)<br />

that we most highlight in describing the MCR initiative. To some<br />

extent, online consultations resemble designing a complete new<br />

environment for policy making. For example: policy makers were<br />

required to understand the essence of tools such as Twitter and<br />

email and decide if they were good or not for online<br />

consultation’s use. Based on their previous experience with<br />

offline policy forums, interviewees were willing to avoid the oneto-few<br />

communication flow in favor of a many-to-many flow.<br />

Hence their decision (reached after a try-and-error period) of<br />

using Twitter (but blocking the use of email) to interact with the<br />

general public. In other words, the MCR project is clearly a case<br />

study where experimenting new forms of communications is a<br />

mandatory task that political practitioners have to deal with during<br />

theirs daily routine.<br />

After the end of their project, interviewees perceive to have left<br />

two challenges unanswered. The first refers to the bridging the<br />

online world barrier. Publicizing the MCR’s initiative beyond<br />

those who already had an interest in the topic is described as a<br />

very difficult (but still mandatory) task. Interviewees say to have<br />

attended as many offline conferences and events as possible, and<br />

to also have targeted media venues to increase their reach and<br />

visibility. Even so, considering the geographic and social<br />

characteristics of the country, the overall understanding is that the<br />

online barrier has been only merely scratched. The second<br />

challenge refers to controlling political outcomes of the


experience once the consultation is over. Draft legislation have no<br />

power of law, and more than one year has passed and it has not<br />

being voted in Congress. As interviewees perceive, online<br />

consultations increase the visibility of the drafted legislation, its<br />

speeds the process of preparing draft legislation for a vote, and it<br />

reduces the chances of politicians suggesting U-turn amendments.<br />

Nonetheless, at the end, the result of the deliberative experience<br />

will only be translates as legislation when and if the Congress<br />

votes on it.<br />

3.3 Lessons Learned<br />

As we can conclude when we compare how “offline” and “online”<br />

policy forums, decisions taken during early stages of designing<br />

policy forums about what to deliberate over are much similar<br />

between online and offline experiences than the same comparison<br />

between how technology is used for deliberation in offline and<br />

online experiences. The experimental and rapidly changing nature<br />

of initiatives such as the MCR project does not mean that policy<br />

decisions taken by policy makers are randomly taken; at the same<br />

time, they do challenge the understanding of how well-established<br />

policy making practices (such as mapping competing policy<br />

agendas before deciding on what policy agenda to adopt) interact<br />

with experimental practices of policy making with the aid of web<br />

2.0 tools.<br />

As the third section of this article discussed, we need to<br />

understand first how institutions, technology and people interact<br />

to create a successful and stimulating online policy forum. The<br />

section suggested as hypotheses four contextual elements needed<br />

to start an online consultation project, namely (a) a governmentbased<br />

institution with a real interest in direct public participation,<br />

(b) an active online community with a strong interest in the topic<br />

under discussion, (c) an active think thank institution willing to<br />

bring its own expertise and influence to the project, and (d) a web<br />

2.0 interface capable of engaging policymakers and citizens in a<br />

coherent narrative structure for deliberation.<br />

The fourth section continued the debate around the importance of<br />

institutions, evaluating how technology and deliberative norms<br />

interact in online consultation projects. The section focused on<br />

how policy makers decided on what issues to deliberate over, and<br />

how technology would be used to mediate deliberation; It also<br />

compared challenges faced by political practitioners in designing<br />

online and offline policy forums, focusing on four key decisions<br />

policy makers have to make during early stages of online<br />

consultation initiatives, namely: (a) what policy issues should be<br />

open or closed for people to deliberate over; (b) what technologies<br />

to use to mediate the debate; (c) how and when to moderate<br />

contributions; and (d) how to translate contributions into a<br />

properly formatted legal policy document.<br />

3.4 Conclusion<br />

The main argument pushed forward in this article is that<br />

understanding the role of web 2.0 tools in designing online<br />

consultation forums requires understanding the role of institutions<br />

sponsoring the use of such technology for policy making<br />

purposes.<br />

Without direct support of government-based institutions (in this<br />

case, the Ministry of Justice and the Ministry of Culture), as well<br />

as the support given by sponsoring think tank institutions (in this<br />

case, the Centro de Tecnologia e Sociedade, FGV/RJ),<br />

42<br />

contributions of the general public shared with the aid of web 2.0<br />

would be unable to result in policy change. In fact, in a<br />

comparative analysis of the MCR project with a governmentsponsored<br />

similar initiative in Uruguay [1], we argued that<br />

achieving (or not) support of government-based institutions,<br />

particularly in the case of Latin American experiences, is a vital<br />

criterion to evaluate the overall project success.<br />

The MCR project is not a case of success due the role of<br />

technology itself; instead, the findings presented here show that<br />

the project succeeded mainly due to the participation, expertise<br />

and engagement of institutions sponsoring the initiative. In other<br />

words, although technology is a key element to understand the<br />

uniqueness of the MCR project, web 2.0 tools mattered because of<br />

the institutions that moderated the use of technology for policymaking<br />

objectives in the first place. We thus support the<br />

arguments of Blumler and Coleman who say that “for democratic<br />

participation to have a meaningful impact upon political outcomes<br />

there is a need for inclusive and accountable institutions that can<br />

provide a space for consequential interaction between citizens and<br />

their elected representatives” [2] (p. 3).<br />

4. ACKNOWLEDGMENTS<br />

This project is funded by the Fundación Comunica (Project<br />

Impacto 2.0) and by the Singapore Internet Research Centre<br />

(Project SIRCA II). The International Development Research<br />

Centre (IDRC), Canada, sponsored both projects.<br />

Version Note: This paper received constructive feedback<br />

from the ICEGOV reviewing process. Due to the nature of the<br />

project, improvements were still on course by the submission<br />

deadline of 6th Aug 2012. An extended version of the paper<br />

including new material on theoretical framework, future research<br />

recommendations, and methodology design will be available at<br />

the http://ofabro.com website by 10th Oct 2012.<br />

5. REFERENCES<br />

[1] Beltramelli, F. et al. 2012. La web 2.0 y la consulta de<br />

políiticas púublicas en Améerica Latina: el caso del<br />

Marco Civil en Brasil y el caso uruguayo sobre TV<br />

Digital en una perspectiva comparada. Alaic. (2012).<br />

[2] Coleman, S. and Blumler, J.G. 2009. The Internet and<br />

democratic citizenship : theory, practice and policy.<br />

Cambridge University Press.<br />

[3] Coleman, S. and Gøtze, J. 2001. Bowling Together :<br />

Online public engagement in policy deliberation.<br />

Retrieved January. Hansard Society.<br />

[4] Fischer, F. 2003. Reframing public policy : discursive<br />

politics and deliberative practices. Oxford University<br />

Press.<br />

[5] Gomes, W. 2007. Transformações da política na era da<br />

comunicação de massa. Paulus.<br />

[6] Habermas, J. et al. 2004. After Habermas : new<br />

perspectives on the public sphere. Blackwell Pub. :<br />

Sociological Review.<br />

[7] O’Reilly, T. 2005. What Is Web 2.0? Design Patterns and<br />

Business Models for the Next Generation of Software.<br />

Author’s webpage.


[8] Putman, R.D. 1994. Making Democracy Work: Civic<br />

Traditions in Modern Italy [Paperback]. Princeton<br />

University Press.<br />

[9] Santarem, P.R. da S. 2010. O direito achado na rede: a<br />

emergência do acesso à Internet como direito<br />

fundamental no Brasil. UNB.<br />

[10] Steibel, F. and Coleman, S. 2011. The problem of<br />

negative advertising: content-based regulation of political<br />

43<br />

advertising in Brazil and in the US. Institute of<br />

Communications Studies. University of Leeds.<br />

[11] The Public Index: 2012. http://thepublicindex.org/about.<br />

Accessed: 2012-01-13.<br />

[12] Wright, S. and Street, J. 2007. Democracy, deliberation<br />

and design: the case of online discussion forums. New<br />

Media & Society. 9, 5 (Oct. 2007), 849-869.


E-Participation in the Era of Web 2.0: Factors Affecting<br />

Citizens’ Active E-Participation in Local Governance<br />

Jooho Lee<br />

University of Nebraska at Omaha<br />

6001 Dodge Street<br />

Omaha, Nebraska 68182<br />

1-402-554-2756<br />

jooholee@unomaha.edu<br />

ABSTRACT<br />

The study develops a model of active e-participation and tests it in<br />

the context of local governance. By building on and extending the<br />

existing literature on citizen participation, technology acceptance<br />

model and social networks, the study asserts that citizens’<br />

perceptions of the intrinsic and instrumental value of participation,<br />

and the strength of their social networks are associated with their<br />

active e-participation. Using the 2009 E-Participation Survey data<br />

collected from Seoul Metropolitan Government, we found that eparticipants<br />

actively use e-participation when they perceive a<br />

greater intrinsic value of e-participation. By further analyzing<br />

Male and Female models separately, we also found that male eparticipants<br />

who perceive greater instrumental value of eparticipation<br />

are likely to use e-participation actively. The<br />

findings, however, indicate that women who perceived a greater<br />

intrinsic value of e-participation and are embedded in weaker<br />

offline social networks are likely to actively use e-participation.<br />

Categories and Subject Descriptors<br />

H.4.3<br />

General Terms<br />

Management, Human Factors<br />

Keywords:<br />

E-Participation, TAM, Intrinsic and Instrumental Motivation,<br />

Social Networks<br />

1. INTRODUCTION<br />

Recently, government embraces Web 2.0 – various networked<br />

applications as a platform for user-generated information and<br />

collaboration on the Web [1] – to facilitate various forms of<br />

electronic participation (e-participation) such as online policy<br />

forums. E-participation is broadly defined as web-based<br />

applications enabling government to provide information and<br />

support “top-down” engagement, and/or to foster “ground-up”<br />

efforts to empower citizens in order to gain their support [2]. In<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that<br />

copies bear this notice and the full citation on the first page. Copyrights<br />

for components of this work owned by others than ACM must be<br />

honored. Abstracting with credit is permitted. To copy otherwise, to<br />

republish, to post on servers or to redistribute to lists, requires prior<br />

specific permission and/or a fee.<br />

ICEGOV '12, October 22 -­‐ 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-­‐1-­‐4503-­‐1200-­‐4/12/10…$15.00.<br />

44<br />

Soonhee Kim<br />

Syracuse University<br />

306 Eggers Hall<br />

Syracuse, New York 13244<br />

1-315-443-1282<br />

soonheekim@maxwell.syr.edu<br />

this research, we focus on a “ground-up” approach to eparticipation.<br />

A growing body of literature has touted eparticipation<br />

as a means of facilitating greater citizen participation<br />

in the policy making process. The literature, however, has left<br />

significant gaps in our understanding of the motivational and<br />

social factors affecting citizens’ active use of new technology in<br />

the context of citizen participation. Considering that eparticipation<br />

using Web 2.0 is primarily driven by citizens, not<br />

government, the potential of e-participation is problematic when it<br />

is not actively used by citizens. To fill some of these gaps, this<br />

study explores how citizens’ active use of e-participation is<br />

facilitated by their perceptions of intrinsic and instrumental values<br />

of e-participation and strength of social networks where citizens<br />

are embedded in an offline setting.<br />

To test research hypotheses, the study uses the 2009 E-<br />

Participation Survey data collected from the members of Cheon<br />

Man Sang Sang Oasis (hereafter Oasis), which is an eparticipation<br />

program run by Seoul Metropolitan Government<br />

(SMG) in South Korea since 2006. As a form of online policy<br />

forum, the Oasis has served as an e-participation tool for citizens<br />

to participate in policy making, especially the policy agenda<br />

setting process [3]. Using Oasis, citizens view, submit and share<br />

their ideas and suggestions on SMG policies associated with<br />

community and governance issues. Specifically, the Oasis is<br />

equipped with Web 2.0 functions to offer well-organized and<br />

systematic services including participants-led creation of their<br />

policy inputs on proposed SMG policies and collaboration with<br />

other participants to share their policy inputs and feedback.<br />

2. MODEL AND HYPOTHESES<br />

From the citizens’ perspective, this study focuses on two types of<br />

citizen participation values. The intrinsic value of citizen<br />

participation has been supported because it is an essential means<br />

of building and sustaining democratic systems by enabling<br />

citizens to be more educated, developed, and informed [4].<br />

Advocates of the instrumental value have highlighted that citizen<br />

participation serves as a means of affecting and monitoring<br />

government bureaucracy, which enhances citizens’ control over<br />

administrative process and, in turn, promotes a sense of ownership<br />

and empowerment [4, 5].<br />

The second stream of research reviewed for the development of<br />

study model is the technology acceptance model (TAM). The<br />

essence of TAM is that individuals adopt IT applications when<br />

they perceive usefulness and ease of use of the IT applications [6].<br />

TAM has been widely extended by embracing new constructs<br />

such as trust (see Venkatesh et al [7] for review) in diverse<br />

research context [8].


The third stream of studies reviewed is social network theory.<br />

Social network literature has considered social networks as<br />

resources in which people can access information, gain social<br />

support and receive recognition through their social networks [9].<br />

Advocates of strong social networks argue that people embedded<br />

in strong social networks enjoy benefits in terms of accessing<br />

information, exchanging social support and receiving recognition<br />

easily and promptly [10]. Proponents of weak social networks<br />

emphasize that people embedded in weak social networks can be<br />

provided a better opportunity to access diverse groups of people<br />

and, in turn, to gain nonredundant and new information, to enjoy<br />

autonomy, and to manage them with a lower cost [11].<br />

By building on and extending the existing literature on citizen<br />

participation, TAM, and social networks, this research asserts that<br />

citizens’ use of e-participation is affected by their perception of<br />

intrinsic and instrumental values of e-participation, and the<br />

strength of their offline social networks.<br />

2.1 Intrinsic Value of e-Participation<br />

The intrinsic value of e-participation refers to citizens’ perception<br />

of developmental, educative, and informative effects of their eparticipation<br />

in the policy decision making process [5, 6]. The<br />

underlying theory of the intrinsic value relies on intrinsic<br />

motivation in that motivation for active participation mainly stems<br />

from inside an individual rather than from any external rewards<br />

such as political gains.<br />

Proponents of the intrinsic value of citizen participation have<br />

highlighted that citizen participation serves as a leverage to<br />

promote self-esteem and self-fulfillment and develop the attitudes<br />

and skills of citizenship [12]. Also, citizen participation provides<br />

an opportunity to be better informed of their community issues<br />

[13]. Through the experience of citizen participation, citizens gain<br />

a sense of belonging in their community, which facilitates their<br />

willingness to learn more about community issues [4, 13].<br />

Moreover, citizen participation allows citizens to learn the art of<br />

deliberation and compromise, foster an active and public-spirited<br />

moral character and, in turn, realize their potential contribute to<br />

the community [4]. Thus, it is likely that citizens are motivated to<br />

actively use e-participation when they perceive greater intrinsic<br />

value created in the process of e-participation.<br />

H1: E-participants who perceive greater intrinsic value of eparticipation<br />

are more likely to actively use e-participation.<br />

2.2 Instrumental Value of e-Participation<br />

This study also asserts that citizens’ active use of e-participation is<br />

extrinsically motivated. Extrinsic motivation theory emphasizes<br />

that individuals perform a behavior to achieve instrumental values<br />

such as economic and political rewards [14]. In TAM, the<br />

perceived usefulness construct has been used to capture the role of<br />

individuals’ extrinsic motivation in adopting new technology [15].<br />

In the context of e-participation, instrumental value indicates eparticipants’<br />

perceptions of influence on governmental decision<br />

making. Gaining political rewards such as greater influence on<br />

government may serve as a motivation to actively use eparticipation.<br />

Also, as e-participation is based on Web 2.0, social<br />

rewards such as recognition are available to e-participants in that<br />

e-participants and government bureaucrats observe and interact<br />

one another by posting and replying to citizens’ ideas or<br />

comments. It is likely that e-participants are aware of an<br />

opportunity to receive social rewards from peer e-participants and<br />

45<br />

government by using e-participation. Thus, political and social<br />

rewards serve as incentives for e-participants to actively use eparticipation.<br />

H2: E-participants who perceive greater instrumental value of eparticipation<br />

are more likely to actively use e-participation.<br />

2.3 Strength of Social Networks<br />

Strength of social networks refers to the extent to which<br />

individuals intensively interact with others [11]. This study argues<br />

that e-participants embedded in strong offline social networks are<br />

likely to actively use e-participation. Due to the nature of online<br />

interaction (e.g. chat with anonymous friends), people tend to be<br />

connected to one another through weak social networks [16]. Thus,<br />

online social networks can serve as a complementary means for<br />

mobilizing resources such as new information at a lower cost.<br />

Also, e-participants who already have strong offline networks are<br />

likely to have greater ability in using e-participation. Citizens’ eparticipation<br />

can be considered as less active if they simply search<br />

for information and observe the postings of others. The lack of<br />

active e-participation barely creates an opportunity for eparticipants<br />

to build online social networks. Thus, to build online<br />

social networks through e-participation program, e-participants<br />

must initiate interactions by being exposed to peer e-participants<br />

such as through posting their suggestions or replying to others’<br />

postings in the e-participation programs. It is likely that people<br />

embedded in strong offline social networks are equipped with<br />

knowledge about how to initiate, build, and sustain social<br />

networks, which enhances their capability to use e-participation<br />

actively.<br />

H3: E-participants embedded in strong offline social networks are<br />

likely to actively use e-participation.<br />

3. RESEARCH METHOD<br />

To test research hypotheses, we used the 2009 E-participation<br />

Survey data collected from a web-based survey. The sample frame<br />

was 10,136 citizen members of Oasis who have posted at least one<br />

suggestion over the last three years. 1,076 participants responded<br />

to the survey (response rate of 10.6 percent).<br />

For the test of the hypotheses, this research used one survey item<br />

(i.e. the number of suggestions posted by individual users on the<br />

Oasis program) to measure active e-participation. The survey<br />

participants were asked to indicate the extent to which they posted<br />

their suggestions on Oasis using a 6-point scale ranging from<br />

“Never” (1) to “More than 10 suggestions” (6).<br />

We used four survey items to measure e-participants’ perception<br />

of the intrinsic value of e-participation. By modifying Davis’s [8]<br />

perceived usefulness scale, we used four items to capture<br />

perceived instrumental value. The participants were asked to<br />

indicate the extent to which they agreed with the those items using<br />

a 5-point Likert scale ranging from strongly disagree (1) to<br />

strongly agree (5). To measure e-participants’ strength of social<br />

networks, this study used five items regarding the frequency of<br />

going out with different social groups. Five items were designed<br />

with a 7-point Likert-type scale ranging from “Every Day” (1) to<br />

“Once a Year” (7). Correlation among the items was slightly<br />

lower than threshold (Cronbach Alpha=.67). The average scores<br />

of the five items were used in the analysis.<br />

As control variables, we included perceived ease of use, social<br />

altruism, political participation, trust in government and e-


participation experience. As one of core construct of TAM,<br />

perceived ease of use was included as a control variable. To<br />

measure perceived ease of use, this study used the average scores<br />

of four survey items with 5-point Likert scale (Cronbach<br />

Alpha=.83). To measure social altruism, we used a single item as<br />

to respondents’ volunteer experience. This item was rated on a 7point<br />

Likert scale ranging from “Never” (1) to “Every Day” (7).<br />

To capture the degree of political participation, we measured<br />

voting participation. We used an index of dummy variables that<br />

include the 2008 Presidential Election, 2008 National General<br />

Election, 2006 Seoul City Mayor Election and 2006 Seoul<br />

Council Member Election. To control for the effect of trust in an<br />

IT service provider, this study used a measure of trust in the<br />

government who provides the e-participation programs. Trust in<br />

government is measured by a single item: Do you trust that SMG<br />

works in your best interests? The item was rated on a 5-point<br />

Likert scale ranging from strongly disagree (1) to strongly agree<br />

(5). E-participation experience captures the ability of eparticipants<br />

with regard to the use of Web 2.0 technologies. This<br />

study includes it as a control variable in order to control the effect<br />

of the difference between experienced and inexperienced<br />

participants on the degree of e-participation activities. The<br />

respondents were asked to indicate the length of membership in<br />

Oasis. This question was scaled from 4 years (1) to less than 1<br />

year (4). To capture the effects of respondents’ socio-economic<br />

status on active e-participation, we included gender, age,<br />

education, and income as control variables.<br />

4. RESULTS AND IMPLICATIONS<br />

Table 3 shows the results of OLS regression analysis of two<br />

models. Model 1 is a baseline model with only control variables<br />

while Model 2 includes three independent variables plus control<br />

variables. Consistent with H1, Model 2 demonstrates a positive<br />

and significant relation between perceived intrinsic value of eparticipation<br />

and active e-participation, which confirms prior<br />

empirical studies on the effect of intrinsic motivation on new<br />

technology adoption [17]. However, H2 and H3 are not supported<br />

by the data.<br />

Model 1 Model 2<br />

Beta (S.E) Beta (S.E)<br />

Perceived Intrinsic Value .20** (.09)<br />

Perceived Instrumental Value .10 (.09)<br />

Strength of Social Networks -.07 (.05)<br />

Perceived Ease of Use .04 (.07) -.07 (.08)<br />

Social Altruism .11*** (.03) .12*** (.03)<br />

Voting Participation .02 (.04) .03 (.04)<br />

Trust in Government .26 *** (.05) .19*** (.06)<br />

E-participation Experience .16 *** (.04) .17*** (.05)<br />

Male .23 ** (.11) .28** (.11)<br />

Age .03 *** (.00) .03** (.00)<br />

Age 2 -.00 *** (.00) -.00*** (.00)<br />

Education .04 (.04) .05 (.04)<br />

Income .01 (.03) .02 (.03)<br />

N 874 816<br />

Adjusted R .14 .15<br />

F 14.93 *** 12.35***<br />

Note: For two-tail tests; * p < .10; ** p < .05; *** p < .01<br />

Table 3 OLS Regression Results: Aggregated Model<br />

46<br />

The results also show that male e-participants reported posting a<br />

greater number of suggestions than female e-participants. This<br />

finding is inconsistent with recent empirical studies on the role of<br />

gender in Web 2.0 such as social media use [17]. To better<br />

understand the role of gender in active e-participation, we further<br />

analyze the data by disaggregating the sample into two groups:<br />

male and female samples. The results of Chow test allowed us to<br />

test two groups separately using male and female data sets<br />

(F=4.60, p < .001). Table 4 shows the results of a separate OLS<br />

analysis of male and female data sets.<br />

Male Model Female Model<br />

Beta (S.E) Beta (S.E)<br />

Perceived Intrinsic Value .12 (.11) .35** (.16)<br />

Perceived Instrumental Value .18* (.11) -.12 (.16)<br />

Strength of Social Networks -.02 (.06) -.19** (.09)<br />

Perceived Ease of Use -.09 (.09) -.05 (.12)<br />

Social Altruism .16*** (.04) .06 (.05)<br />

Voting Participation .10* (.05) -.06 (.06)<br />

Trust in Government .18** (.07) .13 (.11)<br />

E-participation Experience .14** (.05) .26*** (.08)<br />

Age .03*** (.01) .02*** (.01)<br />

Age 2 -.00*** (.00) -.00 (.00)<br />

Education .03 (.05) .10 (.08)<br />

Income .03 (.04) .00 (.05)<br />

N 619 196<br />

Adjusted R .14 .14<br />

F 9.78*** 3.74***<br />

Note: For two-tail tests; * p < .10; ** p < .05; *** p < .01<br />

Table 4 OLS Regression Results: Male and Female Models<br />

Table 4 shows that only perceived instrumental value is<br />

significant in the Male model, while perceived intrinsic value and<br />

strength of social networks are significant in the Female model.<br />

The findings imply that male e-participants are more likely to put<br />

a greater number of postings in the e-participation program<br />

because they might perceive e-participation as a means of<br />

acquiring a sense of ownership, influence, and/or empowerment<br />

[18]. Meanwhile, female citizens’ active use of e-participation is<br />

influenced by their perceptions of greater intrinsic value. Female<br />

e-participants are more likely to use e-participation actively<br />

because they might perceive e-participation as a means of being<br />

informed, educated and developed [19].<br />

In addition, the results exhibit that there are gender differences in<br />

the effects of social networks on active e-participation. The Male<br />

model shows that there is no significant relationship between the<br />

strength of social networks and active e-participation. However,<br />

Female model depicts the negative and significant effects of the<br />

strength of social networks on active e-participation. That is,<br />

female respondents reported that they actively use e-participation<br />

when they are embedded in weaker offline social networks. In an<br />

offline setting, underrepresented groups of people are often<br />

embedded in low-density networks or take peripheral positions<br />

[20]. In weak social networks, women are likely to face structural<br />

constraints in order to express their interests, to access<br />

information, and to receive recognition in a timely manner. These<br />

constraints may serve as motivating factors for women to seek<br />

active e-participation as a supplementary tool for expressing their


interests, gaining access to information, sharing information with<br />

others, and receiving recognition.<br />

5. CONCLUSION<br />

This exploratory study contributes to e-participation literature by<br />

uncovering both motivational and social factors affecting citizens’<br />

active e-participation. The study findings imply that local<br />

governments may need to pay more attention to how to design and<br />

evaluate e-participation programs to enhance the extrinsic value of<br />

e-participation to facilitate male e-participants’ active eparticipation.<br />

In order to better understand female participants’<br />

use of e-participation, further attention should also be paid to how<br />

to design e-participation programs to improve their intrinsic value<br />

and understand the structure of offline social networks where<br />

female participants are embedded. At least, three limitations<br />

should be noted: external validity, cross-sectional research design<br />

and online social networks. The results of this study could be<br />

outcomes of unique citizen engagement evolution that are affected<br />

by South Korea’s historical, political, and cultural contexts.<br />

Accordingly, more in-depth case studies in various regions and<br />

countries are needed to advance active e-participation models in<br />

local governance. Also, we suggest longitudinal research in order<br />

to better understand the factors affecting the sustainability of<br />

active e-participation. Since this study analyzed the role of offline<br />

social networks on active e-participation, it is limited to<br />

understanding how online social networks affect e-participation<br />

behavior. Therefore, future studies are needed to extend the study<br />

model by incorporating the role of online social networks.<br />

6. ACKNOWLEDGMENTS<br />

The authors would like to thank Seoul Metropolitan Government<br />

for supporting this research project.<br />

7. REFERENCES<br />

[1] Wikipedia. Web 2.0. Accessed July 25 th , 2012,<br />

http://en.wikipedia.org/wiki/Web_2.0<br />

[2] Macintosh, A., and Whyte, A. Towards an evaluation<br />

framework for eParticipation. Transforming government: People,<br />

Process & Policy, 2, 1 (2008), 16-30.<br />

[3] Tambouris, E., Liotas, N., and Tarabanis, K. A framework for<br />

assessing e-participation projects and tools. Proceedings of the 40 th<br />

Hawaii International Conference on Systems Sciences. 2007.<br />

[4] Roberts, N. Public deliberation in an age of direct citizen<br />

participation. American Review of Public Administration. 34, 4<br />

(2004), 315-353.<br />

[5] Box, R., Citizen Governance: Leading American Communities<br />

into the 21st Century. Sage Publication, Thousand Oaks, CA, 2007.<br />

[6] Davis, F., Perceived usefulness, perceived ease of use, and<br />

user acceptance of information technology, MIS Quarterly, 13, 3<br />

(1989), 319-339.<br />

47<br />

[7] Venkatesh, V., Morris, M., Davis, G., and Davis, F. User<br />

acceptance of information technology: Toward a unified view.<br />

MIS Quarterly, 27, 3 (2003), 425-478.<br />

[8] Schaupp, L. C., Carter, L., and Hobbs, J. E-file adoption: A<br />

study of U.S. taxpayers' intentions. Computers in Human<br />

Behavior. 26, 4 (2010), 636-644.<br />

[9] Ibarra, H., Kilduff, M., and Tsai, W. Zooming in and out: Connecting<br />

individuals and collectives at the frontiers of organizational network<br />

research. Organizational Science, 16 (2005), 359-371.<br />

[10] Lee, J., and Kim, S. Exploring the role of social networks in<br />

affective organizational commitment: Network centrality, strength<br />

of ties, and structural holes. American Review of Public<br />

Administration, 41 (2011), 205-223.<br />

[11] Granovetter, M. The strength of weak ties. American<br />

Journal of Sociology, 78 (1973), 1360-1380.<br />

[12] King, C., and Stivers, C. Government is US: Public<br />

Administration in an Anti-Government Era. Sage Publications,<br />

Thousand Oaks, CA, 1998.<br />

[13] Patterman, C. Participation and Democratic Theory,<br />

Cambridge University Press, New York, 1975.<br />

[14] Deci, L. Intrinsic Motivation. New York, Plenum Press, 1975.<br />

[15] Venkatesh, V., and Davis, D. 2000. A theoretical extension<br />

of the technology acceptance model: Four longitudinal field<br />

studies. Management Science. 46 (2000), 186–204.<br />

[16] Easley, D., and Kleinberg, J. Strong and weak ties. In<br />

Networks, Crowds, and Markets: Reasoning about a Highly<br />

Connected World. Cambridge University Press, NY. 2010, 47-84.<br />

[17] Hampton, K., Goulet, L., Rainie, L., and Purcell, K. Social<br />

Networking Sites and Our Lives. Pew Research Center’s Internet<br />

& American Life Project, Washington D.C.<br />

[18] Prentice, D. A., and Carlsmith, K. M. Opinions and<br />

personality: On the psychological functions of attitudes and other<br />

valued possessions. In Why we evaluate functions of<br />

attitudes. Lawrence Erlbaum, Mahwah, NJ, 2000, 223-248.<br />

[19] Bozionelos, N., and Bozionelos, G. Instrumental and expressive<br />

traits: Their relationship and their association with biological sex.<br />

Social Behavior and Personality. 31 (2003), 423-430.<br />

[20] Burt, R. Structural holes: The social structure of competition.<br />

Harvard Business Press, Cambridge, M.A. 1992.


Genres of Communication in Activist eParticipation:<br />

A Comparison of New and Old Media<br />

ABSTRACT<br />

In this paper, we examine the genres of communication in an<br />

activist case in a Norwegian municipality. As genres evolve over<br />

time, and the emergence of new genre properties is a sign of a<br />

mature technology, we compare the genres used in traditional<br />

paper-based media with the genres used in social media, to<br />

examine the maturity of social media as a medium for activist<br />

eParticipation. We also discuss the usage patterns of traditional<br />

vs. social media, and their relation to the public sphere. Our<br />

findings indicate that so far, the genres used for activism in social<br />

media are very similar to their offline counterparts, with some<br />

new genres and genre characteristics emerging. Social media is<br />

moving towards maturity, but still has a way to go.<br />

Categories and Subject Descriptors<br />

K.4. [Computers and Society]<br />

General Terms<br />

Measurement, Documentation, Human Factors, Theory<br />

Keywords<br />

eParticipation, Social Media, Genre Theory, Public Sphere<br />

1. INTRODUCTION<br />

Our media and communication habits are increasingly moving<br />

towards the digital domain and to social media. While political<br />

communication has been lagging behind, this area is also<br />

increasingly becoming digitized [1, 2], and as such is forced to<br />

change in order to adapt to the logic of two-way communication<br />

media [3]. This move towards new media has been hastened by<br />

what is perceived as a lessening of civic engagement in traditional<br />

channels. Voter turnout is in decline [4], there are fewer members<br />

of political parties, and less interest for political participation and<br />

debate [5]. These perceived threats to democracy have led<br />

government towards a number of projects where digital media is<br />

used in an attempt to boost participation and civic engagement [2,<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Marius Rohde Johannessen<br />

University of Agder, dept. of Information Systems<br />

Service box 422, NO-4604 Kristiansand, Norway<br />

+47 38 14 17 14<br />

marius.johannessen@uia.no<br />

48<br />

6, 7].<br />

The public sphere, said to have disappeared in the age of mass<br />

media, has re-emerged online [8, 9]. But how new is the online<br />

public sphere? How much has political communication online<br />

been adapted to the two-way, inclusive logic of “new” media?<br />

To answer this question, we look towards genre theory. Genre<br />

theory tells us that communicative acts recurring over time, with<br />

similar form and function, can be analyzed and categorized into a<br />

set of communication genres [10]. Genres used within an<br />

organization or a given context can further be categorized into a<br />

repertoire of suitable genres for a given context [11].<br />

When moving from “old” to “new” media, genres from the old<br />

medium will typically be copied as-is and used for some time in<br />

the new. After some time, new genres emerge, and old ones are<br />

adapted to fit the new medium. The maturity of a medium can to<br />

some degree be measured by examining the genres of the new and<br />

old medium [12]. Maturity is in this case understood as the degree<br />

to which the actors involved in using the medium agree on the<br />

conventions and rules for the medium, as well as the emergence of<br />

new genres, or old genres which are adapted to the functionality<br />

of the new medium.<br />

In this paper, we identify the genre systems used for political<br />

activist communication in new and old media, through a case<br />

study of an urban development project in a mid-sized Norwegian<br />

city. The actors involved in the case have used both traditional<br />

print media, social media and the Internet in their communication,<br />

and this allows us to categorize the same message as different<br />

genres in different media.<br />

In addition, we discuss these findings against the ideals of the<br />

public sphere [13]. Are the new media mature enough to cater for<br />

a public sphere, or are we still in transition between the “old” and<br />

“new”? And if there is an online public sphere in this case, what<br />

kind of public sphere is it? Finally, we discuss how social capital<br />

impacts participation and the public sphere.<br />

The rest of the paper is structured as follows: Section two presents<br />

our theoretical foundation, consisting of the public sphere, genre<br />

theory and social capital. Sections three and four outline the<br />

research method we have applied, and presents a thick case<br />

description. In section five we present our findings, which are<br />

separated into the genre analysis of the new and old media, and an<br />

analysis of the extent to which these genre systems support a<br />

public sphere. Finally, we present our conclusions, limitations and<br />

some possibilities for future research.


2. THEORETICAL FOUNDATION<br />

2.1 The Public Sphere<br />

The Public Sphere is defined as “that domain of our social life in<br />

which such a thing as public opinion can be formed”. An<br />

autonomous “place” where citizens can debate government policy<br />

and act as an informal correction when governments step out of<br />

bounds [14], separated from the state and economic interests [14,<br />

15]. The public sphere can be understood as a mediating layer<br />

between government and citizen, where citizens discuss and agree<br />

on issues of public interest, as It is “the interaction between<br />

citizens, civil society, and the state, communicating through the<br />

public sphere, that ensures that the balance between stability and<br />

social change is maintained.” [16]<br />

The existence of a public, which is aware of itself and able to<br />

form an opinion, is essential for the Public Sphere. When the<br />

bourgeoisie class began to challenge the power of the church and<br />

state during the formation of the European nation states in the 19 th<br />

century, we saw the first modern example of the public forming<br />

an opinion. Before, in the feudal age, the church and kings of<br />

Europe had no use for a public in the modern sense of the word,<br />

as the kings and nobility had no electorate to hold them<br />

accountable for their decisions [17]. In modern representative<br />

democracy this has changed. After the initial formation of the<br />

European nations followed two devastating world wars, several<br />

nations falling back from democracy to dictatorship, and back to<br />

democracy, and all of this has contributed to a strengthening of<br />

the western world’s belief in democracy and governments’<br />

accountability to the public [17].<br />

Public opinion can be understood as the shared understanding of<br />

an issue, reached through debate by rational citizens [18] , and is<br />

considered a necessary function in a modern democracy: “The<br />

public sphere is an essential component of sociopolitical<br />

organization because it is the space where people come together<br />

as citizens and articulate their autonomous views to influence the<br />

political institutions of society” [16].<br />

Some claim the Public Sphere no longer exists, due to the spread<br />

of mass media and commoditization of information, along with<br />

the disappearance of the old “salons” and other physical spaces<br />

where the bourgeoisie assembled and debated. When everyone are<br />

allowed to participate, the public sphere holds no value [19]. This<br />

view is controversial, and has been criticised for being overtly<br />

elitist and for not taking into consideration the changing times we<br />

live in (Hartley, 1996). Rather than longing for the salons of old, a<br />

number of researchers have pointed to the Internet as the medium<br />

for modern day Public Sphere [8, 9, 20, 21]. Studies of political<br />

participation indicate that Internet use has led to an increase in the<br />

public’s political interest [22], and it is claimed that the Public<br />

Sphere of today is no longer a physical place. Rather, it is found<br />

in the media and in networks and acts as the<br />

“cultural/informational repository of the ideas and projects that<br />

feed public debate.” [16].<br />

There is, however, a problem with the online Public Sphere.<br />

Online activities, even more so than their offline counterparts,<br />

tend to be focused around people’s interests, at least in the<br />

Norwegian context. It is a lot easier to pick and choose only that<br />

which we are interested in when we move around on the Internet<br />

[23]. Interest-based communities and segregation can easily<br />

become a democratic problem. When people socialize only with<br />

others who have the same interests, points of view and likes and<br />

49<br />

dislikes, we lose that space in society where people of diverse<br />

backgrounds can assemble, debate, and shape public opinion [24].<br />

And while the Internet is promising, not everyone agrees that we<br />

currently have a functioning Public Sphere. A lack of attention to<br />

issues of public interest, our habits as online consumers as well as<br />

general political disinterest can explain why the internet has not<br />

revitalized the public sphere to the extent some scholars have<br />

expected [25].<br />

Habermas, who has been criticized for being elitist, redefines the<br />

public sphere to better suit the current media environment. He<br />

concludes that two things are needed for a networked and mediabased<br />

Public Sphere: “mediated political communication in the<br />

public sphere can facilitate deliberative legitimation processes in<br />

complex societies only if a self-regulating media system gains<br />

independence from its social environments and if anonymous<br />

audiences grant a feedback between an informed elite discourse<br />

and a responsive civil society.”[26].<br />

Several scholars have operationalized the requirements for a<br />

Public Sphere. Dahlberg [13] has identified six requirements: A<br />

public sphere must be Autonomous from state and economic<br />

power. It should be based on a rational-critical discourse, where<br />

participants are engaged in reciprocal critique of normative<br />

positions that are criticisable rather than dogmatic claims.<br />

Participants must be reflective, and critically examine their<br />

cultural values, assumptions, and interests, as well as the larger<br />

social context. Participants must attempt to understand the<br />

argument from the other's perspective. Each participant must<br />

make an effort to make known all information relevant to the<br />

particular problem under consideration, and everyone is equally<br />

entitled to introduce and question ideas and issues.<br />

Trenz & Eder [27] presents four ideal-types of the Public Sphere,<br />

thereby extending the requirements made by Dahlberg. A Public<br />

Sphere can be discourse-based, based on political protest, on<br />

political campaigning, or simply on consensus. Another issue that<br />

can be measured, especially in cases of online activism, is the<br />

extent to which the online activity is linked with the mainstream<br />

media, and through that to the wider public sphere.<br />

2.2 Social Capital<br />

While the public sphere is the ideal public debate should be<br />

striving for, the concept of social capital can be used to explain<br />

who participates [28]. Social capital refers to<br />

“connections among individuals – social networks and<br />

the norms of reciprocity and trustworthiness that arise<br />

from them … ‘social capital’ calls attention to the fact<br />

that civic virtue is most powerful when embedded in a<br />

sense network of reciprocal social relations. A society of<br />

many virtuous but isolated individuals is not necessarily<br />

rich in social capital.” [29]<br />

Some claim that a high level of social capital is an important<br />

factor in explaining the Scandinavian welfare societies. despite<br />

high taxes, big government and a relatively flat income structure,<br />

the Scandinavian countries are among the richest countries in the<br />

world [30]. The high amount of social capital in Scandinavia acts<br />

as “grease” for transactions, lowering the cost of doing business,<br />

as there is less need for formalized contracts and expensive legal<br />

agreements (ibid.).


Social capital is often measured in terms of individual and<br />

institutional trust and reciprocity, and divided into bonding and<br />

bridging social capital. Trusting individuals lowers barriers to<br />

participation and simplifies transactions, as there is less need for<br />

written contracts and other control measures. Institutional trust<br />

indicates that government institutions such as police, judicial<br />

system and administration are functioning well. Reciprocity, the<br />

degree in which people are willing to give something back when<br />

they receive something, is another measure of social capital [31,<br />

32].<br />

There are several types of social capital. Bonding social capital is<br />

the connections between individuals in a group, such as the<br />

traditional village or a local community. Bridging social capital is<br />

the connection between different groups, where individuals in a<br />

group have ties to individuals in other groups [29]. A third type of<br />

social capital is “maintained social capital”, the ability to keep<br />

one’s connections also when one is physically separated from<br />

them [33].<br />

In Information Systems, social capital have been used to measure<br />

both how technology affects social capital, and how social capital<br />

affects development of technology [32]. Other studies have shown<br />

that the characteristics and user population of social networking<br />

services is important for the level of social capital and for the<br />

outcome of political debate on such sites [34]. And that spending<br />

time in front of screens can increase social capital, depending on<br />

the activities we are conducting [35].<br />

2.3 Genres of Communication<br />

Genre theory has been applied to study communication patterns in<br />

a number of eParticipation studies [36-39]. Genres can act as a<br />

tool for studying the role of communication in social processes<br />

[10]. Genres develop over time, in the interaction between<br />

predefined rules for communication and the people that are<br />

communicating. Genres are useful when studying social media<br />

use in eParticipation, as the introduction of new media over time<br />

often leads to new communication practices which genre theory<br />

allows us to map and analyze [38]. By studying communication<br />

genres instead of the technology used to communicate, we can<br />

discover how communication changes and evolves over time [11].<br />

Genres can be defined using the 5w1h-method By asking where,<br />

why, when, who, what and how, we can uncover the purpose,<br />

contents, placement in time, location, participants, structure and<br />

medium for communication [40, 41]:<br />

o Where tells us where the communication takes place, the<br />

medium being used, or the physical location.<br />

o Why explains the purpose of the genre, as understood by<br />

those using it.<br />

o When refers to the time where communication takes place.<br />

For example, the “job application” genre is enacted when<br />

applying for a job, and needs to be in by a set date.<br />

o Who defines the actors involved in communication, the<br />

sender and receiver of the genre.<br />

o What is the content of the genre, and defines what is being<br />

communicated, and any relations to other genres.<br />

o Finally, How describes the technical needs for delivery of the<br />

genre, for example which medium is being used, or any other<br />

technical necessities.<br />

50<br />

Genres are further identified by having a common content (themes<br />

and topics of the conversation) and form (physical and linguistic<br />

features), as well as technological functionality in genres enacted<br />

through electronic media [12]. A common mistake is to confuse<br />

genre and medium, especially when including functionality in the<br />

analysis. E-mail is a medium, while the job application sent via email<br />

is the genre [10].<br />

It is possible to go beyond single genres, and look at the genre<br />

system. Genre systems are collections of genres that belong<br />

together [41]. For example, the previously mentioned job<br />

application is part of a system where the job listing comes first,<br />

followed by the job application and some kind of feedback on the<br />

application. When examining an entire genre system, we can<br />

analyse communicative practices over time, and how new genres<br />

emerge and influence the ways we communicate [11].<br />

By analysing the genre system of different media, we can see if<br />

there are differences between how the genres are enacted, and<br />

identify the genres that are most used by participants in an<br />

eParticipation project (ibid.). By applying genre theory in the<br />

study of new media forms, we get a more comprehensive analysis<br />

than what we would get from only looking at the functionality of<br />

the technology behind the new medium [11].<br />

3. RESEARCH METHOD<br />

The research was framed as a qualitative case study, of which this<br />

paper is one in a series of planned publications. The objective of<br />

qualitative research is “understanding…by investigating the<br />

perspectives and behavior of the people in these situations and the<br />

context within which they act” [42], and qualitative methods are<br />

appropriate for exploratory studies and for examining how<br />

something happens [42, 43]. The case study examines the<br />

phenomenon in its “natural setting”, collects data from multiple<br />

sources, and the researcher may have limited knowledge about the<br />

outcome of the research [44]. Case studies are particularly suited<br />

for research on new phenomena where the actors’ experiences and<br />

interpretations and the wider context are important factors [45].<br />

Our initial objective for the project as a whole was to explore and<br />

understand how social media was being used by activist groups in<br />

a Norwegian municipality. As part of that objective, the research<br />

question for this paper is how are the genre systems of old and<br />

new media used for activist communication, and how do these<br />

genre systems fit with the public sphere ideal?<br />

The urban planning case was chosen for the following reasons:<br />

The process has a long history, dating back almost 30 years. This<br />

provides rich insights into the process, and especially into how the<br />

introduction of social media has changed the way the actors<br />

communicate. The number of people involved also made access to<br />

interview subjects easy. Further, the first author has followed the<br />

case as a citizen over several years before engaging in it from a<br />

research perspective, which leads to a thorough understanding of<br />

the case context. There is a risk of bias, but we have attempted to<br />

minimize this risk through a constant analysis and questioning of<br />

our findings.<br />

The data used in this case was collected between February and<br />

November 2011. We made 12 semi-structured interviews with<br />

representatives related to the case: Members of the city council<br />

(4), officials from the city administration responsible for<br />

developing the plans (2), the private investor’s representative (1),<br />

local media (1 + informal meetings and e-mail with 2 others),


epresentatives from the three main activist groups (3), and one<br />

representative from the regional governments heritage<br />

department. The interviews were recorded and transcribed. The<br />

interviewer gave a brief introduction to the research project, and<br />

asked the respondents to talk freely within the context of the case.<br />

Interviews should be supplemented by other forms of data [46].<br />

For the findings reported in this paper, this mainly consists of<br />

postings from Facebook groups and letters to the editor. These are<br />

the basis for the genre analysis.<br />

In addition, we attended one workshop meeting and two city<br />

council meetings, where field notes were made and written out.<br />

All documents relevant to the case between 2007 and 2011 that<br />

were made available by the city council were collected and<br />

analyzed. This includes minutes from council meetings,<br />

consultancy reports, architectural plans, formal hearing documents<br />

and the results of two surveys made in relation to the development<br />

project. These data sources are not used explicitly in this paper,<br />

but nonetheless influence our conclusions and as such should be<br />

mentioned.<br />

The data was analyzed using genre theory and the 5W1H<br />

framework [41] to identify the genre systems of old and new<br />

media. Old media is represented by the print edition of the local<br />

newspaper, while new media is represented by several Facebook<br />

groups related to the case. The analysis was inspired by a genre<br />

analysis of a municipal online discussion board [36].<br />

Finally, we wanted to examine how the genre systems of old and<br />

new media were related to the public sphere. This examination<br />

was used following the framework of [28], where several<br />

constructs of a public sphere are measured, including the amount<br />

of social capital among the participants.<br />

4. CASE DESCRIPTION<br />

The case is about a cove of 5 acres, located about 1 km from the<br />

city center of a Norwegian mid-sized city (40.000 inhabitants).<br />

There are two land owners: a private investor and the local<br />

municipality own about 50% each.<br />

Over the past 30 years, there have been a number of plans for<br />

development of the cove. In the 1980’s, the city council decided<br />

to build a new harbor in the area, but the development was halted<br />

and the only structure built was the local hub of a national freight<br />

company, resulting in the cove becoming a no-man’s land of car<br />

parks and freight trucks. The area is very attractive for<br />

development, as it is by the sea and also the last open area close to<br />

the city center in a city where the topography makes development<br />

difficult.<br />

There is strong agreement in the population that something should<br />

be done about the cove. No one is pleased with the current<br />

situation. Between 2001 and 2006 a number of plans were<br />

presented. In 2007, the city council agreed on an area<br />

development plan, and in 2008, the municipality invited several<br />

architect firms to draw new plans for the area based on this<br />

development plan. Plans were presented for a mainly residential<br />

project consisting of six five-story apartment buildings, with the<br />

ground floor reserved for business purposes. The idea behind the<br />

plans was to create a new urban district, with shops, restaurants<br />

and apartments. This was to be an extension of the current city<br />

center.<br />

51<br />

When these plans were presented, local opposition began to arise.<br />

The local residents’ association started campaigning against the<br />

development by talking directly to politicians, writing to the local<br />

newspaper, and setting up stands and organizing protest concerts.<br />

Their main argument was that this was the last area close to the<br />

city center which could be developed into a green recreational<br />

park. They also organized a campaign to have politicians<br />

sympathetic to their cause voted in to the city council in the 2007<br />

municipal election, and succeeded so well that the plans were<br />

downcast by the new city council in 2008.<br />

One year later, new plans were presented. This time the plans<br />

were only for the parts of the area owned by the private investor,<br />

and consisted of three high-rise residential buildings. The idea<br />

behind these plans was that with these high-rise buildings, the city<br />

would have room for a recreational park on the remaining 2.5<br />

acres owned by the municipality.<br />

Once again the residents’ association protested, and this time new<br />

activist groups were formed and joined the opposition. The new<br />

groups consisted of creative professionals, local historians and<br />

heritage people. They still argued for a recreational park in the<br />

entire 5 acre area, but also introduced arguments for retaining the<br />

area’s historical heritage by preserving the view from the sea to<br />

the old wooden houses in the surrounding hills. Once again the<br />

activist groups were able to stop the proposed plans.<br />

In 2010, the municipality restarted the process, and decided to<br />

come up with a new area development plan. After being criticized<br />

for not listening to the citizens when the past plans were laid out,<br />

the municipality decided to run this as an inclusive process.<br />

In 2011, they arranged three workshops prior to the plans being<br />

developed by the city administrators. One of them was open to the<br />

public. The other two were for invited groups only, but included<br />

all three new activist groups, as well as public and private<br />

organizations with a stake in the area. In total, 30 different groups<br />

and organizations were invited to these workshops. Workshop<br />

participants got four different alternatives to work with: The entire<br />

area as a recreational park, 25%, 50% and 75% development. One<br />

plan for each of these alternatives were presented and discussed in<br />

the final workshop.<br />

The workshop participants were somewhat skewed towards<br />

activists and others who opposed housing and industrial<br />

development. The private investor did not attend the workshops,<br />

nor did other stakeholders who had an interest in development.<br />

This would later be used as an argument for development.<br />

In addition to the workshops, an online survey was distributed to<br />

the general public and presented at the final workshop. The survey<br />

was based on the same alternatives as the workshops, and<br />

respondents were also asked a number of questions about which<br />

activities they wanted in the area, where buildings should be<br />

erected etc. 55,7% of the respondents (N=688) reported they<br />

wanted at least half the area for a recreational park.<br />

The local newspaper distributed another survey two months after,<br />

with similar results. Around half the respondents wanted a mix of<br />

recreational park and urban development in the area. Respondents<br />

were also asked how important they considered this case to be,<br />

and 40% reported it to be important or very important.


Both surveys were open to interpretation, which lead developers<br />

and activists to argue a great deal about what was the true public<br />

opinion in the matter.<br />

Several respondents, both activists and government officials, have<br />

called this a sham process, and claimed that politicians had no<br />

intention other than to soothe the opposition. When faced with<br />

these charges, politicians have denied them in the interviews,<br />

claiming they created the workshops and surveys in an honest<br />

attempt to be more inclusive.<br />

The municipal administration used the input from the workshops<br />

and survey, and came up with 9 alternatives for the new area<br />

development plan. At this stage only the building footprint, how<br />

much of the cove to set aside for buildings, was discussed. The<br />

argument for this was that previous debates had tried to cover too<br />

much, which lead to no decision on the overall plan. The<br />

administration supported an alternative which meant 75% of the<br />

area was to be developed, and the city council voted in support of<br />

this in a council meeting held late March 2011, with 21 votes<br />

against 18.<br />

In august 2011 the city council assembled again, to vote on<br />

building heights and the contract for development with the private<br />

investor and his partners. After long debate, which included a vote<br />

on a change to the area plan passed in the last meeting, the council<br />

again voted in the support of development, with 24 votes against<br />

14.<br />

Both meetings had a large audience consisting mainly of activists<br />

aged between 40 and 70. There were few, if any, people under the<br />

age of 35 present, in spite of activist claims that youth were very<br />

engaged in the case and were big supporters of a recreational park.<br />

In both meetings, activists created a lot of disturbance, causing the<br />

mayor to threaten to close off the meeting to the public. After the<br />

August meeting, activists were furious, claiming the politicians<br />

had failed to listen to the public.<br />

In the autumn of 2011 there was a new municipal election. Once<br />

again the activists created a pamphlet showing how people could<br />

vote if they wanted “park-friendly” politicians in the new city<br />

council, who could re-open the case. The lists were distributed<br />

online, through a web site, were promoted on Facebook and also<br />

spread through physical means and word of mouth.<br />

Although not a complete success, the activists were once again<br />

able to influence who got elected to the city council. About 400<br />

people seemed to follow the activists’ advice.<br />

At the time data collection ended (November 2011), the previous<br />

city council’s decision had not been up for discussion in the new<br />

city council, and the new mayor has told the media that it is not<br />

likely the case will be reopened.<br />

However, the activists have vowed to keep on fighting, and at the<br />

time of writing have complained to regional authorities about<br />

procedural errors in the existing resolution. The complaints will<br />

most likely not be heard, at least not lead to changes in the<br />

development plans.<br />

Even though it seems as if the activists have lost their fight, there<br />

is no doubt that citizen initiated participation has had considerable<br />

influence in this case. The activists have, through their targeted<br />

efforts, managed to influence the composition of two city<br />

councils, have made the city council swing against development<br />

several times, and through this they have delayed development for<br />

52<br />

almost 5 years, and forced the city to concessions such as the<br />

workshops and survey, as well as the creation of several reports<br />

on noise, pollution and other issues.<br />

5. FINDINGS<br />

In this section the findings from the genre systems of print media<br />

(letters to the editor) and social media (Facebook groups) are<br />

presented, followed by an analysis of how the two systems rate in<br />

terms of contributing to the public sphere.<br />

5.1 Genre Systems<br />

The individual genres were identified through applying the<br />

5W1H-method to letters to the editor in the printed edition of the<br />

local newspaper, and postings on Facebook groups created to<br />

discuss the case. In order to examine the genre system, additional<br />

columns for the system were added, as well as a column showing<br />

the relation between genres. These additional columns were<br />

inspired by [36].<br />

Earlier research conducted by the author has shown that there are<br />

three objectives for why politicians choose to communicate in<br />

digital media. These are dialogue with citizens, contributions from<br />

citizens, and involvement in party activities [39]. Effective<br />

political communication should thus address these.<br />

These objectives can be interpreted and as genres in their own<br />

right. Table 1 shows the three objectives as genres.<br />

The genres identified in the discussion spaces we are observing<br />

can be analyzed as to which of these “genre objectives” they<br />

support (table 2), and this knowledge can be applied by site<br />

administrators and politicians in such a way as to facilitate the use<br />

of genres which are most likely to lead to the desired objective.<br />

Table 1: Political objectives as genres<br />

Dialogue Contribution Involvement<br />

Why Involve citizens in<br />

public debate<br />

Knowledge<br />

about citizen<br />

concerns<br />

Raise funds.<br />

Get people to<br />

volunteer<br />

When Continuous Election time Election time<br />

What Conversation<br />

between citizens<br />

and<br />

politicians/citizens<br />

and citizens<br />

Who Politicians, party<br />

members, citizens<br />

Q&A. Voter<br />

stories<br />

Politicians,<br />

party<br />

members,<br />

voters<br />

Competitions,<br />

membership<br />

forms,<br />

information<br />

Voters,<br />

sympathizers<br />

Where SNS, web site SNS, web site SNS, web site<br />

How Encourage<br />

dialogue.<br />

Open and personal<br />

language. Citizengenerated<br />

content.<br />

Encourage<br />

contributions<br />

and questions<br />

from voters<br />

Competitions,<br />

theme sites,<br />

crosspublication


While letters to the editor could be said to be a genre in itself,<br />

there are some significant differences in style and form. As could<br />

be expected from a mature medium, there are a limited number of<br />

genres to be found. Except for the “poem” genre, the main<br />

difference between the genres in the letters to the editor section<br />

lies in the level of formality and how the arguments are presented.<br />

Some letters are kept in a formal tone and based on facts, while<br />

others are more personal, some bordering on libelous. In the<br />

beginning there were several voices represented, but as the case<br />

progresses the activists, who were against development, produced<br />

the vast majority of letters. Letters tend to become more<br />

aggressive over time, with a somewhat increased focus on<br />

individuals and less on formal, fact-based debate. As it is mainly<br />

those opposing development who write to the paper, there is little<br />

direct debate.<br />

However, a number of the writers address politicians by name,<br />

citing things the politician(s) said in council meetings or other<br />

places.<br />

All in all, the genre system of the editorial column functions well<br />

for disseminating ones ideas, somewhat well for debate (although<br />

the slow speed of print means you have to pay close attention if<br />

you want to catch who is addressing whom), and the majority of<br />

letters are at least somewhat fact-based and formal. The genres in<br />

this system are presented in table 2. The first two rows describe<br />

the purpose and actors of the genre system (letters to the editor),<br />

while the rest of the table is a 5W1H analysis of the individual<br />

genres identified within the genre system.<br />

System:<br />

why<br />

System:<br />

whose<br />

Table 2: Genre system in newspaper editorial section<br />

Promote and conduct debate about local issues<br />

Owned and edited by the local newspaper. Open to<br />

everyone, but editors decide who gets printed<br />

Genre Opinion, formal Opinion, informal<br />

Where Newspaper Newspaper<br />

Why<br />

When<br />

Who<br />

What<br />

How<br />

Convince others<br />

through presenting<br />

facts<br />

Continuously, more<br />

when case is<br />

processed in city<br />

council or during<br />

election time<br />

Activist to<br />

citizen/politicians<br />

Developer to<br />

citizen/politicians<br />

Presents a view,<br />

followed by<br />

supporting facts and<br />

arguments<br />

Letters are sent to<br />

the editor and<br />

Convince others through<br />

appeals to emotions<br />

Continuously, more when case<br />

is processed in city council or<br />

during election time<br />

Activist to citizen/politicians<br />

Presents a view, supported by<br />

emotional statements or<br />

unsupported views<br />

Letters are sent to the editor<br />

and published.<br />

53<br />

Relation<br />

to table1<br />

published.<br />

Dialogue,<br />

contribution<br />

Dialogue<br />

Genre Poem Personal attacks<br />

Where Newspaper Newspaper<br />

Why<br />

When<br />

Who<br />

What<br />

How<br />

Relation<br />

to table1<br />

Gain attention<br />

through an unusual<br />

genre<br />

Infrequently, no set<br />

pattern<br />

Activist/citizen to<br />

citizens<br />

Short rhymes,<br />

aimed at touching<br />

people’s emotions<br />

Letters are sent to<br />

the editor and<br />

published<br />

Vent own feelings, discredit<br />

the one being attacked<br />

Continuously, more when case<br />

is processed in city council or<br />

during election time, or when<br />

newspaper editorial have<br />

written positively about<br />

development<br />

Activist to<br />

politicians/developer/news<br />

editor<br />

None None<br />

Points to previous letter or<br />

quote and argues against it.<br />

Some simply claim the person<br />

being attacked is less gifted<br />

because s/he means what s/he<br />

means<br />

Letters are sent to the editor<br />

and published.<br />

All the Facebook groups we found were run by activists, and most<br />

of the participants in the groups were either activists or citizens<br />

supporting the activists’ opposition to development. There were<br />

also a lot of passive members who did not contribute in the<br />

discussions on the wall, whereof some were representatives of the<br />

city council or the media that joined in order to follow what the<br />

activists were saying and planning.<br />

There are some noteworthy differences between the two genre<br />

systems. In social media we see many of the same genres, but also<br />

some new ones where functionality of the medium plays an<br />

important role. The links genre makes use of the networked nature<br />

of the Internet to provide fast access to information stored<br />

elsewhere, and link targets often contain multimedia content.<br />

Multimedia also helps to enrich some of the other genres. The<br />

formal and informal opinion genres are present in both the “old”<br />

and “new” media, but are enacted somewhat differently in new<br />

media. In the Facebook groups we see a lot of images and also<br />

some videos made by the activists to show how the planned<br />

development will impact the surroundings. These provide<br />

valuable extra information that can be difficult to present in a<br />

printed medium with limited space.<br />

On the other hand, the postings on Facebook tend to be shorter,<br />

and there is less fact-based discussion and postings seem to be<br />

more improvised, which provides less information than the longer<br />

and more thought-out letters to the editor.<br />

Another difference is the spontaneous “greetings/cheers” genre,<br />

where people will congratulate each other, or citizens will write a<br />

short post to show their support for the activists’ case. This kind


of informal communication is not likely to be printed, as it does<br />

not contribute to the debate, but nonetheless acts as important<br />

feedback and perhaps a moral boost to the activists.<br />

System:<br />

why<br />

System:<br />

whose<br />

Table 3: Genre system in social media<br />

Activist groups fighting against the planned<br />

development<br />

Owned by activist groups or individuals, open to<br />

everyone but mostly participants are opposed to<br />

development<br />

Genre Opinion, formal Opinion, informal<br />

Where Facebook group wall Facebook group wall<br />

Why<br />

Convince others<br />

through presenting<br />

facts<br />

When Ongoing Ongoing<br />

Who<br />

What<br />

How<br />

Relation<br />

to table1<br />

Activist to<br />

activist/citizen<br />

Presents a view,<br />

followed by supporting<br />

facts and arguments.<br />

Often with links,<br />

pictures, video<br />

Group members post<br />

messages on wall<br />

Present short opinion on<br />

something<br />

Activist to activist/citizen<br />

Presents a view,<br />

supported by emotional<br />

statements or<br />

unsupported views.<br />

Sometimes with links,<br />

pictures, video<br />

Dialogue, contribution Dialogue<br />

Group members post<br />

messages on wall<br />

Genre Call to action Personal attacks<br />

Where Facebook group wall Facebook group wall<br />

Why<br />

When<br />

Get people to act on<br />

something<br />

Before city council<br />

meetings or other<br />

events where there is a<br />

need to do something<br />

Who Activist to activist<br />

What<br />

How<br />

Relation<br />

to table1<br />

Invites people to<br />

participate in<br />

demonstrations, contact<br />

politicians or cast their<br />

vote in a certain way<br />

Group members post<br />

messages on wall<br />

Discredit opponents<br />

Ongoing<br />

Involvement None<br />

Activist to developer,<br />

politicians<br />

Often unprovoked short<br />

comments claiming a<br />

named person or group<br />

are in the wrong<br />

Group members post<br />

messages on wall<br />

Genre Links Greetings/cheers<br />

Where Facebook group wall Facebook group wall<br />

Why<br />

When Ongoing<br />

Who<br />

Inform others about<br />

content posted<br />

elsewhere<br />

Activist to<br />

activist/citizen<br />

Congratulate each other<br />

after victories, raise<br />

morale<br />

When the city council<br />

vote in favor of activists<br />

Activist/citizen to<br />

activists<br />

54<br />

What<br />

How<br />

Relation<br />

to table1<br />

Links to other online<br />

spaces, often<br />

multimedia content<br />

Group members post<br />

messages on wall, often<br />

with a short comment<br />

Dialogue None<br />

Positive comments about<br />

a recent event, or about<br />

the activists’’ work<br />

Group members post<br />

messages on wall<br />

5.2 Public Sphere and Social Capital<br />

The second part of the research question was how these genre<br />

systems contribute to the public sphere. To measure this the<br />

framework of [28] is applied. The framework analyses the public<br />

sphere using Dahlberg’s criteria for a public sphere (see section<br />

2.1), as well as looking for network effects to help spread the<br />

content of the discussion to more people, the type of community<br />

being supported, and the type of public sphere being supported.<br />

As social capital is said to influence who participates in a public<br />

sphere, social capital is also measured using the constructs<br />

mentioned in section 2.2. Together, these constructs helps us to<br />

understand how the communication spaces we are examining<br />

supports a public sphere, and thus how valuable they are in<br />

maintaining democratic ideals.<br />

Table 4: Public sphere characteristics of "old" media<br />

Theory Concept Case observations<br />

Public<br />

sphere<br />

Social<br />

Capital<br />

Dahlberg’s<br />

criteria<br />

Partially present, but participants<br />

are not attempting to understand the<br />

others’ perspective. Debate is fairly<br />

rational and reflective<br />

Network effects Letters are read and distributed to<br />

others, and often answered or<br />

followed up in new letters.<br />

community Readers and writers all belong to<br />

the same local community, some<br />

have regular contact outside of<br />

editorial columns<br />

Type of PS Discourse-based (after some time<br />

more towards political protest)<br />

Bridging Letters are read by both those who<br />

agree with and those who oppose<br />

the author’s position<br />

Bonding Shows others of the same opinion<br />

that they are not alone, helps bring<br />

the community closer together (for<br />

activists. The developer is more on<br />

his own).<br />

Trust &<br />

reciprocity<br />

Maintained<br />

social capital<br />

Is less of an issue in old media, as<br />

there is an editorial middleman who<br />

decides what is printed and not.<br />

Writers address each other by name,<br />

even though they may not meet in


person.<br />

Table 5: Public sphere characteristics of social media<br />

Theory Concept Case observations<br />

Public<br />

sphere<br />

Social<br />

Capital<br />

Dahlberg’s<br />

criteria<br />

Network<br />

effects<br />

Discourse is more one-way and<br />

less argument-based than in the old<br />

media, as there are mainly activists<br />

taking part in these groups.<br />

Postings can be re-posted on the<br />

walls of group members, helping to<br />

spread the ideas presented to a<br />

larger audience.<br />

Community There is a sense of shared<br />

objectives and common interest in<br />

the groups, which help create a<br />

sense of community.<br />

Type of PS Political protest. There are very<br />

few posts disagreeing with the<br />

activists.<br />

Bridging There is little evidence of bridging<br />

social capital. Content seems to<br />

stay within the group. However, it<br />

was not possible to measure the<br />

extent to which content was<br />

reposted on individual’s walls.<br />

Bonding Greetings/cheers genre as well as<br />

the general sense of agreement<br />

contributes to bonding social<br />

capital.<br />

Trust &<br />

reciprocity<br />

Maintained<br />

social capital<br />

Participants in the groups trust<br />

each other, which is natural as long<br />

as there is a common goal<br />

Not easy to measure, but there is<br />

certainly contact and discussion<br />

between the members in the group.<br />

While there are differences between the two genre systems, they<br />

each contribute to the public sphere in their own way. The genre<br />

system of traditional media is perhaps better suited to support a<br />

traditional Habermasian public sphere, where people of different<br />

opinions come together to discuss and debate. Letters printed in<br />

the newspaper are more reflective and argumentative than posts in<br />

social media, and reach a bigger audience than just those who<br />

already agree with the author of the letter or post. However, the<br />

editorial column is only as good as the people writing to it, and<br />

over time the activists view is almost the only one present, making<br />

it less a space for debate and more of a one-way communication<br />

channel.<br />

The genres in social media are less in line with Habermas’<br />

traditional public sphere ideals, but works great to support a<br />

political protest public sphere. Activists and their supporters have<br />

55<br />

a place to meet, where they can discuss, support each other, share<br />

information and maybe recruit new members. And there is also<br />

the added value that some journalists do use social media in their<br />

work, to discover new issues and find new sources. Sometimes<br />

social media gives them ideas for stories they would otherwise not<br />

have written. An informal e-mail survey sent to the journalists in<br />

the local newspaper confirms that this happens.<br />

Also, the network and bridging effects of social media are<br />

potentially a lot stronger. We do not see these effects very<br />

strongly in this particular case, perhaps because the case is<br />

localized to a small geographical area, and mainly concerns the<br />

inhabitants of that area. The users of social media already belong<br />

to the same physical community, which means there is less need<br />

for virtual networking.<br />

6. CONCLUSION AND LIMITATIONS<br />

This paper has examined the genre systems of the letters to the<br />

editor column in traditional print media and in social media, with<br />

the purpose of uncovering differences and similarities between the<br />

two systems, and to measure if social media is beginning to<br />

produce media-specific genres for eParticipation, and what this<br />

means for the public sphere.<br />

The findings indicate that we are beginning to see new genres in<br />

social media, as well as old genres being reinvented to better suit<br />

the functionality of new media. The addition of multimedia<br />

content to existing genres is one example of this. While we cannot<br />

say that social media has matured, we can conclude by saying that<br />

social media is moving ever more towards maturity.<br />

New media has room for a bigger variety of genres than<br />

traditional print media, and their instant feedback allows for a<br />

faster dialogue and more participants. This does however come at<br />

a price. Contributions in social media are often less well thought<br />

through, and not backed up by facts and rational arguments in the<br />

same way as we see in the traditional media. In that sense, the<br />

strength of the new is also its weakness.<br />

In terms of contributing to the public sphere, both genre systems<br />

do that, each in their own way. Traditional media better supports<br />

the Habermasian ideal of rational discourse, while social media is<br />

a good supporter of the political protest public sphere. As the<br />

examined social media groups are so homogenous, there is little<br />

debate going on. Social media does have a place in the wider<br />

“general public sphere”, as a source of information for news<br />

journalists. As tables one through three show, some genres are<br />

better suited than others for those who want to contribute to the<br />

political debate and to gain the attention of politicians. Genres that<br />

accommodate one of the three political objectives could perhaps<br />

be seen to contribute more to the public sphere than genres that do<br />

not address these objectives.<br />

There are some limitations to the findings in this paper. As they<br />

are based on one single case, it is not possible to generalize the<br />

findings outside of the case context. Other cases in different<br />

contexts would perhaps provide very different results. Future<br />

research efforts could include examining how the different genres<br />

should be enacted to support the objectives in table 1, and through<br />

them the public sphere. Also, more research is needed on how the<br />

added functionality of new media can contribute to eParticipation,<br />

if certain media are better suited than others for a given genre, and<br />

what combination of genres and media would be likely to provide


good results for the concrete objectives of various activist<br />

campaigns.<br />

7. REFERENCES<br />

[1] Macintosh, A., A. McKay-Hubbard, and D. Shell, Using<br />

Weblogs to Support Local Democracy, in E-Government:<br />

Towards Electronic Democracy2005. p. 1-12.<br />

[2] Tambouris, E., N. Liotas, and K. Tarabanis, A Framework<br />

for Assessing eParticipation Projects and Tools, in Hawaii<br />

International Conference on System Sciences2007: Hawaii.<br />

[3] Jackson, N.A. and D.G. Lilleker, Building an Architecture of<br />

Participation? Political Parties and Web 2.0 in Britain.<br />

Journal of Information Technology and Politics, 2009. 6(3):<br />

p. 232-250.<br />

[4] Gray, M. and M. Caul, Declining Voter Turnout in Advanced<br />

Industrial Democracies, 1950 to 1997. Comparative Political<br />

Studies, 2000. 33(9): p. 1091-1122.<br />

[5] Østerud, Ø., F. Engelstad, and P. Selle, Makten og<br />

demokratiet. En sluttbok fra makt- og<br />

demokratiutredningen2003, Oslo: Gyldendal akademisk.<br />

344.<br />

[6] Sæbø, Ø., J. Rose, and L. Skiftenes Flak, The shape of<br />

eParticipation: Characterizing an emerging research area.<br />

Government Information Quarterly, 2008. 25(3): p. 400-428.<br />

[7] Brandtzæg, P.B. and M. Lüders, eCitizen 2.0: The Ordinary<br />

Citizen as a Supplier of Public Sector Information, 2008,<br />

Ministry for Government and Administration Reform: Oslo.<br />

[8] Papacharissi, Z., The Virtual Sphere: The Internet as Public<br />

Sphere. New Media and Society, 2002. 4(1): p. 9-27.<br />

[9] Gimmler, A., Deliberative Democracy, the Public Sphere and<br />

the Internet. Philosophy & Social Criticism, 2001. 27(4): p.<br />

21-39.<br />

[10] Yates, J. and W.J. Orlikowski, Genres of Organizational<br />

Communication: A Structurational Approach to Studying<br />

Communication and Media. The Academy of Management<br />

Review, 1992. 17(2): p. 299-326.<br />

[11] Orlikowski, W.J. and J. Yates, Genre Repetoire: The<br />

Structuring of Communicative Practices in Organizations.<br />

Administrative Science Quarterly, 1994. 39(4): p. 541-74.<br />

[12] Shepherd, M. and C. Watters. The evolution of cybergenres.<br />

in System Sciences, 1998., Proceedings of the Thirty-First<br />

Hawaii International Conference on. 1998.<br />

[13] Dahlberg, L., The Internet and Democratic Discourse:<br />

Exploring The Prospects of Online Deliberative Forums<br />

Extending the Public Sphere. Information, Communication &<br />

Society, 2001. 4(4): p. 615 - 633.<br />

[14] Habermas, J., The Public Sphere, in Jürgen Habermas on<br />

Society and Politics: A reader, S. Seidman, Editor 1989,<br />

Beacon Press: Boston.<br />

[15] Frazer, E., The Problem of Communitarian Politics. Unity<br />

and Conflict1999, Oxford: Oxford University Press.<br />

[16] Castells, M., The New Public Sphere: Global Civil Society,<br />

Communication Networks, and Global Governance. The<br />

56<br />

Annals of the American Academy of Political and Social<br />

Science, 2008. 616(1): p. 78-93.<br />

[17] Merriman, J., A history of modern Europe: From the French<br />

Revolution to the Present. Vol. 2. 1996, New York: W.W<br />

Norton & Company.<br />

[18] Habermas, J., The Structural Transformation of the Public<br />

Sphere: An inquiry into a category of bourgeoise<br />

society1991, Cambridge, Mass: MIT Press.<br />

[19] Webster, F., Information Management and Manipulation:<br />

Jürgen Habermas and the Decline of the Public Sphere, in<br />

Theories of the Information Society1995, Routledge:<br />

London.<br />

[20] Dahlgren, P., The Internet, Public Spheres, and Political<br />

Communication: Dispersion and Deliberation. Political<br />

Communication, 2005. 22: p. 147-162.<br />

[21] Poster, M., Cyberdemocracy: The Internet and the Public<br />

Sphere, in Internet Culture, D. Porter, Editor 1997,<br />

Routledge: New York/London.<br />

[22] Gibson, R.K., W. Lusoli, and S. Ward, Online Participation<br />

in the UK: Testing a ‘Contextualised’ Model of Internet<br />

Effects1. The British Journal of Politics & International<br />

Relations, 2005. 7(4): p. 561-583.<br />

[23] Tewksbury, D., The Seeds of Audience Fragmentation:<br />

Specialization in the Use of Online News Sites. Journal of<br />

Broadcasting & Electronic Media, 2005. 49(3): p. 332-348.<br />

[24] Calhoun, C., Community without Propinquity Revisited:<br />

Communications Technology and the Transformation of the<br />

Urban Public Sphere. Sociological Inquiry, 1998. 68(3): p.<br />

373-397.<br />

[25] Muhlberger, P., Human Agency and the Revitalization of the<br />

Public Sphere. Political Communication, 2005. 22(2): p. 163-<br />

178.<br />

[26] Habermas, J., Political Communication in Media Society:<br />

Does Democracy Still Enjoy an Epistemic Dimension? The<br />

Impact of Normative Theory on Empirical Research1.<br />

Communication Theory, 2006. 16(4): p. 411-426.<br />

[27] Trenz, H. and K. Eder, The Democratizing Dynamics of a<br />

European Public Sphere. European Journal of Social Theory,<br />

2004. 7(1): p. 5-25.<br />

[28] Johannessen, M.R., Social Capital and the Networked Public<br />

Sphere: Implications for Political Social Media sites, in The<br />

Hawaii International Conference on System Sciences<br />

(HICSS-45)2012: Maui, Hawaii, USA.<br />

[29] Putnam, R.D., Bowling Alone: The Collapse and Revival of<br />

American Community2000, New York: Simon & Schuster.<br />

[30] Svendsen, G.T. and G.L.H. Svendsen, Social Kapital - en<br />

introduktion2006, København: Hans Reitzels Forlag.<br />

[31] Ahuja, S., M.A. Pèrez-Quiñones, and A. Kavanaugh, Local<br />

conversations 2.0, in Proceedings of the 10th Annual<br />

International Conference on Digital Government Research:<br />

Social Networks: Making Connections between Citizens,<br />

Data and Government2009, Digital Government Society of<br />

North America.


[32] Yang, S., H. Lee, and S. Kurnia, Social Capital in<br />

Information and Communications Technology Research:<br />

Past, Present and Future. Communications of the Association<br />

for Information Systems, 2009. 25: p. 183-221.<br />

[33] Ellison, N.B., C. Steinfield, and C. Lampe, The Benefits of<br />

Facebook “Friends:” Social Capital and College Students’<br />

Use of Online Social Network Sites. Journal of Computer-<br />

Mediated Communication, 2007. 12(4): p. 1143-1168.<br />

[34] Pasek, J., E. More, and D. Romer, Realizing the Social<br />

Internet? Online Social Networking meets Offline Civic<br />

Engagement. Journal of Information Technology & Politics,<br />

2009. 6(3&4): p. 197-215.<br />

[35] Turnšek, M., “The Digital Youth Revolt?” Young People and<br />

eParticipation, in Understanding eParticipation:<br />

Contemporary PhD eParticipation research in Europe, A.<br />

Avdic, et al., Editors. 2008, Örebro University Library:<br />

Örebro.<br />

[36] Päivärinta, T. and Ø. Sæbø, The Genre System Lens on E-<br />

Democracy. Scandinavian Journal of Information Systems,<br />

2008. 20(2).<br />

[37] Sæbø, Ø., Understanding Twitter Use among Parliament<br />

Representatives: A Genre Analysis, in Electronic<br />

Participation, E. Tambouris, A. Macintosh, and H. de Bruijn,<br />

Editors. 2011, Springer Berlin / Heidelberg. p. 1-12.<br />

[38] Sæbø, Ø. and T. Päivârinta, Autopoietic cybergenres for e-<br />

Democracy? Genre analysis of a web-based discussion<br />

board, in Hawaii International Conference on System<br />

Sciences2005.<br />

57<br />

[39] Johannessen, M., Genres of Participation in Social<br />

Networking Systems: A Study of the 2009 Norwegian<br />

Parliamentary Election, in Electronic Participation, E.<br />

Tambouris, A. Macintosh, and O. Glassey, Editors. 2010,<br />

Springer Berlin / Heidelberg. p. 104-114.<br />

[40] Yoshioka, T., et al., Genre taxonomy: A knowledge<br />

repository of communicative actions. ACM Trans. Inf. Syst.,<br />

2001. 19(4): p. 431-456.<br />

[41] Yates, J. and W. Orlikowski, Genre Systems: Structuring<br />

Interaction through Communicative Norms. Journal of<br />

Business Communication, 2002. 39(1): p. 13-35.<br />

[42] Kaplan, B. and J. Maxwell, Evaluating the Organizational<br />

Impact of Healthcare Information Systems, in Qualitative<br />

Research Methods for Evaluating Computer Information<br />

Systems, J. Anderson and C. Aydin, Editors. 2005, Springer<br />

New York. p. 30-55.<br />

[43] Marshall, C. and G. Rossman, Designing Qualitative<br />

Researh: 3rd Edition1999, Thousand Oaks, CA: Sage.<br />

[44] Benbasat, I., D.K. Goldstein, and M. Mead, The Case<br />

Research Strategy in Studies of Information Systems. MIS<br />

Quarterly, 1987. 11(3): p. 369-386.<br />

[45] Cresswell, J.W., Research Design: Qualitative, Quantitative,<br />

and Mixed Methods approach2009, Los Angeles: Sage.<br />

[46] Walsham, G., Doing interpretive research. European Journal<br />

of Information Systems, 2006. 15(3): p. 320-330.


Internet voting: fatally torn between conflicting goals?<br />

Marco Prandini<br />

Università di Bologna<br />

Viale del Risorgimento, 2<br />

40136 Bologna, Italy<br />

Tel. +39 05120 93867<br />

marco.prandini@unibo.it<br />

ABSTRACT<br />

More than a decade after the first enthusiastic attempts at<br />

deploying Internet voting, there is still only a single case of<br />

continued adoption for the election of a political body. In this<br />

paper we illustrate the motivations behind the apparent failure of a<br />

process that, at a first sight, looks desirable for many reasons. We<br />

analyze the most relevant efforts in the field, which can be<br />

grouped in two main lines: those grounded on a strong formal<br />

foundation, and those designed to achieve maximum participation.<br />

From the analysis, we derive a set of desirable features, classify<br />

the systems according to their ability to achieve them, and<br />

conclude that no system is currently able to strike a convincingly<br />

positive balance between them.<br />

Categories and Subject Descriptors<br />

C.2.0 [Computer-communication networks]: General-security<br />

and protection; H.5.4 [Information interfaces and<br />

presentation]: Hypertext/Hypermedia-user issues; K.4.1<br />

[Computers and society]: Public Policy Issues-regulation; K.6.5<br />

[Management of computing and information systems]:<br />

Security and Protection-invasive software<br />

General Terms<br />

Security, Verification.<br />

Keywords<br />

Internet voting, security, privacy e-democracy.<br />

1. INTRODUCTION<br />

From the first appearance of democracies, there has been a<br />

constant evolution of the voting processes, to cope with the<br />

growth of the voting base without sacrificing its characteristics of<br />

accuracy, privacy and accessibility. While in the beginning it was<br />

deemed appropriate to openly express one's own will by raising a<br />

hand, nowadays complex devices have appeared to ensure fair and<br />

efficient collection of large numbers of ballots, possibly<br />

containing votes about many different topics, and their tallying<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

58<br />

Marco Ramilli<br />

Università di Bologna<br />

Via Venezia, 52<br />

47521 Cesena, Italy<br />

Tel. +39 05120 93867<br />

marco.ramilli@unibo.it<br />

according to various kinds of algorithms. Quite obviously, the<br />

latest steps of this evolutionary process involve the usage of<br />

computers and of the Internet.<br />

Electronic voting machines and automatic tallying workstations<br />

took over manual/mechanical casting and tallying procedures,<br />

with the main goal of speeding up the whole voting process and<br />

making it less error-prone. The results were mixed. Twenty years<br />

ago the determination of an election result would take up to a few<br />

days, and the procedures for the verification of contested results<br />

were even slower (and arguably reliable). Nowadays computerbased<br />

systems make it possible to compute the results almost in<br />

real time. Reliability did not see the same improvement, because<br />

there is an intrinsic disadvantage of computer-based systems when<br />

compared to traditional ones: computers inevitably process ballots<br />

in a way that cannot be kept under the voter's control.<br />

Consequently, the voter is forced to surrender a significant part of<br />

his trust in the voting system to the organizational apparatus that<br />

runs the election (the electoral body hereinafter).<br />

In order to face this responsibility, the electoral bodies started to<br />

develop technical and organizational standards for the verification<br />

of standalone computerized voting machines. They had not<br />

finished settling on truly comprehensive procedures, when one<br />

more paradigm shift was proposed towards the building of an<br />

Internet-based voting system. Internet voting is supposed to<br />

exhibit many advantages, especially in terms of accessibility, but<br />

it pushes the control over the correct behavior of the process<br />

farther away from the voter, and from the bodies that run the<br />

election as well.<br />

In this paper, we start by summarizing the foundational works<br />

about Internet voting and then proceed to quickly illustrate three<br />

Internet voting systems, which serve as valid representatives for<br />

different conceptual approaches to the subject. We discuss their<br />

relative merits and issues, before drawing conclusions.<br />

2. AN OUTLINE OF INTERNET VOTING<br />

At the very beginning of the past decade, Internet voting was<br />

beginning to draw interest as a platform for binding, large scale<br />

elections. The first structured analysis of the characteristics of<br />

Internet voting is presented in the final report [5] of the California<br />

Internet Voting Task Force (IVTF), which was convened by the<br />

Secretary of State to study the feasibility of using the Internet to<br />

conduct elections in California, and included more than two dozen<br />

experts in the field of data security, elections and voter<br />

participation.


In March 2000, just a couple of months after the release of the<br />

IVTF report, the presidential preference primary of the Arizona<br />

Democratic party provided a real test case, as the first legally<br />

binding political election to offer voters the possibility to cast<br />

their ballots from the location of their choice. The experience is<br />

well documented in a “pro vs. con”' face-to-face paper where Joe<br />

Mohen and Julia Glidden [16] described the most significant<br />

advantages of voting over the Internet, experienced firsthand as<br />

they actually ran the election on election.com, whereas Deborah<br />

M. Phillips and Hans A. von Spakovsky [19] played the<br />

counterpoint by outlining the few but deeply worrying issues that<br />

arose, mainly due to the insecurity of computer-based systems.<br />

2.1 The Pros<br />

“Universal Access” plays the main role in the list of the Internet<br />

voting advantages. In its simplest acception, universal access is<br />

the possibility to vote from every connected place, during an<br />

extended period, but it has more important aspects than freedom<br />

from lines at the polling station. It makes possible for people with<br />

disabilities to have specific tools tailored to their needs and<br />

enabling them to cast their votes. It allows people living far from<br />

city centers, without cars or any public transport, to reach the<br />

ballot box in a few clicks. These enfranchisement opportunities<br />

are also seen as a way to stimulate participation in countries<br />

where the voters turnout is low.<br />

Economic advantages appear to be obvious with the adoption<br />

Internet voting systems. Indeed Internet voting could eliminate the<br />

need to set up many polling places, to print paper ballots in the<br />

millions, or to organize committees spread all over the country to<br />

direct and to monitor the elections. Internet voting is much<br />

cheaper, quicker and easier to protect from traditional threats such<br />

as physical security of the polling places and of the ballots.<br />

Multi-cultural countries would enjoy the possibility of easily<br />

designing multilingual ballots, so that voters not familiar with the<br />

official language could vote using on their native language. Voters<br />

who cannot read could exploit text-to-speech libraries and be<br />

guided to the expression of their vote by a voice. Finally, Internet<br />

voting systems are especially convenient for the first and foremost<br />

group of citizen which they were originally thought for: overseas<br />

residents, such as military or diplomats who must be outside their<br />

country for job reasons [9].<br />

2.2 The Cons<br />

The issues with Internet voting are both of technical and of social<br />

nature. On the technical side, when compared to electronic voting<br />

solutions based on polling stations, there are three aspects that<br />

make security problems of Internet voting stand out. First, there is<br />

no real possibility of assessing the integrity of voters' terminals.<br />

Injected malware could manipulate the voter's ballot without<br />

being detected. Second, some of the control exercised over the<br />

voting process is shifted to the central processing facilities that<br />

collect votes and count them. The opportunity to curb illicit<br />

manipulation is pushed farther away from the voters and their<br />

representatives, traditionally monitoring the polling places. The<br />

network that connects these two ends is itself subject to attacks.<br />

While cryptography can protect the integrity and privacy of the<br />

transmitted ballots, there is not much that can be done against<br />

denial-of-service attacks, which flood the network preventing the<br />

system to work at all.<br />

59<br />

Also on the social side, at least three issues arise. The first derives<br />

from the disappearing physical protection provided by the polling<br />

place. It is very difficult to prevent voters casting ballots on their<br />

personal computers from getting (or be forced to get) proofs of<br />

what/who they voted for. This could exacerbate phenomena such<br />

as vote selling, “family votes”, and coerced voting. The second<br />

issue regards universal access. While at a first glance the Internet<br />

would appear as an equalizing medium, in reality the most<br />

disadvantaged parts of the population would probably be less<br />

capable of using an advanced system than they are of<br />

understanding traditional ballots, provided they can access a<br />

computer and a network connection at all. Third, some<br />

experiences lead to think that voter's turnout is not increased by<br />

the convenience of the system. In certain cases it was even<br />

lowered, possibly by the feeling that the election was nothing<br />

more than another Internet gadget instead of an important<br />

occasion to meet, discuss, and form a political opinion.<br />

2.3 Three Approaches to Internet Voting<br />

We are interested in comparing projects which have very different<br />

origins, and correspondingly different approaches to security.<br />

Remotegrity [6] was born in the academia to integrate formal<br />

security proof of ballot handling correctness. It is an absentee<br />

voting system implemented at the George Washington University,<br />

which allows to choose among multiple voting methods. Used<br />

during the 2011 election in Takoma Park, Maryland, Remotegrity<br />

gave the citizen the ability to independently verify that their votes<br />

had been correctly recorded without revealing how they voted.<br />

This property is referred to as “end to end (E2E) verifiability”,<br />

and it is built on the Scantegrity [7] system.<br />

Helios [1] was developed by the initiative of a no-profit<br />

organization (http://heliosvoting.org/) focused on the voters right<br />

to control their votes. It has been used in many elections; the<br />

website claims more than 25,000 votes cast at the time we are<br />

writing. Helios defines a stronger concept of verifiability than<br />

Remotegrity does: it gives the ability to verify if a vote has been<br />

correctly counted for in the election results, not simply correctly<br />

recorded. Helios calls this property “true verifiability”.<br />

The Estonian voting system [10] was “built to work” by the<br />

government. Estonia is not the only country having evaluated<br />

Internet voting for politically relevant elections, yet it can<br />

certainly represent the whole category of government-sponsored<br />

Internet voting systems, having the longest history of<br />

development and usage of such systems. Moreover, comparative<br />

analyses show many similarities with other nations' alternatives<br />

[23, 11, 21]. The Estonian Internet voting system is meant to<br />

supplement the traditional methods of voting. Voters can vote on<br />

their computer/smart-card-based systems or mobile phones, but<br />

also override the votes cast on these systems by voting at the<br />

polling station.<br />

2.4 Evaluation of the Existing Systems<br />

The discussion in sections 2.1 and 2.2 allows to list a set of<br />

positive features and advantages that Internet voting systems<br />

should exhibit, and a set of problems and drawbacks that Internet<br />

voting systems should avoid to introduce. We measure how well<br />

the aforementioned systems perform with respect to these sets in<br />

Table 1.


Expected pros<br />

Possible cons<br />

Location- and timeindependent<br />

Multimedia /<br />

multilanguage<br />

Economy<br />

Technological<br />

discrimination<br />

Security issues -<br />

client side infections<br />

Security issues -<br />

server side<br />

manipulation<br />

Security issues -<br />

denial of service<br />

Privacy - vote<br />

selling<br />

Privacy - coercion<br />

Table 1. Internet voting measured against the desired advantages and possible disadvantages<br />

3. DISCUSSION<br />

More than a decade ago, a few but significant security problems<br />

related to the infrastructure backed the criticism of Internet voting.<br />

Now, the same problems have been all but solved in a convincing<br />

way. Motivated attackers can disenfranchise voters by means of<br />

DDoS campaigns. Viruses infecting the I/O interface of voters'<br />

computers enable large-scale alterations or privacy breaches no<br />

matter how sophisticated the voting protocol is. From a<br />

conceptual viewpoint, most of these issues can be addressed and<br />

solved as technology advances, but the experience teaches us that<br />

even in strictly controlled environments there is a significant<br />

margin for errors in design and implementation. The road towards<br />

effective conformance testing of voting machines installed in<br />

polling places has been long. It went through deep review of<br />

systems initially adopted without a transparent process<br />

guaranteeing their security [12, 4, 17]. It led to ample public<br />

discussions in the U.S.A [24, 3] as well as in the European Union<br />

[15] that were incorporated in the track for defining public<br />

standards [22, 8]. Still, there is ample margin for enhancements<br />

[13, 18, 20]. Thinking that the same level of security can be<br />

attained in uncontrolled user computers is unrealistic.<br />

There are examples of formally-designed systems, like Helios and<br />

Remotegrity, that allow voters to detect manipulations. They<br />

neutralize the effect of successful attacks against any component<br />

of the chain leading from the voter's intention to the tallied ballot.<br />

They failed, until now, to achieve widespread acceptance,<br />

possibly because their principles are too complex, or because<br />

there is no authoritative political body pushing for their adoption.<br />

The Estonian case is the exact opposite. The unquestionable<br />

success of the parliament elections appears to be strongly tied not<br />

to the solution of the mentioned issues, but rather to the social<br />

context. Estonians are (rightly) proud of the technological<br />

advances that enable such a small nation to achieve self-<br />

Remotegrity Helios Estonian<br />

Almost completely<br />

(paper-based credentials)<br />

Almost (constrained by the<br />

paper alternative)<br />

Costly (web + mail + polling<br />

places)<br />

No (browser based +<br />

traditional alternatives)<br />

Manipulation can be<br />

detected<br />

Manipulation can be<br />

detected<br />

Possible, especially serious<br />

in the verification phase<br />

Possible but very hard<br />

Possible (subtraction of<br />

authentication pack)<br />

60<br />

Completely<br />

(browser based)<br />

Completely<br />

Optimal (web<br />

only)<br />

Somewhat, no<br />

alternatives to the<br />

Internet<br />

Malware can<br />

sniff votes<br />

Manipulation can<br />

be detected<br />

Possible<br />

Malware can<br />

sniff votes<br />

Possible (in<br />

presence)<br />

sustainability 1 . They gladly accept the word of their government<br />

as regards the security of the voting process, rather than asking for<br />

a process that would enable them to verify the correctness of the<br />

election themselves. The government reinforced this orientation<br />

by designing a system that can be more or less understood by a<br />

large part of the population. In this scenario, proposing<br />

enhancements that make the system slightly harder to understand<br />

but much more secure could have a counter-intuitive effect of<br />

lowering trust. So, trust is where apparently there are less reasons<br />

for it to be; however, the fact that the whole Estonian egovernment<br />

infrastructure was held captive under a DDoS [14]<br />

should be a clear reminder that even the most proactive and<br />

involved player cannot always defeat its opponents.<br />

Moreover, Internet voting is affected by some fundamental issues<br />

that technology cannot completely address. Often, trust in the<br />

system would require the simultaneous satisfaction of<br />

contradicting requirements. Systematic coercion perpetrated<br />

through infected computers can be mitigated by allowing<br />

overwriting of votes, but maintaining both Internet- and paperbased<br />

systems in parallel operation causes confusion and defeats<br />

the economic purpose of Internet voting. Vote selling is enabled,<br />

albeit with different severity, by the same receipts that allow<br />

verifiability and are needed to secure the process end-to-end.<br />

Innovative technological components like the Trusted Platform<br />

Module could greatly increase the robustness of voting clients, but<br />

at the same time introduce new system requirements that limit the<br />

concept of universal access. Solutions at the state of the art could<br />

further aggravate the discrimination of the weakest groups of<br />

citizens, who already suffer digital divide for real,<br />

notwithstanding the false perception that as new generations enter<br />

1 In the words of their president:<br />

http://valits.us/icegov2011keynote<br />

Almost completely (tied to<br />

ID card or GSM coverage)<br />

Almost (constrained by the<br />

paper alternative)<br />

Costly (web + phone +<br />

polling places)<br />

Traditional alternatives, but<br />

special devices needed for<br />

remote voting<br />

Malware can hijack GUI<br />

Valid votes can be<br />

discarderd, fake votes added<br />

Possible<br />

Very hard (votes can be<br />

overwritten later)<br />

Possible (in presence or<br />

through hijacked GUI)


society the gap will close [2]. The most intractable issue however<br />

is the lack of privacy and protection the polling place gives to<br />

voters. Some Norwegian politicians have referred to “family<br />

voting” as a reason to abandon Internet voting altogether [11].<br />

In conclusion, it is our opinion that after a decade of<br />

experimentation Internet voting is not ready for large scale<br />

deployment yet. The different experiences presented in this paper<br />

prove the strong desire to devise solutions to the main problems.<br />

End-to-end verifiable ballots represent a key step towards<br />

independence from “absolute” security of every component of the<br />

voting chain. Significant real-world use cases like Estonian<br />

elections help bridging the gap between technology and citizens.<br />

Whether the combination of these two driving forces will be<br />

successful in producing really trustworthy systems, and in<br />

advancing awareness enough for people to properly use them, it is<br />

still very hard to foresee.<br />

4. REFERENCES<br />

[1] B. Adida. Helios: web-based open-audit voting. In SS'08:<br />

Proceedings of the 17th conference on Security symposium,<br />

pages 335-348, Berkeley, CA, USA, 2008. USENIX<br />

Association.<br />

[2] F. Belanger and L. Carter. The digital divide and internet<br />

voting acceptance. In Digital Society, 2010. ICDS '10. Fourth<br />

International Conference on, pages 307-310, Feb. 2010.<br />

[3] H. S. Berger. Testimony concerning the TGDC 2007 draft<br />

revision of the voluntary voting system guidelines. Mar. 17,<br />

2008.<br />

[4] Bishop, M., Blaze, M., Vigna, G., et al.,. University of<br />

California red team reports on voting systems, 2007.<br />

http://www.sos.ca.gov/elections/elections vsr.htm.<br />

[5] California Internet Voting Task Force (California Secretary of<br />

State). A report on the feasibility of internet voting, Jan 2000.<br />

http://www.ss.ca.gov/executive/ivote.<br />

[6] R. Carback, D. Chaum, J. Clark, J. Conway, A. Essex, P. S.<br />

Herrnson, T. Mayberry, S. Popoveniuc, R. L. Rivest, E. Shen,<br />

A. T. Sherman, and P. L. Vora. Scantegrity II municipal<br />

election at Takoma Park: The first e2e binding governmental<br />

election with ballot privacy. In USENIX Security Symposium,<br />

pages 291-306. USENIX Association, 2010.<br />

[7] D. Chaum, A. Essex, R. Carback, J. Clark, S. Popoveniuc, A.<br />

Sherman, and P. Vora. Scantegrity: End-to-end voter-verifiable<br />

optical-scan voting. Security & Privacy, IEEE, 6(3):40-46,<br />

May-June 2008.<br />

[8] Council of Europe. Recommendation Rec (2004) 11. Council of<br />

Europe, 2004.<br />

[9] Federal Voting Assistance Program. The uniformed and<br />

overseas citizens absentee voting act overview.<br />

http://www.fvap.gov/reference/laws/uocava.html.<br />

[10] S. Heiberg, P. Laud, and J. Willemson. The application of ivoting<br />

for Estonian parliamentary elections of 2011. In<br />

Proceedings of the Third VOTE-ID International Conference,<br />

Sep. 2011.<br />

61<br />

[11] K. Hole and L. Nestas. Building and maintaining trust in<br />

internet voting. Computer, PP(99):1, 2012.<br />

[12] D. Jefferson, A. D. Rubin, B. Simons, and D. Wagner.<br />

Security Analysis of the Secure Electronic Registration and<br />

Voting Experiment (SERVE). Aug. 2004.<br />

[13] R. Krimmer, S. Triessnig, and M. Volkamer. The<br />

development of remote e-voting around the world: a review<br />

of roads and directions. In Proceedings of the 1 st<br />

International Conference on E-voting and Identity, VOTE-<br />

ID'07, pages 1-15, Berlin, Heidelberg, 2007. Springer-<br />

Verlag.<br />

[14] M. Lesk. The new front line: Estonia under cyberassault.<br />

Security & Privacy, IEEE, 5(4):76-79, July-Aug. 2007.<br />

[15] M. McGaley and J. P. Gibson. A critical analysis of the<br />

Council of Europe recommendations on e-voting. In<br />

Proceedings of the 2006 USENIX/Accurate Electronic Voting<br />

Technology Workshop, 2006.<br />

[16] J. Mohen and J. Glidden. The case for internet voting.<br />

Commun. ACM, 44(1):72-85, Jan. 2001.<br />

[17] H. Pardue, A. Yasinsac, and J. Landry. Towards internet<br />

voting security: A threat tree for risk assessment. In Risks<br />

and Security of Internet and Systems (CRiSIS), 2010 Fifth<br />

International Conference on, pages 1-7, Oct. 2010.<br />

[18] S. Peisert, M. Bishop, and A. Yasinsac. Vote selling, voter<br />

anonymity, and forensic logging of electronic voting<br />

machines. In HICSS, pages 1-10. IEEE Computer Society,<br />

2009.<br />

[19] D. M. Phillips and H. A. von Spakovsky. Gauging the risks<br />

of internet elections. Commun. ACM, 44(1):73-85, Jan. 2001.<br />

[20] M. Prandini and M. Ramilli. Taking the best of both worlds:<br />

A comparison and integration of the U.S. and EU approaches<br />

to e-voting systems evaluation. In HICSS, pages 1-10. IEEE<br />

Computer Society, 2011.<br />

[21] G. Schryen and E. Rich. Security in large-scale internet<br />

elections: A retrospective analysis of elections in Estonia,<br />

The Netherlands, and Switzerland. Information Forensics<br />

and Security, IEEE Transactions on, 4(4):729-744, Dec.<br />

2009.<br />

[22] Technical Guidelines Development Committee, editor.<br />

Voluntary Voting System Guidelines Recommendations to the<br />

Election Assistance Commission. U.S. Election Assistance<br />

Commission, Aug. 2007.<br />

[23] M. Volkamer, O. Spycher, and E. Dubuis. Measures to<br />

establish trust in internet voting. In Proceedings of the 5 th<br />

International Conference on Theory and Practice of<br />

Electronic Governance, ICEGOV '11, pages 1-10, New York,<br />

NY, USA, 2011. ACM.<br />

[24] D. Wagner. Joint hearing of the house committee on science<br />

and the committee on house administration. Testimony on<br />

voting system standards. July 19, 2006.


Session 3<br />

Policies 1


A New Roadmap for Next-Generation Policy-Making<br />

Francesco Mureddu<br />

Tech4i2 Ltd, UK<br />

43B Mill Road, Leicester, UK<br />

francesco.mureddu@tech4i2.com<br />

Gianluca Misuraca<br />

European Commission, JRC IPTS<br />

C/ Inca Garcilaso, 3 - Seville, Spain<br />

gianluca.misuraca@ec.europa.eu<br />

ABSTRACT<br />

In the last thirty years the role of the government has moved<br />

consistently away from services provision to regulation. Society<br />

and economy has become more interconnected, unstable and<br />

unpredictable than ever, and citizens are keener to engage in<br />

complex policy making. Within this context, traditional tools for<br />

policy making, based upon the perfectly rational representative<br />

agent maximizing its own utility in a general equilibrium<br />

framework, have been demonstrated to be unable to predict and<br />

cope with some of today’s most pressing challenges, such as the<br />

financial crisis and climate change. Despite the explosion of data<br />

availability, the possibility to analyse them through<br />

crowdsourcing and large scale collaboration, the advance in<br />

modelling and simulation tools for assessing non-linear impact of<br />

policy options, the full potential offered by the new instruments<br />

for policy making has yet to be achieved. Therefore policy makers<br />

have not yet at their disposal a set of instruments able to cope with<br />

the needs stemming from their decision making activities.<br />

In order to meet those needs the project CROSSOVER “Bridging<br />

Communities for Next Generation Policy-Making” is elaborating<br />

a demand/driven “International Research Roadmap on ICT tools<br />

for Governance and Policy Modelling”, which links the needs and<br />

the activities of policy-making with current and future research<br />

challenges.<br />

Categories and Subject Descriptors<br />

I.6.0 Simulation and Modeling - General<br />

General Terms<br />

Management, Measurement, Performance, Economics<br />

Keywords<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

62<br />

David Osimo<br />

Tech4i2 Ltd, UK<br />

43B Mill Road, Leicester, UK<br />

david.osimo@tech4i2.com<br />

Stefano Armenia<br />

Sapienza University of Rome CATTID<br />

P.le Aldo Moro, 5 - 00185 Rome, Italy<br />

armenia@cattid.uniroma1.it<br />

Governance Analysis and Evaluation, Policy Making 2.0,<br />

Modelling and Simulation, System Dynamics, ICT Tools,<br />

Stakeholders’ Engagement<br />

INTRODUCTION<br />

The role of the government in the last century has not decreased<br />

as the common wisdom would suggest. In fact it has increased<br />

until the end of the ‘70s, and remained stable for the following 30<br />

years. However, the collapse of the Bretton Woods system<br />

together with its associated Keynesian policies marked the switch<br />

from a service provision role of the government towards a<br />

regulatory one, often in novel areas such as environment,<br />

telecommunications and technology [20]. As we will see, as<br />

governments are much more involved in “steering” than in<br />

“rowing”, today more than ever the role of the policy maker has<br />

become difficult due to new challenges. Nowadays, society and<br />

economy are more interconnected, unstable and unpredictable<br />

than they have ever been. As pointed out by [25], we live in the<br />

age of “Extremistan”, a world of “tipping points” [23], “cascades”<br />

and “power laws” [4], where extreme events are “the new normal”<br />

[12].<br />

The policy issues of our age can be addressed only through the<br />

collaboration of all the components of the society, including the<br />

private sector and individual citizens [11]. In fact only changes in<br />

the daily behaviour of citizens can help to tackle challenges such<br />

as climate change, consumable resources and sustainability of the<br />

health system. As clarified by the UK Prime Minister, David<br />

Cameron, "the success of the Big Society will depend on the daily<br />

decisions of millions of people" 1 .<br />

In addition citizens are more than ever willing to engage in<br />

complex policy decision making according to the emergence of<br />

the "Gov 2.0 paradigm" offering new opportunities to enter into<br />

data production, analysis and decision-making. On the other hand<br />

this participation is often fruitless as it is limited to conversations<br />

on social networks, blogs and twitter and a real impact has been<br />

achieved only in specific, highly advertised cases that led to a<br />

massive mobilisation. Moreover the participation seems to be<br />

limited to individuals highly interested and motivated in policy<br />

issues. Finally, seldom the human nature is able to take into<br />

account the long-term impact of our choices, as short-term<br />

impacts are more predictable and visible [16]. However, in an<br />

1 See http://www.bbc.co.uk/news/uk-politics-12443396


interconnected, unstable and unpredictable world the long-term<br />

impact of the policy choices might have unintended<br />

consequences.<br />

In this view, traditional policy-making tools are flawed as they<br />

assume an abstract and unrealistic human being: perfectly rational<br />

(utility maximizing), consistent (not heterogeneous), atomised<br />

(not connected through networks), wise (thinking long-term) and<br />

politically committed. In fact most of the current policy modelling<br />

and simulation practices are rooted on traditional mathematical<br />

models, linear econometric tools or dynamic stochastic general<br />

equilibrium models, based upon the perfectly rational<br />

representative agent maximizing its own utility in a general<br />

equilibrium framework. As shown by [18], all these tools may not<br />

be consistent when applied in the public policy context.<br />

At any rate, today we see the possibility of an ICT-enabled policymaking<br />

model taking full account of the complexity of human<br />

nature. There is a number of social modelling and simulation tools<br />

already available, buy they are built for ad-hoc purposes and<br />

suffer a lack of scalability. In fact there is a tendency to reinvent<br />

and develop “own” models and simulation tools so that adoption<br />

of a policy modelling approach still demands a lot of resources<br />

preventing returns to scale to be fully enjoyed [5][6].<br />

Nevertheless there are several main trends impacting the current<br />

and future policy making: the explosion of data availability given<br />

by the open government data movement and the data provided by<br />

sensors and citizens, the growth of research dedicated to analyzing<br />

those data through crowdsourcing and large scale collaboration,<br />

the improvement of modeling and simulation tools assessing the<br />

possible non-linear impact of policy options. These trends clarify<br />

the need for the next generation of policy making models.<br />

To this end, the CROSSOVER “Bridging Communities for Next-<br />

Generation Policy-Making”, which is a Coordination and Support<br />

Action (FP7-ICT-2011-7, No. 288828) financed by the European<br />

Commission under the objective ICT-7-5.6 – “ICT Solutions for<br />

governance and policy modeling” aims to:<br />

o Bring together and reinforce the links between the different<br />

global communities of researchers and experts by animating<br />

knowledge exchange across communities of practice.<br />

o Reach out and raise the awareness of non-experts and<br />

potential users, with special regard to high-level policymakers.<br />

o Establish the scientific and political basis for long-lasting<br />

interest and commitment to next generation policy-making,<br />

by focusing on a demand-driven approach, involving policymakers<br />

and defining a collaborative stakeholders’<br />

sustainability plan.<br />

More in particular the CROSSOVER project is elaborating a new<br />

International Research Roadmap on ICT Tools for Governance<br />

and Policy Modelling, which aims to provide a clear outline of<br />

what technologies are available now for policy-makers to improve<br />

their work, and what could become available tomorrow. The<br />

roadmap has a demand-driven approach: rather than focusing on<br />

the technology, it starts from the needs and the activities of<br />

policy-making and then links to the current and future research<br />

challenges.<br />

63<br />

The project builds on the CROSSROAD 2 model 3 and roadmap 4<br />

with the aim to reach a stronger focus on policy modelling. More<br />

precisely CROSSOVER focuses on two Grand Challenges (GC),<br />

already part of the CROSSROAD roadmap, which are more in<br />

line with the current workprogramme priorities: GC1 - Policy<br />

Modelling and GC2 – Data-powered Collaborative Governance.<br />

Each Grand Challenge embeds a number of research challenges in<br />

governance and policy modelling.<br />

The aim of this paper is therefore to present the new research<br />

roadmap on ICT Tools for Governance and Policy Modelling<br />

aimed at providing an outline of what technologies are and will be<br />

available to meet the needs of policy-makers. The structure of the<br />

paper continues as follows. Section 2 identifies the methodology<br />

applied for this research. Section 3 describes the research<br />

roadmap. Finally section 4 offers some conclusions and future<br />

research directions.<br />

METHODOLOGY<br />

The roadmap is being developed by the means of desk-based<br />

review (e.g. literature review and meta analysis), discussion and<br />

interviews with experts, and crowdsourcing 5 . More in particular<br />

we define a technology roadmapping exercise, which is a strategic<br />

planning approach to identify the actions and funding decisions<br />

needed to boost technological development and innovation. The<br />

term “roadmap” refers to the main purpose of this approach, i.e. to<br />

chart an overall direction for technology development or usage<br />

[7].<br />

On the one hand the roadmap constitutes a shared vision, able to<br />

inspire collaborative and interdisciplinary research, and between<br />

academia, business, civil society and government. On the other<br />

hand it is a useful tool, able to provide support and orientation to<br />

policy-modelling also after the end of the project. The potential of<br />

roadmapping is significant in the domain of ICT for governance<br />

and policy modelling as it can constitute an important input in the<br />

selection of future research priorities by highlighting the emerging<br />

themes and key technological applications (ICT tools) likely to<br />

impact on policy in the coming years. Furthermore roadmapping<br />

is one of the “recommended best practices” for the selection of<br />

priorities in R&D programmes since it does not only identify the<br />

bottlenecks that need to be addressed within a realistic time frame,<br />

but it can also lead to a high degree of consensus if potential<br />

beneficiaries are involved in the agenda-setting process [17].<br />

THE RESEARCH ROADMAP<br />

As mentioned above, the new International Research Roadmap on<br />

ICT Tools for Governance and Policy Modelling builds on the<br />

previous CROSSROADS roadmap. However the new exercise<br />

represents an improvement in many respects. First, the roadmap is<br />

built following a demand-driven approach: rather than focusing<br />

exclusively on technology, the present roadmap starts from the<br />

2 CROSSROAD - A Participative Roadmap for ICT research on<br />

Electronic Governance and Policy Modelling www.crossroad-eu.net<br />

3 For a presentation of the CROSSROAD model of ICT for governance<br />

and policy modelling please refer to Osimo et al. (2010)<br />

4 For the CROSSROAD white paper and research roadmap please refer to:<br />

http://crossroad.epu.ntua.gr/files/2010/02/CROSSROAD-<br />

State_of_the_Art_Analysis-White_Paperv1.00.pdf<br />

5 The roadmap in commentable format has been published in the project<br />

website and has been disseminated through the http://www.crossoverproject.eu/UserSurvey.aspx


needs and the activities of policy-making and then links to the<br />

research challenges. In fact on the one hand each research<br />

challenge has a direct correspondence to a benefit stemming from<br />

policy making 2.0 tools (i.e. what need does the methodology and<br />

ICT tool address), such as:<br />

o Detect and understand problems before they become<br />

unsolvable<br />

o Generate high involvement of citizens in policy-making<br />

o Identify “good ideas” and innovative solutions<br />

o Reduce uncertainty on the possible impacts of policies<br />

o Encourage behavioural change and uptake<br />

o Detect non-compliance and mis-spending<br />

o Understand the impact of policies<br />

On the other hand each research challenge is explicitly linked to a<br />

traditional activity of policy-making, based on the conventional<br />

policy-making cycle:<br />

o Agenda setting: basic analysis on the nature and size of<br />

problems at stakes are addressed, including the causal<br />

relationships between the different factors<br />

o Policy design: development of the possible solutions, the<br />

analysis of the potential impact of these solutions, the<br />

development and revision of a policy proposal<br />

o Adoption: this is the most delicate and sensitive area, where<br />

accountability and representativeness are needed. It is also<br />

the area most covered by existing research on e-democracy<br />

o Implementation: often considered the most challenging<br />

phase, as it needs to translate the policy objectives in<br />

concrete activities, that have to deal with the complexity of<br />

the real world. It includes ensuring a broader understanding,<br />

the change of behaviour and the active collaboration of all<br />

stakeholders.<br />

o Monitoring and evaluation: make use of implementation<br />

data to assess whether the policy is being implemented as<br />

planned, and is achieving the expected objectives.<br />

Second, in CROSSOVER, more emphasis is put on cases and<br />

applications: each research challenged is enriched with inspiring<br />

cases bearing a global perspective. Furthermore the new roadmap<br />

bears a stronger focus on ICT for Governance and Policy-<br />

Modelling, by dropping more peripheral grand challenges of<br />

Government Service Utility and Scientific Base for ICT-enabled<br />

Governance 6 . Finally, the project is elaborating a “living”<br />

roadmap, accompanied by an online repository of tools, people<br />

and applications.<br />

Let us now describe the two Grand Challenges composing the<br />

roadmap.<br />

The GC1 - Policy Modelling concerns the development of tools<br />

and methodologies able to design an efficient and effective<br />

decision making process, capable of detecting emergencies,<br />

anticipate future events and evaluate the impact of different policy<br />

choices. Furthermore GC1 fosters the engagement of the<br />

stakeholders in models building and in the evaluation and<br />

simulation of policy making.<br />

The GC2 – Data Powered Collaborative Governance is related<br />

6 On this see CROSSROAD, 2012.<br />

64<br />

to the fact that the current citizen participation scene is<br />

characterised by an engagement of highly committed people only,<br />

and by an involvement that rarely stimulates genuine action.<br />

However there are several complementary research areas in ICT<br />

for governance and policy modelling that have the opportunity to<br />

address the need for collaboration and behavioural change<br />

throughout different technological layers: enhanced data<br />

availability through public linked data and participatory sensing,<br />

analytical capability through opinion mining and visual analytics,<br />

and action-oriented tools such as simulation and serious gaming.<br />

These trends mutually reinforce each other to offer a new<br />

opportunity for future ICT for governance and policy modelling.<br />

For each Grand Challenge the roadmap describes a number of<br />

research challenges highlighting their definition, the potential<br />

opportunities for governance, the state of the art of market and<br />

research, the existing challenges/gaps, the recommended research<br />

themes and most importantly the inspiring application cases.<br />

GC1 encompasses the following research endeavors:<br />

o Systems of Atomized Models<br />

o Collaborative modelling<br />

o Easy access to information and knowledge creation<br />

o Model validation<br />

o Interactive simulation<br />

o Output analysis and knowledge synthesis<br />

On the other hand GC2 encompasses the following research<br />

challenges:<br />

o Big Data<br />

o Opinion Mining and Sentiment Analysis<br />

o Visual Analytics<br />

o Serious Gaming for Behavioural Change<br />

o Open Government Data<br />

o Collaborative Governance<br />

o Participatory Sensing<br />

o Identity Management<br />

CONCLUSIONS: CLOSING THE LOOP OF<br />

POLICY-MAKING<br />

The last 30 years witnessed a change in the government role, from<br />

services provider to mere regulator. At the same time the role of<br />

the policy makers became increasingly difficult. This because, as<br />

[25] points out, we live in the age of "Extremistan", a world in<br />

which society and economy are more than ever interconnected,<br />

unstable and unpredictable. This extreme instability takes place<br />

not only in negative forms such as the financial crisis and the<br />

global warming but also in positive development, such as the<br />

continuous emergence of new players and business models on the<br />

market. Unfortunately the current tools available for policy<br />

design, implementation and evaluation are not suitable for<br />

capturing this complex and interconnected nature. The cause of<br />

this may be found in the fact that current tools are rooted on<br />

traditional mathematical models (rational expectations), linear<br />

econometric tools or dynamic stochastic general equilibrium<br />

models.<br />

Alternative tools, based on complexity science and enabled by the<br />

explosion of data availability, are yet to be widely adopted. To<br />

support policy makers in meeting the challenges of implementing<br />

more appropriate tools for policy-making, the CROSSOVER


project is elaborating an updated version of the “International<br />

Research Roadmap on ICT tools for Governance and Policy<br />

Modelling”, initially designed as part of the CROSSROAD's<br />

project in 2010.<br />

As for the partial results of our exercise, on the one hand we<br />

designed the research challenges in relation to specific needs of<br />

the policy makers. For instance: systems of atomized models and<br />

model validation are related to early detection and understanding<br />

of problems; collaborative modelling and visual analytics are<br />

related to generating high involvement of citizens; immersive<br />

simulation is related to reducing the uncertainty on the possible<br />

impacts of policies; opinion mining is related to the need of<br />

identify “good ideas” and innovative solutions; and finally open<br />

data is related to the need of detecting non-compliance and misspending,<br />

as well as to understanding the impact of policies.<br />

On the other hand we were able to connect the research challenges<br />

to specific phases of the policy cycle:<br />

o Agenda setting: in this phase take place the identification and<br />

analysis of problem. Within this scope, visualization and<br />

opinion mining can help to identify the problems at an early<br />

stage, while advanced modelling techniques are used to<br />

disentangle the casual relationships behind the problem as<br />

well as to understand the causal roots that need to be<br />

addressed by policy<br />

o Policy design: on one side immersive simulations support<br />

decision-makers by taking into account unexpected impacts<br />

and relationships, in order to facilitate the choice of the most<br />

effective option. On the other side collaborative governance<br />

enables then to develop further and fine-tune the most<br />

effective option, for example through commentable<br />

documents<br />

o Policy implementation: social network analysis,<br />

crowdsourcing and serious gaming ensure awareness, buy-in<br />

and collaboration from the widest range of stakeholders<br />

o Monitoring and evaluation: Open data and sentiment<br />

analysis, alongside advanced visualization techniques, allow<br />

stakeholders and decision makers to better monitor execution<br />

and can be used to evaluate the impact of the policy<br />

As for future research, the roadmap is being published and<br />

disseminated in commentable format in order to seek input and<br />

validation from stakeholders (on the importance of the proposed<br />

research challenges), researchers (on the actual research carried<br />

out on the proposed challenges), and finally policy makers (on the<br />

actual adoption of the proposed tools). Furthermore it is ongoing<br />

an online survey of ICT needs and challenges of policy makers<br />

which will inform the last version of the roadmap.<br />

ACKNOWLEDGMENT AND DISCLAIMER<br />

The research activity leading to this paper has been funded by the<br />

European Commission under the activity ICT-7-5.6 – “ICT<br />

Solutions for governance and policy modeling” within the<br />

Coordination and Support Action (FP7-ICT-2011-7, No. 288828)<br />

CROSSOVER project “Bridging Communities for Next<br />

Generation Policy-Making”.<br />

The views expressed in this paper are purely those of the authors<br />

and may not in any circumstances be regarded as stating an<br />

official position of the European Commission.<br />

65<br />

REFERENCES<br />

[1] Bowman, B., Debray, S. K., and Peterson, L. L. Reasoning about<br />

naming systems. ACM Trans. Program. Lang. Syst., 15, 5 (Nov.<br />

1993), 795-825.<br />

[2] Alexopoulos, C., and Kim, S. (2002). Output Data Analysis for<br />

Simulations. Proceedings of the 2002 Winter Simulation Conference.<br />

San Diego (CA), 8-11 December 2002.<br />

[3] Alexopoulos, C., and Seila, A. (1998). Output Data Analysis. In J.<br />

Banks, Handbook of Simulation: Principles, Methodology,<br />

Advances, Applications and Practice. New York: John Wiley.<br />

[4] Barabasi, A. L., 2003. Linked: How Everything is Connected to<br />

Everything Else and What it Means for Business and Everyday Life,<br />

Plume Books.<br />

[5] CROSSROAD (2010), White Paper on State of the Art in ICT for<br />

Governance and Policy Modelling, Lampathaki, F., Koussouris, S.,<br />

Charalabidis, Y., Askounis, D., Mouzakitis, S., Passas, S., Tsavdaris,<br />

H., Osimo, D., De Luca, A., Armenia, S., Bicking, M., Wimmer, M.,<br />

Misuraca, G..<br />

[6] CROSSROAD, (2012) Paving the Way for Future Research in ICT<br />

for Governance and Policy Modelling, Charalabidis, Lampathaki,<br />

Askounis (Eds), Bookstars Publishing, available at:<br />

http://crossroad.epu.ntua.gr/files/2010/02/CROSSROAD_Book-vfallinon.pdf<br />

[7] De Laat, B., 2004. Conditions for effectiveness in Roadmapping: a<br />

cross-sectional analysis of 80 different exercises. EU-US Scientific<br />

Seminar on New Technology Foresight, Forecasting & Assessment<br />

Methods<br />

[8] Goldsman, D. (2010). Simulation Output Analysis. Speech at School<br />

of ISyE. Georgia Tech, Atlanta (GE), 26 May 2010.<br />

[9] Goldsman, D., and Nelson, B. (1998). Comparing systems via<br />

simulation. In J. Banks, Handbook of Simulation: Principles,<br />

Methodology, Advances, Application and Practice. New York: John<br />

Wiley.<br />

[10] Goldsman, D., and Tokol, G. (2000). Output analysis procedures for<br />

computer simulations. Proceedings of the 2000 Winter Simulation<br />

Conference. Orlando (FL).<br />

[11] Goldsmith, S. and Eggers, W.D., 2004. Governing by Network: The<br />

New Shape of the Public Sector, Brookings Institution. Available at:<br />

http://www.amazon.co.uk/Governing-­‐‑Network-­‐‑Shape-­‐‑Public-­‐‑Sector/<br />

dp/0815731299.<br />

[12] Hinssen, P. (2010). The New Normal. MachMedia NV<br />

[13] Kelton, W. (1997). Statistical Analysis of Simulation Input.<br />

Proceedings of the 1997 Winter Simulation Conference. Atlanta<br />

(GA)<br />

[14] Law, A. (2006). Simulation Modelling and Analysis. New York:<br />

McGraw-Hill.<br />

[15] Lessig, L. (2009). Against transparency. The New Republic.<br />

Retrieved from http://www.tnr.com/article/books-and-arts/againsttransparency<br />

[16] Misuraca, G., (2012). eGovernance 2.0: implications of social<br />

computing on public services, in Public Services, Governance and<br />

Web2.0 Technologies: Future Trends in Social Media, a Book edited<br />

by Ed Downey and Matthew Jones, January 2012 - http://www.igiglobal.com/book/public-service-governance-webtechnologies/56009<br />

[17] Misuraca, G., Broster, D. and Centeno, C. (2011). Digital Europe<br />

2030: Designing scenarios for ICT in future governance and policy<br />

making, in Government Information Quarterly, Special Issue<br />

10/2011, Elsevier Publishing


[18] Moss, S., (2010). Policy Modelling, Open Collaboration and The<br />

Future of eGovernance. Crossroad Call for Papers<br />

[19] Nakayama, M. (2002). Simulation Output Analysis. Proceedings of<br />

the 2002 Winter Simulation Conference. San Diego (CA)<br />

[20] OECD. (2005). Modernising government: the way forward. Paris,<br />

France, OECD.<br />

[21] Osimo, D. et al., 2010. The CROSSROAD Roadmap on ICT for<br />

Governance and Policy Modeling.<br />

66<br />

[22] Sargent, R. (2009). Verification and Validation of Simulation<br />

Models. Proceedings of the 2009 Winter Simulation Conference.<br />

Austin (TX), 13-16 December 2009.<br />

[23] Schelling, T.C., (1969). Models of segregation. The American<br />

Economic Review, 59(2), pp. 488-493. Available at:<br />

http://www.jstor.org/stable/1823701.<br />

[24] Schlesinger, M. (1979). Terminology for model credibility.<br />

Simulation, 32(3), 103-104.<br />

[25] Taleb, N. (2008). The Black Swan: The Impact of the Highly<br />

Improbable. Penguin.


Best International Practices for Access, Ownership and<br />

Use of Information and Communication Technologies for<br />

People with Sensory Disabilities<br />

Marco Peres<br />

Universidad Externado de Colombia<br />

Calle 28 # 13 A- 24 apartment 1304<br />

Bogotá, D.C.- Colombia<br />

+571 4612653<br />

marco.peres@uexternado.edu.co<br />

ABSTRACT<br />

This paper aims to describe the results shown by the consultancy<br />

report requested by the Ministry of Information Technologies and<br />

Communications of Colombia, which highlights the programs and<br />

projects for national and international access, ownership and use<br />

of information technologies and communications for people with<br />

sensory limitations in countries like Colombia, Mexico, Spain,<br />

United States, Canada and Brazil. The dimensions underlying the<br />

research are related to the appropriation of ICTs in education, in<br />

access to employment and social integration, the use of electronic<br />

means for political participation and access to the range of cultural<br />

activities and recreation in this community.<br />

Categories and Subject Descriptors<br />

K.4. [Computers and Society]: Public Policy Issues<br />

General Terms<br />

Documentation<br />

Keywords<br />

Sensory impairment, digital inclusion, digital literacy<br />

1. INTRODUCTION<br />

According to Article nine of the UN Convention on the Rights of<br />

Persons with Disabilities, it is the obligation of States: "... so that<br />

people with disabilities to live independently and participate fully<br />

in all aspects of life, take appropriate measures to ensure access<br />

for people with disabilities on an equal basis with others, the<br />

physical environment, transportation, information and<br />

communications, including computer systems and information<br />

technologies and communications, and other facilities open to the<br />

public or public use, both in urban and rural areas .. 1 "as well as,<br />

implementing programs that facilitate the use and ownership of<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

1 http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1964930<br />

67<br />

Paula Suárez<br />

Universidad Externado de Colombia<br />

Carrera 64 # 24-47 apartment 503,<br />

Bogota, Salitre, Colombia<br />

+57 313 8306908<br />

paucasuarez@gmail.com<br />

the means necessary to include this population in the dynamics of<br />

socioeconomic and political development that generate on their<br />

own information technology and communications. Means and<br />

measures taken by States must have in mind then, the existence of<br />

gaps in digital literacy, access to education and electronic media,<br />

faced by people with disabilities, so it has to generate public<br />

policies and focus on the needs of this group, differentiating by<br />

type of limitation, age and educational level.<br />

Thus, our research shows that those experiences that we can deem<br />

successful are those in which States have taken the characteristics<br />

of the group in different contexts and settings, created inclusion,<br />

access to public education, health, government and employment<br />

into account, with all possible means of interaction to eradicate<br />

drawbacks to people with disabilities.<br />

2. CONTEXT<br />

The world report on disability made by the World Health<br />

Organization (WHO) in association with the World Bank Group,<br />

estimates that ... more than one billion people worldwide live with<br />

some form of disability, of whom nearly 200 million experience<br />

considerable difficulties in its operation 2 , hence governments are<br />

concerned in creating enabling factors for this population with<br />

regard to access to essential services for normal daily activities,<br />

since the number of people with limitations grows and their<br />

situation is exacerbated by poverty and exclusion.<br />

The need for digital literacy in the population with disabilities is a<br />

reality and a priority on the agendas of governments. At the latest<br />

World Summit on the Society of Information, UNESCO and<br />

CEPAL agreed that ICTs are a useful tool for achieving<br />

development and equity. 3 The provision of information<br />

technology, and digital literacy, defined as the ease of access and<br />

use of information technology and communications 4 , turns out to<br />

be of the essence to create a favorable scenario. These policies<br />

targeted at people with sensory disabilities, (defined as those who<br />

suffer from hearing impairments, visual or both) are necessary,<br />

since the benefits related to literacy, range from the ease in the<br />

normal course of daily activities to the full exercise of citizenship.<br />

2 http://www.who.int/disabilities/world_report/2011/accessible<br />

_es.pdf<br />

3 http://bvs.sld.cu/revistas/aci/vol13_1_05/aci04105.htm<br />

4 Ramírez Leyva. Elsa Margarita. La lectura, Alfabetización en<br />

Información y Cultura de la Información.2007.


2.1. National digital inclusion experience for<br />

people with sensory disabilities<br />

According to the National Bureau of Statistics (DANE), in 2005<br />

6.4% of Colombia's population suffers from some form of<br />

permanent disability 5 . This finding, based on the general<br />

population census, shows alarming statistics in this field; as a<br />

result, digital inclusion has become a priority in Colombia. The<br />

Ministry of ICT through its "Communication Technologies for<br />

Disabled People" and their project "New Technologies for<br />

Information Access of the Blind", "Connecting Senses" for deaf<br />

blind people and the "Relay Center" for deaf people, have been<br />

trying to start the process of including people with sensory<br />

limitations by accessing and using information technologies.<br />

Communication Technologies for Population with Disabilities<br />

Program: This program focuses on providing a range of<br />

technology solutions to people with sensory disabilities, to<br />

generate the active participation of these individuals in the<br />

different spheres of social interaction, including the democratic<br />

process. The Ministry of ICT in Colombia, has carried out various<br />

activities for inclusion, such as the Respite Center Project for the<br />

Deaf, which tries to break the communication barriers that this<br />

population suffers. This program has generated a number of<br />

public telephone centers for the deaf, along with the National<br />

Federation of the Deaf of Colombia (FENASCOL) and the<br />

Telephone Company of Bogotá (ETB), which implements text<br />

phones to enable communication between a deaf and a hearing<br />

person. The implementation of closed captioning (subtitles for the<br />

deaf) on television is another initiative that the Ministry has<br />

promoted for the deaf to interpret mass media such as television. 6<br />

New Technologies Project for Information Access for the<br />

Blind: The Ministry of Information Technologies and<br />

Communications, with the help of the National Institute for the<br />

Blind (INCI), has built public libraries for visually impaired<br />

people who can use ICTs and benefit from them, through devices<br />

like: digital book readers and printers to convert braille<br />

documents.<br />

Connecting Senses Program: This program targets people with<br />

deaf blindness conditions, led by the Ministry of Information<br />

Technology and the Colombian Association of the Deaf Blind<br />

(SURCOE). It is responsible for facilitating technology for<br />

classroom use and appropriation of information and<br />

communications technologies in the process of socialization for<br />

this population that has its own characteristics. Connecting Senses<br />

has sought ways to respond to the demands of deaf blind people<br />

holistically, as it has generated an implementation scheme that<br />

takes into account not only the adaptation of ICT for people with<br />

this sensory disability, but also makes special efforts to train<br />

people interested in the topic, as the role of companions for people<br />

with deaf blindness is crucial in the dynamics of socialization.<br />

3. BEST INTERNATIONAL ICT METHODS<br />

TO EMPOWER PEOPLE WITH SENSORY<br />

DISABILITIES<br />

5 http://www.dane.gov.co/index.php?option=com_content&view<br />

=article&id=307&Itemid=124<br />

6 http://201.234.78.217/mincom/faces/index.jsp?id=2334<br />

68<br />

In order to identify the best ICT practices at the international level<br />

aimed at people with sensory disabilities, the following factors<br />

were taken into account: the number of people with sensory<br />

disabilities within each territory, the structure and contribution to<br />

inclusion, the potential for adaptation in the provision of public<br />

services, education, employment, political participation and access<br />

to cultural activities or entertainment.<br />

3.1. Methodology for selecting successful<br />

international practices<br />

The international review of best practices was obtained from the<br />

collection of information from public, private or mixed source<br />

inclusion programs for people with sensory disabilities, which<br />

were selected according to parameters relevant to the digital<br />

inclusion of people with sensory disabilities, this is why there are<br />

three criteria for selection of successful international practices<br />

relating to: 1) the level of practice approach that has the problem<br />

of exclusion of people with sensory, 2) coverage and provide the<br />

inclusion of people with limitations and 3) the potential for<br />

adaptation to cover several dimensions of inclusion (i.e.<br />

education, employment, political participation, etc.).<br />

3.1.1 Criteria approach to the problem of exclusion of<br />

people with sensory disabilities<br />

This criterion is defined as the initiative or practice that is<br />

responsible for solving the problem of exclusion experienced by<br />

people with sensory disabilities. Depending on the conceptual<br />

characteristics of each approach, different alternative solutions<br />

emerge with dramatically different impacts on the lives of people<br />

with visual and auditory disabilities. In this regard there are four<br />

main approaches to address the problem of exclusion.<br />

Exclusion as a personal and individual limitation: This approach<br />

involves recognizing a situation of vulnerability and disadvantage<br />

people with sensory disabilities, which prevents it from interacting<br />

with the rest of society safely and fairly. This approach generates<br />

responses (programs) to direct attention to the individual such as<br />

educational centers or community support.<br />

As a population characteristic: This perspective does not<br />

portray people with sensory disabilities as a vulnerable group, but<br />

as a population group with characteristics that make it different<br />

from the rest of society, as would be the ethnic, religious or<br />

cultural. This approach generates projects including direct and<br />

indirect: direct projects that seek alternative solutions such as<br />

access to specialized education for the visually impaired, to<br />

promote job training and recruitment of this population and<br />

indirect projects which allow them to create partnerships aimed at<br />

achieving a political representation to ensure that this population<br />

is taken into account as a group with characteristics distinct from<br />

the majority society, and therefore must be treated and cared for<br />

differently.<br />

As a matter of physical environment: This approach assumes<br />

that people with disabilities encounter significant difficulties when<br />

interacting with their environment, and therefore, if it is modified<br />

taking into account the sensory abilities of people with sensory<br />

disabilities, to improve their living conditions visibly. This<br />

approach integrates accessibility projects to public buildings,<br />

private buildings regulations to the public and promotes<br />

alternatives to the existing infrastructure which meets the needs of<br />

people with sensory disabilities.


As a matter of human environment: the latter approach to the<br />

problem of exclusion of people with limitations, aims to get<br />

people who have contact with individuals with sensory disabilities<br />

to be able to interact with them, that is, that the responsibility for<br />

social integration lies not only in the individuals with disabilities,<br />

but extends to individuals in regular conditions of perception. this<br />

type of approach promotes alternatives such as indirect inclusion:<br />

raising awareness, training for family members, teachers and<br />

chaperones.<br />

3.1.2. Coverage and contribution to the inclusion<br />

This criterion refers to the ability to serve people with sensory<br />

disabilities, while a positive influence to avoid isolation and<br />

segregation of the population. Similarly, coverage, rather than as a<br />

quantitative index can be understood as the flow direction or<br />

orientation of the actions needed to access or benefit from a<br />

particular program. Here there are: 1) individual care programs, 2)<br />

direct government actions and 3) indirect government actions:<br />

Individual care programs: Tend to only one person or individual<br />

with sensory disabilities, may be of a private or public source.<br />

The objective of such programs is to achieve human development<br />

and social reintegration of the person with limited sensory abilities<br />

Direct government action: Are those actions that are national,<br />

state or local, as appropriate, whose aim is to benefit all people<br />

with sensory disabilities in a particular jurisdiction, such as a law.<br />

These actions differ from individual public actions in the sense<br />

that citizens with sensory disabilities do not have to search for<br />

programs to access them because the initiative includes the<br />

general population with sensory disabilities<br />

Indirect public actions: The indirect actions of public coverage<br />

are those that, like direct public coverage, cover a jurisdiction, but<br />

in this case, do not direct impact on individuals with disabilities,<br />

but rather, their environment<br />

3.1.3. Potential for adaptation to cover several<br />

dimensions of inclusion<br />

Adaptation refers to the possible extension of the use of a program<br />

into other dimensions of impact (employment, education, political<br />

participation, personal autonomy, etc). This approach which seeks<br />

to identify those practices that generate coverage, operation and<br />

ownership by people with sensory disabilities, can be applied<br />

across several dimensions of impact simultaneously or<br />

independently in a potential program or policy of digital inclusion<br />

for people with sensory disabilities<br />

3.2. Programs for digital inclusion of the<br />

visually impaired population<br />

As part of the generation of programs for inclusion in the access,<br />

use and appropriation of ICTs for people with visual, people need<br />

to define what can be described within this group, according to the<br />

World Health Organization, are part of the community with visual<br />

impairment, those who suffer from total blindness in one or both<br />

eyes or those with profound visual impairment (partial blindness<br />

or profound amblyopia amblyopic itself) with respect to visual<br />

acuity at such a level that affects the normal execution of daily<br />

activities, according to the ONCE (National Organization of<br />

69<br />

Spanish Blind) are blind persons whose visual field is reduced to<br />

10 ° or less 7 .<br />

One of the data provided research initiatives around access, use<br />

and appropriation of ICTs, internationally, is related to the<br />

interaction of participants of different natures, since those who run<br />

programs for assisting communities with sensory are not only<br />

public but also private.<br />

There are several initiatives for us to highlight that grant access to<br />

ICTs for people with visual impairments, such as the one<br />

promoted by the Brazilian Ministry of Education and Culture,<br />

which provides the blind with free Mecdaisy software for the<br />

conversion of digital textbooks , this in order to provide tools for<br />

academic and intellectual development of visually impaired<br />

users 8 . In the United States, for example, a legislative initiative<br />

called Americans with Disabilities Act, established the obligation<br />

of both public and private institutions to provide people with<br />

disabilities technologies and devices which are required for access<br />

to information and public services, while in Spain, the scientific<br />

community is most interested in developing specialized<br />

technologies, as it has released a device to see with their<br />

hands, thus facilitating the mobility of blind people through a<br />

technology that converts images into tactile signals.<br />

The adaptation of existing technologies to the needs of the blind,<br />

is the strategy that Mexico is betting on, and that initiatives such<br />

as the Library for the Blind National Autonomous University of<br />

Mexico, show the Mexican government's willingness to attend<br />

and include people with disabilities in education.<br />

3.3. Digital inclusion initiatives for hearing<br />

impaired<br />

The inclusion of deaf people, access to and use of information<br />

technology differs from the dynamics meant for the blind. Even<br />

though both are limitations of a sensory type, the characteristics of<br />

a deaf person call for other programs that cater to different needs<br />

that are unique to this population. According to the World Health<br />

Organization, ninety-three percent of deaf people have no access<br />

to sign language interpretation service 9 , hence it is essential for<br />

communication, use and access to information and<br />

communications technologies.<br />

In Mexico, for example, CONFETER a government sponsored<br />

initiative since 2005 has compelled telecommunication providers<br />

to furnish the necessary technology (such as telephones that<br />

eliminate sound systems interference, vibrating phones, lit alert<br />

indicators and amplified speakers) that facilitates communication<br />

access to the hearing impaired.<br />

Additionally, the Canadian private sector has answered the<br />

hearing impaired communications challenge with organizations<br />

such as The Canadian Society of the Deaf. This is Canada´s main<br />

purveyor of services, products and information that eliminate the<br />

stumbling blocks that limit the communication of the hearing<br />

impaired.<br />

3.3. Best methods for deaf-blind people<br />

This population, which suffers from two limitations (auditory and<br />

visual) depending on each individual case, may or may not benefit<br />

from projects designed for the deaf or blind. However, there are<br />

7<br />

http://www.juntadeandalucia.es/averroes/caidv/interedvisual/<br />

ftp_p_/def_bajavision_ceguera.pdf.<br />

8<br />

http://www.ufpel.edu.br/cic/2009/cd/pdf/CH/CH_00288.pdf<br />

9<br />

http://www.who.int/disabilities/world_report/2011/summary<br />

_es.pdf


advanced initiatives specifically designed to assist this population.<br />

For example, the Department of Rehabilitation Services of<br />

Mississippi, United States, provides the deaf-blind population<br />

with technological, pedagogical and psychological devices (such<br />

as hand magnifiers to read, high-intensity lamps, small telescopes<br />

to read from a distance and small circuit television or computers<br />

that magnify printed material) this with the idea of satisfying the<br />

needs and overcoming the barriers this population faces in relation<br />

to such common activities as learning and communication.<br />

However, the characteristics of the condition of deaf-blindness,<br />

also calls for specialized care programs for access to ICT, a highly<br />

trained companion that can help these people. Nevertheless,<br />

despite the fact that this population possesses less communication<br />

capabilities, it has not been given higher priority within<br />

international programs for the deaf-blind community.<br />

3.3. People with sensory disabilities in the<br />

countries analyzed<br />

Table 3: Number of people with sensory disabilities<br />

Country Census of<br />

the country<br />

(million)<br />

Blind<br />

Population<br />

Deaf<br />

Population<br />

Populatio<br />

n with<br />

deaf<br />

Blindness<br />

Colombia 46,51,645 2.4% 0.98% _<br />

Mexico 112,336,538 1.15% 3.6% _<br />

Spain 45,283,259 0.13% 2.3% 0.013%<br />

UU.EE. 305,000,000 8.2% 3.2% _<br />

Canada 34,030,589 0.52% 0.91% 0.04%<br />

Brazil 203,429,773 0.73% 0.083% _<br />

As evidenced by the table above, the most populous country with<br />

sensory disabilities is United States of America where 11.4% of<br />

the population is visually and hearing impaired , excluding people<br />

with both limitations, followed by Colombia where 3, 4% of the<br />

total population presented some sensory limitation (blind or deaf),<br />

then Spain with 2.43% of people with sensory limitations, fifth<br />

place belongs to Canada with 1.44% of the population with<br />

sensory disabilities and Mexico with 1.15% of visually impaired<br />

people.<br />

4. CONCLUSIONS<br />

To build successful programs in the care of people with sensory<br />

disabilities, we must recognize that this is a population group with<br />

its own characteristics in need of specialized care. International<br />

trends in terms of programs for this population, as presented in<br />

this study, have shown that it is necessary to adapt the physical<br />

space for real digital inclusion of people with sensory disabilities.<br />

It is also of the essence to grant them institutional recognition, as<br />

has been the case with successful programs for people with<br />

limitations in the U.S., Canada, Spain, Mexico and Brazil. These<br />

programs empower groups of people with disabilities by making<br />

policy decisions for the access, use and appropriation of ICTs.<br />

Additionally, international experience shows that spread is also<br />

necessary for the production of digital information in the areas of<br />

education and entertainment, since in most countries and<br />

especially in the United States, this initiative is driven by the State<br />

in their quest to achieve greater competitiveness and human<br />

development of people with sensory impairments, so that there are<br />

two scenarios for people with sensory limitations, a first positive<br />

scenario in which that population can access a variety of digital<br />

content of the same quality as those in normal sensory conditions,<br />

thus reducing the information gap and capacity, and a second<br />

70<br />

scenario less favorable in this population remains excluded from<br />

the flow of ideas and information because they lack the means or<br />

knowledge accessing digital information.Finally, the inclusion of<br />

people with sensory disabilities is the only possibility of<br />

generating a real and effective exercise of the right to information<br />

of every citizen. Thus, governments have an obligation to<br />

implement public policies to help facilitate the use of ICTs<br />

independently to exercise their rights as independent persons with<br />

a real capacity to make their own decisions, thereby affecting<br />

collective decisions that allow them competition and active<br />

participation in democracy. However, the benefits of ICTs for<br />

people with sensory disabilities is not limited to purely civic and<br />

democratic roles, as technologies make everyday tasks easier for<br />

these individuals, which is achieved by a dynamic of inclusion<br />

that goes beyond the merely digital and reaches beyond the<br />

academic, social and family life of each person.<br />

5. REFERENCES<br />

[1] Brian D. Loader and Leigh Keeble, Challenging the digital<br />

divide? : A literature review of community informatics initiatives,<br />

JosephRowntree Foundation, Teesside University, 2004<br />

[2] Bueno Manuel. Definiciones y clasificaciones en torno a la<br />

discapacidad visual. La baja visión y la ceguera,2012.<br />

[3] Canadian Association of the Deaf. Statistics on Deaf<br />

Canadians, 2012.<br />

[5] DANE. Censo General, 2005<br />

[6] Gulati. Archana, Universal Service Obligation Fund´s Pilot<br />

Project Scheme For Access to ICTs And ICT Enabled Services for<br />

Persons with Disabilities in Rural India, 2011<br />

[7] INEGI. Censo de Población y Vivienda, 2010.<br />

[8] MengEe Wong and Libby Cohen. School, Family and other<br />

influences on assistive technology use: Access and challenges for<br />

students with visual impairment in Singapore, 2011.<br />

[9] Microsoft Corporation. Conducted by Forrester Research Inc.<br />

in 2003, The Wide Range of Abilities and Its Impact on Computer<br />

Technology, 2003<br />

[10] Observatorio de Sociedad, Gobierno y Tecnologías de<br />

Información. Revisión y análisis de los avances en alfabetización<br />

digital y apropiación TIC para población con discapacidad<br />

sensorial. 2011<br />

[11] OMS. Resumen Informe Mundial sobre la discapacidad.2011<br />

[12] MINTICS. Tecnologías de Comunicación para la población con<br />

discapacidad, 2009.<br />

[13] Pereira. Selau. Mecdaisy: Um Novo Espaço Virtual Para Os<br />

Deficientes Visuais No Brasil,2009<br />

[14] Silvera. Claudia. La alfabetización digital: una herramienta<br />

para alcanzar el desarrollo y la equidad en los países de América<br />

latina y el Caribe.2005.<br />

[15] Ramírez Leyva. Elsa Margarita. La lectura, Alfabetización en<br />

Información y Cultura de la Información,2007.<br />

[16] World Economic Forum. ISNEAD.The Global Information<br />

Technology Report 2010, 2011.Transformations 2.0. 2011.


E-Government Education at the Public Administration Departments<br />

in Turkey<br />

Cenay BABAOGLU<br />

Hacettepe University<br />

Department of Political Science and<br />

Public Administration<br />

Beytepe, Çankaya, Ankara-TURKEY<br />

+90 312 2978725<br />

cenaybabaoglu@hacettepe.edu.tr<br />

ABSTRACT<br />

This paper presents the main findings of an extensive investigation<br />

of the current status of undergraduate level e-government<br />

education at public administration departments in Turkey. In the<br />

study, online program curriculums were searched to determine the<br />

state of the e-government and ICT courses. Primary data were<br />

collected from lecturers via semi-structured interviews and a<br />

questionnaire which was applied to undergraduate public administration<br />

students who have attended e-government courses during<br />

the fall semester of 2011. Syllabi of the courses were also analyzed<br />

to determine the contents of the courses. In the light of these<br />

data, the current status, risks, future prospects, and diffusion of egovernment<br />

education at public administration departments were<br />

discussed within the limits of the presentation.<br />

Categories and Subject Descriptors<br />

K.3.2 [Computer and Information Science Education]: Curriculum,<br />

Information Science Education<br />

General Terms<br />

Human Factors.<br />

Keywords<br />

E-Government Education, Curriculum, Turkey, PA Departments,<br />

Public Administration.<br />

1. INTRODUCTION<br />

Governments spend considerable amount of resources in egovernment<br />

projects. The cost of these investments may be justified<br />

if one considers the benefits such as reduction of costs, increasing<br />

transparency, easier communication between the state<br />

and the citizens, improving effectiveness, or faster service delivery<br />

[7]. But, e-government projects entail risks as well as its advantages.<br />

Project failures and low user rates may hinder costly egovernment<br />

initiatives. Heeks’ [7] study which investigates the<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

H. Serkan AKILLI<br />

Nevsehir University<br />

Department of Public Administration<br />

Faculty of Economics and Administrative<br />

Sciences, Nevsehir, Turkey<br />

+90 384 2281000 (1534)<br />

h.serkanakilli@nevsehir.edu.tr<br />

71<br />

Mehmet Akif DEMIRCIOGLU<br />

Indiana University<br />

School of Public & Environmental Affairs<br />

1315 East Tenth Street, Bloomington,<br />

IN USA<br />

+1 812 8552457<br />

mdemirci@indiana.edu<br />

success levels of e-government projects in developing countries<br />

shows that only 15% of projects can be labeled successful while<br />

35% of the projects totally failed and other projects (50%) was<br />

just partially successful. The same failure scenarios and low citizen<br />

usage of e-government services are experienced in developed<br />

countries such as Australia, New Zealand, Netherlands or the UK,<br />

as well [8][12][21].<br />

The failures of e-government projects may stem from many intertwined<br />

reasons such as system design, inadequate infrastructure,<br />

social and organizational issues, public/private relationships or<br />

political factors. However, the focus of this study is on egovernment<br />

education, since lack of human capital is one of the<br />

most critical factors, which may bring success or failure in egovernment<br />

projects. Successful implication of e-government<br />

projects requires educational and training activities on a wide<br />

array of levels and dimensions. As a component of e-government<br />

education research agenda, this paper presents the main findings<br />

of an extensive investigation of the current status of undergraduate<br />

level e-government education at public administration departments<br />

in Turkey. In the following sections, an overview of egovernment<br />

in Turkey and e-government education is shortly<br />

discussed, the methodology of the study is explained, and the<br />

main findings are presented.<br />

2. LITERATURE REVIEW<br />

Turkey, as a candidate to the European Union (EU), and as a<br />

partner involved in e-government agenda of the union, has been<br />

eager to invest in e-government projects since the 1990s under E-<br />

Turkey, and E-Transformation Turkey programs. A single point<br />

access to e-government services was achieved in 2008 with the<br />

opening of the e-government gate (www.turkiye.gov.tr) and as of<br />

2010, 246 services were provided on-line by different government<br />

agencies. In 2010, the availability of 20 e-government services<br />

determined by the European Council was above the average of EU<br />

member and candidate states. Although the supply side of egovernment<br />

services is enough, there is urgent need to increase<br />

the level of use of these services by the citizens and a general<br />

need to develop e-readiness level of the society as a whole.<br />

Parallel to e-government investments, e-government researches in<br />

Turkey have been initiated by several government agencies with<br />

the support of a number of NGOs since the late 1990s. The first<br />

people working on e-government research were computer scientists<br />

and faculty from public administration departments were


involved later [22]. Several institutions are involved in egovernment<br />

research on organizational and technical level [14].<br />

“E-Government Research and Applications Center (EDMER)” in<br />

Middle East Technical University (METU) was opened in 2007<br />

and “Center on E-Government” (eDEM) in the Public Administration<br />

Institute for Turkey and Middle East (TODAIE), (a governmental<br />

institution to train bureaucrats and scholars in the field of<br />

public administration) was opened in 1999. More recently, several<br />

NGOs have also initiated studies about e-government and information<br />

society [14] [22].<br />

To sum up, although it is clear that e-government is a mature field<br />

of research, there is still need for wide-spread e-government training<br />

and education in Turkey since the efforts of the above mentioned<br />

institutions remain restricted in the face of mounting “demand<br />

side”. While lack of investment on educational and training<br />

activities about e-government may bring about disappointment in<br />

e-government projects, there seems to be a substantial gap in this<br />

field, both abroad and in Turkey. A number of reasons lie behind<br />

this withdrawal from such activities: service providers may see<br />

education and training services as extra costs that should be<br />

avoided, due to the complex and multidimensional nature of egovernment<br />

topics, difficulties arise when designing teaching<br />

programs, training programs for public employees may have<br />

limited time and reach a limited number of staff, or governments<br />

may be unwilling to pay for educational costs of large populations<br />

[6]. However as Janowski argues, especially the political leaders,<br />

government leaders, project managers, management staff, technical<br />

staff, service staff, businesses, citizens should have some<br />

training on e-government [9]. Thus, the role of higher education<br />

institutions as well as offering courses to the public becomes more<br />

important, since they have an opportunity to reach various types<br />

of recipients. Moreover, public administration graduates need to<br />

prepare today’s challenges and uncertainty which globalization<br />

and information technology trigger [18]. Since public administration<br />

systems are largely affected from surrounding technologic<br />

environment and e-government initiatives on both organizational<br />

and political levels, it would be appropriate to suggest that public<br />

administration departments should have a leading role in developing<br />

information technology and e-government curricula or update<br />

existing programs according to the needs and requirements of<br />

public organizations and the societies at large [3] [4] [11] [17].<br />

Thus, even before the emergence of the internet revolution, the<br />

importance of updating public administration programs to follow<br />

technological developments was emphasized by various writers,<br />

and the inadequacies in this field still remain problematic [10]<br />

[13] [15] [17]. Parallel to the diffusion of information technologies<br />

into the societies and the institutions, universities have initiated<br />

technology or e-government education programs on different<br />

levels that target students, public/private sector employees, social<br />

groups and specific topics and specialization areas [1][2].<br />

3. METHODOLOGY<br />

In this study, online program curriculums were searched to determine<br />

the state of the e-government and ICT courses in Turkey.<br />

Primary data were collected from lecturers via semi-structured<br />

interviews and a questionnaire which was applied to undergraduate<br />

public administration students who have attended egovernment<br />

courses during the fall semester of 2011. Syllabi of<br />

the courses were also analyzed to determine the contents of the<br />

courses. In the light of these data, the current status, risks, future<br />

prospects, and diffusion of e-government education at public<br />

72<br />

administration departments were discussed within the limits of the<br />

presentation.<br />

There are 68 public administration department in Turkey in 2012.<br />

Although all departments offer courses which aim to develop<br />

basic computer skills, such as office programs or web page design,<br />

only 14 department offer course which are directly about egovernment.<br />

Faculty members teaching relevant courses in these<br />

departments were determined, and semi-structured in-depth interviews<br />

were conducted with them. In these interviews, introduction<br />

process of relevant courses into the curricula was examined, and<br />

related factors were investigated. In addition, questions about the<br />

content of the courses were addressed. The development of egovernment<br />

studies and e-government courses have been asked to<br />

the faculty and their recommendations and predictions were compiled<br />

with the interviews. Syllabi of the courses were collected as<br />

secondary data. It was not possible to reach enough syllabi to use<br />

for content analysis, so 4 syllabi were used as subsidiary sources.<br />

In order to investigate the opinions of students about egovernment<br />

courses, a survey was conducted among undergraduate<br />

students of four PA departments offered e-government courses<br />

in Fall 2011. 266 students followed these courses during the stated<br />

period and 193 of 266 answered the questions. 59.7% (111) of<br />

these students were female, and 40.3% (75) were male. In total,<br />

186 (70% of the students) student questionnaires were used for<br />

analysis. The questionnaire included ten expressions about the<br />

reasons for choosing the course, course satisfaction, perceived<br />

advantage of taking this course, and opinions about the status of<br />

the course. They were asked to choose from one of five options<br />

about the expressions (From absolutely disagree to totally agree).<br />

The students were also asked to assign an importance rating (one<br />

being least important and seven being most important) to 22 student-familiar<br />

e-government topics, which reflect technical, theoretical,<br />

legal, organizational, and political aspects,<br />

4. FINDINGS<br />

In this section, the main findings of the study are presented with<br />

two sub-headings. The first sub-section gives information about<br />

the current status of e-government courses at PA departments, and<br />

discusses the inclusion of e-government courses into the curricula.<br />

The second sub-section deals with the education methods, course<br />

syllabi and the opinions of undergraduate students about egovernment<br />

courses. The findings of the study are discussed in the<br />

last section.<br />

4.1 E-Government Courses at PA Departments in<br />

Turkey<br />

As mentioned before, the interest in e-government investment and<br />

research does not seem to correspond to a similar interest in egovernment<br />

education at the public administration programs in<br />

Turkey. Since the number of PA departments which offer egovernment<br />

courses is low, understanding the way in which these<br />

courses diffuse into the curricula becomes important for future<br />

tracks. In a recent study Yildiz et al. have found that receiving<br />

graduate education or spending sabbatical studies in abroad are<br />

the most important factor to include public policy courses in the<br />

curriculum. Additionally, student exchange programs (particularly<br />

with the European countries) and second generation lecturers who<br />

have taken these courses in Turkey are also affecting the decision<br />

to add these courses in the curriculum.


A similar pattern can be observed about e-government courses.<br />

First reason of spread of e-government courses is about faculties’<br />

academic interests. Our research shows that e-government courses<br />

were included to the curricula mainly because of at least one<br />

faculty’s demand. If a faculty were interested in e-government or<br />

information and communication technologies, he/she demand to<br />

add these courses to curricula. Faculties, who received their MA<br />

or Ph.D. degrees in European or American universities, become<br />

another transfer agent for the e-government courses. Most of these<br />

received similar courses during their studies, and after the graduation<br />

they transferred the courses to Turkish universities. Faculty,<br />

who took these lessons, would be a new instrument for a secondary<br />

transfer, and it is the third reason for the spread of egovernment<br />

course, which could be seen above in Figure 1.<br />

Figure 1<br />

33%<br />

25%<br />

42%<br />

Academic Interest<br />

Transfer by Abroad<br />

Studied Faculty<br />

Secondary Transfer<br />

Although current lecturers of e-government courses are optimistic<br />

that these courses will be developed and core courses in the near<br />

future, we do not expect it due to existing traditions in PA Departments<br />

and lack of interest of academic staff. In terms of Rogers’<br />

diffusion of innovations, it could be claimed that inclusion of<br />

e-government courses are generally optional and personal choice<br />

[19]. The decision rests mostly on the interested lecturer or department<br />

chair that is responsible for updating the curricula. Some<br />

of the “early adapters” find it difficult to open or sustain the<br />

course which is included in the curriculum because of lack of<br />

academic staff or because this course was not really meant to be<br />

opened at all. In this case, the curriculum looks right, but the<br />

courses, in fact, only nominally exist. Thus, the course becomes a<br />

product of isomorphism rather than innovation.<br />

4.2 Content of the Courses and Students’ Opinions<br />

about E-Government Courses<br />

Looking at the contents of the course, e-government issues can be<br />

categorized, which are derived from interviews and syllabi. According<br />

to this data, Turkish e-government education includes<br />

these titles: Basic e-government literature, e-government theories,<br />

e-government applications, e-government policies, e-governance,<br />

e-participation, e-democracy, e-municipality and problems of egovernment.<br />

These titles are used in almost every university.<br />

Three of ten faculties, named the topics; cyber crimes and esignature<br />

as basic, and two others named as subtopic. An advising<br />

report of UNESCO, which is prepared for the African countries,<br />

includes almost the same topics. [20] E-government courses<br />

generally begin with theoretical backgrounds and basic concepts.<br />

Towards the middle of the term, they turned to e-government<br />

applications.<br />

If we look to the students’ opinions about the courses, some of<br />

would be outshining. The ranking means and the standard deviations<br />

of the ratings are presented in Table 1. Test results show that<br />

there is a significant difference among the departments with respect<br />

to the importance rating of e-signature, theories of egovernment,<br />

properties of the information society, system design,<br />

e-democracy, e-trade/e-business, e-government experiences in<br />

Turkey, success/failure factors and internet penal law.<br />

73<br />

Table 1: Stated Importance Ratings of E-Government Topics<br />

(Students, N: 186)<br />

TOPIC MEAN STD.DEV.<br />

Information Security 6,102 1,4576<br />

Right to Internet Access 6,003 1,2884<br />

Right to Information 5,944 1,3210<br />

E-Government and Public Adm. 5,795 1,5052<br />

E-Signature 5,706 1,6790<br />

Theories of E-Government 5,116 1,5277<br />

Public/Private Partnership 5,050 1,5007<br />

Technological Dependency 4,596 1,8363<br />

Significant difference among the departments could be explained<br />

by the interests of the lecturers and could be considered as natural.<br />

However this may also carry the risk of “speci-centrism” as Yildiz<br />

et al. have defined in their own study [23].<br />

It could be argued that the answers of the students are promising<br />

about the sustainability of the e-government courses. When the<br />

options “Totally Agree” ve “Agree” are combined, it is found that<br />

79,6% of the students asserts positive opinions about interest in<br />

the topics of the course. On the other hand, 61,3% percent of the<br />

students think that the e-government course has provided advantages<br />

for their careers. Perceived advantage of taking egovernment<br />

courses would be another factor in development of egovernment<br />

courses in Turkey. There is a high level of satisfaction<br />

(81,1%) about the courses and 79% of the respondents says<br />

they would recommend this course to other students. When the<br />

responses for the above mentioned expressions are considered<br />

together, it could be argued that e-government courses would<br />

attract enough students if they were included in the curriculums of<br />

the departments which have not opened a course about egovernment.<br />

5. DISCUSSION AND CONCLUSION<br />

The findings present a mixed case. E-government is developing<br />

fast in Turkey, and research on e-government draws significant<br />

attention. But, currently, the number of public administration<br />

departments which offer courses about e-government may not be<br />

considered as adequate. The opinions of lecturers and students are<br />

promising about the e-government courses in the future, yet lack<br />

of interest on academics’ side may hinder the development of<br />

these courses. Proliferation of e-government courses in Turkey is<br />

needed, but this is not without risks. These courses have been<br />

spreading among PA departments in the last five years. Although<br />

the courses which aim to improve basic computer skills could be<br />

traced to 1990s, first e-government courses in Turkey date back to<br />

2006. Currently, 22% of the departments have e-government<br />

courses in their curricula. At this point the problem of institutional<br />

isomorphism becomes critical [5]. As Park and Park acknowledge,<br />

the curricula of leading universities in South Korea were followed<br />

by other institutions and that there is possibility of normative<br />

isomorphism [16]. In a similar vein, latest developments in the<br />

field of higher education in Turkey, especially Bologna process,<br />

have created coercive and imitative institutionalization among PA<br />

departments. This isomorphic trend may end up in curricula which<br />

reflects “the politically right” but which do not correspond to the<br />

real resources of the departments that are required to sustain IT<br />

and e-government related courses. As a conclusion, it is important<br />

to emphasize the need to build necessary resources and skills


among lecturers and students parallel to (better before) diffusion<br />

of e-government courses into core PA curricula in Turkey.<br />

In this study we have focused on on e-government education at<br />

the undergraduate departments of public administration in Turkey.<br />

Our researches, however, have found that other departments and<br />

schools do not offer e-government courses, but similar courses<br />

such as information technology. Future studies may focus on<br />

graduate programs teaching e-government courses at the public<br />

administration department. In addition, since e-government studies<br />

also include practical sides, other scholars may focus on practical<br />

aspects of e-government research and education. As authors,<br />

we consider that it will be very useful if both theoretical and practical<br />

sides of e-government would be examined and compared.<br />

6. ACKNOWLEDGEMENTS<br />

We would like to thank Haydar EFE, Veysel EREN, M. Kemal<br />

ÖKTEM, Özgür ÖNDER, Mustafa ÖZTÜRK, Naci SEVKAL,<br />

Nur ŞAT, and Ali ŞAHİN for their valuable helps. And also special<br />

thanks to ICEGOV 2012 organization committee, two anonymous<br />

reviewers and Mete YILDIZ, for their valuable comments<br />

and suggestions.<br />

7. REFERENCES<br />

[1] Augustinaitis, A.and Petrauskas, R. Master Studies on e-<br />

Governance Administration: The First Experience in Lithuania.<br />

In R. Traunmüller, (Ed.), EGOV 2004, Springer<br />

LNCS#3183, Heidelberg, 2004, 438-445.<br />

[2] Biasiotti, M.A. and Nannucci, R. Teaching e-Government in<br />

Italy. In R. Traunmüller, (Ed.), EGOV 2004, Springer<br />

LNCS#3183, Heidelberg, 2004, 460-463.<br />

[3] Chiu, S. Understanding the Adoption and Diffusion of Information<br />

Technology Related Curricula: Multiple Theoretical<br />

Perspectives. Ph.D. Thesis, Indiana University, 2007.<br />

[4] Dawes, S. Training the IT-Savvy Public Manager: Priorities<br />

and Strategies for Public Management Education. Journal of<br />

Public Affairs Education, 10, 1 (Jan., 2004), 5-17.<br />

[5] Di Maggio, P. J., and Powell, W. W. Iron cage revisited:<br />

Institutional isomorphism and collective rationality in organizational<br />

fields, American Sociological Review, 48 (1983).<br />

147-160.<br />

[6] Garson, D. Public Information Technology and E-<br />

Governance: Managing the Virtual State. Jones and Bartlett<br />

Pub, NC, 2006.<br />

[7] Heeks, R. Most eGovernment-for-Development Projects<br />

Fail: How Can Risks Be Reduced?. iGovernment Working<br />

Papers , paper no.14. Institute for Development Policy and<br />

Management, University of Manchester, 2003.<br />

[8] Gauld, R., Goldfinch, S., and Horsburgh, S. Do They Want<br />

It? Do They Use It? The “Demand-Side” of e-Government in<br />

Australia and New Zealand. Government Information Quarterly,<br />

27, 2 (March, 2010), 177-186.<br />

[9] Janowski, T. Conceptualizing Electronic Governance Education.<br />

45th Hawaii International Conference on System Sciences,(2012)<br />

2269-2278<br />

[10] Kiel, D. Information Systems Education in Master Programs<br />

in Public Affairs and Administration. Public Administration<br />

74<br />

Review, 46, Special Issue: Public Management Information<br />

Systems (Nov., 1986), 590-594.<br />

[11] Kim S. and Layne K. Making the Connection: E-Government<br />

and Public Administration Education. Journal of Public Affairs<br />

Education, Vol.4, No.4 (Oct., 2001), 229-240.<br />

[12] Kolsaker, A. and Kelley, L. Citizens’ Attitudes towards e-<br />

Government and e-Governance: a UK Study. International<br />

Journal of Public Sector Management, 21, 7 (2008), 723-<br />

738.<br />

[13] Kraemer, K.L. and Northrop, A. Curriculum Recommendations<br />

for Public Management Education in Computing: An<br />

Update. Public Administration Review, 49, 5 (Sep.-Oct.,<br />

1989), 447-453.<br />

[14] Medeni, T., Mustafa S., Tunc, M., Asim B., and Merih T.<br />

Developing an E-Government Education Programme Curriculum<br />

Based on Knowledge Management Paradigms to Support<br />

Institutional Transformation. International Journal of<br />

eBusiness and e-Government Studies. 2009. 1(2): 35-47<br />

ISSN: 2146-0744 (Online)<br />

[15] Northrop, A. Challenge of Teaching Information Technology<br />

in Public Administration Graduate Programs. In D. Garson<br />

(ed.), Information Technology and Computer Applications in<br />

Public Administration. IGI Publishing, PA, 1999, 7-22.<br />

[16] Park, H. M. and Park. H. Diffusing Information Technology<br />

Education in Korean Undergraduate Public Affairs and Administration<br />

Programs: Driving Forces and Challenging Issues,<br />

Journal of Public Affairs Education, 2006, 12(4): 537-<br />

555.<br />

[17] Pavlichev, A. The E-Government Challenge for Public Administration<br />

Education. In A. Pavlichev, D. Garson (eds.),<br />

Digital Government: Principles and Best Practices, IGI, PA,<br />

2004, 276-289.<br />

[18] Perry, James L. A Symposium on Transformations in Public<br />

Affairs Education: Challenges, Progress, and Strategies.<br />

Journal of Public Affairs Education, 2001, 7(4): 209-211.<br />

[19] Rogers, E. Diffusion of Innovations. Free Press, NY, 2003.<br />

[20] UNESCO, Curriculum Guide on E-governance for African<br />

Government Institution, Available from:<br />

http://portal.unesco.org/ci/en/files/25720/11980630809curri<br />

culum_guide.pdf/curriculum%2Bguide.pdf, accessed<br />

16.03.2012<br />

[21] Van Deursen, A., van Dijk, J., and Ebbers, W. Why E-<br />

Government Usage Lags Behind: Explaining the Gap Between<br />

Potential and Actual Usage of Electronic Public Services<br />

in the Netherlands. Lecture Notes in Computer Science,<br />

4084 (2006), 269-280.<br />

[22] Yazici, Ali. Teaching and Research on E-Government. International<br />

Conference on eGovernment and eGovernance. 11-<br />

12 March 2010. Antalya, Turkey.<br />

[23] Yildiz, M., Demircioglu, M.A., and Babaoglu, C. Teaching<br />

Public Policy to Undergraduate Students: Issues, Experiences,<br />

and Lessons in Turkey. Journal of Public Affairs Education,<br />

17, 3, 2011, 343-365


e-Government in Latin American Countries. Are they<br />

Building National Policies with a Regional Perspective?<br />

ABSTRACT<br />

Are the Latin American countries building their national e-<br />

Government policies with a regional perspective? The hypothesis<br />

of this paper is that international organizations are shaping, at<br />

least in some extent, the ideas, priorities, and initiatives<br />

implemented by the governments of this emergent region.<br />

Institutional theory suggests that policy transfer implies a process<br />

of institutionalization in the national public sector and public<br />

policies of specific logics of action, values, routines, rules, etc., in<br />

general, defined by international organizations, through diverse<br />

policy instruments. This paper presents a documentary analysis of<br />

policy reports from this type of organizations (i.e. Inter-American<br />

Development Bank…) devoted to foster e-Government in Latin<br />

America. Also it descriptively analyses statistical data about e-<br />

Government in the region. Thus, this paper studies the most<br />

important ideas, priorities, and values that these international key<br />

drivers use to disseminate e-Government policies in the region.<br />

Finally, this work debates their implications using institutional<br />

theory, and gives ideas for future research.<br />

Categories and Subject Descriptors<br />

K.4.1 [Public Policy Issues]: Transborder Data Flow<br />

General Terms<br />

Management, Measurement, Design, Human Factors, Theory<br />

Keywords<br />

Electronic Government, International Organizations, Policy<br />

Transfer, Latin America, Interoperability<br />

1. INTRODUCTION<br />

The diffusion of Information and Communication Technologies<br />

(ICTs) in public administration represents a relatively recent<br />

phenomenon in Latin American (LatAm) countries. This paper is<br />

determined to shed light on the following question: Are the Latin<br />

American countries building their national e-Government policies<br />

with a regional perspective? This general question is based on the<br />

importance that during the last years have gained the ideas,<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

J. Ignacio Criado<br />

Department of Political Science<br />

Universidad Autónoma de Madrid<br />

ignacio.criado@uam.es<br />

75<br />

values, priorities, and projects mostly sponsored by international,<br />

inter-governmental, or transnational organizations acting as key<br />

drivers of e-Government developments within the LatAm region<br />

[1,4]. This paper assumes the existence of a policy transfer<br />

process of these ideas, values, priorities, and projects across the<br />

LatAm governments.<br />

This study is rooted in institutional theory literature. Institutional<br />

theory has tackle with the interplay of ICTs and public<br />

administration, and it has been of growing interest for e-<br />

Government scholars during the last decade [6,7,8]. Institutional<br />

theory suggest that policy transfer within a region of the World<br />

implies a process of institutionalization in the national public<br />

sector and public policies of specific logics of action, values,<br />

routines, rules, etc., in general, defined by international,<br />

intergovernmental, or transnational organizations, through diverse<br />

instruments [5]. However, this is not the same to convergence,<br />

harmonization, or political integration; since there is a difference<br />

between a process and its consequences. The next pages put more<br />

emphasis on mechanisms of policy transfer in the field of e-<br />

Government, and how these mechanisms work (processes), than<br />

on final outputs, or qualitative differences across national public<br />

policies and administrations (results).<br />

Methodologically, this paper presents a documentary analysis of<br />

policy reports from international, intergovernmental, and<br />

transnational organizations (i.e. Organization of American States,<br />

Inter-American Development Bank…) dedicated to foster e-<br />

Government in LatAm during the last ten years. It also analyses<br />

statistical data about e-Government developments in the region.<br />

Thus, this paper assembles qualitative and quantitative methods to<br />

focus on the study of the most salient ideas, priorities, and values<br />

of key drivers in the enhancement of e-Government policies.<br />

The following section presents the development of e-Government<br />

readiness from a comparative perspective. This overview needs to<br />

be brought forward by giving an approximation to the drivers of<br />

the e-Government agenda in the LatAm region, notably intergovernmental,<br />

international, and transnational organizations<br />

devoted to formulate, design, fund, and implement projects,<br />

initiatives, or regulations within this field. Finally, the conclusion<br />

section debates the contents of the paper, research implications<br />

and limitations. At the same time, it discusses the institutional<br />

implications of the policy transfer process related to e-<br />

Government that it is supposed to be occurring within this<br />

emergent and vibrant region.


2. COMPARATIVE E-GOVERNMENT IN<br />

LATIN AMERICA<br />

Comparative data about the evolution of e-Government in LatAm<br />

is available from different sources. This section pinpoints some<br />

dimensions of the deployment of ICTs and the Internet within the<br />

countries of the region (e-Government demand-side). Also, it<br />

offers data about the United Nations e-Government readiness<br />

report (e-Government supply-side). Overall, the picture of the e-<br />

Government (potential) demand-side in LatAm resembles<br />

disparities if one look at in a country-by-country basis (see Table<br />

1). For example, there exist important differences among the<br />

societies of the region regarding to the access to the Internet. On<br />

the one hand, a group of experienced countries lead the Internet<br />

access in the region with more than 50% of users each. This group<br />

concentrates almost 30% of the Internet demand of the region. In<br />

second place, a group of six countries has not yet reached the<br />

barrier of 50% of the population connected (with 30% at least).<br />

Here, Mexico and Brazil are the most populated countries in the<br />

region, and they accumulate more than 50% of the Internet users.<br />

Finally, a group of less experienced societies shows the lowest<br />

rates of Internet access in the region (less than 30% of Internet<br />

users). This last group still exhibits a significant lack in terms of<br />

basic accessibility to the Internet, exemplifying the most negative<br />

side of the digital divide.<br />

Table 1. e-Government (potential) demand-side in Latin<br />

American countries<br />

Internet users<br />

(latest data,<br />

2011) (*)<br />

Penetration<br />

(%<br />

population)<br />

Broadband<br />

subscribers<br />

(2010) (**)<br />

Household<br />

use of<br />

computers<br />

(%) (***)<br />

Mobile<br />

phone<br />

subscriptions<br />

(per 100<br />

inhabitants)<br />

(2010)<br />

Argentina 27.568.000 66.0 9.56 21.9 141.79<br />

Bolivia 1.225.000 12.1 0.97 17.1 72.30<br />

Brazil 75.982.000 37.4 7.23 30.9 104.10<br />

Chile 9.254.423 54.8 10.45 33.1 116.00<br />

Colombia 22.538.000 50.4 5.66 22.8 93.76<br />

Costa Rica 2.000.000 43.7 6.19 33.9 65.14<br />

Cuba 1.605.000 14.5 0.03 2.1 8.91<br />

Dominican 4.116.870 41.3 3.64 13.0 89.58<br />

Republic<br />

Ecuador 3.352.000 22.3 1.36 22.8 102.18<br />

El Salvador 1.035.940 17.1 2.83 10.9 124.34<br />

Guatemala 2.280.000 16.5 1.80 10.7 125.57<br />

Honduras 958.500 11.8 1.00 10.1 125.06<br />

Mexico 34.900.000 30.7 9.98 25.7 80.55<br />

Nicaragua 600.000 10.6 0.82 6.3 65.14<br />

Panama 959.900 27.7 7.84 16.9 184.72<br />

Paraguay 1.104.700 17.1 0.61 14.9 91.64<br />

Peru 9.157.800 31.3 3.14 16.2 100.13<br />

Uruguay 1.855.000 56.1 11.37 38.8 131.71<br />

Venezuela 10.421.557 37.7 5.37 14.6 96.20<br />

Total/Mean 212.401.030 36.7<br />

Sources: (*) Internet World Stats (2011). Available:<br />

http://www.internetworldstats.com/stats.htm. Access data: September 1st 2011. (**)<br />

ITU. Available: http://www.itu.int/ITU-D/icteye/Indicators/Indicators.aspx#. Access<br />

data: September 1st 2011. (***) CEPAL. Estimations are based on household surveys<br />

for each country between 2006 and 2008 (Argentine is an estimation of 2001, last year<br />

with household survey information). Available: http://www.eclac.cl/cgibin/getprod.asp?xml=/socinfo/noticias/paginas/6/34246/P34246.xml&xsl=/socinfo/tpl/p<br />

18f.xsl&base=/socinfo/tpl/top-bottom.xsl. Access data: September 1st 2011.<br />

This picture of the e-Government (potential) demand-side requires<br />

attention to other data (see Table 1). The use of personal<br />

computing is an indicator of the extension of the traditional device<br />

to measure technological literacy, and to access the Internet. In<br />

general, data offer low rates in all the countries studied, ranging<br />

from almost 40% in Uruguay to 6.3% and 2.1% in Nicaragua and<br />

76<br />

Cuba. These data contrast with the access to mobile telephones in<br />

the region, which is remarkably higher in most of the cases. Here,<br />

governments may see an opportunity to facilitate the access to the<br />

e-Government services through mobile devices, regarding to their<br />

growing level of acceptance, including those cases with more<br />

limited Internet social penetration. Besides, broadband<br />

connections facilitate the access to the most sophisticated services<br />

available in the Internet, including electronic commerce, live<br />

video and music streaming, or transactional interactions with<br />

governmental agencies. Nonetheless the diffusion is very limited<br />

in all the countries of the region, with only two cases (Uruguay<br />

and Chile) with more than 10% of broadband subscribers.<br />

On the other hand, it is also important the study of the e-<br />

Government supply-side in the region (see Table 2). The most<br />

interesting conclusion of this comparative analysis of the UN e-<br />

Government readiness index is that in LatAm countries the online<br />

service delivery index is more developed than the general e-<br />

Government readiness index. In other words, the supply-side of e-<br />

Government (on-line service delivery) has been more expanded<br />

than the demand-side (equipment and digital education) in the<br />

countries of the region. This seems to be clearly the case of<br />

Colombia or Chile, and it is the same situation in other less<br />

developed including El Salvador or Dominican Republic.<br />

Table 2. United Nations e-Government readiness index and<br />

on-line service delivery in Latin America<br />

On-line service delivery e-Government readiness<br />

Ranking Index Ranking Index<br />

position 2012 2012 position 2012 2012<br />

Argentina 61 0.5294 56 0.6228<br />

Bolivia 97 0.4118 106 0.4678<br />

Brazil 32 0.6732 59 0.6167<br />

Chile 24 0.7516 39 0.6769<br />

Colombia 16 0.8341 43 0.6572<br />

Costa Rica 69 0.4967 77 0.5397<br />

Cuba 129 0.3072 110 0.4488<br />

Dominican Republic 57 0.5359 89 0.5130<br />

Ecuador 84 0.4575 102 0.4869<br />

El Salvador 32 0.6732 74 0.5513<br />

Guatemala 81 0.4641 112 0.4390<br />

Honduras 100 0.3791 117 0.4341<br />

Mexico 28 0.7320 55 0.6240<br />

Nicaragua 125 0.3137 130 0.3621<br />

Panama 82 0.4641 66 0.5733<br />

Paraguay 85 0.4575 104 0.4802<br />

Peru 63 0.5163 82 0.5230<br />

Uruguay 53 0.5490 50 0.6315<br />

Venezuela 76 0.4837 71 0.5585<br />

Source: United Nations. Available:<br />

http://www.unpan.org/egovkb/global_reports/08report.htm. Access data: Sep. 5th 2011.<br />

The analysis offers conclusions from a comparative point of view.<br />

One of them is that the region experiences the digital divide<br />

phenomenon, due to the marginal access to the technologies<br />

across important groups of citizens, still out of the demand side.<br />

At the same time, it seems to be that governments of the region<br />

have invested their resources in the supply-side of e-Government,<br />

while less efforts have been devoted to improve the citizens<br />

access and literacy (demand-side). In order to understand why this<br />

policy frame has been so successful, one may suggest that this is a<br />

consequence of political decisions at national level. Conversely,<br />

one may support that some type of policy transfer process has<br />

been activated within this region. This second assumption is<br />

studied in the next section.


3. REGIONAL DRIVERS OF THE E-<br />

GOVERNMENT AGENDA<br />

This section pinpoints the common efforts to develop e-<br />

Government from a regional perspective, notably coming from<br />

international, intergovernmental, or transnational organizations<br />

devoted to formulate, design, fund, and implement projects,<br />

initiatives, or regulations in this field. In doing so, we look at the<br />

priorities, areas, and the type of projects enhanced by these<br />

regional actors and organizations during the last years. This<br />

analysis facilitates the understanding of how the e-Government<br />

development within a region with very different administrative<br />

realities has tended to share some common policy frames. In this<br />

endeavor, some institutions like the CEPAL (United Nations<br />

Economic Commission for Latin America), CLAD (Latin<br />

American Center for Developing Administration), IDB (Inter-<br />

American Development Bank), OAS (Organization of American<br />

States), among others, have played a prominent role in fulfilling<br />

regional approaches to build up e-Government.<br />

One of the first regional definitions of e-Government derived<br />

from the Ibero-American Chart for Electronic Government (Carta<br />

Iberoamericana de Gobierno Electrónico) (ICEG) [3]. The<br />

definition of e-Government refers to the ‘use of ICTs in public<br />

administration to enhance the information and services offered to<br />

the citizens, to support public management efficacy and efficiency,<br />

and to improve the transparency of public sector and the<br />

participation of the citizens’ [3:7]. This is important while<br />

different country definitions and approaches to e-Government<br />

have been rooted in similar principles. Other recent efforts have<br />

emerged from the CLAD group of countries, i.e., the Ibero-<br />

American Interoperability Framework, the Ibero-American Model<br />

of Pubic Software for e-Government, or the Ibero-American<br />

Framework for Social Electronic Identification. Undoubtedly,<br />

these official documents have been cited and used in national<br />

strategies and blueprints, and they still provide shared guidelines<br />

fostering e-Government in the region.<br />

Other sources of regional influence and vision for the<br />

development of e-Government in LatAm have derived from the<br />

eLAC strategies. eLAC is a regional strategy for the development<br />

of Information Society (IS) from a harmonized perspective, with<br />

the support of CEPAL, using ICTs as instruments for economic<br />

development and social inclusion. Initially, it was endorsed in<br />

2005 in Rio de Janeiro (Brazil) as a long-term vision (until 2015)<br />

with short terms milestones (eLac 2007 and eLac 2010), in line<br />

with the Millenimum Development goals and those of the IS<br />

World Summit, which adopted concrete qualitative and<br />

quantitative goals to be achieved, also in the field of e-<br />

Government [1]. In general, the e-Government section of eLAC<br />

2015 fosters the diffusion of governmental agencies on the web<br />

and the sophistication of electronic services on-line [2]. This set<br />

of goals gives a sense of common ideas, values, and priorities<br />

within the diversity of the region. Another key aspect is the eLAC<br />

2015 focus on integration, interoperability, common standards,<br />

and collaborative work in the region.<br />

An archetype instrument derived from eLAC 2015 is the creation<br />

of the Network of e-Government Leaders of Latin America and<br />

the Caribbean (REDGEALC). REDGEALC has promoted the<br />

collaboration of LatAm governments from a technical point of<br />

view. This network of national experts acts as a forum to boost e-<br />

Government in the region, but also as an institutional mechanism<br />

to enforce, even informally, the policy transfer process in the<br />

77<br />

field. REDGEALC actions, meetings, and projects are funded by<br />

international organizations like the IDB or OAS, and it is intended<br />

to deepen the technical collaboration among the units devoted to<br />

manage national e-Government policies and strategies within the<br />

countries of the region. At the same, REDGEALC has expanded a<br />

network of key players, less political and more administrative,<br />

putting together a pool of middle-level managers involved in<br />

fostering e-Government in the region. One of the most remarkable<br />

projects of REDGEALC is eGobex, a common tool for sharing e-<br />

Government knowledge and applications at national, regional, and<br />

local layers (see: http://www.egobex.net/home/en/). This platform<br />

of solutions is based on different topics, among others, electronic<br />

citizen services, document management, e-justice, m-government,<br />

human resources management, e-procurement, or e-health.<br />

eGobex also facilitates other tools by facilitating the exchange of<br />

experiences among the public administrations of the region,<br />

providing a pool of experts in different aspects of e-Government,<br />

or offering virtual training for practitioners. Also, news and<br />

comments about developments of e-Government in the LatAm<br />

region are also provided by this shared digital platform.<br />

In sum, eLAC 2015 guidelines, REDGEALC network, as well as<br />

CEPAL, and other abovementioned international and<br />

intergovernmental institutions (CLAD, OAS, etc.), and the<br />

instruments behind them, play the role of framing this policy field,<br />

targeting the type of e-Government actions that need to be<br />

enhanced, adopted, funded, and implemented by national public<br />

administrations of the region. This group of instruments operates<br />

as policy carriers, or policy transfer instruments. In some cases<br />

they proceed as coercive mechanisms, while they can impose<br />

views about what type of projects will be funded. In other cases,<br />

they frame with ideas and rationales behind the strategies to foster<br />

e-Government nationally. Whatever the case, it is clear that this<br />

process has been, and it is, promoted within the LatAm region.<br />

4. DISCUSSION AND CONCLUSION<br />

This paper has explored the most salient aspects of the e-<br />

Government policy transfer process within the countries of<br />

LatAm. The question motivating this study is whether or not Latin<br />

American countries are building their national e-Government<br />

policies with a regional perspective. The preliminary assumption<br />

of this paper is that some international, intergovernmental, and<br />

transnational organizations are shaping, at least in some extent,<br />

the ideas, priorities, and initiatives implemented by the<br />

governments of this region of the World. The analysis of previous<br />

sections suggests the verification of this hypothesis.<br />

Consequently, one may support the idea that e-Government in<br />

LatAm may exemplify a policy transfer process.<br />

Overall, one may say that e-Government policy ideas and frames<br />

in LatAm countries derive from the abovementioned international,<br />

inter-governmental, and transnational organizations. These actors<br />

have played a growing role within an emergent policy field (e-<br />

Government), in which a number of developing countries have put<br />

their expectations to modernize their public sectors. What is more,<br />

in developing countries e-Government projects are funded by<br />

these organizations. This facilitates defining priorities, objectives,<br />

and even in some cases, applications, platforms, and vendors<br />

involved in the design, and implementation processes at national<br />

level. Nonetheless, further investigation will be needed in the<br />

future to identify in detail how the regional diffusion of ideas is<br />

implemented in specific countries, and to what extent


governments can innovate or be disconnected from the general<br />

ideas and priorities coming from this group of regional key<br />

drivers.<br />

In the LatAm region, different mechanisms have been oriented to<br />

enhance the supply-side of e-Government. This process has<br />

resulted in policy-makers focused on developing sophisticated<br />

Internet portals and e-services, more than the provision of training<br />

and digital literacy among the citizens. This conclusion is derived<br />

from the importance of supply-side elements within national e-<br />

Government policies, as well as from the analysis of data<br />

provided in previous sections. Besides, it is worth noting the most<br />

important areas of e-Government enhanced, i.e. e-procurement<br />

portals, tax and social security agencies on-line, and more recently<br />

electronic mechanisms for identification, interoperability<br />

schemes, or social media tools for public sector organizations [4].<br />

All of them are inextricably linked with these common beliefs,<br />

mostly a consequence of a techno-centric, e-commerce oriented,<br />

and new public management style of e-Government development.<br />

This study is rooted on institutional theory and policy transfer<br />

literature. Regarding to the previous analysis, this study shows<br />

that international, intergovernmental, and transnational<br />

organizations do not exert adaptive pressure in national states<br />

(‘hard’ mechanisms); and that therefore framing or ‘soft’<br />

mechanisms of policy transfer have characterized e-Government<br />

[5]. In other words, they have promoted e-Government in the<br />

nations of the region through non-coercive processes based on the<br />

will of the participants (i.e. eLAC 2015 goals, CLAD conferences,<br />

REDGEALC groups, etc.) to agree, by way of collective<br />

deliberation, on procedural norms, modes of regulation and<br />

common political objectives and, at the same time, to preserve the<br />

diversity of national and even local experiences.<br />

This type of policy transfer process has created convergence<br />

around paradigms, or a policy frame. This occurs when national<br />

jurisdictions accept new practices, actions and routines inspired<br />

by the international, intergovernmental, and transnational<br />

organizations involved, within an incremental adjustment<br />

process of current domestic institutions. In other words, the<br />

cognitive dimension within this type of intergovernmental<br />

coordination process operates through knowledge-sharing [7,8],<br />

mutual learning or exchange of best practices. In the case of e-<br />

Government policy, the main purpose of the instruments<br />

described throughout the previous section has been to encourage<br />

a comparison of situations across all countries, seeking to share<br />

some mutual representations, opening the road to common<br />

perceptions of political priorities and goals, and enlarging the<br />

variety of candidate alternatives, as a result of the exchange of<br />

good practice (i.e. REDGEALC).<br />

On the other hand, the organizations involved in the policy<br />

transfer process also delivered legitimacy and, less commonly,<br />

solutions to national authorities responsible for e-Government<br />

policies. By the mid of the previous decade, the majority of<br />

LatAm governments perceived this area as a new policy field,<br />

and recognized the extreme importance of the Internet, web sites<br />

and interaction with citizens using digital means. In this context,<br />

eLAC strategy, the CLAD policy formulations, or OAS<br />

initiatives emerged as a source of legitimacy for national<br />

78<br />

governments, as a consequence of the uncertainty about the<br />

future of e-Government. In some cases, they provided solutions<br />

for emergent challenges, altering the cognitive perceptions of<br />

problems in national policy arenas. The logic behind this is<br />

based on the conclusion that national administrations that do so<br />

increase their legitimacy, and their acceptance in society,<br />

independently of the immediate efficacy of practices and<br />

procedures.<br />

Further research will be required to conclude that a process of<br />

policy transfer has operated successfully during the following<br />

years promoting e-Government implementation in LatAm<br />

countries. The next steps of this study will be oriented (a) to<br />

deepen the extent of this process of policy transfer within the<br />

different countries of the region; (b) to understand the<br />

motivations behind the different levels of acceptance of this<br />

process of policy transferability; and (c) to identify the nations<br />

more prone to develop successfully their own e-Government<br />

agendas within the region. This paper aims at providing the<br />

basis for the future consolidation of this ambitious research<br />

agenda.<br />

5. ACKNOWLEDGMENTS<br />

This study has been funded by the Spanish Ministry of Economy<br />

and Competitiveness (project CSO2009-09169).<br />

6. REFERENCES<br />

[1] CEPAL. (2010a). Monitoring of the Plan of Action eLAC<br />

2010: Advances and Challenges of the Information Society in<br />

Latin America and the Caribbean. Lima, November 21-23th.<br />

[2] CEPAL. (2010b). Plan of Action for the Information and<br />

Knowledge Society in Latin American and the Caribbean<br />

(eLAC 2015). Lima, November 21-23th.<br />

[3] CLAD. (2007). Carta Iberoamericana de Gobierno<br />

Electrónico. Caracas: Centro Latinoamericano de<br />

Administración para el Desarrollo.<br />

[4] Criado, J. I., et al. (2011). ‘Interoperabilidad de Gobierno<br />

electrónico en Iberoamérica’. Reforma y Democracia 50:75-<br />

114.<br />

[5] Criado, J. I. (2009). ‘Europeanization of e-Government<br />

Policy. Institutional Mechanisms and Implications for Public<br />

Sector Innovation’. Information Polity 14: 299-314.<br />

[6] Gil-García, J. R. (2012). Enacting Electronic Government<br />

Success. New York: Springer.<br />

[7] March J. G. & J. P. Olsen, Rediscovering Institutions: the<br />

Organizational Basis of Politics, New York: Free Press,<br />

1989.<br />

[8] Scott W. R. & J. W. Meyer, The Organization of Societal<br />

Sectors, in The New Institutionalism in Organizational<br />

Analysis, W. W. Powell & P. J. DiMaggio (eds.), Chicago:<br />

University of Chicago Press, 1991, pp. 108-140.


Lyudmila Bershadskaya<br />

e-Gov Center, Analytic<br />

V.O., Birzhevaya line, 14, office 270<br />

199034, St.Petersburg, Russia<br />

+7812-457-1796<br />

analytics@egov-center.ru<br />

e-Government in Russia: Is or Seems?<br />

ABSTRACT<br />

Electronic governance has received much interest worldwide and<br />

a significant amount of attention and money is being put into<br />

making e-governance a reality. Proper assessment of egovernance<br />

projects gives us crucial information on the kinds of<br />

changes needed in order to make them successful.<br />

International ratings are extremely important in relation to<br />

comparing the achievements of different countries, analysing their<br />

experiences and making decisions about further development. On<br />

the other hand, a country’s ranking position forms or adjusts the<br />

world’s attitude toward this country.<br />

This article discusses the possible problem when a high position<br />

in such ranking becomes an aim in itself and determines the<br />

misdirection of e-Governance development – in this, the case we<br />

have chosen to study is Russia.<br />

Categories and Subject Descriptors<br />

K.4 COMPUTERS AND SOCIETY; K.4.1 Public Policy Issues;<br />

K.4.3 Organizational Impacts; K.5.2 Governmental Issues; K.6.1<br />

Project and People Management - Strategic information systems<br />

planning<br />

General Terms<br />

Management, Measurement<br />

Keywords<br />

E-Government, Public Policy, Goals, Ranking<br />

1. INTRODUCTION<br />

The assessment of e-government development held by the<br />

Department of Economic and Social Affairs of the United Nations<br />

in 2012 [1] showed that the Russian Federation (hereinafter RF or<br />

Russia) has achieved outstanding success and raised its rating<br />

from 59th position in 2010 to 27th place in 2011.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Andrei Chugunov<br />

e-Gov Center, Director, PhD<br />

V.O., Birzhevaya line, 14, office 270<br />

199034, St.Petersburg, Russia<br />

+7812-457-1796<br />

chugunov@egov-center.ru<br />

79<br />

Dmitrii Trutnev<br />

e-Gov Center, Deputy Director, CISA<br />

V.O., Birzhevaya line, 14, office 270<br />

199034, St.Petersburg, Russia<br />

+7812-457-1796<br />

trutnev@egov-center.ru<br />

At the same time, other ratings do not show the same success in<br />

other areas of Russia’s economic and political life. This<br />

discrepancy can be clearly seen in Figure 1.<br />

Figure 1. Russian Federation Rankings<br />

For comparison, the status and trends of other indicators of the RF<br />

were used as follows: GCI Global Competitiveness Index<br />

rankings [2], IMD Global Competitiveness Index rankings [3],<br />

World Bank Government Effectiveness Index [4], World Bank<br />

Knowledge Index & Knowledge Economy Index [5], Legatum<br />

Prosperity Index [6], Human Development Index [7], Doing<br />

Business 2011 [8] and Corruption Perceptions Index [9]. The<br />

question that the authors raise is as follows: is the formation of e-<br />

Government development plans influenced by world rankings?<br />

Research methods proposed:<br />

- Analysis of the motives of decision-makers in government<br />

and their reflections on the adopted legislative acts that define<br />

e-Government development plans in Russia.<br />

- Analysis of e-Government objectives stated in the adopted<br />

legislative acts and their relationship with the common e-<br />

Government goals and the indicators used in some rankings.


2. E-GOVERNMENT AS IS<br />

2.1. E-Government Globally<br />

E-government and e-governance are intrinsically related,<br />

however, practice shows that successful e-government and egovernance<br />

are not synonymous, but complementary [10]. This<br />

article will use both terms as they are used in the referenced<br />

documents.<br />

E-government has many definitions:<br />

o A new form of organizing public services based on extensive<br />

use of ICT that offers citizens and businesses the new and<br />

higher levels of efficiency and comfort in the delivery of<br />

public services, and in obtaining information on the<br />

performance of governmental agencies [11]<br />

o “E-government” refers to the use by government agencies of<br />

information technologies (such as Wide Area Networks, the<br />

Internet and mobile computing) that have the ability to<br />

transform relations with citizens, businesses and other arms of<br />

government. These technologies can serve a variety of<br />

different ends: better delivery of government services to<br />

citizens, improved interactions with business and industry,<br />

citizen empowerment through access to information, or more<br />

efficient government management. The resulting benefits can<br />

be less corruption, increased transparency, greater<br />

convenience, revenue growth and/or cost reductions. [12]<br />

o E-government is the use of information technology to support<br />

government operations, engage citizens and provide<br />

government services. [13]<br />

o The term “e-government” focuses on the use of new<br />

information and communication technologies (ICTs) by<br />

governments as applied to the full range of government<br />

functions. In particular, the networking potential offered by<br />

the Internet and related technologies has the potential to<br />

transform the structures and operation of government. [14]<br />

Summing up all these definitions and the world’s best practice, we<br />

can say that e-government and information technology serve as a<br />

tool to achieve such national goals as better governance (and<br />

common prosperity as a consequence) due to better (more<br />

effective and efficient) governmental functions, services and<br />

communications as shown in Figure 2.<br />

Figure 2. E-government as a Tool<br />

2.2. E-Government in the Russian Federation<br />

The development of e-government in Russia began with the<br />

adoption of the Federal target programme “Electronic Russia<br />

(2002-2010)” in 2002. The main objectives of that programme<br />

80<br />

have been announced as “the creation of conditions for the<br />

development of democracy, improving the functioning of the<br />

economy, public administration and local self-government<br />

through the introduction of ICT and mass distribution, and the<br />

rights to freely seek, receive, transfer, production and<br />

dissemination of information” [15]. Along with “Electronic<br />

Russia”, other Federal target programmes “Budget Reform” and<br />

“Administrative Reform” where carried out. After 2010 the<br />

Programme “Information Society 2011-2020” became the<br />

successor to “Electronic Russia”. The stated goals of all these<br />

Federal target programmes were consistent with the global trend –<br />

improving the quality of life through the use of ICT.<br />

Over 2002-2011 there was much public investment in nationwide<br />

projects aimed at e-government development in Russia. The<br />

intensity of the legislative activity in the area of e-government<br />

reflects the intensity of the government’s efforts and is illustrated<br />

in Figure 3.<br />

Figure 3. Quantity of E-Government Legislation Acts Adopted<br />

It is logical to expect rapid positive changes in economy and<br />

society in response to such vigorous state activity and investment<br />

growth in the use of ICT in government, but this has not happened<br />

as we have already seen in Figure 1.<br />

3. THE ANALYSIS<br />

3.1. Analysis of the motives of decision-makers<br />

To understand the reasons for this weak link between the growing<br />

use of ICT in government and any positive changes in other areas<br />

of national development, we must understand the motivation of all<br />

stakeholders, including the legislature, supreme executive power<br />

(Ministry), the regional authorities and municipal government<br />

agencies, companies and citizens.<br />

Established in the last decade, the administrative system of the<br />

Russian Federation is characterized by rigid top-down control<br />

(“vertical power”). In such a system all orders comes from the top<br />

down with, as a rule, lack of feedback, horizontal coordination<br />

and local initiatives. In this system, until recently, the opinion of<br />

citizens and businesses (except for the giant and state-owned<br />

corporations) did not play any significant role, for example, no<br />

large-scale studies of the requirements of citizens and businesses<br />

on the quality of public services have been carried out. These<br />

(citizen and business) stakeholders have no significant channels<br />

by which to influence the authorities.<br />

For the main implementers of e-government (regional authorities<br />

and municipal government agencies), Federal Law and<br />

Government Decrees are the only motive for the creation and<br />

implementation of e-government (“system motivation –<br />

administrative control and compulsion” [16]).


Observations over recent years show that the vast majority of<br />

major legislation in the field of e-government was developed and<br />

submitted for approval to the legislature by the executive<br />

authorities – responsible ministries (Ministries of Economic<br />

Development and of Telecommunications). These ministries are<br />

under the direct authority of the Prime Minister (and, indirectly,<br />

under the President) whose orders define the vector of the state in<br />

general and e-government development in particular.<br />

In 2000 at the G8 Summit the President of the Russian Federation<br />

together with the other G8 leaders signed Okinawa’s Charter on<br />

“Global Information Society” in which e-government was listed<br />

as one of the components of the information society. Since that<br />

time the implementation of commitments made under the<br />

Okinawa Charter and improving Russia’s position in international<br />

rankings have become among the highest priorities of the<br />

President and Prime Minister of Russia (especially in the practical<br />

absence of pressure from citizens and businesses as was<br />

mentioned above). This desire to improve Russia’s position in<br />

international rankings is frequently mentioned in the policy<br />

speeches of the leaders of the state and has even been used as the<br />

Key Performance Indicator in the text of the Concept of<br />

Administrative Reform in the Russian Federation in 2006 – 2008<br />

[17]. In particular, this document only elucidated upon the need to<br />

improve Russia’s position in the United Nations E-Government<br />

Survey’s ranking, GRICS, Doing Business and other rankings.<br />

Tracing this chain of motivations, we can conclude that one of the<br />

important factors determining the direction and results of egovernment<br />

development in Russia is the international rankings<br />

and the United Nations E-Government Survey among them.<br />

Logically we can assume that if one of the important goals is the<br />

position in a rating and the other motivators are not very strong,<br />

then there is a natural desire to improve precisely those<br />

characteristics that are evaluated during the surveys.<br />

3.2. Analysis of E-Gov Objectives and<br />

Indicators<br />

The authors have carefully examined the key normative<br />

documents that regulate the direction of e-government<br />

development in Russia ([18], [19], [20], [21]).<br />

These documents contain the requirements for naming and dating<br />

the transfer of governmental service into electronic form, and<br />

establishing the mandatory presence of governmental web-portals<br />

and electronic interagency interaction. At the same time, they do<br />

not contain any requirements for quality characteristics or the<br />

expected results and impact of these innovations on the main and<br />

common e-government goals. The same remark applies to all laws<br />

and regulations adopted in this period.<br />

E-government systems and applications created under these<br />

conditions cannot contribute to goals of e-government such as<br />

effectiveness, cost reduction, quality, anticorruption, etc. and<br />

cannot be useful to citizens and businesses. The absence of these<br />

effects of e-government projects in Russia has been shown here<br />

above in Figure 1.<br />

Indeed, in Russia in full accordance with those legislative acts, the<br />

main efforts were aimed at creating a national central web-portal,<br />

e-services portals, websites of all ministries and administrations,<br />

and establishing a system of interagency interaction.<br />

The United Nations E-Government Survey methodology says: “to<br />

arrive at a set of online service index values, the researchers<br />

assessed each country’s national website, including the national<br />

81<br />

central portal, e-services portal and e-participation portal, as well<br />

as the websites of the related ministries of education, labour,<br />

social services, health, finance and environment as applicable. In<br />

addition to being assessed for content and features, the national<br />

sites were tested for a minimal level of web content accessibility<br />

as described in the Web Content Accessibility Guidelines of the<br />

World Wide Web Consortium” [22].<br />

The generalized relationship between the main objectives of egovernment<br />

(taken from its several definitions), United Nations E-<br />

Government Survey indicators and the targets established by the<br />

laws of the Russian Federation are shown in Table 1.<br />

Table 1. Relationship between E-Gov Objectives, UN E-Gov<br />

Survey Indicators and Targets Established by the RF’s Laws<br />

E-Government Objectives<br />

UN E-Gov Survey<br />

Indicators<br />

Targets Established<br />

by the RF’s Laws<br />

Gov. processes improvement X X<br />

Effectiveness of government X X<br />

Cost reduction X X<br />

Quality of service delivery X X<br />

Availability of Information � �<br />

G2G relations improvement X �<br />

G2B relations improvement � �<br />

G2C relations improvement � �<br />

Less corruption X X<br />

Transparency improvement � �<br />

From Table 1 we can see that in the Russian Federation has been<br />

successfully (according to the UN rating) created that kind of egovernment,<br />

which does not lead to the achievement of such goals<br />

as prosperity due to good governance, better functions, services<br />

and communications, simply because the government did not state<br />

such objectives initially. Instead of e-government as a tool to<br />

achieve these vital goals, Russia saw e-government as a goal in<br />

itself, which takes resources away from other vital goals which<br />

were almost forgotten and not supported (Figure 4).<br />

Figure 3. E-Government as the Goal<br />

Such logic can explain why in recent years Russia actively created<br />

a web interface (front office) that assessors see well (“the national<br />

government portal … looks very solid and representative” [1])<br />

while the processes of public and municipal service delivery (back<br />

office) still continue to run in the manual and paper-based mode,<br />

under the old rules with the same low rate and high (if not higher)<br />

cost. This inner being of the “electronic government” was<br />

concealed from the assessors and cannot be evaluated from abroad<br />

with the methodology used.<br />

4. CONCLUSION<br />

If seen in the light of the Russian case, a negative effect of


ankings on the formation of national e-government development<br />

plans exists, therefore, it may also exist in other countries.<br />

Other authors have found that the raised problem is very complex<br />

and includes a spectrum of related problems:<br />

o The success of the e-governance survey and ranking has been<br />

limited so far [23]. Such a respected ranking as the United<br />

Nations E-Government Survey in some cases could give<br />

results which do not reflect the essence of the phenomena<br />

occurring.<br />

o It is possible to expect an immediate and strong impact of egovernment<br />

evaluation studies on countries’ e-government<br />

policies [24].<br />

o Lack of attention to stakeholders’ interests can make the<br />

results of the ranking meaningless [25].<br />

These problems can and should be solved by joint efforts of<br />

ranking organisations and appraised countries. In any case, all<br />

participants of ranking processes should be aware of the existence<br />

of such problems, understand their causes and take them into<br />

consideration in order to prevent negative impacts.<br />

The authors understand that the problem raised in this publication<br />

has not been adequately studied yet and requires further research.<br />

5. REFERENCES<br />

[1] United Nations e-Government Surveys. [E-source]:<br />

http://www.unpan.org/Home/tabid/1243/language/Library/Maj<br />

orPublications/UNEGovernmentSurvey/tabid/646/language/en<br />

-US/Default.aspx<br />

[2] The World Economic Forum, GCI Global competitiveness<br />

index rankings. [E-source]: http://www.weforum.org/<br />

[3] IMD Global competitiveness index rankings.<br />

[E-source]: http://www.imd.ch/<br />

[4] World Bank Government Effectiveness Index. [E-source]:<br />

http://info.worldbank.org/governance/wgi/sc_chart.asp<br />

[5] World Bank Knowledge Index & Knowledge Economy Index.<br />

[E-source]:<br />

http://info.worldbank.org/etools/kam2/KAM_page5.asp<br />

[6] Legatum Institute, Legatum Prosperity Index.<br />

[E-source]: http://www.prosperity.com/rankings.aspx<br />

[7] UNDP’s Human development index. [E-source]:<br />

http://hdr.undp.org/en/reports/global/hdr2007-2008/<br />

[8] International Finance Foundation & The World Bank’s<br />

Measuring Business Regulation Report “Doing Business<br />

2012”. [E-source]: http://www.doingbusiness.org/rankings<br />

[9] Transparency International's Corruption Perceptions Index<br />

(CPI). [E-source]: http://www.transparency.org/<br />

policy_research/surveys_indices/cpi<br />

[10] Haiyan Qian, Citizen-Centric E-Strategies Toward More<br />

Successful E-Governance, Journal of E-Governance, Volume<br />

34 Issue 3, August 2011, Pages 119-129, IOS Press<br />

Amsterdam, The Netherlands.<br />

[11] Russian Federation, Concept of E-Government Formation till<br />

the Year 2010. [E-source]: http://www.transparency.org/<br />

policy_research/surveys_indices/cpi<br />

[12] The World Bank, [E-source]: http://web.worldbank.org/<br />

wbsite/external/topics/extinformationandcommunicationandte<br />

chnologies/extegovernment/0,,contentMDK:20507153~menu<br />

PK:702592~pagePK:148956~piPK:216618~theSitePK:70258<br />

6,00.html<br />

82<br />

[13] University at Albany, Center for Technology in Government<br />

[E-source]: http://www.ctg.albany.edu/publications/reports/<br />

future_of_egov?chapter=2<br />

[14] OECD, Glossary of Statistical Terms<br />

[E-source]: http://stats.oecd.org/glossary/detail.asp?ID=4752<br />

[15] RF Government Order of 28.01.2002 N 65. On the Federal<br />

Target Program "Electronic RUSSIA (2002 – 2010)”<br />

[E-source]: http://www.internet-law.ru/intlaw/laws/e-rus.htm<br />

[16] Rustem Nureev, Political Economy of Russian “Vertical-of<br />

Power”, Proceedings of the Second World Congress of the<br />

Public Choice Societies, 8-11 March 2012, [E-source]:<br />

http://www.pubchoicesoc.org/papers_2012/Nureev_Shulgin.p<br />

df.<br />

[17] RF Government Order dated October 25, 2005 N 1789-R On<br />

the approval of the Concept of Administrative Reform in the<br />

Russian Federation in 2006 - 2008 and action plan for<br />

administrative reform in Russia in 2006 - 2010 (as amended)<br />

[E-source]: http://base.garant.ru/188767/<br />

[18] RF Government Order of 17.10.2009 N 1555-R "Transition<br />

plan for federal executive bodies public services and execution<br />

of public functions conversion into electronic form".<br />

[E-source]:<br />

http://government.consultant.ru/page.aspx?8411;1030853<br />

[19] RF Government Order of 17.12.2009 N 1993-R<br />

"Consolidated list of priority of state and municipal services<br />

provided by executive bodies of subjects of the Russian<br />

Federation and local authorities in electronic form".<br />

[E-source]:<br />

http://government.consultant.ru/page.aspx?1041050<br />

[20] RF Federal Law of 27.07.2010 N 210 “On the organisation<br />

of public and municipal services”<br />

[E-source]: http://www.rg.ru/ 2010/07/30/gosusl-dok.html.<br />

[21] RF Government Decree of 2.09.2010 N 1433 “Plan of action<br />

needed to implement the Federal Law “On the organisation of<br />

public and municipal services”<br />

[E-source]: http://www.rg.ru/ 2010/12/21/plan-site-dok.html<br />

[22] United Nations Global E-government survey 2012<br />

[E-source]: http://unpan1.un.org/intradoc/groups/public/<br />

documents/un/unpan048065.pdf<br />

[23] Ojo, A., Janowski, T,. Estevez, E., Building theoretical<br />

foundations for electronic governance benchmarking,<br />

Proceedings of the 10th IFIP WG 8.5 international conference<br />

on Electronic government, Springer-Verlag Berlin, Heidelberg<br />

©2011<br />

[24] Janssen, D., Rotthier, S., Snijkers, K., If you measure it they<br />

will score: An assessment of international eGovernment<br />

benchmarking. Information Polity Journal (Volume 9 Issue<br />

3,4, December 2004)<br />

[25] Rahul De', E-Government systems in developing countries:<br />

stakeholders and conflict. EGOV'05 .Proceedings of the 4th<br />

international conference on Electronic Government. Springer-<br />

Verlag Berlin, Heidelberg ©2005


Session 4<br />

Egov Adoption & Usage


Framework for Useful Transparency Websites for Citizens<br />

ABSTRACT<br />

In this paper, I describe the need to elaborate a theoretical<br />

framework that could help governments to improve their<br />

transparency and access to information websites beyond standard<br />

transparency obligations. If developed properly, these websites<br />

could offer information that is actually useful for ordinary<br />

citizens. In addition, I review literature of e-transparency web site<br />

evaluations in Mexico, as well as some examples of initiatives that<br />

have aimed to provide the ordinary citizen with useful<br />

information. Finally, this paper proposes a research agenda that<br />

could help to develop this framework. This is a work in progress.<br />

Josune Arcelus<br />

Categories and Subject Descriptors<br />

J.1.4 [Computer Applications]: Administrative Data Processing -<br />

Government<br />

General Terms<br />

Management, Human Factors<br />

Keywords<br />

Transparency Websites, Access to Information, e-Transparency,<br />

e-Government, Open Government<br />

1. INTRODUCTION<br />

During the last decade, the topic of transparency has taken a great<br />

deal of importance in Mexico. In 2000 Vicente Fox, the<br />

presidential candidate of National Action Party (PAN), defeated<br />

the long lasting ruling party, the Institutionalized Revolutionary<br />

Party (PRI) under the political banner that government<br />

transparency will empower citizens to demand a more democratic<br />

government. Twelve years after this promise, one of the few<br />

tangible achievements of the new democratic government has<br />

been the growing importance of transparency and access to public<br />

information. In 2002, the Federal Transparency and Access to<br />

Public Information Law (Ley Federal de Transparencia y Acceso<br />

a la Información Pública -- LFTAIP) was approved by Congress.<br />

In addition, a special institute (Instituto Federal para Acceso a la<br />

Informacion-- IFAI) was created to supervise compliance of this<br />

law. Gradually, each state and the Federal District (Mexico City)<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Blvd Jose Maria Morelos 1506<br />

Leon, Guanajuato, CP 24263<br />

+52(477)781 0347<br />

josune.arcelus@gmail.com<br />

83<br />

published their own laws to guide their obligations at the local<br />

level.<br />

The LFTAIP describes in its 7 th article the mandatory information<br />

that must be published electronically, and states in its 9 th article<br />

[1] that information must be available via electronic media.<br />

Over the last ten years state and local governments and their<br />

agencies have created their own transparency websites to comply<br />

with their respective laws.<br />

Different academic and civil society organizations like CIDE<br />

(Centro de Investigación y Docencia Económica) and Article XIX<br />

have been evaluating federal and state governments to assess their<br />

websites as well as their overall transparency initiatives. These<br />

evaluations are widely publicized in the media. Therefore,<br />

governments are trying continually to improve in order to obtain<br />

better evaluations.<br />

Based on the assumption that better informed citizens make better<br />

citizens, this law and transparency websites would contribute to a<br />

more democratic society. Transparency websites would open<br />

mechanisms to supervise the government, and harness a new<br />

desired relationship between citizens and governments. However,<br />

there is the perception that the information requested through<br />

websites is not being used directly by citizens, but by media,<br />

political opposition, and other enemies of the groups in power.<br />

This assumption is hard to evaluate with government produced<br />

data because the petition online system (Sistema de Solicitud de<br />

Información -- SISI) allows for anonymity. Therefore, making it<br />

hard to elaborate a precise analysis of who is requesting<br />

information. However, there is evidence that suggests that citizens<br />

are not making transparency and access to information part of<br />

their lives. According to a survey conducted by Parametría in<br />

2011 [2], only 19% of the persons interviewed were able to<br />

identify the IFAI, 14% knew how to make a petition to the<br />

government, and about 60% thought that information about<br />

government expenses and public servants salaries is “obscure” or<br />

difficult to reach.<br />

Interestingly, the transparency websites users and the petition<br />

system (SISI) users do not consider that transparency and access<br />

to information has been achieved after they interacted with them.<br />

In a survey/focus group published in the Mexican Journal<br />

Derecho Comparado de la Información [3], it is pointed out that<br />

while the test subjects find that the websites comply with what is<br />

required by law to be published, the website does not promote<br />

transparency in itself or the right to know. All interviewed<br />

subjects had access to the federal transparency web site, or used<br />

the SISI.


Several governments are aware of these deficiencies, yet because<br />

they are mostly evaluated and rewarded for complying with the<br />

law, they focus mostly on the latter.<br />

Additionally, evaluators have not found an impartial set of criteria<br />

regarding contents, from where to measure usefulness of<br />

information. There is agreement that evaluations currently lack a<br />

framework to measure content, apart from the mandatory list<br />

provided by the law<br />

In 2011 the Mexican Federal Government launched an initiative [4]<br />

of Focused Transparency (Transparencia Focalizada), intended to<br />

push information that may not be required by law but that is<br />

considered useful to the government. In addition, Mexico City´s<br />

government has published several transparency websites that<br />

evolve around topics of interest to the ordinary citizen, for<br />

instance, transportation, environment and procedures (tramites y<br />

servicios).<br />

However, there is not yet a neutral standard list of elements that<br />

could be considered when designing a website, and performing<br />

evaluation studies.<br />

The purpose of this article is to set the stage for a theoretical<br />

framework and guidelines that would allow for a more<br />

comprehensive evaluation of transparency and access to<br />

information web portals, and that would include compliance of a<br />

minimum set of useful content, apart from what is currently<br />

required by law.<br />

2. LITERATURE REVIEW AND MAJOR<br />

ISSUES<br />

2.1 Transparency and Access to Information<br />

as Part of Accountability<br />

Elaboration of a framework for transparency and access to<br />

information web portals requires defining both transparency and<br />

access to information in the right context.<br />

Literature does not equate transparency to access to information<br />

[5], although both concepts can be included within the concept of<br />

accountability. Lopez-Ayllon and Arellano explain that<br />

accountability has a dimension of answerability, which<br />

comprehends two components: information and justification. The<br />

information component implies an authority that is obliged to<br />

provide information and a citizen that has the right to access that<br />

information. The justification component of answerability is more<br />

complex and harder to achieve, since it implies the justification of<br />

actions by governments to citizens and a dialogue between them.<br />

The authors mention that these two components, information and<br />

justification, imply the possibility of the citizens to sanction, and<br />

that having all these components of information, justification and<br />

sanction allow for a complete accountability.<br />

In addition, Lopez-Ayllon and Arellano develop a diagram that<br />

depicts an incremental relationship among access to information,<br />

transparency, accountability, and democratic governance. Access<br />

to information is the most basic component, as shown below:<br />

Access to Information < Transparency < Accountability <<br />

Democratic Governance<br />

The implications of this concept have a relevant application for<br />

government websites, since it draws possible evolutionary stages<br />

for a complete transparency and access to information website.<br />

84<br />

This is actually explained in a recent study of transparency and<br />

access to information websites of Mexico [6]. In this work, the<br />

author Sepulveda cites the stages of an e-Transparency web<br />

portal, as defined by the University of Manchester [7]:<br />

publication, transaction, reporting, openness and accountability.<br />

The framework proposed in this paper should aim to the more<br />

advanced stages, since it aims to provide guidelines for websites<br />

that harness interaction between the government and the citizens.<br />

2.2 Access to Information as a Human Right<br />

Access to information can be understood under the notion of a<br />

liberal state, where a state is constrained by a set of fundamental<br />

rights of citizens [8].<br />

In addition, access to information is seen as the key that enables<br />

other rights. Article 19 of the Universal Declaration of Human<br />

Rights, declares freedom of speech for which the right to know is<br />

explicitly required. Within this context, the access to information<br />

is seen as a component of other rights (e.g., free expression). In<br />

other words, access of information protects other rights, helps in<br />

the compliance of other rights, and prevents possible violations of<br />

other human rights [9]. According to this perspective, the more<br />

information citizens have, the more citizens’ rights will be<br />

fulfilled [10].<br />

Consideration of access to information as an enabler and protector<br />

of other human rights should be incorporated as part of the<br />

framework, since it complements the other visions that have been<br />

applied to transparency websites.<br />

The cited contextualization of transparency and accountability<br />

take into account that the government must implement a policy<br />

that actively engages the citizens in the evaluation of all policies<br />

[5]. This paper by López-Ayllón and Arellano sets the extent and<br />

reach of the website regarding the achievement of democracyoriented<br />

goals; however, it does not help to define the basic<br />

contents of a website that enables transparency and access to<br />

information.<br />

A website framework that considers human rights germane<br />

provides the advantage of universality and simplicity as to what<br />

information must be included in any attempt to promote<br />

transparency and access to information.<br />

2.3 Websites Evaluations and Compliance of<br />

the Law<br />

Several efforts have been made to measure the compliance of the<br />

LFTAIP and the different state laws. The metrics developed by<br />

CIDE are the ones that are more widely recognized by the media<br />

and the government. CIDE’s metrics indicators provide a final<br />

grade. The four main aspects evaluated by CIDE include<br />

evaluation of web sites, normative quality, mystery shopper based<br />

on information requests, and institutional quality [5][11].<br />

The evaluation of the website mostly consists of checking the<br />

existence of all mandatory information (used as variables) as<br />

required by law, for example budget, outcomes of investigations,<br />

salaries, public servant directories, goals, programs, expenses,<br />

procurement, procedures, and services. Out of the 15 variables<br />

used as information proxies, only one is assigned to everything<br />

that has to do with the usability and design of the website.<br />

The limit of this evaluation approach is that governments that get<br />

a good grade in the evaluation of the website might think that they


are doing a good job overall in regards to their websites, while<br />

they are mostly doing a good job only in including the legally<br />

required information. As noted above users might acknowledge<br />

that the website provides the information required by law, and yet<br />

not feel their transparency and right-to-know needs are being<br />

fulfilled.<br />

The study conducted by Sepúlveda [6] suggests that quality of the<br />

law (i.e., how advanced the law is in terms of access to<br />

information and democratization) is not related to her<br />

transparency website index, in which she includes more<br />

technology related aspects. In other words, she shows that there is<br />

no relationship between how good the transparency law is and the<br />

quality of its transparency website.<br />

Lastly, the minimal information demanded by the LFTAIP, falls<br />

short within what a government is expected by its citizens to<br />

publish in order to be regarded as transparent. The emphasis<br />

placed in content targeted to fight corruption resulted in a tight<br />

and unattractive set of information for ordinary citizens as can be<br />

observed both in Parametría [2] and the Comparative Law Journal<br />

[3] surveys.<br />

The framework that shall be developed when this work is<br />

completed will emphatically seek to raise the bar of what is<br />

considered the minimum mandatory information that a<br />

government should share with the citizens.<br />

2.4 Usability and Other Types of Friendliness<br />

It is important for any website that the users remain in their<br />

websites for more than 10 seconds before they click-away. This<br />

concept of usability, as defined by Nielsen [12], parts from the<br />

assumption that the Internet user has thousands of options to<br />

choose from when browsing.<br />

Governments allocate a lot of money and other resources to<br />

organize, sort and publish information on their websites just to<br />

discover that they are not used because the information is not<br />

displayed in an attractive way.<br />

The topic of usability is noted in Sepulveda´s [6] study and in the<br />

yearly ranking [13] published by the magazine Política Digital<br />

issued in Mexico. Both studies develop an index to evaluate<br />

exclusively Transparency websites, and suggest specifications of a<br />

good web site, which include usability and accessibility.<br />

The issue of an easy-to-understand language is mentioned in<br />

Sepulveda´s study, but it is specified that it cannot be evaluated.<br />

The study refers to the Mexican Federal Government initiative of<br />

citizen´s language (lenguaje ciudadano), which calls all the<br />

agencies for action to provide information in a simpler and lessbureaucratic<br />

manner.<br />

The trustworthiness of the information provided in the website is<br />

mentioned in both studies, yet no repeatable and neutral<br />

measurement is provided to evaluate it. According to the studies,<br />

trustworthiness always depends on the evaluator´s perception.<br />

The framework will incorporate the usability and accessibility<br />

aspects of previous studies.<br />

2.5 Current Examples of Focused<br />

Transparency<br />

In 2011, the Mexican Federal Government launched an initiative<br />

called Focus on Socially Useful Information [4][14], through<br />

85<br />

which it encourages its agencies to publish more information than<br />

that required by law. The information provided should include<br />

information that citizens might find useful in their every-day lives.<br />

This initiative defines Focused or Socially Useful Transparency as<br />

“providing valuable information to the citizen so that she can<br />

make better informed decisions about procedures and services, or<br />

in aspects that affect her every day life, to prevent public risks or<br />

solve problems from the social sphere.”<br />

The Secretary of Public Administration (Secretaría de la Función<br />

Pública) has already elaborated guidelines with criteria that all<br />

agencies must incorporate when updating information in their<br />

respective websites and transparency sections. A special call is<br />

made to include information beyond what is required by law, as<br />

well as to rephrase, summarize and reorganize the information<br />

that is produced within a bureaucratic environment to<br />

communicate it in a simpler way.<br />

Another attempt to provide more valuable information to citizen´s<br />

has been that of Mexico City´s government of Focused<br />

Transparency [15]. The approach in this case has been to define a<br />

set of thematic websites that publish all the information related to<br />

that topic, arranged and displayed in a question-and-answer<br />

fashion. For example, what is environmental policy…? What is<br />

the impact of CO2 emissions in my life…? How can I become<br />

part of the solution to environmental problems…? [16]<br />

Another initiative was presented by Mexico City´s Governement<br />

where the strategy was described as groups of information<br />

packages:<br />

Table 1. Information Packages<br />

Procurement Environment<br />

Transportation<br />

traffic<br />

and Health<br />

Procedures and Employment and<br />

Services<br />

Education<br />

Social Programs Tourism<br />

Budget Citizen´s requests and<br />

legal petitions<br />

Civil Protection Culture<br />

Public Works Business<br />

So far, the environment, transportation and procedures and<br />

services focused transparency websites have been created.<br />

3. METHODOLOGY AND RESEARCH<br />

The framework suggested in this paper will be a compilation of<br />

findings from the different issues analyzed throughout the<br />

literature, mainly:<br />

o The need to have an accountability approach that goes<br />

beyond the mere provision of mandatory information and<br />

incorporates the justification component;<br />

o The need to provide a content skeleton that can be widely<br />

accepted, because it adjusts to the essence and raison-de-etre<br />

of government, as well as to the nature of human beings as<br />

human beings and not just citizen; and<br />

o The need to incorporate usability and other websites<br />

friendliness criteria as an important element.


Qualitative analysis of websites and surveys will provide a<br />

guideline-like framework that governments may be able to use to<br />

organize their transparency and access to information web sites.<br />

Hopefully, this suggested framework would help supervise the<br />

government and provide evaluators with more tools to measure<br />

transparency beyond the compliance of law.<br />

3.1 Accountability Approach<br />

The ten best ranked access to information and transparency (or<br />

similar) websites in the world as presented in the literature<br />

previously reviewed will be analyzed to gather best practices that<br />

show high evolution in terms of e-Transparency. Already existing<br />

practices of accountability will be identified and incorporated into<br />

a framework.<br />

3.2 Universal Content Skeleton<br />

One of the main gaps observed in the literature reviewed is the<br />

lack of a content skeleton for those websites that goes beyond the<br />

standard list set up by the law. In order to be able to convince<br />

government and academia to accept the contents proposed by such<br />

a skeleton, there needs to be some sort of philosophical theory that<br />

is universal (within a democratic context) and that cannot be<br />

contested. The Universal Declaration of Human Rights offers a<br />

perfect platform for this purpose, because of its universality, its<br />

world-wide acceptance, and its depth.<br />

The list of the human rights contained in the Universal<br />

Declaration of Human Rights will be compared to the mandatory<br />

contents that the LFTAIP demands, and possible gaps will be<br />

identified. Additionally, human-rights oriented information<br />

architecture will be proposed.<br />

In order to incorporate the citizen´s point of view in regards to<br />

what a government should be mainly accountable for, a survey<br />

will be conducted, where citizens will be required to list top-ofmind<br />

information that they would expect the government to<br />

publish. They will also be asked to rank from a list of information<br />

that governments publish which ones do they think are more<br />

important, and explain, how many times in that year they have had<br />

to use that information; finally, citizens will be proposed to list the<br />

names of three activities that they perform weekly in which they<br />

think the government is involved. The outcomes of this survey<br />

will also be considered in the elaboration of a content skeleton.<br />

3.3 Usability and Website Friendliness<br />

A detailed compilation of usability, accessibility and friendliness<br />

criteria will be listed, based on the studies cited. Also, a list of<br />

information pushed by the agencies as useful will be analyzed,<br />

and interviews will be held with the people responsible of both<br />

initiatives in order to assess their success and challenges.<br />

The resultant framework will constitute a list of elements to be<br />

incorporated within future evaluations, but will not provide<br />

specific or new metrics for those evaluations.<br />

86<br />

4. REFERENCES<br />

[1] Cámara de Diputados, Ley Federal de Transparencia y<br />

Acceso a la Información Pública, Diario Oficial de la<br />

Federación, 11 de junio del 2002, 3-5<br />

[2] Parametría, Los mexicanos y su interés por la transparencia.<br />

http://www.parametria.com.mx/DetalleEstudio.php?E=4320,<br />

2011.<br />

[3] Contreras Padilla, S, E-Government y acceso a la<br />

información en México, Derecho Comparado de la<br />

Información, núm. 11, Enero-Junio 2008<br />

[4] Secretaria de la Funcion Publica, Procedimiento 6.4:<br />

Información Socialmente Util o Focalizada, MAAGT,<br />

agosto 2011<br />

[5] Lopez-Ayllon, S. and Arrellano-Gault, D., Estudio en<br />

material de transparencia de otros sujetos obligados por la<br />

Ley Federal de Transparencia y Acceso a la Información<br />

Pública Gubernamental, CIDE-IFAI-UNAM, 2008<br />

[6] Sepúlveda K., P., Transparencia Electrónica en México: Un<br />

Analisis de las Estrategias de los Gobiernos Estatales en<br />

Internet, Tesis ITAM, 2008<br />

[7] Institute for Development Policy and Management (IDPM),<br />

University of Manchester, United Kingdom, 2004:<br />

www.egov4dev.org/transpdefn.htm<br />

[8] Rodríguez Zepeda, Jesús. Estado y transparencia: un paseo<br />

por la filosofía política, Cuadernillos del IFAI, 2006<br />

[9] Jagwanth, S. “The Right to Information as a Leverage Right”<br />

in The Right to Know, The Right to Live: Access to<br />

Information and Socio-Economic Justice, Calland, Richard<br />

and Allison Tilley, ed. Open Democracy Advice Centre,<br />

2002, p.7.<br />

[10] Ramirez Salazar, Los Derechos Humanos desde la<br />

Perspectiva del Derecho de Acceso a la Información, Article<br />

XIX-InfoDF, CDHDF, 2009, p. 53-59<br />

[11] COMAIP and CIDE presentations about Metrica de la<br />

Transparencia www.metricadetransparencia.cide.edu<br />

[12] Nielsen, J., Top Ten Mistakes in Web Design,<br />

www.usability.org<br />

[13] Sandoval, R., Ranking de Portales de Transparencia, Política<br />

Digital, http://www.politicadigital.com.mx<br />

[14] Secretaria de la Funcion Publica, Guia para la Identificacion<br />

y Difusion de la Informacion Socialmente Util o Focalizada,<br />

2010<br />

[15] CGMA, Paquetes de Información, Portal de Transparencia<br />

Focalizada del Gobierno del Distrito Federal, 2009<br />

[16] http://www.transparenciamedioambiente.df.gob.mx


The Circular Continuum of Agencies, Libraries, and Users:<br />

A Model of E-Government in Practice<br />

Natalie Greene Taylor<br />

Information Policy & Access Center,<br />

University of Maryland-College Park<br />

ngreenetaylor@gmail.com<br />

Paul T. Jaeger<br />

Information Policy & Access Center,<br />

University of Maryland-College Park<br />

pjaeger@umd.edu<br />

ABSTRACT<br />

When e-government first became a viable solution to the<br />

dissemination of government information, experts believed that<br />

the rise of direct government-to-citizen (G2C) services would<br />

improve government transparency and foster civic engagement. It<br />

soon became clear, however, that not all users were not getting the<br />

type of information or instruction that they needed from this<br />

arrangement, and that there was a need for an intermediary in this<br />

continuum of services. Increasingly, libraries fulfill this role.<br />

Instead of direct government-to-user interaction, information<br />

channels flow from agency to librarian to user, from user back up<br />

to agency, and from agency to user to librarian. This paper<br />

expands on the idea of these multiple pathways of information<br />

through research conducted in collaboration with libraries,<br />

government agencies, state library agencies, and a national library<br />

association in the United States with aims to create an egovernment<br />

web resource to assist librarians engaging in egovernment<br />

services. The different pathways of information both<br />

informed the creation of the web resource and offered a practical<br />

model of e-government, important for other projects dealing with<br />

similar information.<br />

Categories and Subject Descriptors<br />

A.1 INTRODUCTORY AND SURVEY<br />

General Terms<br />

Documentation, Human Factors, Theory<br />

Keywords<br />

Digital Government, Electronic Government, Models<br />

1. INTRODUCTION<br />

In the early stages of e-government, expectations ranged from<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Ursula Gorham<br />

Information Policy & Access Center,<br />

University of Maryland-College Park<br />

ugorhos@yahoo.com<br />

John Carlo Bertot<br />

Information Policy & Access Center,<br />

University of Maryland-College Park<br />

jbertot@umd.edu<br />

87<br />

Ruth Lincoln<br />

Information Policy & Access Center,<br />

University of Maryland-College Park<br />

rlincoln21@gmail.com<br />

Elizabeth Larson<br />

Information Policy & Access Center,<br />

University of Maryland-College Park<br />

elclarson@gmail.com<br />

cautious optimism to the belief that e-government would promote<br />

unprecedented waves of citizen interaction with the government.<br />

These government-to-citizen (G2C) services were expected to cut<br />

out information middle-men and let users interact directly with<br />

their government. 1 It soon became clear, however, that users were<br />

not getting the type of instruction or information they needed from<br />

this arrangement. Government agencies were not soliciting user<br />

input in developing services, feedback was not a priority,<br />

evaluation data was almost non-existent, and users identified a<br />

variety of access issues that kept them from fully engaging with<br />

the services [9]. Increasingly, public librarians found that they<br />

were serving as the intermediary for the government in this<br />

continuum of services. In addition, users were communicating<br />

their frustrations, concerns, and suggestions about government<br />

information to these librarians, instead of the government directly.<br />

Rather than the government speaking directly to users, it became<br />

the librarian’s job to disseminate information, assist patrons with<br />

form completion, or engage in other aspects of e-government,<br />

often without the guidance of the government agencies from<br />

which it originated . Because of the existence of multiple<br />

participants in the flow of government information, a<br />

straightforward pathway of e-government does not exist. This<br />

paper focuses on two main research questions: 1) what are the<br />

pathways of e-government information and 2) what implications<br />

do these pathways have on e-government services and systems?<br />

Based on a multi-method approach using informal interviews, site<br />

visits, and survey data, the researchers propose a model<br />

representing a circular flow of information with e-government<br />

information traveling from agency to librarian to user, from user<br />

back up to agency, and from agency to user to librarian. This<br />

model has implications for the design of e-government services<br />

and the dissemination of information. Findings made in<br />

connection with the development of this model also serve to<br />

inform the development of a Web resource to assist librarians<br />

1 It is important to note that the term “Government-to-Citizen” is<br />

one historically used in e-government research. In this paper,<br />

outside of direct references to prior research, we have used the<br />

term “user” instead, acknowledging the individuals in need of egovernment<br />

information who may not have citizen status. The<br />

term “user” thus refers to individuals who are either actively<br />

accessing e-government information or are attempting to do so.


serving as intermediaries for e-government services and resources.<br />

The Web resource, funded by the Institute of Museum and Library<br />

Services, is being developed by the authors in conjunction with<br />

the American Library Association, as well as various library and<br />

government agency partners, and aims to create an e-government<br />

web resource for librarians dealing with tax and immigration<br />

issues.<br />

2. LITERATURE REVIEW<br />

2.1 E-Government: A history<br />

Since the advent of the World Wide Web in the mid-1990s, there<br />

has been a surge in the use of e-government by federal, state, and<br />

local governments to deliver information, communication, and<br />

services to users, with much of this content and services now<br />

available only online. As e-government has matured into a<br />

dynamic socio-technical system encompassing issues of<br />

governance, societal trends, technological change, information<br />

management, interaction, and human factors [15], G2C, or<br />

government-to-citizen service, has become one of the central uses<br />

of e-government. Democratic governance relies on access to the<br />

government by citizens [34], resulting in G2C information,<br />

communication, and services holding significant potential not<br />

only for facilitating interactions, but also for promoting<br />

democracy.<br />

For the average user, e-government access now stands as the<br />

primary means of getting government information and interacting<br />

with the government [11]. G2C e-government services are used as<br />

a means to address a wide range of user needs – unemployment<br />

benefits, voter registration, license application and renewal, tax<br />

payments, enrollment of children in school, immigration and<br />

citizenship, and many similarly important functions [13], [18],<br />

[20]. Just from this broad overview of e-government topics, it is<br />

clear that this information intersects with almost every facet of<br />

everyday life. As such, e-government information does not always<br />

flow directly from the source to the user. As shown in Figure 1<br />

(below), other stakeholders have key roles and responsibilities in<br />

the e-government process.<br />

Figure 1. Stakeholders in E-Government Dissemination –<br />

Roles and Responsibilities<br />

Government<br />

Entities<br />

Non-<br />

Governmental<br />

Organizations<br />

Libraries<br />

Businesses<br />

- Create content<br />

- Mandate use (e.g. Electronic Data<br />

Procurement processes)<br />

- Disseminate information via electronic<br />

media (e.g. websites, social media, etc)<br />

- Disseminate information<br />

- Analyze information and re-release for<br />

community needs<br />

- Fund programs that tailor e-government<br />

content to needs of users<br />

- Provide information for community<br />

- Offer personalized help to patrons<br />

- Provide access to technology<br />

- Possess knowledge of patrons that can be<br />

used to provide feedback to content creators<br />

- Provide knowledge of user base (based on<br />

consumer information)<br />

- Provide funding and other resources for<br />

projects that can benefit the community<br />

- Provide feedback to content creators about<br />

88<br />

Users effectiveness of dissemination<br />

- Possess the needs that determine strategies<br />

of content developers and providers<br />

This paper largely focuses on three of these stakeholders – the<br />

government agencies that produce e-government information,<br />

libraries that act as intermediaries, and users. That said, NGOs<br />

and businesses often directly impact the type of services libraries<br />

can offer, the way the information gets disseminated to users, and<br />

the opportunities users have for resources to help them decipher<br />

the government information. The extent of these impacts is an<br />

issue worth exploring through future research.<br />

The growing involvement of intermediaries in G2C government<br />

coincides with users’ increased need for e-government access. In<br />

2003, a CRS report identified G2C government as “initiatives<br />

[that] are designed to facilitate citizen interaction with<br />

government,” [34, pp. 8]. Many agencies now view e-government<br />

as their primary method for interacting with members of the<br />

public [4], [5], [16], [37]. The recent explosion of usage of social<br />

media platforms – such as Facebook, Twitter, and Tumblr - has<br />

led many government agencies to view social media as a core<br />

aspect of G2C services [6], [10], [29]. Not surprisingly, G2C<br />

services are central to both of the primary reasons typically<br />

presented in favor of continuing to expand e-government: 1)<br />

engaging citizenry in government in a user-centered manner, and<br />

2) developing quality government services and delivery systems<br />

that are efficient and effective [4].<br />

G2C services, however, are not always designed to make life<br />

simple for the users. In fact, from the agency perspective, the<br />

focus has often been on making the interactions easier for the<br />

agency, not the user [26]. A clear example of this situation was<br />

demonstrated by the Medicare Part D enrollment program in<br />

2006, which required senior citizens – a group with large gaps in<br />

usage of the Internet – to examine the different plans and sign up<br />

for one online [24].<br />

One marker of early G2C literature was that accessing<br />

government information online was deemed voluntary: “citizen<br />

use of a Web-based state government service is an individual<br />

choice and is not likely to be mandated” [14, pp. 3]. This soon<br />

became an outdated assumption, as more government forms and<br />

services became available exclusively online. The need to use egovernment<br />

presents challenges for many members of the public<br />

because they lack the technical skills to use the online functions,<br />

lack sufficient Internet access, or are uncomfortable engaging in<br />

online interactions without guidance [7], [8]. Many of these users<br />

must find an outlet to engage e-government to accomplish<br />

necessary educational, economic, social, and political functions.<br />

The focus on agency savings over access is illuminated by the<br />

emphasis on e-government when so many users still lack Internet<br />

access or sufficient Internet access to interact with e-government.<br />

In many locations in the United States, a lack of available<br />

computers, low levels of Internet access, and low levels of basic<br />

telecommunications infrastructure, are barriers to access. Many<br />

households lack Internet access and many with Internet access<br />

lack broadband speed access, which is necessary for most online<br />

activities, including certain types of social media. Nearly 40% of<br />

homes lack Internet access and many of those families have no<br />

interest in or ability to get Internet access [21]. Among homes<br />

with Internet access, 45% lack broadband access, while 10%


continue to rely on dial-up Internet service [22]. In rural areas,<br />

only 38% of homes have broadband access [22].<br />

Lack of access to technology is not the only barrier to G2C egovernment.<br />

Even if the technological infrastructure is in place, egovernment<br />

services are often limited by difficulties in searching<br />

for and locating the desired information, a general lack of<br />

familiarity with the structure of government, lack of education<br />

about the value of e-government, language barriers, and attitudes<br />

toward technology and government among many users [32], [33].<br />

While many members of the public still struggle with G2C<br />

information and services, government agencies have come to<br />

focus on it as a means of cost savings rather than increasing<br />

access for members of the public [26], [28]. Government agencies<br />

have shifted responsibility to the users for innumerable functions<br />

that the agencies had to handle before e-government– registering<br />

students in school, paying fees and taxes, scheduling<br />

appointments, taking driver’s education programs, applying for<br />

permits, finding court <strong>proceedings</strong>, submitting local zoning board<br />

information, requesting planning permits, searching property and<br />

assessor databases, and completing numerous other federal, state,<br />

and local government functions online.<br />

2.2 The Role of Libraries in E-Government<br />

Paralleling the rise of the Web and e-government, public libraries<br />

quickly became providers of free public access to the Internet,<br />

with virtually every public library already offering public access<br />

by the year 2002 [2], [28].Throughout the intervening years, the<br />

public library has served as the primary – or only available –<br />

access point for G2C access, training, and assistance in<br />

communities across the country [1]. In some sense, serving as<br />

guarantor of G2C access and training is a natural extension of the<br />

established social roles of the public library. “The public library is<br />

one place that is culturally ingrained as a trusted source of free<br />

and open information access and exchange” [30, pp. 487]. Given<br />

the complexities of many G2C services, “even if Americans had<br />

all the hardware they needed to access every bit of government<br />

information they required, many would still need the help of<br />

skilled librarians whose job it is to be familiar with multiple<br />

systems of access to government systems” [19, pp. 124].<br />

Several years ago, it became commonplace for government<br />

agencies to direct users with questions about their websites to the<br />

local public library [8], [7], [13]. Now, many federal, state, and<br />

local government agencies continue to rely upon public libraries<br />

to provide residents with access to and guidance in using G2C egovernment,<br />

including the completion of applications and forms<br />

[8], [7], [25], [27]. For example, the Florida Department of<br />

Children and Families reduced the number of case workers and<br />

assistance providers by over 3,000 positions due to its<br />

implementation of the AccessFlorida online application system,<br />

resulting in near complete lack of available agency staff from<br />

which users can seek assistance [18].<br />

Another example of this shift in information responsibility from<br />

the agency to intermediaries is information provision during the<br />

2005 Atlantic hurricane season. According to Jaeger et al,<br />

librarians reported unprecedented numbers of patrons during the<br />

emergencies. One librarian said, “We have a large number of<br />

displaced people who are coming to rely upon the library in ways<br />

many of them never expected. I’ve had so many people tell me<br />

that they had never been to a library before they had to find<br />

89<br />

someplace to file a FEMA application or insurance claim. Many<br />

of these people knew nothing about computers and would have<br />

been totally lost without the staff’s help.…” [31, pp. 205]. What<br />

would ordinarily have been the job of government-sponsored<br />

disaster relief agencies became the province of the intermediary.<br />

These examples show that librarians operate as an important<br />

stakeholder in the delivery of e-government services. According<br />

to the 2011-2012, Public Libraries Funding & Technology Access<br />

Study (PLFTAS), 96.6 percent of public library outlets reported<br />

that library staff members assist library patrons in applying for egovernment<br />

services. Moreover, 91.8 percent reported that staff<br />

members assist patrons in understanding how to access and use egovernment<br />

websites. The following figure illustrates additional<br />

roles that public libraries serve in connecting patrons with egovernment<br />

services [3]. 2<br />

Figure 2: E-Government Roles & Services of Public Libraries<br />

E-Government Role or Service Percentage<br />

Staff provide assistance to patrons applying for<br />

or accessing e-government services<br />

Staff provide as needed assistance to patrons for<br />

understanding how to access and use egovernment<br />

Websites<br />

Staff provide assistance to patrons for<br />

understanding government programs and services<br />

Staff provide assistance to patrons for completing<br />

government forms<br />

The library developed guides, tip sheets, or other<br />

tools to help patrons use e-government Websites<br />

and services<br />

The library offers training classes regarding the<br />

use of government Websites, understanding<br />

government programs, and completing electronic<br />

forms<br />

The library offered translation services for forms<br />

and services in other languages<br />

The library partnered with government agencies,<br />

non-profit organizations, and others to provide egovernment<br />

services<br />

The library worked with government agencies<br />

(local, state, or federal) to help agencies improve<br />

their Websites and/or e-government services<br />

The library has at least one staff member with<br />

significant knowledge and skills in provision of<br />

e- government services<br />

96.6%<br />

(n=12,607)<br />

91.8%<br />

(n=11,976)<br />

50.0%<br />

(n=6,528)<br />

70.7%<br />

(n=9,230)<br />

20.6%<br />

(n=2,686)<br />

11.2%<br />

(n=1,457)<br />

7.8%<br />

(n=1,020)<br />

30.9%<br />

(n=4,017)<br />

11.0%<br />

(n=1,438)<br />

23.6%<br />

2 Throughout this paper, the term “patron” is used when users are<br />

either in the library, using library resources, or are the target of<br />

library programs.


(n=3,078)<br />

In summary, the various criticisms of G2C services, centered<br />

mainly on the access issues described above have prompted<br />

librarians to function as intermediaries in the G2C information<br />

space.<br />

Notwithstanding public librarians’ acceptance of greater<br />

responsibility along this information continuum, there are obvious<br />

problems with this developing intermediary role. While<br />

government agencies indicate that relying on libraries for G2C egovernment<br />

access and assistance allows the agencies to focus on<br />

other issues [7],[8], [17], the provision of G2C access assistance<br />

by public libraries creates a range of service, funding, technology,<br />

and political challenges for the libraries [12], [28].<br />

One problem is the fact that librarians are largely unrecognized in<br />

any official capacity by the government agencies that encourage<br />

their participation. Underlying this lack of recognition is the way<br />

in which public libraries in the United States are funded.<br />

Historically, 90% of public libraries are independent departments<br />

within their local governments [36]. Accordingly, although<br />

libraries receive state funding, as well as federal money through<br />

the Library Services and Technology Act and the<br />

Telecommunications Act of 1996, the majority of their funding<br />

comes from local government agencies. This trend has become<br />

more pronounced in recent years due to the ongoing economic<br />

downturn, as local governments have struggled to fill the gap<br />

between shrinking state budgets and increased demand for library<br />

services [3] The end result is that funding for public libraries<br />

comes principally from sources other than those federal and/or<br />

state agencies that are shifting much of their service role to<br />

libraries, raising the question of whether libraries have been<br />

burdened with an unfunded mandate [7]<br />

In addition, the expectation that librarians will understand the egovernment<br />

systems and services is often unfounded. While<br />

librarians are certainly capable of figuring out complicated<br />

information, time restraints, concerns over legal liability, and the<br />

constantly changing nature of government information makes the<br />

intermediary role difficult. The lack of advance notice for many<br />

new government information initiatives is one of several reasons<br />

why librarians often feel as though they are left out of the<br />

information loop. For example, a historical instance of this is the<br />

closure of a Virginia unemployment office. In this particular<br />

instance, a mere sign was placed on the door overnight informing<br />

users of the office’s closure. Employees were notified at the same<br />

time, leaving users with no information about the closure. Local<br />

librarians, who were equally surprised by this sudden<br />

development, had no choice but to manage an influx of<br />

unemployed individuals, confused about this loss in services.<br />

Librarians were forced into an unenviable position, in which they<br />

had to provide assistance, despite having no prior knowledge of<br />

the event that precipitated this influx. This is but one example of<br />

an agency decision having unintended consequences on other<br />

stakeholders in the information continuum.<br />

These problems have only grown in importance with the increase<br />

in the number of services being shifted from agency to librarian.<br />

While the E-government Act of 2002 included language on the<br />

need for federal government assessment of the impacts of the law<br />

on public libraries and other social institutions, such studies were<br />

never funded or conducted. Thus, the need for a reassessment of<br />

90<br />

the pathways of e-government information is particularly<br />

important as further policy and funding decisions are made.<br />

3. METHODOLOGY<br />

The findings presented in this paper are based upon three<br />

interrelated data collection efforts that informed the creation of an<br />

e-government Web resource (LibEGov), initially focused on the<br />

areas of immigration and taxation. The 2011-2012 Public Library<br />

Funding & Technology Access Survey, funded by the American<br />

Library Association and the Bill & Melinda Gates Foundation, is<br />

the 14 th in a series of public library Internet access surveys<br />

conducted since 1994. The Web-based survey was conducted<br />

between September 2011 and November 2011, yielding 7,260<br />

responses, a response rate of 83.1%. The survey drew a<br />

proportionate-to-size stratified random sample that considered the<br />

metropolitan status of the library (i.e., urban, suburban, and rural).<br />

More specific methodology issues regarding the survey are<br />

available at http://www.plinternetusrvey.org.<br />

Data were also collected through site visits to seven public<br />

libraries in five states (Connecticut, Florida, Georgia, Maryland,<br />

and Texas). The site visits included informal interviews with state<br />

library staff, government officials, and community organization<br />

leaders, all of which occurred between April 2011 and October<br />

2011. For this component of the study, the authors sought to<br />

include geographically dispersed public libraries that serve a<br />

diverse set of communities (e.g., rural, suburban, and urban; high<br />

immigrant concentrations; underserved populations; high<br />

poverty). Library characteristics, such as size, number of staff,<br />

and known e-government partnerships, also factored into the<br />

selection process. In advance of the site visits, research was<br />

undertaken to identify existing e-government collaborative<br />

approaches, leading to a preliminary assessment of “best<br />

practices” that guided the development of LibEGov.<br />

The aggregate and generalizable data regarding public library egovernment<br />

service provision and challenges generated from the<br />

survey, together with the on-the-ground assessments of library<br />

and government collaborative efforts offered by the site visits and<br />

interviews, provide rich insight into the context in which libraries<br />

are currently providing e-government services. Through this<br />

multi-method data collection strategy, the authors were able to<br />

explore the pathways of e-government information. By<br />

determining what e-government service roles public libraries<br />

provide to their communities, what partnerships libraries have<br />

formed with government agencies in the provision of egovernment<br />

services, what the success factors and/or barriers are<br />

to forming these partnerships, and what challenges libraries face<br />

by serving as e-government providers, we explore the<br />

implications these information pathways have on e-government<br />

services and systems.<br />

In addressing each of these questions, the authors identified key<br />

elements to be included in LibEGov, including: 1) detailed<br />

guidance on how to conduct a community needs assessment; 2) a<br />

tool to help librarians better understand complex immigration<br />

processes; 3) strategies for identifying and reaching out to<br />

potential partners; and 4) a community forum that encourages<br />

users to share their e-government experiences with one another.<br />

After conclusion of the data collection efforts in October 2011,<br />

attention shifted to the development of the Web resource’s site<br />

design and content. Usability testing began in April 2012 and, at


this time the authors continue to work on refining both the design<br />

and content of LibEGov. In anticipation of a wide release of the<br />

resource during the summer of 2013, the next phase of the project<br />

will include field testing of LibEGov through workshops at which<br />

additional feedback regarding content and design will be solicited.<br />

4. FINDINGS<br />

Through the survey data, interviews, and site visits that informed<br />

the development of LibEGov, researchers found multiple<br />

pathways of information. This flow could be understood as a<br />

circular continuum of information, with knowledge flowing from<br />

all stakeholders in the stream. Rather than e-government delivery<br />

operating from one central source (the government) and traveling<br />

directly to the user, it became clear that government agencies,<br />

intermediaries (in this case, libraries), and users all source<br />

information and thus are all responsible for the diffusion of<br />

information to each point in the continuum. Below, we outline<br />

each of the six directionalities in which information is<br />

disseminated, including examples from the surveys, interviews,<br />

and site visits to provide more concrete evidence of this<br />

multiplicity of information pathways. Though this discussion<br />

largely focuses on the source of the e-government information, it<br />

should be inferred that the needs of the information targets<br />

directly influence the sources, emphasizing the reciprocal nature<br />

of the information flow.<br />

4.1 Government to Intermediary to User<br />

Several government-library partnerships were discovered through<br />

site visits and interviews. Many of these partnerships are building<br />

on the idea that agencies have begun to recognize the intermediary<br />

as a powerful ally in e-government information dissemination. For<br />

example, the U.S. Citizenship and Immigration Services (USCIS)<br />

has partnered with The American Place at Hartford Public Library<br />

in Connecticut to provide citizenship services directly at the<br />

library, including a swearing in ceremony for new citizens. The<br />

library provides links to government resources on its website as a<br />

companion to its services on English language learning,<br />

citizenship facts, and information for immigrants new to the area.<br />

USCIS’s effective use of the library’s extensive in-house<br />

resources and capabilities aptly demonstrates how information can<br />

flow from government to intermediary to user.<br />

4.2 User to Intermediary to Government<br />

Often the user needs an intermediary for practical reasons;<br />

without the computers and broadband access provided by a<br />

library, for example, the user would have no means to get to the<br />

information provided on government websites. Given that the<br />

public library is often the only access point for free and reliable<br />

Internet access, an intermediary is necessary to find the<br />

information needed. According to the 2011-2012 PLFTAS data,<br />

62.1 percent of public library outlets were the only provider of<br />

free public Internet and free public computer access in their<br />

communities. More dramatically, 70.3 percent of rural libraries<br />

outlets reported to be the only free provider in their communities<br />

[3].<br />

Even for users who do have Internet access available at home,<br />

government information is often confusing and/or intimidating.<br />

Thus users come to the library for assistance; studies have found<br />

that the library "is a trusted community-based entity to which<br />

individuals turn for help in their online activities—even if they<br />

91<br />

have computers and Internet access at home or elsewhere” [8].<br />

Librarians cite helping patrons with e-government issues as one of<br />

their most oft requested tasks, with 96.6 percent of public library<br />

outlets reporting assisting patrons with applying for or accessing<br />

e-government services. This represents an increase of 11.5 percent<br />

from 2010-2011 [3].<br />

4.3 Intermediary to Government to User<br />

Often the intermediary wishes to inform the government of<br />

missing information or with access problems a user is having with<br />

a government site. For example, in interviews, librarians often<br />

remarked that they anticipated problems based on a lack of<br />

information provided by the government, such as in the case of<br />

the change from paper tax forms to online forms. Librarians<br />

expected an influx of patrons confused about this switch and<br />

sought to inform the government of the potential ramifications of<br />

this decision. This particular information pathway is often<br />

interrupted by the lack of available communication with the<br />

government agency directly, a problem that disrupts the<br />

effectiveness of this communication continuum.<br />

4.4 User to Government to Intermediary<br />

Effective August 1, 2011, Florida law now requires<br />

unemployment claims to be filed over the Internet. During an<br />

interview that took place shortly after this change occurred,<br />

officials from the Florida Department of State, Division of Library<br />

and Information Services indicated that the state workforce<br />

agency was specifically instructing individuals with no access to a<br />

computer or the Internet to go to the public library to complete<br />

their applications. In this situation, users seeking, receiving, or<br />

applying for continued unemployment benefits needed to: 1) take<br />

an aptitude test to determine skills and appropriate employment<br />

skills; 2) reapply for unemployment benefits; and 3) demonstrate<br />

employment seeking efforts. As such, the user had to report to the<br />

state workforce agency a variety of information, which then<br />

flowed to libraries to support a range of employment-related<br />

information.<br />

4.5 Intermediary to User to Government<br />

In this information flow, the intermediary packages information in<br />

way that makes it more accessible to users, therefore enabling<br />

them to engage in more effective interactions with the<br />

government. E-government websites that are developed and<br />

maintained by libraries are one way to facilitate this flow. The<br />

Cobb County Public Library, for example, has recently launched<br />

an e-government website that presents a wide range of resources,<br />

organized by topics focused on common e-government<br />

information needs (e.g., employment, legal information and vital<br />

records). Although much of the information presented through<br />

this site originates from government agencies, the library is the<br />

entity disseminating this information so that users can use it in<br />

their direct interactions with the government.<br />

4.6 Government to User to Intermediary<br />

This particular information flow was seen during the site visits in<br />

connection with a presentation given by a USCIS officer at a<br />

public library branch. As part of a semi-structured presentation<br />

directed to patrons of the library, the representative offered<br />

multiple opportunities for questions from the attendees. Queries<br />

ranged from the mundane (can I apply for citizenship) to


complicated (stories of relatives with criminal backgrounds who<br />

wanted to become citizens), but all were particularly well-suited<br />

for the USCIS representative to answer. A public librarian<br />

attended the Q&A, gathering materials from the representative in<br />

order to have additional resources on hand for patrons who could<br />

not come to the session. The intermediary (i.e., the librarian) was<br />

able to gather information from not only the government<br />

representative, but also the patrons, in order to improve services.<br />

5. DISCUSSION<br />

These findings have important implications on the design of egovernment<br />

policies and systems. Departing from the traditional<br />

view of e-government as a direct government-to-citizen<br />

communication model and incorporating the multiple means of<br />

knowledge transfer between users, the government, and<br />

information intermediaries, such as librarians, necessitates a shift<br />

in the way that government agencies produce and disseminate<br />

information. There are five main areas in which government<br />

agencies need to reexamine their services:<br />

1) Involvement of intermediaries in conversations regarding<br />

the roll-out and implementation of new e-government<br />

services;<br />

2) Government notification of releases and changes in<br />

service through relevant information channels with time<br />

for the intermediaries to prepare proper assistance;<br />

3) Provision of funding for public libraries and other<br />

intermediaries to assist in the proper flow of egovernment<br />

information;<br />

4) Response to feedback from users in terms of egovernment<br />

services; and<br />

5) Clarity for intermediaries of their roles and<br />

responsibilities, whether they are liable for mistakes, and<br />

when professionals should be recommended<br />

The first two points are relatively straightforward. In the<br />

interviews and site visits, a concept that kept coming up was the<br />

fact that librarians often felt blind-sided by agency decisions on<br />

information dissemination and changes in policy. One example of<br />

note that came to light during the interviews was the delayed<br />

dissemination of IRS forms during the 2011 tax season. Although<br />

the IRS did not create the delay, it contributed to a difficult<br />

situation by failing to communicate this development to the<br />

libraries. The end result was that librarians resorted to using<br />

handwritten signs and notes to inform patrons. Another example<br />

raised during the site visits regards affordable housing. Each year,<br />

there is a window for applying for housing vouchers (known as<br />

Section 8 vouchers provided by the Housing and Urban<br />

Development). These windows are administered by the local<br />

public housing agencies, which often do not communicate with<br />

libraries about the upcoming window. Section 8 housing requires<br />

the completion of a range of forms, as well as a process for<br />

determining eligibility. Those seeking housing vouchers often end<br />

up in the library seeking assistance locating and completing the<br />

forms, as well as determining eligibility and information<br />

regarding application submission.<br />

The third point is also fairly intuitive. Libraries have begun to<br />

fulfill the role of customer service operators for government<br />

agencies. With this increased responsibility should come<br />

increased funding. According to the 2011-2012 PLFTAS data,<br />

92<br />

adequate staffing was the most common challenge cited in helping<br />

patrons meet their e-government needs with 44.9 percent of public<br />

library outlets reporting this challenge to be important or most<br />

important [3].<br />

Government agencies also need to provide opportunities for users<br />

to give feedback on e-government services. As early as 2002,<br />

researchers were recognizing that agencies were not adequately<br />

providing opportunities for user input; according to one 2004<br />

study, 90% of local government agencies answered no to the<br />

question “Has your local government conducted a citizen survey<br />

to determine what online services residents and businesses want?”<br />

[23]. Nearly ten years later, the evaluation standards are not much<br />

improved. Agencies would be well served to offer not only direct<br />

online communication opportunities for user feedback (and the<br />

accompanying staff to answer such communication), but also<br />

formal methods of evaluation to ensure that user needs are being<br />

met. The distinction between information as an entity and the<br />

service of information provision is not as clear cut as one might<br />

think. The way the information is developed matters to the way<br />

the public can use it.<br />

The fifth improvement, clarity for intermediaries on their role, is a<br />

task both agencies and library supervisors must address. Though<br />

librarians are taking on the intermediary role in high percentages,<br />

they also remark that they are often unsure of where their roles<br />

should begin and end. In terms of tax services, for example, most<br />

are uncomfortable with any level of service beyond providing<br />

access to forms, for fear of legal liability or intrusion on patrons’<br />

privacies. Agencies should support library supervisors by<br />

determining guidelines for librarians, as well as by assisting<br />

librarians with information queries directly.<br />

The findings from this study have also informed the LibeGov web<br />

resource, a project that hopes to address many of the<br />

improvements listed above. Through the identification of the<br />

multiplicity of information channels in the flow of e-government<br />

information, researchers and developers on the project have<br />

observed the necessity of gaining input from all participants in<br />

providing a source for government resources. There are several<br />

ways that the developers have taken stakeholders and these<br />

possible improvements of service into account. These include:<br />

1) Adding a forum to the site that encourages participation<br />

from both librarians (intermediaries) and government<br />

agency representatives;<br />

2) Soliciting stakeholder input at all levels of web resource<br />

development, achieved by researcher-led meetings with<br />

agencies and public libraries at the beginning of the<br />

project and continued meetings with stakeholders as the<br />

project continues;<br />

3) Conducting usability testing with public library partners<br />

that will shape the second and future iterations of the<br />

web resource; and<br />

4) Providing ample opportunities for feedback in all stages<br />

of development through a contact form provided through<br />

the web resource as well as ongoing communications<br />

among a network of interested parties through a listserv<br />

developed by members of the project team.<br />

By acknowledging the pathways of e-government information<br />

transfer, the model of a circular continuum of service has been<br />

applied to a practical e-government system. In a similar vein,


government agencies should consider all potential information<br />

points when designing websites and other e-government<br />

resources.<br />

6. CONCLUSION<br />

The findings from this study offer an overview of the continuum<br />

of information between users, libraries (intermediaries), and the<br />

government. The major outcomes of the study show that there are<br />

improvements that agencies can make to their current strategies of<br />

information dissemination, as well as ways that libraries and their<br />

patrons can better navigate the often confusing waters of egovernment<br />

information.<br />

Finally, the model provides a conceptual framework to guide the<br />

web resource currently under development by the authors and<br />

their partners, the primary purpose of which is to help libraries<br />

and agencies better support one another in this continuum. The<br />

model also provides direction for other stakeholders interested in<br />

building better information systems.<br />

There are several directions in which this research could go in<br />

continuing to clarify the e-government landscape. While it is<br />

obvious that there are multiple ways that information flows from<br />

stakeholder to stakeholder, the optimum way that this information<br />

should travel is an interesting problem that has still not been<br />

conclusively studied. Does the fact that the information flow is<br />

top-down, bottom-up, and circular in nature have consequences<br />

for the current method of e-government technical information<br />

transmission?<br />

In addition, although government agencies have begun to consider<br />

issues of access, these multiple pathways of information make the<br />

need to keep in mind the access points for users all the more<br />

important. For example, public libraries provide a bevy of<br />

technology training classes, and the PLFTAS data shows that the<br />

more general technology classes are the most prevalent.<br />

According to the latest data, 87.0 percent of public library outlets<br />

offer general computer skills training classes (e.g., how to use a<br />

mouse, keyboard, printer), and 86.5 percent offer general Internet<br />

use classes (e.g. set up e-mail, Web browsing) [3]. How the<br />

different pathways of information flow affects and is affected by<br />

these prerequisites for e-government information retrieval is<br />

necessary for building an information flow that gets to all users.<br />

Future research should ensure that all stakeholders are addressed<br />

and that the multiple ways that information is directed from user<br />

to intermediary to agency are considered.<br />

7. REFERENCES<br />

[1] Bertot, J. C. Public access technologies in public libraries:<br />

Impacts and implications. Information Technology &<br />

Libraries, 28, 2 (2009), 84-95.<br />

[2] Bertot, J. C. Public libraries and the Internet: A retrospective,<br />

challenges, and issues moving forward. In J. C. Bertot, P. T.<br />

Jaeger, & C. R. McClure (Eds.), Public libraries and the<br />

Internet: Roles, perspectives, and implications. Libraries<br />

Unlimited, Westport, CT, 2011, 15-35.<br />

[3] Bertot, et al. Public Libraries and the Internet 2012: Study<br />

Results and Findings. Information Policy & Access Center,<br />

University of Maryland, College of Information Studies,<br />

2012, forthcoming.<br />

93<br />

[4] Bertot, J. C., & Jaeger, P. T. The e-government paradox:<br />

Better customer service doesn’t necessarily cost less.<br />

Government Information Quarterly, 25 (2008), 149-154.<br />

[5] Bertot, J. C., & Jaeger, P. T. User-centered e-government:<br />

Challenges and benefits for government Web sites.<br />

Government Information Quarterly, 23 (2006), 163-168.<br />

[6] Bertot, J. C., Jaeger, P. T., & Hansen, D. The impact of<br />

polices on government social media usage: Issues,<br />

challenges, and recommendations. Government Information<br />

Quarterly, 29 (2012), 30-40.<br />

[7] Bertot, J. C., Jaeger, P. T., Langa, L. A., & McClure, C. R.<br />

Drafted: I want you to deliver e-government. Library<br />

Journal, 131, 13 (2006), 34-39.<br />

[8] Bertot, J. C., Jaeger, P. T., Langa, L. A., & McClure, C. R.<br />

Public access computing and Internet access in public<br />

libraries: The role of public libraries in e-government and<br />

emergency situations. First Monday, 11, 9 (2006).<br />

[9] Bertot, J.C., Jaeger, P.T., & McClure, C.R. Citizen-centered<br />

e-government services: Benefits, costs, and research needs.<br />

In The Proceedings of the 9th Annual International Digital<br />

Government Research Conference (Montreal, Canada, May<br />

18-21, 2008). ACM Press, New York, NY, 2008, 137-142.<br />

[10] Bertot, J. C., Jaeger, P. T., Munson, S., & Glaisyer, T.<br />

Engaging the public in open government: The policy and<br />

government application of social media technology for<br />

government transparency. IEEE Computer, 43, 11 (2010),<br />

53-59.<br />

[11] Bertot, J. C., Jaeger, P. T., Shuler, J. A., Simmons, S. N., &<br />

Grimes, J. M. Reconciling government documents and egovernment:<br />

Government information in policy,<br />

librarianship, and education. Government Information<br />

Quarterly, 26 (2009), 433-436.<br />

[12] Bertot, J. C., & McClure, C. R. Assessing sufficiency and<br />

quality of bandwidth for public libraries. Information<br />

Technology and Libraries, 26, 1 (2007), 14-22.<br />

[13] Bertot, J. C., McClure, C. R., & Jaeger, P. T. The impacts of<br />

free public Internet access on public library patrons and<br />

communities. Library Quarterly, 78 (2008), 285-301.<br />

[14] Carter, L. & Belanger, F. Citizen adoption of electronic<br />

government initiatives. Proceedings of the 37th Hawaii<br />

International Conference on System Sciences (HICSS ’04)<br />

(Big Island, Hawaii, January 5-8, 2004). IEEE Computer<br />

Society, Washington, DC, 2004.<br />

[15] Dawes, S. S. Governance in the digital age: A research and<br />

action framework for an uncertain future. Government<br />

Information Quarterly, 26 (2009), 257-264.<br />

[16] Ebbers, W. E., Pieterson, W. J., & Noordman, H. N.<br />

Electronic government: Rethinking channel management<br />

strategies. Government Information Quarterly, 25 (2008),<br />

181-201.<br />

[17] Fisher, K. E., Becker, S., & Crandall, M. E-government<br />

service use and impact through public libraries: Preliminary<br />

findings from a national study of public access computing in<br />

public libraries. Proceedings of the 43rd Hawaii<br />

International Conference on System Sciences (HICSS ’10)


(Poipu, Kauai, Hawaii , January 5-8, 2010). IEEE Computer<br />

Society, Washington, DC, 2010, 1-10.<br />

[18] Gibson, A. N., Bertot, J. C., & McClure, C. R. (2009).<br />

Emerging roles of public libraries as e-government providers.<br />

Proceedings of the 42 nd Hawaii International Conference on<br />

Systems Sciences (HICSS ’09) (Waikoloa, Big Island,<br />

Hawaii, January 5-8, 2009). IEEE Computer Society,<br />

Washington, DC, 2009.<br />

[19] Heanue, A. (2001). In support of democracy: The library role<br />

in public access to government information. In Kranich, N.<br />

(Ed.), Libraries & Democracy: The Cornerstones of Liberty.<br />

American Library Association, Chicago, IL, 2001, 121-128.<br />

[20] Holt, L. E., & Holt, G. E. Public library services for the<br />

poor: Doing all we can. ALA Editions, Chicago, IL, 2010.<br />

[21] Horrigan, J. B. Obama’s online opportunities II: If you build<br />

it, will they log on? Pew Internet and American Life Project.<br />

Washington, D.C., 2009.<br />

[22] Horrigan, J. B. Home broadband adoption 2008: Adoption<br />

stalls for low-income Americans even as many broadband<br />

users opt for premium services that give them more speed.<br />

Pew Internet and American Life Project, Washington, D.C.,<br />

2008.<br />

[23] International City/County Management Association.<br />

Electronic government 2004: Survey methodology. 2004.<br />

Available:<br />

http://icma.org/en/results/surveying/survey_research/survey_<br />

results<br />

[24] Jaeger, P. T. Building e-government into the Library &<br />

Information Science curriculum: The future of government<br />

information and services. Journal of Education for Library<br />

and Information Science, 49 (2008), 167-179.<br />

[25] Jaeger, P. T. Public libraries and local e-government. In C.<br />

G. Reddick (Ed.), Handbook on research on strategies for<br />

local e-government adoption and implementation:<br />

Comparative studies. IGI Global, Hershey, PA, 2009, 647-<br />

660.<br />

[26] Jaeger, P. T., & Bertot, J. C. Designing, implementing, and<br />

evaluating user-centered and citizen-centered e-government.<br />

International Journal of Electronic Government Research, 6,<br />

2 (2010) 1-17.<br />

[27] Jaeger, P. T., & Bertot, J. C. E-government education in<br />

public libraries: New service roles and expanding social<br />

94<br />

responsibilities. Journal of Education for Library and<br />

Information Science, 50 (2009), 40-50.<br />

[28] Jaeger, P. T., & Bertot, J. C. Responsibility rolls down:<br />

Public libraries and the social and policy obligations of<br />

ensuring access to e-government and government<br />

information. Public Library Quarterly, 30 (2011), 1-25.<br />

[29] Jaeger, P. T., Bertot, J. C., & Shilton, K. Information policy<br />

and social media: Framing government-citizen Web 2.0<br />

interactions. In C. G. Reddick & S. K. Aikins (Eds.), Web 2.0<br />

Technologies and Democratic Governance: Political, Policy<br />

and Management Implications. Springer, London, England,<br />

in press.<br />

[30] Jaeger, P. T., & Burnett, G. Information access and exchange<br />

among small worlds in a democratic society: The role of<br />

policy in redefining information behavior in the post-9/11<br />

United States. Library Quarterly, 75, 4 (2005), 464-495.<br />

[31] Jaeger, P.T., Langa, L.A., McClure, C.R., & Bertot, J.C. The<br />

2004 and 2005 gulf coast hurricanes: Evolving roles and<br />

lessons learned for public libraries in disaster preparedness<br />

and community services. Public Library Quarterly, 25, 3/4<br />

(2006), 199-214.<br />

[32] Jaeger, P. T., & Thompson, K. M. E-government around the<br />

world: Lessons, challenges, and new directions. Government<br />

Information Quarterly, 20, 4) (2003), 389-394.<br />

[33] Jaeger, P. T., & Thompson, K. M. Social information<br />

behavior and the democratic process: Information poverty,<br />

normative behavior, and electronic government in the United<br />

States. Library & Information Science Research, 26, 1<br />

(2004), 94-107.<br />

[34] Schudson, M. Why conversation is not the soul of<br />

democracy. Critical Studies in Mass Communication, 14<br />

(1997), 297-309.<br />

[35] Seifert, J.W. A primer on e-government: Sectors, stages,<br />

opportunities, and challenges of online governance. CRS<br />

Report for Congress, 2003. Available:<br />

http://www.fas.org/sgp/crs/RL31057.pdf<br />

[36] Shavit, D. (1986). The politics of public librarianship. New<br />

York : Greenwood<br />

[37] Streib, G., & Navarro, I. Citizen demand for interactive egovernment:<br />

The case of Georgia consumer services.<br />

American Review of Public Administration, 36 (2006), 288-<br />

300.


The critical success factors for websites for Chinese<br />

migrant farmer workers: a multi-case study<br />

Fang Wang<br />

Business School of Nankai University<br />

No. 94 Weijin Road, Nankai District<br />

Tianjin, China, 300071<br />

(86)22-23502800<br />

wangfangnk@nankai.edu.cn<br />

ABSTRACT<br />

This paper is to explore the critical success factors for the<br />

websites for Chinese migrant farmer workers. A theoretical<br />

framework was put forward according to the theories of<br />

usability, information architecture, webometrics and business<br />

model. A multi-case study on 10 websites was conducted for<br />

testifying 7 hypotheses. Business model and a few technical<br />

properties were found to be the critical factors that influence<br />

the effect and sustainable development of these websites. The<br />

originality of this paper is that it adopted a managerialtechnical<br />

perspective to explore the critical success factors of<br />

the MFW websites.<br />

Categories and Subject Descriptors<br />

H.3.5 [Online Information Services]: Web-based services<br />

General Terms<br />

Management, Measurement, Performance, Economics, Theory<br />

Keywords<br />

Special website, Website effect, Vulnerable groups, Chinese<br />

farmer workers, Multi-case study, Managerial-technical<br />

Perspective<br />

1. INTRODUCTION<br />

From the late 1980s, along with China’s industrialization and<br />

urbanization process, migrant farmer workers (MFWs, farmers<br />

who leave their home in rural areas and come to cities to hunt for<br />

jobs in various industries without hukou, a registered permanent<br />

residence, in cities where they work, and some of them have to<br />

migrate to different cities frequently as their jobs change) have<br />

become a new workforce who are playing critical roles in Chinese<br />

economic and social development [1]. According to the National<br />

Statistics Bureau, the number of Chinese farmer workers was<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

95<br />

Lihong Gu<br />

Business School of Nankai University<br />

No. 94 Weijin Road, Nankai District<br />

Tianjin, China, 300071<br />

(86)22-23502800<br />

gulihong1217@163.com<br />

229.78 million in 2009, and 145.33 million of them were away<br />

from their hometown villages, occupying 83% of the total Chinese<br />

floating population. Among the farmer workers who migrated<br />

from hometown villages to cities, 128 million had no Hukous in<br />

cities where they worked [2]. However, the 28th Statistics Report<br />

on China Internet Network Development shows that by June 2011<br />

the number of Chinese netizens had reached 485 million which<br />

occupied 34.3% of the total population, 390 million of them<br />

connected to Internet by family broad-band and 318 million by<br />

mobile phone, 33.6% (131 million) of the total netizens were rural<br />

residents [3], while the proportion of MFWs was only 3.5% by<br />

December 2010 [4]. Abovementioned data indicate that there<br />

exists a big digital divide between MFWs and other social groups<br />

although the total number of netizens in China continued to<br />

increase every year. Because of their fluidity and the restriction of<br />

Hukou, MFWs could neither equally share urban information<br />

infrastructure and resources with native citizens nor enjoy policies<br />

and projects of the "new socialist countryside" for rural residents.<br />

This plight makes them fall into a state of information welfare<br />

“loss” or “deprivation”, and in some way become a marginal<br />

group in information society.<br />

“Information welfare is an important part of social welfares” [5].<br />

The inferior positions in which MFWs have to stay concerning<br />

labor price, social security, public good enjoyment, cultural and<br />

recreation consumption are related with their weak information<br />

capabilities [ 6 ]. Their awkward positions in the process of<br />

informatization will lead them to a greater poverty in economic,<br />

political, social and cultural rights and interests according to<br />

Maslow's Hierarchy of Needs [7]. Under the impacts of present<br />

social structure, economic development and other factors, it's<br />

difficult for them to get necessary information [8]. In order to<br />

diminish the digital divide between MFWs and other social<br />

groups, “it is necessary to integrate and make full use of the<br />

information resources owned by the departments of police,<br />

statistics, population and family planning, to promote the<br />

construction of information networks among MFWs, and to<br />

realize information sharing between relevant departments in order<br />

to provide accurate and timely information for MFW management<br />

and services” [9].<br />

Informatization is essential to the realization of the orderly flow of<br />

MFWs [ 10 ]. Information service is especially promising in<br />

improving MFWs’ employment [11]; [12]. On the one hand,<br />

information services for MFWs can strengthen the communication<br />

between the government and the public [13]. On the other hand,<br />

solutions to MFWs’ information marginalization will help to build


an exit mechanism for them and promote labor transfer by<br />

improving their information capabilities and employability, and<br />

thus to diminish the gap between urban citizens and them and<br />

promote their social integration [ 14 ]. As a seminal work,<br />

Construct an Integrated Information Service System for Migrant<br />

Farmer Workers [15], the report of the National Informatization<br />

Expert Committee in 2005 put forward that China should establish<br />

an integrated information service system for MFWs.<br />

Websites are indispensable parts of an integrated information<br />

service system for MFWs. With the implication of “Village<br />

Connection” policy, the number of agriculture-related websites<br />

had reached nearly 20,000 by the end of 2010 in China [16].<br />

Current studies on these websites mainly include website<br />

construction [17]; [18], webmetrics [19], roles of websites played<br />

in rural informatization [20], existing problems e.g. duplicated<br />

and outdated information [21], limited functions and unguaranteed<br />

information authenticity [22], and low browse rate and inadequate<br />

brand building [23]. However, only several websites special for<br />

MFWs have emerged in recent few years. Among 20,000<br />

agriculture-related websites, they occupy only a minimal<br />

proportion but have great significance for MFWs. Moreover, we<br />

had not found any researches on the websites for Chinese MFWs<br />

by June 2011. How do these websites operate? What factors<br />

influence their survival and development? What difficulties are<br />

they faced with? In order to answer these questions, a holistic<br />

exploration is necessary and a multi-case study will be adopted to<br />

realize it.<br />

2. THEORETICAL FRAMEWORK<br />

There are a quantity of theories and methods for website study,<br />

such as usability [24], information architecture (IA), technology<br />

acceptance model (TAM) [25 ], webometrics, social network<br />

analysis (SNA), etc. Studies on usability in LIS and IS fields have<br />

increased dramatically in recent years and a variety of measure<br />

scales have been developed. Shackel advanced four dimensions of<br />

usability, effectiveness, learnability, flexibility and attitude [26].<br />

IA is thought as both a kind of art and a kind of technology on<br />

website building [27] and provides a set of technical aids to make<br />

a website more usable. Webometrics studies the quantitative<br />

aspects of the construction and use of information resources,<br />

structures and technologies on the Web drawing on bibliometric<br />

and informetric approaches [ 28 ]. Abovementioned theories<br />

examine websites from technical, managerial or social<br />

perspectives. Our study will focus on disclosing the effects of the<br />

MFW websites and the influences of some internal and external<br />

factors. This is a comprehensive problem related to managerial,<br />

technical and social issues. It is not enough to employ any single<br />

theory to guide a holistic exploration. Therefore, we select<br />

relevant constructs from present theories and combine them into a<br />

new theoretical framework under a managerial-technical<br />

perspective.<br />

Literatures show that some successful studies focus on complex<br />

aspects of a website rather than a single one. Welch and Pandey<br />

[29] compared different measures for the effect of government<br />

websites and found that except technology, political pressure,<br />

centralization, formalization, goal ambiguity, organizational<br />

culture, communication effect, red tape, complexity and size are<br />

all possible determinants of website effects. To avoid the<br />

shortcomings of a single perspective, Eschenfelder and Miller [30]<br />

established a socio-technical toolkit to measure the openness and<br />

accessibility of government information. Lee and Kozer [31]<br />

96<br />

constructed a model consisting of four major website quality<br />

factors, information quality, service quality, systems quality, and<br />

vendor-specific quality, to measure the effect of e-business<br />

website quality. These studies combined online characteristics of<br />

websites with offline factors and obtained satisfying results. In<br />

terms of this study, research problems could be given a more<br />

detailed examination under a holistic theoretical framework than<br />

under a single theoretical perspective. Out of this consideration, 5<br />

qualitative and quantitative constructs and 7 theoretical<br />

hypotheses are put forward as follows:<br />

2.1 Website Effect<br />

The main goal of the studied websites is to deliver information to<br />

MFWs. An effective website will attract more potential users to<br />

click and satisfy actual users’ information needs better. In this<br />

paper, website effect is taken as the dependent variable. Many<br />

constructs could be extracted to describe or measure website<br />

effect in usability researches. Nilsen [32] used ten usability<br />

heuristics related with user’s satisfaction for user interface design.<br />

Preece [33] adopted the user’s attitude as one of the factors in<br />

defining website usability. Success of information delivery to<br />

intended users or not determines a website’s final effect. Thus<br />

website effect could be defined with two variables, awareness and<br />

users’ satisfaction. High awareness means that a large number of<br />

people have known or experienced the website. In search engine<br />

optimization (SEO) average daily IP clicks and page view (PV)<br />

within a month are used to estimate website awareness. Many<br />

methods are used to evaluate overall user’s satisfaction towards a<br />

website in literatures. In this study, we choose both qualitative and<br />

quantitative indicators to evaluate user’s satisfaction. The former<br />

is used to indicate users’ satisfaction degree by qualitative content<br />

analyses on users’ feedback messages and media comments. The<br />

latter include two quantitative indicators, Google Page Rank<br />

Value (a numeric value that represents how important a page is on<br />

the web) and an overall assessment scored with 5-point Likert<br />

scale by researchers after in-depth investigations of each website<br />

and interviews with its webmaster. These indicators for the<br />

concept of website effect are shown in table 1.<br />

Table 1: Indicators for the concept of website effect<br />

Conceptual<br />

indicator<br />

website<br />

awareness<br />

User<br />

satisfaction<br />

Operational indicator Data Source<br />

Average daily IP clicks,<br />

Page view estimates<br />

within one month<br />

Degree of MFWs’<br />

satisfaction<br />

Websites of ALEXA,<br />

SEO and GOOGLE<br />

Users’ feedback<br />

messages on websites<br />

and comments from<br />

other mass media<br />

Overall assessment Google Page Rank<br />

Value, overall website<br />

analyses and interviews<br />

with webmasters<br />

2.2 Business Model of the Websites<br />

Business model is a concept frequently used in e-business, IS,<br />

computer science, strategy or management [34]. “At its heart, a<br />

business model performs two important functions: value creation<br />

and value capture” [35]. A conceptual business model should


include customers and competitors, the offering, activities and<br />

organization, resources and factor market interactions [36]. “We<br />

must consider which concepts and relationships allow a simplified<br />

description and representation of what value is provided to<br />

customers, how this is done and with which financial<br />

consequences” [37]. As for websites, business model is mainly<br />

determined by their capital sources and profit models, which is<br />

more often used in businesses than government agencies or nonprofit<br />

organizations. Our pilot interviews show that current MFW<br />

websites have four types of investment entities, governments,<br />

non-profit organizations, individuals and enterprises, and their<br />

profit models can be categorized as government websites, nonprofit<br />

websites and enterprise websites. In general, non-profit and<br />

individual invested websites try to represent or pursuit benefits of<br />

MFWs, government invested ones intend to help to improve social<br />

management of MFWs while enterprise invested ones are used to<br />

make money as a e-business platform. Accordingly, their business<br />

models can be classified as “pure public operation”, “supported by<br />

government procurement” and “market operation”. Relationships<br />

between investment entities, profit models and business models of<br />

MFW websites are shown in figure 1.<br />

Government<br />

investment<br />

Non-profit<br />

organization<br />

investment<br />

Individual<br />

investment<br />

Enterprise<br />

investment<br />

Government<br />

websites<br />

Public<br />

welfare<br />

websites<br />

Enterprise<br />

website<br />

Pure public<br />

operation<br />

Supported<br />

by<br />

government<br />

procurement<br />

Market<br />

operation<br />

Figure 1:Relationships between investment entities,<br />

profit models and business models of MFW websites<br />

Different business models mean different incentive mechanisms<br />

and may result in different website effects. Therefore, we propose<br />

hypothesis 1:<br />

H1: Business model affects the effect of MFW websites.<br />

2.3 Website Construction<br />

Website construction refers to technical features or perceived<br />

technical features of a website in this study. Usability and IA<br />

provide valuable explanations for website construction from<br />

different angles. Usability theory examines perceived interface<br />

attributes such as availability, accessibility, readability,<br />

understandability, etc.. Wang and Senecal [38] developed a scale<br />

for website usability including three dimensions: ease of<br />

navigation, speed and interactivity. Al-badi & Mayhew [39]<br />

demonstrated the value of target culture, navigation, layout,<br />

interaction, graphics and color in designing localized business<br />

websites. Karlsson [40] found that graphic design, content and<br />

perceived usability contribute to the perceived expression and<br />

emotional responses of the websites. In these studies, content,<br />

97<br />

accessibility, interactivity navigation, open speed, graphic and<br />

color design are important factors that affect website effect.<br />

IA theory provides some objective guidelines to improve website<br />

usability. Its core idea is “user-centered and to make information<br />

more understandable”. Davenport defined Information<br />

architecture simply a set of aids that match user needs with<br />

information resources [41]. Gullikson [42] examined the impact<br />

of information architecture on the usability of an academic<br />

website and recommended key ingredients: information design,<br />

access tools, and navigational aids. Comparing IA with website<br />

usability theory, we define website construction with two<br />

dimensions, information architecture and technical performance.<br />

Technical performance affects website usability and comprises<br />

complex components. In order to get data more easily, we adopt<br />

open speed to measure it. Content, information organization,<br />

navigation and page presentation are selected to indicate website<br />

information architecture. In the process of investigation, we found<br />

that there are no obvious differences in page presentation between<br />

websites, so it is abandoned for lack of good discrimination.<br />

According to usability and IA theory, website construction<br />

influences its website effect. Four research hypotheses are put<br />

forward as follows:<br />

H2: Information content affects the effect of MFW websites.<br />

H3: Information organization affects the effect of MFW websites.<br />

H4: Website navigation affects the effect of MFW websites.<br />

H5: Open speed affects the effect of MFW websites.<br />

2.4 Social Networking Service<br />

As one of the sociological characteristics of a website, social<br />

networking services help to expand MFWs' social network and<br />

interpersonal communication. Our previous research shows that<br />

interpersonal influence is one of the most important factors for<br />

MFWs to access to the Internet for the first time and interpersonal<br />

network is an important source for them to acquire information<br />

[43]. Previous literatures show that interactivity is an important<br />

indicator of website usability [44]. Therefore, interaction and<br />

community functions of a website could be used to indicate social<br />

networking service. The communication function can help website<br />

users to share information or views and includes BBS, blog,<br />

online groups, etc., while the interaction function helps users to<br />

communicate with the webmaster or manager and mainly involves<br />

the feedback channels on websites. To explore the influence of<br />

social networking services on website effect, hypothesis 6 is put<br />

forward as follows:<br />

H6: Functions for Social Networking service affect the service<br />

effect of MFW websites.<br />

2.5 Website Promotion<br />

From the perspective of network marketing, only when a website<br />

is known by most of the targeted users, could it make full impacts.<br />

In past ten years, e-commerce webmasters have developed various<br />

indicators to measure and adopted many strategies to improve the<br />

awareness of their websites. Our pilot investigation shows that<br />

except that local government websites can be easily found on first<br />

page of Baidu’s search results after 2010, websites of small<br />

government departments and non-profit organizations without<br />

promotions can’t be found easily because Baidu ranks its search<br />

results by bid. The practice of e-business has proved that website


promotion involves a variety of tactics and has obvious impacts<br />

on website effect. Some webometric indicators, such as web links,<br />

search engine optimization, are used to disclose website<br />

marketing [45]. Present webometrics studies involve four areas:<br />

(1) Page content analysis; (2) Link analysis; (3) Site usage<br />

analysis; (4) Web technology analysis (including search engine<br />

performance) [46].To testify the influence of website promotion<br />

on its effect, we adopt SEO (Search Engine Optimization) value,<br />

the number of back-links and the number of times reported by<br />

other media to evaluate website promotion. Hypothesis 7 is put<br />

followed as follows:<br />

H7: Website promotion is positively correlated with the effect of<br />

MFW websites.<br />

All the hypotheses form a theoretical framework of this study, as<br />

shown in figure 3.<br />

3. RESEARCH METHODS<br />

Case study is adopted in some website researches, such as<br />

Weischedel & Huizingh [47], Fang [48], etc.. Yin [49] states that<br />

case studies could be used to describe, explore or explain<br />

phenomena. Bonoma [50] (1985) suggests that multiple cases<br />

could play a role in both hypothesis generation and hypothesis<br />

testing. “Multiple-case designs allow for cross-case analysis and<br />

the extension of theory, and yield more general research results<br />

than single-case study.”[51]. Multi-case studies are often used to<br />

explore influential factors in many management fields. Akhavan<br />

et al [ 52 ] derived critical success factors for design and<br />

implementing knowledge management (KM) system in a multicase<br />

study research with an integrated approach. Our study is to<br />

explore success factors for MFW websites beyond a single<br />

perspective of technology. Multi-case approach is thought suitable<br />

for this holistic exploration.<br />

According to the analytical framework, independent variables are<br />

business model, website construction, social networking services,<br />

website promotion, and the dependent variable is website effect.<br />

Their indicators are concluded in table 2.<br />

Table 2: Indicators for Key Variables<br />

Variables Dimensions Indicators<br />

Website effect<br />

Business<br />

model<br />

Website<br />

construction<br />

Website<br />

awareness<br />

Users’ satisfaction<br />

Overall website<br />

effect<br />

(1)Daily average IP traffic<br />

within a month;<br />

(2) Daily average page<br />

view estimates<br />

Qualitative analysis of<br />

feedback messages and<br />

content of website forums<br />

(1) Google Page Rank<br />

Value;(2)qualitative<br />

assessment of overall<br />

effect;(3) Analysis of<br />

problems and difficulties<br />

Fund sources Amount and persistence<br />

of funds or investment<br />

Website property See in figure 1<br />

Information<br />

architecture<br />

(1) Information contents<br />

(quality, richness,<br />

relevance, renewal and<br />

98<br />

Social<br />

networking<br />

services<br />

Website<br />

promotion<br />

Technical support Open speed<br />

Interaction<br />

function<br />

community<br />

function<br />

SEO (Search<br />

Engine<br />

Optimization)<br />

Number of backlinks<br />

Number of times<br />

reported by<br />

traditional media<br />

accuracy)<br />

(2) Information<br />

organization<br />

(classification, structure)<br />

(3)Navigation (sign<br />

design, number of internal<br />

and external links, search)<br />

Interaction channels (<br />

feedback columns, Online<br />

chat, etc.)<br />

Virtual community (blog,<br />

BBS, QQ group etc)<br />

Number of pages included<br />

in search engines on<br />

ALEXA (google, baidu,<br />

yahoo, netease, soso and<br />

sogou)<br />

Number of back-links<br />

recorded in search engines<br />

on ALEXA (google,<br />

baidu, yahoo, netease,<br />

soso and sogou)<br />

Qualitative analysis of<br />

relevant reports on<br />

important traditional<br />

media<br />

4. CASES AND DATA<br />

4.1 Case Description<br />

Existing MFW websites mainly provide information related to<br />

MFWS’ employment, legal right protection, children’s education,<br />

medical treatment and e-business. Using search engines like<br />

google, baidu, soso, et.al and any possible link tracks, we<br />

searched case websites from November 2010 to 14 June 2011 and<br />

finally found 11 relevant objects in total, including 9 websites (not<br />

involving their sub-websites) and 2 special pages. These MFW<br />

websites occupied a minimal percentage of more than 20,000<br />

agriculture-related websites and could nearly be neglected<br />

compared with more than 70,000 government websites in China at<br />

the end of 2010. The earliest MFW website opened on 10 May<br />

2003, a personal forum established by Changsheng Guo who<br />

hoped to protect MFWs’ legal rights by displaying their living and<br />

working situation. In 2004, “Minggong Net” (Websites for<br />

MFWS), a website supported by the Office of Migrant Workers<br />

and Poverty Alleviation Office of State Council, was opened<br />

online. It mainly provides employment information services, and<br />

often holds public activities for MFWs. After 2007, a few<br />

websites for MFWs emerge, such as “Chinese Young Migrant<br />

Workers”, “Zhong Lao Wang” (Websites of Chinese Labor) and<br />

“Legal Rights Protection of MFWs”, ect.. Besides, some large<br />

portal websites (e.g. Phoenix and Sohu) and large government<br />

websites (e.g. China.net and Labor Union of China) own special<br />

columns for MFWs. These websites, columns and pages play<br />

different roles and gradually form an Internet information service<br />

system for MFWs with specialization and diversity, which can be<br />

shown as figure 2.


Websites or columns for MFWs<br />

In this study, we didn’t involve the special columns for MFWs of<br />

large business portals such as Phoenix.com and Sohu.com,<br />

because contents of these columns only occupy a very small<br />

proportion of the whole portals. All the 11 special websites and<br />

columns related to MFWs are introduced in table 3. Taking into<br />

account that each case should be effective, we abandoned the No.<br />

9 case because it is only a static page of China.com and hasn’t<br />

been updated since 2005.<br />

1. Website name,<br />

setup date and<br />

address<br />

Website for<br />

Chinese Young<br />

Migrant Workers<br />

July,2010,www.y<br />

oungmigrants.org<br />

2.Legal Right<br />

Protection for<br />

China Migrant<br />

Workers Jan.<br />

2006,<br />

www.zgnmg.org/<br />

Non-profit<br />

Websites<br />

For-profit<br />

websites<br />

Government<br />

websites or<br />

columns<br />

Special columns<br />

of large business<br />

portals<br />

Individual<br />

forums<br />

Table 3 Case Description<br />

Sponsor<br />

Agencies or<br />

main investor<br />

Institute of<br />

Population<br />

and Labor<br />

Economics of<br />

Chinese<br />

Academy of<br />

Social<br />

Sciences, ILO<br />

UN<br />

Population<br />

Fund<br />

Beijing<br />

Zhicheng Law<br />

Firm, Beijing<br />

Youth Legal<br />

Aid and<br />

Research<br />

Center<br />

Legal right<br />

protection<br />

Academic<br />

research<br />

Employment<br />

Employment<br />

Sub-websites<br />

Special columns<br />

Small local<br />

websites<br />

Phoenix,<br />

Sohu, etc.<br />

Entertainmen<br />

t<br />

Figure 2 Online information service systems for Chinese<br />

MFWs<br />

Websi<br />

te<br />

proper<br />

ty<br />

Nonprofit,<br />

UN<br />

Millen<br />

nium<br />

Devel<br />

opmen<br />

t<br />

Goals<br />

Fund<br />

Nonprofit<br />

Intended<br />

users<br />

Academic<br />

and policy<br />

researcher<br />

s, migrant<br />

workers<br />

Migrant<br />

workers,<br />

layers, &<br />

governme<br />

nt legal<br />

agencies<br />

99<br />

3.Jobs for<br />

Technical and<br />

Skilled Workers,<br />

2007,<br />

www.nmgjggz.co<br />

m/<br />

4.Website for<br />

Migrant workers,<br />

2007<br />

www.mingong123<br />

.com/<br />

5.China Labor,<br />

Aug. 2008<br />

www.chinalao.co<br />

m/<br />

6. Migrant<br />

Workers Help,<br />

2009<br />

www.zhich.com/<br />

7.Chinese Migrant<br />

Workers(subsite<br />

of Zhongnong<br />

Xingye), April,<br />

2009,<br />

www.nmgw.org.c<br />

n<br />

8.Column for<br />

Migrant Workers<br />

of Chinese Trade<br />

Unions website,<br />

2009<br />

nmg.workercn.cn/<br />

9.Special page for<br />

migrant workers<br />

of China.com,<br />

2005<br />

www.china.com.c<br />

n/chinese/zhuanti/<br />

nmg/507760.htm<br />

10.China Migrant<br />

Workers (Party<br />

Building)Jan,<br />

2011,<br />

www.zgnmgw.co<br />

m/<br />

11.Chinese<br />

Migrant workers,<br />

May, 2003,<br />

http://mg.arkoo.co<br />

m/<br />

Individual<br />

Partners<br />

Beijing<br />

Qingda<br />

Yanyuan<br />

Network<br />

Technology<br />

Co., LTD.<br />

Entrepreneur<br />

Wenghua<br />

Zhou and VC<br />

Individual<br />

partners<br />

Information<br />

Center of<br />

Industrial<br />

projects in<br />

rural China<br />

ACFTU<br />

China Foreign<br />

Languages<br />

Publishing<br />

and<br />

Distribution<br />

Agency<br />

Voluntary<br />

investment by<br />

MFWs in<br />

Beijing from<br />

Gushi county<br />

of Henan<br />

Province.<br />

A migrant<br />

farmer worker<br />

Changping<br />

Guo<br />

Nonprofit<br />

Enterp<br />

rise<br />

Enterp<br />

rise<br />

Enterp<br />

rise<br />

Enterp<br />

rise<br />

Invest<br />

ed by<br />

gover<br />

nment<br />

Gover<br />

nment<br />

websit<br />

e<br />

Gover<br />

nment<br />

News<br />

websit<br />

e<br />

Nonprofit<br />

Person<br />

al<br />

forum<br />

Workers,<br />

employers<br />

recruitme<br />

nt and<br />

training<br />

agencies<br />

Same with<br />

No.3<br />

Same with<br />

NO.3<br />

Same with<br />

NO.3<br />

Same with<br />

NO.3<br />

Migrant<br />

workers<br />

and other<br />

people<br />

People<br />

from all<br />

walks<br />

Migrant<br />

workers<br />

Migrant<br />

workers<br />

4.2 Data Collection<br />

The approaches for data collection include website content<br />

investigation, half-structured interview with webmasters, analysis<br />

of related reports on mass media and some webometrics tools.<br />

Data were collected in three steps:


(1)Firstly, all the existing MFW websites were investigated<br />

comprehensively. The content, structure and information<br />

presentation of each website were repeatedly browsed, tried and<br />

analyzed, and the navigation signs, search engine and links were<br />

tested. A deep content analysis was specially conducted on the<br />

site aim, webmaster`s statements, users’ messages and BBS posts.<br />

And then we collected and qualitatively analyzed relevant online<br />

reports on other media. To ensure the reliability of the data, 2<br />

researchers collected all the data respectively at first, and then<br />

compared the results with each other, discussed the difference,<br />

and unify them by repeat investigation. At last, qualitative data for<br />

IA, social networking services, open speed of part websites,<br />

business model and website promotion of each website were<br />

sorted out. After in-depth analyses of these data, an assessment on<br />

the overall effect of each website is given with Likert 5-point<br />

scale.<br />

(2) Secondly, we conducted half-structured interviews with<br />

webmasters by means of telephone, email and QQ (a timely<br />

online communication tool). Interview questions include: “How is<br />

your website going?”, “Who invested on your website?”, “What is<br />

the main purpose of your website?”, “How does your website<br />

make money?”, “What difficulties does your website face at<br />

present?”, “What do you plan to do for next step?”, etc. Interview<br />

contents were recorded for qualitative analysis. Meantime,<br />

supplements and corrections were made for the data got in last<br />

stage.<br />

(3) Thirdly, we collected quantitative data with webometrics tools<br />

such as ALEXA, SEO and Google (site command), including<br />

average daily IP and PV value, number of the pages included by<br />

search engines, number of back-links, Google PR value, number<br />

of website pages, number of internal and external links, open<br />

speed of some websites, etc. All the quantitative data covered<br />

recent 1 month and were collected from 8 a.m. to 12 a.m. o 'clock<br />

on June 14, 2011. The time for data collection is selected<br />

randomly so as to keep the validity of the data.<br />

For the word limit of this paper, the data table is omitted here.<br />

5. FINDINGS AND IMPLICATIONS<br />

5.1 Hypothesis Test<br />

As a compound variable, website effect is measured by both<br />

quantitative indicators such as GOOGLE PR value, daily average<br />

IP traffic within 1 month and daily average page view estimates,<br />

and qualitative indicators such as overall effect, problems and<br />

difficulties faced by the websites and users’ satisfaction. After a<br />

comprehensive qualitative analysis and repeated quantitative<br />

comparisons, results of hypothesis testing are shown in Figure 3.<br />

H1: is supported. Business model has significant influence on the<br />

effect of MFW websites.<br />

The values of PR, IP and PV of commercial websites far exceed<br />

that of other kinds of websites. Among all the websites,<br />

commercial ones occupy the biggest proportion and operate better<br />

than others. They focus on providing jobs for MFWs and bluecollar<br />

workers, including Website for Migrant Workers<br />

(www.mingong123.com/), China Labor (www.chinalao.com/) and<br />

Migrant Workers Help (www.zhich.com/). These websites charge<br />

the employers and training agencies who issue information and<br />

promise to keep the authenticity and reliability of issued<br />

information, but don't charge farmer workers who issue messages<br />

100<br />

for job looking or charge them little. Some of the commercial<br />

websites try to get supports from governments and positive<br />

comments from media by advertising themselves as “platforms<br />

providing public free information for MFWs”. The Website of<br />

Chinese Migrant Workers(a sub-site of the government website<br />

Zhongnong Xingye, www.nmgw.org.cn) is trying to transform<br />

itself into a commercial one and thus to get more vitality.<br />

Business model of websites<br />

Website construction<br />

Website IA<br />

Technology support<br />

Capability of SNS<br />

Website promotion<br />

Content<br />

construction<br />

Info. organization<br />

Navigation system<br />

H6-<br />

H1+<br />

H2+<br />

H3-<br />

H4+p<br />

H5+<br />

H7+<br />

Figure 3:Theoretical framework of this study<br />

Effects of MFW websites<br />

Clear profit model, persistent investment, rich information sources<br />

and strict information checking system are four main<br />

characteristics of commercial websites. China Xin NongMen (new<br />

gate of the villages) Website was set up in august 2005 and got 2<br />

million dollars of venture capital in 2006, but went to bankrupt in<br />

2008 because of bad business model [53]. It made great efforts to<br />

build close relatiohships with governments, which was proved to<br />

be a wrong strategy. The website of Jobs for Technical and<br />

Skilled Workers (www.nmgjggz.com/) seeks a public welfare<br />

model. It doesn't charge on information issue but also don’t<br />

promise to assure information quality. For lack of a clear profit<br />

model and enough investment, it performs mediocre.<br />

Among non-profit websites, the website of Legal Right Protection<br />

for China Migrant Workers has highest IP and PV value. It was<br />

established by Beijing Zhicheng Law Firm and Beijing Youth<br />

Legal Aid and Research Center as a non-profit platform for<br />

providing free legal advice and practical aid services for MFWs.<br />

Supported by government procurement, it operates well. This<br />

kind of business model solves the problems of inefficiency and<br />

unsustainability when judiciary bodies provide free legal aids for<br />

vulnerable groups directly.<br />

Another kind of non-profit websites are academic ones which are<br />

hosted by research institutes or subsidized by NPO. The Website<br />

for Chinese Young Migrant Workers (www.youngmigrants.org),<br />

funded by the project of UN Millennium Development Goals,<br />

perform quite well. Its targeted users are scholars who are<br />

interested in problems of MFWs instead of farmer workers<br />

themselves. It releases information on policies, laws, regulations,<br />

and new research fruits for academic purpose, which is also<br />

helpful to MFWs. The problem is that if the grant project<br />

terminates, its sustainability will face a great challenge.


According to our investigation, there have been no pure<br />

government websites special for MFWs except columns for<br />

MFWs on two large government websites with outdated<br />

information by June 2011. In some way, they are more news<br />

media than service platforms.<br />

Small-sized personal BBSs or forums attract few clicks. The<br />

earliest BBS is very simple with little information, few visitors<br />

and slow speed, and has to change its domain name frequently for<br />

lack of money to rent a permanent server.<br />

Generally speaking, five kinds of websites for or on MFWs adopt<br />

different business models. Commercial websites and non-profit<br />

ones with sufficient funds and clear mission perform better than<br />

others. All kinds of websites hope to set up good relationships<br />

with governments and manage to get their supports in investment,<br />

procurement, or policies. But in terms of commercial websites, a<br />

good profit model is critical for their survival.<br />

H2: is supported. Information contents have significant influence<br />

on website effect.<br />

Websites with higher specialty, richer and more accurate<br />

information and faster updating have better effect than others,<br />

because they are more competitive in meeting the information<br />

needs of farmer workers. Content don’t only influence website<br />

effect directly but also indirectly by the mediation of business<br />

model. For various missions of their host institutions, websites<br />

adopt different business models to provide information with<br />

different utilities. Information on employment is mainly provided<br />

by commercial websites maybe because of its market scarcity,<br />

high cost, time-sensitivity and value-added capability. Legal<br />

information is more likely provided on non-profit websites and<br />

supported by government procurement completely or partly,<br />

maybe because most of their target users are social vulnerable<br />

groups with low incomes and purchasing power. By the mediation<br />

of business model, information contents correlate with website<br />

effect.<br />

H3: is not supported. We can’t get enough evidences to prove or<br />

deny hypothesis 3.<br />

Information classification of a website determines its accessibility<br />

and understandability. Data show that the information<br />

classification of commercial and academic websites is slightly<br />

better than that of other websites. However, this kind of difference<br />

is not significant. Color style and flash design may have impacts<br />

on customers’ preference and loyalty in some way. But most of<br />

the websites have not developed impressive distinctive styles<br />

except the website for China Migrant Workers (Party Building<br />

), which has a symbolic red style. In general, differences in<br />

information classification and page layout are not significant<br />

among MFW websites. The possible reason is that present website<br />

building technology is mature and cheap enough so that all kinds<br />

of websites can afford and adopt it. This doesn’t prove that<br />

information organization has no influences on the effect of MFW<br />

websites, but means that we have not enough evidences to support<br />

or deny this hypothesis.<br />

H4: is partly supported. Navigation systems correlate with website<br />

effect.<br />

According to data analysis, websites with more powerful search<br />

engine and more external links have better effect. Number of links<br />

correlates with website effect, but not as significant as that<br />

101<br />

between information content and website effect. The possible<br />

reason is that there are not enough alternative websites for MFWs<br />

to choose at present so that they have to choose websites by<br />

content at first to satisfy their basic information needs. Besides,<br />

commercial and academic websites do better in information<br />

navigation and external links than others.<br />

H5: is supported. Technical supports are significantly related with<br />

website effect.<br />

Open speed is adopted to indicate technical supports and has<br />

significant correlation with website effect. Data analysis shows<br />

that except personal BBSs or forums, other websites which are<br />

supported by formal organizations and have independent domain<br />

names can be opened quickly, because they are hosted by bigger<br />

sized and more formal institutions that can provide better<br />

information services.<br />

H6: is not supported. The function of social networking services<br />

of the websites have no significant correlation with their effect,<br />

but have significant correlation with their business models.<br />

The function of social networking service is mainly indicated with<br />

interaction and community functions of websites. Data show that<br />

commercial websites have very strong interaction functions and<br />

offer various channels to communicate timely with users, but they<br />

have few communities to allow users to communicate with each<br />

other. The possible reason is that interaction is attractive for<br />

commercial webmasters because they could know more about the<br />

information needs of customers through it and thus to sell their<br />

services more successfully, while community function is often<br />

welcomed by website users because it can help them to expand<br />

social network and get more useful information. On the contrary,<br />

academic websites provide better community construction but pay<br />

less attention to interaction functions. The possible reason is that<br />

free information sharing among users will damage the interests of<br />

commercial websites, which are mostly deprived from<br />

information asymmetry between information suppliers and users.<br />

Whereas, academic websites have a mission to disseminate public<br />

knowledge but can’t burden additional labor cost for limited<br />

funds, are inclined to provide weaker feedback but strong<br />

community functions. As for government websites, the case in<br />

this study is in a “dormancy” state and prepares to transform into<br />

a commercial website. Government websites pay little attention to<br />

both the feedback and community functions for lack of<br />

motivations to seek profits and incentives to disseminate<br />

knowledge.<br />

H7: is supported. Website promotion is significantly correlated<br />

with both website effect and business model.<br />

Three indicators, search engine’s collection, number of back-links<br />

and number of times reported by other media are selected to<br />

evaluate website promotion. Data show that commercial websites<br />

do far better than others in promotion because they have stronger<br />

motivations and take more measures to increase their awareness.<br />

Non-profit websites funded by NPOs or supported by government<br />

procurement also have incentives to promote themselves. Pure<br />

government websites and small personal websites hardly take any<br />

promoting measures. In general, government websites keep<br />

conservative attitude at commercial promotion strategies while<br />

personal websites own low capabilities to promote themselves. By<br />

the mediation of business model, website promotion influences its<br />

effect.


5.2 Other Findings<br />

Business model is a strong predictor for not only website effect,<br />

but also other variables, such as website construction, social<br />

networking services, website promotion, etc. Two commercial<br />

websites, the Website for Migrant workers and the Website for<br />

China Labor, are better than other websites in all aspects,<br />

especially in information updating and examination of<br />

information accuracy. Websites with worst performances are<br />

those commercial websites which are short of funds, those<br />

government websites which are in transformation to commercial<br />

ones and those personal BBSs.<br />

Lack of funds is reported by several small webmasters as the key<br />

factor that influences website effect. The master of the Website of<br />

Jobs for Migrant and Technical Workers, a commercial website<br />

that was set up by a few individual MFW partners with their<br />

meager wages, said: “limitation of funding is the bottleneck of<br />

development and makes the website very difficult.” Another<br />

website, China Migrant Worker (Party Building), was also<br />

established by individual MFW partners and can’t operate well for<br />

lack of money. Lack of talents is another problem related with<br />

shortage of funds. Workers from a few websites which perform<br />

better said that it is difficult for MFW websites to attract better<br />

professionals because they can’t offer higher salaries.<br />

5.3 Practical implications<br />

Previous studies didn’t pay much attention to MFW websites for<br />

many reasons. This study finds that MFW websites are neither<br />

parts of government websites, nor just a group of agriculture<br />

related websites, but are important information platforms<br />

concerning legal right protection, employment and development<br />

of Chinese MFWs with independent business models. The results<br />

of this study have some practical implications for both<br />

webmasters and governments.<br />

5.3.1 Proper business model is critical for the<br />

survival and development of Chinese MFW<br />

websites<br />

Previous researches advocate that government should make<br />

efforts to provide free information services for MFWs because<br />

some of them live in worse information environment and have<br />

lower information capabilities than others, but few empirical<br />

examinations have been conducted to explore specific service<br />

patterns. This study shows that pure government website is not an<br />

effective and efficient model for the delivery of information with<br />

commercial characters. It also finds that information services<br />

related with legal right protection of MFWs could be supported by<br />

governments by means of service procurement, tax cuts, project<br />

leading, etc.. Therefore, MFW websites need to manage to seek<br />

appropriate business models, broaden funding channels, and strive<br />

for supports from governments.<br />

5.3.2 Construction of website features other than<br />

contents will become more important in the<br />

future<br />

This study shows that some website features such as information<br />

organization, number of links and SNS functions have not<br />

significant influences on website effect. But as more and more<br />

MFW websites emerge and the competition among them<br />

intensifies, strengthening the construction of website features<br />

other than contents will become more necessary and urgent.<br />

102<br />

5.3.3 Governments should provide more supports for<br />

commercial and non-profit MFW websites<br />

rather than establish new ones by themselves<br />

This study shows that commercial websites and non-profit<br />

websites supported by government procurement are more<br />

successful than government websites and personal BBSs. This<br />

means that although public information services are very<br />

important for the survival and development of MFWs, it is not a<br />

smart choice for government agencies to establish and manage<br />

websites for MFWs by themselves. Instead, government should<br />

support non-profit or commercial websites by means of<br />

government procurement, tax cutting and policy concessions.<br />

6. CONCLUSION AND DISCUSSION<br />

6.1 Conclusions<br />

This study explored the factors that influence service effect MFW<br />

websites. An analytical framework comprising four independent<br />

variables, including business model, website construction, social<br />

networking services, website promotion, and one dependent<br />

variable, website effect, was advanced under a managerialtechnical<br />

perspective. These variables were borrowed from<br />

theories of usability, information architecture and webometrics.<br />

Both quantitative and qualitative indicators were used for the<br />

measurement of these variables, and a multi-case study was<br />

conducted for a holistic exploration. It was found that factors that<br />

significantly influence the effect and sustainable development of<br />

MFW websites are business model, information content and<br />

website promotion. Among them, business model also make<br />

impacts as a mediating variable. Different kinds of information<br />

intend to be provided by websites with different business models.<br />

Government procurement and NPO funding are efficient<br />

arrangements for websites on the legal right protection of MFWs.<br />

The “commerce plus non-profit” mode by charging employers and<br />

training agencies who issue information on websites but don’t<br />

charge MFWs who issue or acquire information is common for<br />

employment websites. Lack of money was reported as a prevalent<br />

problem that faces with all kinds of MFW websites.<br />

6.2 Limitations<br />

Firstly, trying to combine both managerial and technical, and even<br />

social perspectives into a holistic study is risky in being accepted<br />

by readers who are accustomed to one discipline paradigm. We<br />

employed and unified theories from LIS, IS, webmetrics and<br />

management science and formulated an analytical framework for<br />

this qualitative study. We hope that this attempt will be proved a<br />

cross-discipline innovation instead of a blunder. Secondly, a<br />

multi-case study may have to lose some detailed information in<br />

order to improve the generality of the research findings, although<br />

we had collected a large amount of first and second-hand data by<br />

means of interview, website examinations and literature reviews.<br />

Thirdly, the validity of four independent variables and 1<br />

dependent variable were not testified powerfully in this qualitative<br />

study because we failed to find similar studies and appropriate<br />

methods. Fourthly, we focused on websites and neglected<br />

information needs and information seeking behaviors of migrant<br />

farmer workers, which will be studied in further step.<br />

7. ACKNOWLEDGEMENTS<br />

Our thanks to 3 projects that support this study, the project<br />

“Information Access of Chinese Migrant Farmer Workers and the


Construction of Inter-regional Public Information Service System<br />

for Them” (Grant No. 71173121) supported by the National<br />

Natural Science Foundation of China , the project “Holistic<br />

Evaluation Research on E-government Based on Multistakeholder<br />

Value-focused Approach” (Grant No. 10YJA870021)<br />

supported by the Foundation for Humanities and Social Sciences<br />

Program of Ministry of Education , and the project “Theory<br />

Construction and Evaluation on Social Information Welfare”<br />

supported by the Special Funds for fundamental Research of<br />

Central Universities.<br />

8. REFERENCES<br />

[1] The State Council. The Opinion about Solving the Problems<br />

of Rural Migrant Farmer Workers. The central government<br />

website of the People 's Republic of China,2006. [view:<br />

2011-05-18] http://www.gov.cn/jrzg/2006-<br />

03/27/content_237644.htm.<br />

[2] The National Statistical Bureau. Migrant Farmer Workers<br />

Monitoring Report, 2009. [View: 2011-11-19]<br />

http://www.stats.gov.cn/tjfx/fxbg/t20100319 402628281.htm.<br />

[3] CNNIC. The 28th China Internet network development<br />

statistics report, 2011. [view: 2011-12-<br />

14].http://www.piaoshi.org/2011-cnnic-28th-china-internetdevelopment-statistics-report-download/.<br />

[4] CNNIC. The 27th China Internet Network Development<br />

Statistics Report, 2011. [view:2011-03-11],<br />

http://www.cnnic.net.cn/dtygg/dtgg/201101/t20110118<br />

20250.html.<br />

[5] Wang, F. Social information welfare and its realization.<br />

Library and Information Service, No.18 (2009), 30-34.<br />

[6] Zheng, Y. Exploring the weak information capability of<br />

China’s labor force from rural area. Economist, No.5 (2005),<br />

52-59.<br />

[7] Wen, J. & Yu, G. Information division and the poverty of<br />

right of information underprivileged group. Journal of<br />

Dehong Teachers College, No. 1 (2008), 21-24.<br />

[8] Xie, Q., Shi, D. & Zhu, L. On information behavior and<br />

assistance for information underprivileged group in<br />

information society. The Library Journal of Henan, No.5<br />

(2008), 54-56.<br />

[9] The State Council. The Opinion about Solving the Problems<br />

of Rural Migrant Farmer Workers. The central government<br />

website of the People 's Republic of China,2006. [view:<br />

2011-05-18] http://www.gov.cn/jrzg/2006-<br />

03/27/content_237644.htm.<br />

[10] Zhou, Y. Informatization promotes orderly flow of migrant<br />

farmer workers. Leadership Science, No. 4, (2007), 40-41.<br />

[11] Li, G. Informatization is promising to promote the<br />

employment of peasant worker. Economic Daily No. 4<br />

(2009).<br />

[12] Yang, F. & Li, J. Information Asymmetry and Employment<br />

of Peasant-workers. Market Modernization, No.34 (2007),<br />

523.<br />

103<br />

[13] Jin, J. Building the information service system for migrant<br />

workers. Economic Vision, No. 4 (2007), 49-50.<br />

[14] Huang, L. & Wang, C. Exploring information<br />

marginalization of migrant workers. Consume Guide, No.19<br />

(2009), 18-19.<br />

[15] Zhou, H. Constructing the integrated information service<br />

system for migrant farmer workers. Information System<br />

Engineering, No.9 (2005), 20-21.<br />

[16] Xing, T. The electric business of agricultural products is<br />

promising with 20000 national agriculture websites. [View:<br />

2011-05-26], Communication and Information Report<br />

(Fuzhou), (2011),<br />

http://tech.163.com/11/0526/01/74UNDOLH000915BF.html.<br />

[17] Wu, D. & Wu, Y. Research on the construction of<br />

agricultural science-learning website based on Internet<br />

independent study. Mechanical & Electrical Engineering<br />

Technology, No.7 (2008), 47-48.<br />

[18] Li, K & Sun Y. Research on application of personalized<br />

recommendation system in agriculture websites: Sichuan<br />

agricultural economy Website as an example. Market Forum<br />

,No.2 (2009), 70-72.<br />

[19] Zhao, L. & Zhu, X. Research on the construction of<br />

agricultural websites in China based on web link Analysis.<br />

Sci-Tech Information Development & Economy, No.11<br />

(2011), 110-112.<br />

[20] Yang, X. &Jia, D. Agriculture websites in the application of<br />

rural informatization-take the case of Jiangsu Jurong City as<br />

an example. Journal of Beijing University of Posts and<br />

Telecommunications (Social Sciences Edition), No.5 (2009),<br />

28-32.<br />

[21] Guo, X. & He, M. Exploring the problems of agriculture<br />

website construction. Press Outpost, No.12 (2009), 81-82.<br />

[22] Yang, Y. & Jia, B. Research on the construction of<br />

agricultural websites in China. Rural Economy and Science-<br />

Technology, No.6 (2007), 20-21.<br />

[23] Zhang, T. & Wu, H. The problems and solutions in the<br />

development of agricultural information websites. Journal of<br />

Beijing University of Posts and Telecommunications (Social<br />

Sciences Edition), No.3 (2010), 9-14.<br />

[24] Benbunan-Fich, R.. Using protocol analysis to evaluate the<br />

usability of a commercial website. Information and<br />

Management, Vol. 39, No.2 (2001), 151-163.<br />

[25] Davis, F. D., Perceived usefulness, perceived ease of use,<br />

and user acceptance of information technology. MIS<br />

Quarterly, 13(3) (1989): 319–340.<br />

[26] Shackel, B. (1991). Usability--context, framework,<br />

definition, design and evaluation. Shackel, B. and<br />

Richardson, S., Ed. Human Factors for Informatics<br />

Usability. pp. 21-37. Cambridge, UK, Cambridge University<br />

Press.<br />

[27] Morville, P. Information architecture on the World Wide<br />

Web,1998. [View: 2011-10-19], http://repo.zenk-


security.com/Others/Information%20Architecture%20For%2<br />

0The%20World%20Wide%20Web.pdf.<br />

[28] Björneborn, L. & Ingwersen, P. Toward a basic framework<br />

for webometrics. Journal of the American Society for<br />

Information Society for Information Science and Technology,<br />

Vol. 55 No. 14 (2004),1216–1227.<br />

[29] Welch, E.W. & Sanjay, P. S. Multiple measures of website<br />

effect and their association with service quality in health and<br />

human service agencies. Proceedings of the 40th Hawaii<br />

International Conference on System Sciences, 2007.<br />

[30] Eschenfelder, K.R., and Miller, C. The openness of<br />

government websites: toward a socio-technical government<br />

website evaluation toolkit. MacArthur Foundation Internet<br />

Credibility and the User Symposium, Seattle Washington,<br />

2005.<br />

[31] Lee Y. & Kozar, K. A. Investigating the effect of website<br />

quality on e-business success: An analytic hierarchy process<br />

(AHP) approach. Decision Support Systems, No. 42 (2006),<br />

1383–1401.<br />

[32] Nilsen, J. Usability Engineering. Academic Press, 1994.<br />

[33] Peerce, J., Rogers, Y., Sharp, H., Benyon, D., Holland, S &<br />

Carey, T. Human-computer interaction. Workingham,<br />

England, Addison-Wesley, 1994.<br />

[34] Pateli, A. & Giaglis, G.. A Framework For Understanding<br />

and Analysing e-Business Models. Proceedings of the Bled<br />

Electronic Commerce Conference, 2003.<br />

[35] Chesbrough, H. Business model innovation: it’s not just<br />

about technology anymore. Strategy & Leadership, Vol. 35<br />

No. 6 (2007), 12-17.<br />

[36] Hedman, J. & Kalling, T.The business model concept:<br />

theoretical underpinnings and empirical illustrations.<br />

European Journal of Information Systems, No. 12 (2003),<br />

49–59.<br />

[37] Ostenwalder, A.; Pigneur, Y. and Tucci C.L. Clarifying<br />

Business Models: Origins, Present, and Future of the<br />

Concept. Communications of AIS, Volume 15 (2005) .<br />

[38] Wang, J. & Senecal, S. Measuring perceived website<br />

usability. Journal of Internet Commerce, Vol. 6, No.4<br />

(2007), 97-112.<br />

[39] Al-Badi A. H. & Mayhew, P. J. A Framework for Designing<br />

Usable Localized Business Websites. Communications of the<br />

IBIMA, Vol. 2010, 1-24.<br />

[40] Karlsson, M. Expressions, emotions and website design. Co<br />

Design, Vol3, supplement 1 (2007), 75-89.<br />

[41] Davenport, T.H. Information ecology: mastering the<br />

Information and Knowledge Environment. New York:<br />

Oxford University Press, 1997.<br />

[42] Gullikson, S., Blades, R., Bragdon, M., McKibbon, S.,<br />

Sparling, M. & Toms, E. G. The impact of information<br />

architecture on academic website usability. The Electronic<br />

Library, Vol. 17, No. 5 (1999), 293-304.<br />

104<br />

[43] Wang, F. & Chen, Y. Wang, F & Chen, Y. From potential<br />

users to actual users: Use of E-Government Service by<br />

Chinese Migrant Farmer Workers. Government Information<br />

quarterly, Vol. 29 (January 2012), pp. S98-S111.<br />

[44] Al-Badi A. H. & Mayhew, P. J. A Framework for Designing<br />

Usable Localized Business Websites. Communications of the<br />

IBIMA, Vol. 2010, 1-24.<br />

[45] Chen, B. The application of the external Web links in the<br />

promotion of large enterprise's Website. Sci-Tech<br />

Information Development & Economy, Vol. 17 No. 29<br />

(2007), 246.<br />

[46] Björneborn, L. & Ingwersen, P. Toward a basic framework<br />

for webometrics. Journal of the American Society for<br />

Information Society for Information Science and Technology,<br />

Vol. 55 No. 14 (2004), 1216–1227.<br />

[47] Weischedel, B. & Huizingh, E. K. R. E.. Website<br />

optimization with web metrics: a case study. Proceedings of<br />

the 8th international conference on Electronic commercet,<br />

2006, Fredericton New Brunswick, Canada, August 13-16.<br />

[48] Fang, W. Using Google Analytics for Improving Library<br />

Website Content and Design: A Case Study. Library<br />

Philosophy and Practice, Special Issue on Libraries and<br />

Google (June, 2007),.<br />

[49] Yin, R.K.). Case Study Research, Design and Methods.<br />

California: Sage Publications, Beverly Hills, 1984.<br />

[50] Bonoma, T. V. Case research in marketing: Opportunities<br />

problems, and a process. Journal of Marketing Research,<br />

Vol. 22 No. 2 (1986), 199-208.<br />

[51] Benbasat, I., Goldstein, D. K. & Mead, M. The Case<br />

Research Strategy in Studies of Information Systems. MIS<br />

Quarterly, September, Vol.11, No.3, (1987), 369-386.<br />

[52] Akhavan, P.; Jafari,M. & M Fathian, M. Critical success<br />

factors of knowledge management systems: a multi-case<br />

analysis. European Business Review, 18(2), (2006), 97-113.<br />

[53] China Xin NongMen Website, “Comments”, 2008. [View:<br />

2011-05-18]<br />

http://wopingit.com/company.aspx?companyid=c569211eaae3-48ae-a6e3-e92af310217f.


The Development of Public Smart Phone Apps in Korea:<br />

Empirical Approach<br />

Eom, Seok-Jin<br />

Seoul National University<br />

1 Gwanak-ro, Gwanak-gu,<br />

Seoul, Korea, 151-742<br />

(82) 010-8147-5352<br />

sjum21@snu.ac.kr<br />

ABSTRACT<br />

With widespread proliferation of smart phones, public apps, the<br />

smart phone applications provided by government organizations<br />

and public agencies, have been emerging as a new channel of<br />

public information services in the era of mobile government (mgovernment).<br />

Despite the increasing necessity of research on the<br />

public apps, however, few studies have dealt with the public apps.<br />

Under these circumstances, this study has been in progress with<br />

following purposes: (1) to build a ‘public apps development<br />

model’ for describing the level of services of public apps; (2) to<br />

measure the overall level of public apps in Korea adopting the<br />

development model; and (3) to analyze the factors which<br />

determine the difference in the level of public apps services. Until<br />

now, a 6-stage public apps development model whose criteria are<br />

citizen-centricity and technological complexity of the public apps<br />

was built. In addition, the levels of 148 public apps provided by<br />

Korean central government were measured. As results, it is found<br />

that all kinds of public organizations including central government<br />

are actively providing various public apps and the overall level of<br />

public apps provided by central government is in a midpoint of<br />

the second and third stage. The authors plan to complement the<br />

public apps development model in order to enhance validity, and<br />

to measure a level of the public apps not only of central<br />

government but also of local governments and public agencies<br />

accordingly.<br />

Categories and Subject Descriptors<br />

J.1 [Computer Applications]: Administrative Data Processing –<br />

government.<br />

General Terms<br />

Measurement, Theory<br />

Keywords<br />

m-government, application (app), smart phone, e-government,<br />

public apps development model<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Lee, Mi Yeon<br />

Seoul National University<br />

1 Gwanak-ro, Gwanak-gu,<br />

Seoul, Korea, 151-742<br />

(82) 010-7490-3777<br />

dldus33@snu.ac.kr<br />

105<br />

Kim, Jun Houng<br />

Seoul National University<br />

1 Gwanak-ro, Gwanak-gu,<br />

Seoul, Korea, 151-742<br />

(82) 010-9602-5007<br />

jh5451@snu.ac.kr<br />

1. INTRODUCTION<br />

With widespread proliferation of smart phones, public apps have<br />

been produced and provided by government organizations and<br />

public agencies in order to deliver public information services in<br />

recent years. In addition to the wired Internet in the era of egovernment,<br />

these public apps are emerging as a new service<br />

channel in the era of m-government [3][4]. Despite widespread<br />

proliferation of smart phones and the importance of public apps as<br />

a new service channel, however, few studies in the field of egovernment<br />

and information policy have dealt with the public<br />

apps that function in smart phones. Under these circumstances,<br />

this research is in progress for the following purposes: (1) to build<br />

the ‘public apps development model’ for describing the level of<br />

services of public apps; (2) to measure the overall level of public<br />

apps in Korea adopting the development model; and (3) to analyze<br />

the factors which determine the difference in the level of public<br />

apps services.<br />

In this paper, the authors review the literature on e-government<br />

stage models in order to capture the criteria for dividing each<br />

stage of the public apps development model. As a result, the 6stage<br />

public apps development model, which is based on citizencentricity<br />

and technological complexity, is illustrated. Adopting<br />

this model, the authors measure the level of each public app<br />

provided by Korean central government and demonstrate the<br />

result of measurement according to each stage. In the future, the<br />

authors not only plan to measure the level of each public app<br />

provided by local governments and public agencies in Korea, but<br />

also plan to analyze the factors that determine the difference in the<br />

level of each public app through regression analysis.<br />

This study is expected to make a theoretical contribution to<br />

widening understandings on the current status of public apps and<br />

the characteristics of m-government. From the perspective of<br />

practice, this study is expected to provide the guidelines and<br />

toolkits for making better public apps to public agencies and<br />

public officials.<br />

The organization of the paper is as follows. In section 2, the<br />

authors provide theoretical background regarding m-government,<br />

public apps, and development models. In section 3, the public<br />

apps development model is illustrated. Finally, the findings from<br />

the empirical analysis of the public apps adopting the<br />

development model are presented with tentative conclusion and<br />

future research plans.


2. THEORETICAL BACKGROUND<br />

2.1 Mobile Government<br />

With rapid advance in wireless technologies, there have been<br />

several studies on the next generation of e-government adopting<br />

wireless technologies in the public sector, which is called mgovernment.<br />

More specifically, m-government is defined as “the<br />

strategy and its implementation involving the utilization of all<br />

kinds of wireless and mobile technology, services, applications,<br />

and devices for improving benefits to the parties involved in egovernment<br />

including citizens, businesses, and all government<br />

units” [6]. With regard to the emergence of m-government, the<br />

early literatures tend to regard m-government as the subset or<br />

complement of e-government [5][6]. That is, m-government<br />

cannot function apart from the existing e-government in that most<br />

of the public services equipped with wireless technologies are<br />

nothing more than replications of e-government services on the<br />

mobile platforms. On the other hand, the recent literatures<br />

emphasize the uniqueness of m-government [2]. More<br />

specifically, m-government upgrades the level of public services<br />

by providing the infrastructure and contents, which could not be<br />

realized in the era of the wired e-government, by means of<br />

mobility and hand-held devices.<br />

Regardless of a perspective on m-government, however, there is a<br />

tendency that most of the m-government literatures not only put<br />

too much emphasis on conceptual discussion, but also regard mgovernment<br />

as the phenomenon taking place in the distant future.<br />

In order to deviate from such a tendency and approach mgovernment<br />

empirically, the authors analyze the public apps, the<br />

mobile applications provided by public organizations for<br />

improving benefits to the public and private sector, in this study<br />

[3][6]. With rapid increase in sales of mobile devices and huge<br />

success of mobile application markets, such as Apple’s App Store,<br />

citizens’ demand to receive public services via public apps has<br />

been increasing sharply in Korea [4]. It implies that the study of<br />

the relationship between m-government and public apps is<br />

significant in order to understand the substance of m-government<br />

and contribute to enlarging the research field of m-government.<br />

2.2 Development Models of IT/IS<br />

Since Nolan paved the way for the study of the use of IS<br />

(Information Systems) in business organizations through the<br />

growth stage model of computer use, there have been various<br />

discussions to understand and analyze the development process of<br />

e-commerce and e-business through a development or stage model<br />

[7]. Likewise, the stage models that deal with the development<br />

process of e-government, such as Gartner’s 4-stage model, UN’s<br />

5-stage model, and Layne and Lee’s 5-stage model, have been<br />

illustrated in order to analyze the use of IT (Information<br />

Technology) in government organizations [1]. In their metasynthesis<br />

approach, Siau and Long integrate five stage models<br />

into a synthesized one on the basis of a systematic comparison of<br />

stages between different models. They illustrate a comprehensive<br />

e-government model whose stages are web presence, interaction,<br />

transaction, transformation, and e-democracy [9].<br />

However, some scholars criticize validity and usefulness of the<br />

stage models. While these stage models are predicated on the<br />

premise that the development process of technology and its<br />

adoption in organizations are an evolutionary phenomenon,<br />

Andersen and Henriksen argue that “not all researchers agree on<br />

106<br />

the suitability of “evolutionistic” development models as a means<br />

for measuring IT capabilities in organizations” and “the individual<br />

phases occur simultaneously and part of different elements of egovernment.”<br />

[1] That is, a development model could regard<br />

development process as discrete and individual stages even<br />

though it is a complex and continuous process in reality.<br />

Despite the weakness of these development models, the authors<br />

claim that the development models have contributed to identifying<br />

the current status of the recent IT or IS phenomenon, enlarging<br />

conceptual discussion about the development process which is<br />

seemingly chaotic, monitoring whether an organization’s use of<br />

IT is on the right track in practice, and planning for future<br />

applications. In particular, a development model helps provide a<br />

systematic approach with regard to characteristics of newly<br />

emerging fields of IT and IS. Given that few studies have dealt<br />

with public apps and to a larger extent the substance of mgovernment,<br />

it is expected that building the public apps<br />

development model helps understand and analyze the result of<br />

empirical approach on public apps systematically.<br />

3. PUBLIC APPS DEVELOPMENT MODEL<br />

The crucial principles applied to building the public apps<br />

development model are citizen-centricity and technological<br />

complexity. First, the more the functions of each public app are<br />

interactive with citizens, the higher its stage is. Jaeger states that<br />

not only do leading e-government strategies emphasize a citizen<br />

centered version of public administration, but e-government<br />

technologies that allow government to determine the identity of<br />

users in order to provide more personalized and responsive<br />

service become every more important [2]. In a broader sense, the<br />

concept of Web 2.0 is also in accord with citizen-centricity. Web<br />

2.0, inspired by Tim O’reilly, refers to the user-centric Internet<br />

environment that is underpinned by the spirit of participation,<br />

sharing, and openness, which emphasizes the utility of Internet<br />

users, rather than that of Internet contents suppliers [8]. Second,<br />

the more the technology of each public app is complex, the higher<br />

the stage of the development model is. According to Siau and<br />

Long, e-government system complexity and integration increase<br />

with the advancement of the e-government stages, which also<br />

implies that the technological advance in the functions of public<br />

apps deserves to be regarded as the higher level of services [9].<br />

More importantly, the authors put more significance on citizencentricity<br />

than technological complexity because the studies<br />

dealing with e-government stage models also suggest that it is<br />

crucial to emphasize the function that facilitates interaction<br />

between public organizations and citizens [2]. Therefore, the<br />

public apps which provide a high level of citizen-centric service<br />

with high level of mobile technology reaches the higher stage than<br />

those which provide a high level of mobile technology with a low<br />

level of citizen-centric service.<br />

In summary, the public app which provides a high level of citizencentric<br />

services with a high level of mobile technology reaches the<br />

highest stage, while the public app which provides unilateral<br />

services with a low level of mobile technology stays at the lowest<br />

stage. Combining these criteria, the authors demonstrate a 6-stage<br />

development model for public apps. More specific description<br />

about each stage of this model is illustrated in Table 1.<br />

Table 1. The public apps development model


Stage Description<br />

1 st stage<br />

(Simple<br />

Demonstration)<br />

2 nd stage<br />

(Complex<br />

Demonstration)<br />

3 rd stage<br />

(Simple<br />

Interaction)<br />

4 th stage<br />

(Complex<br />

Interaction)<br />

5 th stage<br />

(Transaction)<br />

6 th stage<br />

(Transformation)<br />

Public information services, which were provided<br />

through the wired Internet previously, are provided<br />

through a public app. Since it is the beginning<br />

phase of public apps production, service producers<br />

mainly focus on delivery of simple services and<br />

information, such as text, pictures, and video clips.<br />

The functions that increase citizens’ convenience<br />

are not provided at this stage.<br />

The functions that increase citizens’ convenience<br />

by means of mobile technology, such as QR<br />

(Quick Response) code, are provided. For<br />

example, citizens can search for the nearest<br />

facilities from the place where they are located via<br />

LBS (Location Based Service), such as augmented<br />

reality and Google Maps. Government agencies<br />

provide such services in unilateral way.<br />

Government agencies provide the function that<br />

interacts with citizens. For example, public apps<br />

provide Q & A, counseling, and chatting billboard<br />

in order to provide citizens with the opportunity to<br />

ask a question or express an opinion about public<br />

affairs. Also, citizens can report the emergency<br />

situation with short descriptions about situation or<br />

pictures on the spot.<br />

The function that enhances interaction is provided.<br />

That is, interaction between government agencies<br />

and citizens transcends the simple level and<br />

researches the extent that not only citizens but<br />

government agencies are also proactive in citizencentric<br />

services. For example, mutual<br />

communication occurs through SNS (Social<br />

Network Services), such as Facebook and Twitter.<br />

At this stage, public apps provide the two-way<br />

communication service which is possible only<br />

when technological security and trust between<br />

citizens and government agencies are assured. For<br />

instance, citizens can make payment of taxes,<br />

fines, and public merchandise. Also, they can<br />

request package delivery with regard to civil affair<br />

documents via public apps.<br />

Citizens enjoy one-stop service via one public app.<br />

Because public apps are interconnected in terms of<br />

service delivery, any service or information that<br />

citizens want to receive are provided even though<br />

they get access to other public apps. For example,<br />

a public app which is a platform for all of the<br />

mobile public information services plays a role as a<br />

portal for providing one-stop services.<br />

4. EMPIRICAL ANALYSIS<br />

4.1 Methods<br />

In order to identify current status of Korean public apps which can<br />

be downloaded through Apple’s App Store and Google’s Android<br />

Market, the authors examined the entire population of public apps<br />

as of January 31, 2012. Based on the data collected from the<br />

survey, the list of public apps according to the title, app producers,<br />

and mobile platforms were made. Then, not only were the public<br />

apps provided by central government downloaded, but the<br />

characteristics and functions were closely examined in order to<br />

measure the level of each public app.<br />

More specific procedure is as follows. First, two of the authors,<br />

the one who had an Apple iPhone and the other who had an<br />

Android phone, individually observed the contents of mobile<br />

107<br />

services of the public apps that were produced by central<br />

government agencies and that were provided through both App<br />

Store and Android Market. Second, they cross-checked each<br />

other’s findings in terms of the functions and characteristics each<br />

public app was equipped with. Third, the author who had an<br />

iPhone examined the level of central government’s public apps in<br />

the Apple’s App Store and the one who had an Android phone<br />

examined the level of central government’s public apps in the<br />

Android Market.<br />

4.2 Descriptive Survey Results<br />

Some major findings on the public apps from the survey are<br />

illustrated in Table 2 and Table 3. According to Table 2, a total of<br />

701 public apps are provided by central government, local<br />

governments, and public agencies in Korea. The public apps<br />

provided by local governments account for 40.4%, which means<br />

that local governments are the most active providers of public<br />

apps among the three types of public organizations. In addition,<br />

the public apps provided by public agencies including public<br />

enterprises and quasi-governmental organizations (QUAGOs)<br />

account for 36.7%. On the other hand, the public apps provided by<br />

central government agencies account for 22.9%, which suggests<br />

that central government agencies fall behind the rest of public<br />

organizations in terms of provision of public apps.<br />

Table 2. The number of public apps<br />

Central<br />

Government<br />

Local<br />

Governments<br />

Public<br />

Agencies<br />

Total<br />

Frequency 161 283 257 701<br />

Portion (%) 22.9 40.4 36.7 100.0<br />

By contrast, Table 3 illustrates that central government agencies<br />

are the most active providers of public apps in terms of the ratio<br />

of the number of the agencies that produce public apps to the total<br />

number of agencies. That is, 67.3% of the entire central<br />

government agencies provide public apps, while only 43.8% and<br />

39.1% of the entire local governments and public agencies<br />

provide public apps, respectively. Also, Table 3 suggests that<br />

local governments provide more public apps than central<br />

government agencies and public agencies because the number of<br />

local governments is more than that of central government<br />

agencies and public agencies, not because every local government<br />

is active in provision of public apps.<br />

Table 3. Public apps providers<br />

Central<br />

Government<br />

Local<br />

Governments<br />

Public<br />

Agencies<br />

Total<br />

Total 49 224 284 557<br />

Providers 33 98 111 242<br />

Portion (%) 67.3 43.8 39.1 43.4


4.3 Measurement of a Level of Public Apps<br />

In order to measure the level of public apps of Korean central<br />

government, the authors made a check-list on whether each of 161<br />

public apps was satisfied with the specific criteria of each stage of<br />

the model. And then, the level of each public app was determined<br />

as the highest stage where each public app reached. Of 161 public<br />

apps, 13 public apps were excluded because of the unexpected<br />

problems. For example, the authors could not get access to the<br />

public app named “National Tax Service for Businessmen”,<br />

because it was necessary to have a registered business number in<br />

order to log in to this public app. Then, based on 148 public apps,<br />

the authors measured a level of each public app.<br />

Table 4. Measurement of a level of public apps<br />

1 st<br />

stage<br />

2 nd<br />

stage<br />

3 rd<br />

stage<br />

4 th<br />

stage<br />

5 th<br />

stage<br />

6 th<br />

stage<br />

Total<br />

Frequency 24 80 13 24 7 0 148<br />

Portion<br />

(%)<br />

16.2 54.1 8.8 16.2 4.7 0.0 100.0<br />

As shown in Table 4, 54.1% of the public apps provided by<br />

central government agencies satisfy the criteria of the second<br />

stage of the model. That is, more than half of the public apps<br />

provided by central government agencies provide the functions<br />

that increase citizens’ convenience by means of mobile<br />

technology, such as LBS and QR code. In term of interaction<br />

pattern, 70.3% of public apps provide one-way communication<br />

services, while 29.7% of public apps provide two-way<br />

communication service. Also, it is notable that 25% of the entire<br />

public apps provide the functions that satisfy the third and fourth<br />

stage, while only 4.7% of the entire public apps reach the fifth<br />

stage. When it comes to the portion of the public apps that provide<br />

two-way communication service, the authors interpret in the<br />

following ways. First, given that the public apps that satisfy the<br />

third and fourth stage account for 25% of the entire public apps, it<br />

seems that central government agencies try to provide the<br />

functions for promoting interactions with their citizens by<br />

accommodating their questions or opinions through public apps.<br />

Second, it can be said that public apps which provide two-way<br />

communications are at the initial stage. Only 4.7% of the entire<br />

public apps of Korean central government provide the functions<br />

that satisfy the fifth stage, such as mobile payment and mobile<br />

order of package delivery. Diverse possible causes for this<br />

phenomenon can be considered. On the supply side, the weak<br />

leadership for developing higher level of public apps or the low<br />

level of technology which government agencies have could be<br />

major obstacles against providing the fifth and sixth level of<br />

public apps. On the demand side, it is possible to argue that the<br />

demand from citizens on such kinds of public apps is still weak.<br />

5. TENTATIVE CONCLUSION<br />

In this paper, the authors reviewed the literature on m-government<br />

and claimed the necessity to approach m-government empirically.<br />

Regarding public apps as the significant substance of mgovernment,<br />

the authors built the public apps development model<br />

in order to analyze the public apps systematically, and examined<br />

the entire population of public apps. Until now, it is found that the<br />

total number of the public apps provided by central government,<br />

local governments, and public agencies in Korea was 701. Also,<br />

108<br />

local governments were the most active providers of public apps<br />

among the three types of public organizations. In addition, overall<br />

level of public apps of central government is approximately in a<br />

midpoint of the second and third stage.<br />

These tentative results can be interpreted that government<br />

organizations and public agencies in Korea are actively adopting<br />

mobile technologies for delivering public information services in<br />

the era of m-government. On the other hand, Korean public<br />

organizations still have long way to go because the overall level<br />

of public apps are not so high that it cannot be enough to fully<br />

satisfy the citizens’ expectations and future demands for the<br />

transaction and integrative services through public apps.<br />

The authors plan to do as follows in the future. First, the public<br />

apps development model should be complemented reflecting<br />

results of the public app survey. Second, the current status of<br />

public apps should be analyzed more deeply applying various<br />

criteria. Third, the measurement of levels of public apps of local<br />

governments and public agencies will be conducted and the<br />

overall level of the entire public apps in Korea will be examined.<br />

Finally, causal factors for determining the levels of public apps<br />

will be analyzed through statistical inferential analysis.<br />

6. REFERENCES<br />

[1] Andersen, K. and Henriksen, H. E-government maturity<br />

models: extension of the Layne and Lee model. Government<br />

Information Quarterly, 23 (2006), 236-248.<br />

[2] Campbell, J. and Im, T. Beyond ubiquity: mobile<br />

government, theory and practice. In Proceedings of the<br />

KAPA international conference (Seoul, Korea, 2012).<br />

[3] Kim, H., Hong, S., and Joo, S. Performance analysis of<br />

mobile application, in Proceedings of the Korean computer<br />

synthesis conference (Seoul, Korea, 2011).<br />

[4] Kim, H., Lee, H., and Choi, S. An exploratory study on the<br />

determinants of mobile application purchase. Journal of<br />

Society for E-business Studies, 16, 4 (2011), 173-195.<br />

[5] Kumar, M. and Sinha, O. M-government: mobile technology<br />

for e-government. In Proceedings of the fifth international<br />

conference on e-governance (Hyderabad, India, 2007).<br />

[6] Kushchu, I. and Kuscu, M. From e-government to mgovernment:<br />

facing the inevitable. In Proceedings of the<br />

third European conference on e-government (Dublin, Ireland,<br />

2003).<br />

[7] Nolan, R. Managing the computer resource: a stage<br />

hypothesis. Communications of the ACM, 16, 7 (1973), 399-<br />

405.<br />

[8] Ra, J. et al. A study on the strategies of electronic<br />

government services based on Web 2.0. Korea IT Service<br />

Society, 7, 1 (2008), 237-254.<br />

[9] Siau, K. and Long, Y. Synthesizing e-government stage<br />

models: a meta-synthesis based on meta-ethnography<br />

approach. Industrial Management & Data Systems, 105, 4<br />

(2005), 443-458


Understanding Citizens’ Perceptions of E-Government<br />

Services in Mexico<br />

Juan M. Gomez Reynoso<br />

Universidad Autonoma de<br />

Aguascalientes, Mexico<br />

jmgr@correo.uaa.mx<br />

ABASTRACT<br />

Mexico has made significant progress in expanding the<br />

capabilities of e-government services available for citizens.<br />

According to the 2012 UN e-government report, Mexico ranks<br />

28 th among the 179 UN member states, and 3 rd in Latin America<br />

in terms of overall development of online services. However, to<br />

date, little is known about the demand side of online services.<br />

This paper investigates the factors that influence the adoption of<br />

online services in Mexico. Kumar et al. model is used to support<br />

the hypotheses proposed in this paper. An online survey was used<br />

to collect data on citizens’ perceptions about e-government. The<br />

results will be analyzed using multiple regression analysis.<br />

Categories and Subject Descriptors<br />

K.5.2 [Computers and Society]: Governmental Issues –<br />

Regulation, Taxation<br />

General Terms<br />

Measurement, Documentation, Performance, Reliability, Human<br />

Factors, Standardization, Theory, Verification<br />

Keywords<br />

E-Government Services, e-Government Initiatives, Digital<br />

Government, Mexico, Online Services, Adoption, Perceptions<br />

1. INTRODUCTION<br />

Information and communication technologies have transformed<br />

government service delivery over the past twenty years. With the<br />

emergence of the Internet governments have improved their<br />

internal operations and integrated processes and systems across<br />

multiple government agencies. The impact has also been profound<br />

in the provision of services to citizens, who have traditionally<br />

relied on methods such as over the counter service, ordinary mail,<br />

telephone, and fax to interact with the government. Electronic (e-)<br />

government technologies allow citizens to access a full range of<br />

services in a reliable, secure and convenient manner through<br />

different delivery channels (e.g. web sites, portals, cell phones and<br />

electronic kiosks). To date, government services available online<br />

provide at least the necessary information and materials to initiate<br />

a request for services. Sophisticated applications of technology<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Celene Navarrete<br />

California State University<br />

Dominguez Hills<br />

cnavarrete@csudh.edu<br />

109<br />

Rodrigo Sandoval Almazan<br />

Universidad Autonoma del<br />

Estado de Mexico, Mexico<br />

rsandovala@uaemex.mx<br />

provide services with transactional and collaboration capabilities<br />

(e.g. income taxes declaration, car registration, political<br />

participation, electronic voting).<br />

Mexico has made important progress in implementing e-<br />

Government services. According to the 2012 UN e-government<br />

survey, Mexico ranks 28 th among the 179 UN member states, and<br />

3 rd in Latin America behind Colombia and Chile in terms of<br />

overall development of e-government services. Mexico provides<br />

64% of all the assessed services over the Internet, from which<br />

69% show some interactive presence (e.g. downloadable<br />

databases or pdf files), 62% offer transactional capabilities, and<br />

57% include networked presence including e-participation<br />

capabilities. The UN report assessed each country’s national<br />

portal, e-services portal and the websites of the ministries of<br />

education, labor, social services, health, finance and environment.<br />

The success of e-government initiatives depends on the citizens’<br />

willingness to use online services [1]. Previous studies have<br />

analyzed the adoption of e-government initiatives [2, 3].<br />

However, a few studies provide evidence of what drives adoption<br />

of online public services in Mexico. Research suggests that<br />

quality of services, poor informational and transactional<br />

capabilities in government Web sites, preference for payments in<br />

cash over credit card use, and trust in the Internet to carry out<br />

transactions can be central for the utilization of e-government [4,<br />

5]. The purpose of this study is to identify the perception-based<br />

factors that influence citizens’ perceptions of e-government<br />

services in Mexico. This study analyzes e-government adoption<br />

across four types of services: vital records (birth, death and<br />

marriage certificates), vehicle and property tax payments<br />

(ownership tax), and fine payment (traffic, parking, civil fines).<br />

All these services are provided at the state level.<br />

Mexico presents an interesting case of study for understanding egovernment<br />

perceptions. This is a risk-averse culture that tends to<br />

distrust technological innovation [6]. In addition, Mexico has a<br />

large digital and educational divides [7]. According to the 2010<br />

Census, in terms of computer and Internet access, 29% of the<br />

Mexican population has a computer at home, 21% has Internet<br />

access, 43% has a telephone line at home and 65% owns a cellular<br />

phone [7]. Almost half of Internet users utilize the Internet at<br />

home (48%) and 52% at some other location. The largest<br />

percentage of Internet users reside in medium-low households<br />

(46%) compared to 16% the high income bracket, 31% in the<br />

medium-high and 37% in the low levels. A small percentage of<br />

Internet users earned a bachelor’s degree (26%) and 2% owns a<br />

graduate degree. 42% of Internet users completed 6 th to 9 th grade<br />

of elementary education and 29% completed high school.


This paper is organized as follows: First, we provide an overview<br />

of e-government implementation in Mexico. Second, we describe<br />

the model that we will use to analyze perceptions about egovernment<br />

services. Finally, we describe the methodology that<br />

will guide the collection and analysis of data.<br />

2. OVERVIEW OF E-GOVERNMENT IN<br />

MEXICO<br />

Mexico is divided into 32 states, which are made up of 2,454<br />

municipalities. Mexico’s government is divided in three levels:<br />

Federal, State and Municipal (local). All levels of government<br />

have implemented e-Government initiatives. At the Federal level,<br />

a relevant achievement in terms of service delivery is the redesign<br />

of the “Citizen Portal” (Portal Ciudadano, http://www.gob.mx).<br />

This portal provides a search engine that acts as a single point of<br />

entry for information and services of the three levels of<br />

government. For example, a citizen considering applying for<br />

public health coverage can conduct one search to find information<br />

on the national public health care system, whether provided by a<br />

federal, state, or local government source. Simplicity and usability<br />

are the main aspects of the Portal's design.<br />

Figure 1. Citizen’s Portal (http://www.gob.mx).<br />

At the state level, a recent study evaluated the 32 State portals<br />

according to five different components: information, interaction,<br />

transactions, integration, and participation. A team of egovernment<br />

experts used a form including 143 questions to<br />

evaluate the portals. They found that Jalisco is in 1st place moving<br />

up from 5th, Aguascalientes is 2nd moving up 15 positions, Baja<br />

California moves into 3rd place from 7th last year respectively.<br />

On the other hand, Puebla, Durango y Coahuila, move down 15,<br />

12 and 9 positions, respectively [11]<br />

At the municipal level, previous research suggests that many local<br />

governments in Mexico do not have the basic infrastructure for<br />

developing a digital government strategy [8] . According to Gil-<br />

Garcia et al., 360 Mexican municipalities (out of 2,454) are<br />

considered moderately or highly technologically prepared. A<br />

more recent study that analyzed 518 local e-government websites<br />

shows that municipalities are making poor use of IT government<br />

openness, web design and Web 2.0 tools. On the demand side,<br />

services offered are not really meeting the needs of citizens [9].<br />

This might be due to the fact that “IT departments have limited<br />

influence on the main government strategies and they do not have<br />

the appropriate organizational structure, trained staff, or budget to<br />

manage a digital government strategy” (p. 2) [10].<br />

In sum, e-Government implementations at the three levels of<br />

government are evolving; not enough to understand the citizens’<br />

110<br />

needs yet, but sufficiently to promote new government services<br />

online. Studies focus mostly on the functionality characteristics<br />

of Web portals [11-13] and the public policy aspects of<br />

implementations rather than service provision [12]. There have<br />

been a few efforts to analyze the impact of e-Government and its<br />

interaction with citizens. Trust in the government and perceptions<br />

about the reliability and security of the online service delivery<br />

medium are two important drivers of service utilization in Mexico<br />

[5].<br />

3. THEORETICAL BACKGROUND<br />

Adoption of e-government refers to the citizens’ intention to use<br />

public services online, which encompasses the intentions to<br />

receive information, to provide information, and to request<br />

services electronically [14].<br />

This study uses Kumar’s model of E-government adoption [15] to<br />

explain the way citizens are embracing e-government services in<br />

Mexico. According to Kumar et. al., user characteristics, website<br />

design, service quality and satisfaction impact e-government<br />

adoption. User characteristics consist of a) perceived risk, and b)<br />

perceived control. Perceived risk refers to citizens’ concerns<br />

related to the privacy and security of transactions. Previous<br />

research suggests that Mexicans tend to prefer traditional service<br />

delivery methods when the transaction involves disclosure of<br />

personal and financial information [5]. People in Mexico distrust<br />

the Internet to conduct transactions. They also fear their<br />

information could be misused by public servants or other parties.<br />

Thus, we can expect that perceived risk will influence the<br />

behavior of the adoption. Therefore:<br />

H1) Perceived risk about online transactions will influence the<br />

adoption of e-Government services.<br />

Perceived control is defined as user’s perception of being in<br />

charge of the interaction with e-government technologies. If<br />

citizens have more control over the site navigation, the pace or<br />

rhythm of the interaction, and the content being accessed, it can<br />

increase their trust and give them a feeling of more control [15]<br />

ultimately impacting adoption [16]. Therefore:<br />

H.2) Perceived control will influence the adoption of egovernment<br />

services.<br />

Citizen traits that are of interest in understanding adoption include<br />

demographic factors such as age and education. Higher educated<br />

individuals are more comfortable using the Internet to access<br />

information and to shop [17]. Research has shown that individuals<br />

who attain a certain level of familiarity with online purchases tend<br />

to be more confident about their skills to access services online<br />

[18]. Age also influences adoption. Younger adults, especially<br />

those under age 25, are more interested in using new technologies<br />

to access information and services [17].Thus,<br />

H.3) Demographic factors (age and education) will influence the<br />

adoption of e-government services.<br />

Perceptions related to the design elements of a Web site can also<br />

have a direct impact in e-government adoption. According to<br />

Kumar et al. [15], the design of e-government Web sites can be<br />

evaluated based on their usefulness and ease of use. Perceived<br />

usefulness is considered as an extrinsic motivation. It is defined as<br />

the degree that a person assigns to the value of using a particular<br />

information system to improve its work [19, 20]. End-users could<br />

adopt e-Government services when such services deliver a better


performance compared to those provided by traditional means<br />

[21]. Use of a technological innovation can be predicted by its<br />

associated perceived usefulness [19]. Therefore,<br />

H4) Perceived usefulness will influence the adoption of e-<br />

Government<br />

Ease of use is the degree to which the user expects that the target<br />

information system to be free of efforts [19]. An e-Government<br />

service that is perceived to facilitate the interaction process while<br />

being easy to operate is likely to increase citizen’s intentions to<br />

use it [22]. Therefore,<br />

H5) Perceived ease of use will influence the adoption of e-<br />

Government services<br />

Service quality refers to citizens’ perceptions about the<br />

government’s ability to efficiently provide reliable and convenient<br />

online services [23-25]. Reichheld et al. [26] state that service<br />

quality impacts user satisfaction and, ultimately, adoption. Palmer<br />

(2002) identifies quality as a factor that builds trust towards e-<br />

Government utilization. e-Government implementations have the<br />

ability for improving significantly the quality of services provided<br />

to citizens and businesses while attaining greater efficiency for all<br />

participants (Kumar et al., 2007). Thus, understand what citizens<br />

expect from an e-Government service is crucial for governments.<br />

Therefore,<br />

H.6) Perceptions about service quality will indirectly influence<br />

adoption of e-Government services.<br />

Satisfaction is the perception of pleasure which is obtained upon<br />

receipt of a service with quality [15]. Thus, it is very important<br />

that services provided via the Internet not only to be relevant and<br />

efficient, but also they involve the goal of making the user feel<br />

well for using them and not perceived as an imposition by upper<br />

management. Therefore, we believe that:<br />

H.7) Service encounter satisfaction will influence the adoption of<br />

e-Government.<br />

Figure 2 summarizes the constructs discussed above.<br />

User Characteristics<br />

• Perceived risk<br />

• E-Government interaction<br />

• Perceived control over<br />

personal information<br />

• Demographics<br />

Website Design<br />

• Perceived usefulness<br />

• Perceived ease of use<br />

Perceived Service Quality<br />

4. METHODOLOGY<br />

Figure2. Studied Model<br />

eGovernment<br />

Adoption<br />

Users’ Satisfaction<br />

3.1 Sample<br />

We used an online survey to collect perceptions on e-government<br />

in Mexico. The survey aimed to capture information on the<br />

participants’ demographics and e-government perceptions. It<br />

included a total of 38 questions with a 7 point Likert scale ranging<br />

from completely disagree (1) to completely agree (7). An<br />

invitation to participate in the study was sent to public<br />

111<br />

organizations including the National Association of Universities<br />

and Higher Education Institutions (ANUIES in Spanish), National<br />

Institute of Statistics and Geography (INEGI) and a private<br />

financial organization with offices across Mexico. We used<br />

convenience-purposive sampling for data collection [27].<br />

Purposive sampling was appropriate for our study because we<br />

needed participants that already attained some sort of level of<br />

exposure to e-government. Participants with such profile can be<br />

especially useful to understand service utilization. We obtained a<br />

total of 217 responses; all of them were usable. Data were<br />

collected from September to December in 2011.<br />

3.2 Initial Descriptive Analysis<br />

This is a research in progress. Table 1 presents the demographic<br />

profile of participants. We are in the process of analyzing the data<br />

using multiple regression analysis. Additional results will be<br />

presented in the conference.<br />

Table 1. Demographic data<br />

Demographics Values Percentage<br />

Gender<br />

Male<br />

Female<br />

42%<br />

58%<br />

No attended 7%<br />

Finished 6<br />

Education<br />

th grade 17%<br />

Finished 9 th grade 6%<br />

High school<br />

Two-year college<br />

8%<br />

9%<br />

Bachelor 24%<br />

Master 13%<br />

PhD 16%<br />

17 years or less 13%<br />

18 to 24 years 21%<br />

Age<br />

25 - 34 years 26%<br />

35 – 44 years 18%<br />

45+ years 22%<br />

Respondents were asked which types of transactions made<br />

through electronic services; 49% paid vehicle taxes, 55% property<br />

taxes, while 44% different types of fines. Also, 56% made<br />

procedures related to vital records, and 44% responded that he<br />

made use of other services not listed previously.<br />

5. REFERENCES<br />

[1] Carter, L. E-government Diffusion: A Comparison of Adoption<br />

Constructs. AMCIS, 2007.<br />

[2] Carter, L. and Belanger, F. The Utilization of e-Government<br />

Services: Citizen trust, Innovation and acceptance factors. Info<br />

Systems, 15, 1 2005), 5-25.<br />

[3] Bélanger, F. and Carter, L. Trust and risk in e-government<br />

adoption. The Journal of Strategic Information Systems, 17, 2<br />

2008), 165-176.<br />

[4] Navarrete, C. Utilization of Electronic Government Services in<br />

México: A Matter of Trust. The Journal of Community<br />

Informatics: Special Issue: E-Governance and Community<br />

Informatics., 4, 2 2008).<br />

[5] Navarrete, C., Gil-Garcia, J. R., Mellouli, S., Pardo, T. A. and<br />

Scholl, J. Multinational E-Government Collaboration,<br />

Information Sharing, and Interoperability: An Integrative<br />

Model. IEEE, 2010.


[6] Hofstede, G. and Hofstede, G. J. Cultures and Organizations:<br />

Software of the mind, New York, USA McGraw-Hill, 2005.<br />

[7] INEGI. Censo de población y vivienda 2010. INEGI,<br />

Aguascalientes, Mexico, 2010.<br />

[8] Luna-Reyes, L. F., Gil-Garcia, J. R. and Mansi, C. Hacia un<br />

Modelo de Gobierno Electrónico a Nivel Municipal para<br />

México: Reporte de Resultados de Talleres con Directores de<br />

Informática Municipales. Universidad de las Américas<br />

Puebla-INFOTEC, Puebla, México, 2010.<br />

[9] Sandoval-Almazán, R. and Colin, J. M. Gobierno electrónico<br />

en México: una exploración Municipal 2010. Association for<br />

Information Systems, 2011.<br />

[10] Luna-Reyes, L. F., Gil-García, J. R. and Ramírez-Hernández,<br />

F. A Resource-Based View of Local Digital Government: Core<br />

Capabilities for Success from the Case of Mexico. 2011.<br />

[11] Luna-Reyes, L., J., Gil-García, R. and Rojas-Bandera, J. S.<br />

An Exploratory Study of Electronic Government and State<br />

Portals in Mexico. Idea Group Inc, 2007.<br />

[12] Sandoval Almazán, R. Explorando la Brecha Digital en<br />

México. Diagnóstico del Proyecto E-México en el Estado de<br />

México. 2006.<br />

[13] Sandoval-Almazan, R. and Gil-Garcia, J. R. The Role of the<br />

CIO in a Local Government IT Strategy: The case of Merida,<br />

Yucatán Mexico. Electronic Journal of e-Government, 9, 1<br />

2011), 1-14.<br />

[14] Al-Omari, H. and Al-Omari, A. Building an e-Government e-<br />

Trust Infrastructure. American Journal of Applied Sciences, 3,<br />

11 2006), 2122-2130.<br />

[15] Kumar, V., Mukerjil, B., Butt, I. and Persaud, A. Factors for<br />

Successful e-Government Adoption: a Conceptual<br />

Framework. The Electronic Journal of e-Government, 5, 1<br />

2007), 63-76.<br />

[16] Wu, G. Conceptualizing and Measuring the Perceived<br />

Interactivity of Websites. Journal of Current Issues and<br />

Research in Advertising, 28, 1 2006), 87-104.<br />

112<br />

[17] Pew Research Center Internet Use and Home Broadband<br />

Connections Jul 24, 2012.<br />

[18] Carter, L. and Weerakkoddy, V. E-government Adoption: A<br />

Cultural Comparison. Information Systems Frontiers, 10, 4<br />

2008), 473-482.<br />

[19] Davis, F. D. Perceived usefulness, perceived ease of use, and<br />

user acceptance of information technology. Mis Quarterly,<br />

13,31989), 319-340.<br />

[20] Lederer, A. L., Maupin, D. J., Sena, M. P. and Zhuang, Y.<br />

The technology acceptance model and the world wide web.<br />

Decision Support Systems, 29:32000), 269-282.<br />

[21] Plana, C., Cerpa, N. and Bro, P. B. Bases para la creación de<br />

una metodología de adopción de comercio electrónico para las<br />

Pymes chilenas. Universidad Tarapacá, facultad de<br />

ingeniería, volúmen 142006), 49-63.<br />

[22] Warkentin, M., Gefen, D., Pavlou, P. A. and Rose, G. M.<br />

Encouraging Citizen Adoption of e-Government by Building<br />

Trust. Electronic Markets, 12, 3 2002), 157-162.<br />

[23] Carter, L. and Belanger, F. The Utilization of e-government<br />

Services: Citizen trust, Innovation and Acceptance Factors.<br />

Information Systems Journal, 152005), 5-25.<br />

[24] Reddick, C. G. Citizen Interaction with E-Government: From<br />

the Streets to Servers? Government Information Quarterly,<br />

222005), 38-57.<br />

[25] Welch, E. W., Hinnant, C. C. and Moon, J. M. Linking<br />

Citizen Satisfaction with E-Government and Trust in<br />

Government. Journal of Public Administration Research and<br />

Theory, 15, 3 2004), 371-391.<br />

[26] Reichheld, F. F., Markey, R. G. and Hopton, C. E-customer<br />

loyalty – applying the traditional rules of business for online<br />

success. European Business Journal, 12, 4 2000), 173-179.<br />

[27] Neuman, W. L. Social Research Methods (5th Edition).<br />

Allyn and Bacon, Boston, 2000.


Session 5<br />

Information Sharing, Models &<br />

Platforms


Factors Influencing Exchange Activities in Transnational<br />

Knowledge Networks: The Case of the Hajj-MDSS<br />

Mohammed Gharawi<br />

The Institute of Public Administration<br />

P.O. Box 205<br />

Riyadh, 11141, Saudi Arabia<br />

+1 966 476 8888<br />

gharawima@yahoo.com<br />

ABSTRACT<br />

This paper presents selected results from a study of technical,<br />

information, and knowledge exchange in Transnational Public<br />

Sector Knowledge Networks (TPSKNs). The study contributes to<br />

the growing base of theory relating to TPSKNs presented by<br />

Dawes, Gharawi, and Burke [7]. It explores the TPSKN formed<br />

between the United States Center for Disease Control and the<br />

Saudi Arabian Ministry of Health ahead of the 2009 Hajj, one of<br />

the largest mass gathering events in the world. Data collected<br />

from semi-structured interviews with key participants and a<br />

variety of secondary data that were analyzed with an inductive<br />

approach to identify and address the impact of the influential<br />

factors on attaining the stated goals of the collaboration. The<br />

study extends the current knowledge-base regarding TPSKNs into<br />

a new transnational context, and a new policy domain, public<br />

health. It expands upon the considered contexts to include<br />

technological context, central when exchange centers on<br />

implementing a new system or adopting an existing system. The<br />

study also expands understanding of the influential factors<br />

deriving from knowledge and information; organizational; and<br />

national layers of context.<br />

Categories and Subject Descriptors<br />

K.4 COMPUTERS AND SOCIETY, K.4.1 Public Policy Issues,<br />

Transborder Data Flows<br />

General Terms<br />

Theory, Management<br />

Keywords<br />

Transnational Public Sector Knowledge Networks, Knowledge<br />

Sharing, Information Sharing, Cross-Cultural Collaboration, the<br />

Hajj, Saudi Ministry of Health, Center for Disease Control<br />

1. INTRODUCTION<br />

In the era of globalization, governments around the world are<br />

increasingly engaging in Transnational Public Sector Knowledge<br />

Networks (TPSKNs) as appropriate mechanisms for dealing with<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

113<br />

Theresa Pardo<br />

Center for Technology in Government<br />

SUNY Albany<br />

187 Wolf Rd., Suite 301, Albany, NY 12205<br />

+1 518 442 3892<br />

tpardo@ctg.albany.edu<br />

a host of global problems that no one nation or single government<br />

is well-positioned to address individually. Environmental quality,<br />

public health, international trade, and relief efforts relating to<br />

natural disasters are just a few areas where technology,<br />

information, and knowledge need to cross national and cultural<br />

boundaries through channels and mechanisms that are more agile<br />

and less controlled than the formal interactions among sovereign<br />

states [1].<br />

While these networks represent a novel approach to addressing<br />

critical global issues and concerns, they also provide opportunities<br />

for governments to build and diversify their capacities in various<br />

areas and domains. These networks are a key feature of world<br />

order in the twenty-first century, allowing government officials<br />

and organizations to work outside of the formality of sovereign<br />

states to exchange information and coordinate activities to address<br />

problems on a global scale [2].<br />

Several authors have discussed these networks conceptually, and<br />

have described the possibility of empowering them to build<br />

governance capacity around the world [2-5]. There has been little<br />

research conducted, however, which empirically investigates the<br />

complexities surrounding the main function of these networks: the<br />

exchange of different types of content. The dearth of rigorous<br />

study into this phenomenon represents a gap in the pertinent<br />

literature, and a gap in the knowledge available to those<br />

government practitioners who are most likely to engage in these<br />

relationships.<br />

The dearth for theoretical foundations in this area magnifies the<br />

practice gap related to TPSKNs. There have been many binational<br />

memoranda of understanding signed during the past few<br />

years to promote the exchange of technology, knowledge,<br />

information, and practices between governmental agencies; only a<br />

few such documents, however, have been written to guide<br />

practitioners in establishing strategies to manage and guide such<br />

networks. As a result, practitioners engaging in these networks<br />

often lack a clear understanding of the intended nature and<br />

function of a given TPSKN, and further, of the factors which<br />

might promote or hinder its success.<br />

The Center for Technology in Government (CTG) at the State<br />

University of New York at Albany (SUNY) has recently studied<br />

the topic of Transnational Public Sector Knowledge Networks<br />

(TPSKNs) through a National Science Foundation-sponsored<br />

project titled, “Understanding Transnational Public Sector<br />

Knowledge Networks”. The focus of the CTG project centered on<br />

international collaborative efforts to monitor air quality and<br />

reporting initiatives involving the United States and Mexico, and<br />

the United States and China. The project explored the issues


arising as a result of these two bi-lateral collaborations and<br />

analyzed the actual experiences of government and partner<br />

organizations. The resultant conclusions lay the foundation for<br />

future work that goes beyond description, to build a more robust<br />

theory of transnational knowledge- and information-sharing to<br />

better address global problems [6, 7].<br />

This study extends current knowledge about TPSKNs into a new<br />

transnational context involving US and SA and a new policy<br />

domain; public health. It expands context to include technological<br />

context when exchange is centered on implementing a new system<br />

or adopting an existing system. The study also expands<br />

understanding of the influential factors deriving from knowledge<br />

and information; organizational; and national layers of context.<br />

This paper presents selected results from the study that addresses<br />

the following research questions:<br />

o What were the critical factors influencing sharing and<br />

exchange activities during the adoption of the Hajj Mobile<br />

Disease Surveillance System (Hajj-MDSS)?<br />

o What is the impact of the identified factors on attaining the<br />

stated goals of the collaboration?<br />

2. LITERATURE REVIEW<br />

The study is guided by the Dynamic Model of Transnational<br />

Knowledge Networks (DMTKN) developed recently by group of<br />

researchers at the Center for Technology in Government (CTG) at<br />

the University at Albany [6, 7]. The model depicts the contextual<br />

complexity surrounding sharing activities in TPSKNs (Figure 1).<br />

It identifies the contextual elements that characterize the external<br />

and internal environments of the individual organizations that<br />

participate in such networks. These contextual factors are<br />

presented in the model as three layers of complexity: information<br />

and knowledge content; organizational context; and national<br />

context.<br />

Figure 1. Dynamic Model of Transnational Knowledge<br />

Networks [7]<br />

The content layer represents the characteristics of the knowledge<br />

and information being exchanged. Content layer captures the<br />

influence of the existing characteristics of information, and<br />

knowledge being exchanged. Many factors can influence sharing<br />

activities at content layer. While some of these factors are relevant<br />

regardless of the type of content that is exchanged, others become<br />

important only for specific types of content. Thus, the first factor<br />

114<br />

to examine at content layer is the type of content [8]. Following<br />

that, value and sensitivity are to be explored, as they represent two<br />

additional, important factors to be considered when any type of<br />

content is exchanged [9-11] . In the case of information exchange,<br />

the degree of standardization and the existence—or lack thereof—<br />

of metadata describing the information represent additional<br />

factors that has to be considered [9]. Finally, knowledge exchange<br />

is influenced by the degree of embeddedness and articulability of<br />

the exchanged knowledge [13, 14]. Table [1] lists and defines all<br />

such factors which might influence exchange activities at the<br />

content layer of complexity as proposed by the DMTKN.<br />

Table 1. Factors related to technical, information, and<br />

knowledge content<br />

Factor Definition<br />

Type Refers to the type of content being<br />

exchanged (technology, information, or<br />

Value<br />

Sensitivity<br />

knowledge).<br />

Refers to the extent to which the content<br />

being exchanged is perceived as an<br />

organizational, social, or governmental<br />

asset.<br />

Refers to the qualities which make the<br />

exchanged content vulnerable to misuse<br />

or misunderstanding.<br />

Data standards Refers to the extent to which there are<br />

and definitions standard data formats and definitions.<br />

Embeddedness Refers to the degree to which knowledge<br />

is situated in or generated by ongoing<br />

practice and learning by doing.<br />

Articulability Refers to the extent to which knowledge<br />

can be expressed in language, number,<br />

formal procedures, and explicit<br />

techniques.<br />

The organizational context embodies the structures, capabilities,<br />

and constraints of the governmental units involved in the<br />

exchange [6]. The DMTKNs identifies many organizational-level<br />

factors that may influence the effectiveness of TPSKNs. These<br />

factors include the goals and interests of participating<br />

organizations, trust, executive support and organizational<br />

commitment, risks, costs, benefits, authority and hierarchical<br />

structures, organizational culture, leadership, organizational rules<br />

procedures, and regulations, resources, and absorptive capacity [9,<br />

15-18]. Table [2] presents definitions for all such factors.<br />

The national context layer corresponds to the cultures and<br />

political systems surrounding the interaction [1]. Characteristics<br />

of the external environment are likely to influence the sharing in<br />

TPSKNs as indicated by previous research. A review of the<br />

factors which might impede sharing activities at the national level<br />

points to five main factors: national culture [16, 19, 20], laws and<br />

policies [9, 12, 18], political support and interests [15], language<br />

differences [21, 22], and geographic location [14, 22]. Table [3]<br />

presents definitions for the stated factors.<br />

The layers of context, surrounding each participating<br />

organization, represent one of several components of the DMTKN<br />

that emphasize the importance of context in two specific ways.<br />

First, the model depicts the influence of the three layers being<br />

discussed. Second, the layers of context and domestic


elationships among network actors in each country contributes to<br />

a set of contextual distances which represent the differences, in<br />

kind or degree, between the international actors on a set of<br />

influential dimensions: culture, politics, goals and intentions,<br />

organizational factors, ability to form relationships, types and<br />

extent of knowledge, types and extent of resources, physical<br />

location, and available technologies [6, 7]. Variations on these<br />

dimensions form the contextual differences in each country<br />

which, in turn, influence the nature and performance of exchange<br />

processes and interactions and, consequently, products and<br />

performance of TPSKNs [6, 7].<br />

Table 2. Factors related to organizational context<br />

Factor Definition<br />

Goals and<br />

Interests<br />

Trust<br />

Refers to the extent to which participants’<br />

goals and interests are consistent with one<br />

another.<br />

Refers to the degree of confidence or faith in<br />

the intentions and behavior of others (or the<br />

lack of such confidence or faith).<br />

Executive Refers to the extent to which executives and<br />

support and top-level managers from participating<br />

organizational organizations are involved and willing to<br />

commitment commit resources, provide incentives, and<br />

offer direction.<br />

Risks Refers to the extent to which participants<br />

believe their environment, actions, or<br />

relationships threaten something of current<br />

or potential value to their organizations.<br />

Costs Refers to the kind or amount of current or<br />

expected resources and other investments<br />

required of participating organizations.<br />

Benefits Refers to positive results or returns, which<br />

can be financial, societal, political, or<br />

associated with mission performance.<br />

Authority and<br />

hierarchical<br />

structures<br />

Organizational<br />

culture<br />

Leadership<br />

Organizational<br />

rules,<br />

procedures,<br />

and regulation<br />

Resources<br />

Absorptive<br />

Capacity<br />

Refers to formal legal powers, legitimacy,<br />

differences in hierarchical structures, and<br />

formal control over actors and activities.<br />

Refers to commonly accepted and shared<br />

beliefs, values, and practices within the<br />

organization.<br />

Refers to participants’ behavior, such as<br />

taking personal responsibility for actions and<br />

outcomes, providing guidance or direction,<br />

exerting influence, and giving rewards or<br />

punishment.<br />

Refers to the routine, formal policies<br />

defining the ways in which organizations<br />

accomplish their work.<br />

Refers to the extent to which expertise,<br />

funding, infrastructure, staff, technology, or<br />

other suitable organizational assets are made<br />

available.<br />

Refers to the organization’s ability to<br />

identify, assimilate, and exploit knowledge<br />

from the environment.<br />

115<br />

Table 3. Factors related to national context<br />

Factor Definition<br />

Culture<br />

Laws and<br />

policies<br />

Refers to commonly accepted and widely<br />

shared beliefs, values, and practices within a<br />

country.<br />

Refers to formally adopted requirements,<br />

limitations, or obligations which shape and<br />

Political<br />

constrain work practices.<br />

Refers to the support of elected officials and<br />

support<br />

government leaders.<br />

Language Refers to the languages of the participants.<br />

Geographic<br />

location<br />

Refers to geographic or geo-political<br />

locations of the countries involved in the<br />

collaboration.<br />

This study relied on case study methods to identify the factors that<br />

influenced technical, knowledge, and information exchange<br />

during the collaboration between the United States (US) Centers<br />

for Disease Control and Prevention (CDC) and the Kingdom of<br />

Saudi Arabia (KSA) Ministry of Health (MoH) that led to the<br />

adoption of the Hajj Mobile Disease Surveillance System (Hajj-<br />

MDSS) in 2009. In the following two sections, A brief discussion<br />

of the Hajj-MDSS case is provided followed by an overview of<br />

the methods.<br />

3. THE HAJJ-MDSS<br />

The Hajj-MDSS initiative is led by the KSA MoH and US CDC.<br />

It allows rapid detection of infectious diseases among Hajj<br />

pilgrims and enhances prevention and control measures through<br />

real-time surveillance information for public health decisionmaking.<br />

The initiative was launched during the period when swine<br />

flu (Pandemic Influenza A, H1N1) had been declared a global<br />

pandemic. The conditions of the Hajj magnified the risks<br />

associated with H1N1. The Hajj is one of the largest, most<br />

culturally and geographically diverse mass gathering events in the<br />

world, attracting more than 2.5 million people of different<br />

nationalities, languages, races, and genders in Makkah. The<br />

guiding vision was to ensure the well-being of Hajj pilgrims and<br />

therefore maintain global public health security. When H1N1 was<br />

declared a global pandemic in June 2009, the Saudi MoH<br />

organized an international workshop of leading global public<br />

health organizations including the World Health Organization<br />

(WHO), the US CDC, and similar institutions in Europe,<br />

Australia, and China. The goals were to pool public health<br />

knowledge about mass gatherings and review the KSA<br />

preparedness plans, focusing on prevention and control of H1N1<br />

[23]. One recommendation was to implement a Mobile Disease<br />

Surveillance System to monitor the epidemiology of swine flu<br />

among Hajj pilgrims.<br />

Immediately following the workshop, the Saudi MoH officially<br />

requested a proposal from the CDC as it has prior experience<br />

using and adopting such technology in many places around the<br />

world. The Request for Proposal (RfP) was followed by extensive<br />

knowledge- and information-exchange through four main phases.<br />

First was the preparation phase, in which participants worked<br />

toward creating a shared understanding and identifying the<br />

responsibilities of each side. In the second phase, a group of<br />

epidemiologists from the US CDC assisted their counterparts at<br />

the Saudi MoH in developing and customizing the electronic


forms for the system. At the same time, the CDC and the MoH<br />

were coordinating their efforts to obtain the necessary technical<br />

resources. During the third phase, participants conducted several<br />

training sessions to train Saudi public health practitioners on how<br />

to use the system and operate the advanced mobile devices used<br />

with it. They also pilot-tested the system during Umrah—an<br />

Islamic ritual performed at Makkah anytime of year. In the final<br />

phase, participants deployed the system and formed one team to<br />

ensure the effective functioning of the MDSS via timely and<br />

accurate data analysis, and reported the results to top-level<br />

management during the days of the Hajj.<br />

During the four phases of the Hajj-MDSS implementation,<br />

participants exchanged a variety of content. Table [4] lists the<br />

content exchanged among participants, and specifies the content<br />

type. Content type is identified based on the extent to which<br />

content was expressed in written form, the extent to which it<br />

adhered to formal procedures, and the extent to which it<br />

conformed to explicitly stated techniques.<br />

Table 4. Content exchanged during Hajj-MDSS adoption<br />

Phase Content (Type)<br />

Preparation<br />

Technical resource<br />

acquisition and forms<br />

development<br />

Training and pilot<br />

testing<br />

Execution<br />

Information about the context of<br />

the Hajj (Explicit.)<br />

Proposal (Explicit &Tacit)<br />

Forms Design (Tacit)<br />

Systems Requirements<br />

(Explicit)<br />

Training materials (Explicit & Tacit)<br />

Installations (Tacit)<br />

System implementation and<br />

troubleshooting (Tacit)<br />

System’s data (Explicit)<br />

After five months of technical exchange, professional visits, and<br />

joint work, the Hajj-MDSS made its official debut during the<br />

2009 Hajj. The system provided public health officials in KSA<br />

with access to timely and accurate information. They were also<br />

able to monitor nine distinct infectious diseases, and make timely<br />

decisions in responding to unexpected situations. By the end of<br />

the 2009 Hajj, only 73 cases of pilgrims with confirmed pandemic<br />

influenza A (H1N1) were reported, and the Hajj was declared a<br />

success [24].<br />

4. RESEARCH METHODS<br />

This research explores exchange activities in TPSKNs and<br />

identifies the factors which might influence the achievement of<br />

participants’ goals and objectives in TPSKNs. The goal of the<br />

study is to extends the current knowledge-base regarding TPSKNs<br />

into a new transnational context, and a new policy domain, public<br />

health. This is achieved by relying on case study methods to<br />

identify the factors influenced the collaboration between the US<br />

CDC and SA’s MoH leading to the adoption of the Hajj-MDSS in<br />

2009. Given the goal of this research and the Hajj-MDSS case<br />

being introduced, the case study approach is most appropriate, as<br />

its main strength lies in its attempts to efficiently reconcile<br />

complexity, detail, and context [25].<br />

Qualitative data has been collected from in-depth, semi-structured<br />

interviews conducted in person, as well as various secondary data<br />

116<br />

sources, including: government documents, participants’ official<br />

websites, training materials, system manuals, news articles, and<br />

related publications. Nine government officials working for the<br />

Saudi MoH, along with three government officials working for the<br />

US CDC, participated in this study. All participants played critical<br />

roles in the project, and most were involved in all phases of the<br />

project’s implementation. Participants also represent different<br />

management levels, and organizational departments and units. A<br />

purposive sampling using a snowball method was used to identify<br />

individuals for interviews, starting with a single manager at the<br />

Saudi MoH.<br />

Two CDC participants preferred to respond in writing; interview<br />

questions were sent to them, and they responded in writing to the<br />

interview questions. Each in-person interview lasted from 1 to 2<br />

hours. Several participants were contacted later, by phone, to<br />

obtain additional information and for the purposes of clarification.<br />

As all Saudi-side participants being interviewed are native Arabic<br />

speakers, all such interviews were thus conducted in Arabic, as<br />

was the interview conducted with one participant from the CDC<br />

who is native Arabic speaker. The two CDC experts who<br />

preferred to respond in writing received an English version of the<br />

research questions and responded in English.<br />

The unit of analysis of the study is the collaboration aimed at<br />

ensuring the successful implementation of the Hajj-MDSS. The<br />

unit of observation of the study is the individual organizations<br />

who participated in this collaborative effort. The interview data<br />

was transcribed and analyzed in Arabic, and the data collected<br />

from the written response of CDC participants, along with the<br />

aforementioned secondary data sources, were analyzed in English.<br />

All collected data was coded and analyzed with an inductive<br />

approach.<br />

In the course of conducting data analysis, the qualitative software<br />

tool (Atlas-ti) has been used to support coding and analysis<br />

activities. Coding was conducted following two separate<br />

approaches proposed by Strauss and Corbin [26], open coding and<br />

axial coding. Open coding refers to the process of reducing the<br />

data to a small set of themes which appear to describe the<br />

phenomenon being studied. In the context of this research, codes<br />

were added to the coding book when data pointed to any new<br />

concept that could refer to an actor, a product, a process, or a<br />

factor influencing the sharing activities in TPSKNs. The outcome<br />

of this step was a series of different concepts representing the<br />

meaning of the data. After completing the open coding, an axial<br />

coding approach was applied. This process involves putting data<br />

together in new ways by making connections between the already<br />

identified concepts. This was achieved by organizing the initial<br />

codes into different categories which reflected the questions of<br />

interest to this research.<br />

5. FACTORS INFLUENCING TPSKNS<br />

Within the case study, a number of factors influenced technical,<br />

knowledge, and information exchange during the collaboration<br />

toward the adoption of the Hajj-MDSS were identified. This<br />

section discusses these factors in four broad contexts:<br />

technological; knowledge and information; organizational; and<br />

national contexts.<br />

5.1 Technological Context<br />

The collaboration toward adopting the Hajj-MDSS was influenced<br />

by several technical factors as the collaboration involves transfer<br />

of a system to suit a new context. Ease of use, the ability to meet


technical requirements, system features, compatibility, and ICT<br />

infrastructure were identified as main technical factors which<br />

influenced the effectiveness of technical exchange between the<br />

Saudi MoH and CDC.<br />

5.1.1 Ease of Use<br />

The system as implemented is perceived as being easy to use as<br />

revealed by the case study. Participants representing the Saudi<br />

team said: “The system, as a system, was not so complicated.”,<br />

“The system is very user friendly from the perspective of the end<br />

user.” The ease of use of the implemented system minimized the<br />

time and energy required to learn how to use it, and increased the<br />

likelihood of successful adoption within the available time frame<br />

as pointed out by one participant: “Understanding the system and<br />

how it works did not represent an issue for us at all, and we were<br />

able to learn it in a short period of time.”<br />

5.1.2 The Ability to Meet Technical Requirements<br />

The ready availability of the required hardware smoothed the<br />

acquisition of the required resources, which in turn accelerated the<br />

implementation process for the Hajj-MDSS. Participants were<br />

able to avoid challenges stemming from a lack of the required<br />

technical resources, as discussed by participants: “There were no<br />

challenges associated with obtaining the required hardware<br />

devices. The purchasing process was handled smoothly, and was<br />

completed in about one day. The servers, too, were readily<br />

available and inexpensive.”<br />

5.1.3 System Features<br />

The study points to the importance of considering national and<br />

organizational contexts during the selection process of any system<br />

to be adapted to suit a new context. In this instance, the selected<br />

software lacks important features such as the support for Arabic<br />

and the Hijri Calender (HC), which is the official calendar in<br />

Saudi Arabia. Top level management at the Saudi MoH adjusted<br />

to these limitations, and agreed to move forward using the<br />

Gregorian calendar and English language. These limitations did,<br />

however, place an undue burden on those Saudi public health<br />

practitioners who worked with the system, as top level<br />

management at the MoH decided to maintain the existing paperbased<br />

system while integrating the new one.<br />

5.1.4 Compatibility<br />

The selected software relies on Extensible Markup Language<br />

(XML) to facilitate the sharing of structured data across the<br />

different components of the MDSS. While XML is becoming the<br />

standard for electronic data exchange and serves the needs of the<br />

implemented system well, it also carries with it some particular<br />

disadvantages which negatively influenced the potential<br />

effectiveness of the system. In this instance, there was other<br />

required software which was incompatible with XML files. Most<br />

importantly, the XML data format is not compatible with the<br />

InstantAtlas software used to display data for decision makers. To<br />

display the data using InstantAtlas, participants had to translate<br />

the XML data file to a discrete data file manually, which was a<br />

time consuming process. The process influenced the quality of<br />

displayed data to some extent.<br />

5.1.5 ICT Infrastructure<br />

The implemented system is dependent on two telecommunication<br />

modalities: the Internet and a cellular network. The use of these<br />

communication modalities peaked during the Hajj, and resulted in<br />

congested communication traffic, which in turn negatively<br />

117<br />

influenced the functionality of the system during the 2009 Hajj, as<br />

discussed by multiple participants: e.g. “The system relies on a<br />

communication network to facilitate the transfer of data from the<br />

field and public health facilities to the server, using the mobile<br />

phones' SIM cards and the Internet. Network traffic peaked during<br />

the days of the Hajj, leading to critical technical challenges, but<br />

there was no way to discover these challenges prior to the onset of<br />

the implementation process.”<br />

5.2 Knowledge and Information Context<br />

The case study identified codifiability, perception of the content’s<br />

value, sensitivity, and confidentiality as additional factors that<br />

influenced the effectiveness of knowledge and information<br />

exchange during the collaboration toward adopting the Hajj-<br />

MDSS.<br />

5.2.1 Codifiability<br />

A portion of the content exchanged was explicit and easily<br />

expressed in written form [Table 4]. The case study found that this<br />

type of content is easy to share among TPSKN participants. The<br />

ready and frequent exchange of such content allowed participants<br />

to speed up the implementation process, in turn allowing more<br />

time for the exchange of the type of tacit content which required<br />

direct interaction. One clear example of this type of content is the<br />

system requirements that CDC experts sent to their counterparts in<br />

the MoH in written form. Saudi IT specialists commented that the<br />

system’s requirements were clear, and they did not encounter any<br />

difficulties in interpreting them: “The CDC gave us the database<br />

design and the technical specifications of the needed resources.<br />

We studied these specifications on our own and obtained the<br />

required smart phones, servers, and other technical resources.”<br />

5.2.2 Value<br />

All interviewees noted the high degree of transparency, and<br />

stressed that content was freely exchanged between both sides.<br />

One Saudi participant commented: “Any time we were set to<br />

conduct an activity which required the exchange of specific<br />

expertise, we found [the CDC] here and willing to assist.”<br />

Similarly, one CDC participant noted, “We were able to access all<br />

of the information we needed to conduct our work.”<br />

The study focused on data stored within the system. This data<br />

consists of both important information about reported cases and<br />

confidential patient information. Participants answered questions<br />

related to their perception of the value, sensitivity, and<br />

confidentiality of this data. The case study revealed that the value<br />

of this data was limited to decision making during the Hajj, and<br />

for subsequent research purposes. The Saudi MoH presented no<br />

obstacles or objections to sharing this data with researchers. As<br />

the CDC experts were there to assist in decision-making, this<br />

attitude facilitated the exchange of system data amongst and<br />

between all participants as revealed in the case study.<br />

5.2.3 Sensitivity<br />

In this case, while participants from the Saudi side discussed the<br />

insistence of the Saudi MoH on having control over the data<br />

stored within the system as they consider such data as being<br />

sensitive, the preference for having full control over the data did<br />

not influence the intention to share that data with the CDC, as the<br />

study has shown. This would not have been the case, however, if<br />

the intention of the CDC had been to secure full access, retain full<br />

control over the data, or connect the system to other existing<br />

systems. Providing evidence for the latter statement requires


further investigation of the relationship between the “intention to<br />

have control” and “the intention to share”, presenting one avenue<br />

for further research.<br />

5.2.4 Confidentiality<br />

The system’s data was considered to be confidential by<br />

participants representing the Saudi MoH as it contains patients’<br />

information. Such confidentiality did not prevent the CDC team<br />

from accessing the data required to conduct their work effectively<br />

and efficiently, although it did restrict the means of access, as<br />

explained in following quote: “Data were all secured, and located<br />

in the server, so that no individual could gain access to it without<br />

prior permission. The specialists from the CDC were able to<br />

access some data independently, and we provided them with the<br />

aggregated data as needed, so that they could assist us in the<br />

analysis. As a result, they were able to access the aggregated data,<br />

and there was no pressure exerted on their part regarding full data<br />

access.”<br />

5.3 Organizational Context<br />

A number of organizational-level factors were identified in the<br />

course of the case study. These factors include: goals and<br />

interests, values, trust and past relationships, executive support,<br />

authority and hierarchical structures, leadership, resources, skills,<br />

capabilities, commitment, organizational culture, and perceived<br />

risk.<br />

5.3.1 Goals and Interests<br />

The goals and interests of participating organizations played<br />

significant roles in bridging the intention distance, and thus in<br />

promoting and sustaining the collaboration. This can be attributed<br />

to three distinct factors: the alignment between the goals of<br />

collaboration and the respective missions and visions of both the<br />

Saudi MoH and the CDC; the consistency of the goals of<br />

collaboration amongst the various participants; and, mutual<br />

interest.<br />

For the Saudi MoH, the Hajj-MDSS discussed in this case study<br />

represents one element of a larger set of tools and strategies which<br />

were implemented to address the challenges imposed by the<br />

H1N1 pandemic during the 2009 Hajj. Accordingly, the goals of<br />

implementing this system were linked to other, larger, goals. One<br />

manager at the Saudi MoH pointed out that, “The ultimate goal of<br />

this collaboration was to protect the well-being of Hajj pilgrims.”<br />

In a similar vein, the goals of the collaborative effort were closely<br />

aligned with the CDC's vision and stated mission. Historically, the<br />

CDC has used its scientific expertise to assist other countries in<br />

improving their public health capacities and conditions for more<br />

than 60 years. It follows that assisting the Saudi MoH in<br />

implementing a system for monitoring H1N1, and controlling the<br />

spread of a major global pandemic, was aligned with that part of<br />

the CDC mission which focuses on “collaborating to create the<br />

expertise, information, and tools that people and communities<br />

need to protect their health (HHS, 2012).” One participant at the<br />

CDC responded to a question asking about the primary goals of<br />

the CDC by saying: “The main purposes of all CDC international<br />

activities are two-fold: sharing experiences, and building local<br />

capacity.”<br />

Second, the consistency of the goals of collaboration amongst<br />

participants played significant role in the success of the<br />

collaboration. As revealed in the case, participants were clearly<br />

and consistently working toward achieving the same goals.<br />

118<br />

Accordingly, they were able to avoid conflicts, and focus<br />

exclusively on achieving their mutual goals. Also, working<br />

towards the same goals enhanced the productivity of participants<br />

from both sides, and led to an open environment where<br />

participants were better able to freely exchange their expertise.<br />

Finally, it is evident that the Saudi MoH was in need of assistance<br />

in implementing the Hajj-MDSS in a period covering less than<br />

five months. As such, there was a real and acute need to<br />

collaborate with the CDC, which possessed the experience and<br />

expertise required to ensure successful implementation. Regarding<br />

the CDC, participants on the Saudi side believe that the access the<br />

CDC obtained to the Hajj through this collaboration added to the<br />

accumulated experiences, and thus to the potential effectiveness,<br />

of the CDC and its researchers.<br />

5.3.2 Values<br />

Participants pointed to organizational values as one of those<br />

organizational characteristics which motivated the Saudi MoH to<br />

collaborate with the CDC. While one participant said: “The CDC<br />

is an organization that has values, and that is why the management<br />

at the MoH was so welcoming towards the idea of a collaborative<br />

effort. When the CDC’s experts come to you, they come to do the<br />

work and give you the knowledge and expertise you need. Also,<br />

they don’t flatter you, or tell you everything is OK. They get<br />

directly to the point and propose clear solutions.”, another one<br />

commented, “I recommend government organizations avoid<br />

collaboration with counterparts that look for profit, and which<br />

lack collaborative values.”<br />

5.3.3 Trust and Past Relationships<br />

Trust played a significant role in establishing, developing, and<br />

maintaining inter-organizational relationships. This was evident<br />

throughout the duration of the collaboration between the Saudi<br />

MoH and the CDC. One participant commented: “Mutual trust is<br />

the most important factor in any transnational collaboration.” The<br />

high level of trust was a product of the historical relationships that<br />

bridged relational distance. The existing relationship also helped<br />

to bridge organizational and knowledge distances, and allowed<br />

both organizations to get to know each other still further, as<br />

commented on by one of the participants: “Previous collaborative<br />

efforts contributed to the success of the system we implemented<br />

during the Hajj. We did not start from scratch, as they already had<br />

prior experiences with our program, and they were familiar with<br />

its strengths. At the same time, we knew what they had to offer,<br />

their capabilities and their skills.”<br />

5.3.4 Executive Support<br />

The case study found that the support of top executives played a<br />

critical role in promoting the collaborative process by dedicating<br />

additional resources as needed. Participants at the management<br />

level discussed the effect of executive support and involvement,<br />

and said: “The minister and the Deputy Minister of the AAPM<br />

provided unlimited support, and gave us unlimited authority to<br />

acquire all of the resources needed to ensure the successful<br />

implementation of the system.”, “The support we received from<br />

the minister played a major role in the eventual success of our<br />

collaboration with the CDC. I believe the access to our minister<br />

was very easy, and this made our entire mission easier. Without<br />

that access, and his presence and follow-ups, our work would<br />

have been much more difficult.”


5.3.5 Authority and Hierarchical Structures<br />

In this case, the main agency involved in the collaboration from<br />

the Saudi side possessed the authority to collaborate with any<br />

international agency, to address any public health issue or<br />

concern. This authority to collaborate played a significant role in<br />

initiating the transnational relationship as discussed by one top<br />

level manager at the Saudi MoH. The data also revealed that there<br />

was delegation of authority to various team members working on<br />

the project. The delegation of authority allowed participants to<br />

speed up the implementation and resource acquisition processes,<br />

as revealed in the case study. Besides, the hierarchical structures<br />

facilitated the acquisition process of all needed resources as the<br />

primary leader on the Saudi side was the Assistant Deputy<br />

Minister of Health for Preventive Medicine and at the same time<br />

the Chairman of the Supervisory Committee for Preventive<br />

Medicine during the Hajj. Through him, the team was connected<br />

directly to the Minister in all matters related to the needs of the<br />

project. On the other hand, the hierarchical structure of the CDC<br />

allowed those CDC participants who were also representing the<br />

Center for Global Health to readily acquire the needed knowledge<br />

and information resources. One participant representing the CDC<br />

team said: “The CDC’s organizational structure is more horizontal<br />

at a higher level, and that allows the CGH to get support from any<br />

subject matter expert inside the CDC, in any office.”<br />

5.3.6 Leadership<br />

Leadership was revealed as one of the critical factors positively<br />

influenced the coordination and management of all aspects of the<br />

collaboration. The formal authority of the primary leader of this<br />

collaboration on the Saudi side was used mainly to facilitate the<br />

acquisition of needed resources, as has been discussed. This<br />

formal authority to command was not evident, however, in the<br />

interaction with those participants who were assigned to work on<br />

the project from the Saudi side. In fact, the power gained through<br />

formal authority was used to guide cooperation, rather than to<br />

direct actions, as discussed by participants. In his effort to further<br />

guide cooperation, than main leader from the Saudi’s side acted as<br />

a focal point between all participants, at all levels. He explicitly<br />

stated that the most critical task in collaboration such as this is to<br />

maintain open channels of communication between all<br />

participants at all levels.<br />

5.3.7 Resources<br />

The ready availability of needed resources contributed<br />

significantly to the sustainability of the collaboration during the<br />

2009 Hajj, and to the overall success of the project. One manager<br />

commented, “The slogan of the government during the Hajj is<br />

‘take whatever resources to accomplish the work.’” He added,<br />

“All resources were in place for this project.” The case study<br />

revealed three types of resources that participants brought to bear,<br />

and which were critical for the eventual success of the<br />

collaboration: financial resources, human resources, and<br />

knowledge and information resources. The availability of funding<br />

resources was critical to the success of the collaboration in<br />

general, and central to the speed with which the proposal was<br />

agreed upon in particular. Little time had to be spent in searching<br />

for funding sources, or on negotiating funding responsibilities.<br />

Participants discussed the ways in which financial resources<br />

facilitated the acquisition of technical resources, eased logistical<br />

concerns, and facilitated the face-to-face meetings which were<br />

critical in bridging the physical distance and enhancing the ease of<br />

119<br />

communication amongst participants toward exchanging tacit<br />

content.<br />

As with regard to human resources, the Saudi MoH and the CDC<br />

each nominated highly skilled professionals to carry out the<br />

implementation. Additionally, all human resources at the Saudi<br />

MoH were made available to the project as needed. For example,<br />

the adoption of the system required trained health care<br />

practitioners to work on mobile surveillance during the Hajj.<br />

Those personnel were made available, and assigned to obtain the<br />

training required to work on the system ahead of time.<br />

Finally, both countries brought considerable surveillance expertise<br />

to the project. While the American team members were more<br />

advanced in using mobile technology in disease surveillance,<br />

Saudi participants brought to bear a greater knowledge of the<br />

unique conditions associated with the Hajj. These different forms<br />

of knowledge were needed in equal amounts to ensure a smooth<br />

and successful adoption of the system as discussed by multiple<br />

participants.<br />

5.3.8 Skills<br />

The case study revealed two skills, both of which clearly and<br />

positively influenced the eventual outcome of the collaboration<br />

between the Saudi MoH and the CDC. These skills are described<br />

as: project management skills, and team working skills. One<br />

participant pointed to the project management skills brought to the<br />

collaboration on the part of the CDC team as one of the factors<br />

that led to a successful completion within the time frame available<br />

to participants while another Saudi participant discussed team<br />

management skills, how they were able to learn those skills, and<br />

how those skills in turn played a significant role in the eventual<br />

success of the collaboration. He said: “One of the most important<br />

things was the team management skills that we were able to<br />

practice during our work with the CDC experts on this project.”<br />

5.3.9 Capabilities<br />

In addition to the enumerated skills, the case study also revealed<br />

certain capabilities that positively influenced interaction among<br />

the participants. These capabilities include the ability to work<br />

across different cultures, the ability to work across various areas<br />

and domains, and absorptive capacity. The CDC specifically<br />

recruited participants who were able to work across different<br />

cultures. Most participants from the CDC had a long history of<br />

doing so; some such prior experiences shared the Islamic cultural<br />

dimensions, as well. In addition, two CDC participants were<br />

fluent in Arabic. On the other hand, all participants recruited by<br />

the Saudi MoH were fluent in English. These characteristics<br />

facilitated communication and better understanding among all<br />

participants, as revealed by the case study. Additionally, both the<br />

CDC and the MoH assembled teams that were able to work across<br />

multiple involved areas. The ability of participants to work across<br />

involved areas bridged the knowledge distance and increased the<br />

likelihood of the project’s success. Finally, the ability of the Saudi<br />

participants to identify, assimilate, and exploit knowledge from<br />

their CDC counterparts played a significant role in achieving the<br />

CDC's goals, which were focused on building the capacity of the<br />

Saudi MoH in using mobile technology to assist in disease<br />

surveillance. One participant from the Saudi side commented:<br />

“The CDC’s experts did not express any kind of difficulty in<br />

working with us. The areas in which we work are the same areas<br />

in which they work, so there were no barriers at all.”


5.3.10 Commitment<br />

Both personal and organizational commitments were evident<br />

throughout all phases of the project and critical to both the success<br />

and the sustainability of the collaboration. The CDC provided an<br />

ideal example of organizational commitment when it continued to<br />

provide technical assistance over the following two years. At the<br />

personal level, participants from both sides were highly<br />

committed. Their commitment was most clearly demonstrated<br />

during the days of the Hajj, as they were routinely working in<br />

excess of 12 hours a day. In addition, the case study revealed that<br />

Saudi participants carried out tasks beyond their defined roles and<br />

responsibilities.<br />

5.3.11 Organizational Culture<br />

The orientation of the Saudi MoH toward transparency and<br />

openness was revealed to be an important factor throughout the<br />

course of this collaboration, and one which influenced the<br />

attitudes of participants towards sharing knowledge and<br />

information. Participants from the Saudi side discussed that<br />

orientation, and how it helped promote the eventual success of the<br />

collaboration: “It would be unreasonable to bring experts in and<br />

then withhold information from them. That simply means you will<br />

not realize the full benefits of cooperation.”<br />

The case study also found that organizational culture could<br />

impose a negative influence. This occurs when collaboration<br />

involves requirements that are not consistent with said<br />

organizational culture. For example, the system proposed by the<br />

CDC allows access to the server through the Internet. That fact<br />

was not considered by the Saudi MoH when they obtained the<br />

SIM cards however, as those purchased allowed access only to the<br />

internal network of the MoH. In this instance, the behavior of the<br />

Saudi MoH emphasized the influence of that part of the Saudi<br />

MoH's organizational culture which values security over<br />

flexibility, and control over cost-effectiveness. These differences<br />

resulted in some challenges during the preparation of the demo lab<br />

for the trainees to practice what they had learned. The challenges<br />

were resolved by participants during the training phase.<br />

5.3.12 Perceived Risk<br />

Perception of risk was identified as a critical factor that influenced<br />

the potential outcomes of the collaboration. One participant said,<br />

“The main risk was that the system would not work.”<br />

Accordingly, the top level management decided to continue<br />

operating the routine surveillance system already in place while<br />

implementing and testing the new Hajj-MDSS. While the two<br />

systems worked fine alongside one another, they resulted in high<br />

overhead costs and placed an undue burden on those health care<br />

practitioners who were reporting the cases.<br />

5.4 National Context<br />

The case study revealed five distinct factors relating to the<br />

national context. Three such factors are identified as enablers—<br />

political support, political relations, and national events—while<br />

the remaining two—national law and national language—are best<br />

described as barriers.<br />

5.4.1 Political Support<br />

Political support was evident throughout all phases of the project.<br />

The speed with which the Saudi government approved the<br />

collaboration with the CDC to implement the Hajj-MDSS, and the<br />

funds it provided, demonstrated the role that political support<br />

plays in initiating, sustaining, and shaping the outcomes of<br />

120<br />

collaboration with the CDC. Top level managers at the Saudi<br />

MoH discussed the positive effects of political support in detail:<br />

e.g. “The AAPM received unlimited support from the government<br />

and the minister. That support opened plenty of doors for us, and<br />

without it we wouldn’t have been able to accomplish anything.”<br />

5.4.2 Political Relations<br />

In this case, the strong relations between the KSA and the US<br />

bridged political distance and led to a stable collaborative<br />

environment, which facilitated the joint activities of participants<br />

and improved the outcome of the entire collaborative endeavor.<br />

Top level management from the Saudi side discussed the roles<br />

that strong political relations had played in facilitating the<br />

logistical issues such as entry visas. Also, they believed that prior<br />

collaboration at the political level had helped to promote<br />

collaboration with the CDC, and served to enhance the eventual<br />

outcomes. Leaders at the CDC shared a similar outlook, and<br />

pointed to the relationship between the US and the KSA as a<br />

facilitator for achieving better public health outcomes. One CDC<br />

participant did state, however, that the CDC’s intention to<br />

collaborate with any country that needs assistance is never<br />

influenced by how that country relates to the US at the political<br />

level.<br />

5.4.3 National Events<br />

Participants pointed to the Hajj and its importance as one of the<br />

main success factors. They discussed different aspects of the<br />

project that were promoted by the fact that the project was<br />

implemented to serve the Hajj and ensure the well-being of<br />

pilgrims. One example of what they said: “If this collaboration<br />

was initiated for a purpose other than the Hajj, or under different<br />

conditions, there would be many more barriers relating to existing<br />

rules and procedures. During the Hajj, all restricting procedures<br />

and bureaucracy diminish, and that contributed to the success of<br />

the project.”<br />

5.4.4 National Laws<br />

The existing laws of the KSA prevent non-Muslims from gaining<br />

entry to the holy cities of Makkah and Al-Madinah. Accordingly,<br />

the core CDC trainers were not able to conduct the last session of<br />

the first phase of training, which was planned to be held in<br />

Makkah. In addition, non-Muslim experts were unable to<br />

accompany the team to Makkah during the execution phase. Thus,<br />

the law added restrictions on the selection process of participants<br />

who provided direct assistance during the Hajj.<br />

5.4.5 National Language<br />

While language did not represent a challenge at the level of the<br />

individual participants, as all participants from the Saudi side<br />

were fluent in English, the influence of national language was<br />

evident on other aspects of the project. One was the lack of<br />

Arabic-language support in the software used, which placed<br />

burdens on participants, as discussed previously. The national<br />

language also increased the amount of effort and energy that<br />

participants from both sides were asked to contribute, to ensure<br />

the successful completion of the training phase. While one<br />

participant took the time to translate the CDC’s training materials<br />

to Arabic, other participants who were fluent in both Arabic and<br />

English were able to act as translators for those health care<br />

practitioners who were not fluent in English during the training<br />

sessions conducted by the main CDC trainers.


6. DISCUSSION<br />

This study expands the concepts and understanding of the factors<br />

related to the three predefined layers of contexts, knowledge and<br />

information content, organizational, and national contexts.<br />

Related to the knowledge and information layer of context, the<br />

case study revealed four factors: codifiability; perceptions of the<br />

content’s value; sensitivity; and, confidentiality. The study<br />

pointed to new ways in which the perceptions of a specific<br />

content’s sensitivity and confidentiality might influence exchange<br />

activities in TPSKNs. As revealed in the case study, the<br />

perception by Saudi participants of the system’s data as being<br />

sensitive did not influence their intention to exchange that data<br />

with their CDC counterparts, although said perception did<br />

influence their intention and desire to have full control over that<br />

data. The same phenomenon can be seen with regards to<br />

confidentiality, in that Saudi perceptions of confidential data—or<br />

data which should be seen as being confidential—did not prevent<br />

the CDC team from accessing the data required to conduct their<br />

work, although it did restrict their means of access to that data.<br />

The case study expands the concepts and understanding of the<br />

factors related to the organizational layer of context as well. These<br />

factors include: goals and interests; trust and past relationships;<br />

executive support; authority and hierarchical structures;<br />

leadership; resources; skills; capabilities; commitment;<br />

organizational culture; and, perceived risk. This research<br />

identified the perceptions of partner’s values as one of those<br />

additional organizational level factors which motivated<br />

collaboration in TPSKNs. Also, the case study discusses the ways<br />

in which the identified factors influenced exchange activities<br />

during the collaboration toward adopting the Hajj-MDSS.<br />

As with regard to the national layer of context, the study discussed<br />

five factors. These factors include: political support; political<br />

relations; national events; national law; and, national language.<br />

The case provided empirical evidence for the influence of these<br />

identified factors and expanded the understanding on the ways in<br />

which they may influence the effectiveness of TPSKNs. For<br />

instance, the case study found that the intention to collaborate<br />

with another country that needs assistance toward addressing<br />

global issues and concerns may not be influenced by relation at<br />

political level while the strong relations at political level still<br />

proved to be significant for ensuring better outcomes. Also, the<br />

influence of national language found to be evident even when all<br />

participants from both sides are fluent and able to speak the same<br />

language.<br />

As the case study was centered on adopting an existing system to<br />

suit a new context, It expands upon the considered contexts to<br />

include a technological context, central when collaboration<br />

centers on implementing a new system or adopting an existing<br />

system. Five distinct factors related to the technological context<br />

were evident in this case. Ease of use, compatibility with other<br />

systems, ICT infrastructures, the ability to meet technical<br />

requirements, and the additional system features, such as culturalrelated<br />

dimensions—e.g. software capable of supporting different<br />

languages and calendars— were identified as additional factors<br />

influencing exchange activities in TPSKNs. Figure 2 depicts the<br />

factors influencing exchange activities in TPSKNs, discussed<br />

above and informed by the collaboration between the MoH and<br />

CDC aimed at implementing the Hajj-MDSS during the 2009<br />

Hajj.<br />

121<br />

Figure 2. Factors Influenced Sharing and Exchange<br />

Activities during the Adoption of the Hajj-MDSS<br />

7. LIMITATIONS AND FUTURE WORK<br />

The research design and methods used by this study have<br />

employed several measures meant to ensure the reliability and<br />

validity of the research and its conclusions. As with any research<br />

endeavor, however, this study is limited in certain respects. One<br />

of the main limitations stems from the low matching level<br />

between those participants representing the Saudi MoH and those<br />

representing the US CDC available to be interviewed as part of<br />

this research. The study faced specific challenges in this regard, as<br />

some CDC participants were unavailable to be interviewed due to<br />

their responsibilities in other countries. Furthermore, Saudi<br />

participants were representative of multiple organizational levels,<br />

from the technical level up to the ministerial level. Such was not<br />

the case, however, with the three CDC participants available and<br />

amenable to being interviewed. Participants from the CDC were,<br />

in fact, representative of essentially the same organizational level,<br />

despite the fact that one such participant had acted as a team<br />

leader throughout the collaborative process. The collected data<br />

would certainly be richer had participants from CDC representing<br />

different organizational levels. Finally, since data collection relied<br />

mainly on semi-structured, face-to-face interviews, bias may have<br />

occurred due to the time lag between the timing of data collection<br />

and the end of the project, the differences between the stated and<br />

actual behavior of the participants, the sensitivity of the questions,<br />

and incomplete or inaccurate recall on the part of interviewees.<br />

Future publications will present the remaining findings of the<br />

study and discuss the extended version of the Dynamic Model of<br />

Transnational Knowledge Networks (DMTKNs) that has been<br />

developed based on the presented findings.<br />

8. REFERENCES<br />

[1] Gharawi, M. and Dawes, S. Conceptualizing knowledge and<br />

information sharing in transnational knowledge networks. In<br />

4th International Conference on Theory and Practice of<br />

Electronic Governance. 2010. Beijing, China.<br />

[2] Slaughter, A. A New World Order. Princeton University<br />

Press, Princeton: New Jersey, 2004.<br />

[3] Betsill, M., and Bulkeley, H. Transnational networks and<br />

global environmental governance: The cities for climate<br />

protection program. International Studies Quarterly.,<br />

48(2004), 417- 493.<br />

[4] Raustiala, K. The architecture of international cooperation:<br />

Transgovernmental networks and the future of international


law. Virginia Journal of International Law. 43, 1(2002). 1 -<br />

92.<br />

[5] Setzer, J. Sub-national and transnational climate change<br />

governance: Evidence from the state and city of Sao Paulo,<br />

Brazil. Fifth Urban Research Symposium. Marseille, France,<br />

2009.<br />

[6] Dawes, S., Gharawi, M., Burke, B. Knowledge and<br />

Information Sharing in Transnational Knowledge Networks:<br />

A Contextual Perspective. In 44th Hawaii International<br />

Conference on System Sciences (HICSS-44). Kauai, Hawaii.<br />

2011.<br />

[7] Dawes, S., Gharawi, M., Burke, B. Transnational public<br />

sector knowledge networks: Knowledge and information<br />

sharing in a multidimensional context. Government<br />

Information Quarterly, 29(1): p. S112–S120. 2012.<br />

[8] Nonaka, I. A dynamic theory of organizational knowledge<br />

creation. Organization Science., 5, 1 (1994),14–37.<br />

[9] Dawes, S. S. Interagency Information Sharing: Expected<br />

Benefits, Manageable Risks. Journal of Policy Analysis and<br />

Management., 15,3 (1996), 377-394.<br />

[10] Kogut B., and Zander U., What firms do?: Coordination,<br />

identity , and learning. Organization Science., 7, 5 (1996),<br />

502–518.<br />

[11] Pardo, T. A., Cresswell, A. M., Dawes, S. S., and Burke, G.<br />

B. Modeling the social & technical processes of interorganizational<br />

information integration. Proceedings of 37th<br />

Hawaii International Conference on System Sciences<br />

(HICSS- 37)., Big Island, Hawaii, 2004.<br />

[12] Landsbergen, D. J., and Wolken Jr., G. Realizing the<br />

promise: Government information systems and the fourth<br />

generation of information technology. Public Administration<br />

Review, 61, 2 (2001), 206–220.<br />

[13] Bresman, H., Birkinshaw, J., and Nobel, R. Knowledge<br />

transfer in international acquisitions. Journal of International<br />

Business Studies., 30, 3 (1999), 439–462.<br />

[14] Cummings, J, L., and Teng, B. S. Transferring R&D<br />

knowledge: the key factors affecting knowledge transfer<br />

success. Journal of Engineer, Technological Management.,<br />

20, (2003), 39-68.<br />

122<br />

[15] Eglene, O., Dawes, S. S., and Schneider, C. A. Authority and<br />

leadership patterns in public sector knowledge networks. The<br />

American Review of Public Administration., 37, 1 (2007), 91-<br />

113.<br />

[16] Lucas, L. The role of culture on knowledge transfer: the case<br />

of multinational corporation. The Learning Organizations,<br />

13, 3 (2006). 257-275.<br />

[17] Gil-García, J. R., Schneider, C. A., Pardo, T. A., and<br />

Cresswell, A. M. Interorganizational information integration<br />

in the criminal justice enterprise: Preliminary lessons from<br />

state and county initiatives. In Proceedings of 38th Hawaii<br />

International Conference on System Sciences (HICSS ’38)<br />

(Waikoloa, Hawaii), January 2005.<br />

[18] Pardo, T. A., and Tayi, G. K. Interorganizational information<br />

integration: A key enabler for digital government.<br />

Government Information Quarterly, 24, 4 (2007), 691-715.<br />

[19] Bhagat, R., Kedia, B., Harveston, P., and Triandis, H.<br />

Cultural variations in the cross-border transfer of<br />

organizational knowledge: An integrative framework.<br />

Academy of Management Review, 27, 2 (2002), 204-221.<br />

[20] Narteh, B. Knowledge transfer in developed-developing<br />

country interfirm collaborations: a conceptual framework.<br />

Journal of Knowledge Management. 12 ,1 (2008), 78-91.<br />

[21] Duan,Y., Xu, X., and Fu, Z. (2006), Understanding<br />

transnational knowledge transfer, In Proceedings of the 7th<br />

European Conference on Knowledge Management<br />

(Budapest, Hungary, September 2006). 126-135.<br />

[22] Kerndlmaier, R. Transnational exchange and transfer of<br />

knowledge. In A guidebook for riverside regeneration.<br />

Springer, Berlin: Heidelberg, 2006. 50-61.<br />

[23] Memish, Z., The Hajj: communicable and noncommunicable<br />

health hazards and current guidance for<br />

pilgrims. Euro Surveillance, 15,39 ,(2010), 1-4.<br />

[24] Gulfnews, Five succumb to H1N1 virus during Haj. 2009.<br />

[25] Mangen, S., Qualitative research methods in cross-national<br />

settings. Journal of Social Research Methodology, 2, 2,<br />

(1999), 109-124.<br />

[26] Strauss, A.L., and Corbin, J. M. Basics of Qualitative<br />

Research: Techniques and Procedures for Developing<br />

Grounded Theory. Sage.,Thousand Oaks, CA, 1998.


Information Sharing and Financial Market Regulation:<br />

Understanding the Capability Gap<br />

Djoko Sigit Sayogo<br />

Center for Technology in Government<br />

187 Wolf road, Suite 301<br />

Albany, New York<br />

dsayogo@ctg.albany.edu<br />

ABSTRACT<br />

In testimony on April of 2012 before the House Financial Services<br />

Committee, U.S. Securities and Exchange Commission (SEC)<br />

Chairman, Mary Schapiro, stated that effective information<br />

sharing between financial market actors and their regulatory<br />

bodies is critical to fulfilling the regulatory obligations of the<br />

SEC. The 2008 financial crisis is recognized as a show case for<br />

the risks to the stability of the markets that ineffective information<br />

sharing among supervisory authorities represents. This paper<br />

constitutes a preliminary exploration of the challenges facing<br />

financial regulators building on prior research in the computing<br />

and information science community (CIS). Current literature as<br />

well as data from a recent study of financial market regulation is<br />

used to identify key actors in financial market regulation<br />

information sharing relationships and to begin to outline the<br />

challenges faced in this unique context and the resulting risk if<br />

those challenges go unaddressed. A recently developed theoretical<br />

framework for cross-boundary information sharing (Garcia et al<br />

2007) is used to present insights about challenges and risks from<br />

the literature and the field.<br />

Categories and Subject Descriptors<br />

K.4.1 [Public Policy Issues]: Information Sharing for Regulators<br />

General Terms<br />

Management, Human Factors, Theory<br />

Keywords<br />

Financial Market Regulators, Systematic Information Sharing,<br />

Challenges and Risks Assessment<br />

1. INTRODUCTION<br />

Non-systematic and ad-hoc information sharing practices among<br />

financial market regulatory agencies are regarded as key<br />

contributors to the 2008 financial crisis. The economic crisis of<br />

2008 is a case in point for how ineffective information sharing has<br />

hindered supervisory authorities from detecting vulnerabilities in<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Theresa A. Pardo<br />

Center for Technology in Government<br />

187 Wolf road, Suite 301<br />

Albany, New York<br />

tpardo@ctg.albany.edu<br />

123<br />

Peter Bloniarz<br />

College of Computing & Information<br />

University at Albany<br />

Albany, New York<br />

pbloniarz@albany.edu<br />

global financial markets [24]. Unfortunately, the impact of<br />

constrained and ineffective information sharing on market<br />

regulation was well-known long before 2008. In a 2004 report the<br />

U.S. Government Accountability Office (GAO) called for the<br />

creation of routine and systematic fashion of information sharing<br />

across financial regulators [16] citing the vulnerabilities<br />

introduced as a consequence of gaps in these areas. Challenges at<br />

that time were recognized to include lack of authority, multiple<br />

overlapping jurisdictions, security and sensitivity of information,<br />

and protection of turf [16, 17, 30]. Since then researchers and<br />

practitioners alike have worked to understand and mitigate the<br />

challenges to routine and systematic information sharing in<br />

financial market regulation.<br />

The criticality of effective information sharing to the monitoring<br />

of financial markets and the consequences of gaps in capability<br />

for effective information sharing is increasingly recognized by a<br />

range of national and international organizations. Each of these<br />

organizations is calling for specific and significant investments in<br />

the capability necessary to close the gaps in information available<br />

to and held by regulatory agencies. A statement from The<br />

Financial Stability Board to G-20 Finance Ministers and Central<br />

Bank Governors specifically addressed the need for a future focus<br />

on “information exchange standards in the financial regulatory<br />

and supervisory area” [15]. Testimony from the International<br />

Monetary Fund (IMF) in 2009 indicated the need for more<br />

information disclosure at a high level of granularity to cover the<br />

gap of information among supervisory regulators [24]. Crossborder<br />

cooperation and information sharing was among the ten<br />

recommendations of cross-border bank resolution of the Basel<br />

Committee on Banking Supervision reported by the Bank for<br />

International Settlements [1]. In her testimony on the Lehman<br />

Brothers Examiner’s Report before House Financial Services<br />

Committee in April 2010, Chairman of the US Securities and<br />

Exchange Commission, Mary Schapiro called particular attention<br />

to the critical role of information sharing in meeting public<br />

expectations, “Effective information sharing by regulators is<br />

critical to fulfilling our regulatory obligations, and it is something<br />

that the American public has every right to expect. Cooperation<br />

and coordination with other financial institution regulators is<br />

essential [38]” Information exchange standards, more sharing of<br />

more detailed data, cross-border cooperation and information<br />

sharing are clearly recognized as necessary to ensure financial<br />

regulators meet public expectations.<br />

Previous studies, such as Pardo et al [30] identify various<br />

challenges for financial market regulation. On the other hand, they<br />

did not specify the impact of the challenges to the different actors<br />

of financial market regulation. Davenport and Prusak [5] define<br />

information sharing as “the voluntary act of making information


available to others” [5]. Information sharing involves an exchange<br />

between an information holder and requester in the initial stage<br />

and information sender and receiver in the transfer stage. As a<br />

consequence of the above assertion, to understand information<br />

sharing, we need to identify those involved the sharing<br />

relationship, their role in the sharing process, and the challenges<br />

and risks faced by each actor.<br />

This paper will draw on current literature on information sharing<br />

and integration as well as data about information sharing collected<br />

in interviws with inidividuals with a role in financial market<br />

regulation. Using this literature and data we identify a set of<br />

challenges facing systematic information sharing in financial<br />

market regulation. We map current actors in financial market<br />

regulation, specify their relationships to each other, and identify<br />

challenges and risks for each actor in financial market regulation<br />

information and knowledge sharing. Finally this paper lays out a<br />

foundation for future research in this area.<br />

The paper begins by briefly describing inter-agency information<br />

integration and sharing and introducing the framework proposed<br />

by Gil-Garcia et al [20] as a lens to focus the discussion of the<br />

challenges. Section three describes the method used in this paper<br />

Followed by an introducing to the primary actors in financial<br />

market regulation information sharing. Section four focuses on the<br />

challenges facing financial market regulators in their efforts to<br />

share information. The paper concludes in section five a with<br />

discussion on financial market regulation challenges, actors and<br />

risks and epitomes a set of future directions for research on<br />

information sharing in FMR.<br />

2. INFORMATION SHARING AND<br />

INTEGRATION<br />

This paper uses the framework proposed by Gil-Garcia et al [20]<br />

to examine information sharing in FMR. This interagency<br />

information integration framework is useful for characterizing<br />

sharing activities and for focusing discussions of challenges to<br />

that sharing. Building from a close examination of interagency<br />

information sharing Gil-Garcia et al [20] conceptualize an<br />

integrative framework for constituting interorganizational<br />

information integration [20]. They argue for four components of<br />

interorganizational information sharing, namely: a) interoperable<br />

technical infrastructure, b) integrated data, c) shared information,<br />

and d) trusted social network.<br />

Interoperability, as the first component, is regarded as the most<br />

critical element for systematic sharing or integration of<br />

information across different agencies [33]. Gil-Garcia et al [20]<br />

identified the importance of technical aspects of interoperability<br />

for both hardware and software. They argue that despite the<br />

technical difficulties in developing interoperability, an<br />

interoperable system will make sharing information easier and<br />

provide accurate, protected, and usable information [20].<br />

124<br />

Figure 1. Four Components Interagency Information<br />

Integration<br />

Trusted<br />

Network<br />

Source: Gil-Garcia et al, 2010<br />

Integrated Data Shared Information<br />

Interoperable infrastructure<br />

As the second component, integrated data is critical for sharing<br />

information with multiple organizations particularly when it is<br />

required sharing of information in multiple formats [20]. Common<br />

data elements will significantly improve sharing and integrating of<br />

information across organizational boundaries [20].<br />

The third component, shared information, is recognized as<br />

essential to supporting effective information sharing. Information<br />

sharing systems should be designed around an understanding of<br />

the shared information needed [20]. Sharing of information is<br />

regarded as an initial step toward integrated data [20]. The fourth<br />

component of interorganizational information integration is<br />

trusted social networks. Trust among sharing partners is<br />

considered a prerequisite to successful sharing [33]. A network of<br />

trusted actors significantly influences the effectiveness of<br />

communication and reduces resistance to sharing information<br />

[20]. The level of trust is important to reducing turf barriers and<br />

concern over information misuse.<br />

3. APPROACH<br />

The mapping of the literature on information sharing and<br />

integration draws on three sources; 1) Literature in interagency<br />

information sharing and integration 2).Professional reports on<br />

information sharing challenges in financial markets and 3) Article<br />

on the challenges facing 21 st century financial market regulators<br />

detailing the result of interviews with a set of financial market<br />

regulation professionals published in E-Gov conference [30].<br />

4. ACTORS AND CHALLENGES<br />

4.1 Key Actors in Financial Market<br />

Regulation<br />

Financial market regulation in the U.S. is fragmented with<br />

multiple actors responsible for regulating various segments of the<br />

financial industry [28, 30]. In some cases regulatory responsibility<br />

is overlapping resulting in a web of interconnections and intricate<br />

relationships which is then further complicated by informal and<br />

ad-hoc information sharing practices [28]. To begin to understand<br />

this actors and unpack the unique and overlapping regulatory<br />

responsibilities it is necessary to identify the key actors in the<br />

financial market regulation environment. We identify five actors,<br />

each with different roles and responsibilities and each is with<br />

important and unique relationships with other key actors and other<br />

stakeholders. These five key actors identified are federal agencies,<br />

state governments, SROs (self-regulatory organizations), financial<br />

industry entities (firms, investors, rating agencies), and the public.<br />

Federal and state government agencies share responsibility for<br />

setting regulatory policy, enforcing compliance, supervising, and<br />

monitoring specific sectors of financial market activity. Federal<br />

agencies act as primary regulating agencies for most financial


products (securities, commodities, futures, and others) except<br />

insurance. State governments act as the supplementary regulating<br />

actor for the previously mentioned financial products. The State<br />

governments acts as the primary regulators for insurance [28] with<br />

each state have different regulations for insurance.<br />

The US financial market regulation system is based on a<br />

combination of mandatory regulation sanctioned by government<br />

agencies and voluntary regulation, which in the case of financial<br />

markets, is sanctioned by the SROs (Self-Regulatory Agencies).<br />

SROs are self-regulating agencies that exercise some degree of<br />

regulatory authority over the financial market industry and<br />

professionals One example of an SRO in the U.S. is FINRA<br />

(Financial Industry Regulatory Authority). FINRA is an<br />

independent regulator for securities firms listed and doing<br />

business in the U.S with the mission to protect America’s<br />

investors [13]. To a certain extent, SROs are allowed to generate<br />

supplementary rules and policies [22]. For instance, FINRA is<br />

allowed to generate policies and rules for broker-dealer and<br />

trading markets. SROs serve to supplement the government<br />

regulation or fill the vacuum of an absence of government<br />

oversight and regulation.<br />

Financial industry actors in this paper are those organizations<br />

conducting transactions in the financial market such as firms,<br />

investors, and rating agencies, among others. The interest of<br />

financial industry actors lies in the requirement for compliance<br />

with the regulatory framework. These organization need to<br />

comply and trade within the regulation imposed by the Federal,<br />

State and to certain extent the SROs. The public refers to the<br />

general public who have interest on the conduct of financial<br />

market regulations.<br />

4.2 Challenges to FMR Information Sharing<br />

The need for information sharing capability is not unique to the<br />

context of financial market regulation. Public health, human<br />

services, and public safety are just three of the many policy<br />

domains that require effective information sharing across<br />

boundaries of organizations and jurisdictions and across levels of<br />

government. And in each of these areas various communities of<br />

practitioners and academics work to more fully understand<br />

information sharing and the challenges facing those communities<br />

as they seek to effectively share information in the interest of<br />

program execution and policy development. Creating capability<br />

for routine and systematic information sharing has long been a<br />

priority for the U.S. Justice community, in particular. One of the<br />

most recent products of this focus is the National Information<br />

Exchange Model (NIEM), a national program supported by the<br />

federal government. NIEM represents an ongoing collaborative<br />

partnership of agencies and organizations across all levels of<br />

government (federal, state, tribal, and local) and with private<br />

industry for the purpose of effectively and efficiently sharing<br />

information at key decision points [26]. In recent years, NIEM has<br />

expanded to include other federal and state agencies such as the<br />

Office of the Director of National Intelligence, Federal Bureau of<br />

Investigation, Texas, Florida, New York, Pennsylvania, and others<br />

[26]. In addition to such nationally led efforts, many efforts at the<br />

state level are resulting in the creation of multi-agency, multijurisdictional<br />

information sharing capability. For example, in<br />

2003 a New York State Criminal Justice Information Technology<br />

Group representing 13 different Justice agencies was tasked with<br />

developing a framework for a new approach to state-wide<br />

125<br />

information sharing among criminal justice agencies [20].<br />

Insights from these efforts and others are increasingly available in<br />

both the practitioner and academic literature as resources to<br />

inform and guide information sharing efforts in other domains.<br />

Likewise, this section identifies and integrates challenges from<br />

financial market regulation and interagency information sharing<br />

literature.<br />

4.2.1 Interoperability As the Key<br />

The application and implementation of any information<br />

technology is nested within a particular organizational,<br />

sociological, ideological and political context [7]. Successful<br />

cross-boundary information sharing requires understanding of the<br />

different and diverse business processes and practices within the<br />

actors’ organizations and in the broader context within which they<br />

operate [7]. As argued by Pardo et al [35] interoperability not only<br />

depends on the ability of systems to communicate with one<br />

another, employing shared terminology and definitions, but also<br />

requires management and policy interoperability. An examination<br />

of information sharing in the criminal justice arena indicated that<br />

differences in agency culture is a significant barrier to interagency<br />

information sharing [33], and requires the identification,<br />

understanding and accommodation of existing organizational<br />

cultures within each agency [to enable successful sharing. In this<br />

context, interoperable management and policy is seen as<br />

necessary for each agency to reduce resistance to sharing<br />

information. An understanding of the critical role of<br />

interoperability in cross-boundary information sharing highlights<br />

the need to understand the social processes required to develop a<br />

shared understanding of terms, concepts and information used and<br />

available within each agency [7], particularly considering that<br />

information is not objective, neutral or readily available within<br />

each agency [36].<br />

For organizations to work together to build interoperable systems<br />

to share information, organization leaders must first understand<br />

the information sharing capability found in each sharing partner.<br />

Information sharing capabilities are dynamic, varied,<br />

complementary and multi-dimensional in nature. Leaders must<br />

assess the capabilities held collectively by the network to ensure<br />

the relevancy and appropriateness of capability to become<br />

interoperable [29]. Within a broader view, these dimensions of<br />

capability can be classified into two closely related but distinct<br />

components [29, 34], namely capability to create effective<br />

collaboration and capability to develop new systems and<br />

procedures.<br />

Capability to create effective collaboration includes five<br />

dimensions, namely: business model and architecture readiness,<br />

strategic planning, collaborative readiness, organization<br />

compatibility, and project management. Building capability along<br />

these dimensions is necessary to develop mutual understanding<br />

and to reduce resistance in information sharing and integration.<br />

Strategic planning is important for clarifying roles and<br />

responsibility among participants [32] and to alleviate resistance<br />

to change and incompatibility of technology [11]. Assessment of<br />

business models is necessary to describe service and operational<br />

components of the organization, their interrelationship, and the<br />

technology used for implementation [25]. Assessment of strategic<br />

planning, business model, and collaborative readiness will<br />

generate information to inform understanding of the extent to<br />

which potential sharing partners are incompatible. It also will<br />

inform and ideally, alleviate resistance and interorganizational


conflict around information sharing. Each organization must<br />

understand each other’s missions, strategic planning and needs.<br />

To have this level of understanding, the agencies often engage in<br />

several types of collaborative activities, such as coordinated<br />

planning and training [34].<br />

Capability to develop new systems and procedure is comprised of<br />

six dimensions, including: data assets and requirements,<br />

information policies, resource and project management, and<br />

technology readiness. Data assets and requirements and<br />

information policies assessment refers to assessments of the<br />

ability to provide and encourage sharing through wide-ranging,<br />

clear, and precise information policies and management [31]. This<br />

requirement includes data governance and policies; developing<br />

policies for data stewardship and use [8, 10]. This capability also<br />

relates to the management of resources owned by different<br />

agencies. Appropriate resource allocation and procurement<br />

strategies to support the interoperable system. The technology<br />

readiness consists of three elements, namely: technology<br />

acceptance, knowledge and compatibility. Technology acceptance<br />

refers to the attitudes of actors toward changes bring forth by<br />

technology, reflecting the comfort of actors in accepting a new<br />

technology or initiative, the degree of trust in the new technology,<br />

and the beliefs on the usability and success of technology or<br />

initiative [31]. Technology compatibility refers to the presence of<br />

agreed-upon standards, interconnectivity among those seeking to<br />

share information, and experience of staff with sharing activities<br />

[4].<br />

4.2.2 Integrated Data<br />

Two interrelated issues in the development of integrated data,<br />

namely: developing linked data and ensuring data integrity and<br />

quality, were identified through the literature review and field<br />

study.<br />

a) Ensuring Data Quality and Integrity<br />

Data has a central role in financial markets. Regulators as well as<br />

firms need data for a variety of reasons; not the least of which is<br />

to protect consumers. Consumer protection, like other uses<br />

regulators and firms make of the data available to them, requires<br />

data to be of high quality and integrity.<br />

The process of ensuring that data from trading, surveillance and<br />

compliance activities is of sufficient quality for the specific or<br />

intended use can be a daunting task. Financial market data come<br />

from many organizations; broker-dealers, banks, and other<br />

sources, with many different data management cultures. Ensuring<br />

a high quality, integrated data infrastructure, including<br />

sophisticated data management strategies, represents a significant<br />

cost [30]. Monitoring the markets in the new environment of<br />

trading; with ever increasing transaction speeds and the<br />

production of vast amounts of data requires whole new classes of<br />

technology and a new approach to data management.<br />

b) Developing Linked Data<br />

Developing shared terminology and common definitions is one<br />

element of creating an interoperable system [27]. Daniel Tarullo’s<br />

statement [40] in front of US Senate points at two important<br />

issues for better oversight mechanism in financial market 1)<br />

access to high-quality and timely data that are organized and<br />

standardized for supervisory agencies, and 2) the availability of<br />

data in appropriate usable form to other government agencies. His<br />

126<br />

assertion implies data sharing will occur through standardization<br />

and linked data [40]. The November 2009 NRC (National<br />

Research Council) workshop describes the need for standard<br />

language development to enable data aggregation, interpretation,<br />

and analysis to support for controlling systematic risks [12].<br />

Technically, the development of common language and schema<br />

through ontology will enable a linkage of different systems which<br />

would support more systematic and routine sharing. The ontology<br />

will enables the creation of “shared and common understanding of<br />

a domain that can be communicated between people and<br />

application systems [6]”, and served as a language to support data<br />

translation and queries from different system design [23]. The<br />

development of common language facilitates automatic reasoning<br />

about financial systems and proposed regulations, sharing a<br />

common understanding of financial structures, and facilitating the<br />

analysis of interrelationship in financial domains. Effort toward<br />

developing linked data for financial market is already being<br />

invested in. For instance, O’Riain et al [27] proposing a linked<br />

data driven information systems for integrating financial data<br />

from multiple web sources. They further outline the challenges<br />

and issues in addressing data integration in financial market<br />

regulation, namely: a) an increase in data inter-dependencies, b)<br />

data quality and c) three different types of mismatch: text/data,<br />

schema, and abstraction level mismatch [27]. Despite growing<br />

research on ontologies for the financial domain, there is still a<br />

great need for a stronger and more focused connection between<br />

regulatory and systematic risk.<br />

4.2.3 Challenges to Sharing Information<br />

As argued by Gil-Garcia et al [20], sophisticated systems do not<br />

necessarily provide effective platforms for information sharing.<br />

Integrating and sharing information across different agencies is a<br />

difficult endeavor to undertake. For example, Agencies sometimes<br />

act defensively in protecting what they see as their own “turf”;<br />

which in this case is their data [21]. The challenges confronting<br />

agencies as they work to share their information with other<br />

entities range from political and managerial to technical. This<br />

section introduces some of these importance challenges.<br />

a) Collaborative Governance Structure and Sharing Strategies<br />

Agency resistance to sharing information is typically driven by a<br />

variety of reasons, such as to avoid additional costs related to<br />

changes, to control risks, to protect autonomy and adversarial<br />

position [21], and to shun “reputation risk”, that is a risk of being<br />

relevant to the market and losing power over the market [30]. As a<br />

result, agencies need to enact strategies to reduce the risks of<br />

information sharing.<br />

One of the strategies proposed by Pardo, Gil-Garcia and Burke<br />

[33] is through the development of an effective collaborative<br />

governance structure organized around the expectation that<br />

agencies will be sharing information. They further outline six<br />

determinants of an effective collaborative governance structure: 1)<br />

knowledge of information needs, 2) knowledge of the<br />

environment, 3) willingness to accommodate to the diversity of<br />

participating organizations and their goals, 4) knowledge about<br />

participating organizations, 5) existing legislation, and 6)<br />

executive involvement [33].<br />

Developing information sharing and integration capability also<br />

requires leadership and legislative support [21]. To achieve<br />

interoperability across the boundaries of agencies, levels of<br />

government, and even across national boundaries, requires


leadership and authority from the most top levels of<br />

government. Because only the highest level of authority will<br />

enable the formation of secure strategic partnership, build<br />

comprehensive planning, secure necessary resources, and handle<br />

conflicting interests across different agencies to sustain the<br />

governance of multi-agencies network [34].<br />

b) Lack of Authority<br />

Lack of legal authority to access information was a challenge<br />

faced by many state insurance regulators [16]. For instance, state<br />

insurance regulators do not have the authority to access the FBI’s<br />

nationwide criminal history record. As a consequence, state<br />

insurance regulators have limited ability to prevent individuals<br />

with serious criminal records from entering the insurance business<br />

in their states. Inter-state migrations complicate the issue when<br />

individuals with serious criminal histories move around [16].<br />

The lack of authority for access is magnified by fragmented<br />

regulatory structures which often overlap. Financial industry<br />

actors and insurance companies find themselves regulated by<br />

different institutions with different approaches to regulation. The<br />

fragmented structure creates two prominent challenges, a)<br />

duplication and overlap of regulation and b) competition among<br />

regulators to be the first to protect consumers and to appeal to the<br />

public [30, 37]. The overlap and competitiveness leads to<br />

redundancy and causes higher costs for firms and regulatory<br />

agencies. It also creates confusion for firms as they must choose<br />

which regulators to comply with. This situation also challenges<br />

regulators themselves as they work to understand how firms are<br />

operating within the multiple fragmented and overlapping systems<br />

of regulation [30, 37].<br />

A proliferation of complex hybrid financial products increases<br />

complexity of authority questions and hinders the ability of<br />

regulators and consumers alike to identify and mitigate potential<br />

risks. The multiple jurisdictions governing the markets is<br />

recognized as not only obstructing the oversight of hybrid<br />

financial products, but also confusing consumers [16]. For<br />

instance, consumers might lodge a complaint about a hybrid<br />

product with wrong regulator and as a consequences the<br />

complaint is not properly resolved by the appropriate regulator.<br />

To complicate the matter, the lack of a central body facilitating<br />

information sharing or negotiating agreements about what<br />

information could and should be shared means that the<br />

appropriate regulator is often left in the dark [19]. The result is<br />

that regulators are left with limited views of issues in the financial<br />

market that impede their ability to deduce potential problems in<br />

the market.<br />

c) Lack of Enforcement Action from the Current Sharing<br />

Mechanism<br />

The Memorandum of Understanding (MOU) is the primary<br />

mechanism used to establish information sharing agreements.<br />

However, the MOU has been criticized for a lack of enforceable<br />

actions which challenges the extent of sharing. The MOU was<br />

criticized for a high reliance on the “soft power of persuasion”<br />

and willingness to cooperate, instead of taking a coercive<br />

approach [3]. The effectiveness of an MOU largely depends on<br />

the “goodwill” of the counterparties signing the MOU. In<br />

addition, compliance with an MOU also depends on the<br />

underlying legal authority and jurisdictions of each party [14]. In<br />

a similar manner, multilateral arrangements across nations, as a<br />

form of MOU, were also criticized for the high information<br />

127<br />

asymmetries resulting from differences in legal systems,<br />

supervisory arrangements, social and moral habit, and competition<br />

among financial centers for securities transactions [3, 14].<br />

d) Legacy information systems impede the access<br />

Different regulators maintain different and separate information<br />

systems and these different systems can significantly complicate<br />

routine information sharing. The integration of different legacy<br />

systems or the creation of interoperable system out of existing<br />

legacy systems becomes a major hurdle [30]. Different legacy<br />

systems result in systems that “don’t talk to each other” and create<br />

various “gold copies” of data [30]. Gold copies refer to the<br />

different data captured at different levels, organizations, and<br />

formats. These gold copies pose challenges to data accuracy due<br />

to the different formats and metadata and affect the level of<br />

understanding about the data [30]. Considering that information is<br />

constructed from data, the problem with data accuracy could<br />

distort the resulting information and create major barriers for<br />

routine information sharing.<br />

e) Protection of sensitive data and information<br />

Financial regulators expressed their concern over the protection of<br />

sensitive data and information In particular, they expressed<br />

concerns about the need to balance inclinations to share and the<br />

need to protect different types of regulatory information with<br />

varying degree of sensitivity [16]. The legal structure previously<br />

installed to protect financial market consumers, such as the Bank<br />

Secrecy Acts, sometime prohibit the disclosure of certain<br />

information [19].<br />

This concern is not a unique problem to financial market.<br />

Information security and protection are still major concerns in<br />

information sharing across different federal agencies. Looking at<br />

the case of sharing terrorism related information, shows a variety<br />

of weaknesses in the control of information security in federal<br />

agencies [17]. Based on the 2008 GAO report1, almost all 24<br />

major federal agencies continue to have problems with access<br />

control and security management and about 20 federal agencies<br />

have issues with configuration management for information<br />

protection [17, 18]. Pardo et al [30] also pointed at the challenge<br />

of data protection in the financial market. To share information<br />

with various different agencies necessitate sufficient data<br />

protection. With much information that flows around, regulators<br />

need to ensure adequate protection of privacy and proprietary<br />

information. Systems to protect the data and information against<br />

intrusions exist but the problem lies on the protection of data and<br />

information privacy [30].<br />

The development of information policies for information sharing<br />

and integration can be challenged by two factors, 1) the<br />

conflicting interest of multiple agencies and 2) the tension among<br />

security, privacy and sharing needs [30]. Each financial regulator<br />

governs particular financial segments based on their mission;<br />

these regulators intend to protect their autonomy and adversarial<br />

position that can sometimes conflict with other regulators. As<br />

previously discussed, information sharing requirements are<br />

sometimes hindered by the need to protect sensitive data and<br />

privacy rights. There is a conflicting issue between the need to use<br />

shared information with the need to protect the same information<br />

for being misused [9]. Dawes [9, 10] provides a useful framework<br />

1 http://www.gao.gov/new.items/d09546.pdf


for understanding information policies supporting informationbased<br />

transparency initiative. Dawes proposed a balancing of two<br />

complimentary requirements in the framework, namely:<br />

information stewardship and information usefulness [8, 10].<br />

Stewardship “conveys the idea that all public officials and<br />

government organizations are responsible for handling<br />

information with care and integrity, regardless of its original<br />

purpose or source [9, 380]”. Using this lens, regulators must<br />

handle any information with care regardless of who the initiator or<br />

owner of the information is. This principle requires agencies to<br />

forgo their differences and could alleviate the concern of misuse.<br />

Information usefulness, on the other hand, refers to the principle<br />

that the information is beneficial. Making the information more<br />

accessible provides a wide variety of public and private uses [8,<br />

10]. This framework of stewardship and usefulness provides<br />

useful guidance for financial regulators in developing policy<br />

management to support inter-regulators information sharing and<br />

integration. Policy management refers to the “way to express,<br />

analyze, and realize desired sharing system behavior [39].<br />

4.2.4 Trusted Social Network<br />

Systematic inter-organizational information sharing requires the<br />

creation of networks consisting of various different agencies and<br />

at different levels. A network might consist of organizations with<br />

overlapping business processes and non-standardized but similar<br />

information [35]. It might be populated by officials from various<br />

different agencies, each having different cultures, practices and<br />

rules to follows. The diversity of actors in this network could<br />

generate a range of potential conflicts of interest. Pardo et al [30]<br />

argued that managing conflict of interests among different<br />

regulatory agencies might be regarded at one of the primary<br />

challenges for 21st century financial market regulators.<br />

There exists high competitiveness among different regulatory<br />

agencies, each strives to become or maintain their functional<br />

relevance to the market [30, 37]. Considering the high potential<br />

for conflict and power negotiation among different agencies<br />

involved in regulating financial markets, enacting trusted<br />

relationships becomes key element to ensuring systematic sharing.<br />

Trust within the network could change the way people work,<br />

communicate and share information hence trust becomes the<br />

“catalyst for information sharing [20]”. Regardless, it seems, of<br />

the sophistication of system, communications and sharing still<br />

benefit from strong interpersonal capabilities.<br />

5. CONNECTING FINANCIAL ACTORS,<br />

CHALLENGES, AND RISKS<br />

Drawing on the analysis in the previous sections, we identify eight<br />

challenges to information sharing in financial market regulation<br />

resulting from fragmented regulatory structures in US financial<br />

markets (table 1). These include: 1) lack of authority for crossjurisdictional<br />

products, 2) conflicting organizational cultures, 3)<br />

challenges due to data interdependency and legacy systems, and<br />

4) the need for collaborative governance. In addition, four other<br />

challenges emerge as side effects of institutional responses to this<br />

fragmented structure, namely, a need 5) to develop linked data<br />

and a common language, 6) to protect sensitive data and<br />

information, 7) to develop necessary capabilities for existing<br />

information sharing and 8) to create more robust sharing<br />

mechanisms and policies.<br />

128<br />

The financial market regulatory structure in the U.S. is<br />

fragmented with different actors regulating different products.<br />

Considering the diversity of financial market stakeholders and<br />

their role and interest in the market, the identified challenges will<br />

affect different actors in the financial market differently. For each<br />

of these actors, the different impacts of these challenges represent<br />

the risks that need to be addressed by them. In this section, we<br />

correlate the identified challenges with the primary actors in<br />

financial market regulation and identify the risks associated with<br />

the challenges for each actor (table 1).<br />

The risks that government (federal and state) and SROs face are<br />

comparable and include 1) having a limited ability to see built-up<br />

vulnerabilities in the market [21], 2) having resistance to change<br />

in order to maintain “turf” [16, 35], 3) hindering interoperability<br />

due to differences in metadata and data formats [25], and 4)<br />

competitiveness and conflicting interests among regulators [30].<br />

The regulators might also need to invest in ensuring data quality,<br />

developing linked data, and assessing gaps in capabilities.<br />

Although the risks faced by Federal and State regulators and the<br />

SROs are comparable, the magnitude of impact is oftentimes<br />

different. For instance, having limited ability to see built-up<br />

vulnerabilities could create a larger impact for Federal agencies<br />

compared to the SROs. The resulting risks could also affect the<br />

effectiveness of relationships among these regulators, especially<br />

considering that the sharing practices among most federal and<br />

state agencies are primarily informal and ad hoc [28]. For<br />

instance, federal agencies and state government could share<br />

trading information and be involved in joint enforcement<br />

coordination.<br />

The risk of resistance to change in order to maintain turf and the<br />

risk of competing and conflicting interests could undermine their<br />

joint efforts to share. As example, the report by the GAO<br />

indicated how sharing between state and federal agencies, as<br />

illustrated by the case of state insurance regulators and the FBI,<br />

are sometimes not fruitful due to the lack of authority and<br />

jurisdictions. The state insurance regulators could not access the<br />

criminal record of an insurer in the FBI database and were thus<br />

unable to assess and prevent potential fraud [16].<br />

For the actors in the financial market industry (trading firms,<br />

broker-dealer, rating agencies, investors, etc), these challenges<br />

also induce risks. The authority barriers and inadequate sharing<br />

mechanisms could create confusion for market actors in filing<br />

complaints or in identifying relevant information. The report by<br />

the GAO illustrates how difficult it is for consumers to lodge<br />

complaints on hybrid products due to the level of complexities<br />

and the intersectional and multilayered nature of financial markets<br />

[16]. The lack of coercive power on the current sharing<br />

mechanism among the regulatory agencies could also create an<br />

opportunity for irresponsible actors to gain advantage by<br />

manipulating the system [14].<br />

As the previous GAO report indicates [16], an insurer who has a<br />

criminal record could manipulate the system by moving to other<br />

states and create a similar fraud because the state insurance<br />

agencies could not access the criminal record in the FBI<br />

databases. The barrier due to lack of authority and legacy systems<br />

could complicate the effort by the public to identify and access<br />

relevant information.


The relationship between regulators and the public is maintained<br />

through two primary activities: 1) public access to information,<br />

and 2) requests for comments on new regulatory proposals [2].<br />

Legacy systems and differing jurisdictions could result in the risk<br />

of multiple points of access [16], because the public has various<br />

points to access information. On the one hand, multiple points of<br />

access provide a wider range of information for the public to<br />

compare and contrast. On the other hand, multiple points of access<br />

could create confusion as to which information is most relevant<br />

for them. As result, despite the notable transparency effort by<br />

regulators to open up access to information and enhance the<br />

public consultative process, this condition will make the<br />

public, especially individual investors, more vulnerable to fraud<br />

and more exposed to losses. Their inability to identify relevant<br />

information could distort decisions that ordinary investors make<br />

regarding their investment.<br />

Table 1. Actors, Challenges and Risks<br />

Challenges Government SROs Fin. Industry Actors Public<br />

Mitigating authority<br />

barriers - Lack of authority<br />

and cross jurisdictions<br />

Accommodating different<br />

organizational cultures<br />

Legacy systems and data<br />

interdependency impede<br />

access<br />

Developing collaborative<br />

governance culture –<br />

involvement of high-level<br />

officials and political<br />

leaders<br />

Developing linked data<br />

and a common language -<br />

Ensuring data quality and<br />

integrity<br />

Protection of sensitive data<br />

and information, balancing<br />

usefulness and stewardship<br />

Lack of enforceable action<br />

for the current information<br />

sharing mechanism<br />

Developing capabilities for<br />

collaboration and<br />

developing new<br />

procedures<br />

Limited ability to<br />

identify built-up<br />

vulnerabilities [24]<br />

Resistance to change<br />

brought forth by new<br />

systems [9, 35]<br />

Different metadata and<br />

formats inhibit<br />

integration and<br />

interoperability. [27]<br />

Conflicting interests<br />

among regulatory<br />

agencies – the<br />

competitiveness and risks<br />

of being relevant to the<br />

market [30]<br />

Investment to ensure data<br />

quality in large datasets<br />

[30]<br />

Liabilities of privacy and<br />

proprietary data and<br />

information [30]<br />

Dependence on the<br />

“goodwill” of<br />

counterparties [3, 14]<br />

Gaps in capabilities that<br />

hamper collaboration<br />

[34, 35]<br />

*) Intersection of challenges and actors represents the risk<br />

Limited ability to<br />

identify built-up<br />

vulnerabilities [24]<br />

Resistance to change<br />

brought forth by new<br />

systems [9, 35]<br />

Different metadata and<br />

formats inhibit<br />

integration and<br />

interoperability [27]<br />

Conflicting interests<br />

among regulatory<br />

agencies – the<br />

competitiveness and<br />

risks of being relevant<br />

to the market [30]<br />

Investment to ensure<br />

data quality in large<br />

datasets [30]<br />

Liabilities of privacy<br />

and proprietary data and<br />

information [30]<br />

Dependence on the<br />

“goodwill” of<br />

counterparties [3, 14]<br />

Gaps in capabilities that<br />

hamper collaboration<br />

[34, 35]<br />

129<br />

Confusion in filing<br />

complaints<br />

Different reporting<br />

formats increase cost<br />

[30]<br />

Investment to ensure<br />

data quality for<br />

compliance [30]<br />

Liabilities of privacy<br />

and proprietary data and<br />

information [30]<br />

Opportunities to<br />

manipulate the system<br />

Confusion in<br />

identifying relevant<br />

information [18]<br />

Multiple points of<br />

access [16]<br />

Distortion due to low<br />

quality data.<br />

Security of personal<br />

data<br />

Higher vulnerability<br />

to fraud and<br />

exposures<br />

The challenge of protecting sensitive data and ensuring data<br />

quality and integrity also creates significant risks for the financial<br />

industry and the public. The challenges of protecting sensitive<br />

data significantly correlate with the firm’s investment in ensuring<br />

data quality, compliance and privacy protection. This condition<br />

creates a risk of protecting the security of the personal data and<br />

information for the general public. For public, this challenge<br />

correlates with the risk of breach in personal data and security of<br />

personal data. For financial industry, the challenge correlates to<br />

the risk of liabilities related to privacy and proprietary data. The<br />

financial industry might have to invest heavily to reduce the risk<br />

of liabilities due to personal data breach.<br />

6. FUTURE DIRECTIONS<br />

Through the review on literature in the interagency information<br />

sharing and integration, this paper provides an initial framework<br />

for understanding the challenges relating to inter-agency<br />

information sharing for financial market regulators, focusing


primarily on the information flows between the different agents<br />

playing significant roles in the regulation of financial markets.<br />

There are a number of other areas in which computer and<br />

information science research can help support this information<br />

and knowledge sharing, through analyses of the types of<br />

information and knowledge that should be shared between the<br />

actors. For example, better analytic tools could build on a formal<br />

specification of trading data and financial actors’ behavior. High<br />

level languages for identifying patterns of interest (e.g., fraud<br />

signatures) in financial data streams should enable highly<br />

scalable, real-time analysis of data streams to support decision<br />

making. As another example, data mining approaches will be<br />

essential to detect patterns of activity that produce anomalous<br />

market behavior, such as the May 2010 “flash crash,” or identify<br />

the possibility of manipulative or fraudulent practice that warrants<br />

further investigation. Predictive data mining could be useful for<br />

identifying impending market destabilization or manipulation and<br />

developing better “circuit breakers.” Social network analysis<br />

could be used in combination with structured data to provide<br />

evidence of individuals or organizations engaged in inappropriate<br />

activities. Financial market professionals can get the information<br />

they need to support their high-stakes decision making. The<br />

ensuing research should lead to new models of computing, system<br />

design, and data analysis that can improve practices in this<br />

important and challenging domain.<br />

7. REFERENCES<br />

[1] BIS 2010. Good Practice Principles on Supervisory<br />

Colleges: Basel Committee on Banking Supervision.<br />

[2] Bradley, C.M. 2011. Transparency Is the New Opacity:<br />

Constructing Financial Regulation After the Crisis.<br />

American University Business Law Review. 1, (2011), 7.<br />

[3] Brummer, C. 2010. Post-American Securities Regulation.<br />

California Law Review. 98, (2010), 327–383.<br />

[4] Cresswell, A. et al. 2008. A Multi-dimensional Approach to<br />

Digital Government Capability Assessment.<br />

[5] Davenport, T.H. and Prusak, L. 1997. Information ecology:<br />

Mastering the information and knowledge environment.<br />

Oxford University Press, USA.<br />

[6] Davies, J. et al. 2003. Towards the Semantic Web: Ontologydriven<br />

Knowledge Management. Wiley Online Library.<br />

[7] Dawes, S.S. et al. 2009. From “Need to Know” to “Need to<br />

Share”: Tangled Problems, Information Boundaries, and the<br />

Building of Public Sector Knowledge Networks. Public<br />

Administration Review. 69, 3 (May. 2009), 392–402.<br />

[8] Dawes, S.S. 2010. Information policy meta-principles:<br />

stewardship and usefulness. (2010), 1–10.<br />

[9] Dawes, S.S. 1996. Interagency information sharing:<br />

Expected benefits, manageable risks. Journal of Policy<br />

Analysis and Management. 15, 3 (1996), 377–394.<br />

[10] Dawes, S.S. 2010. Stewardship and usefulness: Policy<br />

principles for information-based transparency. Government<br />

Information Quarterly. 27, 4 (2010), 377–383.<br />

[11] Ding, W.W. et al. 2010. The impact of information<br />

technology on academic scientists’ productivity and<br />

130<br />

collaboration patterns. Management Science. 56, 9 (2010),<br />

1439.<br />

[12] Engle, R.F. and Weidman, S.T. 2010. Technical Capabilities<br />

Necessary for Systemic Risk Regulation:Summary of a<br />

Workshop. The National Academies Press.<br />

[13] FINRA - About FINRA: http://www.finra.org/AboutFINRA/.<br />

[14] Friedman, F.B. et al. 2003. Taking stock of information<br />

sharing in securities matters. Journal of financial crime. 10,<br />

1 (2003), 37–53.<br />

[15] FSB 2011. Global Adherence to Regulatory and Supervisory<br />

Standards on International Cooperation and Information<br />

Exchange.<br />

[16] GAO 2004. Better Information Sharing Among Financial<br />

Services Regulators Could Improve Protections for<br />

Consumers. Technical Report #GAO-04-882R. Government<br />

Accountability Office (GAO).<br />

[17] GAO 2009. Information Security: Agencies Continue to<br />

Report Progress, but Need to Mitigate Persistent<br />

Weaknesses. Technical Report #GAO-09-546. Government<br />

Accountability Office (GAO).<br />

[18] GAO 2012. Information Security: Weaknesses Continue<br />

Amid New Federal Efforts to Implement Requirements.<br />

Technical Report #GAO-12-137. Government<br />

Accountability Office (GAO).<br />

[19] GAO 1992. Securities and Futures Markets: Cross-Border<br />

Information Sharing Is Improving, but Obstacles Remain.<br />

Technical Report #GGD-92-110. Government<br />

Accountability Office (GAO).<br />

[20] Gil-Garcia, J. et al. 2010. Conceptualizing Information<br />

Integration in Government. E-Government: Information,<br />

Technology, and Transformation. H.. Scholl, ed. M.E.<br />

Sharpe.<br />

[21] Gil-Garcia, J. et al. 2005. Interorganizational Information<br />

Integration in the Criminal Justice Enterprise: Preliminary<br />

Lessons from State and County Initiatives. (Jan. 2005),<br />

118c– 118c.<br />

[22] Jasanoff, S. 2006. Transparency in Public Science: Purposes,<br />

Reasons, Limits. Law and Contemporary Problems. 69,<br />

(2006), 21–45.<br />

[23] Lumsden, J. et al. 2011. Ontology Definition and<br />

Construction, and Epistemological Adequacy for Systems<br />

Interoperability: A Practitioner Analysis. Journal of<br />

Information Science. 37, 3 (Jun. 2011), 246–253.<br />

[24] Manual on Fiscal Transparency, 2007 Revised Edition:<br />

http://www.imf.org/external/np/fad/trans/manual.htm.<br />

Accessed: 2012-04-22.<br />

[25] Mayer, R.C. et al. 1995. An integrative model of<br />

organizational trust. Academy of management review.<br />

(1995), 709–734.<br />

[26] National Information Exchange Model (NIEM):<br />

https://www.niem.gov/Pages/default.aspx.<br />

[27] O’Riain, S. et al. 2012. Linked Data Driven Information<br />

Systems as an Enabler for Integrating Financial Data.


Information Systems for Global Financial Markets:<br />

Emerging Developments and Effects. A.Y. Yap, ed. IGI<br />

Global. 239–269.<br />

[28] Pan, E.J. 2009. Structural Reform of Financial Regulation.<br />

[29] Pardo, T. et al. 2008. Collaborative governance and crossboundary<br />

information sharing: Envisioning a networked and<br />

IT-enabled public administration. (2008), 5–7.<br />

[30] Pardo, T. et al. 2011. Computing and information technology<br />

challenges for 21st century financial market regulators.<br />

(Delft, Netherland, 2011), 198–209.<br />

[31] Pardo, T. et al. 2012. E-Government Interoperability<br />

Interaction of Policy, Management, and Technology<br />

Dimensions. Social Science Computer Review. 30, 1 (Feb.<br />

2012), 7–23.<br />

[32] Pardo, T. et al. 2004. Modelling the Social and Technical<br />

Processes of Interorganizational Information Integration.<br />

(Hawaii, 2004), 10.<br />

[33] Pardo, T. et al. 2008. Sustainable Cross-Boundary<br />

Information Sharing. Digital Government: E-Government<br />

Research, Case Studies, and Implementation. H. Chen et al.,<br />

eds. SpringerLink. 421–438.<br />

131<br />

[34] Pardo, T. and Burke, B. 2008. Government Worth Having: A<br />

Briefing on Interoperability for Government Leaders.<br />

[35] Pardo, T. and Burke, B. 2008. Improving Government<br />

Interoperability: A Capability Framework for Government<br />

Managers.<br />

[36] Radin, B. 2006. Challenging the performance movement:<br />

Accountability, complexity, and democratic values.<br />

Georgetown Univ Press.<br />

[37] Sayogo, D.S. et al. 2011. Understanding the impact of<br />

computing and information technology on critical challenges<br />

facing 21st century financial market regulators. (Maryland,<br />

2011), 345–346.<br />

[38] Schapiro, M.L. 2010. Testimony Concerning the Lehman<br />

Brothers Examiner’s Report Before the House Financial<br />

Services Committee.<br />

[39] Smith, K. et al. 2008. Everybody share: The challenge of<br />

data-sharing systems. Computer. 41, 9 (2008), 54–61.<br />

[40] Tarullo, D.K. 2010. Equipping financial regulators with the<br />

tools necessary to monitor systemic risk.


On Public Service Provision Informative Phase: A<br />

dialogue-based Model and Platform<br />

Efthimios Tambouris<br />

1 University of Macedonia<br />

156 Egnatia Str., 54006, Thessaloniki,<br />

Greece, +30 2310 891 588<br />

2 CERTH/ITI<br />

6 th km Charilaou-Thermi Rd.<br />

57001, Thessaloniki<br />

tambouris@uom.gr<br />

ABSTRACT<br />

Online provision of public services (such as passport issuance and<br />

establishing a new business) is a priority of eGovernment<br />

worldwide for over a decade. Public service provision consists of<br />

two phases: informative and performative. During the informative<br />

phase, citizens or businesses obtain information before actually<br />

invoking a public service. This information includes required<br />

documents to be submitted, cost, responsible authority etc. The<br />

informative phase, although significant, has been overlooked at<br />

eGovernment literature. In this paper we present a notation for<br />

modeling the informative phase of public services as well as a set<br />

of indicators for measuring quantitative and qualitative<br />

characteristics of public services. We further present a prototype<br />

platform than enables modeling the informative phase of public<br />

services and automatically creating online dialogues to be used by<br />

citizens for obtaining personalized information on public services.<br />

We finally demonstrate the use of the platform by using the<br />

passport issuance public service.<br />

Categories and Subject Descriptors<br />

K.6.1 [MANAGEMENT OF COMPUTING AND<br />

INFORMATION SYSTEMS]: Project and People Management<br />

- Systems Aanalysis and Design, Systems Development<br />

General Terms<br />

Management<br />

Keywords<br />

eGovernment, Public Service Provision, Informative Stage<br />

1. INTRODUCTION<br />

eGovernment is a political priority worldwide with tremendous<br />

amounts of funds being invested, which are estimated to be over $<br />

490 billion worldwide [3]. One of the key eGovernment activities<br />

is online Public Service Provision (PSP) with relevant progress<br />

being regularly monitored [2][13]. A number of stage models<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Vasiliki Outsetari<br />

University of Macedonia<br />

156 Egnatia Str.<br />

54006, Thessaloniki, Greece<br />

+30 2310 891 589<br />

mis0924@uom.gr<br />

132<br />

Konstantinos Tarabanis<br />

1 University of Macedonia<br />

156 Egnatia Str., 54006, Thessaloniki,<br />

Greece, +30 2310 891 578<br />

2 CERTH/ITI<br />

6 th km Charilaou-Thermi Rd.<br />

57001, Thessaloniki<br />

kat@uom.gr<br />

have been proposed for evaluating sophistication and maturity of<br />

eGovernment solutions [4][5][10]. For example, according to<br />

European Union there are five stages of online sophistication for<br />

public services: information, one-way interaction, two-way<br />

interaction, transaction, and targetization [2].<br />

Academic work to better understand PSP suggests it consists of<br />

two distinct but complementary phases: the informative phase and<br />

the performative phase [9]. During the informative phase the<br />

citizen/business obtains information about the service while<br />

during the performative phase the citizen/business invokes and<br />

eventually consumes the public service.<br />

The informative stage is often considered as straightforward to<br />

fully automate. This is reflected in various stage models that<br />

suggest providing information is the first stage of sophistication<br />

and can be fully accomplished simply by “providing information<br />

online”. Targetization, which is considered as the ultimate stage,<br />

is often related to providing personalization during the<br />

performative phase, i.e. during service execution.<br />

We follow a different path suggesting the informative phase of<br />

PSP is very important and should be also carefully automated.<br />

During the informative phase, citizens/businesses have to obtain<br />

all necessary information with regards to the specific version of<br />

the public service relevant to their circumstances. As many public<br />

services have hundreds or even thousands of different versions<br />

[7], providing personalized information in an efficient and<br />

effective manner is not straightforward. We therefore consider<br />

that targetization is also relevant to the informative phase in<br />

addition to performative.<br />

In this paper we present a model and prototype platform that can<br />

be used for modeling PSP informative stage and, subsequently,<br />

for providing personalized information to citizens and businesses<br />

using online dialogues.<br />

We believe this work contributes to obtaining a better<br />

understanding of PSP informative stage. It reviews relevant work<br />

in the area to propose a notation that enables domain experts to<br />

model the information stage. It further proposes a number of<br />

indicators that can be used to understand the complexity of PSP<br />

informative phase. Finally, it presents a platform that can be used<br />

by domain experts to graphically design the informative phase of<br />

PSP and by citizens and businesses to obtain information based on<br />

an online dialogue that is automatically created from the model.


The rest of this paper is organized as follows. In section 2 we<br />

present related work in automating the informative phase of PSP.<br />

In Section 3 we present our proposed modeling notation as well as<br />

a number of indicators to better understand the produced public<br />

service models. In Section 4 we present a platform prototype we<br />

have developed for modeling the informative phase of PSP which<br />

enables automatic development of online dialogues to be used by<br />

citizens and businesses. In Section 5 we present a case from using<br />

the platform. Finally, in Section 6 we present the main<br />

conclusions of this work along with future work.<br />

2. PSP INFORMATIVE PHASE (PSP IP)<br />

RELATED WORK<br />

The informative phase is the informative part of the interaction<br />

between a citizen and a public authority providing a public<br />

service. During this phase, the citizen asks questions like Why?<br />

What? Who? Where? When? How? about a public service. When<br />

the answers to these questions have been provided, we can<br />

consider this phase of service provision as complete and the<br />

citizen may proceed to the performative phase i.e. service<br />

invocation.<br />

The informative phase is essential for optimal service utilization<br />

and public administration efficiency however it is often<br />

overlooked by governments. In order to effectively use a public<br />

service, citizens must identify which public services address their<br />

needs and find answers to their questions regarding these services,<br />

e.g. “am I eligible for this service?”, “what documents should I<br />

provide?”, “what is the relevant cost?” etc. [9].<br />

This is particular important as studies suggest public services<br />

often have numerous versions depending on a number of factors<br />

[1] [7]. For example, issuing a passport has many versions<br />

depending on age, whether the application is for a new passport or<br />

renewing a passport or replacing a stolen passport etc. In each<br />

version, the input documents that should be provided are different<br />

whereas the cost may differ as well.<br />

Despite the existence of sophisticated eGovernment PSP systems<br />

for the performative phase, citizens and businesses spend valuable<br />

resources (time and sometimes money) in order to collect the<br />

information required (e.g. about needed documents, cost demands<br />

etc.) in the informative stage i.e. before invoking a service.<br />

In the rest of this section we present three different ways used for<br />

PSP informative stage (PSP IP). We call them unstructured<br />

websites, structured websites and dialogue-based systems.<br />

133<br />

Figure 1. Example of website providing unstructured PS<br />

information<br />

2.1 Unstructured Websites<br />

This category includes websites containing plain information<br />

about public service(s). The information may be excessive<br />

nevertheless there is no structure in the content other than the<br />

menu of the website. Sometimes specific websites have been<br />

developed for single public services such as www.passport.gov.gr<br />

developed for providing information on passport issuance (fig. 1).<br />

2.2 Structured Websites<br />

This category also includes websites containing plain information<br />

about public service(s). This time however information is<br />

provided according to a template that is common for all public<br />

services. It is common that one-stop government portals provide<br />

structured information on public services e.g. www.help.gv.ac<br />

(fig. 2).<br />

Figure 2. Example of website providing structured PS<br />

information<br />

2.3 Dialogue-based Platforms<br />

These platforms guide the visitor through a number of online<br />

questions. By answering, the visitor is provided with personalized<br />

information, commonly on whether he is eligible for the service,<br />

required documents, costs, responsible authority etc.<br />

These platforms are all similar with regards to what the visitor<br />

experiences. However, they are substantially different on how that<br />

information is produced. We will outline three such applications,<br />

namely OneStopGov platform, Rural-Inclusion platform and<br />

Oracle Policy Automation (OPA) platform.<br />

2.3.1 OneStopGov Platform<br />

OneStopGov platform has been developed within the European<br />

Union co-funded project OneStopGov (http://islab.uom.gr/<br />

onestopgov). The platform provides a complete system for online<br />

one-stop government hence covers both the informative and<br />

performative phases of PSP [12]. The public servant (who should<br />

actually be a domain expert) with the assistance of a technical<br />

expert models the public service using a proprietary process<br />

management tool employing BPMN and web services (fig. 3).<br />

The dialogue is automatically created from this model. The enduser<br />

visits the relevant website in order to get informed about the<br />

public service through an online dialogue. OneStopGov platform


employs workflow management technologies for modeling public<br />

services.<br />

Figure 3. Developing a model for PSP IP using OneStopGov<br />

platform<br />

2.3.2 Rural-Inclusion Platform<br />

Rural-Inclusion (RI) platform has been developed within the<br />

European Union co-funded project Rural Inclusion<br />

(http://www.rural-inclusion.eu). RI uses exactly the same<br />

principles as OneStopGov platform. However, the underlying<br />

technologies are different. More specifically, the Semantic Public<br />

Service Portal (S-PSP) developed to support the informative phase<br />

of the public services is based on ontologies technology [6]. As a<br />

result, the domain expert needs to be supported by IT experts in<br />

order to model the public service as an ontology. Recently, the<br />

project has developed a front-end which enables domain experts<br />

to provide all information needed for the online dialogue through<br />

an easy-to-use interface which automatically creates the ontology<br />

(owl file) consumed by the project website visited by end-users.<br />

Rural Inclusion platform employs semantic technologies for<br />

modeling public services.<br />

Figure 4. Developing a model for PSP IP using Rural<br />

Inclusion platform<br />

2.3.3 Oracle Policy Automation Solution for Social<br />

Services (OPA)<br />

The Oracle Policy Automation (OPA) platform was initially<br />

developed from the Australian firm RuleBurst Holdings in order<br />

134<br />

to translate laws and official documents into business rules.<br />

Today, OPA is a tool that serves the modeling and automation of<br />

the business rules’ application (www.oracle.com/technetwork/<br />

apps-tech/policy-automation/). Thus, although it was initially<br />

designed to serve public sector’s needs, it is currently applied in<br />

other sectors as well (e.g. the insurance sector).<br />

OPA consist of two separate applications. The first is Oracle<br />

Policy Modeling, an environment that facilitates authoring of<br />

public services’ rules. The second is Oracle Policy Automation,<br />

which is used to automate public services’ processes. Oracle<br />

Policy Modeling is a windows application that can be employed<br />

by the user (normally a domain expert) in order to author a set of<br />

natural language rules that govern the public service. The tool is<br />

compatible with Microsoft Office automation applications (such<br />

as Word and Excel) hence enables using text properly structured<br />

and annotated in order to describe public services’ rules (fig. 5).<br />

Using these rules, an interview (online dialogue) is automatically<br />

created and deployed. The interested citizens can thereafter visit<br />

the relevant website and initiate this interview in order to be<br />

informed whether they are eligible for the service or not. OPA<br />

platform employs rules management technologies and expert<br />

systems for modeling public services.<br />

Figure 5. Developing a model for PSP IP using OPA<br />

2.3.4 Evaluation of Existing Approaches<br />

Existing solutions for PSP information phase range from simple<br />

websites to sophisticated solutions.<br />

An analysis of advanced solutions suggests they follow an<br />

architecture similar to the one presented in fig. 6.


Expert<br />

1. Expert<br />

describes service<br />

3. Dialogue<br />

launched<br />

«subsystem»<br />

Service Representation<br />

Tool<br />

2. Service model<br />

transferred<br />

«subsystem»<br />

Dialogues Presentation<br />

Website<br />

4. Citizen executes<br />

dialogue<br />

End-­‐user<br />

Figure 6. Main Architecture of dialogue-based platforms<br />

More specifically, the platform consists of two sub-systems: a<br />

Service Representation Tool and a Dialogues Presentation<br />

Website.<br />

The platform is used in a 4-step manner. In the first step, an expert<br />

uses the Service Representation Tool in order to describe<br />

(verbally or using a model) the public service. In the second step,<br />

a file describing the service is transferred from the Service<br />

Representation Tool to the Dialogues Presentation Website. In the<br />

third step, the dialogue is automatically created and launched.<br />

Finally, in the last step the end-user (normally citizen or business)<br />

visits the Dialogues Presentation Website, executes the dialogue<br />

and obtains the required information.<br />

By examining the different approaches for the Service<br />

Representation Tool we decided to endorse modeling of public<br />

services since we believe it is more straightforward and widely<br />

used as it can also be based on open standards for process<br />

modeling. RI platform employs ontologies which we believe is<br />

less straightforward than provess modeling. On the other hand,<br />

OneStopGov platform is based on proprietary software and<br />

handles both informative and performative phases thus is more<br />

complicated than needed for our objectives.<br />

Using a diagram for PSP has significant advantages [11]. In our<br />

case, it enables (a) easy representation of PSP IP by domain<br />

experts (usually public servants) without any programming effort,<br />

(b) analysis and better understanding of PSP IP complexity using<br />

a number of indicators, (c) easy management of PSP IP by reusing<br />

and changing diagrams, (d) easy validation of diagrams, (e)<br />

eventually development of better quality public services, (f)<br />

citizens and businesses to obtain personalized information about<br />

public service simply by answering online questions instead of<br />

face-to-face interactions, using a call center etc.<br />

It should be noted here that extensive research has been conducted<br />

in the area of personalized PSP mainly using ontologies and rules,<br />

e.g. [1]. In this paper however we focus on more visual and easyto-use<br />

technologies for the reasons stated above. In addition, the<br />

descriptions of public services in relevant legal documents are<br />

usually detailed hence can easily result in deterministic models<br />

that can be easily verified.<br />

3. NOTATION AND INDICATORS<br />

An important element for the production of personalized<br />

information is the development of a model that will represent the<br />

public service’s dialogue.<br />

In order to model the informative phase of PSP, we developed a<br />

simple modeling notation that allows for the visual representation<br />

135<br />

of the dialogue. We also present the rules that need to be followed<br />

for the resulting model to be valid.<br />

Having represented a public service using a model enables us to<br />

obtain interesting information about the service. In this respect,<br />

we propose a number of indicators to better understand the<br />

modeled public services.<br />

3.1 PSP IP Dialogue Model<br />

The main idea is to model the PSP informative phase (PSP IP) as<br />

a dialogue (or interview) between the public authority and the<br />

visitor (citizen or business). The model thus mainly contains<br />

questions and possible answers. For example, when modeling<br />

public service “issuing a marriage permit”, a possible question is<br />

“what is your marital status?” with possible answers “single”,<br />

“divorced” etc. The model also contains information on input<br />

documents that should be submitted by the citizen for invoking<br />

the public service as well as information on cost or subsidy<br />

depending on the nature of the service.<br />

Using this dialogue model one can quickly and without any<br />

ambiguity determine whether he is eligible for a service or not.<br />

Eligible visitors can further obtain personalized information such<br />

as required documents to be submitted for service invocation and<br />

costs.<br />

3.2 PSP IP Modeling Notation<br />

In Table 1 we present a simple notation proposed for modeling<br />

PSP informative phase. This notation is influenced by BPMN<br />

(http://www.bpmn.org/), graph theory, academic public service<br />

models (e.g. GEA [9]), templates used for describing public<br />

services (e.g. in national portals) as well as templates proposed in<br />

national eGovernment Interoperability Frameworks. The only<br />

reason for proposing a new notation instead of adopting an<br />

existing such as BPMN is simplicity. We aim at a notation with<br />

only a few symbols since our experience suggests simplicity is of<br />

paramount importance if the tool is to be used by public servants.<br />

The diagrams produced using this notation represent the dialogue<br />

between the system and the user. From a technical point of view<br />

each diagram is actually a directed acyclic graph.<br />

The notation is briefly explained now (the term visitor here<br />

represents anyone executing a dialogue).<br />

o Start node. Represents the start of the diagram.<br />

o End node. Represents the completion of a dialogue in the<br />

diagram. It can be one of the following:<br />

-­‐ Eligible. It suggests the visitor is eligible for the<br />

service.<br />

-­‐ Not Eligible. It suggests the visitor is not eligible for<br />

the service.<br />

o Question. Represents a question posed to the visitor e.g.<br />

“Which is your current marital status?”<br />

o Answer. Represents a possible answer to an expressed<br />

Question e.g. “Married”.<br />

o Input Document. Represents a document the visitor should<br />

provide based on a previous answer. For example, a<br />

“Married” answer to a question might lead to a need for<br />

submitting a “marriage certificate” as a required document<br />

for invoking the public service.


o Information. Represents any information the visitor should<br />

know e.g. “the execution of the service should be completed<br />

within ten working days”.<br />

o Value. Represents an amount the visitor should pay to<br />

invoke the service or receive after the service’s completion<br />

(e.g. in case of a social benefit service). There are three cases<br />

for a Value object:<br />

-­‐ Registration. Represents the amount that the visitor<br />

should pay as a lump sum (e.g. a 20 € fee).<br />

-­‐ Annual Subscription. Represents the amount that<br />

the visitor should pay annually (e.g. an annual<br />

subscription to a chamber of commerce).<br />

-­‐ Subsidy. Represents the amount that the visitor is<br />

entitled from the execution of a service (e.g.<br />

housing benefit).<br />

Value is a subcase of Information but we include it as<br />

separate object due to its particular importance to citizens<br />

and public authorities as well as its semantics (e.g. Values<br />

can be added).<br />

We call Question, Input Document, Information and Value<br />

internal nodes of the graph (diagram).<br />

Table 1. Notation for PSP IP Dialogue Diagrams<br />

Element and Description Symbol<br />

Start:<br />

� Portrays the beginning of the diagram.<br />

Question:<br />

� Is used to represent a question posed to<br />

citizens/businesses.<br />

Answer:<br />

� Is used to represent a possible answer to a<br />

question.<br />

Input Document:<br />

� Is used to represent a document required for<br />

invoking a public service.<br />

Information:<br />

� Is used to represent any additional information<br />

a citizen/business should know.<br />

Value:<br />

� Is used to represent any monetary amount (it is<br />

a special case of Information).<br />

Not Eligible:<br />

� Is used to stop all control flows (thus it<br />

represents an end node)<br />

� It suggests the citizen/business is not eligible<br />

for the service.<br />

Eligible:<br />

� Is used to stop all control flows (thus it<br />

represents an end node)<br />

� It suggests the citizen/business is eligible for<br />

the service.<br />

We should note that the arrow besides representing a Question is<br />

also used to link the Start node to the first Question (hence<br />

representing control flow without any question). We understand a<br />

136<br />

new symbol should have been introduced for that however for<br />

simplicity we decided to use the arrow.<br />

In developing PSP IP diagrams there are certain rules that need to<br />

be respected for the resulting diagram to be valid. These rules are<br />

derived from graph theory and the fact that the graph should be a<br />

directed acyclic one. The most important are presented in Table 2.<br />

Table 2. Rules of PSP IP Dialogue Diagrams<br />

1. There is only one Start node that contains only one<br />

outgoing arrow leading to the first Question.<br />

2. There are one or more End nodes. An End node has one<br />

or more incoming Arrows but no outgoing Arrow.<br />

3. All paths (representing potential dialogues) should end in<br />

an End node.<br />

4. An Arrow always connects two nodes which should be<br />

different.<br />

5. Arrows indicate the control flow of the dialogue.<br />

6. An Answer may lead to only one Question, Information,<br />

Input Document or End Node.<br />

7. Question nodes should have at least two outgoing Arrows.<br />

All other internal nodes should only have one outgoing<br />

Arrow.<br />

8. No node should be “orphan”, i.e. all nodes should have at<br />

least one incoming and one outgoing arrow (subject to<br />

other rules).<br />

9. The resulting graph should be acyclic, thus no cycling<br />

paths should exist.<br />

3.3 Public service indicators<br />

The current effort aims to facilitate, apart from citizens, public<br />

service providers in designing dialogues but also in managing PSP<br />

IP. For this purpose, we introduce a number of indicators. Using<br />

these indicators the domain expert who designs the diagram<br />

obtains interesting information on various aspects of the service.<br />

The indicators measure the behavior of the main objects (i.e.<br />

Question, Document, and Value) and the diagram in general. To<br />

derive these indicators, graph theory was reviewed in the context<br />

of public service provision according to the authors’ relevant<br />

experience. In the rest of this section, we present the proposed<br />

indicators.<br />

3.3.1 Number of Dialogues<br />

This indicator provides the number of different dialogues in a<br />

diagram, i.e. the number of unique paths in the graph. This is an<br />

indication of the service’s complexity, since an increased number<br />

of dialogues suggests an increased number of service’s versions.<br />

3.3.2 Number of Dialogues that Results in a not<br />

Eligible Node<br />

This indicator provides the number of different dialogues that<br />

result in a not eligible node i.e. in cases where the citizen does not<br />

meet the requirements for invoking the public service. This is an<br />

indicator of the number of preconditions that must be fulfilled for


someone to be non-eligible for the service. When this indicator is<br />

equal to zero then everyone is eligible for invoking the service.<br />

3.3.3 Maximum/Minimum/Average Number of<br />

Questions<br />

These indicators provide the maximum, minimum and average<br />

number of questions that are asked to the citizen during the<br />

dialogue. The indicators count only questions that result in an<br />

eligible end node and, thus, show the number of questions<br />

required for the successful completion of the dialogue. An<br />

increased number of questions indicate more complex services.<br />

3.3.4 Maximum/Minimum/Average Total Cost<br />

These indicators provide the maximum, minimum and average<br />

cost of the service. Obviously, they count only the cost coming<br />

from dialogue paths that result in an eligible end node. The<br />

service provider can use these indicators to measure the range of<br />

the service’s cost for the citizen. As a result, they can also<br />

measure the expected income from the execution of the public<br />

service provided details on the number of citizens that will<br />

consume the service are also known.<br />

3.3.5 Maximum/Minimum/Average Total Subsidy<br />

These indicators provide the maximum, minimum and average<br />

expected citizen’s benefit after the execution of the public service.<br />

It can be used by public authorities to compute the range of the<br />

total subsidy as well as its average provided details on the number<br />

of beneficiaries are known.<br />

3.3.6 Maximum/Minimum/Average Number of Input<br />

Documents<br />

These indicators provide the maximum, minimum, and average<br />

number of documents that different citizens’ categories need to<br />

provide for invoking the service. They also count the number(s) of<br />

documents coming from not eligible dialogues, if applicable.<br />

These indicators could be used to examine the level of<br />

bureaucracy as an increased number of required input documents<br />

usually indicates an increased level of red tape.<br />

3.3.7 Indicators for Set of Services<br />

Apart from the indicators that refer to each specific service<br />

diagram, we also propose a number of indicators that apply to a<br />

set of services diagrams. These indicators are helpful to public<br />

administrations responsible for the design and management of<br />

many public services. The indicators include:<br />

o Involvement of Other Public Authorities. This dictates the<br />

number of other public authorities that are involved in<br />

providing a particular public service. It is measured through<br />

the required input documents of each service and the public<br />

authorities that are issuing them.<br />

o Number of Services per public Authority. This dictates the<br />

number of services provided by each public authority. This<br />

information can be useful for planning, including human<br />

resources management.<br />

o Document’s Importance. A large number of input<br />

documents are actually produced by public authorities. This<br />

indicator depicts the number of services using a particular<br />

document. This is useful in planning e.g. to estimate how<br />

many services will be affected if an input document is<br />

abolished or replaced.<br />

137<br />

It should be noted that as all service descriptions can be stored in<br />

a database, additional information may be extracted depending on<br />

specific needs.<br />

4. PSP IP PLATFORM<br />

In order to demonstrate the use of the proposed notation we<br />

developed a prototype platform presented in this section.<br />

4.1 Architecture and Functionality<br />

The architecture of the developed prototype platform is shown in<br />

fig. 7 using UML deployment diagram while its main<br />

functionality is shown in fig. 8 using UML use case diagram.<br />

Figure 7. Platform architecture<br />

As presented in the use case diagram there are three main actors:<br />

domain expert, content manager and citizen/business (visitor or<br />

end-user). It is worth explaining the content manager. This role is<br />

responsible for central activities including managing all public<br />

documents, describing public services, deciding which PSP IP<br />

diagrams to launch in the Dialogue website etc.<br />

Figure 8. Platform main functionality<br />

4.2 Main Usage Scenario<br />

There are many different usage scenarios for this platform. Here<br />

we present one such usage scenario.<br />

Step 1. Input Documents are Described<br />

The Content manager is using the Service Admin Tool in order to<br />

create descriptions of input documents that will be needed when<br />

modeling PSP IP (fig. 9). Ideally, there should be one such


common documents repository at the national level. This list is<br />

stored in an xml file.<br />

Step 2. Domain Expert Models the PSP IP Dialogue<br />

The Domain expert is using the Service Modeling Tool in order to<br />

create the PSP IP diagram for a public service (fig. 10). While<br />

preparing the diagram, the Domain expert is also able to observe<br />

the values of various indicators. He is capable, in that way, to<br />

study the different versions of the service.<br />

Figure 9. Management of public documents<br />

Figure 10. Platform screenshot<br />

It should be noted that the Service Modeling Tool fully supports<br />

the proposed notation including rules as well as indicators<br />

presented in the previous section. In this respect, the Domain<br />

expert can choose to “validate” the diagram which results in<br />

checking that no rule is violated (see fig. 11 and 12).<br />

138<br />

Figure 11. Example of a detected violation<br />

Figure 12. Example of an error message<br />

Finally, the Domain expert can save a dialogue’s graph into an<br />

xml file, which can be retrieved in the future to complete the<br />

design or send it to the Content manager of the system. The<br />

Domain expert can also choose to model a part of the diagram and<br />

send the relevant file to another Domain expert to finalize it. This<br />

is particularly useful for modeling services provided by more than<br />

one public authority or for complex services where many Domain<br />

experts need to collaborate during the design of the diagram.<br />

Step 3. Content Manager Stores the Dialogue to the<br />

Database<br />

For each public service modeled, the Content manager adds some<br />

information such as title, description, responsible authority etc.<br />

Then he can use this information along with the xml file in order<br />

to publish the service in the Dialogues Presentation Website. For<br />

this purpose, he stores the graph in the Services Database that is<br />

accessible by the Dialogues Presentation Website.<br />

Moreover, in case of termination or modification of a service, the<br />

Content manager can delete the service from the database, thus<br />

making it unavailable for the public. Finally, the Content manager<br />

can produce public services’ aggregate statistics using data<br />

extracted from the database.<br />

Step 4. Citizen Launches the Dialogue<br />

The citizen/business visits the Dialogues Presentation Website<br />

and launches the dialogue for a specific service. The dialogue is<br />

automatically created on the fly by accessing the Services<br />

Database (fig. 11). In case the citizen is eligible for the service,<br />

the system also informs him about the required documents that he<br />

should adduce in order to proceed to the execution of the service.


Figure 13. Citizens website<br />

4.3 Technologies<br />

The Service Modeling Tool and Service Admin Tool were<br />

developed in this prototype under a common desktop application<br />

supporting different roles based on credentials. This application<br />

was implemented in Java. The Dialogues Presentation Website<br />

was implemented using PHP programming language. The services<br />

database was implemented using MySQL.<br />

A basic feature of the Service Modeling Tool is the graphic design<br />

and representation of dialogues as graphs. Jgraphx library allows<br />

the visual design, graphical representation and interaction with the<br />

dialogue’s graph.<br />

In the frame of the Service Modeling Tool there was a need for<br />

xml files processing. To this end, the XOM library was employed.<br />

The calculation of indicators was performed using depth-first<br />

search (DFS) graph theory algorithms.<br />

The validation of the graph in terms of identifying cycles was<br />

performed using the topolorder algorithm [8].<br />

5. CASE STUDY<br />

In this section we present a case study to demonstrate the<br />

proposed approach, model and platform. We use the public<br />

service passport issuance (in Greece). In order to model the<br />

service’s informative phase, we gathered and studied all relevant<br />

laws and rules governing the specific public service. Main source<br />

of information was also the official website passport.gov.gr.<br />

In the rest of this section, we present the four main steps that were<br />

followed in the process.<br />

Step 1. Input Documents are Described<br />

In this step the content manager is using the Service Admin Tool<br />

in order to describe all input documents needed for invoking<br />

Passport Issuance service, if these are not already in the database.<br />

In this case, there are 9 different input documents including ID,<br />

application, birth certificate etc. It should be noted that most of<br />

them are provided by other public authorities as the outcome of<br />

other public services.<br />

Step 2. Domain Expert Models the PSP IP Dialogue<br />

In this step the domain expert has to produce the PSP IP diagram.<br />

For this purpose, all service versions need to be documented in<br />

terms of different questions and answers, required documents and<br />

relevant costs.<br />

Next, the domain expert uses the Service Modeling Tool in order<br />

to model the service as a graph. The expert starts using the Start<br />

Node and proceeds with the first Question. This is done by<br />

139<br />

dragging and dropping the symbols from the Symbols area to the<br />

Design area just like in any other drawing tool (see fig. 14).<br />

The questions have to be formulated so that every Answer leads to<br />

a different version or satisfies a service precondition. A basic aim<br />

is to develop a graph that contains the minimum number of<br />

questions. Each question has to be short in length, easy to<br />

understand and focus on one only rule. For example, the question<br />

“Are you an adult Greek?” includes two rules (age and<br />

nationality) and thus should be divided in two questions.<br />

Obviously, there should also be no overlap between questions e.g.<br />

“What is your age?” and “Are you an adult?”<br />

Each Answer is followed by another Question or Required Input<br />

Documents that are needed to verify the answer.<br />

As a good practice, we recommend that the model starts with the<br />

eligibility questions i.e. those that determine whether someone is<br />

eligible and then proceeds with the versioning questions i.e. those<br />

determining the service version along with the needed input<br />

documents and costs.<br />

Figure 14. Modeling Passport Issuance service<br />

The following figure presents the full diagram for the Passport<br />

Issuance service. The diagram is not readable but provides an idea<br />

of the complexity of the dialogue.


Figure 15. Full model of Passport Issuance service<br />

From a technical point of view, it should be noted that the<br />

dialogue graph is stored as an xml file.<br />

An interesting feature of the platform is its ability to calculate and<br />

present a number of indicators for the modeled public service. By<br />

pressing “calculate” in the Service Modeling Tool (tab:<br />

Indicators) we obtain the results presented in fig. 16.<br />

These suggest there are 219 different paths (dialogues) in this<br />

service with 26 leading to a Non-Eligible end node. Hence, the<br />

public service contains 193 service versions.<br />

They further suggest a dialogue has a minimum of 3 and a<br />

maximum of 10 questions for the citizen. The citizen has to<br />

provide between 4 and 9 different input documents (based on his<br />

circumstances) to invoke the public service.<br />

Finally, the costs of the service is between 68.8 € and 84.4 € with<br />

an average cost of 80.11 €.<br />

Figure 16. Indicators for Passport Issuance<br />

140<br />

Step 3. Content Manager Stores the Dialogue to the<br />

Database<br />

In this step the content manager inserts some basic information on<br />

the service (see fig. 17) and stores it to the Service database hence<br />

making it available for launch by citizens.<br />

Figure 17. Inserting basic information about the service<br />

Step 4. Citizen Launches the Dialogue<br />

In this final step, the citizen visits the Dialogues Presentation<br />

website, selects the Passport Issuance service, views the basic<br />

information about it and launches the dialogue. After that, the<br />

questions are asked one by one (fig. 18).<br />

Figure 18. Screenshot presenting one question with possible<br />

answers<br />

Based on the answers, the citizen is informed whether he is<br />

eligible and in this case what are the required documents and the<br />

cost of the service (fig. 19).


Figure 19. Information provided after the dialogue completion<br />

6. CONCLUSIONS AND FUTURE WORK<br />

In this paper, we present a notation and platform that facilitates<br />

the informative phase of public service provision (PSP IP). This<br />

model capitalizes on previous work suggesting public services are<br />

represented (usually in models) and subsequently online dialogues<br />

are automatically developed for citizens to obtain personalized<br />

information.<br />

More specifically, we first present a modeling notation for PSP IP.<br />

The notation is influenced by BPMN and graph theory and<br />

suggests PSP informative phase is modeled as a directed acyclic<br />

graph that consists of one start node, one or more eligible and<br />

non-eligible end nodes, questions, answers, information, value<br />

and input documents. Furthermore, we introduce a number of<br />

indicators of graph models such as number of dialogues, max and<br />

min questions in the diagram; max and min required documents;<br />

max and min cost (or subsidy).<br />

We further present a prototype platform that can be used by<br />

domain experts to model PSP IP and by citizens to execute<br />

corresponding dialogues that have been automatically created<br />

from the models. The platform also performs a number of validity<br />

tests on the graph and automatically calculates the values of<br />

indicators thanks to the use of graph theory algorithms. This<br />

platform provides some clear advantage over other approaches<br />

(presented in section 2) as shown at the beginning of section 3.<br />

Future work includes revisiting the proposed modeling notation to<br />

become theoretically solid and robust without losing its<br />

simplicity. It also includes further enriching the modeling<br />

notation. For example, in its current form, the model cannot<br />

handle complex situations such as when Document A or<br />

Document B can be used as required documents to validate an<br />

answer.<br />

Future work also includes a thorough investigation of indicators.<br />

In this work, we introduced a small number of indicators and<br />

implemented a subset of them. However, deeper theoretical work<br />

is needed including validation by experts.<br />

The platform itself is only a proof-of-concept prototype hence<br />

there is substantial room for improvement both in terms of<br />

functionality but also user friendliness, robustness etc.<br />

For example, we would like to enhance the platform to be able to<br />

handle more complex situations, e.g. enabling domain experts<br />

141<br />

from different public authorities to collaborate in order to model a<br />

set of public services required to fulfill a life event. For this<br />

purpose, our intention is to move towards a web-based platform<br />

for service modeling.<br />

Finally, as a next step for our case study, once the above<br />

mentioned work is done, we aim to contact the official authorities<br />

and suggest integrating the Dialogues Presentation Website in the<br />

official Passport Issuance website (www.passport.gov.gr).<br />

7. ACKNOWLEDGMENTS<br />

Part of this work was conducted within the eGovPoliNet project<br />

which is co-funded by the European Commission.<br />

8. REFERENCES<br />

[1] Chun S., Atluri V., and Adam N. Dynamic Composition of<br />

Workflows for Customized eGovernment Service Delivery.<br />

In: Proceedings of dg.o 2002, (2002), ACM Press, 383-389.<br />

[2] European Commission. Digitizing Public Services in Europe:<br />

Putting ambition into action, 9th Benchmark Measurement,<br />

2010.<br />

[3] Gartner. Forecast: IT services 20082015, 2Q11 Update,<br />

2011.<br />

[4] Klievink, B., Janssen, M. Realizing joined-up government -<br />

Dynamic capabilities and stage models for transformation.<br />

Government Information Quarterly, 26, 2 (2009), 275-284<br />

[5] Layne K. and Lee J. Developing fully functional egovernment:<br />

A four stage model. Government Information<br />

Quarterly, 18, 2 (2001), 122-136.<br />

[6] Loutas N., Lee D., Maali F. Peristeras V., Tarabanis K. The<br />

Semantic Public Service Portal (S-PSP). In: Proceedings of<br />

8th Extended Semantic Web Conference (ESWC 2011),<br />

(Heraklion, Greece, 2011), 227-242.<br />

[7] Momotko M., Izdebski W., Tambouris E., Tarabanis K. and<br />

Vintar M. An Architecture of Active Life Event Portals:<br />

Generic Workflow Approach. Electronic Government, LNCS<br />

# 4656, Springer Verlag, (2007), 104-115.<br />

[8] Paparrizos K. Algorithms, Zygos, Greece, 2002.<br />

[9] Peristeras, V. The Governance Enterprise Architecture-GEAfor<br />

Reengineering Public Administration. PhD Thesis,<br />

University of Macedonia, Greece, 2006.<br />

[10] Siau, K., Long, Y. Synthesizing e-government stage models<br />

– a meta-synthesis based on meta-ethnography approach.<br />

Industrial Management & Data Systems, 105, 4, (2005) 443-<br />

458.<br />

[11] Tambouris E. Introducing the need for a Domain Model in<br />

Public Service Provision (PSP) eGovernment Systems. In:<br />

Proceedings of ICDIM 2008, IEEE Press, 794-799.<br />

[12] Tambouris E., Tarabanis K., A dialogue-based, life-event<br />

oriented, active portal for online one-stop government: the<br />

OneStopGov platform. In: Proceedings of dg.o 2008, (2008),<br />

ACM Press, 405-406.<br />

[13] United Nations. Global E-Government Survey 2012, 2012


142


The Complexity of Cross-Boundary Information Sharing:<br />

An Organizational Perspective on Taiwan E-Government<br />

Tung-Mou Yang<br />

Department of Library and Information Science, National Taiwan University<br />

ABSTRACT<br />

Cross-boundary Information sharing has long been considered an<br />

important approach for increasing organizational efficiency and<br />

performance. However, achieving cross-boundary information<br />

sharing is a complex task not only in the private sector but also in<br />

the public sector. This research explores the complexity of crossboundary<br />

information sharing by employing a case study in<br />

Taiwan e-Government. Data are collected through semi-structured<br />

interviews and analyzed by using grounded theory techniques.<br />

While a variety of influential factors can come from different<br />

perspectives such as technology, organization, legislation, policy,<br />

and surrounding environment, this paper takes a deeper look to<br />

focus on the influential organizational factors. The findings of this<br />

exploratory research is also able to contribute to the current<br />

information-sharing literature from an international perspective.<br />

Categories and Subject Descriptors<br />

H.4.2 [Information Systems Applications]: Type of systems – egovernment<br />

applications<br />

General Terms<br />

Management, Performance, Human Factors, Theory<br />

Keywords<br />

Information Sharing, Electronic Government, Taiwan<br />

1. INTRODUCTION<br />

With the development of information and communication<br />

technologies, e-Government has become an important strategy for<br />

attaining the effectiveness and efficiency in government<br />

operations and public services. Several stage-models of e-<br />

Government developments are proposed by researchers, and the<br />

critical role of cross-boundary information sharing in e-<br />

Government is identified [1]. Although many government<br />

agencies have integrated services within their own agencies,<br />

citizens and businesses still need to interact with various different<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

No. 1, Sec. 4, Roosevelt Rd., Taipei, 10617 Taiwan (R.O.C.)<br />

886.2.3366.2970<br />

tmyang@ntu.edu.tw<br />

143<br />

government agencies to acquire desired services. There is an<br />

urgent cross-boundary information-sharing need among<br />

government agencies of different levels and functionalities.<br />

2. THE COMPLEXITY OF CROSS-<br />

BOUNDARY INFORMATION SHARING<br />

Nevertheless, cross-boundary information sharing in the public<br />

sector is a complex task and usually happens in a diversified<br />

environment with participants having different values, goals, and<br />

cultures. In order to facilitate information-sharing initiatives,<br />

identifying influential factors is critical, and a variety of<br />

perspectives such as technological, organizational, sociological,<br />

ideological, and political contexts should be considered [2].<br />

In the technological perspective, information sharing activities can<br />

be considered as IT projects when there are usually information<br />

system construction and business process reengineering involved<br />

[3]. It is a challenge to integrate heterogeneous information<br />

systems having different platforms, data standards, schemas and<br />

qualities [3]. In addition, technological capability among the<br />

participating organizations is also critical to the success of crossboundary<br />

information sharing [4].<br />

In the organizational perspective, interagency information sharing<br />

involves complex interactions among involving organizations [3,<br />

5]. Organizations have different values and cultures and may<br />

spread in different geographic areas to make communication<br />

difficult and inefficient. The creation and maintenance of interorganizational<br />

relationship also rely heavily on trust building<br />

among involved organizations [5, 6]. However, trust in<br />

information sharing collaboration can decreases due to concerns<br />

of losing autonomy and information misusing by others to incur<br />

liabilities [7, 8]. In addition to trust, leadership can be utilized as<br />

an authority force to promote cross-boundary coordination [9].<br />

The lack of resource such as staff shortage is another challenge.<br />

An agency may focus on urgent issues within its own organization<br />

if the immediate benefits of sharing information cannot be<br />

foreseen by the agency [10, 11].<br />

In the political and policy perspective, legal and policy regulations<br />

can shape relationship building, risk reduction, and trust<br />

development in inter-organizational information sharing when<br />

specific guidance is mandated [3, 4, 12, 13]. Without support from<br />

legislators and policy mandate, cross-boundary information<br />

sharing in the public sector can lose its priority and necessary<br />

resources to make the project sustainable [7]. Nevertheless, crossboundary<br />

information sharing may also be hindered due to related


policies to prevent government agencies from sharing sensitive<br />

and regulated information [3, 7, 12]. Therefore, an explicit<br />

statutory authority should clearly define the circumstances that<br />

information collected in one agency can be shared to other<br />

agencies [4, 10].<br />

3. THE SELECTED CASE STUDY<br />

In the past decade Taiwan government has focused its effort on<br />

developing initiatives of interagency information sharing and<br />

integration. Current focus has been on cross-agency service<br />

integration and the promotion of integrated e-services.” Therefore,<br />

the context of Taiwan e-Government and its past and ongoing<br />

development in cross-agency shared services make a good case<br />

for this study to explore the complexity of interagency<br />

information sharing. Specifically, this research focuses on the<br />

organizational perspective to examine the following two<br />

questions:<br />

1. What are the critical organizational factors that influence<br />

the initiatives of cross-boundary information sharing in<br />

Taiwan e-Government?<br />

2. What is the nature of the impact of the factors on the<br />

initiatives of cross-boundary information sharing in Taiwan<br />

e-Government?<br />

4. RESEARCH DESIGN AND METHOD<br />

This study employs a case study methodology, and the selected<br />

case comes from the context of Taiwan e-Government. In<br />

particular, a case study of the e-Networking Project of<br />

Government Online Service in Taiwan is developed and then<br />

applied in the research.<br />

A purposive sampling using snowball sampling methodology is<br />

undertaken to identify the relevant candidates to conduct<br />

interviews. In-depth and semi-structured interviews were used to<br />

collect data. There were in total twenty-eight participants<br />

interviewed in the study. The data analysis process followed an<br />

inductive approach by using grounded theory techniques. During<br />

data analysis, a qualitative software, Atlas-ti, was utilized to<br />

support coding and analysis activities.<br />

5. FINDINGS<br />

In this exploratory research, established organizational structures<br />

and instilled organizational cultures of government agencies are<br />

identified to influence initiatives of cross-boundary information<br />

sharing. In addition, other influential organizational factors are<br />

listed and discussed according to the roles of information provider<br />

and information receiver. Lastly, some organizational factors that<br />

can bring positive impact on the related initiatives are also<br />

addressed.<br />

5.1 Bureaucratic Organizational Structures<br />

Cross-boundary information sharing in e-Government is not just<br />

related to technological issues but is in a complex context<br />

involving different government agencies separated by the<br />

bureaucratic organizational structures. Boundaries of information<br />

sharing are formed by the bureaucracy from both the vertical and<br />

horizontal dimensions. With different operational procedures and<br />

work flows, resources and budgets, government agencies have<br />

respective missions and operations. Different government<br />

agencies can bring up different levels of information quality, and<br />

their approaches and strategies to share information across<br />

organizational boundaries also vary from each other. It is also<br />

144<br />

observed that government agencies within the same Ministry can<br />

encounter fewer obstacles to share information when fewer<br />

organizational boundaries are formed among them.<br />

5.2 Organizational Cultures and Values<br />

Having different missions and operations, government agencies<br />

foster their respective organizational cultures and values. In the<br />

case study, some government agencies such as the Department of<br />

Household Registration are already defined to act as information<br />

providers in their organizational missions. The government<br />

agencies can be more willing to share information to other<br />

agencies. On the contrary, some agencies such as police agencies<br />

and taxation agencies act more conservative to share their<br />

information to others. The negotiation and communication among<br />

government agencies with different cultures and values usually<br />

takes time and cost.<br />

5.3 Influential Factors to Information<br />

Providers<br />

For government agencies acting as information providers, several<br />

factors that influence their intentions to share information are<br />

discussed in the following subsections.<br />

5.3.1 Extra Effort under Limited Resource<br />

The major effort of information sharing usually falls on the<br />

process of information preparation and the following maintenance<br />

and service. The process of information preparation can be a very<br />

time-consuming task especially when a government agency has to<br />

go over some of its information systems or even modify them to<br />

produce the required information. In addition, an information<br />

provider also has to assign necessary personnel to maintain the<br />

hardware equipment and the information systems implemented for<br />

cross-boundary information sharing which require extra time,<br />

labor, and effort. Under limited budget and resource, government<br />

agencies tend to focus on their own businesses first and put the<br />

information-sharing requests from other agencies in the lower<br />

priority.<br />

5.3.2 Concern of Information Quality<br />

The intention of a government agency to share information across<br />

boundaries can also be influenced by the quality of information it<br />

currently possesses. A government agency can be less willing to<br />

share information when its information is in low completeness<br />

and accuracy. A government agency has concerns in incurring<br />

potential scrutiny and does not want to be liable for providing<br />

incomplete and inaccurate information to other government<br />

agencies.<br />

5.3.3 Concern of Information Misuse<br />

Another information provider’s concern is information misuse by<br />

other agencies to incur liability. After information is shared across<br />

boundaries, information providers have little control over the<br />

shared information and encounter difficulty in knowing how the<br />

shared information is utilized by other agencies. Whether the<br />

information is protected in a secured information environment,<br />

whether the information is solely applied to the proposed purpose,<br />

and whether the information is used for other unknown purposes?<br />

The uncertainty regarding how other government agencies may<br />

treat, use, and protect the shared information incur the liability<br />

concern of government agencies to act as information providers to<br />

share information across boundaries.


5.3.4 Limited Incentive and Reward<br />

In the case study, for government agencies acting as information<br />

providers, they have very few and limited incentive and reward to<br />

share information. The limited incentive and reward available is<br />

not encouraging enough for government agencies and their<br />

employees to contribute effort to interagency information sharing.<br />

In most of the cases, major credits are usually taken by<br />

information receivers which acquire information sharing from<br />

other government agencies to provide integrated or innovative<br />

services. Information providers actually care more about the<br />

liability rather than the limited incentive or reward.<br />

5.4 Influential Factors to Information<br />

Receivers<br />

For government agencies acting as information receivers, several<br />

observed factors that influence initiatives of cross-boundary<br />

information sharing are discussed in the following subsections.<br />

5.4.1 Over-Estimated Capability of Information<br />

Provider<br />

Some information requestors may request information that does<br />

not exist in the databases of information providers. The situation<br />

can happen when an information requestor does not really<br />

understand an information provider’s limitation of information<br />

possession. A cognition divide regarding cross-boundary<br />

information sharing exists between some information providers<br />

and information receivers so that related initiatives cannot be<br />

implemented properly.<br />

5.4.2 The Willingness and Trust to Use Shared<br />

Information<br />

It is also observed that some government agencies put little trust<br />

on the shared information from other agencies. Even though the<br />

information is actively shared across boundaries based on<br />

legitimate policy, some conservative agencies still prefer<br />

following their traditional operational procedures without<br />

applying the shared information to their work. They are unwilling<br />

to utilize the information when the shared information can indeed<br />

improve the efficiency and accuracy of their operations and<br />

increase the effectiveness of public services. Hence, the concept<br />

to trust and to utilize shared information is critical to the success<br />

of interagency information sharing.<br />

5.5 Influential Factors to Both Information<br />

Providers and Receivers<br />

The following subsections talk about influential factors that can<br />

be applied to both information providers and information<br />

requestors.<br />

5.5.1 The Long-Been-Ignored Information Unit<br />

The role of IT professionals and information units is critical to the<br />

success of cross-boundary information sharing. The dedicated<br />

time and effort from IT professionals and information units is<br />

required to setup the infrastructure, to prepare and to receive<br />

information. However, in the case study, compared with the<br />

administrative units, the information units generally do not<br />

receive similar support from the leadership. The information units<br />

are mainly defined as the supporting units to facilitate business<br />

operations. In addition, many information units are just temporary<br />

units and are composed of contract employees without suitable<br />

information-related training.<br />

145<br />

5.5.2 Leadership Interactions<br />

The personalities, management styles, and interpersonal<br />

relationships of agency leaders matter, especially for the<br />

horizontal interagency information sharing where the involved<br />

agencies are parallel organizations. Social networks and good<br />

relationships among agency leaders can benefit information<br />

sharing initiatives. When the interactions among agency leaders<br />

are not in harmony, interagency information sharing can even<br />

result in failure.<br />

5.6 Some Suggested Success Factors<br />

The participants of the case study also suggested some factors that<br />

can lead to the success of cross-boundary information sharing.<br />

5.6.1 The Fostering of Reciprocity Concept<br />

In the case study, it is indicated that the existing reciprocal<br />

relationship can increase the success in cross-boundary<br />

information sharing. The participants asserted that cross-boundary<br />

information sharing can be more easily achieved between two<br />

government agencies when they both have information needs to<br />

their respectively possessed information. The incentive to crossboundary<br />

information sharing can be created and enhanced by the<br />

reciprocal information sharing between the two government<br />

agencies.<br />

5.6.2 The Involvement of Higher-Level Authority<br />

The interviewees also mentioned the importance of authoritative<br />

support to push the initiatives of cross-boundary information<br />

sharing. The authoritative support can come from two aspects.<br />

One is the authoritative support from participating government<br />

agencies. The participation and support from high-level authority<br />

can affirm the importance and the priority of related initiatives.<br />

Another aspect of authoritative support comes from the level<br />

involved in the information sharing effort. The involvement of<br />

higher-level government agencies can be the championship to<br />

initiate and direct the process of cross-boundary information<br />

sharing.<br />

6. DISCUSSIONS<br />

In the research, various factors influencing interagency<br />

information sharing are discussed from an organizational<br />

perspective. While some factors mainly have influences solely on<br />

information providers and some on information receivers only,<br />

others have impacts on both providers and receivers (see Figure<br />

1).<br />

- Extra Labor and Effort under Limited Resource<br />

- Concern of Information Quality to Incur Liability<br />

- Concern of Information Misuse to Incur Liability<br />

- Limited Incentive and Reward<br />

Information Provider<br />

Information Retriever<br />

- Over-Estimated An Information Provider’s Capability<br />

- The Willingness and Trust to utilize Shared Information<br />

- The Fostering of Reciprocal Concept<br />

- The Involvement of the Higher-Level Leadership<br />

- Organizational Structures of Bureaucracy<br />

- Organizational Cultures and Values<br />

- The Long-Been-Ignored Information Unit<br />

- Leadership Interaction of Government Agencies<br />

Figure 1. The organizational factors to influence cross-boundary<br />

information sharing<br />

The result of the case study reveals that government agencies<br />

behaving as information providers show less concern of losing<br />

valuable assets and competitive advantages to other agencies,


ecause the majority of the shared information in the case study is<br />

data-oriented information and is subject to being updated daily.<br />

Even though some information receivers may retain the acquired<br />

information, the information still soon becomes obsolete and<br />

inaccurate.<br />

The interviewees agree that when two government agencies are<br />

co-located, their information sharing initiative may benefit from<br />

the better and closer social and personal network among them.<br />

However, the interviewees do not consider the geographic<br />

locations of government agencies an important factor in the case<br />

study. The interviewees point out that, with the advancement of<br />

information technologies, cross-boundary information sharing is<br />

no longer obstructed by geographic limitations. The interviewees<br />

also state that Taiwan is small so that geographic location is not<br />

the major concern.<br />

Overall, from an organizational perspective, the paper takes a<br />

deeper look at the complexity of inter-agency information sharing.<br />

The observed influential factors provide insights to researchers<br />

and also practitioners. The paper also contributes to the current<br />

information-sharing literature from an international perspective.<br />

In addition, while open data has become an important<br />

governmental movement in recent years, open data can be viewed<br />

as one type of cross-boundary information sharing among<br />

government agencies and the public including individuals and<br />

businesses. Some of the identified factors in the paper can be<br />

applied to explain the behaviors of government agencies<br />

participating in open data initiatives. Future research can focus<br />

more on other perspectives including technology, legislation and<br />

policy, and surrounding environment to provide a more complete<br />

and integrated discussion to understand the complexity of crossboundary<br />

information sharing among government agencies.<br />

7. ACKNOWLEDGMENTS<br />

The author wants to thank Dr. Yu-Hsieh Sung, the Minister of the<br />

Research, Development and Evaluation Commission and other<br />

government officials of the Taiwan government for their<br />

important help during the interviewee recruitment of the research.<br />

The author is also thankful for all the interviewees participating in<br />

the research for their time, patience, and valuable information and<br />

suggestions.<br />

8. REFERENCES<br />

[1] Klievink, B. and M. Janssen, Realizing joined-up<br />

government -- Dynamic capabilities and stage models for<br />

transformation. Government Information Quarterly, 2009.<br />

26(2): p. 275-284.<br />

[2] Dawes, S.S., A.M. Cresswell, and T.A. Pardo, From "need to<br />

know" to "need to share": Tangled problems, information<br />

boundaries, and the building of public sector knowledge<br />

146<br />

networks. Public Administration Review, 2009. 69: p. 392-<br />

402.<br />

[3] Gil-Garcia, J.R., I. Chengalur-Smith, and P. Duchessi,<br />

Collaborative e-Government: impediments and benefits of<br />

information-sharing projects in the public sector. European<br />

Journal of Information Systems, 2007. 16(2): p. 121-133.<br />

[4] Lam, W., Barriers to e-government integration. Journal of<br />

Enterprise Information Management, 2005. 18(5/6): p. 511-<br />

530.<br />

[5] Pardo, T.A. and G.K. Tayi, Interorganizational information<br />

integration: A key enabler for digital government.<br />

Government Information Quarterly, 2007. 24(4): p. 691-715.<br />

[6] Zaheer, A. and B. McEvily, Does trust matter? Exploring the<br />

effects of interorganizational and interpersonal trust on<br />

performance. Organization Science, 1998. 9: p. 141-158.<br />

[7] Zhang, J., S.S. Dawes, and J. Sarkis, Exploring stakeholders'<br />

expectations of the benefits and barriers of e-Government<br />

knowledge sharing. The Journal of Enterprise Information<br />

Management, 2005. 18(5): p. 548-567.<br />

[8] Faerman, S.R., D.P. McCaffrey, and D.M. Van Slyke,<br />

Understanding interorganizational cooperation: Publicprivate<br />

collaboration in regulating financial market<br />

innovation. Organization Science, 2001. 12(3): p. 372-388.<br />

[9] Willem, A. and M. Buelens, Knowledge sharing in public<br />

sector organizations: The effect of organizational<br />

characteristics on interdepartmental knowledge sharing.<br />

Journal of Public Administration Research and Theory, 2007.<br />

17(4): p. 581-606.<br />

[10] Landsbergen, D.J. and G.J. Wolken, Realizing the promise:<br />

Government information systems and the fourth generation<br />

of information technology. Public Administration Review,<br />

2001. 61(2): p. 206-220.<br />

[11] Zhang, J. and S.S. Dawes, Expectations and perceptions of<br />

benefits, barriers, and success in public sector knowledge<br />

networks. Public Performance & Management Review, 2006.<br />

29(4): p. 433-466.<br />

[12] Gil-Garcia, J.R. and T.A. Pardo, E-Government success<br />

factors: Mapping practical tools to theoretical foundations.<br />

Government Information Quarterly, 2005. 22(2): p. 187-216.<br />

[13] Otjacques, B., P. Hitzelberger, and F. Feltz, Interoperability<br />

of e-Government information systems: Issues of<br />

identification and data sharing. Journal of Management<br />

Information Systems, 2007. 23(4): p. 29-51.


Session 6<br />

Digital Records & Information<br />

Management


A Patent System Ontology for Facilitating Retrieval of<br />

Patent Related Information<br />

Siddharth Taduri, Gloria T. Lau, Kincho H. Law<br />

Engineering Informatics Group<br />

Stanford University, Stanford, CA, USA<br />

{staduri, glau, law}@stanford.edu<br />

ABSTRACT<br />

The recent years have seen a tremendous growth in research and<br />

developments in science and technology, and an emphasis in<br />

obtaining Intellectual Property (IP) protection for one’s<br />

innovations. Information pertaining to IP for science and<br />

technology is siloed into many diverse sources and consists of<br />

laws, regulations, patents, court litigations, scientific publications,<br />

and more. Although a great deal of legal and scientific<br />

information is now available online, the scattered distribution of<br />

the information, combined with the enormous sizes and<br />

complexities, makes any attempt to gather relevant IP-related<br />

information on a specific technology a daunting task. This paper<br />

describes a knowledge-based software framework to facilitate<br />

retrieval of patents and related information across multiple diverse<br />

and uncoordinated information sources in the US patent system.<br />

The document corpus covers issued US patents, court litigations,<br />

scientific publications, and patent file wrappers in the biomedical<br />

technology domain.<br />

Categories and Subject Descriptors<br />

H.3.3 [Information Storage and Retrieval]: Information Search<br />

and Retrieval – Retrieval Models, J.1 [Administrative Data<br />

Processing]: Law<br />

General Terms<br />

Algorithms, Design, Economics, Experimentation<br />

Keywords<br />

Ontology, Patent, Information Retrieval, Knowledgebase<br />

1. INTRODUCTION<br />

The recent years have seen a tremendous growth in research and<br />

developments in science and technology, and an emphasis in<br />

obtaining Intellectual Property (IP) protection for one’s<br />

innovations. IPs are important assets of any organization. During<br />

the lifetime of a patent, from its initial filing, patent issuance to<br />

disputes and litigations, the patent system will constantly be<br />

searched for information. However, information pertaining to IP<br />

and the patent system for science and technology is siloed into<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that<br />

copies bear this notice and the full citation on the first page. Copyrights<br />

for components of this work owned by others than ACM must be<br />

honored. Abstracting with credit is permitted. To copy otherwise, to<br />

republish, to post on servers or to redistribute to lists, requires prior<br />

specific permission and/or a fee.<br />

ICEGOV '12, October 22 -­‐ 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-­‐1-­‐4503-­‐1200-­‐4/12/10...$15.00<br />

147<br />

Jay P. Kesan<br />

College of Law<br />

University of Illinois, Urbana-Champaign, IL, USA<br />

kesan@illinois.edu<br />

many diverse sources and consists of laws, regulations, patents,<br />

court litigations, and more. Although a great deal of legal and<br />

government information is now available online, the scattered<br />

distribution of the information, combined with the enormous sizes<br />

and complexities, makes any attempt to gather relevant IP-related<br />

information, even on a specific technology, a daunting task.<br />

Currently, the task of gathering IP-related information is<br />

performed manually and is both laborious and expensive. This<br />

falls disproportionally on smaller firms, start-ups, and individual<br />

inventors who have very limited resources. This paper describes<br />

the development of a patent system ontology to facilitate retrieval<br />

of patents and related information across multiple diverse and<br />

uncoordinated information sources in the US patent system.<br />

This paper is organized as follows: Section 2 discusses the<br />

background and motivation for this research. Section 3 briefly<br />

describes our use case and document corpus. Section 4 introduces<br />

the patent system ontology and its structure. Section 5 briefly<br />

describes the Information Retrieval (IR) framework. Illustrative<br />

examples are provided in Section 6. Section 7 concludes this<br />

paper by summarizing the current status.<br />

2. BACKGROUND AND MOTIVATION<br />

The following scenarios illustrate some of the issues faced with<br />

the current patent system:<br />

o A company looking to patent its technology on medical<br />

imaging devices, for example, is required to perform an<br />

initial patentability search and establish the usefulness,<br />

novelty, and non-obviousness of the technology [1]. The<br />

patentability search involves a thorough study of prior art<br />

including scientific literature and patent databases,<br />

competitor analysis, existing litigations to similar<br />

o<br />

technologies, and regulations issued by government agencies<br />

such as the Federal Drug Agency (or any agency enforcing<br />

laws with respect to medical imaging devices and related<br />

technologies).<br />

Similar to the patent applicant, a patent examiner performs<br />

patentability search when examining an application. As of<br />

2009, the United States Patent and Trademark Office<br />

(USPTO) employs about 6,242 patent examiners and<br />

received over 456,106 utility patent applications [28]. 1<br />

Roughly, this translates to around 73 patents per examiner<br />

annually and approximately 1.5 patents per examiner per<br />

1 The USPTO’s annual statistics can be accessed at<br />

http://www.uspto.gov/web/offices/ac/ido/oeip/taf/reports.htm<br />

(Accessed on 03/01/2012)


o<br />

week. Although a patent examiner is generally well-versed<br />

with the technological domain of the patent application, the<br />

situation imposes a serious time constraint during the review<br />

process. Hence, each application receives lesser time and<br />

leads to insufficient examination, and possibly infringement<br />

or invalidation at a later stage.<br />

To protect IPs, companies may perform an infringement<br />

analysis to ensure that a particular patent’s right is not being<br />

infringed. The consequences of an infringement can be<br />

severe and result in heavy losses. Infringement analysis<br />

involves a thorough search in the issued patents database,<br />

patent application database, prior court litigations,<br />

regulations, and any form of documented evidence to help<br />

assert the infringement or invalidate an infringing patent’s<br />

claim as a defensive measure.<br />

Irrespective of the scenario, whether a company intends to patent<br />

its technology or to perform an infringement analysis, or a patent<br />

examiner intends to perform a patentability search, several<br />

questions arise:<br />

o What are the issued patents in related technologies?<br />

o What is the legal scope of similar patents?<br />

o Who are the competitors?<br />

o Have any similar patents been challenged in court?<br />

o How can one work around existing body of knowledge?<br />

o Are there any scientific literatures, or regulations which can<br />

potentially be used to challenge and to invalidate a patent’s<br />

claims?<br />

Many existing methods attempt to improve IR within a single<br />

information source [9][12][14][16][26][27][30][31]. However,<br />

these questions cannot be answered from any single information<br />

source. An integration framework is needed to enable the retrieval<br />

of relevant information from diverse sources. This research<br />

explores a knowledge-based approach to address two fundamental<br />

information integration issues – (a) the lack of interoperability<br />

among the information sources in the current patent system; and<br />

(b) the varying information needs by the users of the patent<br />

system.<br />

Interoperability between information sources is essential in order<br />

to perform multi-source IR [29]. E-government initiatives in the<br />

US and Europe are increasingly adopting interoperability<br />

frameworks [11]. An important step in achieving interoperability<br />

is to allow the information sources to communicate with one<br />

another. To achieve this, we propose a Patent System Ontology<br />

(PSO) to standardize the representation of the information sources<br />

and achieve interoperability. While the documents are vastly<br />

diverse, the information is implicitly cross-referenced. For<br />

example, a court document which involves a particular patent<br />

document reveals a high relevancy between the two documents.<br />

Such relevancy is central to our method for multi-source IR and is<br />

captured by the PSO.<br />

Terminological variations such as synonymy and polysemy are a<br />

common source of problems which often hinder the effectiveness<br />

of traditional term based IR methods. We develop a knowledgebased<br />

method that uses external knowledge sources such as<br />

domain ontologies to provide the required semantics to resolve<br />

terminological inconsistencies and improve semantic<br />

interoperability between information sources. The IR framework<br />

148<br />

then integrates the patent system ontology and the domain<br />

ontologies to retrieve a set of related documents across multiple<br />

sources.<br />

3. USE CASE AND DOCUMENT CORPUS<br />

We demonstrate our methodology through a use case in the<br />

biomedical domain – erythropoietin, a hormone responsible for<br />

the production of red blood cells. The synthetic production of<br />

erythropoietin has enabled the treatment of chronic diseases such<br />

as anemia. Epogen - the production brand of synthetic<br />

erythropoietin manufactured by the pharmaceutical giant Amgen<br />

Inc. is protected by five core patents namely – US 5,547,933, US<br />

5,618,698, US 5,621,080, US 5,756,349, and US 5,955,422. These<br />

patents have been central to many related court cases involving<br />

other pharmaceutical companies such as Hoescht Marion Roussel<br />

and Transkaryotic Therapies, and heavily cite scientific literature<br />

from top journals. Our corpus includes a total of 1150 patent<br />

documents downloaded from the USPTO database related to<br />

erythropoietin [28]. We identified 135 relevant patents amongst<br />

the 1150 patents by following forward and backward citations<br />

from the five core patents that will serve as the ground truth.<br />

Several court litigations, involving these five patents and some<br />

others, date back to the late 1980's. Around 30 U.S. patent<br />

litigation documents are collected which are closely related to the<br />

use case from Public Access to Court Electronic Records<br />

(PACER), an electronic system to access the databases of the 94<br />

District Courts and 13 Courts of Appeals (CAFC) [22]. The<br />

repository includes file wrappers for the core patents. The<br />

repository also contains the 2007 Text Retrieval Conference<br />

(TREC) Genomics data set, which consists of over 162,000<br />

scientific publications from 49 prominent biomedical journals<br />

[32]. All in all, the repository contains a diverse set of information<br />

from different domains.<br />

4. PATENT SYSTEM ONTOLOGY<br />

In this section, we describe a patent system ontology which<br />

provides standardized representation and a shared vocabulary of<br />

the information sources to facilitate interoperability. The ontology<br />

will also provide the required declarative syntax to express multisource<br />

queries, rules, and relevancy metrics.<br />

Many ontology development methodologies have been proposed<br />

and implemented over the years [6][8][10][18]. In general, the<br />

development of ontologies consists of several steps starting from<br />

the conceptualization of the domain, defining the properties interrelating<br />

the defined classes, instantiating the classes with physical<br />

objects and the verification of the constructed ontology. The<br />

development process is iterative as the ontology evolves to satisfy<br />

the requirements of the application it is being designed for [18].<br />

The resulting ontology is instantiated with actual physical<br />

documents from the document repository.<br />

Another practical aspect of ontology development is the<br />

specification language in which the ontology will be coded.<br />

Several specification languages have evolved over the years<br />

including frame based languages such as F-Logic and OIL, and<br />

descriptive logic based languages such as DARPA Agent Markup<br />

Language and Ontology Inference Layer (DAML+OIL), Resource<br />

Description Framework (RDF) and Web Ontology Language<br />

(OWL) [21,24]. The factors for choosing a specification language<br />

include expressivity, reasoning capabilities, availability of tools,<br />

re-use and personal preference. RDF is a widely used language to<br />

conceptualize domains. OWL is a W3C recommendation which is


uilt on top of the semantics of RDF to provide higher<br />

expressivity levels. These higher expression levels allow us to<br />

define disjoint classes, ‘sameAs’ or ‘differentFrom’ axioms<br />

among others [21]. Several tools have also been developed for the<br />

construction and modeling of ontologies such as Protégé and<br />

Chimaera [7][23]. Protégé supports both OWL and RDF, and<br />

provides useful features and plugins allowing us to query and<br />

visualize the ontology. Taking into account the above mentioned<br />

considerations, we choose OWL as the specification language and<br />

Protégé-3.4 as our development tool for the patent system<br />

ontology. However, it should be noted that not all OWL axioms<br />

are highly scalable; hence, to the extent possible we make<br />

maximum use of the RDF subset of the OWL axioms.<br />

4.1 Scope<br />

Ontologies are typically developed with specific applications as<br />

targets. Gruninger and Fox suggested that a set of competency<br />

questions be developed; these are questions that the ontology is<br />

expected to answer [10]. Developing these questions not only<br />

helps define the scope of our ontology but also allows us to verify<br />

the usefulness of the ontology both throughout and after the<br />

development phase [18]. In the patent system domain, the target<br />

applications may include patent claim invalidation, and patent<br />

infringement analysis. The following are selected examples of<br />

competency questions.<br />

Patent Domain:<br />

o Return all patent documents which contain the phrase<br />

‘recombinant erythropoietin receptor’ in the claims<br />

o Return all the patent documents which contain the phrase<br />

‘recombinant erythropoietin receptor’, at least 3 claims,<br />

issued before 02-02-1999 and assigned to Genetics Inc.<br />

Court Case Domain:<br />

o Return all court cases which contain the term –<br />

‘erythropoietin’<br />

o Return all court cases which involve the company Amgen<br />

Inc. either as the plaintiff or defendant, and from the District<br />

Court of Massachusetts<br />

Multi-domain:<br />

o Return all patents which contain the term – ‘erythropoietin’<br />

in their claims, which are involved in at least one court<br />

litigation.<br />

o Return all court cases with the term ‘erythropoietin’. From<br />

these court cases, return the patents involved. From these<br />

patents, follow the backward and forward citations to<br />

identify more important patents.<br />

Note that the questions can get more complex depending on the<br />

requirement of the user. The results of one query can be further<br />

re-filtered with additional constraints. In each of the listed<br />

questions, the main terms (or objects) are underlined. First, these<br />

terms are grouped together into concepts or classes such that they<br />

represent a collection of items corresponding to that term. Second,<br />

relations are drawn between classes such that the competency<br />

questions can be sufficiently expressed as a query using those<br />

classes and relationships. The competency questions shown in no<br />

way limit the use of the ontology to these applications alone,<br />

rather they are examples of questions the ontology must be<br />

capable of answering at the minimum. Furthermore, the list of<br />

149<br />

competency questions presented is not meant to be an exhaustive<br />

list, but to illustrate how the metadata and text fields parsed from<br />

the documents.<br />

Relations in OWL are binary relations, i.e. they can be used to<br />

relate exactly two classes, two individuals or an individual to a<br />

value. These can be represented in triple form as {subject,<br />

predicate, object}. The values that the subject and object take on<br />

can be restricted by defining the domain and the range of the<br />

relation; where domain refers to the subject end of the relation and<br />

range refers to the object end of the relationship [13]. OWL<br />

additionally allows us to define logical characteristics such as<br />

transitivity and symmetry on these binary relations which enhance<br />

the meaning of this relation. For example, if the ‘=>’ relation is<br />

defined as a transitive relation, then {A => B} can be used to infer<br />

{B => A}. Hence, if properly defined, new knowledge can be<br />

derived from existing knowledge. Additionally, we can define<br />

necessary and sufficient conditions on classes which can be used<br />

to logically classify instances into classes [13].<br />

4.2 Conceptualization<br />

Figures 1 and 2 show a conceptual view of the patent and court<br />

case documents respectively. The relations between two entities<br />

(shown as a black line) are directional from patents and court<br />

cases out to other classes, e.g. {Patent, hasTitle, Title}. The<br />

relations are not symmetric and hence the inverse {Title, hasTitle,<br />

Patent} does not hold true. As shown in the figures, the remaining<br />

classes can be grouped under either metadata or textual<br />

information. This form of classification helps to address all the<br />

metadata at once, instead of individually calling out to each one.<br />

For example, if an application requested for all metadata of a<br />

patent, using the ontology we can return all metadata entities such<br />

as Title, Date, Classification, etc.. We can further group metadata<br />

and textual information into a single parent node Information.<br />

When the patent and court case hierarchies are combined, classes<br />

which are common to both documents will refer to the same<br />

concept and not two different concepts.<br />

This form of abstraction is not only possible for classes, but also<br />

for relations, made possible by the rdfs:subPropertyOf construct.<br />

Court cases and Patents are related to each of the classes shown in<br />

Figures 1 and 2. These relations, such as ‘hasTitle’, ‘hasAbstract’,<br />

and ‘hasPlaintiff’, etc., can also be abstracted into a common<br />

parent relation ‘hasInformation’. This relation has a domain of<br />

either Patent or Court Case and Information as a range.<br />

File wrappers are not documents themselves, but in fact a<br />

collection of documents. This makes modeling file wrappers<br />

trickier than the other documents such as patents and court cases.<br />

Firstly, a vocabulary of all kinds of documents contained within<br />

the file wrapper must be defined. Since each of these documents<br />

refers to a particular event of communication between the<br />

applicant and patent office, we will call it Event instead of<br />

document to avoid confusion between the class Document and a<br />

file wrapper event. The events of importance to us are shown in<br />

Figure 3. We group application events and office actions<br />

separately to allow representation of queries such as – “Return all<br />

office actions for file wrapper A”. Each file wrapper event must<br />

be individually modeled keeping in mind the information it<br />

contains. For example, each examiner Rejection contains critical<br />

information such as – the allowed claims, the rejected claims, and<br />

the withdrawn claims (see Figure 4). Similarly, other events such


as Interference, Restriction, and Amendments can be modeled<br />

using the patent system ontology.<br />

The Patent, Court Case, and File Wrapper classes shown in<br />

Figures 1-3 are different types of documents available from<br />

different information sources. The patent system comprises many<br />

such information sources and many such documents. In the top<br />

level ontology for the patent system (shown in Figure 5), all types<br />

of documents are abstracted into a single parent class (Document).<br />

The Document class can be sub-classed any number of times to<br />

include other forms of documents such as regulations and laws<br />

which are currently not in the scope of our study. The classes<br />

Document, Information, and Event correspond to the three root<br />

nodes of the patent system ontology. Additionally, the classes<br />

Figure 1. Conceptual View of Patent Documents<br />

Figure 2. Conceptual View of Court Case<br />

150<br />

Inventor, Examiner, Author, and Judge, etc., can be abstracted<br />

into a common parent node such as Person.<br />

As mentioned earlier, information sources in the patent system<br />

implicitly cross-reference one another (see Figure 6). These<br />

implicit cross-references show relevancy for comparing<br />

documents from different information sources. When manually<br />

comparing two documents, these cross-references are rather<br />

obvious to the human eye. For example, a human could easily<br />

spot a reference to a patent document in the court case. These<br />

references can very quickly help identify relevant documents to a<br />

user query. The power of the patent system ontology lies in the<br />

ability to integrate information across multiple information<br />

sources by explicitly expressing such cross-references.<br />

Applications built around the patent system ontology can


dynamically derive relevancy based on these pre-defined crossreferences.<br />

4.3 Populating the Ontology<br />

The ontology is populated with information from actual physical<br />

documents from the document repository. The instantiation is<br />

done automatically using the standard Jena and Protégé Java<br />

libraries [23]. Once the instantiation is complete, a standard OWL<br />

reasoner such as Pellet is triggered to check for consistency and<br />

make inferences [33]. For example, an entity in the class Patent<br />

will be additionally classified as a Document, since Patent is a<br />

subclass of Document. The current version of the knowledge-base<br />

is populated with the actual documents from our corpus described<br />

in Section 3. Other documents which may have been found in<br />

Figure 3. Events Contained in a File Wrapper<br />

court cases or through patent citations, but not in the corpus are<br />

instantiated but contain no information about the patent since the<br />

original document itself is unavailable. A file wrapper has also<br />

been partially (including the first amendment, rejection,<br />

interference and the original application) incorporated into the<br />

knowledge-base.<br />

RDF Triple stores are specialized databases to manage large<br />

amount of information written in RDF [5][17][20]. Due to the size<br />

of the ontology, we create a local instance of a triple store<br />

(Virtuoso) and store all the triples in it. Using a triple store will<br />

allow us to scale our ontology to millions of instances<br />

(documents). Moreover, ontology editors such as Protégé require<br />

Figure 4. Excerpt from the Patent System Ontology: Rejection class<br />

151


Figure 5. Top Level Ontology for the Patent System<br />

Table 1. Expressing Competency Questions in SPARQL<br />

Competency Questions SPARQL Query<br />

Return all court cases which involve the company<br />

Amgen Inc. as the plaintiff and from the District Court<br />

of Massachusetts<br />

Return all patents which contain the phrase<br />

‘recombinant erythropoietin receptor’ in the claims<br />

and IPC class “A61K”<br />

152<br />

SELECT ?case WHERE {<br />

?case type CourtCase .<br />

?case hasPlaintiff “Amgen Inc.” .<br />

?case hasCourt “District Court…”<br />

}<br />

SELECT ?pat WHERE {<br />

?pat type Patent .<br />

?pat hasClaim ?clm .<br />

?clm hasTerm “recombinant …” .<br />

?pat hasIPCClass “A61K” .<br />

}


Figure 6. Cross-­‐Reference between Documents in the Patent System<br />

loading the ontology each time the application is executed. The<br />

triple stores provide a persistent store for the triples and<br />

significantly lower the loading time. The ontology can be queried<br />

using SPARQL through both Protégé and Virtuoso interfaces<br />

[20][23].<br />

Table 1 shows examples of how we can represent any natural<br />

language question in SPARQL to query the ontology, as long as<br />

the classes and relations required to express the query are defined<br />

in the ontology. The queries do not always have to return<br />

documents, but can return other classes like Inventors or<br />

Examiners as well. These SPARQL queries will generally be<br />

handled at the application level and will be abstracted from users.<br />

Applications can request any information they want from the<br />

ontology. In fact, even the applications do not have to fully know<br />

the details of the ontology. The ontology can be queried for all its<br />

relations for a particular class or between two classes. For<br />

example, the query:<br />

SELECT ?rel WHERE {<br />

}<br />

?pat type Patent .<br />

?pat ?rel Information<br />

will return all relations (variable ?rel) which have the class Patent<br />

as the domain. In other words, all relations defined on patents<br />

such as hasTitle, hasAbstract, hasIPCClass, etc., will be returned.<br />

Hence, updating the underlying ontology with new information<br />

will automatically update the application using it as well.<br />

153<br />

5. INFORMATION RETRIEVAL<br />

FRAMEWORK<br />

In information retrieval, the information desired is seldom<br />

achieved with a single query. Queries are typically reformulated<br />

several times based on intermediate search results until the<br />

information need is satisfied [25]. This reformulation could<br />

include the addition of synonyms, new search terms, and other<br />

constraints. When performing multi-source search, information<br />

obtained from searching one domain is applied to another. The<br />

patent system ontology provides the backbone for automating this<br />

process by standardizing representation of the information<br />

sources. In this section, we present an IR framework which builds<br />

on top of the semantics of the patent system ontology in multiple<br />

stages to enhance multi-source IR (see Figure 7):<br />

Step–I Expand Query: In this stage, the user’s initial query is<br />

expanded using external knowledge such as dictionaries, thesauri,<br />

or domain ontologies. While the patent system ontology provides<br />

a framework for the structural interoperability between the<br />

information sources, domain ontologies provide semantic<br />

interoperability within a specific technical domain. The term<br />

expansion is based on several properties of domain ontologies<br />

such as abstraction, synonymy, and term mapping, etc.<br />

Step–II Search Information Sources: Information sources are<br />

independently searched using the expanded query from Step–I.<br />

The required vocabulary and syntax for searching the information<br />

sources is contained in the patent system ontology. For example,<br />

the patent system ontology provides the syntax for searching the<br />

titles of documents – hasTitle:‘erythropoietin’. The information


sources are searched independently in this stage to retrieve highly<br />

relevant documents from each source.<br />

Step–III Cross-Reference Information: The cross-referenced<br />

information is highly important for multi-domain retrieval. The<br />

cross-references explicitly defined in the patent system ontology<br />

are used as relevancy measures to correlate search results between<br />

information sources. For example, a relation defined in the patent<br />

system ontology – {caseA, patentsInvolved, patentA} will help<br />

the framework to extract patent numbers from the court case.<br />

These patent numbers can be used to repeat or enhance the search<br />

for the patent domain. Similarly, text from one document can be<br />

used to search an entirely different information silo. For example,<br />

Figure 7. Information Retrieval Framework<br />

Figure 8. System Implementation<br />

the abstract of a patent document can be used as a query to search<br />

for relevant scientific publications. In fact, the extracted text can<br />

be directly fed back into Steps 1 and 2.<br />

Step–IV User Feedback: Besides the diverse information and<br />

knowledge sources, the users in the patent system domain area<br />

also come from a diverse background – scientific/technical, legal,<br />

154<br />

business, and more. The intention of the user must be captured<br />

through the search process in order to ensure that the results<br />

retrieved are indeed relevant to the user. User-relevancy feedback<br />

has been an important part of IR research [4][15]. However, the<br />

user relevancy feedback stage is out of this paper’s scope and will<br />

not be discussed.<br />

5.1 Implementation Details<br />

In this section, we provide a brief overview of the implementation<br />

of the IR framework and its basic features (see Figure 8). The IR<br />

framework is implemented entirely in Java with abstractions of<br />

several modules that are critical for the system. The actual<br />

documents are parsed in order to populate the patent system<br />

ontology and perform reasoning using standard Jena libraries. A<br />

persistent storage such as Virtuoso or Mulgara is used to store the<br />

RDF triples [17][20]. Apache Lucene is a widely used text mining<br />

library [2]. In order to provide text-based search, a simple user<br />

interface is developed which interacts with the lucene text index.<br />

A summary of the implementation is provided below:<br />

o Jena libraries and triple store integration for modifying the<br />

patent system ontology through new constructs, crossreferences,<br />

or rules.<br />

o Solr and Lucene libraries to create, update, and query the text<br />

indexes [3].<br />

o Generic API for integration with sources of domain<br />

knowledge such as BioPortal [19]<br />

o Automatic query generation, abstracting the syntactic details<br />

from the user.<br />

6. ILLUSTRATIVE EXAMPLES<br />

As explained in Sections 1 and 2, during the lifetime of a patent,<br />

the patent system will constantly be searched for information.<br />

Examples include prior art searches, patent claim invalidations,<br />

and infringement analysis, etc.. In this section, we demonstrate<br />

how the patent system ontology enables queries across multiple<br />

sources in order to retrieve related information. Specifically, we<br />

focus on Step-III of the framework, i.e., the cross-referencing<br />

capabilities of the patent system ontology. We develop a<br />

SPARQL query to search for information related to US patent<br />

5,955,422 (see Figure 9). The individual clauses in the query are<br />

grouped into three categories each meant to retrieve related case<br />

documents, patents, and scientific publications respectively.<br />

Category I: Court cases provide important information regarding<br />

the major competitors, and successful patents, etc.. A patent<br />

which has been challenged in court several times is considered<br />

very important in its respective technology class. Clauses 1-3<br />

attempt to retrieve related documents by following the crossreferences<br />

between court cases and patent documents. Court cases<br />

related to US patent 5,955,422 are identified by querying the<br />

ontology for all court cases that involve the patent. This search<br />

retrieves around 20 patent litigations from our corpus. In addition,<br />

other patents involved in the court case are also extracted as<br />

relevant documents using clause 3.


Category II: After identifying some relevant patents, some of the<br />

possible next steps could be to retrieve patents by following the<br />

forward and backward citations etc. (clause 4), to get more<br />

relevant results. The information extracted from the ontology can<br />

also include names of inventors (clause 5), assignees (clause 6),<br />

and technology classifications (clause 7) that appear in the patent<br />

documents, which can in turn be used to search the documents.<br />

The extracted information from the documents is summarized in<br />

Table 2.<br />

Category III: In addition to metadata such as inventors and<br />

assignees, the text of the patent documents can also be used to<br />

search for related documents. For example, clauses 9-12 show<br />

how the claims of a patent can be used to search for related<br />

scientific publications.<br />

The query discussed in this section shows how the semantics<br />

provided by the patent system ontology can be used to integrate<br />

information across multiple domains, with a potential to improve<br />

search. Similar to the above example, in practical applications,<br />

SPARQL queries can be formulated to express extremely complex<br />

information needs. Figure 10 shows the actual documents<br />

retrieved from this query.<br />

Precision, a common metric used to evaluate the quality of IR<br />

methodologies, is measured as the ratio of the number of relevant<br />

documents retrieved to the total number of documents retrieved.<br />

In addition to the query in Figure 9, we retrieve patent documents<br />

related to the top inventors, assignees, and technology classes<br />

from Table 2. We calculate the precision of the retrieved patent<br />

documents with respect to the ground truth discussed in Section 3.<br />

Table 3 summarizes these results.<br />

Plaintiffs/Defendants Patents Involved in<br />

Cases<br />

Table 2. Summary of Extracted Information<br />

SELECT ?pat1 ?pat2 ?case ?pub ?inv ?assg<br />

?class<br />

WHERE {<br />

Category I:<br />

Clause 1: ?case a CourtCase .<br />

Clause 2: ?case patentsInvolved<br />

US5955422. Clause 3: ?case<br />

patentsInvolved ?pat1<br />

Category II:<br />

{Clause 4: ?pat1 hasCitation ?pat2 .}<br />

{Clause 5: ?pat1 hasInventor ?inv .}<br />

{Clause 6: ?pat1 hasAssignee ?assg .}<br />

{Clause 7: ?pat1 hasUSClass ?class .}<br />

Category III:<br />

Clause 9: ?pat hasClaim ?claim .<br />

Clause 10: ?pub a Publication .<br />

Clause 11: ?pub hasBody ?body .<br />

Clause 12: FILTER REGEX (?body,<br />

?claim, “i”)<br />

US Class Inventor Assignee<br />

Amgen Inc. 5,955,422 514/8 Lin, Fu-Kuen Kirin-Amgen, Inc.<br />

Chugai Pharmaceuticals 5,547,933 530/350 Hewick, Rodney, M. Amgen, Inc.<br />

Hoescht Marion Roussel 5,621,080 536/23.51 Seehra, Jasbir, S. Kiren-Amgen, Inc.<br />

Genetics Inc. 5,618,698 435/325 Seenra, Jasbir, S. Genetics Institute, Inc.<br />

155<br />

}<br />

Figure 9. SPARQL Query to Retrieve<br />

Information Related to U.S. Patent<br />

5,955,422


Figure 10. Actual Documents Retrieved by Querying Patent System Ontology<br />

Table 3. Precision of Retrieved Patent Documents<br />

Related to a Set of Inventors, Assignees or US Class<br />

Query Precision<br />

Top 5 Technology Classes 0.183<br />

Inventors 0.8<br />

Assignees 0.256<br />

Combined 0.186<br />

7. CONCLUSION<br />

Intellectual Property (IP) related information for science and<br />

technology is distributed across several heterogeneous<br />

information silos. The scattered distribution of information,<br />

combined with the enormous sizes and complexities, make any<br />

attempt to collect IP-related information for a particular<br />

technology a daunting task. Hence, there is a need for a software<br />

framework which facilitates semantic and structural<br />

interoperability between the diverse and un-coordinated<br />

information sources in the patent system. In this paper, we present<br />

a knowledge-based software framework to facilitate retrieval of<br />

patents and related information across multiple diverse and<br />

uncoordinated information sources in the US patent system.<br />

Specifically, we discuss the patent system ontology which<br />

provides standardized representation and a shared vocabulary of<br />

the information sources to facilitate interoperability.<br />

Through an illustrative example in Section 6, we showed how the<br />

patent system ontology can be used to integrate information and<br />

query multiple information sources to retrieve related information.<br />

156<br />

The patent system ontology provides the necessary semantics to<br />

allow users to develop complex declarative queries. The<br />

methodology presented will benefit many end users ranging from<br />

lawyers, start-up companies, to large corporations.<br />

8. ACKNOWLEDGEMENTS<br />

This research is partially supported by NSF Grant Number<br />

0811975 awarded to the University of Illinois at Urbana-<br />

Champaign and NSF Grant Number 0811460 to Stanford<br />

University. Any opinions and findings are those of the authors,<br />

and do not necessarily reflect the views of the National Science<br />

Foundation.<br />

9. REFERENCES<br />

[1] 35 U.S.C. Sec. 103 (United States Code). “Conditions for<br />

Patentability; Non-Obvious Subject Matter,” 2010.<br />

[2] Apache Lucene. http://lucene.apache.org/<br />

[3] Apache Solr. http://lucene.apache.org/solr/<br />

[4] Baeza-Yates, R. and Ribeiro-Neto. B., Modern Information<br />

Retrieval, ACM Press, 1999.<br />

[5] Broekstra, J., Kampman, A. and Harmelen, F., V., “Sesame:<br />

A Generic Architecture for Storing and Querying RDF and<br />

RDF Schema”, The Semantic Web – ISWC 2002, Lecture<br />

Notes in Computer Science, 2342:54-68, 2002.<br />

[6] Bruijn, J., D. et al. State-of-the-art Survey on Ontology<br />

Merging and Aligning. V1. SEKT-project report D4.2.1<br />

(WP4), IST-2003-506826, 2003.<br />

[7] Chimaera Website.<br />

http://www.ksl.stanford.edu/software/chimaera (Accessed on<br />

03/01/2012).


[8] De Nicola, A., Missikoff, M. and Navigli, R., "A Software<br />

Engineering Approach to Ontology Building,” Information<br />

Systems, 34(2):258-275, 2009.<br />

[9] Fujii, A. Enhancing Patent Retrieval by Citation Analysis.<br />

Annual ACM Conference on Research and Development in<br />

Information Retrieval, Proceedings of the 30th annual<br />

International ACM SIGIR, Amsterdam, The Netherlands,<br />

2007.<br />

[10] Gruninger, M., and Fox, M., S. Methodology for the Design<br />

and Evaluation of Ontologies. In: Proceedings of the<br />

Workshop on Basic Ontological Issues in Knowledge<br />

Sharing, IJCAI-95, Montreal, 1995.<br />

[11] Guijarro, L. Interoperability Frameworks and Enterprise<br />

Architectures in e-Government Initiatives in Europe and the<br />

United States. Government Information Quarterly, 24, 1,<br />

January 2007, 89-101.<br />

[12] Higuchi, S., Fukui, M., Fujii, A., Ishikawa, T., Iwayama, M.,<br />

Fujii, A., Kando, N. An Empirical Study on Retrieval Models<br />

for Different Document Genres: Patents and Newspaper<br />

Articles. Information Retrieval, 2003, 251-258.<br />

[13] Horridge, M. A Practical Guide To Building OWL<br />

Ontologies Using Protégé 4 and CO-ODE Tools. The<br />

University of Manchester, March 2011.<br />

[14] Li, Y., Taylor, J., S. Advanced Learning Algorithms for<br />

Cross-Language Patent Retrieval and Classification.<br />

Information Processing and Management, Elsevier, 2007.<br />

[15] Manning, C., D., Raghavan, P. and Schutze, H. An<br />

Introduction to Information Retrieval. Cambridge University<br />

Press, 2009.<br />

[16] Mase, H., Matsubayashi, T., Ogawa, Y., Iwayama, M., and<br />

Oshio, T. Proposal of Two-Stage Patent Retrieval Method<br />

Considering the Claim Structure. ACM Transactions on<br />

Asian Language Information Processing (TALIP) Archive, 4,<br />

2, June 2005, 190 – 206.<br />

[17] Mulgara triplestore. Available online:<br />

http://www.mulgara.org/ (Accessed on 03/01/2012).<br />

[18] Noy, N., F., and McGuinness, D. Ontology Development<br />

101: A Guide to Creating your First Ontology. Stanford<br />

Knowledge Systems Laboratory Technical Report KSL-01-<br />

05 and Stanford Medical Informatics Technical Report SMI-<br />

2001-0880, March 2001.<br />

[19] Noy, N., F., Shah, N., H., Whetzel, P., L., Dai, B., Dorf, M.,<br />

Griffith, N., Jonquet, C., Rubin, D., L., Storey, M., A.,<br />

Chute, C., G. and Musen, M., A., “BioPortal: Ontologies and<br />

Integrated Data Resources at the Click of a Mouse,” Nucl.<br />

Acids Res., 37(2):W170-W173, 2009.<br />

[20] OpenLink Virtuoso. http://virtuoso.openlinksw.com/<br />

(Accessed on 03/01/2012).<br />

[21] Dean, M. and Schreiber, G. (Eds.). OWL Web Ontology<br />

Language Reference. W3C Recommendation, 10 February<br />

2004.<br />

157<br />

[22] PACER. http://www.pacer.gov/ (Accessed on 03/01/2012).<br />

[23] Protégé Website. http://protege.stanford.edu/ (Accessed on<br />

03/01/2012).<br />

[24] Resource Description Framework (RDF) Model and Syntax,<br />

W3C Recommendation, 22 February 1999.<br />

[25] Spink, A. A User-Centered Approach to Evaluating Human<br />

Interaction with Web Search Engines: An Exploratory Study.<br />

Information Processing and Management, 38, 3, May 2002,<br />

401-426.<br />

[26] Takaki, T. Associative Document Retrieval by Query<br />

Subtopic Analysis and its Application to Invalidity Patent<br />

Search. Conference on Information and Knowledge<br />

Management. Proceedings of the Thirteenth ACM<br />

International Conference on Information and Knowledge<br />

Management, Washington, D.C., USA, 2004, 399 - 405.<br />

[27] Tseng, H., Lin, C., J., Lin, Y., I. Text Mining Techniques for<br />

Patent Analysis. Information Processing & Management,<br />

2007, Elsevier.<br />

[28] USPTO. http://www.uspto.gov/ (Accessed on 03/01/2012).<br />

[29] Wache, H., Vogele, T., Visser, U., Stuckenschmidt, H.,<br />

Schuster, G., Neumann H., and Hubner, S. Ontology-Based<br />

Integration of Information - A Survey of Existing<br />

Approaches. In Proceedings of IJCAI-01 Workshop:<br />

Ontologies and Information Sharing, Seattle, WA, , 2001,<br />

108-117.<br />

[30] Wanner, L., Baeza-Yates, R., Brugmann, S., Codina, J.,<br />

Diallo, B., Escorsa, E., Giereth, M., Kompatsiaris, Y.,<br />

Papadopoulos, S., Pianta, E., Piella, G., Puhlmann, I., Rao,<br />

G., Rotard, M., Schoester, P., Serafini, L., and Zervaki, V.<br />

Towards Content-Oriented Patent Document Processing.<br />

World Patent Information, 30, 1, March 2008, 21-23.<br />

[31] Xue, X., Croft, W., B. Automatic Query Generation for<br />

Patent Search. Conference on Information and Knowledge<br />

Management, Proceeding of the 18th ACM Conference on<br />

Information and Knowledge Management, Hong Kong,<br />

China, 2009.<br />

[32] Hersh, W. and Voorhees, E. TREC Genomics Special Issue<br />

Overview. Information Retrieval, Special Issue on TREC<br />

Genomics Track: Guest Editor: Ellen Voorhees, 12, 1, 2009,<br />

1-15.<br />

[33] Sirin, E., Parsia, B., Grau, B., C., Kalyanpur, A., and Katz,<br />

Y. Pellet: A Practical OWL-DL Reasoner. Web Semantics:<br />

Science, Services and Agents on the World Wide Web, 5, 2,<br />

June 2007, 51-53.<br />

[34] Gruber, R., T. Toward Principles for the Design of<br />

Ontologies used for Knowledge Sharing. Int. J. Hum-<br />

Comput. Stud, 43, 5-6, November 1995, 907–928.<br />

[35] Damiani, E., Fugazza, C. Toward Semantics-Aware<br />

Management of Intellectual Property Rights. Online<br />

Information Review, 31, 1, 2007, 59 – 72.


Digitisation of Electoral Rolls: Analysis of a Multi-Agency<br />

E-Government Project in Pakistan<br />

Hasnain Bokhari<br />

Faculty of Humanities<br />

University of Erfurt<br />

Postfach 90 02 21. D-99105 Erfurt<br />

+491632359046<br />

hasnain.bokhari@yahoo.com<br />

ABSTRACT<br />

Mobile governments are seen as an ancillary extension of egovernment<br />

practices. The low cost of mobile equipment, its<br />

mobility factor and a personalised device may however, herald<br />

them as the predominant means of e-government in developing<br />

countries. Inclusive participation to mobilise and engage the<br />

poorer, excluded and lesser-informed citizens has been the bane of<br />

e-government yet, but it may change by including m-government<br />

as an emphasis factor in the national e-government plans. This<br />

paper considers the case study of the Election Commission of<br />

Pakistan, which initiated a SMS-based voter verification system<br />

with the central database authority in order to inform over 85<br />

million voters of their electoral registration in March 2012. This<br />

unique service is among the first public mobile based initiatives in<br />

Pakistan which builds upon an inter-agency collaboration drawing<br />

on the success of a digitized and central database.<br />

Categories and Subject Descriptors<br />

K.6.1 [Management of Computing and Information Systems]:<br />

Project and People Management - Strategic information systems<br />

planning; J.1 [Computer Applications]: Administrative Data<br />

Processing – Government; H.1.2 [Information Systems]:<br />

User/Machine Systems - Human information processing<br />

General Terms<br />

Management, Documentation, Human Factors, Verification.<br />

Keywords<br />

E-government, Developing Countries, Interagency collaboration,<br />

M-government, Alternative public service delivery<br />

1. INTRODUCTION<br />

Rapidly declining costs of Information and Communication<br />

Technologies (ICTs) and mobile phone equipment are paving new<br />

ways for a digitally connected society through a variety of<br />

communications spectra. e-government initiatives are now taking<br />

a crucial turn in the domain of public service delivery. A number<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

158<br />

Mustafa Khan<br />

Willy Brandt School of Public Policy<br />

University of Erfurt<br />

Postfach 90 02 21. D-99105 Erfurt<br />

+4917671704089<br />

mmmkhan@gmail.com<br />

of countries are emphasizing horizontal and vertical integration of<br />

governmental agencies to ensure the one-stop-shop promise of egovernment.<br />

Thus, multiple governmental agencies cooperate<br />

with one another and more importantly with private partners in<br />

order to develop innovative eServices. Similarly, countries<br />

especially in the developing world are increasingly moving<br />

towards the concept of electronic public service delivery over<br />

multiple channels digital communication other than the internet.<br />

To connect with and inform citizens, governments around the<br />

world are now considering mobile phones as an alternative service<br />

delivery channel for government data. In the context of<br />

developing countries, mobile phones offer a feasible opportunity<br />

for governments to expand their digital focus to the disconnected<br />

areas. The entire ‘e’ lexicon of e-government is now focusing<br />

towards ‘m’ making a plausible case for m-government. Mgovernment,<br />

in a nutshell is not hugely different from its<br />

predecessor. Rather it offers a strategy for providing information<br />

and services through mobile or wireless technology [21]. As the<br />

definition relies on e-government practices, the basic theory and<br />

implications of m-government are going to work as<br />

complementary to e-government.<br />

What sets m-government apart and makes it a new focus area are<br />

its strengths of “mobility” and being “wireless” [33]. Freeing the<br />

user from desktop-bound and wired internet access, it allows<br />

information access on the move, increased functionality, low<br />

opportunity cost for access and more pervasive reach into<br />

‘unwired’ or physically unsupported areas. This latter property<br />

makes it the ideal infrastructure choice in developing or underdeveloped<br />

countries, where internet access is expensive or not<br />

available and requires more technical literacy. It must, however,<br />

be noted that m-government does not need to eliminate the online<br />

and offline modalities of service-delivery but it aims at harnessing<br />

the powerful and transformational capacity of the mobile platform<br />

to enhance public service [16].<br />

Since the beginning of new millennium, there has been a<br />

phenomenal growth in mobile subscription around the world. In<br />

2011, International Telecommunication Union (ITU) estimated<br />

5.9 billion mobile subscriptions, with a global penetration rate at<br />

an astounding 87%-79% in developing countries against a global<br />

internet penetration rate of 35% [17]. What matters here the most<br />

is the social construction of mobile technology, which qualifies<br />

the mobile platform as a preferred means of communication due<br />

to the oral communication culture it espouses. Given its spatial<br />

mobility and flexibility to manage contextual mobility with an


oral option, it also allows for a much wider usability within<br />

digitally challenged or ageing populations.<br />

The prevalent oral communication culture that is inherent with<br />

mobile phones has found a strong audience in rural and<br />

geographically-isolated communities of developing and under<br />

developed countries that have shown considerable acceptance<br />

towards mobile technologies. Such a communal reliance has led a<br />

number of local and state level agencies to provide emergency,<br />

health, agriculture and education related information through<br />

mobile phones [23] [25]. The location-based targeting system of<br />

m-government is becoming increasingly popular way to<br />

communicate with only certain geographically proximate<br />

communities, which can prove to be a vital mobilisation tool in<br />

the case of natural disasters, epidemics or accidents.<br />

Figure 1: Mobile and Internet subscribers per 100<br />

inhabitants in Pakistan<br />

The urban-rural divide and the digital imbalance more<br />

synonymous with the developing world has so far not let Layne &<br />

Lee widely debated model of e-government provide a functional<br />

solution for developing countries. The Layne & Lee model based<br />

on catalogue stage, transaction stage and vertical and horizontal<br />

integration stage gets seriously challenged by the cost of<br />

infrastructure, limited government budgets and the lack of<br />

information in local and regional languages [14]. A number of<br />

developing countries are now moving beyond the informational<br />

web portal (which is a catalogue stage in Layne & Lee model) and<br />

are concentrating on multiple channels of public service delivery,<br />

either through kiosk machines, telecentres, over-the-counter<br />

approaches and now mobile phones to digitally facilitate their<br />

public. In India for example, a free SMS service, launched in<br />

February 2007, enables farmers in rural areas to ask agricultural<br />

or animal husbandry related queries to experts. Similarly in<br />

Pakistan, an SMS service was launched by the Pakistan Telecom<br />

Authority (PTA) to facilitate citizens for SIM verification against<br />

their unique national identity cards [18].<br />

159<br />

Hereinafter, this paper discusses the case of multiagency<br />

collaboration for an m-government application for voters’<br />

registration and verification in Pakistan. Taking into consideration<br />

all the above-mentioned limitations and opportunities, this paper<br />

analyzes Pakistan as an aberrant transitive democracy to see if and<br />

how a m-government initiative led by the Election Commission of<br />

Pakistan (ECP) in collaboration with National Database and<br />

Registration Authority (NADRA) could facilitate voting for the<br />

general elections planned in 2013. The paper touches upon a brief<br />

chronological progress of e-government evolution in Pakistan<br />

with the formation of NADRA, which eventually guided ECP in<br />

its m-government application.<br />

2. E-GOVERNMENT AND<br />

PARTICIPATORY FACTOR OF<br />

DEMOCRACY<br />

The driving force behind the phenomenon of e-government was to<br />

make governments rely on digital gadgetry in order to provide<br />

services that are more responsive and effective. This in turn could<br />

bring more transparency to administrative processes, thereby<br />

triggering a democratic culture which is supported by new<br />

communication media. For a more responsive government, it is<br />

inevitably necessary for governments to assure access and the<br />

right to information. It is perhaps the similar motivation held by<br />

Layne & Lee model of e-government whose first phase, the<br />

catalogue model, focuses on the availability of government<br />

information via web portals. However, such a model has<br />

repeatedly been rebuffed academically and contested for its<br />

viability in developing countries where there still is a huge digital<br />

gap and illiteracy. This brings the participatory promise of egovernment<br />

in a questionable position where governments on one<br />

hand try to offer multi-channel public services but on the other<br />

hand are unavailable to deliver the basic promise i.e. the<br />

availability of government information – the first requirement in<br />

almost every possible e-government model. In order to ensure the<br />

participatory nature of democracy, would it not be just to assure<br />

the access to the portal or at least an alternative way to provide<br />

government information [1]. With his empirical findings Donald<br />

Norris has challenged these early hyperbolic claims [27] that<br />

provisions for better governance through digital means does not<br />

essentially translate into enhanced or increased public<br />

participation in governments. Also, in case of developing<br />

countries, most are delineated by fledgling democracy that are yet<br />

to take root in relatively younger states staggering on to postconflict<br />

and transitional stages where the need for stability often<br />

trumps egalitarian inclusion into governments and elections. The<br />

case of e-government in Pakistan suffers from the similar<br />

developing country syndrome of digital divide where the<br />

government has not been able to reach out to its public via its web<br />

portal. There are, however, a number of multi-channel electronic<br />

public services that continues to facilitate the citizens. With the<br />

inception of the m-government application in February 2012, the<br />

Government of Pakistan introduced probably for the first time, a<br />

digital service via a short message (or SMS) that enable citizens to<br />

verify and confirm them as registered voters for the general<br />

elections in 2013. For a transitional democracy such as Pakistan,<br />

an eService of such sort can have a considerable impact on voter<br />

turnout. However, can it be claimed if an eService of this calibre<br />

delineates the participatory element for Pakistani voters? To<br />

answer, one probably needs to revisit the most celebrated and<br />

equally contested theorist of democracy, Robert Dahl, whose<br />

general set of criteria for evaluating democratic process includes


effective participation, voting equality, enlightened understanding,<br />

and control of the policy agenda [7]. If the democratic and<br />

participatory element of the ECP’s SMS application is gauged<br />

with Dahl’s criteria, this application does seem to qualify at least<br />

for one of Dahl’s five criteria. However, before dwelling upon the<br />

details of this application, it seems necessary to give a brief<br />

chronology of events that has eventually led ECP to undertake a<br />

rather sensitive and careful task of voter registration and<br />

verification via the m-government application.<br />

3. E-GOVERNMENT SCENARIO IN<br />

PAKISTAN<br />

The Government of Pakistan started its chapter of e-government<br />

in 2002 by forming a separate organisation under the Ministry of<br />

Information Technology named Electronic Government<br />

Directorate (EGD). EGD’s major tasks included to plan, prepare<br />

and implement e-government projects in Pakistan and to provide<br />

technical guidelines on the implementation of these projects at the<br />

federal, provincial and district levels. Since 2005 EGD has also<br />

put an e-government strategy and action plan for years 2005-2010,<br />

which so far has not been revised, at least publicly. At the<br />

beginning of millennium, offering a web portal remained the first<br />

task for national governments and Pakistan’s one-stop-shop<br />

solution was to initiate web portal of government ministries,<br />

divisions, and its sub organisations accessible via Internet at<br />

www.pakistan.gov.pk. The portal provided information about the<br />

ministries and explained their functioning albeit in English – a<br />

language which is only spoken and understood by a small<br />

minority of a population of 185 million people. The portal, which<br />

was revamped in 2008, does not yet offer or indicate any<br />

interactive G2C service in order to qualify for the second stage<br />

(transaction) of e-government model (by Layne & Lee) [18].<br />

While the EGD together with Government of Pakistan was trying<br />

to delve into e-government, a number of parallel initiatives started<br />

in the G2C scenario in Pakistan. Due to deregulation in the<br />

telecommunications sector, various telecom operators started their<br />

services in Pakistan. Over the course of 10 years the low rates of<br />

the mobile telecom sector found a strong audience all over the<br />

country. The figures mentioned by the International<br />

Telecommunication Union (ITU) clearly indicate that Pakistani<br />

citizens prefer mobile phones to the internet. According to the<br />

ITU statistics, mobile users in Pakistan increased from 0.21 users<br />

in 2000 to 57.14 users per 100 inhabitants in 2010 [17]. As of<br />

May 2012, the PTA puts the cellular mobile teledensity at 68.6%<br />

making it the most highly penetrated South Asian country in this<br />

regard.<br />

The increased reliance on mobile phones made a number of<br />

telecom operators in Pakistan realise the potential of mobile<br />

penetration and they started offering G2C services by acting as a<br />

middle agency. Currently, Norwegian telecom operator Telenor’s<br />

easy Paisa service for the payment of utility bills and money<br />

transfer is considered the most frequently used service, which has<br />

triggered a new era of branchless banking in Pakistan. However, a<br />

major development in e-government scenario that took place in<br />

Pakistan is the formation of National Database Registration<br />

Authority (NADRA). In order to digitise the population data, the<br />

Ministry of Interior initiated a technical wing named as the<br />

NADRA to develop Computerised National Identity Cards<br />

(CNICs), which eventually became one of the first G2C electronic<br />

public services. Over a number of years NADRA has initiated<br />

other G2C projects as well. These projects include the<br />

160<br />

development of the electronic passport, driver’s license, birth<br />

registration certificate and/or the vehicle identification and<br />

tracking system. Pakistan moved beyond the web portal when in<br />

2005 NADRA started a kiosk machine service in order to pay<br />

utility bills. The idea behind kiosk machine was the lack of<br />

internet penetration and possibility of mCommerce application on<br />

official web portal. The kiosk machine service is now being<br />

franchised and exists as a part of the eSahulat project, which<br />

allows people to transfer money without involving any bank<br />

transaction for the recipient and sender. It would not be wrong to<br />

mention that in Pakistan NADRA has now assumed the role of a<br />

master agency as it possesses the major citizen database and<br />

collaborates in a number of intergovernmental projects such as the<br />

World Bank supported cash transfer programme called Income<br />

Support Programme and the Watan Card for flood afectees.<br />

NADRA has also collaborated with the PTA by sharing its<br />

database with telecom operators in order for people to verify their<br />

SIM cards against their CNICs. This paper considers NADRA’s<br />

most recent collaboration with another governmental agency- the<br />

Election Commission of Pakistan (ECP). The next section<br />

describes the role of the ECP and its collaboration with the<br />

NADRA to develop the digitised electoral rolls.<br />

4. ELECTION COMMISSION OF<br />

PAKISTAN<br />

The Election Commission of Pakistan presides over the voting<br />

<strong>proceedings</strong> of the State and National assemblies and the Senate.<br />

Its Chief Election Commissioner (CEC) is appointed by the<br />

President of Pakistan and with amendments made in the<br />

constitution during 2012; it has been made an autonomous and<br />

independent organisation with separate funds and appointment<br />

powers for interim government, which will be responsible for<br />

organising fresh national elections [32].<br />

The ECP adopted a five-year strategic plan in May 2010, taking<br />

various stakeholders such as political parties, Civil Society<br />

Oraganizations (CSOs), female councillors, minorities, lawyers<br />

and the International Foundation for Electoral Systems (IFES) on<br />

board. The strategic plan was aimed at overhauling various<br />

technical, organizational and legal functions of the ECP.<br />

Alongside, the ECP also came up with strategic deliverables to<br />

foster digitization of the electoral rolls, building a new website,<br />

translation of content in regional languages, a better Content<br />

Management System (CMS), adoption of Electronic Voting<br />

Machines (EVM), a mobile version of the website and online<br />

availability of all ECP information, results and notifications as<br />

and when announced [11]. The following section details the<br />

collaborative model that the ECP adopted in order to verify and<br />

collate the digitization of electoral rolls with the help of NADRA.<br />

4.1 Multiagency Collaboration at Work:<br />

Preparation of the Computerised<br />

Electoral Rolls System (CERS II)<br />

In June 2011, ECP and NADRA signed a formal contract for the<br />

revision of electoral rolls and the updating of the 2006<br />

Computerised Electoral Rolls System (CERS I). NADRA<br />

extended its support by sharing the citizen database and by<br />

appending and adding supplementary information from their<br />

unique CNIC system against every voter. The CNIC carries<br />

unique identification card with multiple biometric features,<br />

photograph and includes details of residence, contact information<br />

and family status. This inter-sectoral and inter-organisational


mapping of citizens would ensure unique identity within the<br />

system and prepare clear transparent rolls which would be now<br />

called as CERS II.<br />

The ECP established a project management unit comprising ECP<br />

and IFES officials to steer and monitor this enormous task. The<br />

ECP handed over the existing electoral rolls data to NADRA in<br />

February 2011 for verification, updating and augmentation of<br />

electoral rolls 2006-07 on the basis of CNIC database.<br />

Simultaneously, the Population Census Organization (PCO)<br />

which conducts census every five years was instructed in its April<br />

2011 census to collect the information of the head of family’s data<br />

on a specially designed form for preparing preliminary electoral<br />

rolls on the basis of new census blocks as prescribed by the<br />

Census Organisation previously and now adopted by the ECP as<br />

revised electoral areas. These data were handed over to NADRA<br />

offices at district level. NADRA used the data for assignment of<br />

new census block codes after verification and augmentation of<br />

existing electoral rolls with its CNIC data. In effect, NADRA<br />

created a new database for the ECP from a data image of its CNIC<br />

database but customised it along the lines of the newly defined<br />

electoral areas. This meant further clarity and precision of voter<br />

distribution [11].<br />

NADRA prepared preliminary electoral rolls on the basis of new<br />

census blocks, using CNIC as unique identifier of voters. The<br />

ECP then conducted a country-wide door-to-door verification of<br />

these rolls in August-October 2011. A pilot project was completed<br />

in 60 selected electoral areas in four districts through door-to-door<br />

verification which helped in identifying issues during field<br />

exercise which were taken care of while rolling out the national<br />

level verification project.<br />

Figure 2: Digitisation flowchart of electoral rolls by the<br />

Election Commission of Pakistan<br />

.<br />

161<br />

NADRA then entered the data changes on the basis of voters’ data<br />

forms collected during door-to-door verification in light of<br />

guidelines/business rules, using double-blind data entry<br />

mechanism. Thereafter, the preliminary electoral rolls were<br />

printed by NADRA and delivered to the ECP’s field offices on 23<br />

February 2012. The ECP released the draft electoral rolls at<br />

52,166 display centres across Pakistan for public display for<br />

inviting claims and objections for corrections on the prescribed<br />

forms as per existing legal framework. On 29 February, both the<br />

paper-based electoral rolls and a unique SMS facility (explained<br />

in the next section) to verify citizens’ voting details were launched<br />

[8]. After incorporating the decisions of the revising authorities,<br />

the final electoral rolls were displayed successfully in May 2012.<br />

Thus, from 2012 onwards, the revised CERS-II can be updated<br />

annually as originally envisaged in the constitution of Pakistan.<br />

NADRA and the ECP plan to extend its cooperation to the next<br />

level by updating the voter data simultaneously in the ECP<br />

database when voters visit the NADRA offices for renewing or<br />

changing the personal details of their CNIC.<br />

4.2 SMS Voter Verification Application<br />

After an extensive multi-agency collaboration in collecting the<br />

voters’ data the ECP planned to not only announce the paperbased<br />

results of the voters but it also launched a unique SMS voter<br />

verification application on 29 February 2012. A widespread print<br />

and electronic media campaign was organised and the<br />

announcement of the electoral roll received prime coverage on all<br />

leading television channels, given the loaded political atmosphere<br />

with the impending 2013 elections. With regard to geographically<br />

isolated and rural areas, these campaigns were chiselled with the<br />

ECP conducting radio spots in six local languages to advertise the<br />

publication of the electoral rolls and the SMS verification<br />

application.<br />

Figure 3: Sample of return SMS with voter registration<br />

details<br />

.<br />

The SMS application requires a voter to text her/his unique CNIC<br />

number to a short code ‘8300’. Irrespective of the mobile network<br />

operator, the voter is charged, Rs. 2 (USD 0.02) and a reply SMS<br />

in the national language Urdu is received, showing the CNIC<br />

number, electoral area name, block code, tehsil/district and serial


number [10]. Keeping in view that multiple voters may use one<br />

mobile phone in a household to verify their vote and to protect the<br />

privacy of the voter, the name, parentage and home address which<br />

are attributes of CNIC are not included in the return SMS.<br />

The block code is the assigned block or colony number allotted<br />

after the new housing census of 2011 as mentioned before. The<br />

serial number replaces the old manual slip system that was issued<br />

to every voter with the serial number and name upon registration.<br />

The idea of digitally replacing the paper slip system intends to<br />

save cost and paper waste and also reduces the chances of<br />

misplaced slips. Another important issue it helps address is a<br />

voting malpractice, which was often reported in rural areas with<br />

illiterate or inexperienced voters. It is observed during elections in<br />

Pakistan that political party agents canvassing outside polling<br />

station would try to influence the voter in the guise of providing<br />

support to inexperienced voters [20]. With a new digitised version<br />

of electoral rolls, voters only need to carry their CNIC and newly<br />

issued serial number via digital electoral rolls to polling stations<br />

and cast their ballot. It shall , however, be noted that physical<br />

display of electoral rolls will continue side by side in order to<br />

ensure that no voter is denied this right. The electoral roll<br />

verification drive ended on March 20, 2012.<br />

5. ECP-NADRA SMS APPLICATION<br />

ANALYSIS<br />

It is perhaps the first time in Pakistan that a number of<br />

governmental agencies namely, the ECP, NADRA and the<br />

Population Census Organisation have cooperated with one another<br />

in order to make a digital electoral roll. The Pakistani voters’<br />

uptake on this service was considerable in both rural and urban<br />

sectors. With mobiles, virtual display centres for a small price<br />

could be created anywhere at the convenience of the voter.<br />

Indicative of the demand shift in the new service delivery, voters<br />

opted to use the SMS service and the display centres were not<br />

crowded, making it easier and speedier to deal with modification<br />

complaints of effected voters. Within 17 days of the launch of the<br />

application, 4.6 million people had used it to verify their electoral<br />

details [28]. By end of March 2012, the number of verified voters<br />

exceeded the 7 million that used this facility.<br />

The SMS service serves as an auxiliary provision that enabled the<br />

8.4% registered voters in Pakistan. However, this level of<br />

collaboration will be able to open new areas of interagency<br />

collaborations, which actually could be considered as the third and<br />

fourth phase of horizontal and vertical integration, if compared<br />

with the Layne & Lee model of e-government. Similarly, the SMS<br />

service has landed the ECP in the Guinness Book of World<br />

Records for having the World’s largest voter verification SMS<br />

service with a voter density of 83.28 million [31]. Introducing this<br />

application on an even bigger network of almost 111 million<br />

mobile users in one go, relying on indigenous technology and<br />

skills without physical external assistance bodes well for<br />

developing countries and their m-government plans. As of 2012,<br />

the ECP plans to launch the same SMS service to announce and<br />

inform voters of their allocated polling stations before the national<br />

elections are conducted.<br />

An instance of this provision was observed in July 2012, after the<br />

dismissal of the then Prime Minister Gillani by the Supreme Court<br />

of Pakistan. His seat in the Pakistan National Assembly eventually<br />

fell vacant and bye-election had to be held. Here the ECP<br />

provided information to over 138,000 voters in that constituency<br />

162<br />

using location based targeting and its new CERS II rolls to SMS<br />

voters their block codes, polling station names and numbers and<br />

serial numbers.<br />

The architecture behind the SMS application is a G2C<br />

informational exchange initiated by texting a short code- a C2G<br />

pull communication. On the front end, it is a text-based<br />

communication on the GSM cellular network in a local language<br />

and numbers. The middleware is a NADRA SMS Gateway. All<br />

the Mobile Network Operators (MNO) have reserved short code<br />

8300 for the ECP. Once a network operator receives an SMS, it<br />

passes the message to the NADRA SMS gate way. In return, if the<br />

message is appropriate (i.e. if it contains 13 digits of CNIC) the<br />

voters’ information is returned.<br />

If this application is analysed against the Task-Technology Fit<br />

model [13], it can be argued that the ECP-NADRA’s application<br />

is a useful one in a way that a huge chunk of the target audience is<br />

available on the employed platform, the task (here informational)<br />

can be viably transmitted. Given the text-based informational<br />

request in a mobile and geographically diverse target area, with a<br />

varied skill set and technical abilities and round the clock access<br />

to ensure all voters could verify their status within the 20-day<br />

period- this match serves a useful proposition for the SMS<br />

verification system. Had the ECP launched a website version of<br />

this application then, , the application would not have even<br />

achieved the 8.3% of audience due to limited internet penetration<br />

in Pakistan as compared to the mobile phone subscription as<br />

indicated in Figure 1. Building up on the location-based facility in<br />

m-government, the future plan to inform voters of their designated<br />

polling stations through a similar SMS based application may also<br />

be successful, which was test run in the bye-elections of<br />

constituency Multan-IV as pointed before.<br />

Incorporation of an external facilitator or technology provider in a<br />

highly sensitive national affair such as the national election is not<br />

desirable [19] especially with regard to credibility and neutrality<br />

of an election body. By hiring an indigenous public firm on a<br />

formal contract to implement both the software and hardware ends<br />

of a project, while keeping check and balance on the tailored<br />

solution, ensured control with the contractee. The digitisation of<br />

voters’ registration roll brought together not only the government<br />

officials but also IT experts to ensure that the design phase does<br />

not suffer from the absence of experts from both ends. Brewer<br />

et.al. [5] have argued that the combination of bureaucracy and<br />

technology experts would minimise the pitfalls in an egovernment<br />

application. The ECP relied on NADRA’s<br />

accumulated experience of over 10 years in the automation and<br />

biometric business. A unique factor was that NADRA customized<br />

a data image of its CNIC and appended the CERS I with it to<br />

create CERS II. Such a multiagency cooperation for interagency<br />

information sharing can be extended and scaled to further future<br />

projects [35].<br />

Ideally, there should not have been any costs involved for an<br />

SMS, but to avoid jamming of the SMS service by miscreants the<br />

ECP decided to keep a minimal cost. Despite the lower cost of<br />

SMS, it may still prevent the marginally poor people from<br />

availing it. However, the government did not abandon the paper<br />

display of electoral rolls to ensure no citizen is missed out.<br />

Security and trust though remain tangible issues to be addressed<br />

as with all e-government initiatives- establishing an identity<br />

versus the anonymity of a citizen have confounded electronic<br />

notions of governance and elections [19].


Here the authors wish to extend the analysis of the ECP project by<br />

gauging against the success factor model proposed by Sandy and<br />

Macmillian [29] to evaluate the internal effects on the government<br />

based on six points:<br />

Cost: Governments need to find cost effective solutions to ensure<br />

funding and look into options for joint operations. In this case,<br />

even buying services from MNO in the long-term or in a bulk<br />

package lasting only during the verification drive, might have<br />

further lessened or eliminated the charge of the service on the<br />

public, perhaps making it more inclusive. Who might pay for the<br />

novelty of receiving an SMS for a service viewed as too<br />

expensive? After all e-government services tend to have an elastic<br />

demand [24] and do not stand the test of the cost distribution well.<br />

Similarly, attracting and keeping staff with “requisite agility” will<br />

make for a self-conscious government that can adequately handle<br />

and deal with citizen demand [5].<br />

Business Reengineering: A central authority and political support<br />

in the form of a coordinated and bench-marked national egovernment<br />

plan with specific m-government services recognized<br />

with clearly defined deliverables would ensure a better and<br />

cohesive strategy. This would mean that dependency on legacy<br />

systems be reduced and government should try to keep or<br />

maintain central databases or platforms that can be used to test,<br />

pilot-run and launch e-government or m-government initiatives,<br />

which will prove to be launching pads and resource centres for all<br />

departments and sectors.<br />

Education: Better access and training programs to ensure adoption<br />

of m-government initiatives so as to have stronger back office<br />

work. Identifying and maintaining open source international<br />

standards that would make it easier for both employees and public<br />

to remain at the top of the infrastructural game and the everchanging<br />

technology blitz.<br />

Acceptance: There should be ownership of the projects to ensure<br />

that the increased participation of the public is handled well or it<br />

would have a reverse effect on inclusive nature of m-government.<br />

Here, the popularity of the e-Sahulat programme over the Kiosk<br />

system may explain the local populace’s preference for human<br />

interaction rather than machine-human interfaces [3]. For this<br />

purpose, incorporating government officials in the design and<br />

feedback of such initiatives will create interest. Supporting<br />

employees with technically sound and well-fitted offices with<br />

clearly defined job descriptions will ensure accountability.<br />

Security: Data loss in terms of device theft can be limited by<br />

ensuring that mobile phone SIMs are registered against CNICs.<br />

Similarly providing access to an online temporary identification<br />

should also be accepted in case of ID theft. Data protocols on<br />

office machinery should be defined and stripped down for work<br />

purposes only and IT administrators should have strict policies<br />

against external data storage devices in workplaces. These<br />

policies currently prevail in NADRA offices.<br />

Access: Providing key infrastructure to all actors, both within and<br />

without the government. Presence of content in local language,<br />

regular and audited updating of CMS system and providing<br />

similar opportunities for people with physical disability and<br />

special needs will ensure equal access for all.<br />

163<br />

5.1 Litmus Test- Requisite Agility of the<br />

CERS II and SMS application<br />

Coming to the last factor- has the governance module succeeded<br />

with this initiative? Coupling this system with the aforementioned<br />

electoral bill, the CNIC numbers have essentially become unique<br />

identifying factors in elections. The ECP’s initiative has the<br />

potential to promote transparency and would help in removal of<br />

defunct or fraudulent votes from the vote bank - hence the<br />

strengthening of related factors of openness, accountability and<br />

participation. Here, one recent incident that was reported during<br />

the verification procedure serves as a litmus test of this initiative’s<br />

working. After the display of electoral rolls, a member of national<br />

and another of provincial assembly observed abnormal increase in<br />

the electorate records of their respective constituencies and<br />

reported it to the ECP. The ECP gave NADRA and its provincial<br />

election commission office a forty-eight hour deadline to explain<br />

the cause behind this anomaly. Not only was the mistake traced<br />

and rectified, but NADRA investigated that five people had tried<br />

to manually fill thousands of vote-transfer forms and migrated<br />

voters in these districts. As they had submitted these forms with<br />

some identification, NADRA used the biometric assets of the<br />

CNIC and traced the culprits. Similar patterns were also traced out<br />

in two other constituencies and rectified [9] [26].<br />

6. CONCLUSION<br />

Encouraging as the result of this debilitation may be, it is<br />

however, difficult to say as to what extent governance will be<br />

fostered by this initiative in the long run despite its wide usage<br />

and demonstrated benefits. But the ECP-NADRA app surely is a<br />

unique experiment in strengthening the democratic culture in<br />

Pakistan. Apart from NADRA’s kiosk machine project and an<br />

eSahulat programme, the ECP SMS app can be considered as<br />

another contribution in the category of alternative channel of<br />

electronic public service delivery which excludes the web portal<br />

as a main communication medium. This app has tried to exploit<br />

the most frequently used gadget, i.e., a mobile phone which does<br />

not even have to be a smart phone to use this app. For a young<br />

democracy like Pakistan the ECP-NADRA collaboration seems to<br />

have contributed to a larger extent in assuring the effective<br />

participation and/or voting equality in Dahl’s sense of effective<br />

democracy. The way multiple governmental agency have<br />

collaborated in the preparation of electoral rolls, the ECP and<br />

NADRA have set up a decent example for other developing<br />

countries how vertical boundaries can be overcome in such inter<br />

agency collaborations. M-government presents a substantive case<br />

in enfranchising the participatory nature and equal rights to<br />

information sharing for all citizens. Once this information divide<br />

is plugged, participation may seep into the public policy<br />

formulation sphere. However, the external implication of mgovernment<br />

on public is not the only factor in their success.<br />

The internal implications that m-government will have in making<br />

the government effective and efficient in its function is also<br />

important. There is diverse literature from organisational<br />

behaviour studies that shows that lack of ownership for projects<br />

from within governments can kill the most promising innovations.<br />

The public and governments are generally seen as complacent in<br />

their business models and more so when accountability and<br />

checks and balances are absent or hindered by fledging,<br />

discontinuous democracies. This is also the political case of<br />

Pakistan, where change in governments leads to entire and sudden<br />

shifts in policy which means squandering the already deficit


public money. As most of the e-government initiatives in<br />

developing countries are based on legacy systems, there is little<br />

scope for backward compatibility for newer front-end<br />

applications. Additional training cost, quality of manpower and<br />

organizational rigidities are hindrances [33] [34], which ideally<br />

the private sector has always adapted better to. Thus, Public<br />

Private Partnerships (PPP) maybe the way forward as public<br />

sector brings in money, employees and better business models,<br />

while the government ensures that the role of governance and<br />

common public good are not lost in capital building.<br />

7. RECOMMENDATIONS<br />

With regards to the case study, certain recommendations that<br />

could facilitate newer m-government initiatives and thus make<br />

room for innovative and useful e-government initiatives which are<br />

user-centric are listed below:<br />

1. Establish a Mobile Service Gateway Delivery system, which<br />

could be an incubation cell for all or any government initiatives<br />

into m-government. It would maintain a technical infrastructure<br />

and staff to help formulate, devise, test-run and then deploy<br />

various m-government initiatives. It would be ideal to have one<br />

central Mobile Gateway with networked centres in all provinces<br />

to keep a balanced and federal linearity in equal funding but will<br />

allow them flexibility to identify preferred areas for action thus<br />

promoting a bottom-up approach.<br />

2. Ensure that the format of the CNIC database is the groundwork<br />

database for all new initiatives for e-government and mgovernment.<br />

This would allow mapping of citizens across<br />

different organizations building up a single unified repository on<br />

user-id with unique biometric features. These would prevent<br />

identity theft or misuse of data, as biometric checks are embedded<br />

within these systems.<br />

3. Establish a market for m-government applications not only for<br />

smartphones but normal cellular phones that can exploit the<br />

location-based context of the mobile phone to provide crucial<br />

information. The Government should provide incentives to mobile<br />

application programmers to compete and design comprehensive<br />

application that can be used to facilitate agricultural, medical and<br />

educational initiatives over the mobile channel.<br />

4. Initiating a standard for mobile applications and incorporating it<br />

within the National e-government plan. The EGD of Pakistan has<br />

to revise and update its e-government strategy plan and design a<br />

separate model for m-government that can be used to benchmark<br />

and help future initiatives on this platform across the public<br />

sector.<br />

5. Pre-designated short codes should be reserved for future mgovernment<br />

initiatives. Reserving short codes on a national level<br />

and then using them for deploying essential services comes in<br />

handy for the recalling abilities of these short codes. Similarly, a<br />

long number should be reserved which would be the touch point<br />

of all m-government initiatives. It would feature a menu-based<br />

Interactive Voice Response (IVR) menu that would serve to be a<br />

repository for accessing, using and interacting with all mgovernment<br />

initiatives through oral occupation thus involving<br />

illiterate or technically challenged citizens.<br />

6. Developing mobile websites for all government websites which<br />

would have the same URL but would divert the user to the mobile<br />

website after it has been established that it is being accessed<br />

through mobile. Mobile websites need to be text-rich and without<br />

164<br />

too many graphics, and they should be available in the national as<br />

well as regional languages.<br />

8. ACKNOWLEDGEMENTS<br />

The authors are indebted to the technical wing of National<br />

Database Registration Authority (NADRA) for their assistance in<br />

providing information about the case study.<br />

9. REFERENCES<br />

[1] Baums, C. H., & Maio, A. D. Gartner's Four phases of<br />

EGovernment Model. Retrieved March 12, 2012, from<br />

GARTNER: www.gartner.com, 2000<br />

[2] Bokhari, H. Paradigm shift in service delivery channels for<br />

G2C services–Service Oriented Architecture an option for<br />

the success of eGovernment in Pakistan? In International<br />

Conference on Information and Communication<br />

Technologies, University of Science and Technology, Bannu,<br />

Pakistan, 2008.<br />

[3] Bokhari, H. Multi-channel Electronic Public Service<br />

Delivery Mechanisms in Developing Countries- A Case<br />

Study of the Esahulat Programme in Pakistan. In Janowski,<br />

T. and Davies, J. (Ed). 4th International Conference on<br />

Theory and Practice of Electronic Governance.ACM: New<br />

York, 2010.<br />

[4] Bokhari, H. Realising hybrid model of eGovernment for<br />

citizen-centric eServices in developing countries. Analysis of<br />

eSahulat programme in Pakistan. In IEEE 13th International<br />

Multitopic Conference, UET Taxila and MAJU Islamabad,<br />

2009.<br />

[5] Brewer, G. A., Neubauer, B. J., & Geiselhart, a. K.<br />

Designing and Implementing E-Government Systems :<br />

Critical Implications for Public Administration and<br />

Democracy. Administration and Society (July, 2006), p. 472-<br />

500.<br />

[6] Castells, M. The rise of the network society: volume i: the<br />

information age: economy, society, and culture. Willey-<br />

Blackwell, 2009.<br />

[7] Dahl, R. A. Democracy and its critics. New Haven CT: Yale<br />

University Press, 1989.<br />

[8] Dawn. ECP starts Rolls display, SMS service for voters<br />

verification. Retrieved March 25, 2012, from Dawn:<br />

http://www.dawn.com/2012/02/29/ecp-starts-rolls-displaysms-service-for-voters-verification.html<br />

[9] ECP. Press Release. Retrieved March 25, 2012, from<br />

Election Commission of Pakistan:<br />

http://www.ecp.gov.pk/ViewPressReleaseNotific.aspx?ID=1<br />

538&TypeID=0<br />

[10] ECP. Press Release: ECP inaugurates SMS facility<br />

tomorrow. Retrieved March 25, 2012, from Election<br />

Commission of Pakistan:<br />

http://www.ecp.gov.pk/ViewPressReleaseNotific.aspx?ID=1<br />

503<br />

[11] ECP. Progress Report on Implementation of the Five Year<br />

Strategic Plan. Retrieved March 24, 2012, from Election<br />

Commission of Pakistan:


http://www.ecp.gov.pk/Reports/SPStrategicPlanProgress.pdf,<br />

January, 2012.<br />

[12] El-Kiki, T., & Lawrence, E. Emerging Mobile Government<br />

Services: Strategies for Success. 20th Bled eConference.<br />

Bled, Slovenia, 2007.<br />

[13] Gebauer, J., Shaw, M. J., & Gribbins, M. Task technology fit<br />

for mobile information systems. Journal of Information<br />

Technology. p. 259-272, 2010.<br />

[14] Ghyasi, A. F., & Kushchu, I. mGovernment: Case for<br />

developing countries. Retrieved March 24, 2012, from<br />

Mobile Government Lab: http://www.mgovernment.org/<br />

resurces/mgovlab_afgik.pdf.<br />

[15] ITU. ICT- Facts and Figures: The World in 2011. Retrieved<br />

March 24, 2012, from International Telecommunications<br />

Union: http://www.itu.int/ITU/ict/facts/2011/<br />

material/ICTFactsFigures2011.pdf<br />

[16] ITU & OECD. M-government: Mobile technologies for<br />

responsive governments and connected societies. ITU &<br />

OECD, 2011.<br />

[17] ITU. (2011, December). Key 2000-2010 Country Statistics.<br />

Retrieved March 10, 2012, from International<br />

Telecommunications Union: http://www.itu.int/ITU-<br />

D/ict/statistics/<br />

[18] Karen, L., Jungwoo L. “Developing Fully Functional E-<br />

Government. A Four Stage Model”. Government Information<br />

Quarterly, Vol. 18, Issue 2 (2001). p. 122-136.<br />

[19] Krimmer, R., Triessnig, S., & Volkamer, M. The<br />

Development of Remote E-voting Around the World: A<br />

review of roads and directions. Vote ID (pp. 1-15).<br />

Heidelberg, DE: Springer-Verlag Berlin, 2007.<br />

[20] Khan, I. H. Electoral malpractices during the 2008 elections<br />

in Pakistan. Karachi: Oxford University Press, 2011.<br />

[21] Kushchu, I., & Borucki, C. Impact of Mobile Technologies<br />

on Government. Retrieved March 25, 2012, from Mobile<br />

Government Lab: http://www.mgovernment.org/resurces/<br />

mgovlab_ikcb.pdf<br />

[22] Kushchu, I., & Kuscu, M. H. From M-government to Egovernment.<br />

Retrieved March 24, 2012, from Mobile<br />

Government Lab: http://www.mgovservice.ru/upload/<br />

uploadfiles/From%20eGov%20to%20mGov.pdf<br />

[23] Moon, M. J. From E-government to M-government?<br />

Emerging trends in the use of mobile technology by State<br />

governments. Washington: IBM Centre for the Business of<br />

Government, 2004.<br />

[24] Naik, G., Joshi, S., & Basavaraj, K. Fostering inclusive<br />

growth through e-Governance Embedded Rural Telecenters.<br />

Government Information Quarterly (2012), p. 81-89.<br />

[25] Naqvi, S. J., & Al-Shihi, H. M-government initatives in<br />

Oman. Issues in Informing Science and Technology (2009),<br />

p. 818-824.<br />

[26] News, T. ECP, Nadra solve mystery of abnormal increase in<br />

registered voters. Retrieved March 25, 2012, from The<br />

News: http://www.thenews.com.pk/Todays-News-6-98244-<br />

165<br />

ECP-Nadra-solve-mystery-of-abnormal-increase-inregistered-voters<br />

[27] Norris, D. F. E-Government...Not E-Governance...Not Edemocracry<br />

Not Now! Not Ever? ICEGOV 2010 Beijing,<br />

China: ACM. pp. 339-346, 2010<br />

[28] Pakistan Today. Over 4.6m citizens verify vote through<br />

SMS. Retrieved March 25, 2012, from Pakistan Today:<br />

http://www.pakistantoday.com.pk/2012/03/18/city/islamabad<br />

/over-4-6m-citizens-verify-vote-through-sms/<br />

[29] Sandy, G. A., & Macmillian, S. A success factors model for<br />

M-government. Euro mGov (pp. 349-352). Brighton, UK:<br />

Mobile Government Consortium International Pub, 2005<br />

[30] Symonds, M. A survey of government and the internet: The<br />

next revolution. The Economist (June, 2000), p. 36.<br />

[31] Tribune. ECP 'SMS voters’ verification service may break<br />

World Record. Retrieved 2012 25, March, from The Express<br />

Tribune: http://tribune.com.pk/story/350452/ecp-sms-votersverification-service-may-break-world-record/<br />

[32] Tribune, P. Neutral caretakers, independent EC promised;<br />

passed 20th amendment bill. Retrieved March 24, 2012, from<br />

Pakistan News Service: http://paktribune.com/news/Neutralcaretakers-independent-EC-promised;-passed-20th-<br />

Amendment-bill-247519.html<br />

[33] Trimi, S., & Sheng, H. Emerging trends in M-government.<br />

Communications of the ACM (May, 2008), p. 53-58.<br />

[34] VR Salkute, S. K. Implications of mobile communication<br />

technologies (mct) in m-government: challenges, technology<br />

and applications. International Research Journal of<br />

Management and Business Studies (2011), p. 62-67.<br />

[35] Yang, T.-M., Zheng, L., & Pardo, T. The boundaries of<br />

information sharing and integration: A case study of Taiwan<br />

e-government. Government Information Quarterly (2012), p.<br />

51-60.


Integrating Argumentation Technologies and<br />

Context-Based Search for Intelligent Processing<br />

of Citizens’ Opinion in Social Media<br />

Carlos Chesñevar,<br />

Ana Maguitman<br />

Dept.of Computer Science and Eng.<br />

Universidad Nacional del Sur<br />

Av. Alem 1253<br />

8000 Bahía Blanca, Argentina<br />

+54 291 459 5135<br />

{cic,agm}@cs.uns.edu.ar<br />

ABSTRACT<br />

Nowadays, governments are adopting Web 2.0 technologies for<br />

interacting with citizens, empowering them to share their views,<br />

react to issues of their concern and form opinion. In particular,<br />

social media play an important role in this context, due to their<br />

widespread use. For governments, a major technical challenge is<br />

the lack of automated intelligent tools for processing citizens’<br />

opinion in government social media. At the same time, during the<br />

last decade, argumentation theory has consolidated itself in<br />

Artificial Intelligence as a new paradigm for modeling common<br />

sense reasoning, with application in several areas, such as legal<br />

reasoning, multiagent systems, and decision support systems,<br />

among others. This paper outlines an argument-based approach<br />

for overcoming such challenge, combined with context-based<br />

information retrieval. Our ultimate aim is to combine contextbased<br />

search and argumentation in a collaborative framework for<br />

managing (retrieving and publishing) service- and policy-related<br />

information in government-use social media tools.<br />

Categories and Subject Descriptors<br />

J.1 [Administrative Data Processing]: Government; I.2<br />

[Artificial Intelligence]: Learning; H.3 [Information Storage<br />

and Retrieval]: Information Search and Retrieval<br />

General Terms<br />

Algorithms, Human Factors, Languages<br />

Keywords<br />

Social media; Government 2.0; e-Governance; Participation;<br />

Intelligent Tools<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Elsa Estevez<br />

United Nations University<br />

Int. Institute for Software Technology<br />

Center for Electronic Governance<br />

P.O. Box 3058, Macao SAR, China<br />

+853 85040491<br />

elsa@cs.uns.edu.ar<br />

166<br />

Ramón Brena<br />

ITESM Monterrey<br />

Av. E. Garza Sada 2501,<br />

Col. Tecnológico, 64849 Monterrey,<br />

N.L., México<br />

+52 81 8358-2000 ext. 5246<br />

ramon.brena@itesm.mx<br />

1. INTRODUCTION AND MOTIVATIONS<br />

Government 2.0 refers to government's adoption of Web 2.0<br />

technologies to socialize government services, processes, and data<br />

[1][2]. Enabling new ways of communication – text, audio, video<br />

as well as two-way communications, Government 2.0 provides<br />

new mechanisms for government agencies to: 1) increase<br />

transparency – bringing public sector agenda and government<br />

activities closer to citizens [3], 2) facilitate participation –<br />

engaging citizens in making opinion and contributing to policydecision<br />

making; and 3) enhance service delivery – pushing<br />

service-related information and gathering citizens’ opinions about<br />

service delivery. As an example of Government 2.0 adoption, the<br />

Government of Singapore offers a directory of the web 2.0 and<br />

other social media initiatives, such as Facebook pages, Flickr<br />

photostreams, Twitter accounts, and YouTube channels, among<br />

others; used by government agencies [4].<br />

Aware of the benefits and willing to pursue them, governments<br />

first need to overcome various types of challenges posted by<br />

Government 2.0. In particular, the use of social media requires<br />

governments to overcome challenges related to privacy, security,<br />

data management, accessibility, social inclusion, governance and<br />

policy-related issues [5]. Focusing on the data management<br />

perspective, only integrating data streams from social media<br />

requires solving two important issues: 1) the magnitude of the<br />

information flow associated with such data streams (e.g. Twitter<br />

disseminates 55 million tweets a day), and 2) extracting<br />

meaningful information –social media data streams are usually<br />

incomplete which may be potentially inconsistent, as citizens<br />

might have different views on a certain issue.<br />

Addressing technical challenges of data management in<br />

government-use social media tools, this paper presents DECIDE<br />

2.0 – a framework integrating argumentation technologies and<br />

context-based search for intelligent processing of citizens’ opinion<br />

in social media. The framework relies on text mining and opinion<br />

mining techniques to filter noise and detect main topics being<br />

discussed by citizens in social media. Recognizing that the use of<br />

such techniques is not a common government practice, the main<br />

contribution of DECIDE 2.0 is to provide an automated tool for<br />

extracting arguments based on citizens’ opinions. The framework


will enable to assess and confront pro- and cons- arguments to be<br />

used by policy makers and government officials as inputs in<br />

decision making processes.<br />

The rest of the paper is structured as follows. Section 2 presents<br />

an overview of the framework; while Section 3 explains the main<br />

technologies applied in DECIDE 2.0 – context-based search and<br />

argumentation using Defeasible Logic Programming (DeLP).<br />

Finally, Section 4 outlines a roadmap for future work.<br />

2. DECIDE 2.0 - OVERVIEW<br />

DECIDE 2.0 aims at extending the current state of the art of web<br />

2.0 technologies by integrating existing social media tools with<br />

argumentation and context-aware technologies. Following its aim,<br />

DECIDE 2.0 combines context-based search [6] and<br />

argumentation [7] in a collaborative system for managing<br />

(retrieving and publishing) service- and policy-related information<br />

in social media tools used by governments. Therefore, DECIDE<br />

2.0 contributes to a more enhanced set of Government 2.0 tools.<br />

Context of<br />

e-Government-<br />

related<br />

issue<br />

Citizens<br />

Citizens’<br />

Opinion<br />

Knowledge<br />

base<br />

post<br />

opinions<br />

C2) Argument-based<br />

decision making<br />

C1) Extracting opinions<br />

using context-based<br />

search<br />

3. INTEGRATING ARGUMENTATION<br />

AND CONTEXT-BASED SEARCH<br />

Our approach involves two main stages: a) context-based search<br />

from social media - C1 in Figure 1; and b) argumentative decision<br />

making on the basis of the obtained information – C2, C3 and C4<br />

in Figure 1. Next we will analyze these two stages in more detail.<br />

3.1. Context-Based Search for Social Media<br />

Context-based search in Twitter is an instance of context-based<br />

search in general [6]. The task of context-based search could be<br />

applied in many different situations. For example, a<br />

contextualized suggestion interface could be useful to a journalist<br />

for exploring information sources while she writes a news article.<br />

It could also be helpful to a researcher, to identify novel but<br />

r<br />

Citizens’ Opinion<br />

Database<br />

Fig. 1. DECIDE 2.0 Framework<br />

DECIDE 2.0 was originally presented in [8] and a revised version<br />

of its architecture is presented in Figure 1. The architecture<br />

comprises four main components: C1) Extracting Opinions -<br />

based on data provided by social media, extracts citizens’<br />

opinions on a given theme using context-based search and<br />

produces formal predicates, and stores opinions and predicates in<br />

a knowledgebase; C2) Argument-based Decision Making – based<br />

on the generated knowledgebase, the component selects predicates<br />

on a given theme; C3) Applying DeLP Web Services – predicates<br />

are analyzed with DeLP web services to assess whether they<br />

follow some assumptions or not; C4) Producing Global<br />

Assessment – based on the results of the previous stage, arguments<br />

are classified into pro- and cons- and are consolidated into a<br />

global assessment of citizens’ opinion on a given theme.<br />

Even though DECIDE 2.0 is intended to capture citizens’ opinions<br />

from different social media, our current research is particularly<br />

focused on the use of Twitter. Consequently, in what follows we<br />

will outline part of our ongoing research in this direction.<br />

SOCIAL MEDIA TOOLS<br />

167<br />

C3) Applying Defeasible<br />

Logic Programming<br />

(DeLP) web services<br />

C4) Producing global<br />

assessment of citizens’<br />

opinions<br />

post<br />

policy-related<br />

issues<br />

Citizens’<br />

Opinion<br />

(with details for<br />

policy-making<br />

oriented<br />

decisions)<br />

Government<br />

Officials<br />

related material to consider or to help assure that relevant areas<br />

have been considered in her research work.<br />

To illustrate our approach, we define a case study where<br />

government stakeholders involved in a particular policy area are<br />

interested in collecting opinions from Twitter on a topic that is<br />

openly discussed by community members.<br />

One of the goals of the proposed framework is to develop a topic<br />

suggestion tool that has the capability of identifying a set of<br />

opinions that share a common theme. We assume that a citizen’s<br />

opinion refers to a certain theme and contains several terms. In<br />

turn, the opinion may be related to one or more topics and it is<br />

possible to associate each topic with the related terms in the<br />

citizen’s opinion. In addition, the suggested topics can be<br />

evaluated in the light of a set of criteria for assessing their quality.


The concepts are illustrated in Figure 2. Technically. given a<br />

corpus of opinions O = {o1, o2, … ,om}, and a universe of possible<br />

terms K ={k1, k2, …, kn}, we consider a topic ti of an opinion oj to<br />

be a nonempty subset of the terms ki1, …, kip contained in K<br />

satisfying a set of criteria for topic quality. In this sense, a topic<br />

can be characterized as a set of cohesive terms associated with<br />

opinions that share a common theme.<br />

Fig. 2. DECIDE 2.0 Concepts<br />

A contextualized search system starts with a piece of text d<br />

reflecting a general context or topic of interest td and identifies a<br />

set N = {t1, t2, …, tq} of new topics related to topic td. The<br />

performance of the main component of the system - a<br />

contextualized topic suggester, can be judged according to various<br />

criteria [10]:<br />

o Global coherence: The new suggested topics (topics in N)<br />

must be relevant to the general topic of interest td.<br />

o Local coherence: Each suggested topic must be of high<br />

quality according to the criteria of the domain. Such criteria<br />

might include: 1) measures of coherence - each topic<br />

description is constituted of tightly related terms and opinions,<br />

2) descriptiveness - the terms used to identify the topics are<br />

good descriptors, 3) discriminative power - the terms help<br />

differentiate among other suggested topics , 4) conciseness -<br />

the topic is summarized in few terms; etc.<br />

o Coverage: The set of new suggested topics (N) must contain<br />

most of the topics considered to be relevant.<br />

o Novelty: The set of new topics (N) must go beyond the<br />

information captured in the initial topic td.<br />

o Diversity: topics in N must be sufficiently diverse from each<br />

other.<br />

Using context-based search, given a set O of opinions provided by<br />

citizens via Twitter and a set of possible terms K on a topic of<br />

community discussion td, we can identify new topics associated<br />

with those opinions. Clearly, users might confront opinions,<br />

including positive or negative remarks within their tweets.<br />

Sentiment analysis techniques [11][12] allow to determine the<br />

attitude of a speaker (citizen) or a writer with respect to some<br />

topic or the overall contextual polarity of a document (e.g.<br />

positive, negative, neutral). As a final result, we will be able to<br />

identify different logical predicates associated with a user’s<br />

opinion, the topics involved, and the attitude of the speaker.<br />

As an example, consider the following piece of text d (extracted<br />

from http://www.conservapedia.com):<br />

ObamaCare, more formally known as "The Patient Protection and<br />

Affordable Care Act," was passed by Congress on March 21,<br />

2010, and signed into federal law by President Barack Obama on<br />

March 23. This law began the process to socialize the United<br />

States health care system. The centerpiece of ObamaCare is the<br />

individual mandate, a provision that makes it mandatory for every<br />

citizen to purchase private health insurance, which is<br />

unprecedented in American history.<br />

168<br />

By applying techniques described in [13] it is possible to identify<br />

a set of good topic descriptors and topic discriminators (e.g.<br />

preventive health care , obamacare, etc.) as well as a list of<br />

representative hashtags associated with this topic, such as #hcr<br />

and #obamacare. A context-based search system might then<br />

identify the following set of opinions, among others:<br />

o1: Thanks for the new health law, pregnant women can receive<br />

many free preventive health services and screenings. (tweeted by<br />

user U1)<br />

o2: Health care reform does not make health care more<br />

affordable it makes people buy something they can’t afford.<br />

(tweeted by user U2)<br />

From the opinions above, logical predicates can be extracted,<br />

structuring previous information in logic programming fashion:<br />

opinion(o1, “Thanks for…”)<br />

opinion(o2, “Thanks for…”)<br />

topic(t1, preventive health care)<br />

useropinion(u1,o1, t1, positive)<br />

useropinion(u2,o2, t1,negative)<br />

Such set of logical predicates derived from citizens’ opinions on a<br />

particular context will provide a Citizens’ Opinion Knowledgebase<br />

(see Figure 1), on top of which an argumentative analysis<br />

will be carried out.<br />

3.2. Argumentation using DeLP<br />

Over the last few years, argumentation systems have been gaining<br />

increasing importance in several areas of Artificial Intelligence,<br />

mainly as a vehicle for facilitating rationally justifiable decision<br />

making when handling incomplete and potentially inconsistent<br />

information [7]. Argumentation provides a sound model for<br />

dialectical reasoning, which underlies discussions or opinion<br />

confrontation in social networks.<br />

Rule-Based Argumentation Systems, such as Defeasible Logic<br />

Programming (DeLP) [14] are increasingly being considered for<br />

applications in developing software engineering tools, constituting<br />

an important component of multi-agent systems for negotiation,<br />

problem solving, and for the fusion of data and knowledge. Such<br />

systems implement a dialectical reasoning process by determining<br />

whether a proposition follows from certain assumptions,<br />

analyzing whether some of those assumptions can be disproved by<br />

other assumptions in our premises. In this way, an argumentation<br />

system provides valuable help to analyze which assumptions from<br />

our knowledge base are really giving rise to inconsistency and<br />

which assumptions are harmless.<br />

In DeLP we refer to a knowledgebase as a pair of sets (KS, KD),<br />

distinguishing strict and defeasible knowledge. Strict knowledge<br />

(KS) corresponds to the knowledge which is certain; typical<br />

elements in KS are statements or undisputable facts about the<br />

world (e.g. adopting the representation used in logic<br />

programming, implications of the form Q(x)←P(x)). The strict<br />

knowledge is consistent, i.e. no contradictory conclusions can be<br />

derived from it. Defeasible knowledge (KD) corresponds to that<br />

knowledge which is tentative, modelled through “rules with<br />

exceptions” (defeasible rules) of the form “if P then usually Q”<br />

(e.g., “if somebody is a citizen, it usually votes”). Such rules<br />

model our incomplete knowledge about the world, as they can<br />

have exceptions (e.g., a citizen may be travelling abroad without<br />

access to a voting place, or may not be willing to vote).<br />

Syntactically, a special symbol (⇐) is used to distinguish<br />

“defeasible” rules from logical implications.


The underlying DeLP process is as follows. Given a particular<br />

query Q - e.g. assessing whether ObamaCare Programme is<br />

supported by citizens’ opinions – isSupported(ObamaCare),<br />

DeLP will automatically perform a backward chaining process to<br />

obtain a sequence of defeasible rules instantiations allowing to<br />

conclude Q. Such a sequence is called an argument supporting Q.<br />

Clearly, as contradictory information can be present in the<br />

defeasible knowledgebase, counter-arguments might arise (e.g. an<br />

argument supporting ~isSupported(ObamaCare). When two<br />

arguments A and B are in conflict, a preference criterion is used in<br />

DeLP to determine which argument should prevail. The argument<br />

that prevails will be called a defeater. The preference criterion to<br />

be applied (e.g. specificity [14]) can be defined in a modular way.<br />

Note that the notion of defeat among arguments may lead to<br />

complex “cascade” situations: an argument A may be defeated by<br />

an argument B, which in turn may be defeated by an argument C,<br />

and so on. Besides, every argument involved may have on its turn<br />

more than one defeater. Argumentation systems allow us to<br />

determine when a given argument is considered as ultimately<br />

acceptable with respect to the knowledge we have available by<br />

means of a dialectical analysis, which takes the form of a tree-like<br />

structure called dialectical tree. The root of the tree is a given<br />

argument A supporting some claim, and children nodes for the<br />

root are those defeaters B1, B2, .. Bk for A. The process is repeated<br />

recursively on every defeater Bi, until all possible arguments have<br />

been considered. The tree leaves are arguments without defeaters.<br />

Some additional restrictions apply - e.g. the same argument<br />

cannot be used twice in a path, as that would be fallacious and<br />

would lead to infinite paths.<br />

In DECIDE 2.0 we expect to have a knowledge engineer with<br />

expertise in DeLP, who will be in charge (along with egovernment<br />

officials) of characterizing a knowledge base of strict<br />

and defeasible rules for assessing valuable aspects for policymaking<br />

oriented decisions. Through suitable visualization tools,<br />

the DeLP machinery will provide an automated dialectical<br />

analysis of arguments and counterarguments when facing a<br />

problematic situation (associated with a particular topic or context<br />

for decision making), helping government officials to make better<br />

and more informed decisions. It must be remarked that DeLPbased<br />

recommender systems have been already successfully<br />

formalized [15]. A particular deployment of DeLP for integrating<br />

sentiment analysis and recommendations has also been applied<br />

previously in a commercial software product for travelling<br />

recommendations [16]<br />

4. BRIEF ROADMAP: CONCLUSIONS<br />

Research on the proposed framework will lead directly to<br />

improved coverage, scalability and context-awareness with<br />

respect to the current model of information delivery and retrieval<br />

in social networks. Governments can greatly benefit from the<br />

proposed solution in twofold - by having adequate mining<br />

techniques to retrieve valuable information provided by citizens<br />

on social media, and by targeting different announcements to the<br />

appropriate group of government stakeholders.<br />

In order to materialize the proposed solution, some important<br />

technical problems are to be solved, and constitute research<br />

questions of this work. Major challenges that we intend to address<br />

defining a roadmap for our future work include: 1) developing<br />

algorithms for integrating information - several users may post<br />

messages related to the same topic; hence accrual of information<br />

needs to be modeled properly; 2) implementing efficient models<br />

of trust and reputation propagation - users post information on<br />

social media whose reliability has to be assessed in order to<br />

169<br />

effectively use such information for decision making; and 3)<br />

developing customized information models providing targeted<br />

information to various categories of stakeholders requires having<br />

different “views” of the issues under analysis.<br />

5. ACKNOWLEDGMENTS<br />

The research is funded by LACCIR (Latinamerican and Caribbean<br />

Collaborative ICT Research), Microsoft Research, CONACyT<br />

(Mexico) and Interamerican Development Bank (IDB) and PIP<br />

CONICET Projects 112-200801-02798 and 112-200901-00863.<br />

6. REFERENCES<br />

[1] O’Reilly, T. Government as a Platform. Innovations, vol 6,<br />

no.1, pp 13-40, 2010.<br />

[2] DiMaio, A., Government 2.0: A Gartner Definition, 2009.<br />

http://blogs.gartner.com/andrea_dimaio/2009/11/13/governm<br />

ent-2-0-a-gartner-definition/, last retrieved 28 February 2012.<br />

[3] Bonson, E., Torres, L., Royo, S., and Flores, F., Local e-<br />

Government 2.0: Social Media and Corporate Transparency<br />

in Municipalities, Government Information Quarterly, vol.<br />

29, pp 123-132, 2012.<br />

[4] Government of Singapore, Government Social Media<br />

Directory, available at: http://www.socialmedia.gov.sg/Web/<br />

Home/Default.aspx, last retrieved 15 April 2012.<br />

[5] Bertot, J.C, Jaeger, P.T, and Hansen, D., The Impact of<br />

Polices on Government Social Media Usage: Issues,<br />

Challenges, and Recommendations, Government Information<br />

Quarterly, vol. 29, pp 30-40, 2012.<br />

[6] Lorenzetti, C., Maguitman, A. A Semi-supervised<br />

Incremental Algorithm to Automatically Formulate Topical<br />

Queries. Information Science. Elsevier. 179 (12), 2009.<br />

[7] Simari, G., Rahwan, I. (eds), Argumentation in Artificial<br />

Intelligence, Springer Verlag, 2009.<br />

[8] Estévez, E., Chesñevar, C., Maguitman, A., Brena, R.<br />

DECIDE 2.0 – A Framework for Intelligent Processing of<br />

Citizens’ Opinion in Social Media. In Proc. dg.o 2012,<br />

Maryland, USA, pp.266-267, ACM Press, 2012.<br />

[9] Guo, L., Lease, M. Personalizing Local Search with Twitter.<br />

SIGIR 2011 Workshop on Enriching Information Retrieval<br />

(ENIR 2011).July 24–28, 2011, Beijing, China. Available at:<br />

http://select.cs.cmu.edu/meetings/enir2011/papers/guolease.pdf.<br />

[10] Maguitman, A., Leake, D., Reichherzer, T., Suggesting novel<br />

but related topics: towards context-based support for<br />

knowledge model extension, Proc. of the 10th IUI Conf., San<br />

Diego, California, USA, January 2005.<br />

[11] Twitter Sentiment Corpus, available at: http://www.<br />

sananalytics.com/lab/twitter-sentiment/, retrieved April 2012.<br />

[12] Bing Liu. "Sentiment Analysis: A Multifaceted<br />

Problem." IEEE Intelligent Systems, 25(3), pp. 76-80, 2010.<br />

[13] Maguitman, A., Leake, D., Reichherzer, T., Menczer,<br />

F. Dynamic Extraction of Topic Descriptors and<br />

Discriminators: Towards Automatic Context-Based Topic<br />

Search. Proceedings of the 13 th CIKM Conf.. ACM Press.<br />

Washington, DC, USA, November 2004<br />

[14] García, A., Simari, G. Defeasible Logic Programming: An<br />

Argumentative Approach. Theory and Practice of Logic<br />

Programming 4(1-2): 95-138, 2004.<br />

[15] Chesñevar, C., Maguitman, A, Simari, G. Recommender<br />

Systems based on Argumentation, in "Emerging Artificial<br />

Intelligence Applications in Computer Engineering".<br />

Maglogiannis et al (eds). Frontiers in Artificial Intelligence<br />

and Applications, Vol. 160, pp. 53-70.. IOS Press, 2007.


[16] Galitsky, B., McKenna, E. Sentiment Extraction from<br />

Consumer Reviews for Providing Product Recommendations.<br />

US Patent Application US 2009/0282019 A1<br />

170


Preparing for Digital Curation Governance: Educating<br />

Stewards of Public Information<br />

ABSTRACT<br />

We report results of research into curriculum development for<br />

dual degree programs and the development of a dual degree<br />

curriculum jointly undertaken by the University of North<br />

Carolina’s School of Information and Library Science (SILS) and<br />

School of Government (SOG). This IMLS-funded program<br />

provides training in public information stewardship to four<br />

cohorts of eighteen masters’ level students. The curriculum<br />

development rests upon previous curriculum development<br />

projects, examination of masters’ programs throughout the world,<br />

semi-structured interviews of public sector information experts,<br />

recommendations from an expert Advisory Board, and focus<br />

group responses from current and alumni project Fellows.<br />

Categories and Subject Descriptors<br />

J.1 [Computer Applications]: Administrative Data Processing –<br />

Government<br />

General Terms<br />

Professional Development, Digital Curation, Electronic<br />

Governance<br />

Keywords<br />

Continuing Education, Digital Information, Public Sector,<br />

Government<br />

1. INTRODUCTION<br />

Curation of digital assets from all sectors of society provides<br />

fundamentally new challenges and opportunities. Nowhere is the<br />

need for stewardship of digital content greater than with<br />

government information. Government activities and services are<br />

now predominately performed using computer systems, and many<br />

interactions with government are now performed over the<br />

Internet. According to a recent study, 82% of internet users (61%<br />

of all American adults) “looked for information or completed a<br />

transaction on a government website” in the past year [7]. There<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Christopher A. Lee and Helen R. Tibbo<br />

School of Information and Library Science<br />

University of North Carolina<br />

216 Lenoir Drive, CB #3360<br />

1-(919)-962-7024<br />

callee, tibbo@email.unc.edu<br />

171<br />

has been a dramatic push in many countries toward open access to<br />

government data, which will only be successful if appropriate data<br />

are retained and long-standing issues of data fragmentation can be<br />

addressed [6].<br />

The public administration literature uses the term “governance”<br />

for the exercise of authority and control, in order to advance goals<br />

of the state. In contrast to “government,” which suggests<br />

established structures, governance is a continually evolving and<br />

interactive set of processes. The governance concept has spawned<br />

many associated terms within both the public and private sectors,<br />

including corporate governance, information technology<br />

governance, and data governance. Effective governance requires<br />

an understanding of stakeholder needs, existing policies, social<br />

norms, individual behaviors, incentive structures and<br />

characteristics of potential implementation mechanisms.<br />

“Digital curation governance” is an increasingly important arena<br />

of activity with associated requirements for professional education<br />

and engagement: ensuring the quality, integrity, discovery, access,<br />

and meaningful use of digital collections over time. Digital<br />

curation governance is a shared responsibility that requires<br />

extensive communication, collaboration and mutual learning.<br />

Those advancing the cause of digital curation governance must<br />

have skills and competencies to navigate the policy arena, manage<br />

projects, mobilize stakeholders and dig into the bits of digital<br />

collections.<br />

Many schools of information and library science have established<br />

curricula to prepare professionals to establish and administer new<br />

arrangements between information, technology and people. As<br />

these professionals move into higher levels of responsibility and<br />

authority, they engage not only in management but also in<br />

governance, which includes “specifying the decision rights and<br />

accountability framework to encourage desirable behavior in the<br />

use” of information and technology [14].<br />

A common theme in the literatures on governance and digital<br />

curation has been the shared and distributed nature of the<br />

activities. Governance can be driven and shaped by many nongovernment<br />

actors, facilitated by changes in the geopolitical<br />

landscape [10] and information technologies [9]. Successful longterm<br />

stewardship of public information depends upon<br />

contributions and actions of individuals from various sectors.<br />

This will require “effective governance mechanisms…to<br />

aggregate the collective interest into an effective preservation<br />

strategy that ensures that the effort and cost of preservation are<br />

appropriately apportioned” [3]. Innovative and timely professional<br />

education will need to support new forms and features of<br />

governance.


2. NEW NEEDS AND EXPECTATIONS<br />

Navigating the current environment increasingly requires the<br />

development and implementation of clear policies for data<br />

curation. The National Association of State Chief Information<br />

Officers (NASCIO) includes among its top state CIO priorities for<br />

2011: document/content/records/e-mail management; data and<br />

information management; data ownership in cloud computing;<br />

and data governance [11]. Supporting, documenting and<br />

evaluating government activities requires responsible stewardship<br />

of public digital information, which will involves coordinated<br />

efforts by a diversity of players. Professional education for<br />

stewards of public information is most effective if it can<br />

incorporate fundamental elements of both library and information<br />

science (LIS) and public administration curricula.<br />

Many records services and archives have developed and<br />

advocated standards, policies and guidelines for public officials.<br />

The most common examples are email policies, metadata<br />

standards and recordkeeping system functional requirements.<br />

While these documents are valuable, they have often not been<br />

implemented widely and rarely carry enforcement mechanisms.<br />

Records professionals often have not integrated the documents<br />

into the larger arenas of policy and public administration in which<br />

they operate.<br />

Based on early experiences with electronic records, two<br />

prominent themes in the literature are that records professionals<br />

must collaborate with and draw expertise from other professionals<br />

[8][12], and records professions must influence practices within<br />

the public sector, rather than focusing solely on the management<br />

of records already transferred to archival repositories [2].<br />

As public digital information was becoming ubiquitous, there was<br />

significant parallel growth in “strength and individualization in<br />

graduate level archival education programs, a dramatic increase in<br />

full-time, tenure-track faculty, a growing number of course<br />

offerings often eclipsing the LIS offerings in an archival student’s<br />

course of study, and the nascent development of degrees<br />

acknowledging the archives and records field” [5]. Within the<br />

United States, “new archivists and career changers (from another<br />

career into archives) increasingly view the master’s degree as a<br />

necessary requirement” with a master of library and information<br />

science (MLIS) or an equivalent being “the degree of choice” [1].<br />

Unfortunately, these developments have not yet translated into<br />

widespread education on electronic records [1], nor have most<br />

records professionals had any formal education in issues of policy<br />

development, implementation or analysis. We believe it is<br />

important to develop clear tracks of graduate study that (1) attract<br />

students who already have an interest in government service, (2)<br />

bring government service opportunities to the attention of those<br />

already pursuing ARM careers, and (3) be built in programs that<br />

have a robust technology infrastructure.<br />

3. EDUCATING STEWARDS OF PUBLIC<br />

INFORMATION<br />

In 2009, the School of Information and Library Science (SILS)<br />

and School of Government (SOG) at the University of North<br />

Carolina, Chapel Hill (UNC-CH) began a project called Educating<br />

Stewards of Public Information in the Twenty-First Century<br />

(ESOPI-21), funded by the Institute of Museum and Library<br />

Services (IMLS). The project has redesigned and enhanced a dual<br />

degree program that was earlier developed by SILS and the SOG.<br />

172<br />

Students in the program earn dual MSIS/MPA or MSLS/MPA<br />

degrees, in order to prepare for careers in stewardship of digital<br />

information in the public sector. In 2011, IMLS funded a second<br />

project called Educating Stewards of the Public Information<br />

Infrastructure (ESOPI 2 ).<br />

The ESOPI projects have developed educational and professional<br />

engagement opportunities. They fund two cohorts of eighteen<br />

graduate-level Fellows, who are pursuing dual degrees at SILS<br />

and SOG. The projects build on the work of two other IMLSfunded<br />

projects: the DigCCurr I & II (Digital Curation<br />

Curriculum) projects.<br />

4. DUAL-DEGREE CURRICULUM<br />

The MSIS/MSLS and MPA dual degree program at UNC-CH is<br />

offered jointly by SILS and the SOG. It integrates policy<br />

development, issues of legal compliance, and knowledge of<br />

government structures and information with principles, values,<br />

methods and technologies of the information professions.<br />

4.1 Master of Information/Library Science<br />

The School of Information and Library Science (SILS) at UNC-<br />

CH offers two masters degrees: Master of Science in Information<br />

Science (MSIS) and Master of Science in Library Science<br />

(MSLS). Each degree requires 48 semester hours, which students<br />

usually complete in four semesters (two academic years) of fulltime<br />

study. This includes 24 semester hours of required core<br />

courses and 24 semester hours of elective courses. Students must<br />

also complete a comprehensive exam and a master’s paper.<br />

The MSLS and MSIS core courses address five functional areas:<br />

organization, collection and retrieval, information-related<br />

behavior, design and evaluation, and management. The majority<br />

of the required courses are the same for both degrees. The<br />

differences are: MSLS students complete courses on Information<br />

Resources and Services (INLS 501) and Resource Selection and<br />

Evaluation (INLS 513), while MSIS students complete a course<br />

on Information Retrieval (INLS 509); and MSIS students take a<br />

class on Systems Analysis (INLS 582), which is not required for<br />

MSLS students.<br />

4.2 Master of Public Administration<br />

The Master of Public Administration degree at the SOG is also<br />

designed to be completed in two years of full-time study.<br />

Students must complete at least 44 semester hours of course work.<br />

Core courses address: Public Administration Institutions and<br />

Values, Organization Theory, Public Service Leadership, Public<br />

Administration Analysis and Evaluation, Professional<br />

Communications, Human Resource Management, Public<br />

Financial Management, and Law for Public Administration.<br />

MPA students must also complete of a summer-long management<br />

internship in a position with meaningful administrative<br />

responsibilities, and a portfolio during the final semester of study.<br />

One component of the portfolio is a comprehensive oral exam.<br />

4.3 MPA and MSIS/MSLS Dual Degree<br />

The UNC-CH MPA/MSIS and MPA/MSLS dual degree program<br />

is designed to prepare students to deal with information issues in a<br />

variety of public sector settings. This dual degree opportunity is<br />

designed as a three-year, full-time program, requiring at least 71


semester hours. Nine of the forty-four (44) semester hours<br />

required for the MPA may be counted from the SILS curriculum,<br />

and twelve of the forty-eight (48) semester hours required for the<br />

SILS degree may be counted from the MPA curriculum.<br />

5. PRACTICAL ENGAGEMENT<br />

COMPONENT<br />

Project Fellows engage in coursework and simultaneously work<br />

for 15 hours per week (or 360 hours over the summer) at one of<br />

the projects’ participating partner institutions: the National<br />

Archives and Records Administration, University Archives at<br />

UNC-CH, North Carolina Department of Cultural Resources,<br />

Town of Chapel Hill, NC Orange County’s CIO’s Office, NC-<br />

LIVE, the H. W. Odum Institute of Research in Social Science,<br />

and UNC-CH Environmental Finance Center. The ESOPI projects<br />

have provided fellowships to eighteen students 2009-2014.<br />

Tasks performed by the fellows have included the creation of<br />

various policies and policy-related guidance documents (on social<br />

media, email, and text messaging), authoring an article on<br />

eDiscovery software capabilities, revising and developing new<br />

online training modules, and advising government energy<br />

efficiency and water quality programs on possible financing<br />

options and institutional arrangements.<br />

6. RESEARCH METHODS<br />

ESOPI research has included investigation of functions and<br />

activities reflected in current research literature; professional<br />

association guidance on key curricular needs; and current<br />

offerings of graduate programs in public policy, information<br />

science, and archives and records management.<br />

The project has engaged in various research approaches, including<br />

a comprehensive literature and website review of information and<br />

library science and public administration masters-level programs,<br />

a series of interviews with Advisory Board Members, a series of<br />

interviews with public sector information experts, and a focus<br />

group study of current and alumni Fellows from the project.<br />

In 2010, we conducted two sets of semi-structured phone<br />

interviews with experts in public administration and public<br />

information management. The first eight interviews were with<br />

members of the ESOPI advisory board. These were followed by<br />

interviews with ten public-sector professionals who had presented<br />

their work at the 2010 Best Practices Exchange.<br />

In 2011, we conducted a focus group with four ESOPI fellows in<br />

their final semester of the dual degree program. The discussion<br />

revealed many program strengths, challenges and opportunities<br />

for improvement.<br />

7. FINDINGS<br />

Findings can be characterized in terms of factors related to<br />

“stewardship of public information,” desired knowledge and<br />

competencies, current professional challenges, and SILS/SOG<br />

dual degree integration.<br />

7.1 Interviews<br />

When asked to explain what is meant by “stewardship of public<br />

information,” participants in our studies have provided a variety<br />

of answers, often emphasizing characteristics of stewardship that<br />

173<br />

are particularly relevant to their own jobs or disciplines.<br />

However, there were four main themes that emerged from the<br />

interview data about this issue. First, many interview participants<br />

discussed the importance of being able to understand and apply<br />

the definition of public record, whatever that might be within<br />

one’s particular jurisdiction. A second theme was balancing<br />

privacy or confidentiality on the one hand with public access on<br />

the other. A third theme was that of needing to understand the<br />

value of public information (what makes certain forms of<br />

information valuable and how to convey that importance to<br />

relevant stakeholders). Finally, interview responses suggested the<br />

need to differentiate the role of custodian as opposed to owner<br />

which may overlap but often reside in different individuals or<br />

organizations).<br />

Many of the interview questions related to desired knowledge and<br />

competencies. Participants identified many different responses,<br />

which we have grouped into three broad categories: contextual<br />

background knowledge; technical and operational skills; and<br />

social skills and approach to work (see Table 1).<br />

Table 1 - Desired Knowledge and Competencies<br />

• Contextual background knowledge - how government works,<br />

legal frameworks, accountability mechanisms, third party<br />

agreements and contracts, comprises in information<br />

lifecycle, balance between privacy and accessibility,<br />

planning and evaluation processes, project management and<br />

requirements definition and design, recordkeeping<br />

requirements, patterns of information use, environmental and<br />

budgetary drivers of workplace evolution<br />

• Technical and operational skills - integrating technological<br />

knowledge with understanding of government functions and<br />

processes; allocating storage and space; identifying and<br />

recommending access methods, preservation techniques and<br />

system designs; data quality and data management, metadata<br />

and access provision via interface design; identifying and<br />

explaining which information does or does not have longterm<br />

value; data and workflow modeling<br />

• Social skills and approach to work - verbal and written<br />

communication skills; teamwork skills; “thinking on one’s<br />

feet”; appreciating importance of speaking carefully and<br />

thoughtfully in the public sector; commitment to open<br />

government and public accountability; focus on creating<br />

efficiency and economy in processes; thinking at the<br />

enterprise level to act as change agents; capabilities to gain<br />

sponsorship, build coalitions, and get support by engaging in<br />

stakeholder identification and team building; ability to<br />

“manage people when you are not their boss”; curiosity and<br />

willingness to engage in ongoing education<br />

We also asked interview participants about current professional<br />

challenges. Responses fell into the following categories: limited<br />

funding for infrastructure (including storage); insufficient IT skills<br />

of responsible staff; outreach to stakeholders and making business<br />

case for investment in information stewardship; characteristics of<br />

data creation (large volume, highly distributed, often unstructured,<br />

inconsistent metadata conventions and quality); underdeveloped<br />

user interfaces and access mechanisms; and defining new job<br />

roles and categories.<br />

Members of the ESOPI Advisory Board have also provided<br />

substantial input on how to approach the dual degree, what


practical work experience contexts to pursue, and how to set the<br />

future direction of the dual degree.<br />

7.2 Focus Group and Dual Degree Findings<br />

Our research has revealed numerous benefits and<br />

complementarities of completing both degrees. Interview<br />

participants and graduating ESOPI fellows have identified a<br />

variety of advantages, including complementary knowledge, skills<br />

and perspectives, as well as a wider range of employment<br />

opportunities.<br />

We have also learned about cultural differences between the SOG<br />

and SILS. The SOG has a more regimented curriculum and<br />

smaller number of students, resulting in a more tight-knit cohort<br />

of students. The SOG also places heavy emphasis on preparing<br />

students to behave as public officials, with associated expectations<br />

for personal presentation and interaction. By contrast, SILS has a<br />

more individually-crafted curriculum and a larger set of students,<br />

resulting in less of a cohesive cohort. SILS courses often place<br />

great emphasis on scholarly knowledge and recent research<br />

literature.<br />

Feedback from ESOPI Fellows has revealed that the majority of<br />

content from the MSIS/MSLS and SOG degrees is<br />

complementary, rather than being repetitive. The dual degree has<br />

been designed to allow students to replace similar courses from<br />

one program to the other, e.g. the SOG course on Public Service<br />

Leadership (PUBA 711) can substitute for the SILS course on<br />

Management for Information Professionals (INLS 585). Courses<br />

in the two programs related to research methods, analysis and<br />

evaluation do have similarity in scope, but they address the topics<br />

quite differently given the nature of the two programs. SILS is<br />

considering changes to its research methods course sequence, and<br />

we may need to revisit this area of the dual degree.<br />

8. CONCLUSIONS AND IMPLICATIONS<br />

Stewardship of public information is a fundamental responsibility<br />

of a democratic society. Providing appropriate access to public<br />

information promotes accountability, rights of citizens, effective<br />

administration of policy, and social memory. Public officials and<br />

public servants must increasingly make and enact decisions<br />

related to information systems; this requires an understanding of<br />

ways in which people, information and technology can best<br />

complement each other. Information professionals are also<br />

increasingly required to engage in policy discussions and<br />

processes; this requires an understanding of the history, principles,<br />

processes and methods of public administration.<br />

Fundamental to ensuring successful e-governance is appropriate<br />

stewardship of the information that supports, documents and<br />

advances governance processes. This work includes its own flavor<br />

of governance, which we have called digital curation governance.<br />

Enabling it will require professionals with a range of skills and<br />

capabilities that may not have previously been considered part of<br />

public administration or the work of information professionals.<br />

We see great potential for advancing professional capabilities<br />

required at the frontier of public information stewardship.<br />

9. ACKNOWLEDGMENTS<br />

Research associated with this work has been supported by the<br />

Institute for Museum and Library Services (Grant Awards # RE-<br />

05-09-0085-09 and # RE-05-11-0076). We would like to<br />

174<br />

acknowledge numerous contributions of Lori Richards to the two<br />

ESOPI projects and to various products reported in this paper.<br />

10. REFERENCES<br />

[1] Bastian, J. and Yakel, E. 'Are We There Yet?'<br />

Professionalism and the Development of an Archival Core<br />

Curriculum in the United States. Journal of Education for<br />

Library and Information Science, 46, 2 (2005), 95-114.<br />

[2] Bearman, D. and Hedstrom, M. Reinventing Archives for<br />

Electronic Records: Alternative Service Delivery Options. In<br />

Electronic Records Management Program Strategies.<br />

Archives and Museum Informatics, Pittsburgh, PA, 1993, 82-<br />

98.<br />

[3] Blue Ribbon Task Force on Sustainable Digital Preservation<br />

and Access. Sustainable Economics for a Digital Planet:<br />

Ensuring Long-Term Access to Digital Information. 2010.<br />

[4] Conference of Directors of National Libraries. Resolution on<br />

the Preservation of the Digital Heritage - Adopted by the<br />

General Conference of UNESCO at the 31st session. United<br />

Nations Educational, Scientific and Cultural Organization,<br />

Paris, 2001).<br />

[5] Cox, R. J., Yakel, E., Bastian, J. A., Wallace, D. and<br />

Marshall, J. Archival Education at the Millennium: The<br />

Status of Archival Education in North American Library and<br />

Information Science Schools. Library Quarterly, 71, 2<br />

(2001), 141-194.<br />

[6] Doyle, C. D. Federal Electronic Information in the United<br />

States. In Encyclopedia of Library and Information Sciences.<br />

CRC Press, Boca Raton, FL, 2010, 1823-1833.<br />

[7] Government Online. Pew Research Center, Washington, DC,<br />

2010.<br />

[8] Hedstrom, M. Building Record-Keeping Systems: Archivists<br />

are Not Alone on the Wild Frontier. Archivaria, 44 (Fall<br />

1997), 44-71.<br />

[9] Marche, S. and McNiven, J.D. E-Government and E-<br />

Governance: The Future Isn’t What It Used To Be. Canadian<br />

Journal of Administrative Sciences, 20, 1 (March 2003), 74-<br />

86.<br />

[10] Rosenau, J.N. and Czenpiel, ed. Governance without<br />

Government: Order and Change in World Politics.<br />

Cambridge University Press, Cambridge, 1992.<br />

[11] State CIO Priorities for 2011. National Association of State<br />

Chief Information Officers, October 19, 2010.<br />

[12] Walch, V.I. Maintaining State Records in an Era of Change:<br />

A National Challenge. Council of State Historical Records<br />

Coordinators, 1996.<br />

[13] Wallace, D. A. Survey of Archives and Records Management<br />

Graduate Students at Ten Universities in the United States<br />

and Canada. American Archivist, 63, 2 (Fall 2000), 284-300.<br />

[14] Weill, P. and Ross, J.W. IT Governance: How Top<br />

Performers Manage IT Decision Rights for Superior Results.<br />

Harvard Business School Press, Boston, MA, 2004.


REGNET: Regulatory Information Management,<br />

Compliance and Analysis<br />

ABSTRACT<br />

This paper describes a research effort that aims to develop<br />

information infrastructure and tools to facilitate access,<br />

compliance and analysis of government regulations. It is well<br />

recognized that the complexity, diversity, and volume of<br />

government regulations are detrimental to business and hinder<br />

public understanding of government. The burden of complying<br />

with regulations can fall disproportionately on small businesses<br />

since these businesses may not have the expertise or resources to<br />

keep track of the regulations and the requirements. The situation<br />

can potentially be improved by developing appropriate tools that<br />

can help facilitate the regulatory and compliance process. To<br />

illustrate, this paper discusses the applications of information<br />

technology for selected services related to regulations, such as<br />

compliance assistance, comparison of regulation from diverse<br />

sources, and e-rulemaking.<br />

Categories and Subject Descriptors<br />

H.3.3 [Information Storage and Retrieval]: Information Search<br />

and Retrieval – retrieval models, I.2.1 [Artificial Intelligence]:<br />

Applications and Expert Systems – law.<br />

General Terms<br />

Algorithms, Management, Legal Aspects.<br />

Keywords<br />

regulations; compliance assistance; relatedness analysis; erulemaking;<br />

information retrieval; e-government.<br />

1. INTRODUCTION<br />

This paper provides an overview of the REGNET research project<br />

at Stanford University, which aims to gain insights on information<br />

infrastructure and tools that can facilitate access, compliance,<br />

analysis and use of government regulations. Regulations, in<br />

general, provide many social benefits, such as protecting our<br />

environment and improving public safety and accessibility.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Kincho H. Law and Gloria Lau<br />

Engineering Informatics Group<br />

Department of Civil and Environmental Engineering<br />

Stanford University<br />

Stanford, CA, 95014, USA<br />

law@stanford.edu; glau@stanford.edu<br />

175<br />

However, the complexity, diversity, and volume of Federal and<br />

State regulations are detrimental to business and also hinder<br />

public understanding of government. As new issues arise, new<br />

regulations are promulgated; old regulations, however, are rarely<br />

removed. Regulations emanating from different agencies often<br />

overlap; because settings and objectives differ, they may be<br />

inconsistent. The scope of concern and the terminology used to<br />

express those concerns often differs among agencies. The<br />

distributed responsibilities also increase the complexity in dealing<br />

with regulations. Advances in information technology can<br />

potentially improve the situation by developing appropriate tools<br />

that can help facilitate the regulatory process, from rulemaking to<br />

compliance assistance.<br />

“Deciphering and complying with federal regulations is a legal<br />

and paperwork nightmare for many businesses. To keep pace,<br />

some hire consultants--sort of regulatory accountants--to keep<br />

track of the applicable health, safety, environmental and equalopportunity<br />

rules [1].” Regulations can be particularly<br />

burdensome on small businesses since they often do not have the<br />

resources to keep track of and to deal with these complicated<br />

regulations and the compliance procedures. This burden has been<br />

recognized and targeted by legislation through the Regulatory<br />

Flexibility Act (RFA), which was amended by Small Business<br />

Regulatory Enforcement Fairness Act (SBREFA). Agencies<br />

have a commitment to take into account the burden that<br />

regulations can place on small businesses. SBREFA requires that<br />

agencies to establish procedures, policies and guides to promote<br />

compliance with RFA. Agencies published, in accordance to<br />

SBREFA, Small Entity Compliance Guides that are written in<br />

plain language and elucidate the rights of small entities in<br />

enforcement actions (e.g. reducing civil penalties for violations).<br />

Furthermore, agencies, such as EPA, must provide Congress and<br />

the General Accounting Office with copies of all final rules and<br />

supporting analyses [2]. The act clearly recognizes the<br />

information problem facing business, particularly small<br />

businesses, in compliance with regulations. The Small Business<br />

Administration (SBA) (with participation from various federal<br />

agencies, including EPA, FDA, OSHA, etc.) launched an<br />

initiative to build a “one-stop” portal to assist small businesses to<br />

comply with regulations [3]. In recent years, governmental<br />

portals (such as the FirstGov.gov and USA.gov) have emerged to<br />

provide public to gain access to US government information and<br />

services on the web. Government regulations are available online<br />

(for examples, see www.gpoaccess.gov/cfr/ and<br />

www.regulations.gov). Most of the online portals are designed<br />

primarily for displaying the regulatory information and often<br />

usable only by experienced users, who are familiar with the


subject and the portal. Some primitive searching capabilities may<br />

be provided; however, it remains difficult to locate crossreferenced<br />

information and to link the regulatory information with<br />

useful applications. Utilization of advanced information<br />

technologies and development of new and innovative high quality<br />

tools are crucial to move the regulatory information available and<br />

useful to the public.<br />

This paper describes a research effort investigating useful<br />

information services related to regulatory information. The paper<br />

is organized as follows: First, a brief literature review on<br />

applications of IT in laws and regulations is provided in the next<br />

section. Example applications are then presented to illustrate<br />

some of the research issues investigated in the REGNET project.<br />

The paper is concluded with a brief summary and discussion on<br />

current research.<br />

2. LITERATURE REVIEW<br />

Research on information science and technology applicable to<br />

regulations and laws has been active research area for decades.<br />

There has been a great deal of work done on building expert<br />

systems for law [4,5]. T. Bench-Capon provided a review on the<br />

applications of knowledge-based systems for legal applications,<br />

particularly the research and development efforts related to the<br />

Alvey DHSS Demonstrator project in U.K. [6]. The reference<br />

includes several hundreds of citations that appeared before 1990<br />

which are related to logic and rule based approaches and their<br />

application in legal systems. Erdelez and O’Hare also provided<br />

an overview of the research and status of legal informatics in the<br />

1990s [7]. Applications of case-based reasoning and information<br />

retrieval techniques have been proposed [5,8]. Current state on<br />

information technology and laws can also be found in a recent<br />

book edited by Lodder and Oskamp [9]. While legal knowledge<br />

representation and reasoning has been an active research topic, an<br />

integrated approach covering the management of regulations,<br />

efficient access and retrieval of regulatory and related documents<br />

and tools for compliance assistance is missing.<br />

Policies and public interests concerning how IT can be<br />

appropriately and effectively applied to regulation management,<br />

rulemaking and compliance assistance have been actively<br />

discussed in workshops and public forums [10-12]. It has been<br />

recognized that information technologies, including information<br />

retrieval, text mining, knowledge representation, logic reasoning,<br />

natural language processing and many other areas, can find<br />

applications in legal informatics and further enhance the<br />

development of regulatory information systems. Issues such as<br />

what types of support are needed to go from the textual<br />

information of the regulations to the formal models that can<br />

support computations, to integrate and link diverse source of<br />

related documents to regulations, and to provide means to analyze<br />

and compare regulatory data, are fundamentally important to an<br />

effective regulatory information system. Practical applications<br />

require that the computer be able to interpret the situation or<br />

circumstances, scenarios and exceptional cases. Solutions that do<br />

emerge must support the treatment of multiple, heterogeneous<br />

regulations and related documents from diverse sources. Modeling<br />

regulations requires not only the understanding of individual<br />

content within a regulation provision, but also the relationships<br />

among and within provisions as well as mechanisms for linking<br />

applications, supplemental documents and related information<br />

with the regulations. Research in this field must proceed in two<br />

176<br />

parallel tracks: (1) representing the regulations so that they can be<br />

accessed according to the needs of the users and the regulatory<br />

agencies, and (2) structuring the regulations so that they can be<br />

assessed automatically to support applications, such as<br />

compliance assistance, business processes and others. The<br />

research of REGNET investigates information service<br />

infrastructure that takes textual repositories as a base and develop<br />

methodologies and tools to locate, merge, compare, and analyze<br />

the information. This paper describes selected examples to<br />

illustrate some of the research issues investigated in the REGNET<br />

project.<br />

3. A REGULATION-CENTRIC<br />

COMPLIANCE ASSISTANCE<br />

FRAMEWORK<br />

There has been a push for government agencies to put more<br />

emphasis on compliance assistance in lieu of enforcement to<br />

encourage companies to comply with regulations [13]. Towards<br />

this end, specialized programs, using expert system technologies<br />

for example, have been built to assist users in understanding<br />

regulations and fulfilling the requirements [14]. Among the<br />

limitations of many compliance assistance systems is that the<br />

tools do not directly map or link to the source documents that they<br />

represent. Our research adopts a regulation-centric approach to<br />

structuring a compliance assistance system around the regulation<br />

itself [15,16]. The rules together with the metadata about the<br />

regulations are directly embedded within the provisions they<br />

represent. This framework allows clear linkages to the regulation<br />

text. Because all encoded regulation rules are tied to particular<br />

regulation provisions, it is straightforward to map the compliance<br />

process to the provisions. The following briefly describes the<br />

structure of the document repository for the regulations and the<br />

regulation assistance system.<br />

3.1 A. Document Repository<br />

The scope of our research and the document repository<br />

demonstrative development cover Title 40 of the US Code of<br />

Federal Regulations (40 CFR): Protection of the Environment<br />

[17]. Besides the regulations themselves, the repository also<br />

includes supplementary and supportive documents that are<br />

important for the accurate interpretation of the federal<br />

regulation(s) to which they refer [18]. 1 For the research<br />

prototype, supplemental documents dealing with used oil, which<br />

include the preamble to the regulation text found in 40 CFR 261<br />

and 279, administrative decisions, guidance documents, federal<br />

cases, letters from the general counsel and letters of interpretation<br />

from the issuing agency. The document repository is designed not<br />

1 Supplementary and supportive documents are important part of<br />

regulatory information and are commonly considered in<br />

judiciary decisions. To illustrate, for the case “Beazer East, Inc.<br />

v. U.S. EPA, Region III” (963 F.2d 603, 3 rd Cir. 1992), Beazer<br />

East, Inc., argued that the aeration basins were “tanks”, not<br />

“surface impoundments”, and were therefore not subject to<br />

RCRA’s groundwater-monitoring regulations. The court ruled<br />

in favor of EPA by considering the so called “Weddle<br />

memorandum”, which was issued to clarify the definitions of a<br />

“tank” and a “surface impoundment,” as an interpretive rule,<br />

which can be exempted from the notice and comment<br />

requirements of the Administrative Procedures Act.


Search Terms/ Concepts<br />

References<br />

Definitions<br />

only to facilitate displaying the provisions but also to support<br />

compliance assistance by making these important documents<br />

more accessible.<br />

A document-centric repository is designed to structure and to<br />

organize the regulation texts and metadata. Mirroring the<br />

standard structure of regulations, the XML-based framework<br />

includes tags for each level of regulation text – for example part,<br />

subpart, section or subsection. A parsing system using basic<br />

pattern matching according to the regulation structures is built to<br />

transform the regulations from Portable Document Format (PDF)<br />

or HTML into the XML-based document framework. In addition<br />

to the regulation texts, the XML-based structure is augmented<br />

with regulation-specific metadata, including concept tags,<br />

reference tags and definition tags (see Figure 1).<br />

o With existing text mining and information retrieval tools,<br />

concepts can be generated automatically or semiautomatically<br />

from the regulation texts. The concept tags<br />

are introduced so that links to related supporting documents<br />

in the document repository can be dynamically generated.<br />

This is useful because supporting documents and regulations<br />

may not directly reference each other even when they<br />

address the same topic. The automatic application of concept<br />

tags to the XML framework means that as new supporting<br />

documents are added to the document repository, regulations<br />

stored in the framework can automatically be linked to them<br />

via the terms that they share.<br />

o Regulation provisions tend to include casual references to<br />

other provisions. Simple references (for example, “as stated<br />

in 40 CFR section 262.14(a)(2)”) and complex references<br />

(for example, “the requirements in subparts G through I of<br />

this part” as in part 265) exist. Manually translating such<br />

references would be time consuming. A parsing system was<br />

developed using a context-free grammar and a semantic<br />

representation/interpretation system that is capable of tagging<br />

regulation provisions with the list of references they contain.<br />

The references serve not only for retrieval of related<br />

provisions, but also provide a list of provisions that may<br />

require consideration during the compliance checking<br />

process.<br />

o Regulation contain many domain-specific terms and<br />

acronyms that can make regulation text difficult for novices<br />

Search by Concept Category<br />

Letter of of Interpretation<br />

(a) Definition, definition and concept tags (b) Retrieving supporting document using concepts<br />

Figure 1: Metadata defined for regulations<br />

177<br />

to understand. Adding the definition tags would allow a<br />

regulation viewing system to incorporate explicit definitions<br />

of terms and acronyms into its user interface (for example,<br />

by mousing over the term). Definitions can be extracted<br />

from the regulations (and other sources) and automatically<br />

attached to the terms identified by a parser.<br />

3.2 Compliance Assistance<br />

Our research of a compliance assistance infrastructure builds upon<br />

the XML regulation framework and takes advantage of the<br />

regulation metadata described earlier. Besides the concept,<br />

reference and definition tags, logic and control processing<br />

metadata are added into the XML regulation framework. The<br />

logic metadata represents a rule or concept from a regulation. First<br />

Order Predicate logic sentences are used to represent the rules that<br />

must be followed for an entity to be in compliance with the<br />

regulations. Control processing metadata provides information<br />

about what provisions need to be checked for compliance.<br />

Metadata are also introduced to manage the interaction between<br />

the user and the system. Each logic or control processing<br />

metadata is associated with a specific regulation provision and is<br />

manually tagged with logic and control process metadata.<br />

The compliance assistance system controls the process by taking<br />

advantage of the metadata information. First, the system parses<br />

the XML-structured regulation to extract the information<br />

necessary to run a compliance check. Only those logic rules and<br />

control processing metadata (based on the information from the<br />

reference tags) are acquired and dynamically loaded into the<br />

reasoning system. Logic reasoning tools, such as a theorem<br />

prover, can then be used to perform the logic checks [19].<br />

One essential feature of the web-based compliance assistance<br />

system is that it helps guide the user through the regulations.<br />

Utilizing the metadata tagged with the regulations, the system can<br />

link to any referenced regulation provisions and display terms and<br />

definitions. Key conceptual phrases for the provision are<br />

displayed and linked, enabling instant access to repository<br />

documents related to the provision. When the system completes<br />

the check against the regulation provisions or detects a conflict<br />

between the user’s answers and the regulation, it displays a<br />

summary of the question-and-answer history as well as the results<br />

of the compliance check.


One can easily build a compliance system for specific application<br />

utilizing the regulation compliance assistance system and the<br />

repository as a back end. To illustrate, Figure 2 shows linking the<br />

provisions from the used oil regulations of the New York state to<br />

the federal regulations implemented in the prototype. The online<br />

guide is built for vehicle maintenance shops to check compliance<br />

with the used oil based on paper-based 2002 guide developed by<br />

the New York State department of Environmental Conservation<br />

Prevention Unit [20]. As noted in Figure 2(b), the provision<br />

references 40 CFR 279.23, which can be used as a link to the<br />

regulation assistance system, as shown in Figure 2(c). Figure<br />

2(d) shows the compliance result which shows the questions,<br />

answers and the related provisions that contributed to the logical<br />

conclusion.<br />

There are many challenges in developing a compliance assistance<br />

system. The regulation-centric approach where the document<br />

repository includes not only the regulation documents but also the<br />

supplemental document as well as rules and computational logic<br />

embedded within the provisions can offer many advantages.<br />

First, because users can see the regulation text as they interact<br />

with the system, users may have better understanding of the<br />

results produced by the system. Second, since users can see the<br />

regulations during compliance process they may be able to learn<br />

how the regulation works, and re-tracing the results easier for<br />

validation purposes. Third, with supplementary documents<br />

linking with the regulation, users can not only track how the<br />

system is proceeding with its analysis, but also enquire<br />

background information on the intents and issues of the<br />

regulations, and directly address the questions that the regulation<br />

is intended. Fourth, updating the system as the regulation changes<br />

would become easier, since with the mapping between the<br />

regulation and the rules in the system, what parts of the system<br />

need to be changed become more obvious when the regulation is<br />

altered. Last but not least, even though regulations are often<br />

ambiguous, contain many exceptions, and are not written in the<br />

(a) Vehicle maintenance shop compliance guide (b) Compliance guide for used oil<br />

(c) Compliance guides linking to RAS (d) Results displaying questions, answers and provision<br />

Figure 2: A regulation assistance system<br />

178<br />

form that is computationally sound, the regulation texts are often<br />

well structured and organized. By implementing the compliance<br />

assistance system according to the regulation structure can greatly<br />

facilitate modular development of a compliance assistance system.


4. COMPARATIVE STUDIES OF<br />

REGULATORY INFORMATION<br />

Government regulations should ideally be understandable and<br />

retrievable with ease by practitioners as well as the general public.<br />

Requirements for a given situation could be different from<br />

different regulations. Multiple sources of regulations, for<br />

instance, from the Federal, State and local governments, amend,<br />

complement and potentially conflict with one another.<br />

Regulations from different agencies on similar and related issues<br />

could differ and inconsistent with their intents. There are many<br />

reference guides that are published independent of governing<br />

bodies, attempting to help the public to better understand and<br />

comply with the regulations. The regulations, amending<br />

provisions and interpretive manuals together create a massive<br />

volume of documents with potentially similar content but possible<br />

differences in format, terminology and context. An information<br />

infrastructure that can consolidate, compare and contrast different<br />

regulatory documents will greatly enhance and aid the<br />

understanding of regulations.<br />

Retrieving and interpreting particular US government regulations<br />

have become easier with the establishment of government portals<br />

to enhance transparency to the public. For example, business.gov<br />

(or sba.gov) is a centralized portal that contains information to<br />

guide business owners and entrepreneurs through government<br />

rules and regulations and to identify resources that can help them<br />

start, grow and succeed in business. Regulations.gov provides a<br />

forum for users to comment on existing and pending federal rules.<br />

Government portals now provide useful information to help<br />

citizens to access regulations and submit feedbacks. However,<br />

what is needed is an information framework that enables<br />

individuals and small businesses with limited resources to retrieve<br />

related regulations from multiple copies of governing regulations<br />

and related regulatory documents and then perform comparative<br />

analysis. The REGNET project seeks to establish such a<br />

framework and have initiated a number of studies focusing on US<br />

national and regional regulations and codes in the domains of<br />

environmental and accessibility standards.<br />

4.1 Relatedness Analysis of Regulatory<br />

Documents<br />

Text document comparison, in particular similarity analysis<br />

between documents, has been an active research area in<br />

Information Retrieval [21,22]. Regulatory documents differ from<br />

generic text documents in that sections are organized<br />

hierarchically and they are heavily cross referenced. As noted<br />

earlier, a wide variety of meaningful concepts can be extracted<br />

and categorized using text mining and information retrieval tools.<br />

However, terminologies used in the regulations for a specific<br />

application, such as hazardous wastes, are better defined than free<br />

form text documents. On the other hand, common sense or<br />

dictionary knowledge may not substitute domain knowledge;<br />

“lift” and “elevator”, for example, are synonymic terms in normal<br />

English usage, but each have specific meanings in accessibility<br />

regulations. In addition to traditional information retrieval<br />

179<br />

techniques, our framework exploits the structural organization of<br />

the regulatory documents, references and their distributions, and<br />

the “bounded” terminology set to further enhance comparative<br />

analysis of regulations [23-25]. To illustrate, we compare<br />

similarities between sections from different regulations. Our<br />

attempt is to identify the most related provisions between different<br />

regulations. The “relatedness” analysis framework takes into<br />

consideration the structure (section hierarchy, referencing) of the<br />

document and the features (concepts, synonyms, etc.) that are<br />

specific to the corpus. In our current approach, a base score for<br />

each pair of provisions is first computed by matching extracted<br />

features (including concept phrases, synonym information,<br />

measurements and units, etc..). The scoring scheme for each of<br />

the features essentially reflects how much resemblance can be<br />

inferred between the pair of sections based on that particular<br />

feature. The score is then refined by taking into account the<br />

hierarchical organization of regulations. Finally, we further refine<br />

the score by considering reference distribution, which takes into<br />

account that regulations are heavily self-referenced and crossreferenced.<br />

Figure 3 shows an example that reveals the similarity (almost<br />

identical texts) discovered between sections from Parts 141-143 of<br />

40 CFR and Division 4 of 22 CCR on regulations related to<br />

drinking water [17,26]. It is not uncommon that one agency<br />

directly adopts provisions issued by another agency. However,<br />

subtle differences exist and can have significant effects to the<br />

public. As an example, Figure 4 shows the barium requirements<br />

for drinking water by both the US EPA and the California DHS<br />

[17,26]. While the two provisions contain identical texts (except<br />

for the agencies), a careful reader might also note that the EPA<br />

and the California DHS do have different barium requirements –<br />

the EPA requires 2 parts per million while the California DHS<br />

sets the requirement at 1 part per million. This example also<br />

illustrates the importance of domain knowledge, where a<br />

measurement comparison would reveal that these two provisions<br />

are not identical, even though the wordings are almost the same.<br />

Another interesting application for comparison analysis is to<br />

locate similar provisions from different states [27].<br />

In developing a regulation information management (RIM)<br />

system that would allow searching, retrieving and comparing<br />

regulations, domain knowledge plays a very important role in<br />

understanding regulations and the relationships between them.<br />

For instance, different regulations use different chemical<br />

acronyms, such as TTHM or HAA (used in 40CFR) and “total<br />

trihalomethanes” or “haloacetic acids” (appeared in 22CCR).<br />

Besides typical text mining and information retrieval<br />

methodologies, we believe a knowledge driven approach,<br />

combining with similar analysis, is a powerful way to develop a<br />

RIM system. In particular, distinct knowledge sources or<br />

regulations do not have to be made completely consistent, only<br />

the terms and the concepts that articulate their application<br />

connections are involved. Ontological information (terms,<br />

features and relationships) commonly used by industry experts<br />

can be important to search and compare regulations for specific<br />

industry sectors and regulatory domains [28,29].


Figure 3: Comparison of similar sections in 40CFR [17] and 22CCR [26] on drinking water regulations<br />

40.cfr.141.32.e.16 Barium<br />

The United States Environmental Protection<br />

Agency (EPA) sets drinking water standards and<br />

has determined that barium is a health concern<br />

at certain levels of exposure. . . .In humans,<br />

EPA believes that effects from barium on blood<br />

pressure should not occur below 2 parts per<br />

million (ppm) in drinking water. EPA has set the<br />

drinking water standard for barium at 2 parts<br />

per million (ppm) to protect against the risk of<br />

these adverse health effects. Drinking water<br />

that meets the EPA standard is associated with<br />

little to none of this risk and is considered<br />

safe with respect to barium.<br />

4.2 Comparing Drafted Regulations with<br />

Public Comments<br />

The making of government regulations involves communication<br />

between the issuing agency and the public. During the rule-<br />

22.ccr.64468.1(c) Barium<br />

The California Department of Health Services<br />

(DHS) sets drinking water standards and has<br />

determined that barium is a health concern at<br />

certain levels of exposure. . . In humans, DHS<br />

believes that effects from barium on blood<br />

pressure should not occur below 2 parts per<br />

million (ppm) in drinking water. DHS has set the<br />

drinking water standard for barium at 1 part per<br />

million (ppm) to protect against the risk of<br />

these adverse health effects. Drinking water<br />

that meets the DHS standard is associated with<br />

little to none of this risk and is considered<br />

safe with respect to barium.<br />

Figure 4: Comparison of drinking water standards for barium between US EPA [17] and CA DHS [26]<br />

180<br />

making process, government agencies are required to inform the<br />

public about the drafted rules and to solicit comments and<br />

reviews. E-rulemaking redefines the process of rule drafting and<br />

commenting by utilizing electronic media, such as the Internet.<br />

For example, email has become a popular communication channel<br />

for the public to submit comments on proposed rules.


1105.4 [6]<br />

Content of<br />

Section 1105.4<br />

6 Related Public Comments<br />

The process of e-rulemaking with participation from the public<br />

involves sorting through and organizing a massive volume of<br />

electronically submitted comments. We extended the related<br />

analysis framework to compare drafted regulations with<br />

associated public comments [23,30,31]. To locate related<br />

materials, we use regulation structures and features as well as<br />

certain characteristics of the drafted rules to add knowledge to the<br />

comparison. In particular, most drafted rules are domain-specific,<br />

focusing on a narrowly-defined issue or area of interest. The<br />

relatedness analysis takes advantage of the added knowledge to<br />

facilitate the comparison between the drafted rules and public<br />

comments.<br />

To illustrate, we applied the prototype system to a 15-page drafted<br />

chapter for the ADAAG titled, “Guidelines for Accessible Public<br />

Right of Way,” which has received over 1400 public comments<br />

[32,33]. Figure 5 shows the results indicating the public<br />

comments that are related to a specific drafted rule as well as an<br />

example that is not relevant to the proposed rules. Figure 5(b)<br />

shows a typical pair consisting of drafted section and its identified<br />

related comment. The draft discusses situations that “signal<br />

timing is inadequate for full crossing of traffic lanes,” while the<br />

commenter wrote “walk lights that are so short in duration”. The<br />

result shows the importance of a full content comparison between<br />

provisions and comments is necessary instead of just simple<br />

keyword matching. Figure 5(c) shows a different type of comment<br />

screening that a particular piece of public comment is not latched<br />

with any drafted section. The commenter suggests how a visually<br />

impaired person should practice blindness skills as opposed to the<br />

drafted rule which concerns with installing electronic devices on<br />

streets to help.<br />

Although this experiment is performed on regulations with a<br />

relative small set of comments, the potential of such knowledgedriven<br />

similarity analysis approach could be quite useful for the erulemaking<br />

process, where electronic media, such as emails and<br />

ADAAG rights-of-way draft<br />

1105.4.1 Length<br />

Where signal timing is inadequate for full crossing of all<br />

traffic lanes or where the crossing is not signalized, …<br />

Public comment<br />

Deborah Wood, October 29, 2002<br />

… This often means walk lights that are so short in<br />

duration that by the time a person who is blind realizes<br />

they have the light, …<br />

(b) Related draft rule and comment<br />

ADAAG rights-of-way draft<br />

No relevant section identified<br />

Public Comment<br />

Donna Ring, September 6, 2002<br />

If you become blind, no amount of electronics on your<br />

body or in the environment will make you safe and give<br />

back to you your freedom of movement. You have to<br />

learn modern blindness skills from a good teacher. …<br />

(a) Comparison of drafted rules with public comments (c) Comment not related to drafted rules<br />

Figure 5: Application of relatedness analysis for e-rulemaking<br />

181<br />

the internet, are used by the public to comment on proposed rules<br />

and regulations.<br />

5. SUMMARY AND DISCUSSION<br />

This paper has demonstrated, in a small way, how information<br />

technology can potentially be used effectively to facilitate<br />

regulatory information management and compliance assistance.<br />

The complexity and scale of regulations pose many challenges to<br />

information technology research. In REGNET we have<br />

investigated fundamental issues related to government<br />

regulations, their features, characteristics and properties that need<br />

to be addressed. In this paper, we have presented a regulatory<br />

compliance assistance framework that not only focuses on<br />

translating requirements into computational rules but also takes<br />

into consideration the organization of regulations as well as the<br />

supplementary information that are needed to enable better<br />

understanding and interpretation of the regulations. We have<br />

presented examples to illustrate how advanced IT development<br />

can be applied to facilitate retrieval of regulatory information and<br />

to compare related regulations issued by different agencies and<br />

organizations. The relatedness analysis methodology has been<br />

shown to be potentially useful for supporting the e-rulemaking<br />

process.<br />

Ongoing research in REGNET continues to explore how<br />

information technology can facilitate better understanding of<br />

regulations and public policies. For instance, regulations are<br />

traditionally issued and managed by isolated individual state and<br />

federal agencies. Coordination among different agencies about<br />

what issues agencies need to collaborate and in what capacity is<br />

not always easy. As part of the REGNET effort, Ekstrom has led<br />

the development of a tool to gauge agency involvement in a<br />

specific topic related to marine ecosystem management [34,35].<br />

Utilizing information retrieval techniques and text analysis, the<br />

tool first maps out agency’s involvement in a particular topic


ased on the laws and regulations issued by an agency, and then<br />

analyze possible areas of overlaps and disparities among the<br />

regulations by the different agencies on the topic. The tool has<br />

the potential to identify objectively what agencies are involved in<br />

the management of a topic across sectors and levels of<br />

government. In a collaborative effort with Prof. Jay Kesan at<br />

University of Illinois, our research has been extended to deal with<br />

laws and regulations related to intellectual properties (IP) [36,37].<br />

Information pertaining to IP includes not only laws and<br />

regulations, but also patents, court cases, scientific literature, and<br />

other related data. Our research is to develop a computational<br />

framework that can assist in retrieving related information about a<br />

specific topic across these diverse domains, with the objective to<br />

mitigate and help solve many of the complicated issues involved<br />

in patent filings and compliance.<br />

While our research has demonstrated the potential use of<br />

information science and technology in government regulation<br />

domain, much research and development efforts remain. Among<br />

the challenges include interpretation and validation of regulations,<br />

which are often ambiguous in nature. Translating regulations in<br />

computable rules, even manually, can be difficult. Automated<br />

translations would require the development of formal models for<br />

rule making and rule writing. Last but not least, technology<br />

transfer mechanisms are needed to bridge the gap between<br />

fundamental research demonstration and the development of tools<br />

ready for deployment.<br />

6. ACKNOWLEDGMENT<br />

This research has been partially supported by the National Science<br />

Foundation (Contract Numbers EIA-9983368, EIA-0085998, and<br />

IIS-0811460). The authors would like to thank Professor Gio<br />

Wiederhold of Stanford University for his mentorship in the<br />

REGNET project. The authors would also like to thank Larry<br />

Brandt and Valerie Gregg (former program directors of NSF’s<br />

Digital Government Program), and Sylvia Spengler, (program<br />

director of NSF’s Information Integration and Informatics<br />

program) for their encouragement and supports. The<br />

contributions by the former and current research students of the<br />

Engineering Informatics Group at Stanford University are<br />

gratefully acknowledged. In particular, the regulation assistance<br />

system (RAS) was implemented by Dr. Shawn Kerrigan under the<br />

supervision of the first author. Any opinions expressed in this<br />

paper are those of the authors and do not necessarily reflect the<br />

opinions of the National Science Foundation and their<br />

collaborators.<br />

7. REFERENCES<br />

[1] C. Skrzycki, “The regulators; compliance education goes<br />

self-service”, The Washington Post, May 23rd, 2000.<br />

[2] M. Romine, “Politics, the environment, and regulatory<br />

reform at the Environmental Protection Agency,”<br />

Environmental Lawyer, September 1999.<br />

[3] Business Compliance One Stop Workshop, Small Business<br />

Administration, Queenstown, MD, July 24-26th, 2002.<br />

[4] P. Wahlgren, Automation of Legal Reasoning, Kluwer Law<br />

and Taxation Publishers, 1992.<br />

182<br />

[5] J. Zeleznikow and D. Hunter, Building Intelligent Legal<br />

Information Systems: Representation and Reasoning in Law,<br />

Kluwer Law and Taxation Publishers, 1994.<br />

[6] T. Bench-Capon, Knowledge Based Systems and Legal<br />

Applications, The APIC Series 36, Academic Press, 1991.<br />

[7] S. Erdelez and S. O’Hare, “Legal informatics: application of<br />

information technology in law,” in Annual Review of<br />

Information Science and Technology, M. E. Williams(ed.),<br />

ASIS, Vol. 32, 1997.<br />

[8] P. Wahlgren, Automation of Legal Reasoning, Kluwer Law<br />

and Taxation Publishers, 1992.<br />

[9] A. R. Lodder and A. Oskamp (ed.), Information Technology<br />

and Lawyers: Advanced Technology in the Legal Domain,<br />

from Challenges to Daily Routine, Springer, 2006.<br />

[10] C. Coglianese, “E-rulemaking: information technology and<br />

regulatory process,” Faculty Research Working Paper Series,<br />

Kennedy School of Government, Harvard University, Report<br />

No. RWP 04-002, 2004.<br />

[11] J.E. Fontane, “Prospects for improving the regulatory process<br />

using E-rulemaking,” Communications of the ACM,<br />

46(1):63-64, 2003.<br />

[12] C. Coglianese, H. Kilmartin and E. Mendelson,<br />

“Transparency and public participation in the federal<br />

rulemaking P\process: recommendations for the new<br />

administration,” George Washington Law Review, 77:924-<br />

972, 2009.<br />

[13] J.M. Van Wert, “Business compliance one-stop: creating a<br />

single face of government,” presented at the National<br />

Compliance Assistance Providers Forum, U.S.<br />

Environmental Protection Agency and Texas Commission on<br />

Environmental Quality San Antonio, TX. 2002.<br />

[14] A. Botkin, “Wizards, advisors and websites, Oh My!<br />

interactive electronic tools for compliance assistance,”<br />

presented at the National Compliance Assistance Providers<br />

Forum, U.S. Environmental Protection Agency and Texas<br />

Commission on Environmental Quality, San Antonio, TX ,<br />

2002.<br />

[15] S. Kerrigan, A Software Infrastructure for Regulatory<br />

Information Management and Compliance Assistance, Ph.D.<br />

Thesis, Stanford University, August 2003.<br />

[16] S. Kerrigan and K.H. Law, “A regulation-centric, logic-based<br />

compliance assistance framework,” Journal of Computing in<br />

Civil Engineering, ASCE, 19(1):1-15, 2005.<br />

[17] Code of Federal Regulation, Title 40: Protection of<br />

Environment, (Part 260-265: Hazardous Waste Management<br />

System) 2003.<br />

[18] F.A. Heffron and N. McFeeley, The Administrative<br />

Regulatory Process, Longman, 1983.<br />

[19] W.W. McCune, Otter 3.0 Reference Manual and Guide,<br />

ANL-94/6, Mathematics and Computer Science Division,<br />

Argonne National Laboratory, Argonne, IL., 1993<br />

[20] New York State Department of Environmental Conservation<br />

Pollution Prevention Unit., Environmental Compliance And


Pollution Prevention Guide for Vehicle Maintenance Shops,<br />

2002.<br />

[21] R. Baeza-Yates and B. Ribeiro-Neto, Modern Information<br />

Retrieval ACM Press, 1999.<br />

[22] C.D. Manning, P. Raghavan and H. Schutze, H., Introduction<br />

to Information Retrieval, Cambridge University Press, 2008.<br />

[23] G. T. Lau. A Comparative Analysis Framework for Semi-<br />

Structured Documents, with Applications to Government<br />

Regulations, Ph.D. Thesis, Department of Civil and<br />

Environmental Engineering, Stanford University, Stanford,<br />

CA, August 2004.<br />

[24] G. T. Lau, K. H. Law, and G. Wiederhold. "A relatedness<br />

analysis of government regulations using domain knowledge<br />

and structural organization," Information Retrieval, 9:657-<br />

680, 2006.<br />

[25] G. T. Lau, K. H. Law, and G. Wiederhold. "Comparative<br />

analysis of government regulations using structural and<br />

domain information," IEEE Computer, 38(12):70-76, 2005.<br />

[26] California Code of Regulations, Title 22 (Social Security),<br />

Division 4.5, Chapter 12, Standards Applicable to Generators<br />

of Hazardous Waste, Barclays (Publisher), 1997.<br />

[27] G. T. Lau, H. Wang, and K. H. Law. "Locating Related<br />

Regulations Using a Comparative Analysis Approach,"<br />

Proceedings of the National Conference on Digital<br />

Government Research (dg.o2006), San Diego, CA, May 21-<br />

24, 2006.<br />

[28] C. P. Cheng, J. Pan, G. T. Lau, K. H. Law, and A. Jones,<br />

"Relating Taxonomies with Regulations," Proceedings of the<br />

9th Annual International Conference on Digital Government<br />

Research (dg.o2008), Montreal, Canada, May 18-21, 2008.<br />

183<br />

[29] C. P. Cheng, G. T. Lau, K. H. Law, J. Pan, and A. Jones,<br />

"Regulation retrieval using industry specific taxonomies,"<br />

Artificial Intelligence and Law, 16(3): 277-303, 2008.<br />

[30] G. T. Lau, K. H. Law, and G. Wiederhold. "A relatedness<br />

analysis tool for comparing drafted regulations and the<br />

associated public comments," Journal of Law and Policy for<br />

the Information Society, 1(1):95-110, 2005.<br />

[31] G. T. Lau and K. H. Law. "A prototype study on electronicrulemaking,"<br />

Encyclopedia of Digital Government, May<br />

2006.<br />

[32] ADA Accessibility Guidelines for Buildings and Facilities,<br />

The Access Board, 1998.<br />

[33] Draft Guidelines for Accessible Public Rights-of-Way, US<br />

Architectural and Transportation Barriers Compliance Board,<br />

Washington, DC, 2002.<br />

[34] J. Ekstrom, G. Lau, C.P. Cheng, D. Spiteri, and K. Law,<br />

"Gauging agency involvement in environmental management<br />

using text analysis of laws and regulations," I/S – A Journal<br />

of Law and Policy for the Information Society, 6(2):189-219,<br />

2010.<br />

[35] J. Ekstrom, G. Lau, D. Spiteri, J.C.P. Cheng, and K. Law,<br />

"MINOE: a software to evaluate ocean management in the<br />

context of ecosystems,” Coastal Management, 38: 5, 457-<br />

473, 2010.<br />

[36] S. Taduri, H. Yu, J.P. Kesan, G.T. Lau, and K.H. Law,<br />

“Developing a comprehensive patent related information<br />

retrieval tool,” Journal of Theoretical and Applied Electronic<br />

Commerce Research, (in press).<br />

[37] H. Yu, S. Taduri, J.P. Kesan, G.T. Lau, and K.H. Law,<br />

“Retrieving information across multiple related domains<br />

based on user query and feedback: application to patent laws<br />

and regulations,” 4th International Conference on Electronic<br />

Governance, Beijing, China, 2010.


Session 7<br />

Policies 2


From Information-Poor to Information-Rich: Bridging<br />

Regional Economic Disparities in Nigeria through e-<br />

Governance<br />

Sanjo Faniran<br />

International Cooperation Department<br />

Plot 421 Constitution Avenue,<br />

Central Business District, Abuja, Nigeria<br />

+2348034264007<br />

sfaniran@npc.gov.ng<br />

ABSTRACT<br />

Most of the recent economic advancement experienced globally<br />

has been driven largely by information and communication<br />

technologies (ICTs) - from Kigali to Kuala Lumpur, Nairobi to<br />

New Delhi - bringing significant changes in development of the<br />

human society through technological innovation and information<br />

dissemination. The pervasive use of digital technologies has, no<br />

doubt, improved people’s day–to–day life in different ways and to<br />

varying extents resulting in “economically-rich” and<br />

“economically-poor” regions of the world, and at the same time,<br />

“information-rich” and “information-poor” societies. This broadly<br />

reflects the differing levels of access and utilization of<br />

information and communication technologies, a phenomenon<br />

referred to as the digital divide. This paper examines the coincidence<br />

between economic disparities and ICT use, both<br />

between and within countries. We argue that just as the adoption<br />

of focused strategies in ICTs by developing countries is bridging<br />

the global digital divide between countries and fast-tracking<br />

economic development in many of today’s emerging economies,<br />

the prioritization, adaptation and rapid diffusion of ICTs through<br />

e-governance could also help reduce economic disparities<br />

between sub-national entities and regions within countries. We<br />

review case studies from India and South Africa, and compare<br />

with Nigeria which aspires to become a top 20 economy by 2020.<br />

By examining the results of the 2010/11 surveys on ICT access<br />

and income-poverty distribution across the country, the paper<br />

highlights the recent efforts by sub-national administrations in<br />

Nigeria to advance e-government, presenting key opportunities to<br />

bridge the growing economic disparities between regions in<br />

Nigeria.<br />

Categories and Subject Descriptors<br />

J.4 [Computer Applications]: Social and Behavioral Sciences –<br />

Economics<br />

General Terms<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

184<br />

Kayode Olaniyan<br />

National Bureau of Statistics<br />

Plot 721 Constitution Avenue,<br />

Central Business District, Abuja, Nigeria<br />

+2348038499670<br />

kolaniyan@nigerianstat.gov.ng<br />

Management, Economics<br />

Keywords<br />

Digital Divide, Economic Development, Poverty, ICT Use,<br />

Nigeria<br />

1. INTRODUCTION: THE DIGITAL<br />

DIVIDE AND REGIONAL ECONOMIC<br />

DISPARITIES<br />

A greater number of countries, and their citizens, are gaining both<br />

knowledge of and skills at using modern ICTs, connecting to the<br />

internet, and interacting using multiple media channels at a<br />

rapidly increasing rate. According to the 2012 UN E-Government<br />

Survey, the world average on the e-government index increased<br />

by 10 percent over the last two years led by Europe and the<br />

Americas [6]. One important point that the survey notes, however,<br />

is that the digital divide – the differing levels of access and usage<br />

of ICTs between the developed and the developing world -<br />

remains a phenomenon of growing, rather than diminishing,<br />

importance. This is despite the array of cutting-edge technologies<br />

and evolution of social media and networking tools, which have<br />

re-defined inter-human relationships, government and governance<br />

in many parts of the world. According to a 2006 report, a person<br />

living in a high-income country is over 22 times more likely to be<br />

an Internet user than someone in a low -income country. Secure<br />

Internet servers, a rough indicator of electronic commerce, are<br />

over 100 times more common in high-income countries than in<br />

low-income countries. In spite of their rapid growth in developing<br />

nations, mobile phones are 29 times more prevalent in highincome<br />

countries, and mainline penetration is over 21 times that<br />

of low-income countries [5].<br />

The usage to which many citizens put the internet, mobile phones<br />

and other digital devices to spread information and record (and in<br />

some cases influence) recent events, from Japan’s tsunami to the<br />

different dimensions of the Arab Spring, demonstrate how far the<br />

developing world has come, and how fast it is catching up with<br />

the rest of the world. But despite the achievements towards<br />

bridging the digital divide, and improving its positive impacts on<br />

the society, there are still glaring regional disparities which are<br />

both the causes and consequences of the economic well-being of<br />

the developed world.<br />

With a history of high levels of functional education and<br />

widespread telephony infrastructure, Europe and the Americas as<br />

a whole remain far ahead of the rest of the world regions [6].


Asia, which is home to around three-fifths of the world citizens,<br />

has only around 70 per cent of the level of e-government in<br />

Europe while the level of services in Africa barely squares off at<br />

40 per cent of those in Europe. Within any region, countries at the<br />

lower percentile of e-development do not fare well either. This is<br />

especially true of the lower income countries in both Asia and<br />

Africa. The 10 least e-ready countries in Asia have barely 37 per<br />

cent of the level of e-government in Europe while in Africa the<br />

figure is little more than 20 per cent [6]. Figure 1 below shows<br />

global trends over the last decade in regional progress towards egovernment.<br />

Figure 1: Advances in regional e-government development<br />

(Source: UN E-Government Survey, 2012)<br />

However, this scenario is not entirely hopeless. Within the last<br />

decade in particular, many developing countries especially in<br />

Africa and Asia, have increased their web presence, clearly<br />

utilizing the opportunity to leapfrog the development cycle<br />

through innovative adoption and deployment of ICTs. In Eastern<br />

Africa, for example, mobile money transfer has taken strong roots<br />

in Kenya and Uganda, and rapidly spreading across the continent<br />

[1]. The effects of these technologies on socio-economic<br />

development, gender empowerment, increased schooling rates and<br />

rising income levels have been the subject of many recent<br />

economic literature.<br />

In view of the important role that ICTs play in bridging the digital<br />

divide between countries and regions of the world, can the<br />

deployment of ICTs also bridge the digital divide within countries<br />

to the same extent thereby reducing economic disparities within<br />

the country? This paper addresses this question by examining the<br />

case of Nigeria, a West African nation, which aspires to become a<br />

top 20 economy by 2020. The telecommunications industry<br />

remains the fastest-growing sector in the country, recording<br />

34.38% growth in 2010 and 34.76% in 2011, rapidly transforming<br />

the business, economic and governance landscape across the<br />

country. The rest of the paper is structured as follows: in section<br />

2, a brief review of the methodology employed is presented, while<br />

section 3 discusses the country experiences of India and South<br />

Africa as case studies. In section 4, the Nigerian case is explored<br />

more in-depth with respect to ICT access and the nature of<br />

economic disparities in the country. Section 5 highlights some<br />

opportunities for e-governance to reduce the disparities, while key<br />

challenges to realizing this are presented in section 6. Section 7<br />

concludes the paper.<br />

185<br />

2. METHODOLOGY<br />

A review of two country cases studies – India and South Africa –<br />

is undertaken to examine what the experience of countries with<br />

similar large populations and economic conditions have been with<br />

respect to bridging the digital divide. This is supported by<br />

examining the latest available official data on ICT use and poverty<br />

distribution at sub-national level for the country to determine<br />

whether a relationship exists between access to ICTs and<br />

economic development. For this purpose, access to ICTs is<br />

measured by the percentage of persons who own or have access to<br />

personal computers, mobile phones and internet access.<br />

Economic development, on the other hand, is indicated by the<br />

relative poverty (percentage) rate. Given the strong correlation<br />

between access to internet, and access to personal computers<br />

(estimated at 0.83, or 83%), and the fact that the data series for the<br />

latter is more complete than the former “access to personal<br />

computers” is selected as the better indicator of ICT access, and<br />

hence the measure of the digital divide in Nigeria.<br />

Data is obtained from Nigeria’s National Bureau of Statistics<br />

(NBS) General Household Survey (2010/11) which produced data<br />

on ICT use in Nigeria, as well as the Harmonised Nigeria Living<br />

Standard Survey (2009/10) which produced data on relative<br />

poverty.<br />

3. COMPARATIVE COUNTRY CASE<br />

STUDIES<br />

In this section, we discuss the cases of India and South Africa:<br />

two countries that have undertaken considerable efforts to bridge<br />

the digital divide among sub-national entities and regions in their<br />

domains. India’s global leadership in the IT industry is wellacknowledged<br />

1 . The second most populous nation in the world,<br />

India ranked 125 th on the UN E-Government Development Index<br />

(EGDI) in 2012. India is one of the countries where<br />

telecommunication development activities have gained<br />

momentum in the past decade. Efforts have been made from both<br />

governmental and non-governmental platforms to enhance<br />

telecommunication infrastructure, provide modern technologies to<br />

serve all segments of India’s culturally-diverse society, and to<br />

transform the country into a IT powerhouse. However, the digital<br />

divide still remains significant between rural and urban India [7],<br />

[8]. While the major cities are even at par with some developed<br />

countries, rural areas in states like Eastern Bihar and Orissa are<br />

worse off than several least-developed countries. With respect to<br />

teledensity 2 for example, according to the Telecom Regulatory<br />

Authority of India (TRAI) while States like Delhi and Chennai<br />

have more phones than people (with >100% teledensity rate) the<br />

teledensity in States like Chhattisgarh and Jharkhand are as low as<br />

4.18% and 3.49% respectively. India has around half a million<br />

software developers and is second only to the US, but 300,000<br />

Indian villages do not have a phone connection, 26 per cent of the<br />

population lies below the poverty line and 35 per cent illiterate.<br />

There are only 5 PCs per 1000 people, 9 mobile lines per 1000<br />

and 37 fixed lines per 1000 people in India, which is extremely<br />

low when compared to China.<br />

1 This section relies on [4]<br />

2<br />

Number of landline telephones in use per 100 individuals living<br />

in an area.


To address the divide, specific government initiatives taken<br />

include the CARD project for land administration in Andhra<br />

Pradesh; the Bhoomi project in Karnataka covering over 6 million<br />

farmers and as many records of land ownership; Sourkaryan<br />

project which provides rural cyber hubs in Andhra Pradesh; the<br />

Gyandoot project in Madya Pradesh which facilitates access to<br />

information on crops, weather and markets; and the FRIENDS<br />

project in Kerala for tax and utility payments. These e-governance<br />

initiatives are a clear demonstration of improving rural<br />

infrastructure and information access thus bridging the rural-urban<br />

digital divide in India.<br />

Africa’s largest economy today, South Africa ranks third among<br />

African countries on the 2012 EGDI 3 . There are 9 provinces and<br />

each has its own provincial legislature and Provincial<br />

Administration with various departments responsible for various<br />

aspects of service delivery. Provincial departments are key<br />

agencies of service delivery. Nevertheless, there are<br />

infrastructurally-disadvantaged areas, especially rural areas, with<br />

limited access to electricity and telephone lines.<br />

In summary, both case studies attest to the existence of withincountry<br />

digital divide even in developing countries, just as the<br />

global digital divide exists between the developed and developing<br />

worlds. In the next section, we discuss the Nigerian experience<br />

with respect to the nature of the digital divide and its interactions<br />

with the level of economic disparities across the country.<br />

4. ICT ACCESS AND ECONOMIC<br />

DISPARITIES IN NIGERIA<br />

Nigeria, with population of about 160million in 2012 ranked 162 nd<br />

on the UN E-government development index (2012) and is<br />

recognised among highly-populated (larger than 100 million)<br />

nations that made a special effort to improve service delivery to<br />

large swathes of their populations despite the challenges they face<br />

[6]. Africa’s largest country by population, Nigeria has 36 (subnational)<br />

States split almost equally into Northern and Southern<br />

Nigeria. Development indicators have historically pointed to<br />

better outcomes for the southern part of the country than the<br />

northern part. Nevertheless, it may be useful to add a note of<br />

caution that the evidence here does not warrant any conclusions<br />

regarding the direction of causation. However, the evidence does<br />

suggest a possible relationship between access to ICT and<br />

measure of poverty.The telecommunications industry has<br />

remained the fastest growing sector in the country, generating<br />

hundreds of thousands of jobs, directly and indirectly, and<br />

changing business processes and governance, while linking up<br />

new areas to centres of economic activity. According to the<br />

Nigerian Communications Commission (NCC), between February<br />

2011 and February 2012, the number of active mobile phone lines<br />

increased by 10million to just over 92 million lines. Such has been<br />

the phenomenal growth in Nigeria’s mobile telephone market.<br />

Mobile phones represent the device with the highest total access<br />

rate, with nearly 64% of the population having access to mobile<br />

phones, according to data provided by the National Bureau of<br />

Statistics. As shown in Table 1, Anambra, Osun, Kogi, Ogun,<br />

Niger and Lagos (each with more than 85% total access levels)<br />

have the highest percentages of population with mobile phone<br />

access, while States with less than 50% access to mobile phones<br />

3 This section draws heavily from [3]<br />

186<br />

include mostly the Northern States of Zamfara, Kano, Katsina,<br />

Bauchi and Adamawa.<br />

Table 1. Total access to ICTs and relative poverty among<br />

States in Nigeria<br />

State<br />

Phones<br />

(%)<br />

Personal<br />

Computers<br />

(%)<br />

Internet<br />

access<br />

(%)<br />

Relative<br />

poverty<br />

(%)<br />

Kano 36.2 0.4 0.5 72.3<br />

Kebbi 65.0 0.5 0.3 80.5<br />

Zamfara 36.1 0.6 0.5 80.2<br />

Borno 54.1 0.7 N/A 61.1<br />

Sokoto 33.1 0.8 0.3 86.4<br />

Bauchi 42.8 1.1 0.5 83.7<br />

Katsina 39.7 1.3 1.3 82.0<br />

Ebonyi 82.0 1.5 0.8 80.4<br />

Kaduna 54.8 1.9 0.5 73.0<br />

Bayelsa 64.0 2.0 2.0 57.9<br />

Taraba 33.1 2.1 1.7 76.3<br />

Imo 81.9 2.5 2.3 57.3<br />

Benue 55.0 2.6 1.7 74.1<br />

Abia 70.6 2.9 2.6 63.4<br />

Ondo 75.0 3.0 2.1 57.0<br />

Enugu 71.2 3.1 4.0 72.1<br />

Yobe 51.8 3.3 3.0 79.6<br />

Ekiti 77.9 3.6 2.2 59.1<br />

Gombe 62.3 3.7 1.1 79.8<br />

Adamawa 46.5 3.7 1.8 80.7<br />

Nasarawa 74.8 4.1 4.2 71.7<br />

Plateau 67.2 4.5 3.6 79.7<br />

Jigawa 75.4 4.6 2.0 79.0<br />

Kwara 78.0 4.6 2.7 74.3<br />

Akwa Ibom 68.1 4.7 1.5 62.8<br />

Niger 86.2 4.7 4.4 43.6<br />

Delta 76.8 5.2 3.4 70.1<br />

Oyo 81.5 6.0 4.3 60.7<br />

Cross River 54.3 6.3 3.3 59.7<br />

Ogun 87.1 6.4 4.7 69.0<br />

Edo 78.5 6.9 5.0 72.5<br />

Anambra 95.1 8.6 3.4 68.0<br />

Rivers 75.8 9.0 10.8 58.6<br />

Osun 91.9 10.0 8.5 47.5<br />

Lagos 85.6 15.8 27.0 59.2<br />

FCT Abuja 71.8 15.9 14.1 59.9<br />

Kogi 87.6 17.4 8.7 73.5<br />

National 63.9 4.5 3.6 69.0<br />

Sources: Nigeria National Bureau of Statistics General Household<br />

Survey, 2010/11, Nigeria Poverty Profile, 2009/10. A coloured<br />

row indicates a Southern State, otherwise a Northern State.<br />

Further analysis of table 1 indicates that in terms of personal<br />

computer access Kogi, FCT, Lagos, Osun and Rivers have the<br />

highest rates of access to PCs, while Kano, Kebbi, Zamfara,<br />

Borno and Sokoto have the least. Internet access rates suggest the<br />

same trends as access to PCs. These depict, although not<br />

absolutely, the disparity between the Northern and Southern<br />

regions of the country: while the southern states have a generally<br />

higher access rate to ICTs, the Northern States have generally


lower access rates. In terms of relative poverty however, Northern<br />

States have a generally higher poverty level.<br />

Figure 2: Scatter diagram showing the relationship between<br />

access to personal computers and relative poverty in Nigeria<br />

(Source: computed by authors)<br />

The gap in PC access rates in Nigeria suggests that economic<br />

disparities also exist between these States in Nigeria, as reflected<br />

in the differing levels of poverty. This point is further clearly<br />

seen in Figure 2, which shows a negative relationship between<br />

access to personal computers (as a measure of ICT access) and<br />

level of poverty. It can be observed that States with lower levels<br />

of poverty have higher ICT access rates, while states with higher<br />

poverty levels have lower ICT access rates. Overall, many states<br />

in Nigeria have high poverty levels, hence the observations (dots)<br />

in Figure 2 appear clustered toward the upper left corner of the<br />

chart. Nevertheless, the downward sloping line shows clearly the<br />

inverse relationship between ICT access rates and economic<br />

development. Therefore, if ICTs have the potential to lower<br />

poverty rates, as seen in the case of the Southern states, it may be<br />

suggested that increasing ICT access rates for the Northern states<br />

could potentially lower poverty rates so as to reduce the socioeconomic<br />

disparities among states in Nigeria. E-governance<br />

presents a viable opportunity to increase ICT access rates in the<br />

country. This is discussed in the next section.<br />

5. OPPORTUNITIES FOR E-<br />

GOVERNANCE<br />

E-government is about visibility and transparency of government<br />

in the delivery of public services to the citizens, a deliberate and<br />

conscious policy to improve access to information by citizens and<br />

to deliver public services efficiently. In recognition of the critical<br />

role that e-governance can play in accelerating the rate of<br />

economic development in the country, the Federal Government in<br />

mid-2011 created the Ministry of Communication Technology to<br />

provide sectoral leadership and policy guidance to the government<br />

and administering policies to enable Nigeria bridge the digital<br />

divide. [2]. In addition, notable efforts by some state governments<br />

to bridge the divide are on-going. For example, in Lagos, Cross<br />

River and Ekiti, citizens are now comfortable with e-tax forms<br />

while Osun State has announced plans to introduce e-learning in<br />

secondary schools using the tablet device. On another level, the<br />

deployment of electronic governance tools such as community<br />

information centres, e-kiosks etc, offer the necessary support to<br />

private entrepreneurs to thrive especially where such e-<br />

187<br />

governance platforms provide information that may be expensive<br />

to obtain privately such as weather forecasts, educational services,<br />

business support opportunities or agricultural markets information<br />

and prices. By creating such platforms of information exchange,<br />

economic activity is stimulated via private entrepreneurship,<br />

promoting better production, encouraging trade and ultimately<br />

impacting also on socio-economic disparities among States or<br />

regions.<br />

6. CONCLUSION<br />

As Nigeria aspires towards becoming one of the largest<br />

economies in the world by Gross Domestic Product (GDP) by the<br />

year 2020, the challenges to adopting and promoting egovernance<br />

to bridge the digital divide and boost rapid economic<br />

integration need to be overcome. And they are not<br />

insurmountable; but they require political will, effective<br />

prioritization and sufficient financial commitment.<br />

7. ACKNOWLEDGMENTS<br />

We wish to thank the Hon. Minister/Deputy Chairman, National<br />

Planning Commission, Dr. S.U. Usman, for his inspirational<br />

leadership and support for this project. Special thanks also go to<br />

the Statistician-General of the Federation, Dr. Yemi Kale for his<br />

unending encouragement. We also wish to thank Mr. B.O.<br />

Akpanyung, Mr. C.E. Ezeilo, Alhaji Idris and Mr. Yukubu, all of<br />

National Planning Commission for their technical inputs and<br />

insightful comments on the paper.<br />

8. REFERENCES<br />

[1] Demombynes, G. and A. Thegeya. (2012). Kenya’s mobile<br />

revolution and the promise of mobile savings,Policy<br />

Research Working Paper 5988, the World Bank 2012<br />

[2] Johnson, O. (2012) “The ICT industry in Nigeria: A<br />

roadmap”, Federal Ministry of Communication Technology<br />

Abuja, Nigeria (www.fmct.gov.ng)<br />

[3] Langmia, K.(2005). The role of ICT in the economic<br />

development of Africa: The case of South Africa,<br />

International Journal of Education and Development using<br />

Information and Communication Technology, (IJEDICT),<br />

Vol. 2, Issue 4, pp. 144-156.<br />

[4] Shah, M. (2007). E-governance in India: Dream or reality?<br />

International Journal of Education and Development using<br />

Information and Communication Technology (IJEDICT),<br />

Vol. 3, Issue 2, pp. 125-137.<br />

[5] United Nations (2006). Bridging the technology gap between<br />

and within nations, Commission on Science and Technology,<br />

E/CN.16/2006/2<br />

[6] United Nations (2012). United Nations E-Government<br />

Survey, United Nations, New York<br />

[7] Dasgupta, S.; Lall, S. and Wheeler, D. (2002) Policy Reform,<br />

Economic Growth, and the Digital India, Policy Review<br />

Working Paper of the World Bank, No. WPS-2567,<br />

Washington, DC<br />

[8] Singh, Neena (2007) “Bridging the Digital Divide in India:<br />

Challenges and Opportunities”, World Libraries, Vol. 17,<br />

No. 1.


ICT for Development and the MuNet Program- Experiences<br />

and Lessons Learnt from an Indigenous Municipality in<br />

Guatemala<br />

Jorge López-Bachiller<br />

Municipality of Patzún Consultant<br />

2ª calle, 2-75 zona 2, Patzún<br />

Chimaltenango, Guatemala C.A.<br />

+502 45 36 30 88<br />

jlopezbachiller@munetguatemala.org<br />

ABSTRACT<br />

The aim of this paper is to present experiences and lessons learnt<br />

from the use and contribution of Information and Communication<br />

Technologies (ICT) to the development of the MuNet Program<br />

and one of its implementation instances in Patzún (Guatemala).<br />

With 94% indigenous population from the Maya Kaqchikel ethnic<br />

group, Patzun economy is based on agriculture and handicraft.<br />

Since 2005, Patzun Municipality is part of the Efficient and<br />

Transparent Municipality (MuNet) Program of the Organization<br />

of American States (OAS). Due to the MuNet Program, Patzun<br />

citizens and the local government were empowered through the<br />

use of ICT and ICT-based applications. As a result, citizens’<br />

quality of life and governance processes were improved.<br />

Categories and Subject Descriptors<br />

H.4 [Information Systems Applications]; J [Computer<br />

Applications] - J.1 Administrative Data Processing – Government<br />

General Terms<br />

Performance, Experimentation, Human Factors<br />

Keywords<br />

MuNet; Modernization; Local Government; Digital Divide; ICT;<br />

Indigenous Population; Guatemala<br />

1. INTRODUCTION<br />

Located in the central part of Guatemala, Patzun has a population<br />

of 52,000 - 94% of them indigenous from the Maya Kaqchikel<br />

ethnic group. Agriculture products are the main income for 90%<br />

of the population. Before 2005, the community had poor access to<br />

ICT services. Informing citizens was not a priority for the local<br />

government and citizen’s participation was restricted to<br />

development tasks and community councils.<br />

The rest of this paper is structured as follows. Section 2 presents<br />

the MuNet Program; while Section 3 one of its instantiation -<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Javier Saenz-Core<br />

MuNet II Project Coordinator<br />

Italia 536 B- B8000DKL<br />

Bahía Blanca, Argentina<br />

+54 9 291 4545726<br />

jsaenzcore@gmail.com<br />

188<br />

Diego Cardona<br />

Universidad del Rosario<br />

Calle 12 C No 4 – 80 of 1-01<br />

Bogotá, Colombia<br />

+57 311 2395061<br />

diego.cardona@urosario.edu.co<br />

Patzun Municipality. Challenges and lessons learnt from Patzun<br />

experience are discussed in Sections 4 and 5, respectively.<br />

Conclusions are drawn in Section 6.<br />

2. MUNET PROGRAM<br />

Continuous developments of ICTs have opened new opportunities<br />

to transform governments. Electronic Government (e-<br />

Government) refers to the ICT-based transformations of<br />

government structures and processes aiming at improving<br />

efficiency in government operations, enhancing interactions with<br />

citizens and other social actors, reducing transaction costs and<br />

incrementing users’ satisfaction on public services [14].<br />

In Latin America, municipalities are the government level where<br />

most social development activities take place. Therefore, actions<br />

oriented to enhance relationships between citizens and public<br />

administrations should start at the municipality level to guarantee<br />

immediate perceptible changes. Following this principle, the<br />

MuNet Program was designed as part of the cooperation activities<br />

among the Canadian International Development Agency (CIDA)<br />

[15], the “Andes Foment Corporation“ (CAF) [16] and the<br />

Executive Secretariat for Integral Development (SEDI) [17] from<br />

OAS. The aim of the MuNet program is to help Latin American<br />

municipalities in the adoption of ICT, as a tool to increase<br />

transparency, efficiency and citizen participation.<br />

The Program was launched in Latin America in 2005. Comprising<br />

two phases, 11 countries and 22 municipalities, including Patzún,<br />

participated in Phase I. The Program methodology comprised<br />

achieving political support from the mayor or local authority,<br />

creating a MuNet team with municipality personnel and<br />

developing e-Government strategies. In 2010, the Phase II of the<br />

Program was started, with four participating countries - Panama,<br />

Guatemala, Paraguay and Costa Rica, and 179 municipalities.<br />

3. MUNET IMPLEMENTATION PATZÚN<br />

EXPERIENCE<br />

The execution of the MuNet Program in Patzun lasted for four<br />

years. In such time frame, the municipal budget was USD 6M,<br />

from which USD 32,000 were dedicated to ICT. Despite the<br />

scarce resources, the municipality was able to achieve its ICTrelated<br />

strategic objectives due to international cooperation and<br />

optimal management. The implemented ICT initiatives are<br />

explained below.


3.1 Municipality Modernization<br />

Initially, the Municipality had five old computers. The new<br />

municipal government purchased new hardware and software.<br />

Currently, 25 computers are available.<br />

3.2 Internet Installation<br />

The Municipality used to have a non-stable 256 kbps Internet<br />

connection. This service was only available to the Mayor, the<br />

Treasurer, and the Secretary. To improve the service, a telephone<br />

company (Telgua) was hired to provide a service of 1 MHz.<br />

Wiring of all municipality offices was made and currently 30 staff<br />

have Internet access. Due to the increase in personnel, more<br />

installations are being made in new offices.<br />

3.3 Employee’s Training<br />

One feature of Patzún Municipality is the continuous renewal of<br />

its staff. Therefore, new personnel have to be trained to acquire<br />

the required skills. 35% of the personnel do not have email<br />

accounts or do not use them properly. To overcome this difficulty<br />

a corporative email platform “@patzun.gob.gt” was deployed. In<br />

addition, personnel has to be trained in the focused use of internet<br />

and its applications to improve the services provided to citizens,<br />

and to work with others government departments. To promote a<br />

correct use of ICT, a user manual has been developed and is<br />

shared with the new staff. In addition, more communication<br />

devices are planned to be adopted.<br />

3.4 MuNet Team<br />

When the MuNet Program started, a MuNet team of consultants<br />

was assembled and trained. Over time, this team has been<br />

restructured with the incorporation of new members. Nowadays,<br />

the team has a Program Manager, who leads and defines the<br />

strategy.<br />

3.5 Free Internet Access to Community<br />

A part of the strategy to close the digital gap, Internet access has<br />

been provided by the Municipality to the community. Two free<br />

access points were installed equipped with donated computers.<br />

The time for the use of computers is restricted so more users can<br />

benefit from the service.<br />

3.6 Community Digital Center<br />

To reduce the digital gap, citizens need to be educated in the use<br />

of ICT. In order to contribute to this task, national and<br />

international institutions helped to create a Digital Community<br />

Center. Opened in 2010, the Center offers free ICT-basic courses<br />

(office and communication tools) to the community and<br />

government institutions.<br />

3.7 Government Website<br />

A very important element of the Municipality ICT-driven<br />

development has been the deployment of its website -<br />

www.patzun.gob.gt. The website provides information about the<br />

history, culture and geography of Patzun; as well as information<br />

about the government’s agenda and how citizens can be involved.<br />

Some sections, particularly those dedicated to history and culture,<br />

include multimedia materials, relying on free tools as Picasa and<br />

YouTube.<br />

3.8 Language Stimulation<br />

To promote and protect the Kaqchikel language, a team is creating<br />

a Wikipedia version of the municipal website in Kaqchikel. The<br />

189<br />

team members are linguistics, Kaqchikel speakers and local and<br />

international collaborators. Social development is tightly related<br />

to the promotion and protection of their culture. For this reason<br />

the content of the municipal website is presented in Spanish and<br />

Kaqchikel.<br />

3.9 Inter-Institutional Coordination<br />

The success of the project mainly relied on the support received<br />

from the Municipality, various public institutions and private<br />

companies, as well as individual contributions of collaborators<br />

from Guatemala and other countries. Mainly, the project was<br />

developed and coordinated by MuNet OAS, public institutions at<br />

Patzún and the National Secretary of Science and Technology<br />

(SENACYT) [18], Guatemala.<br />

3.10 Other Initiatives<br />

Some other experimental ICT-related initiatives are being<br />

developed in Patzún in specific vertical domains: e-Health, e-<br />

Safety, e-Learning, and e-Prevention. Results obtained so far are<br />

positive, show the potential of ICT use.<br />

4. CHALLENGES<br />

After presenting the overview of the MuNet Program and concrete<br />

examples of one implementation instance – the case of Patzún<br />

Municipality, this section discusses some of the main challenges<br />

faced during the project implementation and the adopted<br />

approaches to overcome it:<br />

o Resources – The Municipality faced difficulties to allocate<br />

resources to the project. Resources are limited or needed for<br />

other initiatives. Approach: To implement small actions with<br />

great impact on the population and thus convince the authorities<br />

about the benefit of investing on the project.<br />

o Human capital – The community lacked qualified human<br />

resources able to teach informatics. Approach: To foster<br />

international cooperation and appeal to national organizations<br />

to contribute with such resources.<br />

o Resistance to change – Municipal staff showed resilience to<br />

change and adopt new working practices. Approach: To<br />

manage cultural change and show how community members<br />

become familiar with the use of ICT.<br />

o Adoption of new practices – The team was uncertain about the<br />

acceptance from public employees to adopt ICT as a tool to<br />

enhance their efficiency, and apply it for creating new<br />

applications. Approach: To show enhanced efficiency in the<br />

management, leading and showing by examples how staff can<br />

innovate on their daily work.<br />

o Changing staff - Some personnel previously trained on ICT did<br />

not continue working at the municipality and new staff was<br />

hired after the elections in 2011. Approach: The new<br />

government hired younger staff that was more familiar with<br />

ICT.<br />

o Lack of support from central government – During the<br />

implementation of Phase I there was lack of support from the<br />

central government. Approach: In January 2012, the national<br />

government created the Digital Agenda for the Change, which<br />

is expected to generate decentralized actions. Municipal staff<br />

participated in meetings at the national level aiming at<br />

identifying ICT-related decision making areas or impact areas.<br />

o Lack of strategy to bridge digital divide - Guatemala does not<br />

have similar initiatives to reduce the digital gap. Approach: At<br />

the local level, the two community centers provided free<br />

internet access and delivered training on basic ICT


competencies and skills, contributing to reduce the digital<br />

divide.<br />

o Lack of awareness about potential benefits of ICT – Local<br />

authorities possess limited knowledge on ICT and its potential.<br />

Approach: Communicate in a massive and effective way to<br />

municipal authorities the benefits achieved through the use of<br />

ICT.<br />

5. LESSONS LEARNED<br />

The following two sections present some lessons learnt from<br />

Patzún Municipality (Section 5.1) and from the MuNet Program<br />

(Section 5.2).<br />

5.1 Patzún Municipality<br />

o Strategy for Digital Divide – The first important aspect to<br />

consider is to create a strategy to reduce the digital divide. Two<br />

mainstream topics of such strategy should be indigenous people<br />

development and inclusion.<br />

o Inter-disciplinarity – The project would have benefitted more<br />

from a multidisciplinary team.<br />

o Motivation – Part of the success of the project relied on the<br />

highly-motivated team.<br />

o Communication – The effective communication of both strategy<br />

and implemented activities is crucial to raise the interest of<br />

other institutions, creating the awareness and support that the<br />

program requires.<br />

o Stakeholders’ Participation – To enrich the opportunities and<br />

benefits of the program, participation of representatives from<br />

different areas - i.e. health, education, youth, is required.<br />

o Continuous Training – The support of local authorities is<br />

needed to ensure continuous efforts to building human capacity.<br />

o Efficiency –The program proved the efficiency to change<br />

traditional styles of working, reducing costs through the use of<br />

ITC tools.<br />

o Awareness – After taking the online e-Government course<br />

delivered by the MuNet Program, the awareness raised and<br />

competencies developed among government staff constituted a<br />

key factor to design and implement e-Government strategies.<br />

5.2 MuNet Program<br />

Community development in any municipality must be<br />

accompanied with the provision of access to ICT. Since<br />

indigenous populations have fewer resources and opportunities,<br />

their inclusion in the knowledge society requires the<br />

implementation of e-Government initiatives. However,<br />

implementing such initiatives much rely on the political will of<br />

community leaders and national authorities.<br />

Major qualitative impacts of the MuNet Program include:<br />

o Identifying municipal government strategic objectives in the<br />

short, medium and long term<br />

o Inspiring municipalities to improve their ICT infrastructure to<br />

enhance connectivity<br />

o Implementing online services for citizens<br />

o Contributing to increase citizen’s trust in the municipal<br />

government<br />

o Expanding team members’ perspective beyond the local<br />

context, stressing the importance of ICT in global development.<br />

o Deploying ICT applications to monitor the execution of projectrelated<br />

tasks.<br />

190<br />

Lessons learnt from the execution of Phase I of the MuNet<br />

Program are classified into the following perspectives:<br />

o Program Planning – It is important to define the terms of<br />

reference of project consultants and local stakeholders, and to<br />

establish local teams ensuring that interdisciplinary and<br />

multiple skills are represented.<br />

o Training – Officials and municipal workers should have a<br />

preparatory phase for the program implementation. Technology<br />

Adoption – A wide gap was identified among cultural and<br />

social diversity across teams. To overcome differences,<br />

required and essential organizational changes were<br />

implemented and a record of the identified technical challenges<br />

was maintained for future improvements. Additionally, as long<br />

as the program implementation progresses and ICT becomes<br />

embedded in the administration, new ICT demands emerged<br />

from specific areas – health, education, etc.<br />

o Political Management – Top-level leadership is essential for<br />

project success. Such leadership should manifest abilities in<br />

management and communication to share the achievements<br />

with project stakeholders, and maintain the e-Government<br />

strategy according to the municipal development plan.<br />

o Dissemination – Document all facts and events and dedicate<br />

special efforts to internally and externally disseminate the<br />

project progress. Moreover, awareness should be raised among<br />

project stakeholders on the opportunities offered by ICT.<br />

o Sustainability – It's essential to create legal, financial, and<br />

political instruments as well as building national and<br />

international networks to provide project sustainability.<br />

o Collaboration - MuNet contributed to strengthen collaboration<br />

among government authorities and officials, guaranteeing<br />

autonomy in the long term.<br />

Methodological Approach - MuNet offered a comprehensive<br />

methodological framework for the municipalities to use.<br />

6 CONCLUSIONS<br />

This paper introduced the MuNet Program and the experience of<br />

its implementation in Patzun Municipality. The Patzún experience<br />

- called “Patzún, all its information in a click” has participated in<br />

several competitions; winning a third place in the call to the best<br />

local innovations organized by the Executive Secretariat of the<br />

Presidency Coordination (SCEP). In addition, it has being<br />

nominated in the category of e-Inclusion for the World Summit<br />

Awards 2011 Guatemala.<br />

Next steps for Patzún Municipality include presenting the<br />

program and its progress to the Municipal Corporation and<br />

obtaining their commitment to continue the activities under the<br />

Modernization Commission, led by a Councilor. To raise more<br />

visibility, there will be an official re-launch of the website and<br />

presentation of the actions carried out by the Municipality to<br />

reduce the digital divide. Finally, the Municipality will continue<br />

its efforts to publicize its actions in this field, both nationally and<br />

internationally.<br />

Next steps for the MuNet Program include seeking allies in<br />

government who are committed to implementing e-Government<br />

strategies and updating and improving several methodologies.<br />

7 REFERENCES<br />

[1] Cardona, D, MuNet un esfuerzo de la OEA/ACDI/CAF para<br />

llevar el gobierno electrónico a los municipios en el


hemisferio, On Line document<br />

www.ahciet.net/comun/pags/agenda/eventos/2005/124/ponen<br />

cias/11.00%20diego%20Colombia_Rio.ppt [February, 2012]<br />

[2] Cardona, D, Open Knowledge, Free Society third edition of<br />

the On Line Congress of the Observatory for CyberSociety,<br />

On Line document<br />

http://www.cibersociedad.net/congres2006/gts/gt.php?id=142<br />

[February, 2012]<br />

[3] Cardona, D, et al, MuNet. Una herramienta para lograr<br />

municipios eficientes y transparentes, en Said, E, TIC,<br />

Comunicación y Periodismo Digital. Reflexiones de América<br />

Latina y Europa; Universidad del Norte, Barranquilla, 2010<br />

[4] Cardona, D, et al, MuNet, Municipios Eficientes y<br />

Transparentes, On Line document<br />

http://portal.oas.org/Portal/Sector/Secretar%C3%ADaGenera<br />

l/SEDI/OESEDI/Proyectos/NPA/UsoEficientedeTICs/MuNet<br />

FaseI/tabid/1767/language/es–CO/default.aspx<br />

[February, 2012]<br />

[5] Iberomunicipios, V Premio Iberoamericano de Ciudades<br />

Digitales, On Line document<br />

http://www.iberomunicipios.org/premio/def1.aspx?idn=1005<br />

3&idm=10166&ids=10735 [February, 2012]<br />

[6] Lasagna, M, 1.- Programa MuNET: Productos y Resultados,<br />

On Line document<br />

http://www.educoas.org/RestrictedSites/Curso1/Newsletter-<br />

Agosto06/Paratenerencuenta17.html [February, 2012]<br />

[7] OEA, Firman en la OEA acuerdo sobre desarrollo municipal<br />

en países andinos y centroamericanos, On Line document<br />

http://www.oas.org/oaspage/press_releases/press_release.asp<br />

?sCodigo=C-171/04 [February, 2012]<br />

[8] OEA, oeainnovacionesyalianzas.org, On Line document<br />

http://www.oeainnovacionesyalianzas.org/ [February, 2012<br />

[9] Porrua, M, Introducción al Programa MuNet, On Line<br />

document<br />

http://hasp.axesnet.com/contenido/documentos/Caracas%20e<br />

Gobierno%202005%20-<br />

191<br />

%20Introducci%C3%B3n%20Programa%20MuNet.ppt<br />

[February, 2012]<br />

[10] Porrua, M, MuNet: municipal efficiency and transparency,<br />

On Line document http://www.it4allbilbao.org/ponentes/Miguel_A_Porrua.pdf<br />

[February, 2012]<br />

[11] Saenz, J, Experiencias y perspectivas de Gobierno<br />

Electrónico a nivel local en la región LAC, On Line<br />

document<br />

http://www.cofemer.gob.mx/images/stories/conferencias/XX<br />

I_Conferencia_Nacional_de_MR/Javier_Sanz.ppt [February,<br />

2012]<br />

[12] Saenz, J, et al, MuNet, a new way to improve municipalities,<br />

Proceedings of the 3rd International Conference on Theory<br />

and Practice of Electronic Governance ACM International<br />

Conference Proceeding Series; Vol. 322, Pages: 240–245,<br />

2009, On Line document<br />

http://doi.acm.org/10.1145/1693042.1693090 [February,<br />

2012]<br />

[13] Villagrán, S, MuNet (Municipios Eficientes y<br />

Transparentes), On Line document<br />

http://www.protic.org/proyectos.shtml?&sh_itm=df10f42820<br />

87ae1170cbb506cafb2fd2.<br />

[14] Field, T., Mield, T., Muller, E. and Law, E., The e-<br />

Government Imperative. Organization for Economic Cooperation<br />

and Development, ISBN 92-64-10117-9, Paris,<br />

France, 2003, available at http:213.253.134.43/<br />

oecd/pdfs/browseit/4203071E.PDF.<br />

[15] Canadian International Development Agency, CIDA,<br />

http://www.acdi-cida.gc.ca/home.<br />

[16] Corporación Andina de Fomento,<br />

http://www.caf.com/view/index.asp?ms=19<br />

[17] Organization of American States (OAS), Executive<br />

Secretariat for Integral Development (SEDI),<br />

http://www.oas.org/en/sedi/<br />

[18] National Secretary of Science and Technology (SENACYT),<br />

http://www.concyt.gob.gt/


ICT Policy in Africa - A Comparative Study of Ghana and<br />

Kenya Drawing on Lessons from Developed Countries<br />

ABSTRACT<br />

Kenya and Ghana realized that developing a National Information<br />

Communication Technology Policy (NICTP) is vital for the<br />

development of a nation. They also realized that Information and<br />

Communication Technology (ICT) sector is a key accelerator to<br />

development. The two countries have made progress including<br />

liberalization of the ICT sector. The ICT sector has changed<br />

considerably in the two countries. However, there is need to<br />

review all stages of the policy and come up with suggestions for<br />

improvements or gaps that need to be filled. This paper looks into<br />

the process of reviewing Kenya and Ghana NICTP by applying<br />

the benchmarking process as a supporting tool for policy-making<br />

and improvement. The paper illustrates the analysis carried out<br />

and the results from five successful countries recognized<br />

worldwide on ICT policy formulation, policy focus areas and<br />

policy implementation. Besides the policy process and<br />

stakeholder‘s involvement, the ICT policy goals, objectives and<br />

mission are discussed. The institutional arrangements for driving<br />

the ICT policy at regional and international dimensions, as well as<br />

the implementation processes, policy comparison and monitoring<br />

are elaborated. The paper winds up with recommendations on how<br />

the policy comparison processes should be conducted.<br />

Categories and Subject Descriptors<br />

K.4 COMPUTERS AND SOCIETY<br />

K.4.0 General<br />

K.4.1 Public Policy Issues (privacy, regulation, transborder data<br />

flow).<br />

General Terms<br />

Legal Aspects<br />

Keywords<br />

ICT, NICTP, benchmarking, policy, mission, vision<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies<br />

are not made or distributed for profit or commercial advantage and that<br />

copies bear this notice and the full citation on the first page.<br />

Copyrights for components of this work owned by others than ACM<br />

must be honored. Abstracting with credit is permitted. To copy<br />

otherwise, to republish, to post on servers or to redistribute to lists,<br />

requires prior specific permission and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Agnes Owuato Odongo<br />

Kenya electricity generating company limited<br />

P.O Box 79439.00200 Nairobi, Kenya<br />

Mobile No. +254-722-273-589<br />

agwuato@yahoo.com<br />

192<br />

1. INTRODUCTION<br />

ICT policy is a formal statement that specifies the objectives,<br />

goals, principles, strategies, etc intended to direct and control the<br />

development, operation and use of ICT. ICT policies must<br />

consider additional policies like education, trade and investment,<br />

foreign, monetary, transport polices, etc. ICT policies have been<br />

recognized by the African executives. The PANAFTEL network<br />

concept was approved in 1976. The PANAFTEL coordinating<br />

committee was established in 1973, to mobilize the resources<br />

necessary for the establishment of the system and to implement<br />

the network speedily. By 1982 a basic telecommunications<br />

infrastructure had been constructed within Africa, allowing intra-<br />

African telecom traffic, largely avoiding the previous long,<br />

complex and very expensive transit routes through Europe. By the<br />

end of 1982, 67 routes between African countries were available<br />

by using Intel sat satellite circuits. African authorities and the<br />

private sector should become more involved in the network<br />

exploitation through the different telecommunications<br />

restructuring processes; and to modernize the network by<br />

judiciously combining all technologies to build the continent<br />

telecommunications network representative. This should meet the<br />

countries need and prepare Africa for insertion within the global<br />

information technology infrastructure (GII).<br />

1.1Ghana<br />

The National Information Communication Technology Policy<br />

(NICTP) development process for Ghana started in the year 2003<br />

as a result of the perceived lack of guidance on ICT [8]. The lack<br />

of ICT Policy and existence of isolated initiatives led to random<br />

adoption of different systems and standards, resulting in<br />

unnecessary duplication of effort hence wastage of resources.<br />

Benefits of effective adoption of ICT are likely to result not only<br />

in an increase in connectivity or access, but more importantly the<br />

benefits acquired from the facilitation of new types of<br />

development solutions and economic opportunities that the<br />

utilization of ICT makes possible.<br />

Ghana ICT Policy Process [8] has been touted as the most<br />

participatory policy development process on the continent.<br />

Extensive consultation with major stakeholders was conducted<br />

throughout the length and breadth of the country in search for<br />

national priorities and needs, as well as to sensitize the<br />

community prior to the development of the ICT4AD framework<br />

document and the eventual write-up of the policy document,<br />

action plans and legislations.<br />

The opportunities are envisaged in the National Strategy to<br />

simultaneously target the development of the ICT sector and<br />

industry as well as use ICTs as a broad-based enabler of


developmental goals, with emphasis on the development,<br />

deployment and exploitation of ICTs, to aid the development of<br />

all other sectors of the economy. The said NICTP was essential<br />

and necessary to guide the ICT development in Ghana. The<br />

NICTP development was a four step process [8] under which<br />

these are some of the decisions made:<br />

To create enabling environment to facilitate the deployment,<br />

utilization and exploitation of ICTs<br />

• To support the development of a viable knowledge-based<br />

ICT industry<br />

• To facilitate the modernization of the agricultural sector<br />

• To support the development of a competitive high valueadded<br />

services sector<br />

• To aid the process of developing a national human resource<br />

capacity and the nation’s R&D capabilities<br />

• To promote an better educational system that deploys ICTs<br />

• To facilitate a wide-spread deployment and exploitation of<br />

ICTs within the society<br />

• To support the modernization of civil and public service<br />

• To facilitate the development, expansion, rehabilitation and<br />

the continuous modernization of the national information and<br />

communications infrastructure<br />

• To guide development and implementation of e-government,<br />

e-commerce and business strategies and action plans<br />

• To facilitate development and implementation of necessary<br />

legal, institutional and regulatory framework and structures<br />

The policy was approved and published in 2005, this was the first<br />

phase. The publishing of the policy followed implementation<br />

strategy as the ICT policy development process. This first policy<br />

implementation process was faced with various challenges that<br />

made the phase less effective in delivering the objectives. Some of<br />

the challenges experienced are that [8]:<br />

• Ghana has a relatively high population growth rate<br />

• Ghana has a youthful population; about 60% are under 25<br />

years of age and 5% over 65 years of age<br />

• Ghana has a high illiteracy rate with close to 40% of the<br />

population without any form of education<br />

• Ghana has a high primary school dropout rate close to 50%<br />

fail to progress secondary school and senior secondary<br />

school leavers failing to continue with their education.<br />

• Close to 40% of Ghanaians currently lives below the poverty<br />

line and 10 regions of the country currently have more than<br />

40% of their people living in poverty.<br />

Ghana recognized that the socioeconomic problems and<br />

challenges facing it are likely to be compounded by the new<br />

challenges posed by globalization and the information age,<br />

namely [22]: narrow export base dominated by traditional exports;<br />

under-developed physical infrastructure; Poor and limited<br />

communications infrastructure, etc. And that for it to make<br />

progress in developmental process, the nation has to take step to<br />

address the developmental challenges and to put in place efforts to<br />

address the additional challenges posed by globalization and the<br />

information revolution.<br />

From these weaknesses and challenges, Ghana saw a need of<br />

reviewing the policy to address the observed weaknesses and<br />

challenges, synergies and regional cooperation in ICT policies and<br />

harmonize regional policy framework in order to achieve<br />

economies of scale. Ghana through the formulation of a number<br />

193<br />

of socioeconomic development policy frameworks over the years<br />

has identified a number of key developmental objectives to<br />

address the developmental problems facing the country. Of these<br />

policy frameworks, the key ones are Vision 2020 Socioeconomic<br />

Development Framework, the Ghana Poverty Reduction Strategy<br />

(2000-2004), the Ghana Science and Technology Policy and the<br />

Coordinated Program for Economic and Social Development of<br />

Ghana (2003-2012). Some of the key socioeconomic development<br />

objectives of Ghana as the policy Frameworks [8]:<br />

• The social and economic pressures of a youthful population<br />

• Rapid population growth and declining per capita income<br />

• An under-performing agricultural sector<br />

• An economy dominated by the agricultural sector with weak<br />

under-developed industrial and service sector<br />

• The Ghana heavy debt burden<br />

• The disproportionate informal private sector<br />

• Low professional, technical and managerial manpower base<br />

• Relatively high proportion of population illiteracy<br />

• Low job creation capacity of the economy<br />

• Narrow export base dominated by traditional exports<br />

• Under-developed physical infrastructure<br />

• Poor and limited communications infrastructure<br />

Socioeconomic problems and challenges facing Ghana are likely<br />

to be compounded by the new challenges posed by globalization<br />

and the information age. And that for Ghana to make progress in<br />

its developmental process, the nation in addition to taking steps to<br />

address these developmental challenges will also need to put in<br />

place efforts to address the additional challenges posed by<br />

globalization and the information revolution.<br />

1.2 Kenya<br />

The National Information Communication Technology Policy<br />

(NICTP) development process for Kenya started in the year 2003<br />

as a result of the perceived lack of guidance on ICT [14]. The<br />

Government recognizes the role of ICTs in the social and<br />

economic development of the nation and has promulgated a<br />

national ICT Policy based on the Economic Recovery Strategy for<br />

Wealth and Employment Creation (2003-2007). The move to<br />

develop a national ICT policy was triggered BY three key and<br />

mutually reinforcing factors namely the fast and haphazard<br />

growth of information technology that lacked direction and<br />

regulation; the desire to develop the national ICT policy<br />

guidelines to steer development of ICTs in order to address the<br />

disorder; and the readiness of UNESCO to fund the process.<br />

This policy seeks to facilitate sustained economic growth and<br />

poverty reduction; promote social justice and equity; mainstream<br />

gender in national development; empower the youth and<br />

disadvantaged groups; stimulate investment and innovation in<br />

ICT; and achieve universal access [14]. It is based on<br />

internationally accepted standards and best practices, particularly<br />

the COMESA Model adopted by the COMESA Council of<br />

Ministers in March 2003.<br />

The policy is based on four guiding principles: 1) infrastructure<br />

development 2) human resource development 3) stakeholder<br />

participation 4) appropriate policy and regulatory framework.<br />

The Government recognizes that there is a growing digital divide<br />

between the countries that are highly endowed and developed in<br />

the field of information technology and Kenya as well as between<br />

rural and urban areas in the country. The said NICTP was


essential and necessary to guide the ICT development in Ghana.<br />

The NICTP development was done by four committees under the<br />

supervision of Ministry of Information and Communication given<br />

the mandate by the government to formulate the ICT policy.<br />

The policy formulation process was in form of consultations that<br />

followed a three-tier approach at the national, provincial and<br />

district levels with stakeholders that included the Private Sector,<br />

Civil Society, Development Partners and local communities. This<br />

approach led to the formation of a National Steering Committee of<br />

stakeholders charged with the responsibility of spearheading<br />

consultations and ensuring inclusion at all levels; and chaired by<br />

Minister for Information and Communication. Also involved in<br />

the process were Kenya's development partners; civil society<br />

representatives and government officials. The government has<br />

implemented ICT policy reforms between 1999 and 2006 which<br />

resulted in a number of structural changes in the ICT sector.<br />

Several policy documents were released namely in January 1997,<br />

April 1999, and Dec 2001[14].<br />

The Kenya ICT policy was approved and published in 2006. The<br />

publishing was followed by implementation of the strategy that<br />

was faced by various challenges so the implementation less<br />

effective in delivering the objectives stated in the policy<br />

document. Some of the challenges experienced are that [14]:<br />

• To harness the potential of ICTs for economic growth and<br />

poverty reduction<br />

• Lack of a comprehensive policy and regulatory framework<br />

• Inadequate infrastructure<br />

• Insufficient skilled human resources<br />

Kenya recognized that the socioeconomic problems and<br />

challenges facing it are likely to be compounded and that for it to<br />

make progress in developmental process; the nation has to take<br />

step to address the developmental challenges and to put in place<br />

efforts to address the additional challenges posed by globalization<br />

and the information revolution.<br />

From these weaknesses and challenges, Kenya saw a need of<br />

reviewing the policy to address the observed weaknesses and<br />

challenges, synergies in ICT policies and harmonize regional<br />

policy framework in order to achieve the set objectives. Kenya<br />

through the formulation of a number of socioeconomic<br />

development policy frameworks over the years has identified a<br />

number of key developmental objectives to address the<br />

developmental problems facing the country as listed below [14]:<br />

Policy, legal and regulatory framework, ICT infrastructure, human<br />

resource development, electronic learning, universal access,<br />

public-private partnerships (ppp), e-government, Electronic<br />

commerce, content development, electronic security, ICT<br />

leadership, engendering ICT, and youth and ICT<br />

Kenya has had a long history of economic leadership in East<br />

Africa as one of the largest and most advanced economies in the<br />

region. However, inconsistent efforts at structural reforms and<br />

poor policies over the past decades have generated a prolonged<br />

period of decline in development indicators and significantly<br />

eroded the leadership position, at a time when other countries in<br />

the region have made significant strides. While Kenya was a<br />

prime choice for foreign investors seeking to establish a presence<br />

in Eastern and Southern Africa in the 1960s and 1970s, poor<br />

economic policies or inconsistent efforts at structural reforms,<br />

increased problems of corruption and governance, and the<br />

194<br />

deterioration of public services have discourage Foreign Direct<br />

Investment (FDI) since the 1980s.<br />

Therefore, for Kenya, to make progress in the developmental<br />

process, the nation in addition to taking steps to address these<br />

developmental challenges will also need to put in place efforts to<br />

address the additional challenges posed by globalization and the<br />

information revolution. Some of the key investment laws are<br />

outdated and fail to account for modern practices and principles in<br />

conducting and regulating business. A large degree of<br />

discretionary power is left to the civil service in administrating<br />

and enforcing the principles laid out in the laws.<br />

This paper underlines the need and effective process of NICTP<br />

review suitable for Ghana and Kenya, and the analysis of the key<br />

success factors that need to be considered during undertaking of<br />

the review task.<br />

2. METHODOLOGY<br />

ICT is dynamic and therefore the processes and activities keep<br />

changing within short time scales. The rapid changes in the ICT<br />

sector affect key decisions made and essentially call for an up to<br />

date environmental scan. Due to the dynamic nature of ICT,<br />

benchmarking emerges to be the best tool for policy review. In<br />

this paper, a review of the ICT Policy formulation of fast growing<br />

countries in recent years namely Australia, Korea, Malaysia,<br />

Canada and Singapore is considered effective. In the final phase,<br />

an analysis on how the Kenya and Ghana ICT Policy was<br />

developed and implemented is made and thus exposing the<br />

commonalities and differences.<br />

2.1 Source of Information<br />

In this paper, key documents reviewed and analyzed included the<br />

following: National ICT policies for Kenya, Ghana, Singapore [2]<br />

[20], Korea [13] [15], Canada [10], Australia [6] [5] and Malaysia<br />

[1] [16]. Other documents are [12] [7]:<br />

2.2 Selecting the Five Relatively Successful<br />

Countries for Benchmarking<br />

The selection of countries for benchmarking was based on the<br />

ranking of ICT Development Index (IDI) 2010 report released in<br />

February 2012 by ITU [9] (http://inwent-iijlab.org/Weblog/2010/07/26/ict-development-index-itu-omitssierra-leone-again/).<br />

Ghana has been touted to be the ICT hub of<br />

West Africa was ranked 116 th and Kenya 115 th . The republic of<br />

Korea was ranked 3 rd ; and Australia, Singapore Canada and<br />

Malaysia was ranked 14 th , 19 th , 26 th, and 56 th respectively.<br />

The desktop survey was used to review the policies of Australia,<br />

Canada, Republic of Korea, Singapore, and Malaysia based on the<br />

IDI 2010 results as indicated above. In the final stage, the<br />

Benchmarking analysis of the ICT policy cycle (formulation,<br />

implementation and review process) in Kenya and Ghana was<br />

considered against experiences of five relatively successful<br />

countries namely Singapore, Korea, Canada, Australia and<br />

Malaysia. The research of this paper is discussed within the<br />

context of: 1) the policy development process and stakeholders<br />

involvement 2) the ICT policy goals, objectives and mission 3)<br />

ICT policy focal areas 4) institutional arrangements driving the<br />

ICT policy development and implementation 5) regional and<br />

international dimensions 6) implementation processes 7) policy<br />

monitoring, evaluation and review.


3. BENCHMARKING AS A POLICY<br />

REVIEW TOOL<br />

1. Translate obstacles into<br />

more concrete concerns<br />

2. Develop the basis of<br />

specification of policy<br />

actions<br />

Policy Mission &Vision<br />

Too general to measure<br />

1. Measure output and<br />

outcome of policy<br />

implementation<br />

2. Review and benchmark<br />

the prevailing status<br />

Policy<br />

challenges<br />

Policy<br />

objectives<br />

Policy<br />

focus goals<br />

Inter-regional<br />

benchmarking<br />

Indicators<br />

Benchmarking:<br />

1. Determine if goals Policy<br />

been met<br />

assessment<br />

2. If no asses the reasons<br />

Adapted from Selhofer 2003<br />

Conclude and recommend<br />

www.observatory.gr/files/meletes/<br />

BISER_Benchmarking_Rep.pdf<br />

Figure 1. Policy making roles benchmarking<br />

Benchmarking has different meaning based on the institutional<br />

and organization set-up in which it is applied. It can be used to<br />

measure the success factors of a policy towards developing an<br />

ICT society. There are several regional benchmarking options like<br />

bottom-up, top down, horizontal approaches etc. In the bottom-up<br />

approach, regions get together and agree among themselves on a<br />

set of common indicators. Since the region has different policy<br />

framework, it is not possible to apply the method initially. The<br />

choice of indicators is a result of a compromise among different<br />

regions without top-bottom coordination. This implies that the<br />

same indicator can measure different parameter in different<br />

regions for example a measure of policy output, results, and<br />

impacts, or a simple framework of readiness indicator could be<br />

adopted [19].<br />

This paper considers the position of indicators into the policy<br />

review process and benchmarking as stipulated in Figure 1. The<br />

role of benchmarking is to determine policy challenges through<br />

policy evaluation that have impact on the policy review process.<br />

3.1 Policy Development, Review Process and<br />

Stakeholders Involvement<br />

The policy formulation of five selected countries demonstrate<br />

several advantages of involving stakeholders like the private<br />

sector, academia and civil society organizations such as<br />

professional bodies in the policy processes. The process for<br />

development of Australian, Canada, and Singapore, Malaysia and<br />

Korea ICT policies had consultative meetings with a range of<br />

stakeholders. Of interest is the case of Australia where the<br />

stakeholders were approached by e-mail regarding their<br />

discussions on effective use of ICT by citizens and consumers<br />

across civil society [5] [5].<br />

The government should involve key stakeholders in the policy<br />

formulation process in order to affect its outcomes. Kenya did not<br />

involve all key stakeholders [14]. In principle, the policy lacked<br />

195<br />

ownership of the majority of the stakeholders. The National ICT<br />

Policy and Plan Development Committee of Ghana were involved<br />

all key stakeholders and had an integrated approach to their<br />

national ICT development process. The process became an all<br />

inclusive venture and ensured that the policy development process<br />

and final product is acceptable to all [8]. In principle, the policy<br />

had ownership of the majority of the stakeholders and had clear<br />

harmonized approach to its implementation strategies.<br />

3.2. Benchmarking ICT Policy Vision,<br />

Missions and Objectives of Selected Countries<br />

Compared to the Ghana’s and Kenya’s<br />

The policy vision, mission and objectives of Korea, Australia,<br />

Canada, Malaysia and Singapore emphasize on addressing citizen<br />

problems which are similar to those of Kenya and Ghana.<br />

Furthermore, countries like Singapore [20] and Malaysia [16] [17]<br />

have provided milestones in the policy. Malaysia’s vision is to<br />

utilize ICT to transform progressively to information and a<br />

knowledge society; and as the fifth economy pillar of the<br />

economy and transforming the country to a regional ICT hub.<br />

Ghana NICTP vision statement: “Ghana to improve the quality of<br />

life of the people by significantly enriching their social, economic<br />

and cultural well-being through the rapid development and<br />

modernization of the economy and society using information and<br />

communication technologies as the main engine for accelerated<br />

and sustainable economic and social development; the vision<br />

statement sets out the roadmap for developing Ghana’s<br />

information society and economy and provides a basis for<br />

facilitating the socioeconomic development of the country in the<br />

emerging information, knowledge and technological age to be<br />

dominated by information and knowledge-based economies” [8].<br />

The Kenya policy vision is “A prosperous ICT-driven Kenyan<br />

society” and the mission statement is “to improve the livelihoods<br />

of Kenyans by ensuring the availability of accessible, efficient,<br />

reliable and affordable ICT services” [14]. The policy vision,<br />

mission and objectives of Kenya and Ghana lacks milestones of<br />

how to achieve these compared to Singapore above. Emphasis on<br />

universal access is lacking in the vision and mission statement as<br />

the success of becoming the ICT hub depending on accessibility<br />

issues; that includes the concept of digital divide between access<br />

in urban/rural and national/international relations.<br />

3.3. Strategic ICT Leadership<br />

The objective of the Strategic ICT leadership involves an increase<br />

in the use of ICT for equitable and sustainable socioeconomic and<br />

cultural development, aiming at improving the awareness on the<br />

role and potential of ICT. In so doing, creating an authoritative<br />

national organization to effect, coordinate and review the ICT<br />

policy. The role of prioritizing ICT investment in development<br />

assistance policies and programs, enhancing synergy, economies<br />

of scale and productivity in all ICT matters and creating a<br />

favorable environment for cooperation and partnership in ICT<br />

among public and private sectors, civil society became an<br />

important ingredient to its development. This is in consistent with<br />

best-practice in Singapore, Korea, Canada, Australia and Malaysia<br />

picking a few supporting examples. The review process has to<br />

follow this definitive focus. The case of Ghana and Kenya the<br />

level of leadership is not ranked high like in Korea where ICT<br />

policy committee is chaired by the prime minister. Ghana ICT<br />

policy committee chair person is a university professor, while in


Kenya it is the minister for Information Communication ministry.<br />

The political goodwill may not be achieved easing in order to<br />

support policy implementation.<br />

3.4 ICT Infrastructure<br />

Infrastructure covers both national and institutional levels. At<br />

national levels, a system to ensure usefulness of the installed<br />

infrastructure has to be assured of. In Kenya’s and Ghana’s case<br />

for instance, building the broadband infrastructure is an agenda.<br />

Achievements realized in Korea, Malaysia, Canada, Australia and<br />

Singapore is as a result of broadband deployment. All countries<br />

based on the objectives of the respective Act, targets were set<br />

which include:<br />

• An increase in penetration for the whole country and rural<br />

areas respectively. An interim target of 30 per 100 persons<br />

had been set for Malaysia by the year 2005 and fully<br />

developed by year 2020 for example [1].<br />

• Quality of service at affordable costs.<br />

• Infrastructure development, communications and multimedia<br />

infrastructures with adequate and effective plans for<br />

supporting overall economic development.<br />

• Creation of a hub to serve the global hub of communications<br />

and multimedia industry in this region.<br />

Development of ICT infrastructure is mentioned in the policy. The<br />

policy went further to mention need for provision of infrastructure<br />

e.g. energy and roads, support software development, promotion<br />

of local manufacturing among others. The policy recognizes<br />

power of open source software. However, the policy is just<br />

generic. The Kenya ICT policy is not providing details on how it<br />

will promote local software development. The Ghanaian Policy<br />

proposes no duty on computer hardware [8]. The policy for the<br />

benchmarked five countries are explicit on how to go about by<br />

saying that foreign owned and multinationals who will establish<br />

such production facilities and employ the local workforce, shall be<br />

offered special incentives. This can be part of technology transfer<br />

to the local workforce.<br />

The Kenya NICTP has several objectives concerning broadband<br />

issues to hitherto disenfranchised and isolated populations in the<br />

country and to extend the connection to the neighboring countries.<br />

The fact finding report revealed that, the private sector especially<br />

the mobile operators have invested substantially in developing an<br />

efficient infrastructure [4] [11]. However, interoperability,<br />

reliability and rural access are still a challenge in some parts of the<br />

country based on the provider to the initiative. Infrastructure<br />

sharing is the most sustainable and efficient way of rolling out<br />

infrastructure, even though it is facing internal resistance from the<br />

operators who consider their infrastructure as a business<br />

differentiation tool.<br />

The Ghana NICTP has several objectives concerning universal<br />

access issues to hitherto disenfranchised and isolated populations<br />

in the country. The fact finding report revealed that, in the private<br />

sector especially the mobile services have grown thus increasing<br />

the number of service providers. Spacefon, a GSM operator is the<br />

only mobile phone operator that has deployed its services in all<br />

the ten regional capitals and most key cities and towns across the<br />

country [8]. However, interoperability, reliability and rural access<br />

are still a challenge in the country to the initiative. Infrastructure<br />

sharing is the best as the sustainable and efficient way of rolling<br />

out infrastructure. Ghana Telecom, the national carrier that is<br />

supposed to be at the forefront of ICT development is struggling<br />

196<br />

and has failed to keep up with the times. The problems of Ghana<br />

Telecom are further compounded by the array of legal battles it<br />

has found itself to deal with. Telekom Malaysia has been<br />

throwing legal challenges to the national carrier and the Ghana<br />

government.<br />

3.5 The ICT Industry and Human Resource<br />

The ICT industry is service or hardware manufacturing or<br />

assembly based. Companies should be involved in all aspects of<br />

the business. A national ICT policy could stimulate the<br />

establishment, development and growth of ICT businesses<br />

through incentives and support provision. In Korea for example,<br />

several strategies to enhance productivity and efficiency across<br />

economic sectors and SMEs through the use of ICT were set and<br />

it worked. Furthermore, the International Cooperation Division of<br />

Department of Information Technology has been set up to<br />

promote international cooperation in the emerging and frontier<br />

areas of information technology under bilateral, multilateral or<br />

regional framework. Such interaction provides an opportunity for<br />

sharing of knowledge and experience with countries, international<br />

bodies, academia and institutions for forging partnerships for<br />

mutual progress.<br />

As far as international cooperation with Korea is concerned, it<br />

has been envisaged to promote the investment flow from Korea<br />

to the Indian ICT hardware sector, exploitation of<br />

complementarities, development of technology, human resource<br />

development, next generation ICT industry, Broadband<br />

infrastructure, E-Governance, etc. Two major Korean companies<br />

LG and Samsung are established brand names in Indian<br />

households and have already acquired a major share of the Indian<br />

market in the electronics and white goods segments. The Indian<br />

customers are happy with the pricing and service provided [21].<br />

NICTP was to make Ghana and Kenya a producer and not a mere<br />

consumer of ICT products and services. It is thus clear that the<br />

ICT Policy is expected to create conducive environment for a<br />

vibrant and sustainable ICT industry, making the country a more<br />

competitive developer and producer of ICT products and services.<br />

The policy lacks support to entrepreneurship and emphasis on<br />

small and medium enterprises (SMEs). On human resource<br />

development, Korea, Australia, Canada, Singapore and Malaysia<br />

defined it clearly in their ICT policies. Malaysia set several<br />

objectives to improve the human resource capacity that stimulates<br />

improving science and technology courses, the use of e-learning<br />

and training teachers on ICT skills. Korea, Singapore, Canada and<br />

Australia trained the mass so that the mass is able to use the<br />

technology and appreciate the advantages.<br />

Kenya and Ghana NICTP provides for the development of an ICT<br />

ready workforce with the objective of increasing human resource<br />

ICT skills, support ICT training for political decision-makers,<br />

community and civil society leaders, as well as private and public<br />

sector executives, expand and develop the teaching of ICT at all<br />

levels of the national system of formal and informal education and<br />

training, to foster interest among scientists and citizen at large.<br />

However, the policy does not address how this is achieved. Korea<br />

set up a 3rd Basic Plan for Informatization Promotion (2002-<br />

2006) issued in April 2002, to provide every Korean with learning<br />

opportunity by fostering an online learning environment and<br />

training on Internet usage skill [15. Kenya and Ghana policy does<br />

not focus on regional linkages in human capacity development,<br />

for collaboration and knowledge sharing.


3.6 ICT Productive and Service Sectors<br />

The inception and diffusion of ICT in the production sectors<br />

forms an important basis for exploitation of the ICT muscles at<br />

the full-scale. The ICT policy needs to strengthen the competitive<br />

and comparative advantage of hardware and ICT service providers<br />

locally, regionally and internationally. Policies of some countries<br />

have focused on local companies over foreign-owned companies<br />

just as is the case with Korea ICT policy‘s priority to enhance<br />

productivity and efficiency across economic Sectors and SMEs<br />

through [13] [15]. Kenya and Ghana NICTP focuses on local<br />

companies to contribute to the reduction of poverty and to<br />

improve the quality of life of Kenyans and Ghana people,<br />

fostering enterprise, entrepreneurship and innovativeness for<br />

sustainable socio-economic and economic development.<br />

3.7 ICT Legal and Regulatory Framework<br />

Many of the leading countries in ICT policy formulation and<br />

implementation formulated regulatory and legal frameworks for<br />

easy implementation of the ICT policy. Singapore and Korea<br />

created several acts and regulations that provided legal<br />

recognition of electronic contracts and electronic signatures [13]<br />

[15]. Malaysia on the other hand, developed Digital Signature Act<br />

1997 to give a digital signature the same legal status as an<br />

ordinary signature, thumbprint or other binding mark in use [16]<br />

[17]. Above all, Singapore and Malaysia enacted binding laws on<br />

cyber crime and Korea created laws for online procurement.<br />

Deployment of the necessary infrastructure to support secure<br />

electronic transactions for e-business and e-government need be<br />

implemented. Korea, Australia, Singapore, Canada and Malaysia<br />

are well known worldwide as the leading in the implementation of<br />

e-government. Other entailing key issues include measures to<br />

protect the confidentiality and privacy of citizens, increase the<br />

level of awareness on information security threats and best<br />

practices to safeguard data. Singapore established cabinet<br />

agencies to oversee ICT policy development. The key question is<br />

whether there is one best institutional model for policy<br />

development and implementation. It is critical that agency or<br />

commission leads in ICT planning and development.<br />

Technological development to regulate is critical. Digital<br />

technology has enabled the use of one digital network to distribute<br />

services that used to require different analogue networks. Thus,<br />

broadcasting, telephony and internet can be delivered using one<br />

network. Malaysia‘s Communications and Multimedia<br />

Commission [16] [17] and Singapore‘s Infocomm Development<br />

Authority [1] [21] are good examples.<br />

The Kenya Communications Commission of Kenya (CCK) is a<br />

convergence regulator bringing the convergence concept in<br />

communication sector to reality in Kenya [14]. The policy talks of<br />

strengthening the mandates of CCK to ensure quality and<br />

compatibility of IT products and services. However, the policy is<br />

quiet about the modes of strengthening needed and seems to<br />

ignore the importance of other standard bodies and professional<br />

groups to assist. There is no dedicated regulator for "ICT" in<br />

Kenya. The National Communications Secretariat has struggled<br />

with a culture of secrecy, which has made cooperation with more<br />

progressive entities such as the CCK and the Directorate of Egovernment<br />

housed inside the President's office. Emphasis is<br />

needed on confidentiality and privacy, formulation of the National<br />

197<br />

Information Security Strategy and promoting adoption of<br />

Information Security Standards at national level.<br />

The National Communication Authority (NCA) was established<br />

by an Act of parliament in 1996, to regulate the information and<br />

communication technologies (ICTs) industry in Ghana. Since<br />

inception the NCA focus has been on promoting growth of the<br />

communication sector and significant progress has been made in<br />

meeting the objectives. However, an area that needs similar<br />

attention is the “consumer” aspect of its mandate. Global trends in<br />

the ICT industry make it mandatory for consumer issues to be<br />

included in national regulatory structures. In addition, the world<br />

ICT governing body, ITU, upholds the need for regulators to carry<br />

the responsibility of addressing the consumer issues [17].<br />

3.8 Public Service and Local<br />

Many developed and developing countries focus on the use of ICT<br />

to enhance service delivery to the public. Remarkable efforts have<br />

been shown in many of these countries including Singapore,<br />

Australia, Canada, Korea and Malaysia. The five have set out<br />

goals for the use of ICT for delivering government services and<br />

have implemented the same. This pillar (Public service) in the<br />

Kenya and Ghana NICTP focuses on effective delivery of services<br />

to the public [14] [8]. The specific objectives of e-government<br />

outlined in NICTP are to increase the productivity of both the<br />

public and private sectors, empowering the public by building and<br />

e-Government platform that facilitates their relationship and<br />

interactions with the Government, and enhances the range and<br />

delivery of more effective public services at both central and local<br />

levels, while also generating accurate and timely information to<br />

better shape policies, strategic plans and tactical decisions for<br />

developing and enhancing the delivery of affordable public<br />

services. The policy has also outlined strategies for promoting<br />

good corporate and public governance by furthering information<br />

sharing, transparency and accountability. In Kenya and Ghana<br />

part of this pillar has been implemented and some government<br />

transactions are now done online.<br />

Compared to infrastructure development, content development<br />

has not received as much attention from governments worldwide.<br />

Already we see that lack of local content has driven Internet<br />

traffic in many countries to foreign sites. There are countries such<br />

as Singapore that have initiatives to develop local content.<br />

Singapore and Malaysia have laws and rules regarding<br />

objectionable Internet content [1]. Singapore is unique in<br />

combining government rules with industry self-regulation in<br />

managing content [21]. In some countries, governments are<br />

nervous about content, in particular one that is challenging the<br />

political and economic interests of the State or its allies. Content<br />

that has the potential for political mobilization also comes within<br />

the orbit of the State‘s surveillance, which is provided for by the<br />

laws enacted in those countries.<br />

While other countries have developed laws governing the<br />

management of local content, Kenya has done little in regard to<br />

this. The government should provide support, resources, and put<br />

laws in place. Ghana NICTP lacks local content.<br />

Korea has strategies for harnessing ICT for Social Development<br />

[13] [15]. These include the specific targets of increasing ICT<br />

integration in society, by providing access to ICTs to all<br />

communities including those isolated geographically or<br />

economically, provide universal access through the enhancement


of existing Public Internet Access Points (PIAPs), reducing the<br />

digital divide, by encouraging the youth to set up computer clubs<br />

aimed at encouraging their interest in IT-related fields and provide<br />

online access to express their needs.<br />

A commitment to universal access is the cornerstone of efforts to<br />

reach out to include everyone in the information economy and is a<br />

first step in bridging the digital divide. A funding mechanism to<br />

meet the cost of universal access has to be discussed and<br />

negotiated by the telecoms regulator and/or the government<br />

department/ministry responsible for this. Operators should<br />

contribute to the cost of rolling out access as part of their<br />

obligations under the licensing agreements they have signed with<br />

the local regulatory authority of the government.<br />

3.9 Institutional Arrangements for Driving the<br />

ICT Policy<br />

Kenya and Ghana have established CCK and NCA respectively as<br />

the sector ICT regulator just like Comparing Korea, Canada,<br />

Australia, Singapore and Malaysia with (. The regulator is an<br />

independent, credible, and effective quasi-government body<br />

whose functions are to regulate and monitor the ICT sector and<br />

foster competition through the issuance of licenses to operators<br />

and franchise holders. The regulator was established as part of the<br />

Government Policy reforms in the communication sector for both<br />

the countries with the aim of improving the availability of the<br />

info-communications services to the public as well as to allow<br />

new players into the market. Both CCK and NCA reports to the<br />

line Ministry in their respective countries.<br />

Furthermore, institutional arrangements for ICT policy<br />

implementations should consider the participation of both public<br />

and private sector and functional linkages between different key<br />

institutions should feature clearly in the policy.<br />

4. FORMULATION PROCESS OF KENYA<br />

AND GHANA ICT POLICY<br />

4.1 Kenya National ICT Policy Formulation<br />

Process<br />

Kenya developed its ICT policy as part of ICT for Economic<br />

Growth (2006) to represent the nation’s vision in the information<br />

age [14]. The aspirations set included Recovery Strategy for<br />

Wealth Creation and Employment as well as Poverty Reduction.<br />

The move to develop a national ICT policy was triggered off by<br />

three key and mutually reinforcing factors namely the fast and<br />

haphazard growth of information technology that lacked direction<br />

and regulation; the desire to develop the national ICT policy<br />

guidelines to steer development of ICTs in the country to address<br />

the disorder; and the readiness of UNESCO to fund the process.<br />

The development of a policy for the deployment of ICT for socialeconomic<br />

development in Kenya began in mid nineties. The<br />

policy is based on four guiding principles: infrastructure<br />

development, human resource development, stakeholder<br />

participation and appropriate policy and regulatory framework.<br />

The challenge is to harness the potential of ICTs for economic<br />

growth and poverty reduction [14].<br />

4.1.1 Kenya ICT Policy Framework<br />

In order to identify and address the critical factors for the success<br />

of the policy formulation and plan development process, and<br />

eventual ICT implementation process, extensive consultation with<br />

…<br />

198<br />

KENYA ICT POLICY FRAMEWORK: Tiered approach to<br />

sector management<br />

various institutions and organizations were conducted based on a<br />

Kenya opted for a tied framework with the policy instrument driving legal and regulatory aspects as<br />

3 tiered approach to sector management, figure 2 [14].<br />

Increasing level Specificity<br />

illustrated on first diagram.<br />

Instrument<br />

Policy &Vision-Policy<br />

Guidelines<br />

Regulation Framework-<br />

KCA 98<br />

Regulations-KCR 2001<br />

Operator License<br />

Source of Authority<br />

Stakeholder-<br />

Minister/Citizen<br />

Parliament<br />

Minister<br />

Regulator<br />

Figure 2: Kenya’s IT Policy Framework<br />

4.1.2 KENYA ICT Policy ICT POLICY Institutional FRAMEWORK Support Framework<br />

Institutional Positioning<br />

Policy<br />

Formulation<br />

Regulation<br />

Service<br />

Operation<br />

Consumers<br />

Ministry for Communication<br />

Communications<br />

Commission of Kenya<br />

Arbitration<br />

Advisory<br />

Legislature-Parliamentary Committee<br />

on Public Works, Energy and Communications<br />

National Communications<br />

Secretariat<br />

Appeals Tribunal<br />

Content oo<br />

Universal Access<br />

Universal Access Fund<br />

Service Providers, Telecoms, ISP Broadcasters ,Vendors<br />

Figure 3: Kenya’s IT Policy Institutional Framework<br />

4.1.3 ICT policy development process<br />

Economic Recovery Strategy for Wealth and Employment<br />

Creation gave birth to “Investment Program for the Economic<br />

Recovery Strategy for Wealth and Employment Creation 2003-<br />

2007 (IP-ERS)”, released in May 2004. The consultations<br />

followed a three-tier approach at the national, provincial and<br />

district levels with stakeholders that included the Private Sector,<br />

Civil Society, Development Partners and local communities. This<br />

approach led to the formation of a National Steering Committee of<br />

stakeholders charged with the responsibility of spearheading<br />

consultations and ensuring inclusion at all levels; and chaired by<br />

Minister of Information and Communication. Also involved in the<br />

process were Kenya's development partners; civil society<br />

representatives and government officials. The government has<br />

implemented ICT policy reforms between 1999 and 2006 which<br />

resulted in a number of structural changes in the ICT sector.<br />

Several policy documents were released at intervals namely in<br />

January 1997, April 1999, and Dec 2001.<br />

4.1.4 ICT Cardinal Pillars<br />

The Cardinal Pillars of the Kenya policy are: 1) education and<br />

Training 2) new opportunities 3) marketing networking and<br />

promotion 4) recruitment and retention 5) market intelligence and<br />

research 6) business support and investment.<br />

4.2 Ghana National ICT Policy Formulation<br />

Process<br />

Ghana developed its ICT policy [8] for Accelerated Development<br />

(ICT4AD) process led by the Economic Commission for Africa<br />

(ECA) within the context of the African Information Society<br />

Initiative (AISI). To the benefactor countries, the initiative served<br />

as a framework for a radical socioeconomic transformation of the<br />

countries through the deployment and exploitation of ICTs within<br />

the context of the challenges of the globalization and Information


Age. It is based on the policy framework document “An<br />

Integrated ICT-led Socioeconomic Development Policy and Plan<br />

Development Framework for Ghana”. The Ghana ICT4AD Policy<br />

Statement recognizes the aspirations and provisions of key<br />

socioeconomic development framework documents like Vision<br />

202o Socio-Economic Development Framework, Ghana Poverty<br />

reduction Strategy (GPRS) (2002 – 2004) and Coordinated<br />

Program for Economic and Social Development of Ghana (2003 -<br />

2012)<br />

4.2.1 ICT Policy Framework<br />

The development, deployment and exploitation of ICTs within the<br />

economy and society can contribute to and accelerate Ghana’s<br />

socioeconomic development process provided some critical<br />

success factors and conditions are addressed at the: national,<br />

organizational levels as well as at the level of individuals in the<br />

work place and in the society at large.<br />

4.2.2 Ghana’s ICT Policy - Institutional Support<br />

Framework<br />

Ghana ICT policy framework structure [22] formed four bodies to<br />

assume responsibility of coordinating, facilitating monitoring and<br />

subsequently ensuring the implementation of the policy:<br />

• The National ICT Policy and Plan Development Committee,<br />

constituted by the President, and chaired by a University<br />

Professor.<br />

• The Ministry of Communications as the host ministry and the<br />

policy implementation agency<br />

• The Ghana ICT Directory, as an implementation arm of the<br />

Ministry of Communications<br />

• The National Information Technology Authority, as a<br />

Presidential Advisory body<br />

4.2.3 Ghana’s ICT Policy Process<br />

Ghana ICT Policy Process [22] has been touted as the most<br />

participatory policy development process on the continent.<br />

Extensive consultation with major stakeholders was conducted<br />

throughout the length and breadth of the country in search for<br />

national priorities and needs, as well as to sensitize the<br />

community prior to the development of the ICT4AD framework<br />

document and the eventual write-up of the policy document,<br />

action plans and legislations. The development, deployment and<br />

exploitation of ICTs within the economy and society can<br />

contribute to and accelerate Ghana’s socioeconomic development<br />

process provided some critical success factors and conditions are<br />

addressed at the: national and organizational levels as well as at<br />

the level of individuals in the work place and in the society at<br />

large. It was a four step process [22] involving the development of<br />

a framework, development of a policy, followed by development<br />

of plans and eventually the implementation of the policy strategies<br />

and action plans. Ghana conducted extensive consultation with the<br />

stakeholders that was located across the length and breadth of the<br />

country. Participatory nature of the process was referenced by the<br />

ECA as a benchmark for its facilitated ICT Policies<br />

4.2.4 Ghana’s ICT Policy – Cardinal Pillars<br />

The Cardinal Pillars of Ghana ICT4AD Policy are as follows [8]:<br />

1) accelerating Human Resource Development 2) promoting ICTs<br />

in Education 3) facilitating Government administration and<br />

service delivery 4) facilitating private sector development 5)<br />

developing export-oriented ICT products and service industry 6)<br />

199<br />

modernizing agriculture and development of agro-business 7)<br />

developing a globally competitive value added service industry.<br />

4.3 Policy Priorities and Internet Regulation<br />

Despite the broad participation of multiple stakeholders in<br />

Ghana’s policy formulation process, and partial participation of<br />

stakeholder Kenya’s case, the implementation in both countries<br />

did not translate into action plans to acceptable level [8][17]. The<br />

establishment of the Ministry of Information Communications<br />

made it possible to update the policy framework and implements<br />

some flagship projects. Consequently there has been a major<br />

disconnection between communication policies that address<br />

access issues and broad based ICT policies that focus on the<br />

exploitation of ICTs as instrument of development. Although<br />

access to communication was improved through cellular services,<br />

progress with regards to fixed lines and broadband network that<br />

underpin ICT application has remained very low. Increasing<br />

access to affordable communication and developing human<br />

capacity are vital for the success of ICT policy.<br />

Although Kenya and Ghana have started internal processes of<br />

governance over the Internet by developing their own set of<br />

National ICT Strategies, infrastructure, technological and<br />

regulatory frameworks, there is wide gap between national policy<br />

and the regulation of online environment in the aspects of<br />

international communications infrastructure, content access and<br />

development, electronic trade and on-line applications. In<br />

particular Ghana is not focusing on local content in its policy.<br />

A team should be formed to address Internet issues. The policy<br />

review shows that there is an overlap in the priority areas, a<br />

reflection of the common social and economic challenges in the<br />

two countries. The overlap is evident particularly in the areas of:<br />

human resources development; broadband infrastructure<br />

development; policy; legislative and regulatory framework; ICT<br />

sector development; and ICT applications and content.<br />

Main areas of focus of ICT policy Include: ICT Leadership, ICT<br />

Infrastructure, ICT Industry, Human Capital, Legal and<br />

Regulatory Framework, Productive Sectors, Service Sectors,<br />

Public Service, Local Content and Universal access. Furthermore,<br />

the vision and mission expressed in the policy documents remain<br />

consistent, an indication of a degree of convergence in adopting<br />

common vision to harness information and communication<br />

technologies for development.<br />

The review indicates that; there is under emphasis of the need for<br />

highly skilled human resources and ICT research and<br />

development that could have long term economic and social<br />

benefits to the country. The smart use of ICTs in the universities,<br />

public and private sector is critical for national and regional<br />

competitiveness. The application of ICTs in agriculture and health<br />

has not been given equal attention considering number of<br />

workforce and resources devoted to these sectors in the country.<br />

4.3 Institutional Arrangement and<br />

Participation of Stakeholders<br />

Institutional arrangement and the participation of various<br />

stakeholders particularly the media, civil society, private sector<br />

and the academia provide a good indication of the maturity of ICT<br />

policy. The review of institutional arrangement shows that the<br />

more the ICT function is sponsored by the highest political<br />

leadership like the President, the better the chance of its success.<br />

Likewise, the higher the involvement of the major stakeholders in


the policy process e.g. formulation, implementation and policy<br />

review; the higher the ownership and the better the success in<br />

implementing ICT programs.<br />

Although Kenya and Ghana have relatively developed broad<br />

consultation process in the ICT sector, the participation of civil<br />

society in ICT policy issues has not been that consistent due to<br />

lack of a strong ICT civil society with a national coverage. Figure<br />

2 shows institutional framework for policy formulation and<br />

implementation for Kenya. The ministries formed by the two<br />

governments to administer the implementation of ICT policy<br />

should promote strong civil society participation. As a result of<br />

lack of limited ownership the formed ministries are expected to<br />

alleviate coordination challenges. It is necessary to encourage<br />

civil society participation and strong competitive private sector<br />

facilitated by good regulatory framework.<br />

Evaluation of the governance framework shows that various<br />

sectors and institutions continue to compete for external resources<br />

to meet their needs and concerns independently, rather than<br />

creating a favorable framework applicable to all. The main lessons<br />

drawn from the ICT policy can be summarized as follows:<br />

streamline institutional arrangements, establish the directorate of<br />

ICT at the Ministry of Communication Science and Technology<br />

has a high chance of success in the implementation of ICT<br />

programs and mobilize the resources.<br />

Since the Ministry to champion ICT exists in Ghana and Kenya,<br />

the established directorate will drive the policy process, develop<br />

priority and flagship projects and implement projects through<br />

public and private partnerships. The minister should act as key<br />

champions and sponsors for the ICT policy process. The<br />

separation of policy (political) and regulatory (procedural)<br />

function has been a key governance challenge. There is no one<br />

size fit strategy for the separation of policy and regulatory<br />

functions; however it is essential that the regulator is insulated<br />

from day-to-day interference of policy makers and secure its<br />

financial autonomy. The legitimacy of the regulator can be<br />

improved by enhancing competence and improving interaction<br />

with the public. A good coordination among institutions needs a<br />

champion Minister, trust and flexibility within the ICT policy.<br />

4.4 Implementation of ICT Policy<br />

In general terms, the ICT policy leads to an implementation plan<br />

benchmarked by flagship projects, although the presence of an<br />

implementation plan may not guarantee the success of policy. A<br />

review of the situation of Kenya and Ghana show that the<br />

implementation of the ICT policy is driven by external funding<br />

than a well thought-out plan that addresses the key building<br />

blocks like infrastructure, regulatory functions and human<br />

resources development as envisaged and monitored.<br />

Although NICTP existed, Kenya and Ghana did not develop the<br />

implementation strategy. Various projects targeted to the policy<br />

have been implemented with support from external donor<br />

agencies. The national fiber backbone network, Universal Access,<br />

and the e-government projects are among the current flagship<br />

projects for the implementation of the national ICT policy. The<br />

main objective of the national backbone project is to establish a<br />

telecom backbone transmission network to satisfy domestic and<br />

regional ICT requirements in the long term. It intends to provide<br />

long-distance telephone networks, data backbone networks and<br />

extend Internet bandwidth countrywide by offering sufficient<br />

capacities, network resiliency and guaranteed quality of service<br />

200<br />

provision to meet the needs of voice, data, mobile, internet, leased<br />

circuit etc.<br />

5. KEY FACTORS ON THE<br />

DEVELOPMENT OF NICTP<br />

The NICTP for Kenya and Ghana were analyzed using<br />

benchmarking principals and compared to other countries. The<br />

emerging issues from the work and the entailing findings are<br />

categorized in the following key elements summarized as: the<br />

policy process and stakeholders involvement; the ICT policy<br />

goals, objectives and mission; ICT policy focus areas; institutional<br />

arrangements to drive ICT policy, regional and international<br />

dimensions, implementation processes; and policy review and<br />

monitoring<br />

The Institutional framework for implementing the national policy<br />

implementation and monitoring was not described adequately in<br />

the Kenya policy; hence some roles were left hanging. Monitoring<br />

was not covered in the Ghana policy. It is my observation and<br />

strong feeling that the policy left a serious governance gap. Based<br />

on the review it can be concluded that, coordination of the<br />

implementation strategy was inadequate and resulted in<br />

misunderstanding on the way forward and a priority on where<br />

funds or source of funding for the proposed activities.<br />

6. CONCLUSION<br />

The analysis of the current NICTP development and<br />

implementation was conducted. Weaknesses were identified<br />

through the benchmarking analysis that compared Kenya and<br />

Ghana NICTP from other countries of similar nature but in<br />

different regions. The review shows that from the onset of the<br />

initiatives, drafting and development of the policy, stakeholders<br />

were not fully involved for Kenya’s as was the case of Ghana,<br />

thus resulting in: 1) lack of full ownership and operational<br />

institutional framework 2) poor participation of key stakeholders<br />

3) poor coordination during implementation 4) lack of coherent<br />

but integrated implementation strategies.<br />

Kenya and Ghana NICTP is very generic. It eliminates strategy<br />

from the vision where the policy looks at vision, principles and<br />

guidelines, the Strategy should look at implementation plan, by<br />

focusing on who is to do what by when, where, benefits and cost<br />

of implementing the policy. The policy ignores implementation<br />

and no action plan is provided in the entire document.<br />

Therefore, in order to rectify the situation, the policy review<br />

process has to consider changes in technology, new national and<br />

regional developments and recognize the need to add acts and<br />

policies to support policy implementation by creation enabling<br />

environment. A good policy with its implementation strategies<br />

and institutional framework has the potential of making ICT an<br />

effective tool in achieving set goals. For an effective policy<br />

review process the paper recommended the following:<br />

• NICTP assessment should involve stakeholders and<br />

ministries for a multi-stakeholder participatory approach.<br />

Policy vision and mission to be shared by key role players to<br />

address universal access and infrastructural developments.<br />

• The policy should appreciate laws and regulations like cyber<br />

usage, e-transaction, confidentiality and privacy.<br />

• The reviewed policy has to emphasize downstream issues<br />

like ICT Incubator to promote local entrepreneurial culture.


• In regard to vision and strategy the national ICT policy<br />

should be specific and should include strategy in the vision.<br />

• It should be noted that many a nation develop ICT policies<br />

but few realize the widely acclaimed benefits of ICT in terms<br />

of socio-economic development, because it takes more than<br />

policy development to realize those benefits.<br />

7. ACKNOWLEDGMENTS<br />

My thanks go to ICEGOV sponsoring organizations and<br />

conference organizers for the financial support given to attend the<br />

ICEGOV 2012 conference and to present a paper.<br />

8. REFERENCES<br />

[1] BALRAJ-AMBIGAPATHY, S, GOONASEKERA, A AND<br />

LEE CHUN, W. 2001. Asian Communication Handbook<br />

―Malaysiaǁ‖ in (eds). Singapore: AMIC.<br />

[2] Cheryl Marie Cordeiro and Suliman Al-Hawamdeh, “National<br />

Information Infrastructure and the realization of Singapore<br />

IT2000 initiative,” Division of Information Studies,<br />

Information Research, Vol. 6 No. 2, 2001.<br />

[3] David A. Wolfe and Allison Bramwell, “Growing the ICT<br />

Industry in Canada: A Knowledge Synthesis Paper”, 2010.<br />

[4] David Gichoya, “Factors Affecting the Successful<br />

Implementation of ICT Projects in Government”, 2005.<br />

[5] Delivering Australian Government Services: Access and<br />

Distribution Strategy (http://www.finance.gov.au), 2006.<br />

[6] Delivering Australian Government Services: Managing<br />

Multiple Channels (http://www.finance.gov.au), 2006.<br />

[7] Ewen Le Borgne and Jaap Pels, “Knowledge management<br />

and Communication strategy West Africa Water Initiative<br />

Knowledge Management project, October 2010<br />

[8] Ghana’s ICT4AD Policy Document (http://www.ict.gov.gh),<br />

2003<br />

[9] ICT Development Index (IDI) 2010 report February 2012 by<br />

the International Telecommunication Union (ITU)<br />

(http://inwent-iij-lab.org/Weblog/2010/07/26/ictdevelopment-index-itu-omits-sierra-leone-again/)<br />

[10] ICT Policy Development: the Case of Canada, 2012 IPCSIT<br />

vol. 36 (2012) © (2012) IACSIT Press, Singapore,<br />

(http://www.ipcsit.com)<br />

[11] Investment Policy Review Kenya, 2005 by United Nations<br />

(http://mirror.undo.org).<br />

[12] Investment Policy Review of Kenya, 2005 (http://unctad.org)<br />

[13] IT839 Strategy Document (http://www.vus.sk)<br />

[14] Kenya ICT Policy Document (http://www.ist-africa.org)<br />

[15] Korea’s Informatization Policy to Deliver ICT Use in<br />

Everyday Life (http://unpan1.un.org), 2007 Edition<br />

[16] Malaysia draft national IT policy (revised) 2007-2013,<br />

(http://www.eeas.europa.eu)<br />

[17] Malaysia National ICT Policy; Malaysia‘s Vision 2020,<br />

which foresees Malaysia becoming an industrialized country<br />

(http://www.epu.gov.my)<br />

201<br />

[18] Margaret Abba-Donkor, “Effective regulation: The<br />

importance of addressing consumer issues in an Era of<br />

digitization and convergence”, 2007.<br />

[19] OSIMO, D., AND GAREIS, K. 2005. The role of interregional<br />

benchmarking in the policy-making process:<br />

experiences in the field of information society, in<br />

<strong>proceedings</strong> of the Regional Studies Association conference,<br />

Aalborg, Denmark.<br />

[20] Singapore National ICT Policy, Transform Singapore into a<br />

vibrant global ICT capital with a thriving and prosperous Net<br />

Economy by year 2010, (http://www.unapcict)<br />

[21] Sudhir Kumar Marwaha, International Cooperation in the<br />

ICT Field: Bridging the Digital Divide, 2009.<br />

[22] The Ghana ICT for Accelerated Development (ICT4AD)<br />

Policy, 2003 (http://www.ict.gov.gh/).


Laggards or Victims of Socioeconomic Conditions?<br />

Findings from Ongoing Survey of Female Slum-dwellers<br />

Without Cell Phone Ownership<br />

ABSTRACT<br />

This paper presents the following details from an ongoing survey<br />

of 334 poor female slum-dwellers who don’t own cell phones:<br />

demographic features including socioeconomic status, sources of<br />

income, barriers to adopt cell phones, and perceived incentives for<br />

and consequences of using cell phones in India. The findings<br />

differ from three key characteristics of laggards identified by the<br />

diffusion of innovation literature. The findings based on responses<br />

from 334 poor laggards suggest hypotheses for predicting the cell<br />

phone adoption by the remaining poor laggards in India.<br />

Categories and Subject Descriptors<br />

H.1.1 [Systems and Information Theory]: Value of Information<br />

H.1.2 [User/Machine Systems]: Human Factors<br />

General Terms<br />

Economics and Human Factors<br />

Keywords<br />

Diffusion of Innovation, Laggards, Poor Slum-Dwellers,<br />

Adoption of Cell Phones<br />

1. INTRODUCTION<br />

Cell phones are the most widely adopted information and<br />

communication technology (ICT) innovation in the world with<br />

more than five billion subscribers as of December 2010, and the<br />

customer-base was expected to exceed six billion by the end of<br />

2011[1]. Since 2000, coverage of mobile telephony has expanded,<br />

and cell phone subscriptions in developing countries like India<br />

and China have increased by over 500%. Intense competition and<br />

innovation within the telecommunications sector in the last decade<br />

has catapulted India into the largest and fastest-growing cell<br />

phone market in the world. Inexpensive cell phone handsets ($15<br />

Devendra Potnis and Kanchan Deosthali<br />

University of Tennessee<br />

01-865-974-2148, 01-518-322-6693<br />

dpotnis@utk.edu, kdeostha@utk.edu<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are not<br />

made or distributed for profit or commercial advantage and that copies bear<br />

this notice and the full citation on the first page. Copyrights for components of<br />

this work owned by others than ACM must be honored. Abstracting with<br />

credit is permitted. To copy otherwise, to republish, to post on servers or to<br />

redistribute to lists, requires prior specific permission and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

202<br />

per piece and above), fierce competition in the Indian cell phone<br />

industry (five out of 15 service providers sharing the market<br />

almost equally), and very cheap tariff rates (less than two cents<br />

per minute) have made cell phones affordable even to poor.<br />

Further, collective ownership models (sharing cell phones through<br />

SIM cards and payments for air-time) and flexible payment<br />

options such as micro-payments (up to a dollar) make cell phones<br />

an attractive communication medium [3].<br />

In India, thirty percent of the nation’s 1.3 billion people are under<br />

18[5], which is the legal age for buying cell phones in the country.<br />

Out of 910 million potential cell phone owners, 907 million had<br />

adopted the ICT innovation as of September 2011 [4]. Thus,<br />

according to the diffusion of innovation literature, the citizens<br />

above 18 who do not own cell phones can be labeled as<br />

innovation laggards. The diffusion of innovation theory [2]<br />

proposes five categories for innovation adopters: innovators, early<br />

adopters, early majority, late majority, and laggards (see Figure<br />

1).<br />

Figure 1. Adopter Categories [2]<br />

Adopter categories are the classifications of members of a social<br />

system on the basis of innovativeness, or the degree to which an<br />

individual or other unit of adoption accepts new ideas when<br />

compared to other members of a system.<br />

1.1 Research Objective<br />

Despite the cheapest cell phone prices in the world and a host of<br />

affordable services and products offered over the cell phones,<br />

more than 3 million Indian adults – categorized as innovation<br />

laggards – do not own and/or use cell phones. To learn more<br />

about these innovation laggards, this study focused on poor<br />

female slum-dwellers who don’t own cell phones. These female<br />

slum-dwellers earn less than two dollars a day and represent one<br />

of the most disadvantaged populations in the male-dominant<br />

Indian society. The following research questions were explored as<br />

part of this ongoing study:


1) What are the demographic characteristics, including<br />

socioeconomic status, of female slum-dwellers who do not<br />

own cell phones?<br />

a) Is there a correlation between respondents’ income,<br />

education, age, family characteristics, and facilities at<br />

home and their lack of cell phone ownership?<br />

2) What are the key barriers to cell phone adoption by<br />

respondents?<br />

3) What are the perceived consequences of and incentives for<br />

cell phone adoption?<br />

The second section describes the relevant theory from diffusion of<br />

innovation literature. The third section presents the research<br />

methodology used to collect responses from slum-dwellers in<br />

urban and rural India. The fourth section presents the study<br />

findings, and the final section concludes with hypotheses and<br />

suggestions for future research, and practical implications of study<br />

findings.<br />

2. DIFFUSION OF INNOVATION<br />

Diffusion is a special type of communication in which messages<br />

are new ideas. It is a social change, defined as the “process by<br />

which alteration occurs in the structure and function of a social<br />

system” [2, p.6]. Social changes occur when new ideas are<br />

invented, diffused, and are adopted or rejected. Although the cell<br />

phone is not a new technology, it is definitely a new idea for<br />

millions of poor in India to start using cell phones for everyday<br />

life. The following sub-sections portray characteristics of laggards<br />

and consequences for and incentives of innovation as described by<br />

the diffusion of innovation theory [2].<br />

2.1 Characteristics of Laggards<br />

Laggards are the last in a social system to adopt an innovation.<br />

They are conservative and “localite” in their outlook. They often<br />

interact with those who have traditional values. They are not part<br />

of any social network and live in their own worlds with very<br />

limited exposure to the outside world. There are no leaders among<br />

laggards, and they are rarely associated with any opinion leaders.<br />

The point of reference for the laggard is always the past. They do<br />

not believe in innovations and, hence, tend to be suspicious of<br />

new innovations. Laggards adopt an innovation only when they<br />

are sure about its success, since they cannot afford to lose the<br />

investment made in any innovation.<br />

2.2 Perceived Consequences of and Incentives<br />

for Innovation<br />

Consequences are the changes that occur to an individual or to a<br />

social system as a result of the adoption or rejection of an<br />

innovation. There are three types of consequences of diffusion of<br />

innovation: (i) desirable versus undesirable consequences,<br />

depending on whether the effects of an innovation in a social<br />

system are functional or dysfunctional; (ii) direct versus indirect<br />

consequences, depending on whether the changes to an individual<br />

or to a social system occur in immediate response to an innovation<br />

or as a second-order result of the direct consequences of an<br />

innovation; and (iii) anticipated versus unanticipated<br />

consequences, depending on whether the changes are recognized<br />

and intended by the members of a social system or not.<br />

There are a variety of incentives observed with the diffusion of<br />

innovation. The incentives are as follows. Either the individual<br />

adopter or the system associated with that adopter is benefitted<br />

203<br />

due to the individual’s adoption of innovation. Positive incentives<br />

like awards and rewards or negative incentives like penalties and<br />

fines increase the rate of adoption. Monetary or social incentives<br />

trigger the act of adoption. Immediate incentives, which are<br />

incentives that are paid at the time of the adoption, increase<br />

adoption rate; in contrast, delayed incentives could benefit<br />

adopter(s) days, weeks, months, or even years after adoption.<br />

3. RESEARCH METHODS<br />

The current study focused on poor females living in urban and<br />

rural slums who did not own cell phones. Two female assistants in<br />

their 40s from the lowest socioeconomic stratum were recruited<br />

for data collection. The assistants were literate enough to write<br />

down responses on the survey questionnaire. The assistants were<br />

paid 60 cents for each respondent they surveyed. The assistants<br />

randomly distributed surveys and collected data from selected 386<br />

slum-dwellers. Out of 386 responses, 334 responses were usable.<br />

The data collection is still going on in rural and urban areas of<br />

Maharashtra, one of the western states in India. The convenient<br />

sampling of respondents limits the generalizability of study<br />

findings.<br />

4. FINDINGS<br />

This section provides answers to the three research questions.<br />

4.1 Demographic Characteristics Including<br />

Socioeconomic Status<br />

Out of 334 female respondents, 79 belong to rural slums and 255<br />

live in urban slums. The average age of respondents was close to<br />

37 years (see Figure 2).<br />

Figure 2. Age Distribution for % of Respondents<br />

Approximately 37% of respondents were illiterate. Out of the<br />

remaining 63% of respondents, (a) 29% of respondents dropped<br />

out of school before 10 th grade, (b) 21% of respondents attended<br />

school until 10 th grade, and (c) 13% of respondents attended<br />

college. Fifty seven percent of respondents earned less than a<br />

dollar a day, 36% of respondents earned more than a dollar a day<br />

and less than two dollars a day, and 7% of respondents earned<br />

more than two dollars a day. Television, in-house bathrooms, and<br />

tap water connections were the three topmost facilities and<br />

services enjoyed by the respondents (see Figure 3).


Figure 3. Facilities & Services Enjoyed by Respondents<br />

There was no correlation found between respondents’ education,<br />

age, marital status, family characteristics, and facilities at home<br />

and their lack of cell phone ownership.<br />

4.1.1 Sources of Income<br />

The survey sought primary, secondary, and tertiary sources of<br />

income from each respondent. Table 1 lists the income sources<br />

into the following categories: (i) business of selling services, (ii)<br />

business of selling products, (iii) employment, (iv) helper in nonemployee<br />

role for someone else’s business, (v) unemployed, (vi)<br />

retired, and (vii) miscellaneous.<br />

Table 1. Source of Income<br />

# Types of Income Primary Secondary Tertiary<br />

Sources N= 312 N= 181 N =84<br />

1 Business of<br />

selling services<br />

44% 44% 35%<br />

2 Business of<br />

selling products<br />

24% 27% 43%<br />

3 Employee 14% 13% 13%<br />

4 Helper in Nonemployee<br />

Role<br />

2% 4% 5%<br />

5 Unemployed 13% 12% 4%<br />

6 Retired 2% 0% 0%<br />

7 Miscellaneous 1% 0% 0%<br />

The business of selling services emerged as the topmost income<br />

source in primary and secondary category, whereas the business<br />

of selling products was the topmost tertiary source of income for<br />

respondents. Respondents offered the following services: house<br />

cleaning, dishwashing, cloth washing, cooking and catering, babysitting,<br />

dropping children to schools, massaging, teaching,<br />

tailoring, singing, training women for handicraft, renting photo<br />

frames to hospitals, singing, match-making, portering, and<br />

nursing. The business of selling products included a variety of<br />

products, such as vegetables, fruits, sweetmeats, traditional<br />

snacks, spices, dry fish, tea, meals, fish, bangles, pearl ornaments,<br />

hair-bands, dress material/clothing, flowers, fabric paintings,<br />

birthday party decorations, ribbons for typewriters, calendars,<br />

rubber stamps, brooms, and sticks for ice-cream candies.<br />

The different forms of employment for the women were as<br />

follows: compounder at a dispensary, care-taker of mentally<br />

retarded children, assistant in a photo studio, sales-girl, student<br />

assistant, office staff in placement office, nurse, assistant in<br />

transportation business, assistant at telephone booth, hotel staff,<br />

204<br />

construction worker, government employee, bottle company<br />

worker, delivery girl by a courier company, assistant to an<br />

accountant, assistant to caterers, farm workers, server in<br />

weddings, floor mill operator, and assistant at a computer<br />

institute. Another type of income source for women was serving<br />

as helpers in others’ businesses. This included helping in<br />

husbands’ businesses, fathers’ businesses, uncles’ businesses, and<br />

sons’ businesses. The unemployed women were: students, job<br />

seekers, housewives whose husbands did not allow them to work,<br />

physically handicapped women, caretakers of their big families,<br />

daughter-in-laws refrained by their in-laws to work, illiterate, and<br />

less educated women.<br />

4.2 Key Barriers to Cell Phone Adoption<br />

Respondents reported three key barriers that kept them away from<br />

owning cell phones. Table 2 shows low income or insufficient<br />

income as the most significant barrier and second most significant<br />

barrier to adopting cell phones. Miscellaneous financial reasons<br />

were reported as the third most significant barrier that prevented<br />

respondents from owning cell phones. The miscellaneous<br />

financial reasons were as follows: scarce money to eat food on a<br />

daily basis, insufficient money to repair a leaking roof, low<br />

savings for children’s schooling, uncertainty and unpredictability<br />

of daily wages, no raise in income and salary, seasonal<br />

employment, unemployment, lack of permanent job, remittance of<br />

money to relatives in native places, insufficient savings to buy a<br />

cell phone, lack of guidance for operating cell phones, loss in<br />

business, very small profit margin in business, meager pension,<br />

savings lost in son’s accident, medical expenses, and a lot of<br />

accrued debt due to mother’s sickness and daughter’s wedding.<br />

The miscellaneous non-financial reasons that served as barriers to<br />

cell phones included government policies, socio-cultural<br />

backwardness, illiteracy, less education, dependency on relatives,<br />

retirement, disabled husband, resistance by husband and in-laws<br />

to use cell phones, lack of freedom to make decisions, availability<br />

of office phones to make personal calls, lack of electricity to<br />

charge cell phones, lack of knowledge for operating cell phones,<br />

ease of access to public phone booths, old age, husband’s<br />

addiction to alcohol, possible mishandling and misuse of cell<br />

phones by children, and extreme difference of opinions among<br />

family members for using cell phones.<br />

Table 2. Barriers to Cell Phone Adoption<br />

# Types of Barriers First<br />

Key<br />

Barrier<br />

N=325<br />

1 Entire Financial Burden<br />

on Respondent Alone<br />

2%<br />

2 Low/Insufficient Income 30%<br />

Second<br />

Key<br />

Barrier<br />

N=304<br />

Third<br />

Key<br />

Barrier<br />

N=208<br />

2% 0%<br />

27% 10%<br />

3 Inflation 14% 14% 14%<br />

4 a. Large Family b. More<br />

# of Dependents than<br />

Bread-winners<br />

5 Lack of Need for Using<br />

6<br />

Cell Phones<br />

Borrow Cell Phones<br />

from Others<br />

4% 8% 10%<br />

4%<br />

3%<br />

4% 3%<br />

4% 2%


7<br />

Unaffordable Cell Phone<br />

Prices and Maintenance<br />

7%<br />

6% 8%<br />

8 Miscellaneous Financial<br />

Reasons<br />

13% 16% 32%<br />

9 Poverty 12% 5% 1%<br />

10 Costly<br />

Upbringing and<br />

Education of Children<br />

11 Miscellaneous Nonfinancial<br />

Reasons<br />

3%<br />

9% 6%<br />

8% 5% 14%<br />

4.3 Perceived Consequences of and Incentives<br />

for Cell Phone Adoption<br />

Anticipated and desirable consequences of adopting cell phones<br />

were as follows. Ninety-five percent of respondents think that<br />

their status in the family would improve if they started using cell<br />

phones. Ninety eight percent of respondents believe that cell<br />

phone usage will lead to personal development. Table 3 presents<br />

respondents’ top perceived incentives for cell phone adoption.<br />

Social networking with family, relatives, friends, and neighbors<br />

emerged as the most important incentive for cell phone adoption.<br />

Table 3. Perceived Incentives for Cell Phone Adoption<br />

# Incentives for First Second Third<br />

Cell Phone Adoption N = 334 N = 327 N = 271<br />

1 Easy to make calls to<br />

anybody any time<br />

3% 3% 1%<br />

2 For expanding business 25% 28% 17%<br />

3 To maintain social contact<br />

with family, relatives,<br />

friends, and neighbors<br />

55% 51% 62%<br />

4 To seek out help in<br />

emergency situations<br />

17% 17% 19%<br />

5 Entertainment 0% 1% 1%<br />

5. CONCLUSION<br />

The lack of cell phone ownership among female slum-dwellers<br />

was largely based on unfavorable socioeconomic and financial<br />

conditions and not driven by choice as is the case with laggards.<br />

Poor female slum-dwellers are the victims of socioeconomic<br />

conditions in rural and urban India, discouraging them from<br />

adopting cell phones. Table 4 lists the differences between three<br />

key characteristics of laggards identified by the diffusion of<br />

innovation theory and the current study findings.<br />

Table 4. Differences in Theory and Study Findings<br />

# Theoretical Views<br />

for Laggards<br />

1 Laggards are<br />

conservative<br />

their outlook.<br />

in<br />

Current Study Findings<br />

In the male-dominant Indian<br />

society, business of selling services<br />

and products forms the topmost<br />

source of income for poor female<br />

slum-dwellers. Respondents are<br />

financially independent microentrepreneurs<br />

with modern<br />

205<br />

2 Laggards are not<br />

part of any social<br />

network with very<br />

limited exposure to<br />

the outside world.<br />

3 Laggards do not<br />

believe in<br />

innovations, hence<br />

are suspicious of<br />

innovations.<br />

outlook.<br />

Social networking with friends and<br />

family members emerged as the<br />

topmost incentive for slumdwellers<br />

to adopt cell phones.<br />

100% of respondents expressed<br />

their confidence in the utility of<br />

cell phones. They were not<br />

suspicious about the value created<br />

by adopting cell phones.<br />

Findings based on responses from 334 poor laggards suggest<br />

hypotheses for predicting cell phone adoption by the remaining<br />

poor laggards in India, who do not own and use cell phones. The<br />

hypotheses are as follows.<br />

H1: Demographic variables (e.g., education, age, marital status,<br />

family characteristics, and facilities at home) do not influence cell<br />

phone adoption.<br />

H2: Low or insufficient income is the main barrier for cell phone<br />

adoption.<br />

H3: Improvement in social status is the most evident perceived<br />

consequence of cell phone adoption.<br />

H4: Social networking is the major perceived incentive for cell<br />

phone adoption. Hence, H4a: Respondents are more likely to<br />

adopt cell phones, if they have family, friends, relatives, or<br />

neighbors who own and use cell phones.<br />

In addition, future research focusing on personal characteristics<br />

and communication patterns of laggards without cell phone<br />

ownership would equip us better for predicting cell phone<br />

adoption by laggards in India.<br />

Practical implications for cell phone manufacturers are as follows.<br />

Cell phone features supporting the “business of selling services<br />

and products” could increase the cell phone adoption by<br />

microentrepreneurs in India. In addition, mobile applications<br />

facilitating social networking with appropriate user interfaces<br />

designed for illiterate and semi-literate cell phone users would be<br />

an additional incentive for poor laggards to adopt cell phones.<br />

6. ACKNOWLEDGEMENT<br />

We would like to thank the University of Tennessee at Knoxville<br />

for funding this study.<br />

REFERENCES<br />

[1] ITU. International Telecommunications Union<br />

Retrieved from www.itu.int/ on December 21, 2011.<br />

[2] Rogers, E. Diffusion of Innovations (4th ed.).<br />

New York: Free Press. 1995.<br />

[3] Sinha, C. Effect of Mobile Telephony on Empowering Rural<br />

Communities in Developing Countries, Conference on Digital<br />

Divide, Global Development and the Information Society<br />

(Tunis, Tunisia, 2005), 2005.<br />

[4] TRAI. Telecom Regulatory Authority of India<br />

Retrieved from http://www.trai.gov.in/ on October 23, 2011.<br />

[5] US Census Bureau. US Census Bureau’s Intl. Database,<br />

Retrieved from http://www.census.gov on May 1, 2010.


Promoting user uptake of e-government in Colombia<br />

Diana Parra Silva<br />

International Consultant<br />

Orinoco 5006<br />

Montevideo, Uruguay<br />

+598 97305822<br />

dianaparra@hotmail.com<br />

ABSTRACT<br />

This paper describes the key factors for the development of a<br />

successful strategy for the e-government uptake in Colombia.<br />

Categories and Subject Descriptors<br />

A.0 [General]: Conference <strong>proceedings</strong>.<br />

General Terms<br />

Management, Measurement, Performance.<br />

Keywords<br />

E-government, "Gobierno en linea", Uptake, Marketing.<br />

1. INTRODUCTION<br />

In 2005, the OECD identified that having a strong brand, as well<br />

as developing a solid marketing strategy, was a key factor in egovernment<br />

successful cases. In 2009, some years later, the same<br />

organization dedicated a publication to highlight the importance<br />

of public awareness on e-government.<br />

Raising awareness about the importance of user uptake has<br />

become a pressing matter in the last years, to such an extent that<br />

the UN E-Government Survey 2012 recognized it as a highpriority<br />

aspect, when it points: "availability of online public<br />

services ('supply-side') has been the primary focus of egovernment<br />

studies and policymaking, but over the past years<br />

citizens' usage of e-government services ('demand-side') has also<br />

become a priority issue".<br />

The fundamentals behind this fact have triggered a discussion on<br />

two aspects: if citizens are not aware of the government's online<br />

services and do not use them, are the efforts made by public<br />

administrations valuable for the citizens? And, will the benefits<br />

commonly associated to e-government and the social return of<br />

investments be achieved without a critical mass of users?<br />

"Gobierno en linea" is the Colombian strategy, led by a<br />

Programme with the same name, that contributes on developing a<br />

more efficient, transparent and participative government, which<br />

provides better services by means of ICT. This strategy guides the<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

206<br />

Johanna Pimiento Quintero<br />

Manager of "Gobierno en linea"<br />

CR 8 12-00<br />

Bogota, Colombia<br />

+571 3442270<br />

johanna.pimiento@gobiernoenlinea.gov.co<br />

delivery of online services by public agencies, at both national<br />

and local levels.<br />

The Programme, taking into consideration the discussion<br />

mentioned before has impelled the awareness of e-government<br />

services in the country through the diagnosis, design, development<br />

and follow-up of a marketing and outreach strategy in Colombia<br />

from 2008 to 2010. Below you will find the most relevant aspects<br />

concerning such experience, which gave Colombia the basis to<br />

promote the citizens' awareness up to the present days.<br />

2. BASELINE<br />

In 2007, a study carried out in 21 municipalities allowed gathering<br />

information about knowledge, use, needs and expectations. The<br />

study consisted of face-to-face surveys conducted in 2,500<br />

households which represented the total of individuals residing at<br />

urban areas, selected according to age, socioeconomic strata and<br />

education of the country's population. The following are some<br />

highlights of the study's findings:<br />

o Only 23% of Colombians had visited a website of the<br />

government, which meant that there were nearly 4<br />

million of Internet users at that time that had never<br />

visited any public agency website.<br />

o Only 4% had used a government online service.<br />

o 77% had not used government online services because<br />

they didn't know how they worked, they were<br />

considered to be unsafe or unreliable.<br />

o 54% of nonusers were willing to use them, representing<br />

19 million of potential users.<br />

These findings motivated the decision to develop the marketing<br />

and outreach strategy for enhancing awareness and use of egovernment<br />

services.<br />

3. DIAGNOSTIC<br />

In 2008, the work began by analyzing the desired positioning for<br />

"Gobierno en linea": being efficient, participatory and transparent,<br />

as well as a provider of high quality services, which was<br />

transformed into the strategy's specific objectives:<br />

o To increase the government's efficiency by optimizing<br />

processes and sharing resources, as well as exchanging<br />

accurate and quality information.<br />

o To promote transparency and participation, by<br />

increasing the visibility of public matters and enabling<br />

new channels for participation and social control.


o To provide better services fulfilling the citizen's needs,<br />

with high quality, and reduced costs and time; making<br />

them simpler and accessible through multiple channels.<br />

A diagnosis was made with the intention of gathering more<br />

information in order to design the marketing and outreach<br />

strategy, using: 4,700 surveys in households, SMEs and large<br />

companies, associative organizations and public agencies; a<br />

positioning study with 6,003 surveys; 104 focus groups with<br />

citizens, entrepreneurs and public servants; 369 interviews with<br />

ICT companies, SMEs, Colombians living abroad and<br />

international organisms.<br />

In addition, the main characteristics of the communicational<br />

approach of the leading countries on e-government were<br />

researched, along with the best international practices regarding<br />

incentives to citizens and companies for online services usage.<br />

Likewise, macro and micro characteristics were analyzed<br />

(economical, political, social and cultural factors; consumer, client<br />

and competition profiles, among others), as well as domestic and<br />

international audiences and potential users. Moreover, a study was<br />

carried out in order to determine the positioning of the brand and<br />

the organization and how they were perceived.<br />

Equally important was to know the acceptance, motivations and<br />

habits of use, possible advantages and disadvantages, main<br />

benefits and problems, and usage intention for each target<br />

audience. Also, a study to evaluate opportunities and risks of<br />

repositioning or renovating the Programme denomination (called<br />

"Agenda de Conectividad" at the moment) was made.<br />

The following are some highlights about how the target audiences<br />

perceived the positioning values:<br />

o What is EFFICIENCY? "To not keep people wandering<br />

around, from one government office to another". "Equal<br />

treatment for everyone".<br />

o What is TRANSPARENCY? "It is a government with<br />

clear rules". "It implies the right of citizens to review<br />

the government's performance".<br />

o What is PARTICIPATION? "To be able to have a free<br />

opinion and to express my ideas". "That every opinion<br />

is taken into account".<br />

o What is TO PROVIDE A GOOD SERVICE? "To make<br />

the client feel well". "That the human being comes<br />

first".<br />

When people used Gobiernoenlinea.gov.co, they said things like:<br />

o "There is no discrimination; it shows us that<br />

opportunities are equal for everybody because it is open<br />

to the public".<br />

o "It no longer depends on the shift of public servant's<br />

opinion; it is not open to interpretations".<br />

o "With this type of portals one can make things easily<br />

and it is not incited to pay somebody to speed up an<br />

administrative formality".<br />

o "It is serious because it avoids external middlemen".<br />

4. DESIGN<br />

From world experiences on e-government, it was concluded that<br />

the communication objective for these services is mainly oriented<br />

towards raising awareness on online services and promoting its<br />

use by target audiences.<br />

207<br />

Therefore, it was decided to develop the marketing and outreach<br />

strategy on "awareness and use", focusing on building a closer<br />

relationship between people and the government.<br />

The strategy focused on the following target audiences:<br />

o Citizens: Although they do not always know how to use<br />

it and they are not very aware of the administrative<br />

formalities, it is the main target audience because it is<br />

the most massive and most of the online services are<br />

provided for them.<br />

o Citizens living abroad: For this target audience,<br />

Gobiernoenlinea.gov.co is an optimal channel offering<br />

information and services, given that through this portal<br />

they will always have access to the government from<br />

any part of the world.<br />

o Enterprises: It refers to large companies with a closer<br />

contact to the government because they must regularly<br />

comply with mandatory formalities. They support<br />

initiatives that make them save time and money in their<br />

interactions with the government.<br />

o SMEs: It refers to small and medium enterprises, which<br />

should be considered as a specific target audience since<br />

they have different habits than large companies in their<br />

interaction with the government. SMEs require more<br />

support from the government because they do not have<br />

the same resources or the same expertise as large<br />

companies.<br />

o Public servants: They are especially important, as they<br />

are the human assets that assure e-government's good<br />

operation. They may have certain fears, resistance to<br />

change and may also think that technology might come<br />

in to take their place.<br />

o International community: The interaction with this<br />

target audience is a window to global advocacy of<br />

success and achievements. They provide the possibility<br />

of learning from other experiences and it is also a way<br />

of sharing what has been accomplished.<br />

It was decided that the message was to be clear, outstanding and<br />

inspiring; solid enough to be used in every media communication.<br />

Such communications should have a pertinent tone according to<br />

the target audience to be reached taking into account its specific<br />

characteristics.<br />

Similarly, it was decided that the denomination of the Programme<br />

("Agenda de Conectividad") should be changed, using the same<br />

name of the strategy ("Gobierno en linea") and therefore unifying<br />

its image. A new logo was designed to be present throughout the<br />

communication actions; the logo had to be simple and close to the<br />

citizen and it should also convey credibility and the government's<br />

identity (see Table 1). Using focus groups the whole process was<br />

tested by citizens, businessmen and public servants.<br />

Table 1. Changes in name and image<br />

Before After


It was also decided that it was necessary to have a slogan, a short<br />

phrase, easy to remember, which would link the functional matter<br />

to the emotional one; something that would linger in time and that<br />

will reflect the identity and the characteristics of the brand.<br />

Consequently it should communicate change, easiness, and<br />

proximity in such a way that each target audience could feel<br />

identified with it: "Making your relationship with the government<br />

easier" was chosen as the appropriate one.<br />

To influence target audiences' perception, a five stages strategy<br />

was designed, as detailed below:<br />

o Stage of Preparation - its purpose was to advance in<br />

research and strategic planning, prepare schedules and<br />

budgets, and negotiate with the media, producing and<br />

pre-testing campaigns, among others actions. It lasted<br />

for 7 months.<br />

o Stage of Sensitization - oriented specifically to public<br />

servants. Communication objective: to raise their brand<br />

awareness for the launching. Key message: We are all<br />

"Gobierno en linea". It lasted for 2 months.<br />

o Stage of Awareness - oriented to all target audiences.<br />

Communication objective: to generate positive<br />

perceptions for a better brand positioning, that would<br />

raise its awareness and impact. Key message: We are<br />

working to make your relationship with the government<br />

progressively easy. It lasted for 3 months.<br />

o Stage of Experience - oriented to all target audiences.<br />

Communication objective: to generate satisfactory<br />

experiences in all the audiences. Key message:<br />

"Gobierno en linea" works; check it out. It lasted for 12<br />

months.<br />

o Stage of Habit - oriented to all target audiences.<br />

Communication objective: to set habit's groundwork to<br />

use "Gobierno en linea" when interacting with the<br />

government. Key message: You can always find<br />

something new on "Gobierno en linea". It lasted for 12<br />

months.<br />

5. IMPLEMENTATION<br />

For the stage of awareness, which started in late 2008, a campaign<br />

focusing on massive media and brand activation was carried out,<br />

under the premise: "Questions about administrative formalities are<br />

easier to answer than questions about life" (see Figure 1).<br />

Figure 1. Sample of the Awareness Stage<br />

208<br />

For example, it is more difficult to answer a question about life<br />

such as "What should I study?" than getting information to answer<br />

a question about an administrative formality such as "How can I<br />

get an educational loan?".<br />

For the stage of experience, implemented in 2009, the objective<br />

was to produce satisfactory experiences for the target audiences,<br />

with the aim of allowing people to verify that "Gobierno en linea"<br />

actually works.<br />

In order to achieve such goal, workshops inside an itinerant<br />

classroom with a circus tent shape were carried out. The tent<br />

traveled more than 7,500 kilometers visiting 16 departments<br />

(states) across the country. It allowed more than 71,500 people<br />

(students, adults, social groups, communal leaders, elderly people,<br />

handicapped people, single mothers, indigenous, afro-<br />

Colombians, street vendors, teachers, public servants, among<br />

others), to have a direct contact with online services. The<br />

campaign was called "Vive Gobierno en linea" (Livin' "Gobierno<br />

en linea") and advertising material was used in local media,<br />

inviting people to participate in the workshops (see Figure 2).<br />

This campaign was granted the 2010 FRIDA Award for Best<br />

Initiative of Public Administration in the region.<br />

Figure 2. Sample of the Experience Stage<br />

Finally for the stage of habit, executed in 2010, the objective was<br />

to motivate people to try not one but several online services,<br />

demonstrating through good experiences some of the new<br />

available services for the different target audiences, under the<br />

premise: "a good experience makes a good history".<br />

The fact that Colombians should be the ones communicating the<br />

benefits and kindness of "Gobierno en linea" was found to be a<br />

good opportunity, because people would use real life, human and<br />

inclusive stories. Thus, a contest was launched so that people<br />

could share their experiences through testimonies recorded on<br />

video. The best ones were turned into TV spots for the campaign<br />

under the name "Experiences that make history" (see Figure 3).


Figure 3. Sample of the Habit Stage<br />

The starting point for the development of each campaign was the<br />

media mix that was determined for each target audience:<br />

o Citizens: ATL - Ads on national and regional press,<br />

magazines, television and radio, as well as free PR press<br />

(political speech of regional and national important<br />

authorities). TTL - Social media such as Facebook,<br />

Twitter, Flickr and YouTube, links on websites of the<br />

government and online ads. BTL - Events, banners,<br />

merchandising and text messages.<br />

o Citizens living abroad: ATL - Ads on international TV<br />

channels. TTL - To make contact with this segment<br />

digital and social media were crucial.<br />

o SMEs: ATL - Specialized magazines, professional<br />

guilds, radio stations and news channels. BTL -<br />

Specialized events, direct email with information about<br />

the different uses and benefits, as well as brand presence<br />

at fairs and congresses.<br />

o Enterprises: ATL - Ads in specialized magazines<br />

oriented to different sectors and professional<br />

associations. Also, ads on TV and radio news shows.<br />

BTL - Presence at fairs and specialized congresses for<br />

large companies, as well as through speakers<br />

discoursing about different trends with the purpose of<br />

catching companies’ attention.<br />

o International Community: ATL - Articles in specialized<br />

magazines. An annual magazine was created divulging<br />

successful cases and advances. BTL - Brand presence in<br />

events and congresses. TTL - Online networks related to<br />

e-government, for posting a variety of successful cases.<br />

Others - To follow international rankings and other<br />

types of publications.<br />

o Public servants: BTL: to carry out events, seminars,<br />

chats, direct email, presence at fairs and congresses.<br />

Others: production of training materials (using familyfriendly<br />

language and situations applicable to their<br />

realities).<br />

6. RESULTS AND FOLLOWING ACTIONS<br />

During the first three years of the strategy a follow-up was made<br />

analyzing the raise of awareness and use of electronic means in<br />

the interaction between people and the government.<br />

209<br />

A raise of 309% of awareness (increasing from 22% up to 90%)<br />

and a raise of 550% in use (increasing from 6% up to 39%) were<br />

achieved. One fact that is worth highlighting, is the one referring<br />

to "re-use" (do it again): among people who had actually used<br />

"Gobierno en linea", 99% asserted that they would be willing to<br />

use it again.<br />

These results, together with an analysis of usage evolution,<br />

allowed inferring that next steps for the marketing and outreach<br />

strategy should be focused on promoting "the first time use". Once<br />

people experience online services, they would be willing to<br />

continue to use them due to the benefits perceived.<br />

The main lesson learnt was that a communication strategy should<br />

not be approached as a series of isolated actions but as a whole<br />

strategy (as its name indicates) with clear challenges, objectives,<br />

key messages, concepts, stages and indicators, and should also be<br />

projected within a definite timeline.<br />

Furthermore, users need to be analyzed in depth in order to<br />

understand how they think and how they interact with the<br />

government, as well as the kind of messages they might consider<br />

interesting; plus examine how their perceptions are changing in<br />

order to set the service value promise according to their<br />

expectations.<br />

From that starting point on, a strategic plan was designed and<br />

piloted during 2011: an accompaniment outline was implemented,<br />

to help agencies to design their marketing and outreach strategies<br />

so as to enhance the use of online services, by transferring the<br />

knowledge gained by the Programme in such area.<br />

During the last years (between 2010 and 2011), through the<br />

maintenance of the strategy initially designed, awareness suffered<br />

a slight fall from 90% to 88% (that is within the margin of error in<br />

measurements), while use rose from 39% to 55% over the same<br />

period, which showed that the strategy was being successful and<br />

should continue this way (see Table 2).<br />

Table 2. Increase of awareness and use<br />

Aspect 2008 2009 2010 2011<br />

Awareness 22% 66% 90% 88%<br />

Use 6% 30% 39% 55%<br />

For Colombia the necessity to define sustained actions towards<br />

user uptake of e-government has been a priority. As a<br />

consequence of these actions, future strategies should leverage the<br />

lessons learnt in recent years.<br />

7. REFERENCES<br />

[1] OECD. e-Government for Better Government, 2005.<br />

[2] OECD. Rethinking e-Government Services, 2009.<br />

[3] UN. E-Government Survey 2012: E-Government for the<br />

People, 2012.<br />

[4] Gobierno en linea Programme. Study of knowledge, use,<br />

needs and expectations, 2007.<br />

[5] Gobierno en linea Programme. Results of application of the<br />

methodology for monitoring and evaluation, 2008, 2009,<br />

2010 and 2011.


Session 8<br />

Measurement 1


From Failure to Success: Using Design-Reality Gap<br />

Analysis as a Mid-implementation Assessment Tool for<br />

e-Government<br />

Lemma Lessa<br />

School of Information Sciences<br />

Addis Ababa University, Ethiopia<br />

(+251) 911683805<br />

lemma.lessa@gmail.com<br />

ABSTRACT<br />

e-Government implementation failure in low-income countries is<br />

reported to be as high as 85% where 35% being classified as total<br />

failures - the project never started or was started but immediately<br />

abandoned, and 50% are partial failures - major project goals are<br />

not attained or there were undesirable outcomes [5]. Given this<br />

rate of failure we wanted to investigate a project with partial<br />

failure and draw lessons learned that can be replicated in other<br />

projects. This paper looks at a Land Management Information<br />

System (LMIS) in Ethiopia that facilitates citizen’s request for<br />

land information. The project is credited for reducing the delay in<br />

retrieving land information, simplifying the process, and reducing<br />

the potential for corruption.<br />

We use Design-Reality gap model [5] as a theoretical framework<br />

to assess the project status. Primary data were collected from four<br />

different groups involved in the project including agency<br />

representatives from the Federal Government of Ethiopia, officials<br />

from the capacity building office of Diredawa City<br />

Administration, municipality representatives, and IT<br />

professionals. Our analysis revealed the main contributors for the<br />

success of the e-Government project and also show the<br />

implementation gaps which need due attention in the future to<br />

maximize the success of the project. Based on the implementation<br />

experiences of this project, list of recommendations are provided<br />

for successful execution of possible related initiatives in the<br />

future.<br />

Categories and Subject Descriptors<br />

J. [Computer Applications] J.1 [Administrative Data Processing]<br />

- Government; H.4 [Information systems Applications] H.4.m<br />

[Miscellaneous]<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Solomon Negash<br />

Department of Information Systems<br />

Michael J. Coles College of Business<br />

Kennesaw State University, USA<br />

770-420-4312<br />

snegash@yahoo.com<br />

210<br />

Mesfin Belachew<br />

Ministry of Communications and<br />

Information Technology, Ethiopia<br />

(+251) 911791462<br />

mesfinbelachew@gmail.com<br />

General Terms<br />

Management, Measurement, Performance<br />

Keywords<br />

e-Government, implementation success, Design-Reality gap<br />

model, ITPOSMO model, developing countries, low-income<br />

countries<br />

1. INTRODUCTION<br />

It has been said a lot about the tremendous role of e-Government<br />

to improve and more importantly transform the public sector<br />

especially in developing countries context. Although there are<br />

significant investments on e-Government initiatives in spite of<br />

limited budget, there are only few success stories recorded<br />

whereas majorities of those efforts end up in a failure. It is of the<br />

interest of all respective governments if those e-Government<br />

initiatives can be ideally successful as well as sustainable. In line<br />

with this there is also emerging keen interest to evaluate the<br />

contributions of such initiatives on the effectiveness and<br />

efficiency of their public services as it is natural to evaluate<br />

whether benefits out weight costs or not and as they ideally expect<br />

very much positive impacts in this regard.<br />

An e-Government project is said to be successful if most<br />

stakeholders attain their major goals and do not experience<br />

significant undesirable outcomes. Considerable amount of<br />

research has been carried out on the use and positive role of ICTs<br />

in low-income countries in areas such as health, public<br />

administration, and education [9]. And some studies have pointed<br />

out information systems project failure in low-income countries<br />

([7]; [4]). Researchers have also argued that most of these projects<br />

fail either totally or partially due to ‘design-actuality’ [4] or<br />

‘design-reality’ gaps [5], long-term sustainability problems [1], or<br />

lack of commitment on the part of political leadership and public<br />

managers [2].<br />

According to a study curried out by Heeks (in [4, p.2]) who has<br />

done substantial research in the subject area, most<br />

implementations of e-Government in low-income countries fail,<br />

with 35% being classified as total failures (project was never<br />

started or was started but immediately abandoned), and 50% are<br />

partial failures (major goals are not attained and/or there were<br />

undesirable outcomes). Similarly, in a study by [6], it was<br />

estimated that US$3 trillion will be spent on information


technology (IT) projects by governments during the ten year<br />

between 2000 and 2010; with the overall estimated failure rate of<br />

60%, much of this investment will go to waste. This is a<br />

disturbing fact, especially as developing countries have limited<br />

resources at their disposal.<br />

One way to avoid failure is to learn from successful projects<br />

within the developing countries. If we find such a project that is<br />

successful, then we should analyze why it was a success in order<br />

to learn lessons for other Developing Country e-Gov projects.<br />

Especially lessons learned from other low-income countries are<br />

more relevant for this group and encourage South-to-South best<br />

practice sharing. The e-Government system under consideration is<br />

a partial failure. What we are actually asking in this paper is how<br />

we can seek to steer projects that are partial failures from failure<br />

to success just by assessing progress to date, and identifying<br />

future action priorities to enable greater success.<br />

The rationale for the study is, thus, to promote local best practices<br />

while learning from strengths and mistakes of those initiatives so<br />

far. Hence, the main objectives of this study are exploring the<br />

factors critical to the success of the e-Government initiative;<br />

identify the extent of success, and forward recommendations for<br />

future action. In addition, we present the application of the<br />

Design-Reality Gap model, a theoretical model that explains<br />

success/failure of IT project implementation in low-income<br />

countries, vis-à-vis e-Government project.<br />

2. A CASE STUDY OF LAND<br />

MANAGEMENT INFORMATION<br />

SYSTEM (LMIS)<br />

The Ethiopian ICT Development Agency (EICTDA) is a<br />

government body responsible to promote integration and<br />

utilization of ICT in Ethiopia. The deputy director of the Agency<br />

related to us one of an e-Government project in a city<br />

municipality in one of the regional governments. This piece of<br />

work is aimed at analyzing the project which is known as Land<br />

Management Information System (LMIS). This system is<br />

considered as a successful both by EICTDA and the Diredawa<br />

city administration.<br />

The Land Management Information System (LMIS) under<br />

consideration was launched mid 2009 at Diredawa city<br />

administration. Diredawa is located in eastern part of Ethiopia and<br />

is one of the two city administrations directly reporting to the<br />

Federal government of Ethiopia. The LMIS was initiated by the<br />

ICT development bureau of the administration and outsourced in<br />

an open bid to a local software developing company. The<br />

application is aimed at managing the land-related information of<br />

the city. It has taken about a year to implement the system. The<br />

key stakeholders involved in the process of implementation were<br />

the top management, the Capacity Building Bureau, and the ICT<br />

staff in the city administration.<br />

The new system manages and provides information related to<br />

land(s) owned by residents. More specifically, it manages and<br />

provides basic information about the land(s) including size (area<br />

in sq. meter), zoning (such as commercial, residential, school, or<br />

church), plan number, and file number (container number). It also<br />

manages information on personal details (such as family<br />

information – spouse, children), documents (scanned softcopy of<br />

211<br />

each piece of paper that indicate different historical information in<br />

the land owner’s file/container), and address (address for the<br />

owner).<br />

Current<br />

Reality<br />

Information<br />

Technology<br />

Processes<br />

Objectives<br />

and values<br />

Staffing and<br />

skills<br />

Management systems<br />

and structures<br />

Other resources time<br />

and money<br />

Design proposal for<br />

New eGov project<br />

Information<br />

Technology<br />

Processes<br />

Objectives<br />

and values<br />

Staffing and<br />

skills<br />

Management systems<br />

and structures<br />

Other resources time<br />

and money<br />

Figure 1. The ITPOSMO dimensions of e-<br />

Government project design-reality gaps [5]<br />

o Information - indicates the information used in the e-<br />

Government application (comparing the information<br />

o<br />

requirements contained within the design of the e-<br />

Government application vs. the information currently really<br />

being used in the organization);<br />

Technology – indicates the technology used in the agency<br />

(comparing the requirements contained within the design of<br />

the e-Government application vs. the real situation now);<br />

o Process – indicates the work processes undertaken in the<br />

agency (comparing the processes needed for successful<br />

implementation of the e-Government application vs. the real<br />

situation now);<br />

o Objectives – indicates the objectives and values that key<br />

stakeholders need for successful implementation of the e-<br />

Government application vs. their current real objectives and<br />

values;<br />

o Staffing and Skill - indicate the staffing numbers and skill<br />

levels/types required in/by the agency (comparing the<br />

requirements for successful implementation of the e-<br />

Government application vs. the real situation now);<br />

o Management and Structure – indicate the management<br />

systems and structures required in the agency (comparing the


equirements for successful implementation of the e-<br />

Government application vs. the real situation now);<br />

o Others – indicate such issues as the time and money required<br />

to successfully implement and operate the new application<br />

compared with the time and money really available now.<br />

3. COLLECTION OF DATA<br />

All the Primary data were collected from the supply side of the<br />

system as citizens have no direct interaction with the system yet.<br />

Thus, those involved in the project were considered. Accordingly,<br />

interview was made with the Deputy administrator of the city<br />

administration; head of the Capacity Building and ICT Sector<br />

Bureaus; head of the ICT sector in the capacity building bureau;<br />

seven top level managers in the city administration whose duties<br />

are highly related to the Land Management practice, and the<br />

system administrator of the new system. In addition, group<br />

discussion was made with the four IT staff (data encoders) in the<br />

city administration. The questions for the structured interview<br />

were prepared based on the constructs of the Design-Reality gap<br />

model and a copy of the interview questions were given to each<br />

study subject at least two days in advance. But, some more<br />

clarifications were obtained through telephone conversation from<br />

two of the interviewees among the top level managers in the city<br />

administration during our discussion while rating the numerical<br />

values for each of the constructs in the Design-Reality Gap model.<br />

3.1 Presentation and analysis of data<br />

Thematic analysis [8] of the organizational reality and<br />

requirements within the design of the e-Government application<br />

was made based on the qualitative data collected from the field as<br />

per the seven ITPOSMO dimensions. Next, the rating of each<br />

dimension as well as the interpretation of the sum of the<br />

numerical values of the dimensions is made by adopting a detailed<br />

guideline available for same (See at<br />

http://www.egov4dev.org/success/techniques/risk_drg.shtml).<br />

The rating of each dimension was made in a coconscious among<br />

the three researchers based on the data at hand and<br />

recommendations made by interviewees during the group<br />

discussion. Accordingly, each dimension is numerically rated in a<br />

scale from zero to ten where zero is to mean no change between<br />

the design proposal and current reality; ten means complete<br />

change between the design and current reality; and five would<br />

indicate some degree of change. Finally, all the rating numbers for<br />

each dimension were added up and interpreted as depicted in<br />

Table 1.The original table is for use with predictive – i.e. pre-hoc<br />

design-reality gap analysis before implementation. As this system<br />

has already been implemented, we were interested in doing a midimplementation<br />

assessment in order to see what has been achieved<br />

so far, and where the project may go in future. Thus, rewordings<br />

were done on the items in the table accordingly.<br />

Table 1: Interpretation of total gap score<br />

Total Gap<br />

Score<br />

Interpretation<br />

0-14 The e-Government project well<br />

succeeded.<br />

15-28 There is partial failure in the e-<br />

Government project as actions are not<br />

212<br />

taken to close design-reality gaps.<br />

29-42 The e-Government project might fail<br />

totally, or might well be a partial<br />

failure unless action is taken to close<br />

design-reality gaps.<br />

43-56 The e-Government project may well<br />

fail unless action is taken to close<br />

design-reality gaps.<br />

57-70 The e-Government project certainly<br />

failed as actions are not taken to close<br />

design-reality gaps.<br />

4. DESIGN-REALITY GAP ANALYSIS<br />

AND DISCUSSIONS<br />

In this section we will use the seven dimensions from the Design-<br />

Reality Gap model to analyze the case study gaps. We will<br />

describe the design goals and the current reality followed by gap<br />

assessment between the two.<br />

4.1 Information<br />

The Land Management Information System (LMIS) was designed<br />

manage data on the basic land information and owner profile. It<br />

provides information on land purpose/zoning (commercial vs.<br />

residential), lot size, land location, land identification number,<br />

other legal information in relation to that piece of land, the land<br />

owner name and address, spouse name, children names, and<br />

household number. The system design requires all supporting and<br />

related documents to be scanned and available online.<br />

In reality majority of the land and user profile information are<br />

made ready by the new system except few documents to be<br />

scanned in incorporated.<br />

Gap = 3; a significant portion of the design goals are<br />

implemented. But supporting documents of few land owners were<br />

not scanned and incorporated yet.<br />

4.2 Technology<br />

The design called for technologies including scanners, server<br />

computer and local area network, Internet connection, and<br />

personal computers. Scanners needed to digitize the current paper<br />

based documents, new court decisions, and tax receipts. Server<br />

computer and network needed for storing information in a<br />

centralized location for access by decision makers including<br />

engineers, finance officers, land administrators, and city<br />

managers. Internet connection needed for off-site access mostly<br />

by field personnel. About fifteen personal computers with<br />

Pentium IV processor and at least 40GB hard disk space were<br />

needed for decision makers and data entry personnel.<br />

The implemented reality has all technology requirements except<br />

scanners and some concerns regarding the processing as well as<br />

storage capacity of the Personal Computers as their capacity is<br />

lesser than the required capacity.


Gap = 5; The weak and unreliable Internet connection provided by<br />

the Ethiopian Telecommunications and also the shortage of<br />

scanners weakens the Land Management Information System<br />

(LMIS) system ability to function in its full capacity.<br />

4.3 Processes<br />

A business process re-design project has preceded the Land<br />

Management Information System (LMIS) project. Therefore the<br />

business process for the Land Management Information System<br />

(LMIS) was already defined and in place in the manual system.<br />

The major top-level processes that the system is involved in<br />

include the following among others: Land information registration<br />

sub-process – aimed at registering and documenting all required<br />

information regarding the land management; Land ownership<br />

licensing sub-process – aimed at providing and approving<br />

ownership license to owners of plot of land for a given purpose<br />

(business; residence; public service; or other); and Information<br />

provision service – aimed at providing any information regarding<br />

a plot occupied for an owner or any other concerned body within<br />

and outside the city administration such as the court and others.<br />

The new system design followed the business process already<br />

implemented; hence the reality was the same as the design, except<br />

in few cases the workers are required to follow the old process in<br />

those cases where there is no scanned copies of any document<br />

about a land owner.<br />

Gap = 2; the design was intended to incorporate scanned<br />

documents. Although a small portion of the process it still poses<br />

minimal gap.<br />

4.4 Objectives and Values<br />

Two primary objectives and values of the design were efficient<br />

and transparent system. As to efficiency, the manual system took<br />

3-4 months to process land administration inquiries, reducing this<br />

long processing time was one of the design objectives. Regarding<br />

transparency also the manual system has introduced many<br />

loopholes that are prone to corruption; hence the design calls for a<br />

transparent system. The design in terms of transparency assumes<br />

that this objective is also shared by all the public servants.<br />

In relation to efficiency, the current reality shows a significant<br />

improvement in land administration processing both in time,<br />

effort, and resource consumption. The current system takes less<br />

than a day to complete land administration queries, a significant<br />

improvement that reduced the time from months to hours. The<br />

intended transparency, however, is compromised because decision<br />

makers find loopholes to revert to the manual system. Although<br />

the design requires buy-in to the goals of efficiency and<br />

transparency, and that this buy-in – while absent among some<br />

(corrupt) staff in the middle and lower levels of the decision<br />

making ladder – was present for few senior decision makers and<br />

the volunteers.<br />

Gap = 7; Lack of scanned document is used as a primary reason<br />

for reverting to the manual system, but also decision makers resist<br />

using the new system and find excuses to revert to the manual<br />

system. The intent to overcome corruption is minimized but not<br />

eliminated.<br />

213<br />

4.5 Staffing and Skills<br />

The design calls for personnel including one system administrator,<br />

one network administrator, one database administrator, four data<br />

encoders, and two computer maintenance crew. The design called<br />

for all personnel to have experience and the administrators to have<br />

at least a bachelor degree.<br />

In reality only five people were hired (the system administrator<br />

and the four data encoders), none had experience; they were all<br />

fresh graduates from ICT diploma program. Of course, they have<br />

stayed in the job for about a year on average and they have built<br />

up skills by learning on the job.<br />

Gap = 7; Five of the staffing positions were filled, skill level fall<br />

short of the design.<br />

4.6 Management Systems and Structures<br />

The design called for a new structure with an ICT department that<br />

manages the Land Management Information System (LMIS). The<br />

design also called for salary structure with clearly defined<br />

promotion levels. In reality the intended department was not<br />

created and the reporting structure falls under the existing land<br />

administration department. No permanent employees were hired;<br />

all ICT hires have temporary status.<br />

Gap = 8 failed to create the intended department and management<br />

structure.<br />

4.7 Other Resources<br />

In other resources we looked at cost and time overrun. The design<br />

was loosely defined to take a year. The city administration<br />

allocated the required one-time budget for the project. The project<br />

was completed in the projected time period. However there is<br />

acute shortage of budget to cover the running cost required just<br />

following the system implementation.<br />

Gap = 3; project time was as expected. Although money was spent<br />

to complete the project the city administration did not consider the<br />

running costs of the new system.<br />

5. CONCLUSIONS<br />

Summary of the Design-Reality gap is shown in Table 2.<br />

Table 2: Summary of Design-Reality gap<br />

SN Dimension Gap<br />

1 Information 3<br />

2 Technology 5<br />

3 Process 2<br />

4 Objectives and values 7<br />

5 Staffing and Skills 7


6 Management system and structure 8<br />

7 Other resources 3<br />

Total 35<br />

The total gap of 35 indicates that there is a partial failure in the e-<br />

Government project and the project may fail totally unless action<br />

is taken to close design-reality gaps; see Table 1 for reference.<br />

The largest gap is ‘management system and structure’ which is 8<br />

followed by significant gaps in ‘staff and skill’ & ‘Objectives and<br />

values’, both showing 7. The main reason for the large gaps in<br />

these three dimensions was the lack of awareness about the<br />

priority of such systems among the decision makers except the<br />

champions. The transparency objective is also lacking because the<br />

documents not scanned still require manual intervention, this in<br />

turn has created a loophole for corruption. Installing scanners to<br />

digitize the all process flows will further reduce the Design-<br />

Reality and increase the project success. These are clear<br />

indications for the fact that the project may still continue to be a<br />

partial failure unless those gaps are closed. However, in our<br />

discussion with the management they too have lately recognized<br />

this gap. In relation to the ‘management system and structure’<br />

dimension, we are also informed that a new ICT department has<br />

been proposed and getting ready to implement. We were also<br />

informed additional staff with appropriate skills will soon be<br />

hired. A permanent position with clearly defined promotion scale<br />

is also in the works. Reducing the gaps in these two areas will<br />

significantly increases the project success rate.<br />

The dimensions with the least Design-Reality gap are ‘process’<br />

and ‘other resources’. The business process changes made prior to<br />

the project launch became an opportunity and has made the<br />

process gap low. The typical resistance often experienced during<br />

business process change has already been done and implemented.<br />

‘Other resources (cost and time)’ gap was low because of the<br />

commitment from the project champion. Funding issues were not<br />

constrained by bureaucratic red tape; instead the champion had<br />

funded the project. The time commitment was also managed and<br />

accomplished by the project champion. The role of the champion<br />

played a critical role in materializing this project.<br />

Given the overall rating of 35, the e-Government project may well<br />

fail unless action is taken to close design-reality gaps. The main<br />

actions needed are to reduce the largest design-reality gaps (i.e.<br />

working on key issues such as Management system and structure,<br />

objectives and values, and staffing and skill, and also availing<br />

financial resources to cover the recurrent costs which resulted in<br />

large design reality gap). The Diredawa city administration should<br />

try to identify ways in each case to make design more like reality<br />

and/or to make reality more like design.<br />

Finally, the value of Design-Reality gap analysis model as a midimplementation<br />

assessment tool for e-government projects is<br />

worth mentioning. In this piece of work, we have found Design-<br />

Reality gap analysis model as valuable tool in that it has<br />

capability to show possible gaps during implementation which<br />

actually need proper intervention from stakeholders and we have<br />

noticed that the model can also serve as a mid-implementation<br />

assessment tool for e-government projects as it can be<br />

214<br />

longitudinally used at different points to see the progress in<br />

closing identified gaps in the process of implementation as well as<br />

post-implementation periods.<br />

The current research concludes with highlighting the following<br />

key findings and recommendations:<br />

o Project champions: As revealed in the study, the most<br />

critical factors that contributed to the success of the e-<br />

Government implementation are exceptional<br />

o<br />

commitment from few influential decision makers to<br />

overcome the barriers and challenges for change, the<br />

alignment of the new systems with the Business Process<br />

Reengineering initiative, and unreserved effort from<br />

volunteers to support the change effort by the<br />

government.<br />

The e-Government project was not initially planned as a<br />

solution in the overall reform effort by the city<br />

administration. Rather it came to being at the end of the<br />

comprehensive business process reengineering effort<br />

when the administration noticed that the new business<br />

processes cannot be put in place unless automation in<br />

undertaken. This in turn shows that unless short term<br />

and long term measures are taken in order to bridge the<br />

observed gaps in all the ITPOSMO dimensions and<br />

specifically the gaps in objectives and values; staffing<br />

and skill as well as financial resource constraint; the<br />

success and sustainability of these e-Government<br />

applications will definitely be in trouble.<br />

o Collaboration: Although not institutionalized, the effort<br />

made by few top management members and IT<br />

professionals in the capacity building bureau brought<br />

difference and hence credited for the success. Hence,<br />

the top management commitment takes the lion’s share<br />

of the achievement attained at the end of the day.<br />

o Staffing, Skills and structure: The IT professionals are<br />

not recognized as permanent in the current<br />

o<br />

organizational structure and as a result they are working<br />

in a temporary basis. This may disappoint the<br />

professionals and force them look for better job and<br />

salary elsewhere which in turn endanger the day to day<br />

operation of the application put in place. It should be<br />

underlined that the success of such initiatives depends<br />

largely on human skills and capabilities. Hence,<br />

education and training initiatives must be considered as<br />

priority actions. Staff need to be trained to handle new<br />

processes and activities; they have to be given<br />

incentives to prevent the brain drain of skilled people;<br />

and they need to feel part of the organization by<br />

engaging in the decision making process. Planned and<br />

continuous awareness creation effort through series of<br />

workshops, events, seminars, and conferences is<br />

required in the future to better create clear impression<br />

about the benefits of the new system among all<br />

stakeholders.<br />

Continuous improvement: Evaluating such an effort<br />

should not be one time activity rather it should be done<br />

periodically in order to assure long term success of the<br />

new system.


6. ACKNOWLEDGEMENT<br />

We are grateful to the management of Ethiopian Information &<br />

Communication Technology Agency (EICTDA) of the Federal<br />

Democratic Government of Ethiopia for partially sponsoring the<br />

case study.<br />

7. REFERENCES<br />

[1] Aichholzer, G., Scenarios of eGovernment in 2010 and<br />

implications for strategy design, Electronic Journal of<br />

eGovernment, 2(1), 2004, 1–10.<br />

[2] Bhatnagar, S., Social implications of information and<br />

communication technology in developing countries: Lessons<br />

from Asian success stories, The Electronic Journal of<br />

Information Systems in Developing Countries, 1(4), 2000, 1–<br />

9.<br />

[3] Dada, D., The Failure of EGovernment in Developing<br />

Countries: A Literature Review, The Electronic Journal on<br />

Information Systems in Developing Countries, 26, 7 (2006)<br />

215<br />

[4] Heeks, R., Information systems and developing countries:<br />

Failure, success, and local improvisations, The Information<br />

Society, 18(2), 2002, 101–112.<br />

[5] Heeks, R., Most eGovernment-for-development projects fail:<br />

How can risks be reduced? iGovernment Working Paper<br />

Series, paper no. 14, 2003.<br />

[6] Heeks, R. and Stanforth, C., Understanding eGovernment<br />

project trajectories from an actor-network perspective,<br />

European Journal of Information Systems, 16, 2007,165-177.<br />

[7] Ndou, V., E-Government for Developing Countries:<br />

Opportunities and Challenges, The Electronic Journal on<br />

Information Systems in Developing Countries, 18(1), 2004,<br />

1-24 http://www.ejisdc.org (2004)<br />

[8] Orodho, A. J. and Kombo, D.K., Research Methods.<br />

Nairobi:Kenyatta University, Institute of Open Learning,<br />

2002.<br />

[9] Walsham and Shahy, Information Systems Research<br />

Landscape in Developing countries, Information Technology<br />

for Development, 2005, Published online in Wiley<br />

InterScience (www.interscience.wiley.com), Wiley<br />

Periodicals, Inc.


Measuring Organizational Interoperability in Practice: The<br />

case study of Population Welfare Department of<br />

Government of Sindh, Pakistan<br />

ABSTRACT<br />

Devender Maheshwari<br />

Technical University Delft<br />

2628 BX DELFT<br />

The Netherlands<br />

Tel. 0031152783284<br />

D.Maheshwari@tudelft.nl<br />

Government organizations use technology to interoperate with<br />

each other in order to provide effective and efficient services to<br />

the citizens. Interoperation between these organizations is<br />

challenging due to the organizational differences among different<br />

types of public organizations. Measuring organizational<br />

interoperability of government organizations using technological<br />

advancements is difficult and often remains at the technical level<br />

and do not measure the organizational level. Existing<br />

interoperability models and frameworks focus on different aspects<br />

of organizational and technical interoperability independently; but<br />

there is hardly any single measurement instrument addressing<br />

both. Though the interoperability models and frameworks<br />

describe the layers, levels, and stages; they do not identify any<br />

assessment constructs for measuring and benchmarking the<br />

organizational interoperability. This paper investigates<br />

interoperability maturity models to identify assessment layers for<br />

measuring and benchmarking the interoperability, and propose the<br />

measurement instrument that will allows government<br />

organizations to effectively measure organizational<br />

interoperability. We develop a list of measurement constructs for<br />

the sub-layers of organizational interoperability layer to assess the<br />

maturity of organizational interoperability. Finally, we conduct a<br />

case study at Population Welfare Department Government of<br />

Sindh, Pakistan to investigate the applicability and usefulness of<br />

the organizational layer and its measurement constructs in the<br />

proposed interoperability measurement instrument for assessing<br />

the maturity of organizational interoperability.<br />

Categories and Subject Descriptors<br />

D.2.12 [Interoperability]: Distributed objects; H.1.1. [Information<br />

Systems]: Models and Principles –Systems and Information<br />

Theory; H.4 [Information Systems Applications]: Miscellaneous;<br />

J.1 [Administrative Data Processing]: Government<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

216<br />

Marijn Janssen<br />

Technical University Delft<br />

2628 BX DELFT<br />

The Netherlands<br />

Tel. 0031152781140<br />

M.F.W.H.A.Janssen@tudelft.nl<br />

General Terms<br />

Measurement, Documentation, Design, and Theory<br />

Keywords<br />

E-government, Interoperability, Measurement, Benchmarking,<br />

Public Service Organizations.<br />

1. INTRODUCTION<br />

Interoperability is described to have significant impact on public<br />

organizations to advance the processes, procedures, operations,<br />

and effective service provision to the citizens [30-31, 37-38].<br />

Maturity of public organizations is often characterized by the<br />

interoperability as a key element for e-government integration,<br />

new connectivity creation among networks, information sharing,<br />

and collaboration [13, 21, 27]. Measuring interoperability is not<br />

only a technological challenge, but a sociotechnical matter since<br />

both technical as well organizational capabilities reflect the<br />

maturity of public organizations [16, 38, 48]. This means that the<br />

aspects of organizational interoperability are equally important for<br />

interoperability measurement. Hjort-Madsen [21] describes that<br />

the complexity of organizational aspects of interoperability may<br />

surpass the technical as the public organizations move toward<br />

inter-organizational governance. Van der Veer and Wiles [50, p-6]<br />

describe the organizational interoperability as “the ability of<br />

organisations to effectively communicate and transfer<br />

(meaningful) data [7] even though they may be using a variety of<br />

different information systems over widely different<br />

infrastructures, possibly across different geographic regions and<br />

cultures”, whereas the European Interoperability Framework (EIF)<br />

IDABC [23, p-16] describes it as "defining business processes and<br />

bringing about the collaboration of administrations that wish to<br />

exchange information and may have different internal structures<br />

as well as aspects related to requirements of the user community”.<br />

Recently, this bias has been criticized by many as the public<br />

organizations interoperate more and more with each other for<br />

information sharing to provide effective and efficient services.<br />

Hence, the need of disparate back-office systems to interoperate<br />

and collaborate with each other requires enhanced interoperability<br />

among different back-offices. Interoperability in literature is<br />

mostly described from technical viewpoint as a capability of<br />

different systems to exchange and share information in useful<br />

manner [2, 24, 33, 41]. Many definitions of interoperability can be<br />

found in literature [10, 24-25, 33, 41].<br />

It is easily ascertained from the literature that several authors and<br />

organizations discuss technical aspects of interoperability<br />

standards e.g. [3, 9, 11, 34, 46, 49]; whereas the organizational


aspects are hardly discussed as they are messy. Goldkuhl [16]<br />

describes that the interoperability is not only a technical subject,<br />

but there is a need to conceptualize the organizational aspects as<br />

well. He further explains that the interoperability is also about<br />

what people do for information systems to interoperate. Scholl<br />

and Klischewski [41] describe that the assessment of<br />

interoperability is still unclear and faces many challenges, the<br />

evaluation and measurement methods need to be investigated<br />

properly. They also identify nine major constraints that affect the<br />

interoperability: 1) constitutional, 2) jurisdictional, 3)<br />

collaborative, 4) organizational, 5) informational, 6) managerial,<br />

7) technological, 8) cost, and 9) performance. Some of these<br />

constraints also reflect the organizational aspects of<br />

interoperability and need to be included in interoperability<br />

measurement process. Aspects of organizational Interoperability<br />

can be measured within an organization between two or more<br />

information systems as well as between different organizations<br />

with multiple information systems.<br />

This paper presents a measurement instrument and a set of<br />

measurement constructs to assess and benchmark organizational<br />

aspects of interoperability. Section 2 discusses the interoperability<br />

maturity models and frameworks to investigate the organizational<br />

aspects of interoperability. Section 3 proposes the interoperability<br />

measurement instrument and derives the measurement constructs<br />

for each sub-layer of the organizational interoperability layer. In<br />

section 4, a case study is conducted at the population welfare<br />

department government of Sindh, Pakistan using the developed<br />

organizational layer and its measurement constructs for assessing<br />

the organizational interoperability. Finally, section 5 discusses the<br />

results of the outcome of case study.<br />

2. BACKGROUND<br />

Interoperability maturity models described in literature mostly<br />

focus on the technical aspects of public organizations [3, 9, 11, 22,<br />

28, 34, 46]; whereas the organizational aspects are parsley<br />

discussed with little emphasis on the measuring and<br />

benchmarking perspective. Measures to assess organizational<br />

interoperability are hardly indicated in these interoperability<br />

maturity models. Maheshwari et al. [32, p-2] discuss ten different<br />

interoperability maturity models and related measurement<br />

approaches to investigate the interoperability measurement issues<br />

and challenges in public service organizations. Only a handful of<br />

maturity models [16, 22-23, 28] discuss the aspects of<br />

organizational interoperability, whereas the majority remains<br />

centrally focused on technical interoperability. Furthermore, they<br />

argue that the measuring and benchmarking the interoperability of<br />

public organizations is challenging as it encompasses a<br />

widespread array of diverse areas and dimensions. In a similar<br />

vein, Shahkooh et al. [43] investigated some generic (e.g.<br />

INTEROP NoP, NEHTA, and IDEAS) and country specific (e.g.<br />

Australia, Malaysia, New Zealand, and United Kingdom) egovernment<br />

interoperability frameworks. They, after investigating<br />

different frameworks describe interoperability as:<br />

“a set of policies, strategies, standards, guidelines, and<br />

instructions to connect different governmental organizations in<br />

order to facilitate fast and easy information exchange to deliver<br />

services to the citizens, businesses, and employees” [43, p-65]<br />

Thus, the interoperability on the whole is a combination of<br />

technical as well organizational aspects that affect the information<br />

exchange and sharing between any two or more entities. Though<br />

the existing interoperability models and frameworks sparsely<br />

217<br />

address these issues in different layers, levels, and steps; there are<br />

hardly any guidelines to incorporate these aspects into a single<br />

measurement instrument. This paper proposes the measurement<br />

instrument that incorporates both technical and organizational<br />

aspects of interoperability. In order better understand the<br />

interoperability measurement layers, we investigate the selected<br />

interoperability maturity models and frameworks that are<br />

commonly discussed literature and utilized by national and<br />

international organizations:<br />

Levels of Information Systems Interoperability (LISI): The<br />

LISI model developed by the US Department of Defense (DoD)<br />

comprises of five levels i.e. isolated systems, connected systems,<br />

functional distributed, domain integrated, and enterprise universal.<br />

These levels of LISI are centrally focused on the technical<br />

interoperation of the systems [18, 35, 43, 46].<br />

NC3TA Reference Model for Interoperability (NMI): The<br />

NMI model also mainly focuses on the technical aspects of<br />

interoperability while including the interoperability degrees i.e.<br />

unstructured data, structured data, seamless data sharing, and<br />

seamless information sharing to classify the content type of the<br />

exchanged data and information flows. The model aims to<br />

improve the functional efficiency by introducing the structured<br />

data interpretation and exchange [35, 46].<br />

Organizational Interoperability Model (OIM): The IOM model<br />

is an extension of LISI model that includes the organizational<br />

aspects of interoperability. Although the model only focuses on<br />

the organizational interoperability, the levels of OIM i.e.<br />

independent, ad-hoc, collaborated, integrated, and unified are<br />

closely aligned with the environmental description of levels of the<br />

LISI model. OIM model provides some information in each level<br />

for shared value systems, shared goals, and common structures but<br />

does not provide any guideline to achieve the desired<br />

organizational interoperability [9, 18, 35].<br />

Levels of Conceptual Interoperability Model (LCIM): The<br />

LCIM model in [18, 35, 46] describes five levels of conceptual<br />

interoperability i.e. system specific data, documented data, aligned<br />

static data, aligned dynamic data, and harmonized data. The<br />

model shows that the interoperability is not only subjective to the<br />

technical capability of the systems but also the composability on<br />

the conceptual levels. The levels of LCIM conceptual model were<br />

later extended and reproduced [47, 49] as i.e. no-interoperability,<br />

technical interoperability, syntactic interoperability, pragmatic<br />

interoperability, dynamic interoperability, and conceptual<br />

interoperability. The LCIM conceptual models also centrally<br />

focus on the technical interoperability of the systems [18, 35, 46-<br />

47].<br />

European Interoperability Framework (EIF): The EIF 1.0<br />

framework by Interoperable Delivery of European eGovernment<br />

Services to public Administrations, Businesses and Citizens<br />

(IDABC) was first introduced in 2004 [23]; which was later<br />

upgraded to EIF 2.0 in 2008 [22]. The version EIF 1.0 comprised<br />

of three layers i.e. organizational, semantics, and technical; which<br />

were extended to five layers in EIF 2.0 i.e. organizational,<br />

semantics, technical, political, and legal interoperability. Unlike<br />

other models and frameworks (LISI, NMI, OIM, LCIM), the EIF<br />

focused not only on technical interoperability but also other<br />

organizational aspects of the interoperability [15-16, 22-23, 30,<br />

43].<br />

European Interoperability Maturity Model (EIMM): The<br />

EIMM by Advanced Technologies for interoperability of


Heterogeneous Enterprise Networks and their Applications<br />

(ATHENA) comprises of five levels i.e. performed, modeled,<br />

integrated, interoperable, and optimizing. ATHENA intended to<br />

assess the interoperability in enterprise domain using EIMM. The<br />

model specifically focuses on both organizational as well<br />

technical aspects of interoperability in enterprise domain [3, 18].<br />

Though the maturity models are developed by different individual<br />

researchers [9, 46], national [11], and international [22, 34]<br />

organizations; none of these models or frameworks discuss<br />

measures to assess the organizational aspects of interoperability.<br />

The stages, levels, and layers are sequentially numbered without<br />

any further guideline about the measurements method or the<br />

measures themselves. Literature reviews of interoperability<br />

maturity models and frameworks suggests that the maturity of<br />

technical interoperability is somewhat achievable due the<br />

established standards and policies, but the aspects of<br />

organizational interoperability e.g. policies, business processes,<br />

financial, and governance are important and need to be addresses<br />

carefully. In other words, some of the organizational aspects are<br />

often described as the barrier of interoperability adoption and<br />

implementation [1, 12, 41].<br />

3. MEASUREMENT APPROACH<br />

Literature review of maturity models and frameworks discussed in<br />

Section 2 gives insight about the importance of organizational<br />

aspects of interoperability, but does not provide sufficient<br />

guideline to measure organizational interoperability. The maturity<br />

models describe interoperability levels in a linear fashion, whereas<br />

these levels are implemented on top of each other in practice.<br />

Although some authors [e.g. 50] argue that the successful<br />

implementation of technical, syntactical, and semantic<br />

interoperability is necessary for organizational interoperability,<br />

whereas others [e.g. 28, 32] suggest that both organizational as<br />

well technical interoperability can be implemented on top of each<br />

other. This paper proposes a two layered measurement instrument<br />

where each layer can be implemented on top of each other.<br />

Organization Layer<br />

• Policy<br />

• Enterprise architecture<br />

• Business process<br />

• Judicial<br />

• Governance<br />

• Economical<br />

Technical Layer<br />

• Syntactic<br />

• Semantic<br />

• Physical infrastructure<br />

Figure 1 Interoperability Measurement Instrument.<br />

Proposed measurement instrument as shown in Figure 1 is based<br />

on the methodology of architecture layers of interoperability by<br />

[28], whereas the selection of layers based on the socio-technical<br />

design approach. Bostrom and Heinen [6] argue that the success<br />

of the organizations depend socio-technical system (STS), where<br />

social system represents people and structure and technical system<br />

218<br />

represents technology and tasks. Measurement aspects of the<br />

technical and organizational interoperability as shown in Figure 1<br />

are derived based on the literature review interoperability maturity<br />

models and frameworks. Janssen and Scholl [28] describe that the<br />

settlements should be reached among various involved partners to<br />

avoid unwanted situations regarding the quality, compatibility,<br />

and extent of information collaboration and interoperation. The<br />

arrows shown in the Figure 1 from top to bottom and bottom to<br />

top of each layer shows that implementation of interoperability<br />

layers is non-linear, which means that each layer can be<br />

implemented independent of each other. Hence, the<br />

interoperability measurement aspects of each layer are relative,<br />

but can be measured independently.<br />

The explanation of technical sub-layers is already clear and well<br />

defined by many organizations as well as individual authors [e.g.<br />

22-23, 28, 32, 49], whereas the organizational interoperability and<br />

the measurement aspects of its sub-layers are hardly discussed in<br />

literature. Therefore, this paper briefly discusses the measurement<br />

aspects of organizational layer and derives the adequate<br />

measuring and benchmarking constructs for each sub-layer.<br />

3.1 Organizational Layer<br />

Organizational factors (e.g. technology adaption, economic<br />

constraints, openness, and back-office cooperation) and<br />

organizational issues (e.g. collaboration, business process, and<br />

coordination) that impact the performance of information systems<br />

are used to describe interoperability [14, 16-17]. Organizational<br />

layer places the foundation for functional infrastructure of public<br />

organizations for collaboration, exchange, and sharing of<br />

information. Table 1 gives short description of each organizational<br />

sub-layer as depicted in Figure1. Interoperability sub-layers<br />

explained in Table 1 are sparsely described in literature, but there<br />

is hardly any discussion about the measures to assess them.<br />

Tolk, Turnitsa et al. [47] describe that the pragmatic<br />

interoperability can reflect the maximum maturity if the<br />

information sharing by the sender as well receiver is translucent,<br />

clear, and truthfully interpretable. Policy sub-layer analyzes the<br />

maturity of organizational aspects and helps to avoid the adverse<br />

effects by identify the limitations. This layer also envisages<br />

personal, environmental, standardization, and policy aspects to<br />

distinguish the types of communication, and embraces the<br />

information exchange intention of sender [28, 39].<br />

For the public organizations aiming to facilitate citizens and<br />

businesses with seamless service delivery, the enterprise<br />

architecture can perform the essential role and provide guidance to<br />

address organizational issues [19]. Enterprise architecture of a<br />

public organization provides systematic understanding of basic<br />

elements describing existing and anticipated environment [5].<br />

Thus, enterprise architecture is useful to measure the basic<br />

information about organizational elements. Tough enterprise<br />

architecture encapsulates majority of organizational aspects, we<br />

only focus on interoperability related measures. Thus, the sublayer<br />

enterprise architecture is used to measure the basic<br />

information about human resource and formal communication.<br />

Interoperability in public organizations aims to improve the<br />

service provision by advancing the business processes and<br />

procedures for citizens, business, employees [32]. The business<br />

process sub-layer in this context measures the processes and<br />

procedures alignment, whereas the processes and procedures for<br />

information exchange and sharing between the collaborating and<br />

interoperating information systems are often reflected by the


service level agreements. The interoperating information systems<br />

desire comprehensive, understandable, and coherent re-adaptation<br />

of business processes.<br />

Judicial aspects of interoperability are sparsely described by many<br />

[3, 8, 22-23, 28, 41, 49] as an important factor affecting the<br />

Sub-layers Description Constructs<br />

Policy<br />

Enterprise<br />

Architecture<br />

Business<br />

Process<br />

Judicial<br />

Governance<br />

Economical<br />

This layer deals with<br />

back-office procedures<br />

and processes between<br />

the interoperating<br />

systems from policy<br />

perspectives for clear,<br />

transparent, and truly<br />

interpretable exchange<br />

of information by<br />

sender as well as<br />

receiver [41, 47].<br />

Enterprise architecture<br />

represents wide-spread<br />

areas of public<br />

organizations that can<br />

be effective to resolve<br />

interoperability<br />

conflicts [40] as a mean<br />

to measure the basic<br />

information.<br />

Business process deals<br />

with the alignment of<br />

business processes and<br />

procedures, valuecreation,<br />

monitoring,<br />

controlling, and long<br />

and short term<br />

agreements.<br />

Judicial layer reflects<br />

the organizational laws<br />

and regulations,<br />

constitutional and legal<br />

restraints, and<br />

organizational safety<br />

and security issues that<br />

affect the interaction of<br />

information systems.<br />

Governance<br />

mechanisms determine<br />

how communication,<br />

responsibilities, and<br />

decision-making<br />

structures are<br />

formalized [26, p.2307].<br />

Economic layer<br />

concerns the issues that<br />

limit the overarching<br />

scope of<br />

interoperability.<br />

1. Context and<br />

demarcation<br />

s<br />

2. Collaboratio<br />

n<br />

3. Policies<br />

4. Standards<br />

5. Formal<br />

communicat<br />

ion<br />

6. Human<br />

resource<br />

Formal<br />

7. Processes<br />

and<br />

procedures<br />

alignment<br />

8. Service level<br />

agreements<br />

9. Laws and<br />

regulations<br />

10. Constitution<br />

al restrains<br />

11. Political<br />

commitment<br />

12. Jurisdictiona<br />

l regulations<br />

13. Change<br />

management<br />

14. Environmen<br />

t and ethics<br />

15. Financial<br />

constraints<br />

overall maturity of interoperability. This sub-layer discusses the<br />

219<br />

law and regulation and constitutional restrains that affect the<br />

maturity of interoperability. Goldkuhl [16, p-4] describes the<br />

judicial interoperability as “congruence between different laws<br />

and regulations”. According to Janssen and Scholl [28] the<br />

governance in public organizations is differentiated by the wellorganized<br />

and cogent interoperation among organizational<br />

mechanisms, as long as these mechanisms guide in the correct<br />

direction.<br />

Table 1 Organizational sub-layers and measurement constructs<br />

Janssen and Joha [26, p-2307] explain that the “governance<br />

mechanisms determine how communication, responsibilities, and<br />

decision-making structures are formalized”. Measures to assess<br />

the maturity of judicial sub-layer of organizational interoperability<br />

include political commitment, jurisdictional regulations, and<br />

change management. Finally, we define the economical sub-layer<br />

of interoperability, which is discussed quite often in literature but<br />

rarely incorporated in maturity models and frameworks. This sublayer<br />

describes the financial issues of organization interoperability<br />

that restricts the overarching purview and affects the maturity e.g.<br />

return on investment. Based on the literature review of<br />

organizational interoperability and interoperability maturity<br />

models and frameworks in Section 2 we derived the sub-layers of<br />

organizational interoperability as discussed in Section 3. In order<br />

to briefly understand the importance and classification of these<br />

sub-layers of organizational interoperability, we will discuss each<br />

measurement construct shown in Table 1 in details.<br />

3.2 Measurement Constructs Organizational<br />

Interoperability<br />

In this subsection the constructs are further detailed and refined to<br />

enable the assessment in real-life situations.<br />

1. Context and demarcation. Interoperability requires clear and<br />

distinctive interoperation between information systems, processes,<br />

organizations, and employees. According to Strang, Linnhoff-<br />

Popien et al. [44, 45], clear and distinctive contextual<br />

interrelationship and specifics help to assess the interoperability<br />

compatibility and substitutability. Although there is an informal<br />

consensus about the context and demarcations of technical<br />

interoperability, the contextual definitions, goals, objectives,<br />

ontologies, and demarcations of organizational interoperability is<br />

hardly discussed in literature. This measure gives a reflection of<br />

the level of to-the-point clearness and distinctiveness of<br />

organizational interoperability [32].<br />

2. Collaboration. Inter and intra-organizational interactive and<br />

willing full working relationship in public organizations [32],<br />

where the shared goals, and roles and responsibilities are<br />

recognized to support organizational interoperability [9].<br />

Although the organizational framework can be distinct in nature,<br />

the collaboration is essential for organizational interoperability.<br />

This measure determines the level of organizational collaboration.<br />

3. Standards. Although policies and standard are two separate<br />

measures, their description and implications are somewhat interrelated.<br />

Standards are necessary for organizational interoperability<br />

as majority of maturity models and frameworks are still<br />

conceptual. In our view, standards are essential to advance<br />

organizational interoperability. They can describe the conceptual<br />

settlements between the concerned interacting quarters in subtle<br />

agreed documented format in consultation with recognized<br />

standardization bodies [52].


4. Policies. This is also a necessity of pubic organizations to<br />

ensure the effective implementation of the organizational<br />

interoperability as per the standards. Depending on the size,<br />

scope, and type of organization (local, regional, or national), the<br />

policies for organizational interoperability is required for business<br />

process alignment among the interoperating quarters with regional<br />

and national policies and regulations [52].<br />

5. Formal communication. Communication of information in<br />

public organizations using pre-defined proper channels is<br />

important for interoperability. Weedman [51] describes the formal<br />

communication as a core for any established field as it offers<br />

opinions, discoveries, suggestions, improvements, experiences,<br />

and ideas. For example regular meetings between the responsible<br />

authorities and employees will help both to resolve issues with<br />

mutual cooperation and understanding. The measure determines<br />

the frequency of formal meetings and communication channels for<br />

information exchange and sharing at the organizational<br />

interoperability level.<br />

6. Human resources. Unlike other layers, the interoperability at<br />

organizational layer is also subject to the capability of the<br />

effective human resources. Adaption of new technological<br />

advancements, policies, agreements, procedures, and processes<br />

not only requires willingness but also skills and knowledge. This<br />

measure determines the maturity of human resources for<br />

implementation of organizational interoperability.<br />

7. Processes and procedures alignment. Interoperability is often<br />

related to business processes and procedures, IDABC [22-23]<br />

refer to organizational interoperability as describing business<br />

processes and procedures. Janssen and Scholl [28] state that<br />

business process layer derives the attention to process-driven<br />

integration. Alignment of processes and procedures helps public<br />

organizations with business transitions, integration, control and<br />

monitor, value-creation, and management of interoperability<br />

related issues.<br />

8. Service level agreement. Interoperability at organizational<br />

level is subject to agreements, negotiations, and compliance of<br />

service related terms and conditions for effective information<br />

sharing and exchange. Thus, the quality of service (QoS)<br />

requirements is agreed between the concerned stakeholders to<br />

ensure the minimum service delivery. Service level agreements<br />

are strictly bound for implementation and incompliance is<br />

rewarded with heavy penalties. European interoperability<br />

framework [23] discusses that several service level agreements<br />

can be made for organizational interoperability based on the<br />

demand and business process connections [29].<br />

9. Laws and regulations. Organizational interoperability is still at<br />

the conceptual level [38, 41, 48]. There is a desire for new laws<br />

and regulations for effective and efficient information sharing and<br />

exchange at organizational level. This measure illustrates the need<br />

for new laws and regulations for organizational interoperability on<br />

top of the existing laws and regulations.<br />

10. Constitutional restrains. Scholl and Klischewski [41] explain<br />

that the interoperability objectives are not aligned with the<br />

democratic government’s constitutional power distribution at<br />

national, regional, and local levels etc. Though the constitutions<br />

limit the organizational interoperability objectives to certain<br />

boundaries, the objectives have not yet reached the desired<br />

maturity within those boundaries. This measure determines the<br />

maturity of organizational interoperability objectives within the<br />

constitutional boundaries in public organizations.<br />

220<br />

11. Political commitment. Pardo and Burke [37] describe that<br />

political commitment is necessary for public organizations to<br />

continue with their objectives for implementation of long-term<br />

projects in case of the changes in political administration. Political<br />

commitment is a need for consistency to ensure the success of<br />

organizational interoperability. This measure evaluates the<br />

political commitment for organizational interoperability.<br />

12. Jurisdictional regulations. Public organizations at different<br />

levels (national, regional, and local) follow distinct patterns of<br />

business processes and information handling. They operate<br />

independent of each other [42] and have the liberty to interoperate<br />

or share the information only if they volunteer [20]. To avoid illuse<br />

of this liberty, jurisdictional regulations are essential to<br />

engage public organizations for information sharing and<br />

interoperation. This measure determines the implementation of<br />

jurisdictional regulations for organizational interoperability.<br />

13. Change management. Organizational leadership and<br />

management are responsible for execution different task and<br />

assignments. Leaders are responsible guidance, motivation,<br />

creativity, innovation, and resource mobilization to achieve the<br />

organizational objectives [36]. In the context of organizational<br />

interoperability, Maheshwari, Veenstra et al. [32] describe the<br />

leadership responsibilities as “smooth execution of tasks by<br />

assigning right-job-for-right-person”. Hence, the organizational<br />

interoperability requires effective change management.<br />

14. Environment and ethics. Organizational culture and ethics<br />

has direct influence on the interoperability. Working environment<br />

free of rivalries and inimical behavior allows employees to<br />

interoperate easily for information exchange and sharing among<br />

different stakeholders. Though hardly discussed in literature, this<br />

aspect of organizational interoperability can be useful for assess<br />

the internal working environment.<br />

15. Financial constraints. Financial aspects have greater<br />

importance in practice over others concerning the quality and<br />

maturity of interoperability. Dos Santos and Reinhard [12] infer<br />

that financial barriers limit organizations to procure resources<br />

based on lower price than better quality. Interoperability<br />

initiatives by public organizations face challenges of major<br />

resistance for change acceptance, which can also result in<br />

financial turmoil. Therefore, the overarching return on<br />

interoperability investments not only reflects the financial success,<br />

but also the level of change acceptance.<br />

4. A CASE STUDY OF POPULATION<br />

WELFARE DEPARTMENT<br />

GOVERNMENT OF SINDH<br />

As an illustrative case study research case, the proposed<br />

measurement instrument and constructs were applied to assess the<br />

organizational interoperability of Population Welfare Department<br />

(PWD) Government of Sindh, Pakistan in January, 2012. The<br />

research method was based on open-ended interviews with the top<br />

management followed by a survey session with the experts from<br />

different sub-departments to test the applicability and usefulness<br />

of organizational measurement constructs. The purpose of<br />

conducting the open-ended interviews with the top managmenet<br />

was to refine the proposed measruement model before conducting<br />

the structured survey session. Furthermore, a survey session not<br />

only allowed selected participants to fill-in the questionnaire but<br />

also inteactive discussions, reflections, suggestions, and feedbacks<br />

about the survey itself and measurement instrument. With


concensus of all participants, the technical interoperability was<br />

pusposefully excluded from the survey session as the maturity of<br />

the technical interoperability was already available and<br />

documented.<br />

The case study was designed specifically based on the relationship<br />

among the open-ended interviews and the sturctured survey<br />

session from the measuring and benchmarking pespectives. The<br />

open-ended interviews allowed us to not only ask the indepth<br />

questions but also the opportunity to have better understanding of<br />

the back-office infromation sharing, handling, and gathering.<br />

Which in result helped us to recrusively update and improve the<br />

structured survey questionnaire. Though the management was<br />

well aware of the overall processes and procedures; a participative<br />

session was necessary to confirm the findings from the interviews<br />

of the top management to the findings of the operational<br />

employees from the different departments. Furthermore, the<br />

session allowed us for immediate reflections and discussion about<br />

the applicability and usefulness of measruement constructs and<br />

the instrument.<br />

Population welfare program Sindh is an integral part of Federal<br />

Population Welfare program Pakistan. In 2010 the Ministry of<br />

Population Welfare Pakistan was devolved and the functions were<br />

completely transferred to the province creating Ministry of<br />

Population Welfare, Government of Sindh. PWD Sindh has<br />

approximately 24,00 employees, most of them operate in small<br />

villages and remote areas where the literacy ratio is very low.<br />

PWD aims to provide family planning services ensuring high<br />

quality service delivery at the doorstep of people. PWD facilitates<br />

its services at District, Town, and Tehsil level through Family<br />

Welfare Centers (FWCs), Mobile Service Units (MSUs),<br />

Provincial Line Departments (PLDs), Registered Medical<br />

Practitioners (RMPs), Labour, Local Government, and Non-<br />

Governmental Organizations (NGOs).<br />

Figure 2 Outcome of illustrative case study<br />

221<br />

The interviews were conducted with the top management that<br />

included the director general PWD Sindh and four assistant<br />

directors; who are responsible for the respective functional wings<br />

i.e. Admin & Finance (A & F), Monitoring Evaluation and<br />

Planning (ME & P), Communication, Training, Logistic and<br />

Supplies (CTL & S), and Medical wing of PWD Sindh. Each<br />

interview lasted for approximately an hour and half (90 minutes),<br />

in which a total of sixty selected questions were asked from each<br />

interviewee. The questions were put together to measure the<br />

organziational interoperability as per the list of measruement<br />

constructs described in Section 3.2. Though the number of<br />

questions per construct were uniformly distrubuted, it was<br />

understood from the discussion with interviewees that some<br />

constructs i.e. Service Level Agreement, Laws and Regulations,<br />

and Juristictional regulation required less questions than the others<br />

i.e. Collaboration, Change Management, and Human Resources.<br />

Although the management is responsbile for provincial<br />

administrative setup; they had clear vision and knowledge about<br />

the processes, procedures, and services as they were quite flexible<br />

while answering the questions. The management was fully aware<br />

of the importance of organizational interoperability as the major<br />

objectives of PWD focus on coordination and collaboration<br />

among local and district back-offices; integrated services;<br />

enhanced interaction with businesses, citizens, NGOs, and<br />

government organzitions; ensuring maximum public participation;<br />

and improving quality of family planning services delivery. The<br />

interviews of the top management provided further insight and<br />

understanding of the PWD Sindh to ask more relevant, precise,<br />

and in-depth questions about the organizational interoperability.<br />

To be able to compare and benchmark the current marutiy levels,<br />

each interviewee was also asked to rate the desired maturity for<br />

each described construct from level-0 to level-9. The dotted-line<br />

in Figure 2 shows the desired maturity level for each oncstruct.<br />

Following the knowledge gained from the interviews, a<br />

comprehensice list of 75 structured questions was prepared for the<br />

survey session comprising on 25 technical and non-technical<br />

employees lower down the hierarchy at PWD Sindh. Participants<br />

of the survey session were also briefed about the measurement<br />

approach and constructs before providing them the questionnaire.<br />

Therefore, along with the survey questionnaire, a separate<br />

evaluation form was also provided to the participants for<br />

discussion at the end to reflect upon the applicability and<br />

usefulnes of the proposed measurement approach.


Table 2 Measurement outcomes of interoperabiltiy constructs<br />

There were 25 participants in the survey session, who filled in the<br />

structured questionnaire about organziational interoperability by<br />

categorically specifying the maturity value for each of the related<br />

questions per construct from level 0 (lowest) to the level 9<br />

(highest). For the participants lacking the knowledge about<br />

particular measruement construct, an option of ‘don’t know’ was<br />

also added to each question. As the participants were from<br />

different sub-sections of the functional wings; some participants<br />

did not answer the particular set of questions, of which they were<br />

least knowledgeable. Approximately 20 percent values per<br />

question (5 out of 25) were asnwered with the option ‘don’t<br />

know’. The average value of the total number of answers per each<br />

question was assigned to the ‘don’t know’ answers. Furthermore,<br />

the mean of the average values of questions for each construct was<br />

calculated as maturity level. Figure 2 shows the outcome of<br />

survey session where the dotted line represents the desired<br />

maturity level and the plane line represents the measured maturiy<br />

level.<br />

For better understanding of the case study findings, we further<br />

investigated and analyzed the outcomes of the measurement<br />

values from the survey questionnaire; the values of standard<br />

deviation and mean for each construct were derived as shown in<br />

Table 2. The lowest and highest standard deviation values of the<br />

measurement constructs in Table 2 explain that though the<br />

average calculated maturity levels for some contructs shown in<br />

Figure 2 are close to the desired maturity levels, the low and high<br />

standard deviation values determine that some participants had<br />

different opinions than others.<br />

The case study of PWD shows that the measurement of<br />

organizational interoperability can help policy makers in design<br />

and development of interoperability maturity models. The<br />

differences in the desired and measured maturity levels clearly<br />

indicate that moer focus is needed on the organizational aspects of<br />

interoperability. We also conclude from the case study that the<br />

selection of measurement constructs for organziational<br />

interoperability is difficult and depend on the complexity, size,<br />

and scople of the back-office information gathering, sharing, and<br />

handling. Finally, the case study using the proposed measurement<br />

instrument shows that the mearuement constructs for<br />

organizational interoperability can be implemented on top of each<br />

other.<br />

5. DISCUSSION<br />

Interpretation of the organizational measurement constructs and<br />

maturity levels is quite difficult and complex as there is hardly<br />

any existing literature, but we realize that this can be dealt to a<br />

greater extend by extensive discussions with concerned experts.<br />

The discussion with the participants in the case study shows that<br />

the total numbers of questions designed for the measurement were<br />

relevant, but there was consensus among all the experts that<br />

measurement of organizational interoperability is complex and<br />

requires large amount of questions. It is, however, questionable if<br />

it is desired or feasible to have hundreds of questions for<br />

measuring all the details about the measures. The challenge is to<br />

measure with a limited number of questions that can be filled in<br />

within a short time frame.<br />

Though our structured survey questionnaire included 75 selected<br />

questions, the focus was to better assess the level of abstraction<br />

that is required to measure interoperability at a satisfactory level.<br />

The participatory discussions with the participants, after they<br />

222<br />

No.<br />

Measurement<br />

Constructs<br />

SD-<br />

Low<br />

Mean SD-High<br />

1 Context and demarcations 6,22 7,04 7,86<br />

2 Collaboration 6,11 7 7,89<br />

3 Policies 5,32 6,04 6,76<br />

4 Standards 6,11 7 7,89<br />

5 Formal communication 6,08 6,92 7,76<br />

6 Human resource 5,21 6,12 7,03<br />

7<br />

Processes and<br />

procedures alignment<br />

6,08 6,92 7,76<br />

8 Service level agreements 5,21 6,12 7,03<br />

9 Laws and regulations 6,11 7 7,89<br />

10 Constitutional restrains 6,47 7,12 7,77<br />

11 Political commitment 7,03 7,92 8,81<br />

12 Jurisdictional regulations 5,34 6,08 6,82<br />

13 Change management 6,25 7 7,75<br />

14 Environment and ethics 5,18 5,92 6,66<br />

15 Financial constraints 6,09 7,12 8,15<br />

filled the questionnaire, provided positive feedbacks about the<br />

applicability and usefulness of the measurement instrument and<br />

constructs. Participants suggested that although some of the<br />

constructs e.g. human resources, change management, and<br />

financial constraints are very important for organizational<br />

maturity; they were hardly included in the measurement process.<br />

Some participants quoted in the feedback form that the policy sublayer<br />

is very important for organizational interoperability and<br />

must be part of measurement process. Another major finding of<br />

this case study is the outcome of the architecture layer constructs<br />

i.e. human resources and formal communication. Majority of<br />

participants highly recommended these constructs as they<br />

constitute the basis for enhanced interaction, collaboration, and<br />

training programs for the back-office employees. Participants also<br />

highlighted that technology alone cannot resolve organizational<br />

interoperability problems if the human resources in the backoffice<br />

are not skilled and trained. Participants discussed the<br />

example of old age employees who hardly speak English and use<br />

ICT enabled software and systems.<br />

The outcome of the case study as shown in Figure 2 and Table 2<br />

reveals that the measurement of organizational interoperability<br />

layers is possible, but for some measurement constructs mixed<br />

reviews were found by the participants about the maturity levels.<br />

For example, the interpretation of measured maturity levels is<br />

difficult as it partly depends on the type, complexity, and scope of<br />

organizational functions, operations, and processes. Some experts<br />

had the consensus about the understanding of measures, whereas<br />

others had different views. This can be observed by looking at the<br />

variations in values of standard deviation compared to their<br />

averages. For example two constructs of policy and economic<br />

measures i.e. collaboration and financial constraints have an<br />

average of 7 and 7.12 but standard deviation values (6.11 - 7.89)<br />

and (6.09 – 8.15) respectively, which means that some<br />

participants partially disagree with the average maturity level<br />

assigned by others.


Furthermore, it is understood from the highest standard deviation<br />

values for political commitment (8.81) and financial constraints<br />

(8.15) that though some participants were extremely positive<br />

about the consistent political will and funds, whereas others were<br />

not satisfied and had ambiguities. They believe that political<br />

commitment and financial constraints need further improvement.<br />

The discussions with experts revealed that the highest average<br />

(7.92) of political commitment does not necessarily represent the<br />

successful organizational interoperability as some commitments<br />

did not produce fruitful outcomes. Hence, despite of effective<br />

measurements outcomes, the benchmarking can be a disguise if<br />

the interpretation is not correct [4]. Furthermore, they argue that<br />

the policy makers should coordinate directly with back-office for<br />

feedback about these constructs. Selecting interoperability<br />

measures for benchmarking is difficult as the organizations vary<br />

in scope, objectives, and complexity. The measurement<br />

instrument and the constructs described in this paper are the first<br />

step towards advancement of organizational interoperability.<br />

Satisfaction shown from Population Welfare Department, The<br />

case of Sindh is a positive indication that the instrument is<br />

applicable and useful, but there is a need of further extension of<br />

this research to generalize the usefulness of in different types of<br />

public organizations.<br />

Finally, the participants were asked to discuss the applicability of<br />

the proposed measurement instrument and the measurement<br />

constructs for organizational interoperability. The overall<br />

feedback from the participants during participative discussions<br />

about the measurement instrument and constructs was quite<br />

satisfactory, whereas some participants had different views about<br />

some measurement constructs e.g. constitutional restrains and<br />

financial constraints. Though they agree upon the importance of<br />

including these constructs in assessment of organizational<br />

interoperability for the reasons of creating awareness that they’re<br />

important, the measuring and benchmarking of these constructs at<br />

the provincial, district, and local level requires further<br />

investigation. The discussion also concluded that more focus is<br />

required on the aspects of organziational interoperability as it is<br />

equally important to the technical interoperability.<br />

6. CONCLUSIONS<br />

Measurement of organizational interoperability is still a major<br />

challenge for public organizations as there is hardly any<br />

promising, tested, and validated measurement instruments.<br />

Although the organizational aspects of interoperability have<br />

recently proven themselves equally important as technical aspects,<br />

they are still sparsely described in conceptual maturity models and<br />

frameworks. There is hardly any available literature describing<br />

measurement methods and measures to assess organizational<br />

interoperability. There is a definite need of improvement in<br />

organizational interoperability as there are no existing benchmarks<br />

due to the lack of adequate measurement methods and measures.<br />

This paper proposes a measurement instrument focusing both<br />

organizational and technical interoperability. Based on the<br />

literature reviews of existing interoperability maturity models and<br />

frameworks, we developed a list of 15 organizational<br />

measurement constructs in 6 sub-layers of the organizational<br />

layer. Though the proposed measurement instrument includes<br />

both organizational and technical interoperability measurement<br />

layers, our focus was to assess organizational interoperability. The<br />

sub-layers of organizational interoperability provide the guideline<br />

for assessment, whereas the selection of relevant measures or<br />

measurement constraints can vary from organization or<br />

223<br />

organization. Furthermore, we conducted a case study of the<br />

population welfare organization government of Sindh to illustrate<br />

the operationalization of developed measurement instrument and<br />

test the applicability and usefulness of selected constructs. The<br />

case study shows that the measurement constructs and the<br />

instrument provides considerable insight into organizational<br />

aspects of interoperability. The case study entails that the<br />

measurement constructs can be implemented on top of each other.<br />

We found that our approach using measurement layers and<br />

constructs is seen as helpful, but further research is recommended<br />

to investigate the applicability of the measurement instrument<br />

while selecting and applying the measurement constructs to the<br />

different types of public organizations. Finally, we conclude that<br />

the target group of this case study was limited, whereas more<br />

respondents should be included for further evaluation of proposed<br />

measurement instrument and measures.<br />

7. ACKNOWLEDGEMENTS<br />

Thanks to director general Population Department, Government of<br />

Sindh for granting us permission to conduct interviews and survey<br />

session for case study. We specially thank the participants of<br />

PWD Sindh for interactively participating in questionnaire based<br />

survey on measuring and benchmarking the organizational<br />

interoperability.<br />

8. REFERENCES<br />

[1] Andersen, D.F. and S.S. Dawes, Government information<br />

management: A primer and casebook. 1991: Prentice Hall.<br />

[2] Archmann, S. and I. Kudlacek, Interoperability and the<br />

exchange of good practice cases. European Journal of<br />

ePractice, 2008. 2(1): p. 3-12.<br />

[3] ATHENA, C., Enterprise interoperability maturity model<br />

(EIMM) ATHENA IP (Advanced Technologies for<br />

interoperability of Heterogeneous Enterprise Networks and<br />

their Applications Integrated Project) IST-507849 accessed<br />

from: modelbased.net/aif/methodology/eimm.htm, 2004.<br />

[4] Bannister, F., The curse of the benchmark: an assessment of<br />

the validity and value of e-government comparisons.<br />

International Review of Administrative Sciences, 2007.<br />

73(2): p. 171.<br />

[5] Bellman, B. and F. Rausch, Enterprise Architecture for e-<br />

Government, in Electronic Government: Third International<br />

Conference, EGOV 2004, R. Traunmüller, Editor. 2004,<br />

Springer: Berlin / Heidelberg. p. 48-56.<br />

[6] Bostrom, R.P., and Heinen, J.S., "Mis Problems and Failures:<br />

A Sociotechnical Perspective Part I: The Cause", MIS<br />

quarterly, 1(3), 1977, pp. 17-32.<br />

[7] Caffrey, L., et al., Government secure intranets. Information<br />

technology & globalisation series. 1999, London:<br />

Commonwealth Secretariat.<br />

[8] Cimander, R. and H. Kubicek, Organizational<br />

interoperability and organizing for interoperability in egovernment.<br />

Second European Summit on Interoperability in<br />

the iGovernment held in Rome, 2009: p. 109–122.<br />

[9] Clark, T. and R. Jones. Organizational interoperability<br />

maturity model for C2. 1999.<br />

[10] Commission, S.S., A New Zealand E-Government<br />

Interoperability Framework (e-GIF). Retrieved from


http://unpan1.un.org/intradoc/groups/public/documents/apcit<br />

y/unpan006368.pdf, 2002.<br />

[11] DoD, W., DC., C4ISR Architectures Working Group report.<br />

Levels of Information Systems Interoperability (LISI)<br />

February ,1998 1998.<br />

[12] Dos Santos, E.M. and N. Reinhard, Electronic Government<br />

Interoperability: Identifying the Barriers for Frameworks<br />

Adoption. Social Science Computer Review, 2011.<br />

[13] Estermann, B., R. Riedl, and A.C. Neuroni. Integrated and<br />

transcendent e-government: keys for analyzing<br />

organizational structure and governance. 2009: Digital<br />

Government Society of North America.<br />

[14] Feenstra, R.W., M. Janssen, and R.W. Wagenaar, Designing<br />

a Service Composition Framework to Support Multi Actor<br />

Network, in Proceedings of Euro mGov 2006: The Second<br />

European Conference on Mobile Government, I. Kushchu, C.<br />

Borucki, and G. Fitzpatrick, Editors. 2006, Mobile<br />

Government Consortium International LLC: Brighton, UK.<br />

p. 103-112.<br />

[15] Gatautis, R., E. Vitkauskaitė, et al. (2009). Lithuanian<br />

eGovernment interoperability model.<br />

[16] Goldkuhl, G. The challenges of Interoperability in Egovernment:<br />

Towards a conceptual refinement. 2008.<br />

[17] Gottschalk, P. and H. Solli-Saether, Stages of e-government<br />

interoperability. Electronic Government, an International<br />

Journal, 2008. 5(3): p. 310-320.<br />

[18] Guédria, W., Y. Naudet, et al. (2008). Interoperability<br />

Maturity Models–Survey and Comparison–, Springer.<br />

[19] Guijarro, L., Interoperability frameworks and enterprise<br />

architectures in e-government initiatives in Europe and the<br />

United States. Government Information Quarterly, 2007.<br />

24(1): p. 89-101.<br />

[20] Hamilton, A., et al., The federalist papers. 2008: Oxford<br />

University Press, USA.<br />

[21] Hjort-Madsen, K., Enterprise architecture implementation<br />

and management: A case study on interoperability. 2006.<br />

[22] IDABC, E., Draft document as basic of EIF version 2.0.<br />

European Communities: accessed on 02-01-2011 at<br />

http://ec.europa.eu/idabc/servlets/Docb0db.pdf?id=31597,<br />

2008.<br />

[23] IDABC, E., European Interoperability Framework for Pan-<br />

European E-Government Services. European Communities,<br />

2004.<br />

[24] IEEE, IEEE Standard Computer Dictionary: A Compilation<br />

of IEEE Standard Computer Glossaries. 1990: New York:<br />

IEEE, 1990.<br />

[25] IEEE, Standards Information Network IEEE 100—The<br />

authoritative dictionary of IEEE standards terms (7th ed.).<br />

New York, NY: IEEE., 2000.<br />

[26] Janssen, M. and A. Joha, Understanding IT governance for<br />

the operation of shared services in public service networks.<br />

International Journal of Networking and Virtual<br />

Organizations, 2007. 4(1): p. 20-34.<br />

[27] Janssen, M. and A.M. Cresswell, An enterprise application<br />

integration methodology for e-government. Journal of<br />

224<br />

Enterprise Information Management, 2005. 18(5): p. 531-<br />

547.<br />

[28] Janssen, M. and H. Scholl. Interoperability for electronic<br />

governance. 2007: ACM.<br />

[29] Klischewski, R., Information integration or process<br />

integration? How to achieve interoperability in<br />

administration. Electronic Government, 2004: p. 57-65.<br />

[30] Kubicek, H. and R. Cimander, Three dimensions of<br />

organizational interoperability. European Journal of<br />

ePractice, 2009.<br />

[31] Lueders, H. Interoperability and Open Standards for<br />

eGovernment Services. 2005.<br />

[32] Maheshwari, D., A.F.v. Veenstra, and M. Janssen,<br />

Developing Measures for Benchmarking the Interoperability<br />

of Public Organizations. 16-17 June, ECEG Ljubljani,<br />

Slovenia. 2011.<br />

[33] Moen, W., Interoperability for Information Access:<br />

Technical Standards and Policy Considerations. Journal of<br />

Academic Librarianship, 2000. 26(2): p. 129-32.<br />

[34] NATO, NATO C3 Technical Architecture (NC3TA). 34<br />

(ADatP-34) March 2003, NATO standard website:<br />

http://www.nato.int/docu/standard.htm, 2003.<br />

[35] Panetto, H. and A. Molina (2008). "Enterprise integration<br />

and interoperability in manufacturing systems: Trends and<br />

issues." Computers in industry 59(7): 641-646.<br />

[36] Pardo, T.A. and G.B. Burke, Improving Government<br />

Interoperability: A capability framework for government<br />

managers. Center for Technology in Government, Albany,<br />

2008.<br />

[37] Pardo, T.A. and G.B. Burke, IT Governance Capability:<br />

Laying the foundation for government interoperability.<br />

Center for Technology in Government Technical Report,<br />

2009.<br />

[38] Pardo, T.A., T. Nam, and G.B. Burke, E-Government<br />

Interoperability: Interaction of Policy, Management, and<br />

Technology Dimensions. Social Science Computer Review,<br />

2011.<br />

[39] Picot, A., R. Reichwald, et al. (2008). Information,<br />

organization and management, Springer Verlag.<br />

[40] Schekkerman, J., Extended Enterprise Architecture Maturity<br />

Model (E2AMM) Version 2.0. 2006.<br />

[41] Scholl, H. and R. Klischewski, E-government integration and<br />

interoperability: framing the research agenda. International<br />

Journal of Public Administration, 2007. 30(8): p. 889-920.<br />

[42] Seifert, J.W. A primer on e-government: Sectors, stages,<br />

opportunities, and challenges of online governance. 2003:<br />

DTIC Document.<br />

[43] Shahkooh, K. A., M. Sadeghi, et al. (2011). "Interoperability<br />

Evaluation of Iranian Organizations through Proposed<br />

National E-government Interoperability Framework (Case<br />

Study of Tehran Municipality)." Journal of AISS: Advances<br />

in Information Sciences and Service Sciences 3(1): 62-77.<br />

[44] Strang, T. and C. Linnhoff-Popien. Service interoperability<br />

on context level in ubiquitous computing environments. in<br />

International Conference on Advances in Infrastructure for<br />

Electronic Business, Education, Science, Medicine, and


Mobile Technologies on the Internet (SSGRR2003w),<br />

L'Aquila/Italy (2003). 2003b: Citeseer.<br />

[45] Strang, T., C. Linnhoff-Popien, and K. Frank. CoOL: A<br />

context ontology language to enable contextual<br />

interoperability. 2003a: Springer, page(s) 236-247.<br />

[46] Tolk, A. and J. Muguira. The levels of conceptual<br />

interoperability model. 2003: Citeseer.<br />

[47] Tolk, A., et al., Composable M&S web services for netcentric<br />

applications. The Journal of Defense Modeling and<br />

Simulation: Applications, Methodology, Technology, 2006.<br />

[48] Traunmüller, R. and M. Wimmer, E-government: the<br />

challenges ahead. Electronic Government, 2004: p. 1-6.<br />

[49] Turnitsa, C. Extending the levels of conceptual<br />

interoperability model. 2005.<br />

[50] van der Veer, H. and A. Wiles, Achieving Technical<br />

Interoperability. European Telecommunications Standards<br />

Institute, 2008.<br />

[51] Weedman, J., Informal and formal channels in boundaryspanning<br />

communication. Journal of the American Society<br />

for Information Science, 1992. 43(3): p. 257-267.<br />

[52] Widergren, S.E., et al., Interoperability Context-Setting<br />

Framework. 2007, GWAC Interoperability Workshop, April<br />

11-12, 2007. Dallas, Texas. Pacific Northwest National<br />

Laboratory (PNNL), Richland, WA (US).<br />

225


Ranking and Hotspot Detection Methods on Infant Health for<br />

Districts in Java, Indonesia: E-Governance Micro Tools<br />

Yekti Widyaningsih<br />

Department of Mathematics<br />

Faculty of Mathematics and Natural Sciences<br />

University of Indonesia<br />

yekti@ui.ac.id<br />

ABSTRACT<br />

As the Academia stakeholder, this paper shares the method and<br />

theory which extend the understanding of Electronic Governance.<br />

The purpose of this research is to obtain the ranking of infant<br />

health in Java based on five indicators and three indicators. These<br />

indicators or variables are number of infant deaths (infd), number<br />

of people in poverty (pov), number of infants with low birth<br />

weight (lbw), number of deliveries in absence of health personnel<br />

(abhp), and average education shortfall of women (avedsf). All<br />

variables are district level aggregates. Besides ranking, hotspots<br />

based on those indicators are also detected by ULS hotspot<br />

detection method, while rankings are computed based on ORDIT,<br />

implemented in R software. Rankings of the districts based on 5<br />

(all) indicators and 3 indicators (infd, pov, lbw) are obtained. Also,<br />

ranking is obtained based on salient scaling of 5 indicators and<br />

salient scaling of 3 indicators. According to those results, the most<br />

severe districts are districts 87 and 90, while the least severe<br />

districts are districts 73, 31, and 35. There are many districts in<br />

the hotspot area as the results of the ULS hotspot detection.<br />

Districts 87, 90, 47, 58, 83, 44, and 45 are the worst areas of<br />

infant health. This result is important information for the<br />

government, especially the Health Department to make decisions<br />

for the improvement of health programs. The methods can be used<br />

as a micro tool to extend the function and understanding of egovernance.<br />

Categories and Subject Descriptors<br />

D.2.4 [Software/Program Verification - Statistical method]; G.3<br />

[Probability and Statistics – Correlation];J.2 [Physical Sciences<br />

and Engineering - Mathematics and statistics]; J.4 [Social and<br />

Behavioral Sciences – Sociology]; K.6 [Management of<br />

Computing and Information Systems]<br />

General Terms<br />

Measurement, Performance, Theory, Legal Aspects, Verification<br />

Keywords<br />

Ranking, Infant Health Indicators, ORDIT, R Software,<br />

Computational Complexity, Hotspot, Upper Level Set Scan<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

226<br />

Wayne L. Myers<br />

Penn State Institutes of Energy and Environment<br />

Penn State University, University Park,<br />

PA 16802 USA<br />

wlm@psu.edu<br />

Statistics<br />

1. INTRODUCTION<br />

Governments around the world wrestle with a wide range of social<br />

and political challenges and look for innovations in technology,<br />

not only in the government institutions of, but also in the<br />

interactions between the government and citizens to help them<br />

meet these challenges. Serving citizens efficiently and effectively,<br />

engaging interested parties in decision making, and creating<br />

sustainable economies, are among the many ways innovations in<br />

policy and practice can directly impact the public value created by<br />

any Electronic Governance investment. To justify continued or<br />

new investments in Electronic Governance, decision makers must<br />

increasingly provide evidence that the innovations they are<br />

supporting create public value. Decision-makers play a very<br />

important role in the management of a country. The decisions<br />

made will have an impact, both at present and in the future. As the<br />

Academia stakeholder, this paper shares the methods and theories<br />

which extend the understanding of Electronic Governance.<br />

Hopefully, this paper can contribute concrete solutions for<br />

specific challenges faced by governments, especially in making a<br />

decision about infant health improvement. To achieve effective<br />

decision making, it is important to know the areas or districts most<br />

in need of improvement. For a problem like this, ranking methods<br />

are necessary.<br />

To meet these social challenges, it is important for the<br />

government to plan and arrange budgets at the districts level that<br />

are appropriate to its need for improvement in particular matters.<br />

This paper focuses on districts ranking based on infant health<br />

indicators. Many researches about infant health have been done.<br />

Some of them are as follows. A research has shown that<br />

persistence of poverty and continuing unequal distribution of<br />

health care resources to pregnant women and young mothers<br />

render relative risks of neonatal and post-neonatal mortality 1.5<br />

times greater than that experienced by infants not born in poverty<br />

[1]. In addition, ‘poverty is infant health risk’ is a theoretical<br />

proposition according to Centers for Disease Control and<br />

Prevention [2]. OECD reported that the correlation between<br />

percentage of low birth weight infants and infant mortality rates is<br />

stronger in emerging countries [3]. Other research showed that<br />

adding a maternity clinic to a village decreases the odds of infant<br />

mortality by almost 15 per cent, in comparison to the risk before<br />

the clinic was added. An additional doctor reduces the odds by<br />

about 1.7 per cent [4]. Furthermore, the final model of Desai and<br />

Alva, shows that maternal education has a statistically significant<br />

impact on infant mortality and height-for-age in only a handful of<br />

countries [5]. According to those findings, an abstract concept,<br />

infant health relates to the six measurable indicators: poverty,<br />

infant mortality, low birth weight, health personnel, and education<br />

1


of mothers. Based on this reason, we decided to use these<br />

indicators to obtain the ranking of districts. The objective of the<br />

current research is to find which districts are the worst districts for<br />

infant health. Infant health is an important factor to be discussed<br />

because this factor is the result of many other factors related to<br />

socio economic components [6]. This research focused on five<br />

indicators to be investigated.<br />

Ranking methods based on multiple indicators using R open<br />

source software and hotspot detection using ULS software are<br />

introduced here as tools to support the Ministry of Health. This<br />

concept can be used as a micro tool in e-governance and is<br />

available to support e-health governance in implementing the full<br />

range of government activities, internal processes, the<br />

development of policy and services for citizens. The possible<br />

systematic process is as the following: idea -- algorithm –<br />

(implementation on R software) -- subroutine on C ++ (program<br />

language) – online user friendly interface display.<br />

The study area of this research is Java, one of the five biggest<br />

islands in Indonesia. The Capital city of Indonesia is located in the<br />

west area of Java. The percentage of population on this island is<br />

about 60% of the total population of Indonesia [7]. This is one<br />

reason why this island is interesting to be studied.<br />

The method of this research is prioritization based on partial order<br />

theory. Through this method, a ranking of the districts based on<br />

five and three indicators will be found. The present purpose is to<br />

provide convenient computational capability and visualizations<br />

for progressive or partial prioritization based largely on concepts<br />

of partial order theory and implemented in R [8] as illustrated in a<br />

context of infant health as a complex multidimensional domain<br />

that must be placed in public and private perspectives in pursuit of<br />

public health management. One of the practical perspectives in<br />

the health status of a district is concerned with infant health which<br />

has multiple indicators [9]. Here the focus is on placing the<br />

multiple dimensions of infant health in a professional and public<br />

perspective to support district improvement policy. Furthermore, a<br />

hotspot of these indicators is detected using ULS method.<br />

2. DATA<br />

As an abstract measure of a district, infant health is supported by<br />

five indicators as mentioned in section 1. Table 1 shows the data<br />

for this purpose consisting of five indicators of infant health<br />

[7][10]. They are the number of infant deaths (infd), the number<br />

of people in poverty (pov) in thousands, the number of infants<br />

with low birth weight (lbw), the percentage of deliveries in<br />

absence of health personnel (abhp), and average education<br />

shortfall of women (avedsf) in years. All variables are aggregates<br />

of district. The value of avedsf is computed by subtracting average<br />

duration of education in a district from maximum in all districts.<br />

The district column is the id for districts, infd is the number of<br />

infant deaths, pov is the number of people in poverty (in<br />

thousands), lbw is the number of infants with birth weight less<br />

than 2500grams, abhp is the percentage of deliveries (births)<br />

without health personnel presence, and avedsf is average of<br />

women education shortfall as explained earlier.<br />

The study area of this research is Java in Indonesia but omitting<br />

Banten province and Kepulauan Seribu districts because of<br />

incomplete data in those areas. Figure 1a is the map of Java<br />

(without Banten province and Kepulauan Seribu district) with<br />

district id, mapped by the R sp package [11][12].<br />

227<br />

Latitude<br />

10°�S<br />

Table 1. Leading lines of the dataset with infant health<br />

indicators as column criteria and districts as cases<br />

4°�S<br />

6°�S<br />

8°�S<br />

district infd pov lbw abhp avedsf<br />

1 61 125.6 145 20.02 4.4<br />

2 112 157.9 187 14.63 4.6<br />

3 78 149.1 130 16.19 3.7<br />

4 97 170.5 252 2.95 3.4<br />

5 83 171.2 250 0.51 3.6<br />

6 298 267.4 401 11.56 3.5<br />

... ... ... ... ... ...<br />

107 106 94<br />

104 105 99 93<br />

100<br />

79 95<br />

91<br />

92<br />

90<br />

63<br />

96<br />

80<br />

81<br />

87 98<br />

61<br />

89 88<br />

62 60<br />

101<br />

78<br />

97<br />

77<br />

64<br />

82<br />

86<br />

23<br />

29<br />

72 71 70 69 68 67 76<br />

26 27<br />

58 59<br />

28<br />

24 25<br />

66 65<br />

22<br />

46 37<br />

83 102 103<br />

47<br />

75<br />

44 45<br />

50<br />

52 57<br />

84<br />

85<br />

73<br />

21<br />

35 15<br />

51 74<br />

18 17 16<br />

48<br />

56<br />

20 3619<br />

34<br />

49 42 53 54<br />

14<br />

39 43<br />

33<br />

306<br />

38<br />

12<br />

40 55<br />

13<br />

2<br />

32<br />

11<br />

41<br />

1 3<br />

4 315<br />

7 8<br />

9<br />

10<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

Figure 1a. Map of Java (without Banten Province and<br />

Kepulauan Seribu District) with district id as mapped by the<br />

R sp package [11],[12].<br />

Some districts have a capital city located in the centre with its<br />

own data. As an example, district 73 is in the middle of district 51,<br />

district 31 is in the middle of district 5, district 35 is in the middle<br />

of district 16, and there are 19 other city-type districts as well.<br />

3. DATA COLLECTION<br />

The data used in this study is secondary data derived from Data<br />

and Information Centers, Health Department of Indonesia [10].<br />

This secondary data is obtained from the reports of public health<br />

centers and hospitals in every district. The data are indicators of<br />

infant health in every district, i.e. the number of infant deaths, the<br />

number of babies with weight below normal, the number of births<br />

without any medical personnel present, and maternal education,<br />

while the number of people in poverty was obtained from<br />

Indonesian Statistics [7].<br />

The number of people in poverty is the population that is under<br />

the poverty line. The poverty line is used as a boundary to<br />

determine whether or not a person is poor. In 2007, the definition<br />

for the poor are the people who have an average per capita<br />

expenditure per month below the poverty line of Rp 211.726<br />

(about U.S. $ 20) [7].<br />

4. DATA PROCESSING<br />

The steps of data processing in this research are (1) preparing the<br />

data set for ORDIT into k+1 columns as shown in Table 1, where<br />

k is the number of indicators, first column is the case id, (2)<br />

obtaining the scatter plot and correlation coefficients of the<br />

indicators, (3) transforming the values of indicators to the ranks,<br />

(4) obtaining the ranking of the districts based on 5 indicators, 3<br />

indicators, and 2 indicators (salient5 and salient3, the ranking<br />

results of 5 indicators and 3 indicators, respectively) using ORDIT<br />

2


method, (5) preparing the data set for ULS process (hotspot<br />

detection) into 4 columns: id, number of cases, population size,<br />

and adjacent districts (6) detecting the hotspot area for each<br />

indicator, (7) comparing and summarising the results.<br />

In step (4), ranking is carried out for 5 and 3 indicators because<br />

those 3 indicators, i.e. infd, pov, and lbw have stronger<br />

correlations than the others. These results will be compared.<br />

Computations for steps (2), (3), and (4) use R open source<br />

software and computation for step (6) using ULS software. Figure<br />

1b presents the flowchart of data processing.<br />

Figure 1b. Flowchart of data processing<br />

5. METHOD<br />

The methods used in this research are ordering dually in triangles<br />

for ranking, and upper level set scan statistics for hotspot<br />

detection.<br />

5.1 Ordering Dually in Triangles<br />

Ordering Dually in Triangles (ORDIT) is a method for ranking<br />

purposes based on several indicators. Many objects can be ranked,<br />

such as persons, districts, schools, universities, and many others.<br />

ORDIT method in this research is used to rank the districts based<br />

on 5 and 3 infant health indicators.<br />

To obtain the ranking of the objects, this method uses<br />

mathematical concepts related to the partial order set (poset). The<br />

following subsubsections describe the ORDIT theory.<br />

In mathematics, especially order theory, a partially ordered<br />

set (or poset) formalizes and generalizes the intuitive concept of<br />

an ordering, sequencing, or arrangement of the elements of a set.<br />

A poset consists of a set together with a binary relation that<br />

indicates that, for certain pairs of elements in the set, one of the<br />

elements precedes the other. Such a relation is called a partial<br />

order to reflect the fact that not every pair of elements need be<br />

related: for some pairs, it may be that neither element precedes the<br />

other in the poset. Thus, partial orders generalize the more<br />

familiar total orders, in which every pair is related.<br />

5.1.1 Rating Relations/Rules for Ascribing Advantage<br />

This subsubsection describes the protocols for comparing cases or<br />

collectives of cases via ratings, rules and relations that ascribe<br />

advantage to some cases over some others or fail to do so for<br />

228<br />

particular pairs [7]. There are three possibilities in comparing<br />

pairs of cases, where one case is denoted by Г and the other by θ.<br />

“Г aa θ” wherein Г has ascribed advantage over θ. Г has<br />

subordinate status to θ which implies “θ aa Г”. “Г ii θ” whereby<br />

these are indefinite instances without ascribed advantage and<br />

without subordinate status, which implies “θ ii Г”. Thus the<br />

protocol either designates one member of a pair as having<br />

ascribed advantage and the other subordinate status, or that<br />

pairing as being indefinite. ff(aa) is the frequency of number of<br />

occurrences for the ascribed advantage. ff(ss) is the frequency of<br />

number of occurrences for the subordinate status. ff(ii) is the<br />

frequency of number of occurrences for being indefinite. Each of<br />

the N cases can be compared on this basis to all others in the<br />

deleted domain DD=N–1 of competing cases with the percent<br />

occurrence of these relations being tabulated as follows, AA =<br />

100 × ff(aa)/DD, SS = 100 × ff(ss)/DD, II = 100 × ff(ii)/DD.<br />

Clearly, AA + SS + II = 100%; and for later use let us define<br />

CCC = 100 – AA as the complement of case condition relative to<br />

ascribed advantage (AA) [8].<br />

5.1.2 Subordination Schematic and Ordering Dually in Triangles<br />

(ORDIT)<br />

Subordination can be symbolized diagrammatically [8] in a<br />

triangle depiction, where the point representing a district makes a<br />

triangle divided into two parts, ‘trapezoidal triplet’ (of AA, SS,<br />

and II) and a topping triangle (of CCC and II). The combination<br />

of these two parts forms a right triangle with the ‘tip’ at AA =<br />

100% in the upper-left and the toe at SS = 100% in the lower-right<br />

(see Figure 5). The hypotenuse is a right-hand ‘limiting line’ of<br />

plotting positions because AA+SS+II=100%. Topping triangle<br />

provides the basis for an ‘ORDIT ordering’ of the districts or<br />

instances.<br />

An idealized district has AA = 100% of the deleted domain (DD)<br />

of other districts, that is the frequency of ascribed advantage being<br />

equal to the number of competing districts, so if the ideal actually<br />

occurs, then the trapezoidal triplet becomes a triangle.<br />

The numbers for ORDIT can be coupled as a decimal value<br />

ccc.bbb. The ccc component is obtained by rounding CCC to two<br />

decimal places and then multiplying by 100. The bbb component<br />

is obtained by dividing SS by CCC, and imposing 0.999 as an<br />

upper limit. Then add these two values as ccc.bbb. This ordering<br />

is assigned the acronym ORDIT for ORdering Dually In<br />

Triangles. It preserves all aspects of AA, SS and II except for the<br />

actual number of districts. Simple rank ordering of ORDIT values<br />

becomes salient scaling of the district [8].<br />

5.1.3 Product-order Rating Regime<br />

A general relational rule for ascribing advantage is product-order<br />

whereby advantage is gained by having all criteria at least as good<br />

and at least one better. Conversely, subordinate status lies with<br />

having all criteria at least as poor and at least one poorer. This<br />

relational rule is applicable to all kinds of criteria as long as they<br />

have the same polarity (sense of better and worse). Scheme 2 in<br />

[8] Function Facilities gives an R function called ProdOrdr that<br />

determines ORDITs and salient scaling according to productorder.<br />

This function takes as its inputs a vector of IDs for<br />

instances and a data frame of same-sense criteria. All indicators<br />

are either positive sense or negative sense. Indicators in this<br />

research are negative indicators which means that the larger<br />

the value of the indicators, the more severe the district. The output<br />

is a data frame of ORDITs and salient scaling values<br />

3


5.1.4 Precedence Plots<br />

Based on computation of AA and SS for a particular district, the<br />

structure in the lower part of the subordination schematic can be<br />

used to prepare a ‘precedence plot’ for visualization (Figure 5).<br />

The precedence plot is a plot for AA (ascribed advantage) as Yaxis<br />

and SS (subordinate status) as the X-axis. The prominent<br />

position declines from top (upper-left) to toe (lower-right).<br />

Primary prominence varies vertically showing that there is a<br />

larger percentage of ascribed advantage (greater severity) with<br />

increasing height. Horizontal variation on a given level shows<br />

clarity of comparison. Farther to the right is greater clarity as<br />

more definite (less severe) with a larger percentage of subordinate<br />

status versus indefinite instances among the couplets where<br />

ascribed advantage (greater severity) is lacking. In other words,<br />

more indefinite instances constitute increased lack of clarity<br />

(incomparability in the usual parlance of partial ordering).<br />

Scheme 3 in [8] Function Facilities gives an R function named<br />

PrecPlot which accepts the output of the ProdOrdr function and<br />

produces a precedence plot.<br />

5.1.5 Representative Ranks<br />

Representative ranks show descriptive order statistics of indicator<br />

rankings for each district. Representative ranks are concerned<br />

with the rank distribution for any particular district. The rank<br />

numbers received by a given district across all criteria can be<br />

placed in a single array and sorted in ascending order. The<br />

minimum, median, and maximum ranks for the district are<br />

conveniently informative.<br />

5.2 Upper Level Set (ULS) Scan statistics<br />

By definition, a hotspot is a zone characterized by a high response<br />

rate, it makes intuitive sense that ULS method search for a hotspot<br />

begin with a cell with the highest response rate and annex to it<br />

other cells with high response rates. The need to bring a definite<br />

order for the search leads one to the concept of the ULS scan tree<br />

or just the ULS tree. Denoting for cell a the response rate ga =<br />

ya/na, a ∈ T over the connected region R, we define the ULS tree<br />

as follows:<br />

Let G = {ga | a ∈ T}<br />

Suppose r1 > r2 > … > rm are all distinct members of G.<br />

Define for i = 1, 2, …, m,<br />

Ti = { a ∈ T | ga = ri },<br />

and the upper level sets as unions of Ti’s,<br />

Ui = T1 ∪ T2 ∪ … ∪ Ti<br />

= { a ∈ T | ga ≥ ri }.<br />

Let Ci = set of connected components of Ui, i = 1, 2, …, m, and<br />

the reduced parameter space ΩULS = C1 ∪ … ∪ Cm.<br />

The ULS tree = (ΩULS) is a tree whose nodes are members<br />

of Ω ULS. The root of the ULS tree is Um = R. Let Z be a node<br />

belonging to the ULS tree. If all cells belonging to Z have the<br />

same response rate, then Z is a leaf node. Thus, members of C1 are<br />

leaf nodes. If not all cells in Z have the same rates then let e =<br />

min{ ga | a ∈ Z} and connected components of Z – {a ∈ Z: ga =<br />

e} are members of Z. [13]<br />

Since our search for a hotspot is based on cellular response rates,<br />

we assign a unique level to each node of the ULS tree in terms of<br />

its response rate and then scan the tree by level starting with nodes<br />

level 1 down. Members of C1 are level 1 nodes. The root is the<br />

level m node. In general, for 1 ≤ i ≤ m, the level of a zone Z is i if<br />

and only if min{ ga | a ∈ Z } = ri. Since each cell is introduced in<br />

229<br />

a unique node in the ULS tree, the ULS tree has at most N nodes.<br />

Hence |ΩULS| ≤ N, the equality holding if and only if m = N. [13]<br />

Several geometric properties should be satisfied by a collection of<br />

cells from tessellation of study area before it could be considered<br />

as a candidate for a hotspot cluster<br />

1) the union of the cells should comprise a geographically<br />

connected subset of the region R. Such collections of cells<br />

will be referred to as zones and the set of all zones is denoted<br />

by Ω. A zone Z∈Ω is a collection of cells that are connected.<br />

2) the zone should not be excessively large. This restriction is<br />

generally achieved by limiting the search for hotspot to zones<br />

that do not comprise more than fifty percent of the region.<br />

[14]<br />

6. RESULTS AND DISCUSSION<br />

6.1 Correlation Analysis and Descriptive<br />

Statistics<br />

Paired scatter plots make a simple way to see and get information<br />

about the strength of the relationship between two indicators.<br />

Scatter plots of pairs of infant health indicators are shown in<br />

Figure 2. If the observation points tend to be in a straight line,<br />

there is a correlation (relationship) between two variables<br />

(indicators). Table 2 shows the correlation coefficient between<br />

two indicators. Through this table it can be seen how strong the<br />

relationship between the two indicators is. According to Figure 2,<br />

there are tendencies of linear relationship between indicators infd<br />

and pov, infd and lbw, and pov and lbw. Table 2 shows that the<br />

correlation between infant death and poverty is 0.567. It can be<br />

said that there is a positive statistical association between those<br />

two indicators because it has p-value of 1.621e-10 (less than<br />

0.05). In statistics, if a parameter estimation (in this case is the<br />

coefficient correlation) has p-value of less than 0.05, it means the<br />

error probability of making conclusion is less than 5 percent. This<br />

is also true regarding infant death and low birth weight (r =<br />

0.4163; p-value = 7.425e-06); and for poverty and low birth<br />

weight (r = 0.399; p-value < 0.0001). There are positive<br />

relationships between infant death (infd) and absence of health<br />

personnel (abhp) and also between infd and average education<br />

shortfall (avedsf), even though both relationships are weaker. The<br />

relationship between infant death and births without health<br />

personnel (abhp) is stronger (r = 0.319; p-value = 0.0007531)<br />

than the relationship between infant death and average education<br />

shortfall (r = 0.290; p-value = 0.002375).<br />

Variability of the infant health indicators is shown by Figure 3a<br />

and 3b. Figure 3a shows boxplots of infm, pov (in thousands), and<br />

lbw. Thus, lbw is more variable than the other two indicators and<br />

contains outliers. Figure 3b shows boxplots of births without<br />

health personnel (%) and education shortfall.<br />

4


0 200 600<br />

0 10 30 50<br />

infd<br />

0 200 600 0 10 30 50<br />

pov<br />

lbw<br />

abhp<br />

0 200 400 600 0 1000 2000 0 2 4 6<br />

Figure 2. Scatter plots of five indicators of infant health<br />

Table 2. Correlation matrix of five indicators of infant health<br />

infd pov lbw abhp avedsf<br />

infd 1.000 0.567 0.416 0.319 0.290<br />

pov 0.567 1.000 0.399 0.317 0.559<br />

lbw 0.416 0.399 1.000 0.304 -0.005<br />

abhp 0.319 0.317 0.304 1.000 0.299<br />

avedsf 0.290 0.559 -0.005 0.299 1.000<br />

0 500 1000 1500 2000 2500<br />

infd pov lbw<br />

avedsf<br />

Figure 3a. Parallel Boxplots of infant health data (Infant<br />

deaths, poverty, low birth weight) in Java, 2007<br />

0 200 400 600<br />

0 1000 2000<br />

0 2 4 6<br />

230<br />

0 10 20 30 40 50<br />

abhp avedsf<br />

Figure 3b. Parallel Boxplots of infant health data (births<br />

without health personnel, average education shortfall) in Java,<br />

2007<br />

6.2 Ranking Process<br />

Better results of the ORDIT method will be obtained if the<br />

correlations between indicators are sufficiently strong. Based on<br />

Table 2, correlations between infd, pov, and lbw are higher with<br />

each other than the correlation between abhp and avedsf. For this<br />

reason, ranking of districts will be carried out based on 5 (all)<br />

indicators and 3 indicators (infd, pov, lbw). A comparison of the<br />

results will give a broader view of the ranking. Theoretically, rank<br />

results will be more representative, if the variables (indicators)<br />

have stronger relationship or higher coefficient correlation where<br />

infant health is an abstract concept and unable to be measured.<br />

Table 3 shows the place rank of each infant health indicator for<br />

the leading lines of the data sets by Function Facilities of R [8]<br />

function called PlacRank in Schema 1. The first column of the<br />

data frame to be ranked is assumed to contain case identifiers, and<br />

this column remains unaltered.<br />

Table 3. Head (first 6 lines) of the data frame in ranking<br />

obtained by applying the PlacRank function to place ranks of<br />

infant health indicators via the R commands [8]<br />

No. district infd pov lbw abhp avedsf<br />

1 1 85.5 77 82.0 30 28.5<br />

2 2 53.0 71 71.0 44 22.5<br />

3 3 75.5 72 86.5 41 54.0<br />

4 4 62.0 67 55.0 92 65.0<br />

5 5 72.0 66 56.5 98 57.5<br />

6 6 12.0 40 38.0 59 61.0<br />

Tables 4a and 4b show the head (first six lines) of the data frame<br />

obtained by applying the ProdOrdr function to the place ranks of<br />

infant health measurement. In the current content, the idea of<br />

‘better’ from reference [4] is replaced by ‘more severe’. Table 4a<br />

and 4b are the results of ProdOrdr for 5 indicators and 3 indicators<br />

respectively. Figure 4 is a scatter plot of these two salient scaling<br />

(rankings) based on 5 and 3 indicators. It shows that there is a<br />

linear tendency between those two ranking results with correlation<br />

0.82 (p-value < 2.2e-16). This means the rankings based on 5 and<br />

5


3 indicators are similar but not the same. In this case, the ranking<br />

process may use only 3 indicators, especially if the principle of<br />

parsimony is applied.<br />

Table 4a. Head (first 6 lines) of data frame obtained by<br />

applying the ProdOrdr function to place ranks of infant<br />

health measurement for 5 indicators via the R commands [4]<br />

CaseIDs AA SS ORDIT Salient<br />

1 13.08 7.48 8692.086 46.5<br />

2 13.08 7.48 8692.086 46.5<br />

3 12.15 19.63 8785.223 52<br />

4 5.61 30.84 9439.327 71.5<br />

5 3.74 28.97 9626.301 80<br />

6 21.5 6.54 7850.083 28.5<br />

Table 4b. Head (first 6 lines) of data frame obtained by<br />

applying the ProdOrdr function to place ranks of infant<br />

health measurement for 3 indicators via the R commands [8]<br />

CaseIDs AA SS ORDIT Salient<br />

salient3<br />

1 13.08 57.94 8692.667 79<br />

2 19.63 38.32 8037.477 58<br />

3 14.02 53.27 8598.62 76<br />

4 24.3 35.51 7570.469 51<br />

5 20.56 37.38 7944.471 57<br />

6 46.73 7.48 5327.14 22<br />

0 20 40 60 80 100<br />

45<br />

0 20 40 60 80 100<br />

salient5<br />

Figure 4. Scatter Plot of salient with 5 indicators and 3<br />

indicators as generated by R [8]<br />

Precedence plot of districts by product-order is shown in Figure<br />

5a and 5b. The labels on plotted points in Figure 5 are district<br />

numbers in the data file. These lines must be retrieved to<br />

determine identities of the respective districts. Table 6a shows the<br />

five most severe districts based on 5 indicators and Figure 6a<br />

shows the map of these districts. Location of the 3 districts (90,<br />

64<br />

61<br />

15<br />

93<br />

231<br />

87, 81) is in West Java, while one district (47) is in Central Java<br />

and district 58 is at the border of Central Java and East Java.<br />

Table 6b shows the 5 least severe districts based on 5 indicators<br />

and Figure 6b shows the map of these districts. Location of the 5<br />

least severe districts (city type) is in the central of its main district<br />

and almost cannot be seen from the map on Figure 6b; district 73<br />

is in the middle of district 51 in Central Java; district 31 is in the<br />

middle of district 5; district 106 is a small area in the west area of<br />

the island; district 35 is in the middle of district 16; district 36 is<br />

in the middle of district 19. The three districts (31, 35, 36) are in<br />

East Java area.<br />

AA as %DD<br />

AA as %DD<br />

0 20 40 60<br />

0 20 40 60 80<br />

90<br />

87<br />

47<br />

58 84<br />

0 20 40 60 80<br />

4758<br />

72<br />

44<br />

83<br />

45<br />

90<br />

61<br />

79<br />

81<br />

9<br />

SS as %DD (Deleted Domain)<br />

(a)<br />

77 30<br />

34<br />

31<br />

43 73<br />

0 20 40 60 80<br />

SS as %DD (Deleted Domain)<br />

35 36 75<br />

106<br />

95 77 30<br />

101 34 7536<br />

106 96<br />

103 78<br />

43 31<br />

7338<br />

(b)<br />

Figure 5. Precedence plot (based on place ranks) of districts<br />

labeled with district numbers for 5 indicators (a) and 3<br />

indicators (b), from R commands [8]<br />

6


Table 6a. Five most severe districts based on 5 indicators<br />

according to ORDIT ordering and salient scaling, as retrieved<br />

by R commands [8]<br />

Latitude<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S<br />

CaseIDs AA SS ORDIT Salient<br />

90 74.77 0 2523 1<br />

87 58.88 0 4112 2<br />

47 51.4 0 4860 3<br />

58 45.79 0 5421 5<br />

81 45.79 0 5421 5<br />

107 106 94<br />

104 10599<br />

93<br />

100<br />

79 95<br />

91<br />

92<br />

90<br />

63<br />

96<br />

80<br />

81<br />

10197<br />

82<br />

87 98<br />

89 88<br />

86<br />

61<br />

62<br />

78 77<br />

64<br />

72 71 70 69 68 67 76<br />

58<br />

60<br />

59<br />

23<br />

24 25<br />

26<br />

29<br />

27 28<br />

83<br />

66 65<br />

22<br />

37<br />

102 46 47<br />

75<br />

85<br />

103<br />

44 45<br />

50<br />

52 57<br />

21<br />

35 15<br />

84<br />

73 51<br />

74<br />

18 17 16<br />

48 56 20 3619<br />

49<br />

34<br />

42 53 54<br />

14<br />

39 43<br />

33<br />

306<br />

38<br />

40<br />

13<br />

55 2<br />

41<br />

32<br />

12<br />

11<br />

1 3 4 315<br />

7 8<br />

9<br />

10<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

Figure 6a. Five most severe districts based on 5 indicators,<br />

mapped by the sp package of R [11],[12]<br />

Table 6b. Five least severe districts with 5 indicators<br />

according to ORDIT ordering and salient scaling, as retrieved<br />

by R commands [8]<br />

Latitude<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S<br />

CaseIDs AA SS ORDIT Salient<br />

73 0 63.55 10000.6 104<br />

31 0 71.03 10000.7 105<br />

106 0 71.96 10000.7 106<br />

35 0 81.31 10000.8 107<br />

36 0 82.24 10000.8 108<br />

107 106 94<br />

104105<br />

99 93<br />

100<br />

79 95<br />

91<br />

92<br />

90<br />

63<br />

96<br />

80<br />

81<br />

101 97<br />

82<br />

87 98<br />

89 88<br />

86<br />

61<br />

62<br />

78 77<br />

64<br />

72 71 70 69 68 67 76<br />

58<br />

60<br />

59<br />

23<br />

24 25<br />

26<br />

29<br />

27 28<br />

83<br />

66<br />

22<br />

46 65<br />

37<br />

102 103<br />

47<br />

75<br />

44 45<br />

50<br />

52 57<br />

84<br />

85<br />

73<br />

21<br />

35 15<br />

51<br />

74<br />

17 16<br />

48<br />

56<br />

19 18<br />

20 36<br />

34<br />

49 42 53 54<br />

14<br />

39 43<br />

33<br />

306<br />

38<br />

40<br />

13<br />

55 2<br />

41<br />

32<br />

1 3<br />

4 31<br />

5 7 8<br />

12<br />

11<br />

9<br />

10<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

232<br />

Figure 6b. Five least severe districts based on 5 indicators,<br />

mapped by the sp package of R [11],[12].<br />

Table 7a and 7b present the 5 most severe districts and the 5 least<br />

severe districts, respectively, based on 3 indicators. Five most<br />

severe districts are shown in Figure 7a. Two districts (83 and 87)<br />

are located in West Java, and 2 districts (44 and 90) are located in<br />

the border area between West Java and Central Java, and district<br />

45 locates in Central Java, this district adjacent to district 44.<br />

Figure 7b shows five least severe districts. District 43 is a city in<br />

the south area of Central Java, district 73 is in the center of district<br />

51 as mentioned before, district 38, district 31, and district 35 are<br />

districts in East Java. All these districts are city type districts.<br />

Table 7a. Five most severe districts with 3 indicators<br />

according to ORDIT ordering and salient scaling, as retrieved<br />

by R commands [8]<br />

CaseIDs AA SS ORDIT Salient<br />

44 90.65 0 935 1<br />

83 87.85 0 1215 2.5<br />

87 87.85 0 1215 2.5<br />

45 84.11 0 1589 4<br />

90 76.64 1.87 2336.08 5<br />

Table 7b. Five least severe districts with 3 indicators<br />

according to ORDIT ordering and salient scaling, as retrieved<br />

by R commands [8]<br />

Latitude<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S<br />

CaseIDs AA SS ORDIT Salient<br />

43 0 79.44 10000.794 104<br />

73 0 88.79 10000.888 105<br />

38 0 91.59 10000.916 106<br />

31 0 93.46 10000.935 107.5<br />

35 0 93.46 10000.935 107.5<br />

107 106 94<br />

104105<br />

99 93<br />

100<br />

91 90<br />

79 95<br />

92<br />

63<br />

87 98<br />

61 60<br />

89 88<br />

62<br />

78<br />

96<br />

101 97<br />

77<br />

64<br />

82<br />

86<br />

23<br />

26<br />

29<br />

72 71 70 69 68 67 76<br />

80<br />

59<br />

27 28<br />

81<br />

58<br />

24 25<br />

66<br />

22<br />

46 65<br />

37<br />

83 102 103<br />

47<br />

75<br />

44 45<br />

50<br />

52 57<br />

84<br />

85<br />

73<br />

21<br />

35 15<br />

51<br />

74<br />

17 16<br />

48<br />

56<br />

19 18<br />

20 36<br />

34<br />

49 42 53 54<br />

14<br />

39 43<br />

33<br />

306<br />

38<br />

12<br />

40<br />

13<br />

55 2<br />

32<br />

11<br />

41<br />

1 3<br />

4 31<br />

5 7 8<br />

9<br />

10<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

Figure 7a. Five most severe districts based on 3 indicators,<br />

mapped by the sp package of R [11],[12].<br />

7


Latitude<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S<br />

107 106 94<br />

104105<br />

99 93<br />

100<br />

91 90<br />

79 95<br />

92<br />

63<br />

87 98<br />

61 60<br />

89 88<br />

62<br />

78<br />

96<br />

101 97<br />

77<br />

64<br />

82<br />

86<br />

23<br />

26<br />

29<br />

72 71 70 69 68 67 76<br />

80<br />

59<br />

27 28<br />

81<br />

58<br />

24 25<br />

66<br />

22<br />

46 65<br />

37<br />

83 102 103<br />

47<br />

75<br />

44 45<br />

50<br />

52 57<br />

84<br />

85<br />

73<br />

21<br />

35 15<br />

51<br />

74<br />

17 16<br />

48<br />

56<br />

19 18<br />

20 36<br />

34<br />

49 42 53 54<br />

14<br />

39 43<br />

33<br />

306<br />

38<br />

12<br />

40<br />

13<br />

55 2<br />

32<br />

11<br />

41<br />

1 3<br />

4 31<br />

5 7 8<br />

9<br />

10<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

Figure 7b. Five least severe districts based on 3 indicators,<br />

mapped by the sp package of R [11],[12]<br />

Ranking of districts is continued based on salient scaling of 5<br />

indicators (salient5) and salient scaling based on 3 indicators<br />

(salient3) as indicators for new ranks.<br />

Table 8a shows the five least severe districts; and Table 8b shows<br />

the five most severe districts. Here sal5 and sal3 (salient result of<br />

5 and 3 indicators) used as indicators to obtain ranking of the<br />

districts. It has positive sense, so smaller number of the salient<br />

result means least severe of districts.<br />

Table 8a. Five least severe districts with salient5 and salient3<br />

as indicators according to ORDIT ordering and salient<br />

scaling, as retrieved by R commands [8]<br />

CaseIDs AA SS ORDIT Salient<br />

35 99.07 0.00 93 1<br />

31 97.2 0.93 280.332 2<br />

36 95.33 0.00 467 3<br />

73 95.33 1.87 467.4 4<br />

43 94.39 2.80 561.499 6<br />

Table 8b. Five most severe districts with salient5 and salient3<br />

as indicators according to ORDIT ordering and salient<br />

scaling, as retrieved by R commands [8]<br />

CaseIDs AA SS ORDIT Salient<br />

47 1.87 91.59 9813.933 104<br />

83 0.93 96.26 9907.972 105<br />

44 0 92.52 10000.925 106<br />

90 0 96.26 10000.963 107<br />

87 0 98.13 10000.981 108<br />

Figure 8a and 8b shows the districts of Table 8a and 8b,<br />

respectively. Table 9 is a resume of all results of ORDIT rankings.<br />

The first column is the ids of districts, second, third, and fourth<br />

columns indicate whether the district is a member of 5 least or 5<br />

worst severe districts based on 5 indicators, 3 indicators, and 2<br />

233<br />

indicators (salient5 and salient3), respectively. The fifth column is<br />

a mark for a district as a member of all results.<br />

Latitude<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S<br />

107 106 94<br />

104105<br />

99 93<br />

100<br />

91 90<br />

79 95<br />

92<br />

63<br />

87 98<br />

61 60<br />

89 88<br />

62<br />

78<br />

96<br />

101 97<br />

77<br />

64<br />

82<br />

86<br />

23<br />

26<br />

29<br />

72 71 70 69 68 67 76<br />

80<br />

59<br />

27 28<br />

81<br />

58<br />

24 25<br />

66<br />

22<br />

46 65<br />

37<br />

83 102 103<br />

47<br />

75<br />

44 45<br />

50<br />

52 57<br />

84<br />

85<br />

73<br />

21<br />

35 15<br />

51<br />

74<br />

17 16<br />

48<br />

56<br />

19 18<br />

20 36<br />

34<br />

49 42 53 54<br />

14<br />

39 43<br />

33<br />

306<br />

38<br />

12<br />

40<br />

13<br />

55 2<br />

32<br />

11<br />

41<br />

1 3<br />

4 31<br />

5 7 8<br />

9<br />

10<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

Figure 8a. Five best districts based on salient 5 and salient 3<br />

as indicators, mapped by the sp package of R[11],[12]<br />

Latitude<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S<br />

107 106 94<br />

104105<br />

99 93<br />

100<br />

91 90<br />

79 95<br />

92<br />

63<br />

87 98<br />

61 60<br />

89 88<br />

62<br />

78<br />

96<br />

101 97<br />

77<br />

64<br />

82<br />

86<br />

23<br />

26<br />

29<br />

72 71 70 69 68 67 76<br />

80<br />

59<br />

27 28<br />

81<br />

58<br />

24 25<br />

66<br />

22<br />

46 65<br />

37<br />

83 102 103<br />

47<br />

75<br />

44 45<br />

50<br />

52 57<br />

84<br />

85<br />

73<br />

21<br />

35 15<br />

51<br />

74<br />

17 16<br />

48<br />

56<br />

19 18<br />

20 36<br />

34<br />

49 42 53 54<br />

14<br />

39 43<br />

33<br />

306<br />

38<br />

12<br />

40<br />

13<br />

55 2<br />

32<br />

11<br />

41<br />

1 3<br />

4 31<br />

5 7 8<br />

9<br />

10<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

Figure 8b. Five most severe districts based on salient 5 and<br />

salient 3 as indicators, mapped by the sp package of R<br />

[11],[12].<br />

Table 9. Five worst and five best districts as the result of<br />

ORDIT rankings<br />

Worst District salient5 salient3 salient53 Mark<br />

90 Yes Yes Yes √<br />

87 Yes Yes Yes √<br />

47 Yes No Yes<br />

58 Yes No No<br />

81 Yes No No<br />

44 No Yes Yes<br />

83 No Yes Yes<br />

45 No Yes No<br />

Best District<br />

73 Yes Yes Yes √<br />

31 Yes Yes Yes √<br />

106 Yes No No<br />

35 Yes Yes Yes √<br />

36 Yes No Yes<br />

43 No Yes Yes<br />

38 No Yes No<br />

6.3 THE RESULTS OF ULS HOTSPOT<br />

DETECTION<br />

The districts in the hotspot area as the result of ULS hotspot<br />

detection based on each indicator are shown in Figure 9. It shows<br />

that for the first three indicators hotspot area (a,b,c) is dominant in<br />

Central Java, but for the forth indicator (d), the hotspot area is<br />

8


dominant in West Java, while for the fifth indicator (e) the hotspot<br />

area comprises some districts of East Java<br />

Latitude<br />

Latitude<br />

9°�S 8°�S 7°�S 6°�S 5°�S<br />

Latitude<br />

9°�S 8°�S 7°�S 6°�S 5°�S<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S<br />

The Hotspot of Number of Infants Death in Java Island, 2007<br />

190<br />

266 89 196<br />

115<br />

174 28<br />

170<br />

86<br />

328<br />

244<br />

39<br />

109<br />

189<br />

413 85<br />

134 345<br />

60134<br />

114<br />

107<br />

392<br />

173 178<br />

10 44<br />

145<br />

169 78 170 210 83 208<br />

96<br />

329 125<br />

162<br />

83 223<br />

31<br />

56<br />

72 117<br />

115 177<br />

147<br />

186 69<br />

312 104 69<br />

663<br />

25<br />

392 270<br />

141<br />

217 142<br />

347<br />

96<br />

340<br />

14 372<br />

100 2<br />

47<br />

260 101<br />

111 66<br />

100<br />

133<br />

96 18<br />

62<br />

61<br />

63 253 46<br />

66<br />

37 32<br />

24<br />

85<br />

298 17<br />

82<br />

50<br />

187<br />

131 112<br />

174<br />

172<br />

84<br />

61<br />

97 6<br />

78 83 142 77<br />

285<br />

139<br />

6 22<br />

54<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

ULS hotspot detection, mapped with R<br />

(a)<br />

The Hotspot of Number of People in Poverty (in thousands) in Java Island, 2007<br />

519.5<br />

229.6<br />

400.4<br />

111.7 231.2<br />

49.1 70.3<br />

371.6<br />

365.3<br />

701.6 267.5 319 258 203.7 215.4260.5<br />

352.3<br />

283.9<br />

394.6<br />

519.1<br />

297.8<br />

288.3<br />

325.5<br />

338.9 257.4<br />

297.6 273.6<br />

178.5 229.5<br />

321.5<br />

203.7<br />

435.5<br />

328.2 361.5<br />

26.2<br />

780 550.2<br />

270.5 300.4 270.4<br />

188.7<br />

11.5 223.3<br />

302.4 375.6 20.1<br />

74.9<br />

261.6143.8<br />

214.9 130.6 230.5<br />

420.6 102.212.1<br />

203<br />

21.3<br />

161.5380.1230.9<br />

278.7<br />

131.5 60<br />

34.9<br />

35.3 267.4 15<br />

93.9<br />

201<br />

277.1<br />

273.3 157.9<br />

56.6<br />

165.7<br />

301.2<br />

125.6 170.5 15.2<br />

199<br />

149.1 171.2 365.3<br />

417<br />

227.3<br />

213.1<br />

9470.7 141.7<br />

35.4 122.6 106.9 294.4<br />

35.9<br />

91.4<br />

235.8<br />

114.5<br />

361.7<br />

28.3 398<br />

161.8 234.4<br />

43.7<br />

22.6<br />

87.2<br />

187.7<br />

54.5 12.9<br />

171.8<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

ULS hotspot detection, mapped with R<br />

(b)<br />

The Hotspot of Low Birth Weight in Java Island, 2007<br />

610 129 261<br />

947 1962 215 392<br />

154<br />

815 90<br />

540<br />

212<br />

814<br />

238<br />

96<br />

386<br />

580<br />

1085 238<br />

490 299<br />

478 752<br />

172<br />

149<br />

113<br />

788<br />

60<br />

768<br />

172<br />

295 300 522 483 9 137<br />

931<br />

445<br />

436 345<br />

606<br />

125 189<br />

164<br />

130 85 144<br />

262 644<br />

208<br />

228 1307<br />

2464 111 105<br />

507<br />

62<br />

572 815 1003<br />

208<br />

276 413<br />

271<br />

36 971<br />

616<br />

357 83<br />

209<br />

556 295<br />

131 214<br />

422<br />

238<br />

274 43<br />

476<br />

86<br />

68 40 350<br />

156<br />

204 5<br />

164<br />

66 401 19<br />

220<br />

530<br />

409<br />

383 187<br />

164<br />

250<br />

176<br />

145<br />

252 11<br />

130 250 668 573<br />

388<br />

184<br />

1456<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

ULS hotspot detection, mapped with R<br />

(c)<br />

234<br />

Latitude<br />

10°�S 8°�S 6°�S<br />

Latitude<br />

The Hotspot of Non Health Personnel Assisted (in percentage) in Java Island, 2007<br />

6.3<br />

14.6 3.2 0<br />

26.6<br />

30.3 14.5<br />

11.7<br />

21.9<br />

43.8<br />

18.5<br />

22.5 10.5<br />

2.5 14.2<br />

43.3 39.7<br />

13.6<br />

21.6<br />

7.6 4.8<br />

18.7<br />

29.7<br />

3.2<br />

33.9<br />

13.5<br />

18.3<br />

37.3<br />

18.5 17.8 15.1 2.3 22 9.9<br />

22.6 21.2<br />

48.9<br />

6<br />

8.9 0<br />

20.6<br />

27.3<br />

28.2 8.7<br />

8.8 10.6<br />

5<br />

18.9<br />

47.6 22.8 22.7<br />

25.8<br />

24.1<br />

0.2<br />

12 5.9<br />

25.9<br />

15.8 9<br />

29.6<br />

0.2<br />

41.1<br />

4.8 9.5<br />

0 4.5<br />

4.5<br />

14 0.2<br />

2.4 11.9<br />

20.3<br />

12.4<br />

6.2 0<br />

9.1<br />

0.9<br />

7.3 9.8 10.4<br />

19.7<br />

6 7.2<br />

4.6 11.6 9.9<br />

19<br />

21.3<br />

14.5 11.3<br />

4.6 14.6<br />

0<br />

12.6<br />

17.6<br />

20.2<br />

3 2.4<br />

16.2 0.5 22.2 5.4<br />

19.3<br />

13.9<br />

0 0 8.9<br />

12.6<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S 4°�S<br />

107 106 94<br />

104 105 99 93<br />

100<br />

79 95<br />

91<br />

92<br />

90<br />

96<br />

80<br />

81<br />

10197<br />

82<br />

87 98<br />

89 88<br />

86<br />

108<br />

83<br />

102 103<br />

84<br />

85<br />

ULS hotspot detection, mapped with R<br />

(d)<br />

Longitude<br />

The Hotspot of Average Education Shortfall in Java Island, 2007<br />

63<br />

62 61 60<br />

78 77<br />

64<br />

23<br />

29<br />

72 71 70 69 68 67 76<br />

26 27<br />

58 59<br />

28<br />

24 25<br />

66<br />

22<br />

46 65<br />

37<br />

47<br />

75<br />

44 45<br />

50<br />

52 57<br />

73<br />

21<br />

35 15<br />

51<br />

74<br />

17 16<br />

19 18<br />

48 56 20 36<br />

49 42 53 54<br />

34<br />

14<br />

39 43<br />

306<br />

33<br />

38<br />

12<br />

40<br />

13<br />

55 2<br />

32<br />

11<br />

41<br />

1 3 4 315<br />

7 8<br />

9<br />

10<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

ULS Hotspot Detection, mapped with R<br />

(e)<br />

Figure 9. ULS Hotspot districts of infd (a), pov (b), lbw (c),<br />

abhp (d), and avedsf (e) as generated by the R commands<br />

[11],[12].<br />

Table 10 shows the five worst districts for salient5, salient3 and<br />

salient53 and information whether the district is a hotspot or not a<br />

hotspot. There is no district of the first column as the hotspot<br />

based on indicator avedsf (average education shortfall), so this<br />

column is omitted. Districts 90 and 87 are strong enough to be<br />

considered as the worst districts of infant health.<br />

Table 10. Five worst districts for salients and ULS hotspot<br />

districts for each indicator<br />

Distr sal5 sal3 sal53 hinfd hpov hlbw habhp<br />

90 Yes Yes Yes Yes No Yes Yes<br />

87 Yes Yes Yes Yes No Yes Yes<br />

47 Yes No Yes Yes Yes Yes Yes<br />

58 Yes No No Yes Yes Yes No<br />

81 Yes No No No No No Yes<br />

83 No Yes Yes Yes No Yes Yes<br />

44 No Yes Yes Yes Yes Yes No<br />

45 No Yes No Yes Yes Yes No<br />

9


7. CONCLUSION<br />

According to ORDIT analysis with five and three indicators and<br />

sal5 & sal3 as indicators, the most severe districts of infant health<br />

are districts 90 and 87. The least severe districts are district 73,<br />

31, and 35 (all are cities). The most severe districts are in West<br />

Java. The two least severe districts are cities in Central Java and<br />

one least severe (best) district is a city in East Java. The least<br />

severe areas are city type districts. The most severe districts (90<br />

and 87) are also confirmed by the ULS method as the worst<br />

districts for infant health. These districts are in the hotspots area<br />

of three indicators. To improve infant health in Java, the<br />

government, especially the Health Department should give more<br />

attention to districts 90 (Indramayu) and 87 (Cirebon) which are<br />

the worst districts for infant health. Hopefully through this study,<br />

ORDIT ranking and ULS hotspot detection methods will be<br />

recognized to be useful micro tools to support decision makers in<br />

the e-governance.<br />

8. ACKNOWLEDGEMENTS<br />

I would like to acknowledge the valuable guidance of Prof. G.P.<br />

Patil, Center for Statistical Ecology and Environmental Statistics,<br />

Department of Statistics, the Pennsylvania State University. Many<br />

thanks to the Directorate General of Higher Education Indonesia<br />

for financial support through the Doctoral Sandwich Program that<br />

I received.<br />

9. REFERENCES<br />

[1] Gortmaker, S.L. Poverty and Infant Mortality in the United<br />

States. American Sociological Review, 44, 2 (Apr. 1979),<br />

280-297.<br />

[2] Frieden, T.R. CDC Health Disparities and Inequalities<br />

Report – United States. Morbidity and Mortality Weekly<br />

Report. 60. 2011<br />

[3] OECD. Health at a Glance 2011: OECD Indicators, OECD<br />

Publishing. http://dx.doi.org/10.1787/health_glance-­‐<br />

2011-­‐en<br />

235<br />

[4] Frankenberg, E. The Effects of Access to Heath Care on<br />

Infant Mortality in Indonesia, Health Transition Review 5,<br />

(1995), 143 – 163.<br />

[5] Desai, S. and Alva, S. Maternal education and child health: Is<br />

there a strong causal relationship? Demography, 35, 1 (Feb.<br />

1998), 71-81.<br />

[6] Braveman, P., Cubbin, C., Marchi, K., Egerter, S., Chaves,<br />

G. Measuring Socioeconomic Status/ Position in Studies of<br />

Racial/Ethnic Disparities: Maternal and Infant Health, Public<br />

Health Reports: September–October 2001, Vol.116.<br />

http://www.ncbi.nlm.nih.gov/pmc/articles/<br />

PMC1497365/pdf/12042609.pdf<br />

[7] Biro Pusat Statistik, Indonesia Population by Province 1971,<br />

1980, 1990, 1995, 2000 dan 2010.<br />

http://www.bps.go.id/tab_sub/view.php?tabel=1&daftar=1&i<br />

d_subyek=12&notab=1, 2010<br />

[8] Myers, W. and Patil, G.P. Preliminary Prioritization Based<br />

on Partial Order Theory and R Software for Compositional<br />

Complexes in Landscape Ecology, with Applications to<br />

Restoration, Remediation, and Enhancement. Environmental<br />

Ecological Statistics. 17, 4, 2010, 411-436.<br />

[9] Jahan, S. Poverty and infant mortality in the Eastern<br />

Mediterranean region: a meta-analysis. J Epidemiol<br />

Community Health 2008, 62, 745–751.<br />

[10] DEPKES RI. Bank Data Pusdatin-DepKes RI. 2009.<br />

http://www.bankdata.depkes.go.id/nasional/public/report/cre<br />

atetablepti<br />

[11] Roger,S.B., Pebesma, E.J., Rubio,V.G. Applied Spatial Data<br />

Analysis with R, Springer, Washington. 2008.<br />

[12] Moore, C. Mapping with R: Choropleth of 3rd grade reading<br />

proficiency in the Twin Cities, Article. April 19, 2008.<br />

[13] Patil, G.P., Joshi, S.W., Koli, R.E. PULSE, Progressive<br />

Upper Level Set Scan Statistics for Geospatial Hotspot<br />

Detection. Environmental Ecological Statistics. 17, 2, 2010,<br />

411-436.<br />

[14] Patil, G. P. and Taillie, C. Upper Level Set Scan Statistic for<br />

Detecting Arbitrarily Shaped Hotspots. Environmental and<br />

Ecological Statistics, 11, 2004, 183 – 197.<br />

http://www.stat.psu.edu/~gpp.<br />

10


Technological Assessment of e-government Web<br />

presence in Nigeria<br />

Awoleye, O. Michael<br />

National Centre for Technology<br />

Management (NACETEM), An Agency<br />

of the Federal Ministry of Science &<br />

Technology, P.M.B. 012, Obafemi<br />

Awolowo University, Ile-Ife, 20005,<br />

Nigeria<br />

+234-(0)7069197823<br />

awoleye@yahoo.co.uk<br />

ABSTRACT<br />

Government bringing innovation into its activities is a good<br />

gesture but innovation that constitutes peril due to inadequate<br />

technical capability necessitates re-assessment, hence this<br />

investigation.This study investigated susceptibility of some<br />

chosen government websites to infiltration due to flaws in the<br />

design of their websites. Sixty four websites of some<br />

organizations were randomly selected using an advanced feature<br />

of google to sieve organization’s websites that have adopted the<br />

use of country code Top Level Domain (ccTLD) i.e. the<br />

“.gov.ng”. The research was based on some major measuring<br />

parameters which are: Cross Site Scripting (XSS), Structured<br />

Query Language injection (SQLi), Cookie manipulation (CM),<br />

unencrypted password (UP) and broken links (BL). The sixty four<br />

(64) government websites chosen span 8 categories of sectors<br />

with a view to evaluating their immunity against cyber attacks. It<br />

was found that 27 (42.2%) of the websites are vulnerable to XSS,<br />

while 20 (31.3%) to SQLi. Also, 24 websites which represents<br />

37.5% of the websites examined are having the password inputted<br />

by the user unencrypted while a high percentage (70.3) have<br />

informational issues, like broken links which in itself may not<br />

constitute high vulnerability but could create susceptible platform<br />

which could permit infiltration. Thereafter, some appropriate<br />

policy directions which provide technical advice as to protect<br />

government resources available through the Internet were<br />

advanced. This tends to also increase citizens’ confidence on the<br />

adoption of the government web-presence initiative.<br />

Categories and Subject Descriptors<br />

K.4.6. [Security and Protection]<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Ojuloge, Blessing<br />

National Centre for Technology<br />

Management (NACETEM), An Agency<br />

of the Federal Ministry of Science &<br />

Technology, P.M.B. 012, Obafemi<br />

Awolowo University, Ile-Ife, 20005,<br />

Nigeria<br />

+234-(0)8035762207<br />

blessingojuloge@yahoo.com<br />

236<br />

General Terms<br />

Management, Security, Performance<br />

Keywords<br />

Siyanbola, Willie O.<br />

National Centre for Technology<br />

Management (NACETEM), An Agency<br />

of the Federal Ministry of Science &<br />

Technology, P.M.B. 012, Obafemi<br />

Awolowo University, Ile-Ife, 20005,<br />

Nigeria<br />

+234-(0)8033449687<br />

williesiyanbola@yahoo.com<br />

Web presence, e-government, management, vulnerability, policy,<br />

cross site injection, SQL injection, security, performance, cyber<br />

security<br />

1. INTRODUCTION<br />

Advancement in Internet and its services has culminated into<br />

many applications and it provides information gathering platform<br />

for citizens and opportunities for businesses to thrive [1].<br />

Organizations and government bodies have leveraged severally on<br />

these facilities provided by the web for improved efficiency in<br />

service delivery, transparency, increased revenue, cost-saving and<br />

global competitiveness. The art of online administration of<br />

government activities is referred to as e-government [2]. By this,<br />

the government can reach more citizens without boundary<br />

irrespective of their locations at any point in time. And in turn, the<br />

citizens can also reach the government without the bureaucracy<br />

barrier [3].<br />

The understanding of these facts most especially the benefits,<br />

prompted the Nigerian Government to suggest to all its bodies at<br />

all levels (federal, state and local) to make their presence known<br />

on the Internet, by creating websites to deliver their services and<br />

for effective information exchange. It also mandated them to use<br />

the country code Top Level Domain (ccTLD), knowing the<br />

benefits derivable from such as well as its security implications.<br />

Using a ccTLD, the users are guaranteed genuineness of the<br />

domain since the registration of such domain is supervised. It is<br />

worth noting to state that Nigeria Internet Registration<br />

Association- NIRA (a non-government organisation) is<br />

responsible to managing the ccTLD for Nigeria, while National<br />

Information Technology and Development Agency (NITDA) has<br />

been saddled with the responsibility of managing the government<br />

sub-domain (.gov.ng) as a part of the entire ccTLD. The<br />

requirement for the registration processes of the domain is quite<br />

stringent and hence the likelihood of domain hijack or<br />

misrepresentation is remote. This is important because of the<br />

services that some of these organisations provide online which


include but not limited to: payment of tax, record keeping<br />

(financial records, medical records, intellectual property<br />

information, trade secrets and other citizens’ personal data) etc.<br />

Making some of these services available online presents a better<br />

and easy way of government-citizens’ relationship, most<br />

especially on discharging obligations within and across the<br />

parties. However, the concern now is the fear of adequate<br />

technical capability or awareness of susceptibility of the design of<br />

such platforms (websites) without given cognizance for avoidance<br />

of common programming errors which may jeopardize successful<br />

operation of the websites. A website is said to be vulnerable when<br />

it has the propensity for infiltration which may be as a result of<br />

flaws within the codes that made up the website, this is referred to<br />

application level [4] or server side attacks. Other issues of concern<br />

have to do with some underlying technicalities that can prevent<br />

unforeseen circumstances that may befall the successful operation<br />

of the websites.<br />

It has been reported in literature that dynamic web applications<br />

contain a wide range of input validation vulnerabilities such as<br />

cross site scripting [5][6][7][8][9] and SQL injection<br />

[10][11][12][13][14]. Because of the web popularity relative to<br />

the number of millions of Internet users, the internet has become<br />

prime targets for attackers [15] and today they are motivated by<br />

financial gains rather than just being destructive, Symantec (2007)<br />

as cited in [1]. Attacks against web applications constitute more<br />

than 60% of the total attack attempts observed on the Internet as<br />

showed in a report [16]. Also, in the study carried out by [6] it<br />

was reported that 82% of the e-government websites around the<br />

globe were vulnerable to Cross Site Scripting (XSS) and Structure<br />

Query Language injection (SQLi). It was further discovered in the<br />

study that 90% of European, 85% of Asian, 76% of the North<br />

American and 49% of African government websites are<br />

vulnerable to common web application attacks [6]. Apart from the<br />

specified web application attacks earlier mentioned, denial of<br />

service (DoS), unauthorized access to networks, theft of employee<br />

or customer information, online financial fraud etc are also known<br />

prevalent attacks [1].<br />

Furthermore, SQL injection and cross-site scripting may be used<br />

by attackers to alter back-end tables from databases and to launch<br />

phishing attacks on vulnerable servers. Most website owners fail<br />

to validate their application for common flaws and until now,<br />

there is no study that has provided empirical data on how<br />

vulnerable the Nigerian government websites are. It is in this<br />

context that this research is necessitated in order to create<br />

awareness for the government and its bodies on vulnerability level<br />

of their websites and the need to take necessary action. It also<br />

presents some policy suggestions to safeguard possible<br />

occurrences and to present measures to avert continued<br />

susceptibility.<br />

2.0 WEB APPLICATION SECURITY<br />

Web applications have become fertile ground for cyber attackers,<br />

attempting to penetrate systems and misuse private data. Cenzic, a<br />

web security firm, reported that almost 90% of web-related flaws<br />

were caused by web application vulnerabilities with the three<br />

most common types being: SQL injection, Cross-site Scripting,<br />

and Authentication vulnerabilities. The SAN Institute, a<br />

worldwide security organization, reported cross-site scripting,<br />

SQL injection and cross site forgery as major web vulnerabilities<br />

in 2007 [18]. It was further reported that, XSS is the most<br />

237<br />

dangerous and easily found web application security issue that can<br />

cause varieties of issues which may include defacement of web<br />

sites, insertion of hostile content, phishing attacks and allow<br />

hackers to take over a user’s browser. Details of these attacks<br />

shall be discussed in following sections.<br />

2.1 Cross site scripting (XSS)<br />

Cross site scripting is a vulnerability that allows an attacker to bypass<br />

client-side security mechanisms normally imposed on web<br />

content by the browsers. By finding ways of injecting malicious<br />

scripts, usually in the form of JavaScript, VBScript, ActiveX,<br />

HTML or Flash into a vulnerable application, an attacker may<br />

gain privileges to sensitive page-content of the web pages [19]<br />

Because a browser cannot know if the script should be trusted or<br />

not, it will execute the script in the user context and give attacker<br />

access to cookies or session tokens retained by the browser.<br />

Common attack vectors are search applications which reflect the<br />

search string, and parameters supplied in the URL.<br />

2.2 Structured query language injection<br />

(SQLi)<br />

An SQL injection attack consists of insertion or "injection" of a<br />

SQL query via the input data from the client to the application<br />

without proper filtering of dangerous script characters. A<br />

successful SQL injection exploit can read sensitive data from the<br />

database, modify database data (Insert/Update/Delete), execute<br />

administration operations on the database (such as shutdown the<br />

DBMS), recover the content of a given file existing on the DBMS<br />

file system and, in some cases, issue commands to the operating<br />

system [18][19].<br />

2.3 Cookie manipulation<br />

A cookie is a small piece of information usually created by the<br />

web server and stored in the web browser. Each time the user<br />

access the web server, this data is passed back to the server. The<br />

cookie contains information used by web applications to persist<br />

and pass variables back and forth between the browser and the<br />

web application. Client-side cookies can be persistent i.e. files<br />

stored on the client computer until an expiry date; or session i.e.<br />

files kept in the memory of the client computer until the session is<br />

ended. As a result of the cookie structure and their usage, all data<br />

stored in a client-side cookie could be easily read and<br />

manipulated.<br />

2.4 Unencrypted password<br />

One of the security features employed in a web application is<br />

password. Sensitive data such as credit card numbers, social<br />

security numbers sent into the server without using encrypted<br />

connection such as secure socket layer (SSL), can be intercepted<br />

by hackers. Encrypting the transmission of data makes it difficult<br />

to intercept sensitive information as it travels between two parties.<br />

3.0 METHODOLOGY<br />

The research was carried out on 64 Nigerian e-government<br />

websites randomly selected to determine their common web<br />

security issues. An advanced Google search feature was employed<br />

to elicit websites with a sub-domain of ‘.gov.ng’ and with a ‘php<br />

& html’ extension [6] Google retrieved a number of results but<br />

priority was given to the websites with the highest page rank, this


is with a view to using websites which files has been highly<br />

populated in the search engine database.<br />

3.1 Testing tool<br />

The second phase was to choose a software testing tool to scan for<br />

web vulnerabilities. Several criteria were part of the decision in<br />

choosing the testing tool. First, the testing software must be<br />

compatible with the windows operating system since the test was<br />

carried out on the researchers’ personal computer systems (PC).<br />

Secondly, the software must have specific vulnerability testing<br />

options to scan web sites, as opposed to common server-based<br />

scanning products. After review of different web scanners,<br />

Acunetix Web Vulnerability Scanner was employed. This is noted<br />

to be in the same category with Nmap, which has been widely<br />

used [1]. Acunetix was used to test different web application<br />

vulnerability issues including: Cross-Site Script (XSS), SQL<br />

injection (SQLi), cookie manipulation (CM), unencrypted<br />

password (UP) and broken links (BL) of the web pages, which are<br />

main targets here. The choice of these parameters is premised on<br />

the high impact of its severity compared to others. In addition to<br />

this testing tool, manual testing was also carried out on some few<br />

websites in a way as not to leave footprints on the website. This is<br />

necessary in order to confirm the results generated by Acunetix<br />

web vulnerability scanners.<br />

3.2 Procedure<br />

After launching the web scanner, the desired Universal Resource<br />

Location (URL) is entered in the wizard box provided and the<br />

‘go’ button is fired. If the Internet connection on the computer is<br />

available then the scanner will begin the process. The scanner<br />

(Acunetix), thus virtually crawl the website of any given URL and<br />

presents the analysis of the vulnerability for every run. The<br />

Internet connection used for the exercise is a 3.5G on a High<br />

Speed Downlink Packet Access (HSPDA). The scanning process<br />

took on average 25 minutes, although the times varied from 15<br />

minutes up to 1 hour depending on the size of the entire given<br />

website. The manual test for XSS as well as SQLi was carried out<br />

to confirm the results generated by the vulnerability scanner. This<br />

is possible when such scripts as alert (‘This website is<br />

vulnerable’) is inputted into any available input field<br />

such as: the search, feedback and form fields within the website<br />

and the action button is pressed thereafter. If the web page is<br />

vulnerable, a Java script enabled browser will show a java script<br />

pop-up alert window containing the text in the parenthesis, ‘This<br />

website is vulnerable’. Also to manually test for SQL injection<br />

vulnerabilities, a single quote ( ' ) can be used as input. The single<br />

quote is a special character in SQL, and if it is included in the<br />

SQL query it will most likely generate an SQL statement error.<br />

All the 64 Nigerian government websites were tested over a<br />

period of two weeks within the month of August 2011 and<br />

technical report was produced for each site, listing the types and<br />

numbers of specific vulnerabilities. Each report was divided into<br />

several sections listing four levels of security vulnerability: High,<br />

Medium, Low and Informational. High level – these are critical<br />

problems which could cause high risk damage to the website e.g<br />

website defacement [1], database manipulation and modification<br />

[6], phishing, identity theft [1] amongst others. Medium and Low<br />

level – these are problems that could pose some level of risk to<br />

users of the web application. Informational – these are messages<br />

that probably have little risk to users, but still should be analyzed<br />

238<br />

by web developers because of the possibility of creating high<br />

vulnerabilities. The sites tested were categorized into Agencies,<br />

Judiciary, Law Enforcement/Defence, Media, Ministries,<br />

Parastatals, States and Others categories.<br />

4.0 RESULTS AND DISCUSSION<br />

Out of the 64 Nigerian government sites tested, 27, which<br />

represent 42.2% were vulnerable to XSS while 31.3% are<br />

vulnerable to SQLi. It was also discovered that 37.5% and 70.3%<br />

were vulnerable to unencrypted password and broken links<br />

respectively. These findings are represented and summarized<br />

mathematically in algebraic expressions using set theory as shown<br />

in Table 1.<br />

Table 1: Algebraic representation of e-government vulnerabilities<br />

in Nigeria<br />

Algebraic<br />

Expressions<br />

Interpretations<br />

U = 64 the universal set, i.e total sample tested.<br />

n(XSS) = 27 the number of websites vulnerable to<br />

XSS.<br />

n(SQLi) = 20 the number of websites vulnerable to<br />

SQL injection<br />

n(UP) = 24 the number of websites vulnerable to UP<br />

n(BL) = 45 the number of websites vulnerable to BL<br />

n(SQLi ∪ XSS) =<br />

34<br />

n(SQLi ∩ XSS) =<br />

13<br />

n(SQLi ∩ XSS 1 ) =<br />

7<br />

n(SQLi 1 ∩ XSS) =<br />

14<br />

n(U - (SQLi ∪<br />

XSS) 1 ) = 30<br />

the number of websites vulnerable to<br />

both SQL injection & XSS<br />

the number of websites exclusively<br />

vulnerable to both SQL injection & XSS<br />

the number of websites vulnerable to<br />

SQL injection but not XSS<br />

the number of websites vulnerable to<br />

XSS but not SQL injection<br />

the number of websites vulnerable to<br />

other parameters under test but not XSS<br />

nor SQL injection<br />

Legend: SQLi – Structured Query Language injection<br />

XSS – Cross Site Scripting<br />

UP – Unencrypted Password<br />

BL – Broken Links<br />

Table 2 shows the distribution of vulnerability in each category,<br />

for example apart from other categories which constitute the<br />

highest percentage of XSS vulnerability; the judiciary followed by<br />

one out of every four being vulnerable 25% relative to the<br />

participation in the test.


Categories<br />

Only XSS<br />

(%)<br />

Table 2: Distribution of vulnerability in each category.<br />

XSS and SQLi Analysis CM &<br />

Only SQLi XSS &<br />

XSS None<br />

UP<br />

(%)<br />

SQLi (%) or SQLi(%) (%)<br />

(%)<br />

Agencies (n=10) 20 (2) 0 (0) 20 (2) 40 (4) 60 (6) 30 (3) 70 (7)<br />

Judiciary (n=8) 25 (2) 12.5 (1) 25 (2) 62.5 (5) 37.5 (3) 37.5 (3) 50 (4)<br />

Law Enf./Def (n=5) 20 (1) 0 (0) 40 (2) 60 (3) 40 (2) 40 (2) 80 (4)<br />

Media (n=2) 0 (0) 50 (1) 0 (0) 50 (1) 50 (1) 0 (0) 100 (2)<br />

Ministries (n=6) 16.7 (1) 16.7 (1) 33.3 (2) 66.7 (4) 33.3 (2) 33.3 (2) 66.7 (4)<br />

Others (n=7) 42.9 (3) 0 (0) 28.6 (2) 71.4 (5) 28.6 (2) 28.6 (2) 85.7 (6)<br />

Parastatals (n=13) 23.1 (3) 15.4 (2) 15.4 (2) 53.8 (7) 46.1 (6) 46.2 (6) 76.9 (10)<br />

States (n=13) 15.4 (2) 15.4 (2) 7.7 (1) 38.5 (5) 61.5 (8) 46.2 (6) 61.5 (8)<br />

* Please note that the values in parenthesis represent the actual number of the vulnerability found.<br />

XSS- Cross Site Scripting, SQLi- Structure Query Language injection,<br />

CM- Cookie Manipulation, UP- Unencrypted Password, BL- Broken Links<br />

Table 3: Type and magnitude of website vulnerabilities across categories<br />

Level of Severity/<br />

Category<br />

Highly Severe Less Severe<br />

XSS SQLi CM/UP BL<br />

Agencies 14.8 10.5 12 15.6<br />

Judiciary 14.8 10.5 12 8.9<br />

Law Enf./Def 11.1 10.5 8 8.9<br />

Media 0.0 5.3 4 4.4<br />

Ministries 11.1 15.8 8 8.9<br />

Others 18.5 10.5 8 13.3<br />

Parastatals 18.5 21.1 24 22.2<br />

States 11.1 15.8 24 17.8<br />

25.0<br />

20.0<br />

15.0<br />

10.0<br />

5.0<br />

0.0<br />

Figure 1: Pictorial representation of vulnerabilities across sectors<br />

239<br />

XSS<br />

SQLi<br />

CM/UP<br />

BL<br />

BL<br />

(%)


In Figure 1, the parastatals have the highest percentages of<br />

vulnerability in all the four parameters used in the research.<br />

Parastatals and Others categories have the highest vulnerability to<br />

XSS with 18.5% each. Ministries and States websites are more<br />

vulnerable to SQLi behind Parastatals with 15.8% each. Media<br />

houses category has the lowest percentage (5.3) of vulnerability to<br />

SQLi. Parastatals and States categories have the highest<br />

percentage of vulnerability to cookie manipulation and<br />

unencrypted passwords with percentages 24% each. Most of the<br />

categories had informational issues with their websites, Parastatals<br />

XSS &<br />

SQLi<br />

40%<br />

None<br />

46%<br />

XSS &<br />

SQLi<br />

33%<br />

None<br />

60%<br />

Agencies<br />

Only<br />

XSS<br />

20%<br />

Law Enforcement/Defence<br />

Ministries<br />

None<br />

33%<br />

Parastatals<br />

None<br />

40%<br />

XSS &<br />

SQLi<br />

15%<br />

XSS &<br />

SQLi<br />

20%<br />

Only<br />

XSS<br />

20%<br />

Only<br />

XSS<br />

17% Only<br />

SQLi<br />

17%<br />

Only<br />

XSS<br />

23%<br />

Only<br />

SQLi<br />

16%<br />

Figure 2: Pie charts showing vulnerabilities for categories of<br />

Government websites<br />

240<br />

(22.2%) and States (17.8%) categories have broken links in their<br />

websites.<br />

Table 3 gives the percentages of vulnerable websites for each<br />

category. ‘Others’ category has the highest ratio of vulnerability<br />

to either XSS or SQLi, followed by Ministries. More than 70% of<br />

‘Others’ category has vulnerability, while 38.5% of state<br />

government websites are vulnerable. Figure 2 illustrates the<br />

sectoral percentages representation of vulnerability to some<br />

parameters under test using pie charts.<br />

None<br />

38%<br />

XSS &<br />

SQLi<br />

25%<br />

Only<br />

SQLi<br />

50%<br />

XSS &<br />

SQLi<br />

29%<br />

None<br />

62%<br />

Judiciary<br />

None<br />

28%<br />

Media<br />

Others<br />

States<br />

None<br />

50%<br />

Only<br />

XSS<br />

25%<br />

Only<br />

XSS<br />

15%<br />

Only<br />

SQLi<br />

12%<br />

Only<br />

XSS<br />

43%<br />

Only<br />

SQLi<br />

15%<br />

XSS &<br />

SQLi<br />

8%


From table 3, it can be deduced that the website from the ‘Others’<br />

and Judiciary categories have the highest percentage of<br />

vulnerability to only XSS, while the Media category has the<br />

highest vulnerability to only SQLi. Out of the 8 categories<br />

examined, State category has the highest percentage (61.5) of<br />

websites that are not vulnerable to XSS or SQLi, use fewer<br />

technologies and have fewer numbers of pages in their websites,<br />

hence decreasing the possibility of introducing vulnerability in<br />

their web application.<br />

Table 3: Vulnerability Test Results<br />

High Level<br />

Agencies<br />

N=10<br />

Judiciary N=8 Law<br />

Enf./Def<br />

N=5<br />

* Numbers of websites are enclosed in parenthesis<br />

Table 3 shows overall vulnerability test results of 64 Nigerian<br />

websites. There was a wide range of total errors for each category.<br />

Within the ‘high level’, which relates to critical problems found in<br />

the sites, the 13 ‘States’ web sites had a total error count of 380<br />

(out of which a particular State Government website had 339),<br />

followed by Judiciary category with total error count of 249.<br />

Media and Ministries web sites had lower numbers of 1 and 64<br />

error counts respectively at this level. Results in the ‘medium/low<br />

error level’ showed that Parastatals websites had 40 errors while<br />

Law enforcement/defence, Ministries and Others categories had 3,<br />

3 and 2 errors respectively. Most of the sites did possess medium<br />

intensity issues, and only 2 Media websites did not have them,<br />

while a good number of 3 Law enforcement/defence, 4 Ministries<br />

and Others websites were free of problems at this level. Most sites<br />

across the categories did have informational warnings. There were<br />

a total of 117 warnings in Parastatals website, 3 in Media and 69<br />

in others websites.<br />

5.0 SUMMARY AND CONCLUSION<br />

It was shown in this work that most Nigerian government<br />

websites across federal, state and local government are vulnerable<br />

to different forms of attacks. This is due to application errors<br />

and/or deficiency in the design especially as it relates to coding of<br />

the back-end. An average of 53.1 percent of sites contains critical<br />

vulnerabilities (XSS and SQLi), 37.5% have medium-low level<br />

issues (cookie manipulation and unencrypted password) and 70.3<br />

percent contain informational issues (broken links) in their<br />

websites. This is an undesirable level of protection. As more<br />

Media<br />

N=2<br />

services are offered on a daily basis to the public through the<br />

portals and the number of government databases connected with<br />

these services are increasing, the risk of malicious data, identity<br />

theft and manipulating the integrity of the databases increases. It<br />

is therefore important that government take preventive measures<br />

now to prevent any eventualities, some of these are articulated in<br />

the policy recommendation in the next sections.<br />

Ministries<br />

N=6<br />

Others<br />

N=7<br />

Parastatals<br />

N=13<br />

6.0 POLICY RECOMMENDATION<br />

States<br />

N=13<br />

Total Errors 214(4) 249(5) 69(3) 1(1) 64(4) 76(5) 196(7) 380(5)<br />

Site with no<br />

Errors<br />

Medium/Low Level<br />

6 3 2 1 2 2 6 8<br />

Total Errors 18(3) 26(3) 3(2) 0 3(2) 2(2) 40(6) 24(6)<br />

Site with no<br />

Errors<br />

Informational<br />

7 5 3 2 4 5 7 7<br />

Total warning 38(8) 34(4) 25(4) 3(2) 31(4) 69(6) 117(10) 58(8)<br />

Site with no<br />

warning<br />

2 4 1 0 2 1 3 5<br />

241<br />

It is expedient that different organizations take necessary steps to<br />

close all possible loop holes that may be detrimental to their<br />

resources available on their websites. This may involve website<br />

validation or possibly an entire re-design. Before launching a<br />

website, it is a good practice to cross-check and validates all<br />

aspects of the design either by hosting it on a local server or on a<br />

test bed. By this procedure, software development cycle principles<br />

would have been followed, which the application is not out of<br />

order in this context. This involve: planning, requirements<br />

analysis, design & development, implementation (coding), testing<br />

& integration, evaluation (validation), release (launching) and<br />

support (maintenance).<br />

The government also has vital roles to play, this involve setting<br />

web standards as well as monitor and evaluate compliance. This<br />

standard will be for all the government Ministries, Departments<br />

and Agencies (MDAs) and could also extend to non-governmental<br />

bodies and private firms with a web presence activities within the<br />

country or are planning to have one. This standard should cover<br />

all areas of the website cycle which will not leave out: (i) The<br />

domain itself. First, this must be appropriate and must comply<br />

with country code top level if serious transactions involving<br />

ecommerce (for example) are to be allowed on it. (ii) The design<br />

and development up to evaluation in that order must be<br />

ascertained. (iii) Deployment and hosting must be guided; the<br />

country of the hosting service provider may be localized. The


facilities (both hardware and software types, versions etc) in the<br />

premise of the hosting provider must meet a set security standard.<br />

(iv) General management, this includes updating, upgrading and<br />

entire re-design etc, open source could be encouraged but with<br />

caution in this instance. Apart from the fore, the government<br />

should also commission a unit of an agency like National<br />

Information Technology Development Agency (NITDA) for<br />

example, to monitor and evaluate compliance to the standards<br />

from time to time. If all these could be dutifully observed, then<br />

there is likelihood that the challenge of web insecurity will<br />

drastically be minimized.<br />

7.0 REFERENCE<br />

[1] Zhao, J.J. & Zhao, S.Y. (2010). Opportunities and threats: A<br />

security assessment of state e-government websites.<br />

Government Information Quarterly 27 (2010) 49–56.<br />

[2] Backus, M. (2001). E-Governance and Developing<br />

Countries: Introduction and examples. Report No 3, April<br />

2001. Available on<br />

http://www.ftpiicd.org/files/research/reports/report3.pdf<br />

[3] Awoleye O.M., Oluwaranti A.I., Siyanbola W.O. and<br />

Adagunodo E.R. (2008). Assessment of e-Governance<br />

Resource Use in Southwestern Nigeria. Proceedings of the<br />

2nd International Conference on Theory and Practice of<br />

Electronic Governance Cairo, Egypt. ACM International<br />

Conference Proceeding Series; Pages 154-159<br />

[4] Ali, A.B., Shakhatreh, Y.I, Abdullah, M.S. & Alostad, J.<br />

(2010). SQL-Injection Vulnerability Scanning Tool for<br />

Automatic Creation of SQL-injection attacks. Procedia<br />

Computer Science 3, pp 453–458.<br />

[5] Cook, S. (2003). A web Developer’s Guide to Cross<br />

Scripting.<br />

[6] Moen, V., Klingsheim, A.N., Simonsen, K.I.F. & Hole, K.J.<br />

(2006). Vulnerabilities in E-Governments. Proc.2nd<br />

International Conference on Global E-Security (ICGeS-06),<br />

ondon, England, April 20–22, 2006.<br />

[7] Christey, S., & Martin, R.A. (2007). Vulnerability Type<br />

Distributions in CVE. Document Version: 1.1, May 22,<br />

2007. available on http://cve.mitre.org/docs/vulntrends/vuln-trends.pdf<br />

[8] Higgins, K.J. (2006). Cross Site Scripting: Attackers’ New<br />

Favourite Flaw. Available on<br />

http://www.darkreading.com/security/applicationsecurity/208804050/cross-sitescripting-attackers-newfavorite-flaw.html<br />

[9] Bates, D., Barth, A., & Jackson, C. (2010). Regular<br />

Expression Considered Harmful in Client-Side XSS Filters.<br />

WWW 2010, April 26–30, 2010, Raleigh, North Carolina,<br />

USA. ACM 978-1-60558-799-8/10/04. Available on<br />

http://www.collinjackson.com/research/xssauditor.pdf<br />

[10] Halfond, W.G.J., Viegas, J. & Orso, A. (2006). A<br />

Classification of SQL Injection Attacks and<br />

Countermeasures. College of Computing Georgia Institute of<br />

Technology, 2006.<br />

[11] Huang, Y.W., Huang, S.K, & Lin, T.P. (2003). Web<br />

Application Security Assessment by Fault Injection and<br />

242<br />

Behaviour Monitoring. WWW2003, May 20-24, 2003,<br />

Budapest,Hungary. ACM 1-58113-680-3/03/0005. Available<br />

http://www2003.org/cdrom/papers/refereed/p081/FINAL_W<br />

AVES_WWW2003.htm<br />

[12] Bandhakavi, S., Bisht, P., Madhusudan, P., &<br />

Venkatakrishnan, V.N (2007). CANDID: Preventing SQL<br />

Injection Attacks using Dynamic Candidate Evaluations.<br />

WWW 2010, April 26–30, 2010, Raleigh, North Carolina,<br />

USA. ACM 978-1-60558-799-8/10/04. Available on<br />

http://cs.uiuc.edu/~madhu/ccs07.pdf<br />

[13] Lee, I. Jeong, S., Yeo, S. & Moon, J. (2011). A Novel<br />

Method For SQL Injection Attack Detection Based On<br />

Removing Sql Query Attribute Values. Mathematical and<br />

Computer Modeling, pp 1-11.<br />

[14] Xie, Y. & Aiken, A. (2006). Static Detection of Security<br />

Vulnerability in Scripting Languages. 15th USENIX Security<br />

Symposium, 2006. Available on<br />

http://theory.stanford.edu/~aiken/publications/papers/usenix<br />

06.pdf<br />

[15] Balduzzi, M., Gimenez, C.T., Balzarotti, D. & Kirda, E.<br />

(2010). Automated Discovery of Parameter Pollution<br />

Vulnerabilities in Web Applications.<br />

[16] SANS Institute (2009b). Top Cyber Security Risks -<br />

Executive Summary” September 2009. Available on<br />

http://www.sans.org/top-cyber-security-risks/summary.php<br />

[17] SANS Institute (2009a). SANS Top-20 2007 Security Risks<br />

(2007 Annual Update). Available on<br />

http://www.sans.org/top20/#s1.<br />

[18] Halkidis, S.T., Chtzigeorgiou, A. & Stephanides, G. A<br />

Practical Evaluation of Security Patterns. Available on<br />

http://users.uom.gr/~achat/papers/AIDC2006.pdf<br />

[19] OWASP Foundation (2007). The Ten Most Critical Web<br />

Application Security Vulnerabilities. Available on http://<br />

www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf


Session 9<br />

Social Media in Government


Exploring Social Media Usage in Saudi E-Government<br />

Websites<br />

Hend S. Al-Khalifa, Muna S. Al-Razgan, Nora I. Al-Rajebah and Ameera M. Almasoud<br />

Information Technology Department<br />

College of Computer and Information Sciences<br />

King Saud University<br />

Riyadh, Saudi Arabia<br />

{hendk;ma;razgan;nrajebah;amma;masoud}@ksu.edu.sa<br />

ABSTRACT<br />

Many governments worldwide have employed social media<br />

services to increase their openness and transparency. These<br />

services have played an important role in bridging the gap<br />

between governments and citizens and increase the interaction<br />

with each other. This paper explores the prevalence of social<br />

media services in Saudi e-Government agencies' websites and<br />

analyzes their patterns of usage.<br />

Using a comprehensive analysis of 170 Saudi government<br />

websites, we found that Twitter, Facebook and YouTube were the<br />

most commonly used social media services among e-Government<br />

agencies, and they were utilized as a one-way communication<br />

channel.<br />

Categories and Subject Descriptors<br />

J.4 [Computer Applications]: Social and Behavioral Sciences –<br />

sociology, psychology.<br />

General Terms<br />

Management<br />

Keywords<br />

Social Media, Twitter, Facebook, YouTube, Blog, E-government,<br />

Saudi Arabia.<br />

1. INTRODUCTION<br />

With the proliferation of an array of different social media<br />

services such as blogs, Facebook and Twitter, people became<br />

more connected to each other. Social media services are defined<br />

as “media for social interaction, using highly accessible and<br />

scalable communication techniques. It is the use of web-based and<br />

mobile technologies to turn communication into interactive<br />

dialogue” [1].<br />

In fact, there are many categories of social media sites based on<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

243<br />

the service they provide, for instance: Blogging services (e.g.<br />

Wordpress/Blogger), Media-sharing services, (e.g. YouTube<br />

"Video", Flickr "photos"), Social networking (e.g. Facebook and<br />

LinkedIn) and Micro-Blogging services (e.g. Twitter).<br />

Social media services are gaining popularity worldwide. Based on<br />

Alexa 1 ranking for top visited sites in the world, we can notice<br />

that 50% of the top ten most visited websites are social media<br />

services, which includes: Facebook, YouTube, BlogSpot and<br />

Twitter.<br />

Recently social media websites have been used to improve the<br />

relationship between government agencies and their citizens and<br />

to increase interaction. They provide good means of eparticipation,<br />

which offers "the opportunity to achieve and satisfy<br />

the need to be heard by politicians and participate in the decisionmaking<br />

and policy formulation processes through the use of ICT"<br />

[2]. In this respect, social media services were widely adopted in<br />

e-Government websites because they created fast and readily<br />

available communication channels with the citizens.<br />

Given the importance of employing social media services in<br />

today's e-Government websites; in this study we present the<br />

results of analyzing the prevalence and usage of social media<br />

services in Saudi Arabia e-Government agencies websites.<br />

In order to explore the prevalence of social media services in<br />

Saudi e-Government agencies websites, we first need to know<br />

what are the widely used social media services in Saudi Arabia?<br />

According to Alexa website, YouTube, Facebook, Twitter and<br />

Blogspot, respectively are among the top ten most visited websites<br />

in Saudi Arabia 2 . Also the statistics presented in the "Internet<br />

World Stats" 3 show that there are more than 4.5 Million Saudi<br />

Facebook users on Dec 31, 2011; with a penetration rate equal to<br />

17.4%. Most of these users are under 30 years old. On the other<br />

hand, in September, 2011 the number of Saudi Twitter users has<br />

reached 127,457 users according to Arab Social Media Report [3].<br />

The previous numbers show an increased usage of social media<br />

among young Saudi citizens.<br />

Knowing these facts about the usage growth of social media<br />

services in Saudi Arabia, this study will answer the following<br />

questions:<br />

1<br />

The top 500 sites on the web by Alexa.com on March 26, 2012<br />

2<br />

Top sites in Saudi Arabia by Alexa.com on March 26, 2012:<br />

http://www.alexa.com/topsites/countries/SA<br />

3<br />

http://www.internetworldstats.com/middle.htm, Date Accessed 26 March<br />

2012.


1. What kind of social media services do Saudi e-Government<br />

websites use?<br />

This research question is meant to address the combination<br />

of technology, telecommunication and social interaction<br />

between the Saudi government and its citizen, and which<br />

tools of the social media is more suitable for Saudi citizens.<br />

Knowing these information will help in improving the<br />

service and delivery of information through the correct<br />

channel.<br />

2. Which e-Government agency is using social media services<br />

and tools and to what extent?<br />

Since the aim of this paper is to know which government<br />

agency is actively using social media and to what extent?<br />

Identifying this government agency will help in delivering<br />

our recommendations and better improve their services.<br />

3. In what capacity in terms of announcement, discussion,<br />

consultation, seeking ideas have social media been used in<br />

Saudi e-Government websites?<br />

Finding the answers to these questions will help in (1) providing<br />

recommendations to Saudi e-Government websites to better<br />

utilize social media services and (2) identify weaknesses in their<br />

current usage. Thus, this study provides the first comprehensive<br />

examination and analysis of 170 Saudi e-Government websites.<br />

The focus will be on top social media services used in Saudi<br />

Arabia, as mentioned before.<br />

In the following section, we present some related work on the<br />

usage of social media in e-Government context. In section 3, we<br />

describe the methodology we followed in order to collect Saudi<br />

government agencies websites. Then in section 4, we discuss our<br />

findings and answer the three posed research questions. Finally<br />

section 5 provides recommendations and future directions for this<br />

research.<br />

2. RELATED WORK<br />

In the past few years, we have witnessed the utilization of social<br />

media services by many governmental websites worldwide. The<br />

aim of the utilization was to provide a two way interactive<br />

communication channel with the citizens and to relate the<br />

government with their constituencies.<br />

Among the previous studies on the adoption of social media<br />

service in government agencies websites, is a study by Alam et al.<br />

[4] on the usage of Facebook in the Australian Taxation Office<br />

(ATO). They found that ATO used Facebook as a one-way<br />

communication tool to provide information about their e-Tax<br />

service.<br />

Similarly, Upadhyay and Ilavarasan [5] studied Facebook pages<br />

of three government agencies in Delhi, India. These include<br />

Municipal Corporation of Delhi, Delhi Traffic Police and<br />

Planning Commission. Based on the agencies usage the authors<br />

offered suggestions for policymaking to facilitate a wider and<br />

more effective reach of social media in the developing countries.<br />

On the other hand, Rojas et al. [6] studied the interaction of six<br />

territorial public entities in Colombia through Facebook and<br />

Twitter. They found that the usage of Twitter and Facebook by the<br />

244<br />

six entities was not as expected. As a result they provided a set of<br />

recommendations to improve eParticipation on Social Media.<br />

In another study based on a three-tiered approach to eParticipation<br />

(Inform, Consult and Empower) [7], Inform: about the existing<br />

policy, consult: by sharing knowledge and opinions, and<br />

empower: by pursuing particular issues to the policy actors. The<br />

authors found that the main challenge to their approach was not<br />

the technological barriers; instead it was the socio-political<br />

barriers.<br />

In a wider context, Chua et al. [8] analyzed 200 international<br />

government websites using content analysis and multiple<br />

regression analysis. They found that the prevalence of seven Web<br />

2.0 applications in descending order was: RSS, multimedia<br />

sharing services, blogs, forums, social tagging services, social<br />

networking, services and wikis. Finally, Gharawi et al. [9]<br />

introduced the perceived values and pressing issues which<br />

concerning practitioners that may complicate adoption of social<br />

media services in e-Government websites.<br />

From the previous research, we can see that many international<br />

government websites do use social media services; however their<br />

usage were very basic and did not fully utilize the potential and<br />

capabilities of social media. So, will this be the case with Saudi e-<br />

Government websites? The answer will be addressed in the next<br />

sections.<br />

3. METHODOLOGY<br />

3.1 Collection of Saudi e-Government<br />

Websites<br />

One hundred ninety four Saudi government agencies websites<br />

listed in the Saudi e-Government Portal (saudi.gov.sa) was<br />

considered in this study. These websites were visited to make sure<br />

that their addresses are correct. From the 194 websites only 170<br />

were working properly. Table 1 shows the number of collected<br />

websites based on their category type.<br />

Table 1. Number of e-Government websites in each category<br />

3.2 Methods of Data Analysis<br />

During the period between 2 ed and 28 th March 2012 three experts<br />

in social media domain were involved in the analysis. The first<br />

step was to count the appearance of four social media services,


namely: Twitter, Facebook, blogs and YouTube for each website<br />

in the e-Government categories (e.g. funds, municipality,<br />

ministries, universities supported by the government, etc.). For<br />

each social media service the expert codes it with either “yes” or<br />

“no” to denote its presence or absence. We also noticed while<br />

visiting some e-Government agencies websites the usage of other<br />

types of social media services such as Flickr, Linkedin, Google+,<br />

etc. Thus, they were counted.<br />

The second step was to observe and distill the usage patterns for<br />

each social media type based on the criteria shown in Table 2.<br />

Table 2. Criteria used for exploring the usage patterns for e-<br />

Government websites<br />

Social Media Type Criteria<br />

Twitter<br />

Facebook<br />

YouTube<br />

Blog<br />

4. FINDINGS<br />

• Number of followers<br />

• Number of tweets<br />

• Is it up-to-date?<br />

• Is it interactive?<br />

• Type of usage (e.g. news,<br />

announcements, answers, etc.)<br />

• Number of likes<br />

• Are user comments allowed?<br />

• Is it up-to-date<br />

• Is it interactive<br />

• Type of usage (e.g. news,<br />

announcements, answers, etc.)<br />

• Number of uploaded videos<br />

• Number of subscribers<br />

• Number of views<br />

• Is it up-to-date?<br />

• Type of videos<br />

• Are user comments allowed?<br />

• Is it up-to-date?<br />

• Type of posted topics<br />

4.1 Prevalence of Social Media Services<br />

To address our first research question "What kind of social media<br />

services do Saudi e-Government websites use?" Figure 1 shows<br />

the breakdown of social media usage based on their types for the<br />

170 different Saudi government agencies.<br />

245<br />

Figure 1. Percentage of Social Media usage<br />

We can see from the figure above that Facebook is one of the<br />

highly used services with 37%, next comes Twitter with 35%,<br />

then YouTube with 25%, and finally Blogs with only 3%. The<br />

usage of Facebook and Twitter are the most popular among Saudi<br />

agencies due to the high engagement of Saudi community in using<br />

these services. We also noticed that since Facebook and Twitter<br />

are becoming popular among young Saudi citizens, the usage of<br />

blogs has started to diminish.<br />

Figure 2. Percentage of Other Social Media usage<br />

We mentioned previously that there are other social media<br />

services that have been used in Saudi e-Government agencies,<br />

such as Flickr, Google+, LinkedIn, Forums, and Scribd. Figure 2<br />

shows the distributions of these services. The highest percentage<br />

is for Flickr which equals to 46%, the second highest is Linkedin<br />

with %21, the third one is Forums which equals to 15%, and the<br />

rest has been used in low percentage as shown in the figure above.<br />

4.2 Uses of Social Media Services<br />

To address our second and third research questions "Which e-<br />

Government agency is using social media services and tools and<br />

to what extent?" and "In what capacity in terms of announcement,<br />

discussion, consultation, seeking ideas have social media been<br />

used in Saudi e-Government websites?" an in-depth inspection<br />

was carried out on Facebook, Twitter and YouTube, since they<br />

were the highly used social media services in Saudi e-Government<br />

websites.


4.2.1 Facebook Usage<br />

Figure 3. Percentage of agencies that use Facebook per<br />

category<br />

Figure 3 shows the usage of Facebook among Saudi government<br />

agencies; we noticed that the highest usage in descending order<br />

was in universities (80%), municipalities (56%), councils (51%)<br />

and funds (40%). The rest ranged between 33% and 14%.<br />

The high usage of Facebook among universities websites explains<br />

the popularity of social media services among the young Saudi<br />

generation.<br />

Also, we noticed that some agencies did not use Facebook, such<br />

agencies include: Diwans, Colleges, and Departments. This can be<br />

attributed to the fact that the number of agencies' websites under<br />

these categories was low, i.e. they usually consist of three<br />

websites in each category.<br />

Regarding the usage patterns of Facebook, we can find that news<br />

and announcements dissemination were the most commonly used<br />

patterns. To be more specific, Funds and Presidencies were so<br />

active in terms of updating their pages with news. However, all e-<br />

Government agencies interaction with the citizens via their<br />

Facebook pages used one direction without any discussion, which<br />

can be considered as poor interaction. This way of interaction<br />

might be attributed to the recent establishment of government<br />

agencies Facebook pages or the absence of a clear usage policy of<br />

such a media.<br />

4.2.2 Twitter Usage<br />

Figure 4. Percentage of agencies that use Twitter per category<br />

246<br />

In our analysis we found that there were 64 out of 170<br />

government agencies which have Twitter accounts. From Figure<br />

4, it can be clearly seen that the highest Twitter usage among the<br />

64 government agencies was present in the University category<br />

with a percentage of 72%. Municipality category comes second,<br />

with a percentage of 67% followed by Ministry, Principality,<br />

Fund, Council and other agencies categories that have a usage<br />

range of 38% to 43%. While Directorate, Commission,<br />

Presidency, and Establishment categories have a usage ranged<br />

from 17% to 22%. Similar to the findings of Facebook usage,<br />

College, Diwans, and Department categories were not using<br />

Twitter.<br />

Furthermore, among the 64 agencies which used Twitter, 77%<br />

were up to date with recent tweets. In general, utilizing Twitter to<br />

communicate with citizens is roughly a new trend in Saudi Arabia<br />

as many agencies created their accounts between 2010 and 2011.<br />

In terms of the different themes of usage, Twitter accounts were<br />

mainly used for disseminating news and announcements. Overall,<br />

Twitter is used as a one way channel to broadcast announcements<br />

and news benefiting from the growing interest in Twitter inside<br />

the Saudi society. Small amount of interaction was encountered,<br />

among all agencies, i.e. 22% were interactive. The Ministry and<br />

University categories have good interaction with their followers<br />

which appears in terms of Q&As and replies. Other Agencies like<br />

Saudi Arabian airlines and the National Center for Assessment in<br />

Higher education are very active as well. It seems that these<br />

agencies allocate enough resources (human and time) to interact<br />

with the citizens.<br />

4.2.3 YouTube Usage<br />

Figure 5. Percentage of agencies that use YouTube per<br />

category<br />

Figure 5 shows the usage of YouTube among Saudi government<br />

agencies. The highest usage was in: universities (31%),<br />

municipalities (19%), ministry (13%), other agency (10%), and<br />

the rest were below 8%. The agencies who do not use YouTube<br />

were Colleges, Diwans, Department, and Council. Their lack of<br />

usage might be attributed to the fact that videos are not needed in<br />

their line of business.<br />

Regarding the usage patterns of YouTube, we found that<br />

announcements, interviews, how-to's (direction) and events<br />

broadcasted in TVs were the most commonly used patterns.<br />

Moreover, in most agencies channels viewers’ comments were<br />

allowed. Finally, we can notice that most of YouTube channels


were recently established and they usually have less than 200<br />

videos uploaded.<br />

5. DISCUSSION AND CONCLUSION<br />

Social media is newly introduced in Saudi e-Government websites<br />

given the creation date of their accounts in different social media<br />

services. In this paper we have explored the prevalence of social<br />

media services among Saudi e-Government agencies and the<br />

attitude towards their usage.<br />

Our findings show that the use of Facebook and Twitter were<br />

admirable, given the small number of Saudi e-Government<br />

agencies officially using them. In fact, the usage of social media<br />

services was most common in Universities and Municipalities<br />

websites. Our analysis also showed that most e-Government<br />

agencies publish the same content on both Facebook and Twitter.<br />

In terms of their usage trends, we have noticed that either the<br />

agencies’ website was up-to-date and participated in more than<br />

one social media service, or the website is so simple, with no<br />

participation in any service. The apparent usage pattern, as we<br />

have stated previously, was for disseminating news and<br />

announcements, i.e. only as a one way communication channel.<br />

In order to overcome the problems found in current usage of<br />

social media services we provide the following recommendations<br />

for Saudi e-Government agencies:<br />

• Create a clear social media strategy that prevents any<br />

misunderstandings or misuse of the service and defines<br />

the overall goals of its usage.<br />

• Clarify the purpose of each social media service to the<br />

citizens i.e. whether it is for discussions, Q&As, or<br />

news/announcement channel.<br />

• Verify social media accounts to give them more trust and<br />

credibility.<br />

• For agencies from the same category or interest, it is<br />

advisable to get connected with each other, this will help<br />

service the Saudi citizens.<br />

• Allocate enough resources (personnel and time) in each<br />

government agency for moderating and managing social<br />

media channels.<br />

• Learn which social media is popular among Saudi citizen<br />

and engage and focus on that service.<br />

• Improve the current usage of social media services by<br />

adopting an interactive two-way communication channel<br />

with the citizens.<br />

• Consult and seek knowledge from the citizens about how<br />

to improve the agency social media service.<br />

247<br />

Finally, it is worth mentioning that since the usage of social media<br />

in Saudi government is very recent, there is no deep involvement<br />

yet between policy makers and Saudi citizens. Therefore, the<br />

recommendation was given to help improve the usage of the<br />

current services, and hopefully in the near future we reach the<br />

ultimate goal which is “inform-consult-empower” between policy<br />

makers and Saudi citizens.<br />

6. REFERENCES<br />

[1] “Social media - Wikipedia, the free encyclopedia.” [Online].<br />

Available: http://en.wikipedia.org/wiki/Social_media.<br />

[Accessed: 25-Mar-2012].<br />

[2] K. Ergazakis, K. Metaxiotis, and T. Tsitsanis, “A State-of-<br />

The-Art Review of Applied Forms and Areas, Tools and<br />

Technologies for e-Participation,” International Journal of<br />

Electronic Government Research, vol. 7, no. 1, pp. 1–19,<br />

2011.<br />

[3] “Arab Social Media Report,” Dubai School of Government.<br />

Available: http://www.dsg.fohmics.net/en/asmr3/. [Accessed:<br />

25-Mar-2012].<br />

[4] S. L. Alam, J. Campbell, and R. Lucas, “Using Social Media<br />

in Government: The Australian Taxation Office e-Tax<br />

Facebook Page,” in 2011 IEEE Ninth International<br />

Conference on Dependable, Autonomic and Secure<br />

Computing (DASC), 2011, pp. 1002–1009.<br />

[5] J. M. Rojas, C. J. Ruiz, and C. Farfán, “e-participation and egovernance<br />

at web 2.0 in local governments of Colombia,” in<br />

Proceedings of the 5th International Conference on Theory<br />

and Practice of Electronic Governance, New York, NY,<br />

USA, 2011, pp. 301–304.<br />

[6] A. Upadhyay and P. V. Ilavarasan, “Social media, egovernance<br />

and developing countries: insights from India,”<br />

in Proceedings of the 5th International Conference on Theory<br />

and Practice of Electronic Governance, New York, NY,<br />

USA, 2011, pp. 351–352.<br />

[7] Lee D., Loutas N., Sanchez Nielsen E., Mogulkoc E.,<br />

Lacigova O., Inform-Consult-Empower: A Three-tiered<br />

Approach to eParticipation. In Proceedings of 3rd ePart<br />

Conference, Delft, The Netherlands, 2011, pp. 121-132.<br />

[8] A. Y. Chua, D. Goh, and R. Ang, “Web 2.0 applications in<br />

government websites: prevalence, use and correlations with<br />

perceived website quality,” Online Information Review, vol.<br />

36, no. 2, p. 2–2, Apr. 2012.<br />

[9] M. Gharawi, N. Helbig, J. Hrdinová, and D. Werthmuller,<br />

“An exploratory study of social media adoption in<br />

government,” in Proceedings of the 4th International<br />

Conference on Theory and Practice of Electronic<br />

Governance, New York, NY, USA, 2010, pp. 359–36


Government Crisis Communication on the Microblog: A<br />

Theory Framework and the Case of Shanghai Metro Rear-<br />

End Collision<br />

ABSTRACT<br />

Crisis brings various damages including a tarnished reputation. To<br />

protect and restore its reputation is an important task for a<br />

government agency in times of crisis. A microblog, which is<br />

attracting more and more public attention, can be used as a<br />

platform for the government to communicate with the public in<br />

order to manage its reputation in times of crisis. However, there is<br />

not enough research done in this area. In this paper, the author<br />

develops a general framework for a government agency to<br />

conduct crisis communication on the microblog. At the end of the<br />

paper, the case of a Shanghai City Metro rear-end collision is<br />

introduced to show how the government can use the framework to<br />

respond to a crisis.<br />

Categories and Subject Descriptors<br />

K.4.m [Computer and Society]: Miscellaneous.<br />

General Terms<br />

Management, Measurement, Performance, Theory<br />

Keywords<br />

Microblog; Social Media; Public Relation; Crisis Communication,<br />

China<br />

1. INTRODUCTION<br />

1.1 Background<br />

On September 27, 2010, a rear-end collision occurred at Shanghai<br />

City’s Metro in China. This accident was first reported by a<br />

microblogger on Sina Microblog [42], a popular Chinese<br />

microblog website 1 .<br />

What makes this affair different is the responses made by the<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

1 http://www.weibo.com/<br />

Xiao Liang<br />

Department of Informatics<br />

University at Albany, SUNY<br />

1400 Washington Avenue<br />

Albany, NY 12222<br />

xliang@albany.edu<br />

248<br />

Shanghai Metro’s official microblog 2 . The response messages<br />

were widely spread, and both the responses and the Shanghai<br />

Metro received considerable acclaim.<br />

On one hand, this indicates that the public would like to see<br />

government agencies appear on a microblog in times of crisis; on<br />

the other hand, it raises the question of how a government agency<br />

could use microblogs in a crisis to facilitate crisis communication.<br />

1.2 Introduction of the Problem<br />

Crisis is the “perception of unpredictable event that threatens<br />

important expectancies of stakeholders and can seriously impact<br />

an organization’s performance and generate negative outcomes”<br />

[6]. One of the negative outcomes of a crisis is a tarnished<br />

reputation [10], which is the source of negative attitudes towards<br />

an organization [26]. Therefore, to protect their reputations<br />

becomes an important task for all organizations in times of crisis.<br />

Crisis communication is the approach aimed at maintaining and<br />

repairing reputation during a crisis. This approach, by definition,<br />

is “the dialogue between the organization and its public prior to,<br />

during, and after the negative occurrence. The dialogue details<br />

strategies and tactics that are designed to minimize damage to the<br />

image of the organization” [12].<br />

As a channel of communication, the media is an unneglectable<br />

constituent. Scholars assert that, according to different<br />

characteristics of the media, an organization should apply<br />

different strategies in order to achieve the best result [4]. The<br />

microblog, as a type of new media, is attracting more and more<br />

public attention. Many organizations have begun to use it as a<br />

platform to communicate with their publics during crises [31].<br />

However, there has not much research done in this area [31].<br />

This paper aims to provide government agencies with a general<br />

framework for harnessing the microblog to communicate with the<br />

public during a crisis. However, there is no one size-fits-all model;<br />

the general framework functions as a basic guideline allowing<br />

government agencies to develop specific strategies in different<br />

situations shaped by factors such as the responsibility of the crisis,<br />

the information required by the public, and the social value in<br />

which the organization is embedded. The model takes a stage<br />

approach, which views the crisis as a process composed of<br />

2 http://www.weibo.com/shmetro/


different phases. Four theories of crisis communication are<br />

discussed, and the common issues that the theories focus on are<br />

used to build the framework. Finally, the author uses Shanghai<br />

Metro’s crisis communication to show how a government agency<br />

can employ the microblog to communicate with the public in<br />

times of crisis.<br />

2. PREVIOUS STUDIES<br />

In this section the author first talks about the stage approach. The<br />

author then discusses four common issues affecting crisis<br />

communication strategies concerned by primary crisis<br />

communication theories. Finally, the author discusses some<br />

features of the microblog.<br />

2.1 Three Stages of a Crisis<br />

According to the stage approach, the development of a crisis can<br />

be divided into phases, according to which different tasks are<br />

assigned [14]. There are many stage models, among which the<br />

three-stage model is the most used [32]. The author will also use<br />

three-stage model due to its simplicity.<br />

Simple as the three-stage approach is, scholars try to assign<br />

various definitions to the phases [15, 30]. Coomb summed up the<br />

previous studies and proposed a summarized three-stage model.<br />

His model includes a pre-crisis stage, crisis event stage, and postcrisis<br />

stage [7].Specifically, the pre-crisis stage is when a crisis<br />

has not happened yet. In this phase, the tasks are to detect crisis<br />

signs, prevent possible risks, reduce the potential harm, and<br />

prepare for possible responses [7, 30]. The crisis event stage is<br />

when crisis has occurred and brought damages. The organization<br />

should recognize the crisis as soon as possible and make<br />

responses to the crisis so as to mitigate negative impact [7, 15].<br />

The post-crisis stage is when the immediate effect of a crisis is<br />

over [7]. In this phase the organization should learn from the crisis,<br />

monitor the public’s impression, and make sure that the crisis is<br />

truly over [7, 27].<br />

2.2 Communication Strategies<br />

In this section, the author discusses four common issues examined<br />

by primary crisis communication theories, namely the corporate<br />

apologia theory, image restoration theory, situational crisis<br />

communication theory (SCCT), and organizational renewal<br />

theory[1, 38].The corporate apologia theory focuses on the<br />

apology strategy in a crisis. The image restoration theory is<br />

concerned with strategies for repairing the reputation under attack.<br />

Apology is included in this theory as a general strategy. The<br />

SCCT argues that an organization should apply strategies<br />

according to the situation of the crisis. Lastly, the organizational<br />

renew theory encourages the organization to emphasize the<br />

positive side of the crisis. These four theories fall in the research<br />

area of public relations and recommend strategies for repairing<br />

and retaining organizational reputation in a crisis. Table 1 shows<br />

the features of each theory.<br />

Table 1. Crisis Communication Theories<br />

Theory Main Arguments<br />

Corporate Apologia<br />

o The theory focuses on apology strategies.<br />

o Depending on the responsibilities for the<br />

crisis, five strategies are suggested.<br />

o Strategies: denial, counterattack, excuse,<br />

promising not to do it again, and seeking a<br />

legal solution which is not a public relation<br />

stance.<br />

249<br />

Image Restoration<br />

SCCT<br />

Organizational<br />

Renewal Theory<br />

o This theory focuses on restoring<br />

organizational image when the image is under<br />

attack.<br />

o Two elements of an attack:<br />

-­‐ The accused is held responsible for an<br />

action.<br />

-­‐ The action is considered to be offensive.<br />

o Strategies:<br />

-­‐ Denial and evasion (to the first element).<br />

-­‐ Reducing offensiveness, and corrective<br />

action (to the second element).<br />

-­‐ Mortification (general strategy).<br />

o Crisis strategies depend on the history of the<br />

crisis, previous reputation, and the<br />

responsibilities for the crisis.<br />

o Crisis clusters divided by the responsibility:<br />

victim cluster, accidental cluster, prevention<br />

cluster.<br />

o Strategies applied accordingly: denial,<br />

diminishing, and bolstering.<br />

o The theory is more prospective than<br />

retrospective. It emphasizes rebuilding.<br />

o Four facets of the theory: organizational<br />

learning, ethical communication, prospective<br />

vision, and effective organizational rhetoric.<br />

The theories mainly focus on four factors that an organization<br />

should consider when designing its crisis communication<br />

strategies. These four factors are the crisis situation, the<br />

stakeholders, the values, and the further view. In the following<br />

part of this section the author discusses the four factors one by one.<br />

2.2.1 Crisis situation<br />

The responsibility for a crisis and the level of damage are two<br />

aspects of crisis situations [2, 5].<br />

First of all, the responsibility for a crisis could affect the public’s<br />

attitude towards an organization. This phenomenon is explained<br />

by the attribution theory, which argues that audiences always<br />

search for the cause of an event and try to form attributions for the<br />

responsibility [41]. Various emotions, such as sympathy and anger,<br />

are experienced by audiences after they attribute the responsibility<br />

[41]. For example, if an organization is a victim of the event,<br />

audiences are likely to develop sympathy towards the organization<br />

[5]. Thus, the responsibility becomes an issue one should consider<br />

when designing a crisis communication strategy.<br />

The corporate apologia theory and image restoration theory stress<br />

the importance of crisis responsibility. Depending on whether the<br />

organization is responsible for the crisis, the corporate apologia<br />

theory suggests strategies such as denial, counterattack, excuse,<br />

promising not to do it again, and seeking a legal solution which is<br />

considered as a no-public-relation approach [16]. The image<br />

restoration theory proposes denial and evasion of responsibility<br />

[2].<br />

The SCCT sums up the work of the previous two theories. It<br />

identifies three clusters of crises according to the crisis<br />

responsibility taken by an organization: victim cluster, accidental<br />

cluster, and prevention cluster [13]. Strategies, such as denial,<br />

diminishing, and bolstering, are suggested by the theory [5].<br />

The perceived level of damage is another factor of a crisis<br />

situation. It is argued that if the crisis manager lessens the<br />

perceived harmfulness of the crisis or shows some control over<br />

the damage; then the reputation damage can be reduced [2]. The<br />

level of damages is thoroughly discussed by Benoit in the image


estoration theory. He termed it as “offensiveness of the wrongful<br />

doing” and took it as one of the components of an attack to the<br />

organization [29]. Benoit argued that the perceived offensiveness<br />

of an action is more important than the reality. In other words, the<br />

wrongful action might not be as heinous as it is perceived by the<br />

audience [2]; thus, the crisis manager should deliver information<br />

that will help the public to objectively assess the damage. The<br />

image restoration theory suggests some message options that can<br />

reduce the perceived offensiveness of wrongful actions, such as<br />

bolstering, minimizing the negative feelings (diminishing),<br />

differentiating the crisis from other similar crises, transcendence,<br />

attacking the accusers, and the compensation [2].<br />

2.2.2 Stakeholders<br />

Stakeholders are vital elements in crisis communication because<br />

they are the ones who are affected by the crisis and who form<br />

attitudes towards the organization. Specifically, the previous<br />

reputation among stakeholders and the needs of the stakeholders<br />

are two important elements which the organization ought to pay<br />

attention to.<br />

Research shows that a negative reputation can lead to additional<br />

damage during crises [21]. The SCCT takes the previous<br />

reputation as an important factor that affects the choice of crisis<br />

communication strategies [5]. Hence, instead of suffering the<br />

negative impact which results from a ruined reputation, an<br />

organization is better to build a sound relationship with the<br />

stakeholders before the crisis.<br />

Besides managing the organization’s reputation, to meet the needs<br />

of stakeholders is the first and foremost task during crises [5].<br />

Different stakeholders have different concerns and expectations.<br />

The paper only discusses some general needs in the crisis event<br />

stage and post-crisis stage respectively.<br />

The first need is to reduce uncertainties. A crisis usually breeds<br />

uncertainties [28]. On one hand, people need information to<br />

reduce uncertainties and thereby to make the right decision in<br />

order to minimize the damage [26]. On the other hand, people<br />

need information to diminish the pressure brought by uncertainties<br />

[5, 36].<br />

Secondly, in the post-crisis stage, stakeholders need compensation<br />

and emotional reparations. The corporate apologia theory stresses<br />

that an appropriate apologetic message should acknowledge all<br />

the stakeholders and express empathy to the injured individuals in<br />

the crisis [17]. The image restoration theory recommends the<br />

organization to compensate for the losses of the victims. If the<br />

compensation is accepted by the stakeholders, the image of the<br />

organization might be improved [2].<br />

Finally, it is worth noting that sometimes the organization does<br />

meet the expectations of its stakeholders. However, the action is<br />

not very well expressed. Hence, it is crucial to fill the gap between<br />

the expression and the action [9].<br />

2.2.3 Values<br />

Failing to meet social values, such as being dishonest, will hurt<br />

the organization’s reputation [11]. During the crisis, an<br />

organization faces different interest groups that have a variety of<br />

values. An effective solution is to stress some core values of the<br />

society [32]. Honesty, addressing responsibility, openness, and<br />

humanism are important values identified as by the literature [18,<br />

40].<br />

250<br />

Being honest means to be truthful and sincere [18]. Accepting<br />

responsibilities is considered ethical [40]. Openness requires the<br />

organization to make the information accessible to the public in<br />

order to reduce uncertainties and increase transparency [40, 43].<br />

Humanistic care is about offering help to the public physically,<br />

psychologically, and financially [40].<br />

2.2.4 The future<br />

That an organization should seek opportunities in a crisis and help<br />

the public to see the future is the core argument of the<br />

organizational renewal theory [39]. To correct wrongdoings and<br />

to learn from the crisis are two important aspects discussed by the<br />

four theories.<br />

Correcting the wrongdoing is regarded by the SCCT and image<br />

restoration theory as part of the diminishment strategy [2, 5]. The<br />

corporate apologia theory also values making statements to<br />

correct wrongdoings as a part of an effective apologetic strategy<br />

[16]. Moreover, the SCCT considers the history of similar crises<br />

to be a factor that can negatively affect crisis communication [5].<br />

To correct the wrongdoing is also a necessary action to renew the<br />

organization’s reputation and to prepare for a future crisis.<br />

Learning from a past crisis plays an important role in rebuilding<br />

an organization. An organization can learn from the crisis by<br />

evaluating its crisis response strategy as well as investigating the<br />

reason for the crisis. To improve the crisis response mechanism,<br />

to correct the reason for the crisis, and to rebuild the organization<br />

are some of the aims.<br />

3. FRAMEWORK<br />

3.1 Microblog<br />

In this section, the author discusses two important activities on the<br />

microblog and some techniques that can help an organization<br />

organize the information on a microblog.<br />

The microblog as a new meda is attracting more and more public<br />

attention [25]. Research shows that people react less negatively to<br />

crisis communication strategies on the microblog (twitter), and the<br />

public tries to seek and share information on the microblog in<br />

times of crisis [31]. Although there is research that has focused on<br />

using social media in crises in general, there is little research that<br />

specifically investigates the usage of the microblog in crises [31].<br />

In order to understand how the microblog can help with crisis<br />

communication, there is a need to first understand its major<br />

activities and how to handle the information on it.<br />

Two major activities on the microblog are collecting and<br />

disseminating information, which are supported by the<br />

information processing capability of the microblog. First, the large<br />

user group provides the organization with a resource for collecting<br />

information about stakeholders’ attitudes and expectations [35].<br />

Secondly, the large number of users also enables the organization<br />

to broadcast information to the relevant audiences. Third,<br />

information spreads quickly on the microblog. Due to mobile<br />

devices, such as smart phones, people can share information<br />

whenever they use their mobile devices. Moreover, the microblog<br />

is interactive. By using functions, such as “@”, comments, and<br />

private chats, the organization could both give feedback to and<br />

receive timely feedback from the public. Finally, people might<br />

argue that the blog is also interactive. However, since it is easy to<br />

create and share information on the microblog, the microblog is


more suitable for information disseminating within a limited time<br />

frame [34].<br />

Besides collecting and disseminating information, handling<br />

information on the microblog is another issue. Two major<br />

problems in terms of handling information are information<br />

overload [19] and the length limitation of each message. In Table<br />

2, the author suggests some techniques to assist in organizing and<br />

retrieving information, as well as breaking length limitation.<br />

Table 2.Information Overload and Length Limitation<br />

3.2 The Framework<br />

The framework is arranged by Coomb’s three-stage model. The<br />

stages are pre-crisis stage, crisis event stage, and post-crisis stage.<br />

Coomb also gives the tasks of each stage. The author will discuss<br />

each task in detail with respect of Coomb’s descriptions as well as<br />

the four factors that the author generalizes from primary crisis<br />

communication theories. Accordingly, the author then discusses<br />

what types of messages could be delivered and collected by the<br />

organization.<br />

3.2.1 Pre-crisis stage<br />

In the pre-crisis stage, the crisis has not happened yet. The task of<br />

this stage is to detect crisis signs, prevent possible risks and<br />

reduce potential harm, and prepare for a possible crisis response.<br />

Firstly, there are usually signs that indicate a possible crisis [8].<br />

However, it is not easy to detect those signals; therefore, it<br />

requires the organization to collect information systematically<br />

from both internal and external sources [8]. A government agency<br />

could take advantage of the large user group of the microblog<br />

[24].The general public and the opinion leaders [8, 22] are both<br />

sources of information [24]. The general public could express<br />

their concerns as well as report suspicious phenomena through<br />

comments, “@”, private messages, and so on. Moreover, opinion<br />

leaders and experts, who have knowledge on particular issues and<br />

the power to affect the public’s opinion, should not be neglected<br />

by government agencies [8, 22]. Besides, the comments on<br />

messages that an opinion leader has posted are also an information<br />

resource. Overall, the information for detecting crisis signs can be<br />

collected from both the public and the opinion leaders and experts.<br />

251<br />

The public’s concerns and attitudes, and the suspicious<br />

phenomena reported are the information a government agency<br />

should pay attention to.<br />

The second task is to reduce potential harm. One of the ways to<br />

reduce the harm is to educate the public so that they can make the<br />

right decisions when a crisis hits. On the microblog, the<br />

government can post educational messages enriched by pictures,<br />

videos, and external articles. However, posting educational<br />

messages is just one way to reduce the potential harm. The type of<br />

information delivered in order to degrade the potential harm<br />

depends on the crisis that an agency anticipates. In other words, a<br />

government agency should analyze the potential crisis and<br />

systematically design the microblog messages that will be helpful<br />

in reducing the harm.<br />

Thirdly, in order to prepare possible crisis responses, a<br />

government agency should consider the four factors that affect the<br />

strategies of crisis communication, namely the crisis situation,<br />

stakeholders, social values, and the future view. Accordingly, in<br />

the preparation stage, an agency should build sound informationsharing<br />

mechanisms on the microblog, establish a good reputation<br />

among stakeholders, understand the needs of stakeholders,<br />

comply with social values, and stress the future view.<br />

Build information-sharing mechanisms before the crisis has been<br />

discussed by scholars for a long time [20]. The public can be one<br />

of the grids that provide information about a crisis. The public can<br />

even spontaneously provide assistance during a crisis. A<br />

government agency may empower the citizen to become involved<br />

in such activities on the microblog.<br />

The microblog can be used as a platform to build a sound<br />

relationship with the public. Few studies have been done on how<br />

an organization should communicate with the public on the<br />

microblog in order to build a good relationship. However, we can<br />

use the studies on general online communication as a source of<br />

reference. Two major strategies to maintain good relationships<br />

have been suggested by scholars: communicated relational<br />

commitment and conversational human voice [23].The former<br />

requires the organization to show willingness to maintain a<br />

relationship with the public; the latter highlights the importance of<br />

the human voice of the people who form the organization [23]. On<br />

the microblog, to enhance relational commitment can be reflected<br />

in the agency’s involvement in the public’s affairs. Besides, to<br />

show openness in organizational affairs can also help to maintain<br />

commitment [34]. The humanity of a government agency can be<br />

reflected in microblog posts that use a personal voice instead of an<br />

official tone. The person in charge of the official microblog can<br />

also show personal opinions, which can help with expressing a<br />

human voice [23, 34, 37].<br />

Information about the public’s expectations (needs) will assist the<br />

government in coping with a crisis. Such information can be<br />

collected directly from the public’s comments, “@”, and private<br />

messages. Again, the opinion leaders and experts play a role as<br />

well.<br />

The fourth requirement is to deliver messages fitting with social<br />

values. The posts and discussions on the microblog can reflect<br />

some social values as well as rules in the world of the microblog.<br />

A government agency should continuously monitor the public’s<br />

values on the microblog. Table 3 shows strategies for the precrisis<br />

stage.


Table 3. Strategies for Pre-crisis Stage<br />

3.2.2 Crisis event stage<br />

In the crisis event stage, the tasks are to identify the crisis and to<br />

launch appropriate crisis responses.<br />

A crisis usually hits suddenly, leaving the organization and the<br />

public little time to respond [3]. Consequently, to identify the<br />

crisis at the first moment becomes vitally important. Online<br />

information dissemination is fast; thus, online media can be used<br />

as a channel to report the crisis. A good example for this is the<br />

Shanghai City Metro accident, which was first reported on a<br />

microblog by an ordinary citizen [42].<br />

After identifying a crisis, an organization should respond to it as<br />

soon as possible. In rest of Section 3.2.2, the author discusses the<br />

response strategy according to the four factors covered by popular<br />

crisis communication theories: the crisis situation, the<br />

stakeholders, the social values, and the future view.<br />

First of all, public-generated messages might contain clues of a<br />

crisis situation, such as the crisis responsibility/perceived crisis<br />

responsibility and the level of damage/perceived level of damage.<br />

Thus, the government agency can pay attention to both the factors<br />

involved in the crisis as well as the public’s attitude on the<br />

microblog. Moreover, the government should design crisis<br />

communication strategies according to the crisis situation.<br />

Secondly, the response messages posted on the microblog should<br />

meet the needs of stakeholders. On one hand, a government<br />

organization can make use of information that is collected in the<br />

pre-crisis stage; on the other hand, the organization can deliver<br />

information that meet the general needs of stakeholders, such as<br />

decision-making needs, the need to reduce emotional uncertainties,<br />

and the need for reparations and compensation. Importantly, if an<br />

organization meets the needs of the public, then it should be<br />

reflected in its messages.<br />

252<br />

Third, the response messages on the microblog should also be in<br />

accord with the core values of stakeholders. The public’s<br />

perception of social values and the rules of messages on the<br />

microblog should be collected and analyzed in the pre-crisis stage;<br />

thereby, the organization can deliver appropriate information in<br />

legitimate formats.<br />

Ultimately, to stress the future can be another task in this stage.<br />

The government agency can inform the public that they are<br />

correcting the wrongdoing as well as learning from the crisis. The<br />

rhetoric used in the posts underlining the future view should be<br />

positive [39]. Table 4 shows the strategies in the crisis event stage.<br />

Table 4. Strategies for Crisis Event Stage<br />

3.2.3 Post-crisis stage<br />

In this stage, the tasks are preparing for the next crisis, making<br />

sure the stakeholders are left with positive impressions, and<br />

checking that the crisis is truly over.<br />

Preparing for the next crisis includes activities such as evaluating<br />

the crisis response strategy and learning from the most recent<br />

crisis [7, 39].On the microblog, feedback is the material for<br />

evaluation and learning purposes. The public’s attitude displayed<br />

in each message can be used to evaluate whether the strategy was<br />

favored. The public’s needs in the crisis as expressed in their posts<br />

and comments can be used to adjust the crisis strategy during and<br />

after the crisis.<br />

Besides the evaluation and learning purposes, feedback can also<br />

be used for the purpose of investigating the public’s impression of<br />

the organization.<br />

Sometimes after the end of the immediate effects, the long-term<br />

impact of a crisis can last months or even years. For instance,<br />

even after physical and financial losses are compensated for,<br />

people still need time to seek emotional relief and rebuild<br />

confidence [5, 7]. Another example is that the organization needs<br />

time to investigate the responsibility for the crisis as well as the<br />

level of damage. In both cases, the organization should continue


collecting information about the crisis. On the microblog, the<br />

public’s feedback and the experts’ opinions should be monitored<br />

so as to help evaluate whether the crisis is truly over. If the crisis<br />

is not completely over yet, the organization should continue to<br />

apply response strategies depending on the crisis situation and the<br />

needs of the public. Table 5 shows the strategies for the post-crisis<br />

stage.<br />

Table 5. Strategies for Post-crisis Stage<br />

4. THE CASE<br />

In this section, the author will introduce the Shanghai City<br />

Metro’s crisis communication on the microblog.<br />

4.1 Introduction, Method, and Questions<br />

The rear-end collision happened at Shanghai City Metro’s Route<br />

No.10 on September 27, 2011. This accident was first reported by<br />

an ordinary microblogger on Sina Microblog [42].The first report<br />

appeared on the microblog website at 14:47 [42]. Before this post<br />

occurred, on the same day from 14:17 to 14:20, the Shanghai City<br />

Metro’s official microblog had posted three messages reporting<br />

that the equipment on Route No.10 had malfunctioned, and the<br />

train was required to slow down. At 14:40, five minutes before the<br />

first report of the collision, the official microblog made a post<br />

informing the public that they were controlling the amount of<br />

passengers connecting to Route No. 10. At 15:03, the official<br />

microblog informed the public that Route No.10 between Yili<br />

Road and Sichuan Bei Road was closed, and no passengers were<br />

allowed to access the train. Two minutes later, the official<br />

microblog made another post that repeated the content of the<br />

previous post, as well as provided information to assist the<br />

passengers in choosing other vehicles for transportation. In the<br />

next 48 hours, the official microblog responded to the crisis. The<br />

response was widely spread by the public and received many<br />

compliments.<br />

In this section, the crisis response made by the official microblog<br />

will be discussed. The questions are:<br />

1) How did the official microblog respond to the crisis?<br />

2) How does the response fit the framework proposed in this<br />

paper?<br />

The data was collected in December 2011. The 52 crisis-related<br />

messages posted and reposted between September 27, 2011 and<br />

253<br />

September 29, 2011 were examined. The author classified the<br />

messages by their main purposes. For instance, the official<br />

microblog apologized in many posts; however, the main purpose<br />

of only two posts was to apologize.<br />

Eight categories are identified. The apology category contains<br />

messages only expressing an apology. The human care messages<br />

show that the organization cares about the victim’s feelings. The<br />

future view category stresses what the organization is going to do.<br />

The responsibility category contains messages related to the<br />

responsibility for the crisis and the investigation into the<br />

responsibilities. Both the “current situation” and the “help<br />

information” help with reducing uncertainties. “Positive tone”<br />

tries to view the crisis from the positive side, such as how people<br />

have helped each other. Figure 1 shows the classification of the<br />

posts. Other relevant posts were searched by using the search<br />

function and keywords such as “passenger education,”“Metro<br />

safe,” etc.<br />

Figure1.Classification of the Posts<br />

These crisis responses will be discussed within the framework that<br />

the author proposed in Section 3. The author will especially focus<br />

on the crisis event stage.<br />

4.2 Pre-crisis Stage<br />

In the pre-crisis stage, the tasks are detecting crisis signs, reducing<br />

potential harm, and preparing for crisis responses.<br />

4.2.1 Detecting crisis signs<br />

First, in order to acquire external information for possibly<br />

detecting signs of a crisis, a government agency should have<br />

many followers and the concerned public on the microblog. The<br />

Shanghai City Metro’s official microblog has millions of<br />

followers, including individuals, relevant organizations, and even<br />

the news media. In the meantime, the official microblog follows<br />

various microbloggers such as individuals, experts, other<br />

organizations, and the news media, which is helpful in acquiring<br />

information from experts and opinion leaders. Besides, there is<br />

evidence indicating that the official microblog is aware of external<br />

information on the microblog. For instance, in August 2011,<br />

among 229 messages relating to Metro affairs posted by the<br />

official microblog, there were 82 messages from external sources.<br />

The messages were from comments, the accounts followed by the<br />

official microblog, and the people who “@” Shanghai Metro in<br />

their messages. In fact, during the crisis the official microblog<br />

posted 8 messages based on information provided by other


accounts, among which seven messages were from external<br />

resources and 3 help messages were generated by individual<br />

microbloggers.<br />

4.2.2 Reducing potential harm<br />

The second task in the pre-crisis stage is to reduce potential harm.<br />

The Shanghai City Metro’s official microblog tries to reach this<br />

goal by offering educational information so that the passengers<br />

could understand safe and dangerous behaviors on the Metro. The<br />

official microblog has two groups of messages under the tag of<br />

“To teach you how to take the Metro” and “safe Metro”. However,<br />

there is little information on what to do when collisions and other<br />

disasters happen.<br />

4.2.3 Preparing for crisis responses<br />

To prepare for possible crisis response is the third task of the precrisis<br />

stage. Three sub-tasks here are preparing to collect<br />

information on crisis situations, understanding the needs and core<br />

values of the public, and building a sound relationship with the<br />

public.<br />

In order to prepare for collecting useful information during a crisis,<br />

an organization should encourage the public to share information<br />

on the microblog. There is no evidence showing that the Shanghai<br />

City Metro’s official microblog is deliberately promoting such an<br />

information-sharing system; however, it does actively reply to and<br />

appreciate those who report suspicious behaviors and items. For<br />

instance, on August 29, 2011, a microblogger found a suspicious<br />

bag on the train and reported it to the official microblog. The<br />

official microblog informed the Metro staff to check the train and<br />

posted the result on the microblog. Another example is that a<br />

passenger complained about the Metro staff at the station asking<br />

him for his personal information. After investigation, the official<br />

microblog told the passenger that those people were not Metro<br />

staff and warned other passengers to stay alert. Such<br />

communication assists in managing the Metro and could be a<br />

strong beginning to building an information-sharing system.<br />

Another two sub-tasks in terms of collecting information to<br />

prepare a crisis response are to understand the needs of<br />

stakeholders and to investigate their values. As the author has<br />

argued in Section 3.2.1, such information can be collected from<br />

comments, “@”, private messages, messages produced by opinion<br />

leaders and experts, and so on. The Shanghai City Metro’s official<br />

microblog firstly has rich information resources, as is argued in<br />

Section 4.1; it also displays awareness of user-generated<br />

information by replying to comments and reposting messages.<br />

The author suggests the official microblog should also pay<br />

attention to the public’s opinion of social events and the way<br />

people communicate on the microblog in order to learn the rules<br />

of the microblog and values of the public/stakeholders.<br />

The final sub-task of preparing crisis responses is to build a good<br />

relationship with stakeholders. Two techniques are suggested by<br />

the author in Section 3.2.1, namely to show willingness to<br />

maintain the relationship and to communication with a human<br />

voice. The Shanghai City Metro’s official microblog engages in<br />

maintaining the relationship by involving the public in Metro<br />

affairs. It also shows enthusiasm to those who need help. For<br />

instance, a person lost the ID card on the train. The Metro<br />

broadcasted this information on the microblog so that this person<br />

could get the card back. Besides, the official microblog tries to<br />

respond to the public’s suggestions on the management issues of<br />

the Metro, which indicates the open attitudes of the Metro. The<br />

254<br />

human voice is about showing personal opinions on<br />

organizational affairs [23, 34, 37]. One example of this is that the<br />

official microblog forwarded the news that the ticket department<br />

of Metro Company visited a rest home for the elderly. Along with<br />

the “thumbs up” picture, the Metro made the comment that “to<br />

love old people is to love ourselves”. Moreover, the official<br />

microblog also displays Metro employees’ working lives along<br />

with pictures and explanations. For instance, the official<br />

microblog once forwarded a message with a picture of the dinner<br />

of a train operator who also used a microblog. The author<br />

understands that it is sensitive to express personal opinions on<br />

certain organizational affairs. Thus, such less sensitive affairs can<br />

be a good place for the official microblog to show the human<br />

voice.<br />

4.3 Crisis Event Stage<br />

In the crisis event stage, the tasks are recognizing a crisis and<br />

responding to the crisis. The rich information resources on the<br />

microblog can help with recognizing the crisis. In this section, the<br />

author only focuses on the strategies that the Shanghai City<br />

Metro’s official microblog has used to cope with the crisis.<br />

4.3.1 Crisis situation<br />

Firstly, crisis communication strategies should cope with the<br />

situation of the crisis; that is, the responsibility for the crisis and<br />

the level of damage. There were two messages made on<br />

September 28 that related to the responsibility for the collision.<br />

One message explained the reason for the accident and admitted<br />

that there were “relevant individuals” violating the “relevant<br />

rules” which led to the collision; the other message indicated that<br />

the “relevant department” and “relevant agency” had tested the<br />

“relevant equipment” of the Metro, and punishment would be<br />

applied to those responsible for the accident. The public’s<br />

attitudes towards these two messages were varied. For instance,<br />

the first message received 395 comments. There were 78<br />

messages doubting the investigation result, among which 35<br />

messages criticized the wording “relevant individuals” and<br />

“relevant rules” for the vagueness. People also complained that<br />

the message was too simplistic and gave no detailed information<br />

or systematic analysis. To the second message, people still had<br />

problems with the word “relevant”.<br />

According to the crisis situation, the official microblog apologized<br />

twice. The first apology was made during the crisis (at 20:18 on<br />

September 27): “This is the worst day in the history of Shanghai<br />

Metro. No matter what the reason is and who should take the<br />

responsibility, we regret the loss and the hurt experienced by the<br />

citizens and the passengers. We will help the injured and return to<br />

normal option as soon as possible. We will also assist in the<br />

investigation and accept the possible responsibility. We will learn<br />

from the accident and do better in the future. Although the<br />

apology is so powerless, we have to profoundly<br />

apologize.”Another apologetic message was posted at 14:52 on<br />

September 28, saying, “We appreciate all the criticisms…We will<br />

work hard…We apologize again”. The former message received<br />

9945 comments; while the latter received 112 comments. Some<br />

comments concerned the reason of the crisis. One comment was:<br />

“What we need is the reason and the responsibility for the<br />

accident instead of apology…” There were also voices of support.<br />

A microblogger commented, “I feel …this message expresses the<br />

good attitude and the willingness to take responsibilities…”<br />

Another comment said, “The communication is good. The Metro


is better than those government agencies that will never accept<br />

their faults.”<br />

The level of damage was also addressed. Four messages published<br />

information about the number of injured and their situations in the<br />

hospital. In a message posted at 17:43 on September 27, the<br />

official microblog claimed that according to the information from<br />

the hospital, 212 people were injured. It was also claimed that<br />

most of the victims were slightly injured. The wording “slightly<br />

injured” could be seen as fact information as well as a diminishing<br />

strategy. However, the audience showed suspicion of the data. For<br />

instance, one comment was: “How do you define the phrase<br />

‘slightly injured’?” Moreover, there were more than one comment<br />

indicating doubt about the number of injured persons. For instance,<br />

one microblogger claimed that the number of injured reported by<br />

Japanese TV (at 22:00 on September 27) was 271. However, the<br />

official microblog failed to respond to these different voices.<br />

Bolstering is also suggested by crisis communication theories [2,<br />

5]. This aims at increasing positive feelings towards the<br />

organization in order to reduce the offensiveness of the crisis [2].<br />

The official microblog tried to show concern for the passengers<br />

and the efforts they were making to mitigate the negative impact<br />

of the collision. For instance, the official microblog reposted a<br />

message (9:01 on September 28) with a picture of volunteers<br />

helping passengers. The official microblog commented: “We<br />

appreciate the citizen’s support. Watching the passengers living<br />

the station, we feel very sorry. Now we will do our best to check<br />

the route and return to normal option as soon as possible. Please<br />

trust us.” This message showed concern for passengers who were<br />

affected by the collision. It also showed people were helping each<br />

other. This message received 210 comments. There were 17<br />

comments indicating that what the public needs is the<br />

investigation into the responsibility for the collision and the<br />

reason of the accident, 10 comments concerning the future safety<br />

of the Metro, 13 messages blaming the Metro for trying to turn the<br />

bad event into a good one, and 8 comments blaming the Metro for<br />

talking rather than doing. However, there were still 26 comments<br />

supporting this post. One comment was: “The government does<br />

not usually speak in such a tone. The Metro’s public<br />

communication is praiseworthy. In my opinion, this crisis<br />

communication is acceptable and even touching. ” Interestingly<br />

enough, some of the microbloggers expressed their love of the<br />

city and the volunteers other than the Metro. One comment was<br />

“This is the spirit of Shanghai City (to help each other).” It seems<br />

that the official microblog successfully related the accident to the<br />

whole city.<br />

4.3.2 Meet the public’s needs<br />

The general public’s needs in the crisis event stage are the need<br />

for the organization to make decisions and reduce the negative<br />

emotions caused by uncertainties.<br />

The official microblog posted 18 messages with alternative bus<br />

transfer information. Pictures and tables were appropriately used<br />

here in order to bypass the limitations of the length of the text<br />

message. Moreover, the official microblog attempted to report the<br />

current situation of the crisis, including how many people were<br />

injured and the status of the train involved in the collision. Such<br />

information contributed to reducing uncertainty about the crisis.<br />

The reactions of the public were varied. Some were appreciative,<br />

saying, “The reaction of the Metro is quick and efficient.”<br />

However, there were still microbloggers showing their concerns<br />

255<br />

for the issues of who or what was responsible for the crisis. Other<br />

citizens were worried about safety issues.<br />

4.3.3 The social values<br />

The messages posted during the crisis should meet the<br />

requirements of social values. Some core values identified by<br />

scholars are honesty, responsibility, openness, and humanism.<br />

Many of the messages posted by the official microblog were with<br />

pictures from the scene of the accident, which increased the<br />

reliability of the Metro Company. What is more, the official<br />

microblog also cited posts from other microbloggers. However,<br />

the Metro failed to respond to the fact information that was<br />

different from the information posted by the official microblog,<br />

which hurt the trustworthiness of both the messages and the Metro.<br />

Moreover, there was no clear statement regarding the<br />

responsibility for the collision. We can see from the comments<br />

that people were angry about the vague descriptions of the<br />

responsible parties. However, the official microblog did express<br />

the willingness to release information. Messages tagged “the latest<br />

information” were used to release information about the crisis<br />

situation.<br />

For humanism, in their apology the Metro Company showed their<br />

regrets. They used the words “we regret the loss and the hurt<br />

experienced by the citizens and the passengers”. Besides, in one<br />

message it was shown that volunteers, police, and bus drivers<br />

were there to help passengers enthusiastically. In a message<br />

saying, “Watching the passengers leaving the State, we feel so<br />

sorry…”, the Metro showed concern to those who were involved<br />

in the accident. However, the official microblog did not<br />

particularly show sympathy for the injured.<br />

4.3.4 The future view<br />

The future view should stress the positive side, the future,<br />

rebuilding, and correcting mistakes. The official microblog did<br />

meet this requirement. In more than one message, the Metro use<br />

the words “We will”. For instance, in the apology messages, “We<br />

will learn from the accident…” and “We will work hard…” were<br />

used. In some messages, the official microblog cited pictures of<br />

people helping each other to remind the public of the positive side<br />

of the accident. Although the messages received support, such as<br />

“cheer up!” and “touching,” there were people who wished the<br />

Metro would act instead of only speaking.<br />

4.4 Post-crisis Stage<br />

In the post-crisis stage the tasks are preparing for the next crisis,<br />

namely learning from the crisis as well as evaluating the crisis<br />

response strategy; checking the public’s impression; and checking<br />

that the crisis is truly over.<br />

First, the organization showed its intention to learn from the crisis,<br />

at least in its apology. Moreover, the comments made by the<br />

public during the time of the crisis can be a good resource for the<br />

organization to evaluate its crisis communication strategies.<br />

Secondly, there was evidence indicating that the official<br />

microblog did try to follow the public’s comments and monitor<br />

the public’s impression. The official microblog replied to one<br />

citizen’s comment, “We appreciate all of the comments; even<br />

some of the comments are criticisms”.<br />

Finally, strategies such as apology, bolstering, and compensation<br />

can all be used in the post-crisis stage due to the lack of full


information in the crisis event stage. In the apology message,<br />

which appeared in the crisis event stage, there was no clear<br />

statement of responsibility. This vagueness could be due to the<br />

lack of information in the crisis event stage. However, at the postcrisis<br />

stage, there was no further statement about the responsibility<br />

for the accident. Instead, the official microblog posted one<br />

message which expressed the future view. The message (18:48 on<br />

September 29) received 52 comments. Other than support, the<br />

major issues as seen by the public were still the reason and the<br />

responsibility for the accident and the real actions taken by the<br />

Metro.<br />

5. CONCLUSIONS AND SUGGESTIONS<br />

In this paper, the author develops a general framework for a<br />

government agency to develop crisis communication on the<br />

microblog. Coomb’s three-stage model is used, and four issues<br />

concerned by primary crisis communication theories are discussed.<br />

The four issues are the crisis situation, stakeholders, the values,<br />

and the future view. In each stage of a crisis, the crisis manager<br />

should take into account both the tasks of each stage and the four<br />

issues when designing crisis communication strategies.<br />

The author also uses the Shanghai City Metro rear-collision as an<br />

example to show how a government can use the framework to<br />

communicate with the public on the microblog. The case enriches<br />

the framework in the following aspects.<br />

First, the primary concern of the public is the reason and the<br />

responsibility for the crisis. The statement of responsibility should<br />

not be vague and lacking in detail; otherwise, the public will be<br />

unsatisfied and may even develop a negative impression of the<br />

organization.<br />

Secondly, the strategies aimed at lessening the perceived level of<br />

damage should be based on facts. The organization should be able<br />

to convince the public; otherwise, such strategy will only lead to<br />

untrustworthiness. The microblog is interactive, which is an<br />

advantage when dealing with third-party information. When<br />

confronted by third-party information which is different from<br />

official information, the organization should actively respond in<br />

order to avoid the impression of being dishonest.<br />

People would like to see the organization admit responsibility and<br />

seek forgiveness. However, the apology as well as other strategies,<br />

such as positive tone and human care, should be accompanied by<br />

effective action taken by the organization.<br />

6. LIMITATIONS AND FURTUER<br />

RESEARCH<br />

First, evidence indicating that at least two crisis-related messages<br />

posted by the official microblog was deleted. Thus, there is no<br />

way of knowing whether the messages were consistent with the<br />

crisis communication strategy.<br />

Secondly, the four theories employed in this paper are mostly<br />

developed in business settings. Although scholars have applied<br />

them to government agencies, a thorough comparison and contrast<br />

of business and government settings will improve the<br />

effectiveness of these theories.<br />

Finally, in the paper, it was asserted that an organization should<br />

learn from the public by listening to their opinions on the<br />

microblog. A further study could be done on how a government<br />

256<br />

agency should collect and analyze the information on the<br />

microblog to understand and learn from the public.<br />

REFERENCES<br />

[1] Avery, E. J., Lariscy, R.W., Kim, S., and Hocke, T. A<br />

quantitative review of crisis communication research in<br />

public relations from 1991 to 2009. Public Relations<br />

Review,36, 2 (2010), 190-192.<br />

[2] Benoit, W. L. Image repair discourse and crisis<br />

communication. Public Relations Review, 23, 2 (1997), 177-<br />

186.<br />

[3] Claeys, A., and Cauberghe, V. Crisis response and crisis<br />

timing strategies, two sides of the same coin. Public<br />

Relations Review. 38, 1 (2012). 83-88.<br />

[4] Coombs, W. T., and Holladay, S.J. Further explorations of<br />

post-crisis communication: Effects of media and response<br />

strategies on perceptions and intentions. Public Relations<br />

Review, 35 (2009), 1-6.<br />

[5] Coombs, W. T. Protecting organization reputations during a<br />

crisis: The development and application of Situational Crisis<br />

Communication Theory. Corporate Reputation Review, 10,<br />

3(2007), 163-176.<br />

[6] Coombs, W.T. Ongoing Crisis Communication. Sage,<br />

Thousand Oaks, CA, 2006, 2-3.<br />

[7] Ibid. 17-20.<br />

[8] Ibid. 21-31<br />

[9] Ibid. 41.<br />

[10] Coombs, W. T., and Holladay, S. J. Helping crisis managers<br />

protect reputational assets: Initial tests of the Situational<br />

Crisis Communication Theory. Management Communication<br />

Quarterly, 16 (2002), 165-186.<br />

[11] Curtin, P. A., and Boynton, L. A. Ethics in public relations:<br />

Theory and practice. In R. L. Health (Eds.), Handbook of<br />

Public Relations, Sage, Thousand Oaks, CA, 2001, 411-421.<br />

[12] Fearn-Banks, K. Crisis Communications: A Casebook<br />

Approach. Lawrence Erlbaum Associates, Mahwah, NJ,<br />

2002, 2.<br />

[13] Fediuk, T. A., Pace, K. M., and Botero, I. C. Exploring crisis<br />

from a receiver perspective: Understanding stakeholder<br />

reactions during crisis events. In T. Coombs, and S. J.<br />

Holladay (Eds.), The Handbook of Crisis Communication.<br />

Wiley-Blackwell, New York, 2010, 635-656.<br />

[14] Gonzalez-Herrero, A., and Pratt, C. B. How to manage a<br />

crisis before – or whenever – it hits. Public Relation<br />

Quarterly, 40, 1 (1995), 25-29.<br />

[15] Health, R. L., and Millar, D. P. A rhetorical approach to<br />

crisis communication: Management, communication<br />

processes, and strategic responses. In Dan P. Millar, and<br />

Robeert L. Health (Eds.). Responding to Crisis. Lawrence<br />

Erlbaum Associates. Mahwah, NJ, 2004, 1-17.<br />

[16] Hearit, K. M. Crisis Management by Apology. Lawrence<br />

Erlbaum Associates, Mahwah, NJ, 2006, 15-17.<br />

[17] Ibid, 68.


[18] Ibid, 64-66.<br />

[19] Hemp, P. Death by information overload. Harvard Business<br />

Review, (September 4 th 2009), Retrieved from<br />

http://hbr.harvardbusiness.org/2009/09/death-byinformation-overload/ar/pr<br />

[20] Jaeger, P. T., Shneiderman, B., Fleischmann, K. R., Preece,<br />

J., Qu, Y., and Wu, P. F. Community response grids: Egovernment,<br />

social networks, and effective emergency<br />

management. Telecommunication Policies, 31 (2007), 592-<br />

604.<br />

[21] Jeong, S. Public’s Responses to an oil spill accident: A test<br />

of the attribution theory and situational crisis communication<br />

theory. Public Relations Review, 35 (2009) 307-309.<br />

[22] Kaiser, C., Schlick, S., and Bodendorf, F. Warning system<br />

for online market research – Identifying critical situations in<br />

online opinion formation. Knowledge-Based Systems. 24<br />

(2011), 824-836.<br />

[23] Kelleher, T. Conversational voice, communicated<br />

commitment, and public relations outcomes in interactive<br />

online communication. Journal of Communication. 59 (2009),<br />

172-188.<br />

[24] Kelleher, T., and Miller, B. M. Organizational blogs and the<br />

human voice: Relational strategies and relational outcomes.<br />

Journal of Computer-Mediated Communication, 11, 2 (2006),<br />

395-414.<br />

[25] Lovejoy, K, Waters, R. D., Saxton, G. D. Engaging<br />

stakeholders through Twitter: How nonprofit organizations<br />

are getting more out of 140 characters or less. Public<br />

Relations Review, 38 (2012), 313-318.<br />

[26] Maxwell, T. T. The public need to know: Emergencies,<br />

government organizations, and public information policies.<br />

Government Information Quarterly, 20 (2003), 233-258.<br />

[27] Mitroff, I. I., Crisis management and environmentalism: A<br />

natural fit. California Management Review, 36,8 (1994),<br />

101-113.<br />

[28] Moyihan, D. P. Learning under uncertainty: Networks in<br />

crisis management. Public Administration Review, 68,2<br />

(2008), 350-361.<br />

[29] Muraliadharan, S. Dillistone, K., and Shin, J. The Gulf Coast<br />

oil spill: Extending the theory of image restoration discourse<br />

to the realm of social media and beyond petroleum. Public<br />

Relations Review, 37, 2011, 226-232.<br />

[30] Richardson, B. Socio-technical disasters: Profile and<br />

prevalence. Disaster Prevention and Management, 3, 4<br />

(1994),41-69.<br />

[31] Schultz, F., Utz, S., and Goritz, A. Is the medium the<br />

message? Perceptions of and reactions to crisis<br />

257<br />

communication via twitter, blogs and traditional media.<br />

Public Relations Review, 37 (2011), 20-27.<br />

[32] Seeger, M. W., Sellnow, T. L., and Ulmer, R. R.<br />

Communication and Organizational Crisis. Praeger,<br />

Westport, CT, 2003.<br />

[33] Seeger, M. W., and Ulmer, R. R. A post-crisis discourse of<br />

renewal: The cases of Malden Mills and Cole Hardwoods.<br />

Journal of Applied Communication Research, 30, 2 (2002),<br />

126-142.<br />

[34] Smith, B. G. Socially distributing public relations: Twitter,<br />

Haiti, and interactivity in social media. Public Relations<br />

Review.36 (2010), 329-335.<br />

[35] Stelzner, M. A. Social Media Marketing Industry Report,<br />

2010, Retrieved from<br />

http://marketingwhitepapers.s3.amazonaws.com/SocialMedia<br />

MarketingReport2010.pdf<br />

[36] Sturges, D. L. Communicating through crisis: A strategy for<br />

organizational survival. Management Communication<br />

Quarterly, 7 (1994), 297-316.<br />

[37] Sweetser, K. D., and Metzgar, E. Communicating during<br />

crisis: Use of blogs as a relationship management tool.<br />

Public Relations Review, 33 (2007), 340-342.<br />

[38] Ulmer, R. R., Sellnow, T. L., and Seeger, M. W. Effective<br />

Crisis Communication. Sage, Thousand Oaks, CA, 2011, 16-<br />

20.http://www.google.com/books?hl=zh-<br />

CN&lr=&id=bC3J1C0BXQwC&oi=fnd&pg=PR1&dq=effec<br />

tive+crisis+communication&ots=kxQvzSFyyt&sig=uAhAU<br />

NczYbXa7ZuZdMpb1UlTgw#v=onepage&q=effective%20crisi<br />

s%20communication&f=false<br />

[39] Ulmer, R. R., Seeger, M. W., and Sellnow, T. L. Post-crisis<br />

communication and renewal: Expanding the parameters of<br />

post-crisis discourse. Public Relations Review, 33 (2007),<br />

130-134.<br />

[40] Ulmer, R. R., Sellnow, T. L., and Seeger, M. W. Effective<br />

Crisis Communication. Sage, Thousand Oaks, CA, 2007,<br />

170-174.<br />

[41] Weiner, B. An attributional theory of achievement<br />

motivation and emotion. Psychology Review, 92 (1985), 548-<br />

573.<br />

[42] XINHUANET. Ten Hours of Shanghai Metro Rear-end<br />

Collision on Microblog, 2011, Retrieved<br />

fromhttp://news.sina.com.cn/c/2011-09-<br />

28/002423227102.shtml<br />

[43] Yang, S., Kang, M., and Johnson, P. Effects of narratives,<br />

openness to dialogic communication, and credibility on<br />

engagement in crisis communication through organizational<br />

blogs. Communication Research. 37, 4 (2010), 473-4


Government Official Microblogs: An Effective Platform for<br />

Facilitating Inclusive Governance<br />

Xinping Liu and Lei Zheng<br />

Department of Public Administration, Fudan University<br />

619 Wenke Building, 220 Handan Road, 2000433 Shanghai, China<br />

ABSTRACT<br />

Applications of social media could bring more convenience to the<br />

government for getting public feedback, or more citizen<br />

participation, in order to provide more inclusive public services.<br />

Microblogs is one of those social media tools. Nowadays, all<br />

governments have begun to use government official microblogs to<br />

publish information, collect public opinions, and interact with the<br />

public. Based on current literature review and analysis, this paper<br />

first develops a theoretical framework on the effect that<br />

microblogs brings to public inclusive governance from the<br />

perspective of microblogs’ interaction object. Theoretically, this<br />

research indicates that microblogs have a positive impact on<br />

inclusive governance, but this effect remains to be tested by future<br />

practice. There are still some problems in current public<br />

interaction between governments and citizens through microblogs,<br />

and the government needs to change their musty ideas and guide<br />

the effective interaction actively. Finally, this paper further<br />

discusses limitations of this research and directions of future<br />

research.<br />

Categories and Subject Descriptors<br />

K.6.1 [Management of Computing Information Systems]: Project<br />

and People Management-Management Techniques<br />

General Terms<br />

Management, Measurement, Performance<br />

Keywords<br />

Government Microblogs, Governance, Social Media, China<br />

1. INTRODUCTION<br />

The development of ICTs has brought public governance new<br />

opportunities, as well as challenges. In the era of Web 2.0, a huge<br />

number of web-based applications have emerged. These<br />

applications rely on the concept of the user as a producer of<br />

information, which provide more possibilities for better<br />

governance [13], for example, government official microblogs.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

+86 13774260846, +86 13501838298<br />

{081017039, zhengl}@fudan.edu.cn<br />

258<br />

Nowadays, countries around the world take seriously to apply<br />

social media like microblogs, and high-level officials from US,<br />

Britain, and Japan has been microblog users. Applications of<br />

social media could bring some improvements aiming at providing<br />

feedback to agencies, and more citizen participation. Also, agency<br />

staff could use social media for improving formal cooperation<br />

[13].<br />

By the end of 2010, Chinese microblog accounts have exceeded<br />

75 million. With its network effect taking shape, microblogs is<br />

playing a more and more important role in Chinese social and<br />

political life. The year of 2010 was named as “China’s first year<br />

in microblog's era” by Chinese citizens. By taking advantage of<br />

the rapidly growing microblog community, government could run<br />

official microblogs to interact with citizens, enhance government<br />

information services, keep tracking with public opinion, help with<br />

emergency response, improve government credibility and further<br />

promote the development of e-governance. Nowadays, many<br />

Chinese governments and officials have opened official<br />

microblogs to interact with citizens. Microblog, to some extent, is<br />

becoming a more and more useful tool for the government.<br />

However, compared to the traditional channels between<br />

government and citizens, what are the new changes of<br />

microblogs? What meaning does it bring to government<br />

governance? These are the main research questions of this paper.<br />

2. LITERATURE REVIEW<br />

As a new kind of social media and web2.0 tool, microblogs<br />

attracted much academic attention in recent years. The current<br />

studies are mainly focusing on the definition of microblog, its<br />

characteristics and its implications on government governance,<br />

especially on public participation.<br />

2.1 Definition of Microblog<br />

Microblog as one kind of social media has increasingly become an<br />

effective way of information dissemination and personal<br />

communications. Social media is “a group of Internet-based<br />

applications that build on the ideological and technological<br />

foundations of Web 2.0, and that allow the creation and exchange<br />

of User Generated Content” [4]. With the help of social media,<br />

ordinary people have become producers of content as well as<br />

consumers so called “prosumers”, being capable of publishing<br />

their own contents on the Web. Microblog is one kind of social<br />

media using web 2.0 technologies, which make people<br />

communicate with each other without ant time and space<br />

constraints once the Internet is available. The users send message<br />

on these websites to interact with other people, and the maximum<br />

length of one message should be less than 140 words.


When it comes to the characteristics of microblog, it is commonly<br />

believed by the scholars that microblogs is a new kind of social<br />

media and Web 2.0 tool, with the main features include<br />

timeliness, simplicity, economy, grassroots, interactive, pluralism,<br />

autonomy, the original ecology, fragmentation, group<br />

polarization, and at the same time it could weaken the role of<br />

opinion leaders. Zhao and Lai [15] also argued that microblogs<br />

have 4A characteristics, including Anyone, Anywhere, Anytime,<br />

Anything, that is, anyone can become the microblog<br />

communicators and can transmit any information at any time and<br />

any place.<br />

2.2 Microblogging on Government Inclusive<br />

Governance<br />

With the development of international electronic public services,<br />

new information technologies has contributed a lot on the<br />

promotion of inclusive governance and improved the level of<br />

public participation. Governments has been increasingly paid<br />

more attention on providing diversified, personalized, ubiquitous,<br />

and high-quality public services, which has clearly showing the<br />

characteristics of e-inclusion" [5][6]. Also, in public participation<br />

area, successful public participation depends on diversification,<br />

inclusiveness and equality; and diversification means its<br />

participants are able to represent the view of people from different<br />

social fields, social hierarchy; inclusiveness refers to lowering the<br />

threshold of e-participation; equality involves equal participation<br />

[1]. Microblogs provide a useful platform to improve public<br />

participation.<br />

2.3 The Mechanism of Microblog’s Effects on<br />

Public Inclusive Governance<br />

As mentioned earlier, public participation requires people from<br />

different social fields, social hierarchy to participate equally [1],<br />

and microblogging reduce the threshold of public participation, so<br />

people could participate in anytime and anywhere. Therefore,<br />

microblogs expand the scope of public participation, and could<br />

provide more feedback to citizens.<br />

2.3.1 Different Types of Microblog’s Users: A Multi-<br />

Perspective<br />

Microblogs has significant differences from the traditional<br />

government portal, blogs and other forums. Their users on these<br />

websites overlap a lot, but still not the same. The characteristics of<br />

different website applications involve different active citizens.<br />

1) Personality. Previous research has proved that in the<br />

increasingly user-generated Web, users’ personality traits<br />

may be crucial factors leading them to engage in this<br />

participatory media [3]. The former researches established<br />

three personality traits that are central to social media use:<br />

extraversion, neuroticism, and openness to experience<br />

[3][10].<br />

2) Age: Correa et al. [3] also found that it was particularly<br />

important among the young adult and extraversion was the<br />

most important predictor of social media use. Prensky<br />

concludes that many digital immigrants confront each change<br />

in technology as something new to be mastered. Generally,<br />

young adult, the elderly who are open to new things and<br />

digital technologies tend to be more active in microblogs and<br />

other social media tools [8].<br />

259<br />

3) Gender: Gender presented another difference among<br />

personality traits. While extraverted men and women were<br />

both likely to be more frequent users of social media tools,<br />

only the men with greater degrees of emotional instability<br />

were more regular users. No significant relationship existed<br />

between women and emotional stability [3].<br />

4) Social ranking: the low threshold of microblogs and the<br />

characteristics of the grass-roots has weakened the role of<br />

opinion leaders which enables people from different social<br />

class to participate in public governance, and promotes the<br />

exchange of social heterogeneity groups [12], namely, people<br />

from different social classes, departments, and other ethics.<br />

5) Education Level: since microblog is easy to use, users could<br />

come from different education levels. Technology is not a<br />

barrier any longer, which could give the government more<br />

kinds of public opinions.<br />

6) Special Target Group: taking the disabled as an example,<br />

Zhao & Qiu [14] examined the significance of social media<br />

to disabled students, and argued that social media tools are<br />

vital to the lives of teenagers today because microblogs<br />

removes physical distances and can significantly expand the<br />

living space of youth who otherwise are confined by their<br />

disabilities. The Center for Technology in Government<br />

(CTG) identified that social media like microblogs could<br />

provide more service channels for the disabled [2].<br />

7) Space-time dimensions: Microblogs has 4A characteristics,<br />

that is, Anyone, Anywhere, Anytime, Anything [15], which<br />

expand the scope and depth of interaction and participation<br />

both vertically and horizontally.<br />

In summary, microblogs has not only expanded the scope of<br />

public participation, so that different personality traits, age, sex,<br />

social class, education level could have equal interactions with the<br />

governments, but also expanded the channels for participation.<br />

Moreover, it vertically breaks the time limit of interaction and<br />

weakens the barriers of geographic isolation to promote<br />

participation any time at anywhere.<br />

2.3.2 Governance in Microblog Era: Inclusive and<br />

Targeted<br />

Based on the literature review above, with the help of microblog<br />

platform, government expands their service scope effectively, and<br />

brings more G2C participation and interaction, which give great<br />

impetus to inclusive governance. Due to the particularity of online<br />

participation, more introverted people could participate more,<br />

which could also strengthen the interactive effects of other active<br />

users. Those digital immigrants like the elderly who are open to<br />

new things and digital technologies, and the digital natives, that is,<br />

young people, and can participate public affairs online, while they<br />

have limited channel to participate before. So microblogs can<br />

make up the general public participation. From the social level,<br />

citizens from varied levels can participate equally, and this could<br />

impel the government to promote public decision-making more<br />

democratization and deliver more equal public services<br />

effectively. Microblogs also enables those vulnerable groups to<br />

participate in the process of governance. From the space-time<br />

dimension, it brings more possibilities for the government to<br />

provide cross-regional (or even cross-border) services<br />

ubiquitously, and extends depth of inclusive governance.


It is worth mentioning that, while expanding the breadth of<br />

interactive citizens, microblogs could also strengthen the<br />

interaction more targeted. Interactive citizens could have a<br />

significant difference depend on different government<br />

departments or various events. For example, from gender<br />

perspective, women may mostly participate in microblogs for<br />

expressing their views, or expanding their social networks and<br />

social activities, while men may be for strengthening their<br />

relationship with others, learning about current political events.<br />

Therefore, education, tourism, food and other related government<br />

departments may be more favored by women, while<br />

transportation, defense, and public security will be paid more<br />

attention by men.<br />

3. METHODOLOGY AND RESEARCH<br />

PLAN<br />

This research will take an analysis on secondary data, including<br />

research reports, thesis and research papers. In order to ensure the<br />

impartiality of the findings, the reports selected in this article are<br />

not only from universities or other research institutes, but also<br />

those from enterprises and social organizations.<br />

There are many microblog platforms, like Sina, Sohu, Tencent,<br />

and so on. It could be a great challenge to discuss all the<br />

government official microblogs. Therefore, this paper simplifies<br />

the data collection and chooses Sina as an example. According to<br />

the DCCI survey in 2010, Sina is the most preferred microblog<br />

platform, which has the highest number of users or potential users,<br />

with the selection rate 69.7%. So I believe the status quo on Sina<br />

could reflect the reality of microblogs in China.<br />

4. ANALYSES ON STATUS QUO OF<br />

GOVERNMENT OFFICIAL<br />

MICROBLOGS<br />

In theory, microblog brings opportunities to the governments for<br />

inclusive and targeted governance by expanding the range of<br />

public participation. However, due to the development of China's<br />

microblog is not mature enough, so evaluation and discussion on<br />

the current status quo can provide recommendations for the<br />

development of the governmental official microblogs.<br />

4.1 The Existing Government Official<br />

Microblogs and its Populations of<br />

Concern<br />

1) Governmental institutions start opening microblogs: according<br />

to “2011 China Administrative microblog research report”<br />

(conducting by “Public Opinion and Communication Research<br />

Laboratory”, Fudan University), till March 20, 2011, 1708<br />

governmental agencies have opened real-name authentication<br />

microblogs, and the distribution of the government's official<br />

microblogs are not balanced either geographically or<br />

institutionally, including governmental level, institutional, and<br />

sectoral distribution [9]. The report further found that most<br />

Shanghai government officials registered there microblogs on the<br />

Xinmin Net (http://t.xinmin.cn), with the proportion up to total<br />

more than 84 percent, followed by Eastday (http://t.eastday.com/),<br />

which accounts for 15 percent account, while only 1 percent of<br />

them has registered on Sina or other microblog platforms. This<br />

situation is worthy of consideration, microblog is the interactive<br />

platform of government and the public, while most citizens are<br />

260<br />

mainly active on the website of Sina or other open microblog<br />

platform, how to promote the interaction between governments<br />

and the public if governments open their microblogs on other<br />

website like Xinmin or Eastday.<br />

2) The analysis of “Concern” subject of government official<br />

microblogs: for governments, microblogs is not only a platform<br />

for issuing information, but also to collect public opinions.<br />

According to a cursory analysis of governmental official<br />

microblogs “concerns”, different governments have various kinds<br />

of “concerns”. Most government microblogs has few “concerns”,<br />

and even many government official microblogs concerned no<br />

more than ten other microblogs. Those “concerns” are mainly<br />

from the mass media, government agencies or departments of the<br />

same level, other government agencies, government branches at<br />

lower levels which have business contact, government officials,<br />

corporate high level executives, academics and other citizens.<br />

Government official microblogs pay more attention to the mass<br />

media, government agencies (all levels), and government officials,<br />

while less on citizens’. Microblogs provide a more convenient and<br />

efficient platform for the government to collect public opinions,<br />

but its active attention to the practical needs of ordinary citizens is<br />

still relatively lack.<br />

4.2 The Main Characteristics of Sina<br />

Microblog Users<br />

Currently, many scholars have conducted lots of analyses on the<br />

characteristics of the user of the microblogs multi-dimensionally.<br />

On the segmentation of individual users, taking "behavioral<br />

loyalty" and "emotional loyalty" as two standards, Zheng [16]<br />

divided all the Sina individual users into three types, mild,<br />

moderate, and extreme, and she further analyzed the user<br />

difference in terms of gender, age, education, and income. Report<br />

from Beijing Online Media Association analyzed the<br />

characteristics of the early users of the microblogs, and find out<br />

that the microblog users can be divided into four categories,<br />

namely, self-expression type (46%), socially active (16%), discuss<br />

and participatory (16%) and diving-prefer type (21%).<br />

Specifically, microblogs has opened up the possibility of<br />

expanding interactive citizens or organizations, which could<br />

enhance inclusive governance. According to Sina’s White Paper<br />

on Chinese First-year microblog, among all the active users of<br />

Sina microblog, women occupy 65 percent, while men accounting<br />

for 35% [11].<br />

On the dimension of age, users from different ages use microblog<br />

on different purpose. Mainly of them are 20-30 years old, with<br />

main purposes to maintain contact with their friends, or to record<br />

their feelings, and to learn the social hot issues, while people from<br />

30 to 40 years old is more focus on learn the social issues and<br />

expanding the circle of friends; however, users over the age of 40<br />

pay more attention to understand the social hot issues, expressing<br />

their opinions, and expand their network; on the contrary, users<br />

under the age of 20 is more emphasis on recreation and leisure,<br />

recording their feelings, and making new friends [7]. Studies have<br />

shown that the younger age groups from 18-30 years old has a<br />

greater level of participation on microblogs, accounting up to<br />

67%, which means microblog users tend to be younger [16].<br />

From the view of income, occupation and education, data from<br />

Beijing Online Media Association shows that more than 63%<br />

microblog users has got a bachelor degree at least. Moreover,<br />

there is no significant income difference between microblog users


and non-microblog users. The number of microblog users with<br />

income of more than 5000 RMB per month is a little bit higher<br />

than those of non-microblog users, by 3 percent. Zheng [16]<br />

argued that current Sina microblog extreme users have lower<br />

education level and relatively low income.<br />

5. CONCLUSION AND IMPLICATIONS<br />

The most important reason for government to use social media is<br />

to move closer to the users, in other words, “go where the mass<br />

go” [8]. Given the breadth of microblog users, government could<br />

achieve a more effective interaction and communication with the<br />

public by opening official microblogs. Theoretically, this research<br />

indicates that microblogs have a positive impact on inclusive<br />

governance, but this effect remains to be tested by future practice.<br />

It could expand the channels for vulnerable groups to participate<br />

more in public affairs, and it breaks the time and space isolation,<br />

and enables ubiquitous participation. With the help of microblog<br />

platform, government expands their service scope effectively, and<br />

brings more G2C participation and interaction, which give great<br />

impetus to inclusive governance. Upon the participation of<br />

different groups, government could conduct more targeted<br />

governance.<br />

Overall, microblog makes interaction between governments and<br />

citizens more easily accessed in terms of geography, time, gender,<br />

age, occupation, income, and education. The assessment results<br />

are consistent with the theoretical framework, but still need<br />

further discussion and verification. Government concerns on<br />

microblogs are still in a narrow range, and they needs to pay more<br />

attention on ordinary people. Although governments conduct<br />

more interaction on government official microblogs, the degree of<br />

participation still needs to be improved. Theoretically speaking,<br />

one can access to the Internet with a mobile phone, but microblog<br />

is still a new thing. The current use of it is still very limited, and it<br />

will take more time to develop microblogs and to promote its<br />

implications in public governance.<br />

According to DCCI's estimates, the annual growth rate of the<br />

various microblog accounts will be 140%-200% in the following<br />

three years, and the outbreak year of growth will appear in the<br />

years 2012, 2013 [11]. Government should pay close attention on<br />

the implications of microblogs continuously. Meanwhile,<br />

microblog is a grassroots media with no information<br />

“gatekeeper”, so government also needs to correct and clarify<br />

information timely.<br />

The limitations of this study are very obvious. Since the practical<br />

development of microblogs in China is still in its infancy stage,<br />

the discussions in this study are only a theoretical analysis. There<br />

are many other problems which need to be further solved, such as<br />

who are relatively active on what on microblogs, the public are<br />

concerning about what kind of topics, viewpoints on what kind of<br />

topics can be collected through the microblogs, what are the<br />

differences between microblog users and users of traditional<br />

media. The discussion on the status quo is mainly based on the<br />

assessment of current report, and lack of further empirical data<br />

validation. All these problems provide direction on further<br />

expanding and sublimation of this study.<br />

261<br />

6. REFERENCES<br />

[1] Brasier, K.J. Planning for citizen engagement. USGSA,<br />

Engaging Citizens in Government. Fall 2009, Retrieved<br />

October11, 2009<br />

[2] Center for Technology in Government. Exploratory Social<br />

Media Project: Phase I: Identifying benefits and concerns<br />

surrounding use of social media in government, 2010.<br />

[3] Correa, T., Hinsley, A. W., and Zúñiga, H. G. Who interacts<br />

on the Web? The intersection of users’ personality and social<br />

media use. Computers in Human Behavior, 26 (2010): 247-<br />

253.<br />

[4] Kaplan, A., and Haenlein, M. Users of the world, unite! The<br />

challenges and opportunities of social media. Business<br />

Horizons, 2010, 53(1), 59–68.<br />

[5] Liu, X. The trends of EU e-government development.<br />

Chinese e-government E-government Blue Book (2010) ,<br />

Wang Changsheng Xu Xiaoping (ed.) , Social Sciences<br />

Documentation Publishing House, 2010.<br />

[6] Liu,X., and Zheng, L. New trend of international egovernment:<br />

the inclusive public services. E-government<br />

Journal, 2010(12).<br />

[7] Ma, X. The value and development of China 's microblogs.<br />

Master's thesis from Nanchang University. December 2010.<br />

[8] Prensky, M. (2001). Digital natives, digital immigrants. On<br />

the Horizon, 9(5), 1–6.<br />

[9] Ren, Y. The status quo Research on Chinese government's<br />

official microblogs. Undergraduate dissertation from Fudan<br />

University. June 2011.<br />

[10] Ross, C., Orr, E.S., Sisic, M., and Arseneault, J.M. M.G.<br />

Simmering, & R.R. Orr. Personality and motivations<br />

associated with Facebook use. Computers in Human<br />

Behavior, 2009, 25(2), 578–586.<br />

[11] Sina. Sina’s White Paper on Chinese First-year microblog,<br />

September 2010.<br />

[12] Tang, L., and Liu, H. Understanding Group Structures and<br />

Properties in Social Media. Yu, et al.(eds.), Link Mining:<br />

Models, Algorithms, and Applications. 2010.<br />

[13] Traunmüller, R. Web 2.0 Creates a New Government. K.N.<br />

Andersen et al. (Eds.): EGOVIS 2010, pp. 77–83, 2010.<br />

[14] Zhao, Y., and Qiu, W. The Potential of Social Media for<br />

Students with Disabilities. Gray, T., and Silver-Pacuilla, H.<br />

(eds.), Breakthrough Teaching and Learning: 2011: 71-86.<br />

[15] Zhao, Z., and Lai, X. Analysis of the implications of<br />

microblogs on the dissemination of news and information:<br />

based on Twitter.com, Socialist Theory Guide, 2010 (4): 93 -<br />

95.<br />

[16] Zheng, Y. The development of Sina microblog. Master's<br />

thesis from Beijing Jiaotong University. June 2010.<br />

[17] Zhou, C. Microblog: the implications of new network<br />

platforms on government affairs. E-commerce Journal, 2010<br />

(10): 39- 40.


Managing Chinese Government Microblogs:<br />

Enablers and Barriers<br />

ABSTRACT<br />

This paper examines the enablers and barriers for the effectiveness<br />

of Chinese government microblogs with regard to government<br />

information disclosure, public service and citizen participation,<br />

and then builds a theoretical framework.<br />

Categories and Subject Descriptors<br />

H.4.2 [Information Systems Applications]: Type of systems – egovernment<br />

applications<br />

General Terms<br />

Management, Human Factors, Theory<br />

Keywords<br />

Social Media, Government, China, Enablers and Barriers<br />

1. INTRODUCTION<br />

Since 2010, a great number of government microblogs accounts<br />

have been opened and run by Chinese government agencies to<br />

foster government information disclosure, public service and<br />

citizen participation. According to the Chinese Government<br />

Microblogs Assessment Report of 2011, the total number of<br />

Chinese government microblog accounts have exceeded 50<br />

thousand by the end of 2011 [1]. This paper examines the enablers<br />

and barriers for the management of Chinese government<br />

microblogs with an empirical study, and attempts to identify the<br />

social, economic, political, organizational and technological<br />

factors that could influence the effectiveness of government<br />

microblogs. It also explores the relationship among these factors<br />

and builds a theoretical framework. Based on the findings of the<br />

study, the paper also makes some recommendations to Chinese<br />

government agencies in order to improve the effectiveness of<br />

government microblogs.<br />

As part of a research project on government microblogging in<br />

China [2], this paper conducts an empirical study on the factors<br />

influencing the effectiveness of Chinese government microblogs,<br />

and explores the interrelationship among these enablers and<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Lei Zheng<br />

Fudan University<br />

NO.220,Handan Road, Shanghai, China<br />

+86-21-55665676, 200433<br />

zhengl@fudan.edu.cn<br />

262<br />

barriers. This study employs two methods for data collection. One<br />

is focus groups carried out from April through June, 2011, with 78<br />

civil servants from Shanghai Municipal Government agencies and<br />

county governments, using brainstorming method to collect<br />

various viewpoints. The other is in-depth interviews conducted<br />

from July through October, 2011, using semi-structured<br />

questionnaires with managers of nine popular and influential<br />

government microblogs in Shanghai, as well as managers who are<br />

responsible for government customers, in the two major<br />

microblogs operating companies in China. The author records and<br />

transcribes the data collected, and analyzed the data with<br />

qualitative approach under the guidance of grounded theory by<br />

using Atlas.ti software. The research findings are as follows.<br />

2. FINDINGS<br />

2.1 External Enablers for Government<br />

Microblogs<br />

2.1.1 Growth in the Living Standards<br />

In recent years, Chinese people’s living standards have been<br />

greatly improved. The ownership rates of home computers and<br />

mobile phones are rising continuously, so is the rapid growth in<br />

microblog users. As interviewees mentioned, the increasing<br />

income of citizens has provided a basic foundation for the<br />

development and pervasiveness of microblogs.<br />

2.1.2 Rising Citizen Participation<br />

The rising intention of Chinese citizens to participate in public<br />

affairs in China has created favorable conditions for the<br />

development and management of government microblogs.<br />

Microblogs have gained wide public attention as a new tool of<br />

communication and interaction. Citizens use this platform actively<br />

to read news, express their opinions and participate in public<br />

affairs, which also propel government departments to open<br />

institutional microblogs to interact with the public. Therefore,<br />

some interviewees believe that it is the high time for government<br />

to operate microblogs.<br />

2.1.3 Policy Support<br />

Some civil servants pointed out that the existing national policy<br />

environment is also favorable for Chinese government to run<br />

microlbogs. In recent years, the government attaches importance<br />

to build a service-oriented government and harmonious society,<br />

and to achieve social management innovation. The central<br />

government introduces corresponding policies and regulations to<br />

promote government information disclosure. Overall, this policy<br />

environment promotes the disclosure of government information<br />

and citizens’ interaction with government.


2.1.4 Technological Maturity of Microblogs<br />

The microblog applications and platforms continue to mature,<br />

which guarantees the sustainable operation of government<br />

microblogs. Some interviewees pointed out that microblog<br />

platforms such as Sina and Tencent are easy to operate, stable in<br />

technology, and mature in functionality with friendly user<br />

experience. Therefore, the technological risks for the government<br />

to run microblogs have been minimized.<br />

2.1.5 International Influence<br />

In recent years, employing social media by government has<br />

become a global trend and has created huge impacts. In many<br />

countries, government agencies and senior officials use social<br />

media for political elections and political communication. Some<br />

interviewees in this research believed that this international trend<br />

has also influenced China to some extent, and propelled Chinese<br />

government agencies to run microblogs to interact with the public.<br />

2.2 Internal Enablers for Government<br />

Microblogs<br />

2.2.1 Leadership Attention and Supports<br />

The rapid development of microblogs has gained great attention<br />

from many government leaders. Some government microblog<br />

accounts were opened at their direct requests. One interviewee<br />

mentioned, “The leaders in our bureau placed serious emphasis on<br />

government microblogs. The project was fully funded and staffed,<br />

while trainings and working sessions were held regularly. Leaders<br />

in various offices and institutions opened their own personal<br />

microblogs to interact with our institutional microblog.”<br />

2.2.2 Abundant Information Resources in Government<br />

At present, government possesses a wealth of information<br />

resources to support the operations of government microblogs. As<br />

many civil servants mentioned, government is now the largest<br />

reservoir of authoritative, reliable and timely information in<br />

society, with strong potential to disseminate information, deliver<br />

targeted information services, and respond promptly to the public<br />

response.<br />

2.2.3 Advantages in Human Resources<br />

Some civil servants pointed out that the government had<br />

considerable advantages in human resources, which could<br />

contribute to the operation of government microblogs. The<br />

advantages are generally twofold. One is the human resources<br />

within the government. “China has a large number of civil<br />

servants”, an interviewee pointed out, “many of them are young<br />

and mastered with network technologies. They are potential<br />

microblog managers.” The other is the human resources outside<br />

the government. “Government can also use external human<br />

resources, such as experts, scholars and overseas returnees. These<br />

people could be invited as trainers and researchers to enhance the<br />

operational capability of government microblog managers.”<br />

2.2.4 Secured Funding<br />

The daily operation and management of microblogs require a<br />

certain amount of financial investment to cover personnel costs,<br />

training costs, equipment costs and communication costs. Many<br />

civil servants said, as long as the leadership paid attention to<br />

government microblogs indeed, funds would not be a big problem.<br />

Moreover, government microblogs are usually running on existing<br />

microblog platforms maintained by private companies. Given that<br />

ICT infrastructure had been considerably invested in many<br />

263<br />

government agencies, there wouldn’t be large additional<br />

equipment investment to run government microblogs.<br />

2.2.5 Adequate ICT infrastructure in Government<br />

Interviewees indicated that after years of e-government<br />

development, most government agencies has now possessed<br />

adequate ICT infrastructure, equipped with computers, servers,<br />

networks and other hardware facilities and software applications.<br />

The government's information security capabilities have also been<br />

greatly improved in recent years, and all these have provided a<br />

strong guarantee for the government to run microblogs effectively<br />

and safely.<br />

2.3 External Barriers for Chinese<br />

Government Microblogs<br />

2.3.1 Hackers and “Water Army”<br />

The ecological complexity of Internet society barricades the<br />

development of government microblogs. There are both angels<br />

and devils on the Internet. Some interviewees pointed out that<br />

hackers were hard to defend on the Internet. Government<br />

microblogs are especially threatened by hacking. Once the<br />

accounts were broken through, the negative impact would be very<br />

serious. A microblog manager stated: "Although Sina and Tencent<br />

claimed that they would ensure the security of government<br />

microblogs, these accounts are still at the risk of malicious<br />

intrusion. The account security is difficult to be guaranteed.<br />

Recently, one government microblog in Dalian City has just<br />

suffered a hacker attack.”<br />

“Internet water army”, a group of Internet also composes a<br />

challenge. The “army” refers to ghostwriters who are paid to post<br />

online comments with particular commercial or political<br />

intentions. These comments could manipulate, mislead and cover<br />

up public opinions for the benefits of special interest group, and<br />

make it hard for government to tell the true opinions of citizens<br />

and interact with citizens.<br />

2.3.2 Low trust in government and disinterests<br />

In addition, citizens’ low trust in government and disinterests to<br />

politics also exist on the Internet. Some interviewees<br />

acknowledged that citizens’ trust in government declines in recent<br />

years, and the government was facing a huge challenge. As for the<br />

posts published on government microblogs, “the public would<br />

hold a skeptical attitude. Thus government microblogs would not<br />

only have difficulties to play their roles, but also become the<br />

public laughingstock in some occasions, which couldn’t worth the<br />

candle.”<br />

Due to either low interests in public participation or suspicion of<br />

the government’s intention, some citizens don’t have much<br />

interest in interacting with government microblogs. Some people<br />

believe that government microblogs were opened up just for a<br />

“show”.<br />

2.3.3 Lack of Regulations<br />

Meanwhile, the ambiguity and absence of Internet regulations and<br />

policies also affect the performance of government microblogs.<br />

One interviewee pointed out: "The low threshold of posting<br />

information on microblogs and the inadequate review process<br />

make it hard to authenticate the information on microblogs. And<br />

there may be some ‘Internet Water Army’. Thus, the effectiveness<br />

of the government microblogs would be undermined. “Another<br />

civil servant mentioned: “At present, speech on the Internet is<br />

relatively free in China. Without a sound regulatory mechanism,


due to their tremendous influence, government microblogs may<br />

become the target of malicious attacks.”<br />

2.3.4 Digital Divide<br />

Some interviewees worried that the users of microblogs were<br />

mostly young people in middle class, while the elderly and poor<br />

could rarely use microblogs, not even use computers. This<br />

situation is unlikely to change in short term. After the opening up<br />

of government microblogs, non-users of micorblogs would be<br />

further marginalized and their interests might be ignored, which<br />

would exacerbate the digital divide.<br />

2.3.5 Fast Technological Upgrading and Substitution<br />

Some civil servants also doubted about the sustainability of<br />

microblogs and worried that they wouldn’t be popular for long<br />

due to the rapid IT advancement and upgrading. “Government<br />

websites, mayor’s mailboxs and the official blogs which were<br />

once hot for a time perhaps could be the lesson for government<br />

microblogs.” “What if microblogs have been abandoned by<br />

Internet users after the government had put a lot of manpower and<br />

material resources on microblogs? Wouldn’t it be worthless?”<br />

As the future of government microblogs still lies in uncertainties,<br />

consequently, microblog management has not yet become a<br />

routine work in government agencies with designated and fixed<br />

posts. Some civil servants worried that if they were assigned to a<br />

full-time job on microblog management, once their superiors shift<br />

their attention on government microblogs, their positions will be<br />

removed. One microblog manager gave a vivid description: “No<br />

one wants to work full-time on the microblog, because no one<br />

wants to ‘die’ on it”.<br />

2.3.6 Technological Risks<br />

Some civil servants also worried that, as a new phenomenon,<br />

microblog was not yet mature, and some risks were still unknown.<br />

For example, some interviewees said that “government<br />

microblogs were operated on external platforms, and the<br />

platform’s operation faults may lead to system errors and even<br />

crashes, resulting in unexpected consequences.”<br />

2.4 The Internal Barriers for Chinese<br />

Government Microblogs<br />

2.4.1 Lack of Institutions and Guidelines<br />

Because microblogs are new tools for government, some<br />

interviewees indicate that the government still lacks adequate<br />

institutions for the operation of government microblogs. In<br />

addition, in lack of effective and specific guidelines, microblog<br />

managers are confused with conflicting issues and hesitate to take<br />

measures. As results, the effectiveness of government microblogs<br />

is seriously affected.<br />

With regard to which department within the government should be<br />

responsible leading and managing government microblogs, there<br />

are no existing policies or regulations to follow in most<br />

government agencies. Nowadays, most leading departments of<br />

government microblogs are in the charge of Party Committees or<br />

publicity departments, and specific management teams and<br />

coordination teams for microblogs are quite different. In most<br />

occasions, government microblogs are operated by either the<br />

Internet Management and Publicity office, or General<br />

Administrative Office, or the Communist Youth League, or<br />

related functional departments. Both advantages and<br />

disadvantages are found with these different arrangements.<br />

264<br />

Besides, the interviews discovers that Chinese government<br />

agencies now mainly adopts two forms—part time jobs and shifts<br />

—to assign staff to the daily operation and management of<br />

government microblogs. The size of the operating teams ranges<br />

from one person to as many as ten members, and few departments<br />

introduce full-time posts for the management of government<br />

microblogs. A microblog operator mentioned, “We do our job in<br />

shifts. From Monday to Friday, the one who has spare time can<br />

post service tips or something at his or her convenience.” And due<br />

to the special nature of microblogs, the peak time of usage are the<br />

30 minutes before work in the morning, the lunch break and the<br />

evening session, while most civil servants work from nine to five,<br />

some of the microblog managers have to work overtime.<br />

Owing to the feeling of uncertainty towards government<br />

microblogs, some civil servants worried that once they worked on<br />

government micorblogs full time, their original jobs would be<br />

affected. Therefore, workers in some departments take shifts for<br />

the daily operation of microblogs. The shift lasts from three<br />

months to six months. The shift is temporary for a specific<br />

operator so that their original post won’t be influenced, and the<br />

operatoe on the shift is not required to work on other tasks until<br />

the shift is over. With this arrangement, the experience that a<br />

certain government microblog operator accumulated during his or<br />

her shift would hardly pass on to his or her successors. With their<br />

varied personal styles of different operators, the management<br />

stability of government microblogs is also jeopardized.<br />

2.4.2 Low Attention from Leadership<br />

Some government microblog managers mentioned that although<br />

their leaders requested them to open and run government<br />

microblogs, they didn’t pay attention to them fundamentally. That<br />

is to say, they just stress the importance orally, but do not provide<br />

matching personnel, financial and material resources. Some<br />

leaders did nothing more than coping with a task assigned by<br />

leaders in higher levels. In addition, the attention of the leadership<br />

frequently shifts, which would also affect the stable and<br />

sustainable operation of government microblogs.<br />

In particular, many civil servants pointed out that under the<br />

existing Chinese administrative system, the attention and support<br />

of superior leadership is extremely important to the development<br />

of government microblogs, and is the key to success. “The reason<br />

why some government microblogs are abandoned was that they<br />

didn’t earn full attention and support from the leadership.”<br />

Therefore, a lot of microblogs have become an object of “display”<br />

of the government, a microblog manager mentioned, "Currently,<br />

what concerns us most is the support of higher authorities."<br />

2.4.3 Lack of Resources<br />

Many government departments reported that in spite of the<br />

increasing tasks and workload of government microblogs, the<br />

necessary funds and resources still fell behind. As mentioned<br />

above, a good support of human, financial and material resources<br />

mainly depended on the attention earned from the leadership. At<br />

present, most government microblogs have no specifically<br />

allocated funds. The facility investment, daily operation expenses,<br />

communication costs, training fees, and personnel expenses (work<br />

allowances and bonuses) are not secured financially. Some<br />

departments stated clearly: “Our human and material resources are<br />

limited. We lack funds, equipment and professional supports.”<br />

Without secured specially allocated funds, the expenditures on<br />

government microblogs in many departments were mainly


appropriated from the budget for general administrations or other<br />

purposes. A government microblog manager illustrated: “The<br />

Bureau of Finance said that they haven’t listed this item in their<br />

budget in advance, so they could not allocate any fund for us.<br />

Therefore, this year we used the overhead cost, which is from the<br />

General Administrative Office’s expenditures.” “Other costs such<br />

as training and activities are not funded at all. Even our own<br />

finance staff wouldn’t approve them, not to mention the Bureau of<br />

Finance. ”<br />

2.4.4 Conservative and Closed Organizational<br />

Culture<br />

The study finds out that many government agencies shows<br />

apprehension towards external barriers and attacks. The<br />

government microblog managers worried that when the Internet<br />

users and opinion leaders questioned the contents on government<br />

microblogs, the government's authority would be directly<br />

challenged. “Government microblogs might be taken advantage of<br />

by interest groups, resulting in social discord. They may also give<br />

a vent for disadvantaged groups to show their angers and be<br />

threatened by malicious comments, which would pose negative<br />

impacts on the image of government.”<br />

Besides, the current messages and posts in government<br />

microblogs are too official, formal and rigid, and present<br />

themselves as government “bulletin boards”. “In the long run,<br />

government microblogs would inevitably lose their attractiveness<br />

and vitality, and ultimately become useless things.” a civil servant<br />

noted, “The current ‘leader first’ culture prevails within the<br />

government, forming an arrogant attitude of government on the<br />

Internet as well. It would inevitably intensify the tension between<br />

the government and the public, which would worsen the<br />

communication between them.”<br />

2.4.5 Bureaucratic Review Process<br />

As a novelty, government microblog is however restrained by the<br />

traditional bureaucratic review process currently. In fear of<br />

making mistakes when posting information and interacting with<br />

citizens, some government microblogs still adopt traditional<br />

review process and thereby reduce the speed and effectiveness of<br />

response. A government microblog manager pointed out: “the<br />

review process is also where the contradiction lies. If we response<br />

every microblog in accordance with the full-process review,<br />

timeliness will be hurt. With this process, we then could only take<br />

official and diplomatic phases to answer them.”<br />

Moreover, the leadership often lacks a thorough understanding of<br />

the features of microblogs and the way of managing them. Some<br />

leaders still adopts old ways to superintend government<br />

microblogs, and some of them are even blind commanders. Under<br />

their improper leadership, some microblog managers are very<br />

confused and frustrated. A government microblog manager<br />

mentioned “The leader who is responsible for government<br />

microblogs doesn’t have a good knowledge of them. He views<br />

operating microblogs as the same way as publishing a newspaper,<br />

and holds editing assemblies every morning and night.”<br />

2.4.6 Inadequate Personnel Capabilities<br />

Since managing government microblog is a fresh new task for<br />

agencies, many managers still lack management experiences and<br />

capabilities. For an instance, some civil servants worried about<br />

answering questions in specialized field raise by the public. “If<br />

you respond with insufficient or inaccurate information, you could<br />

265<br />

not satisfy the public needs; if you put aside questions, people<br />

would feel ignored. So it is quite a dilemma.”<br />

Therefore, many government microblog managers reflected their<br />

urgent need to receive professional trainings, particularly in the<br />

skills of attracting attentions and response in emergencies. “If you<br />

want to attract public attention, professional media packaging or<br />

trainings are very much needed to improve our management<br />

capabilities.” “I hope there are regular trainings, and show us how<br />

to deal with unexpected things. In addition, when a government<br />

microblog is just opened, it is actually our own staff who initiates<br />

the participation in the microblog. Therefore, these people must<br />

also be trained in dealing with complex situations.”<br />

Many government microblog managers also mentioned that the<br />

original workload for some civil servants was already very heavy.<br />

In microblog management, they felt hard to balance their new task<br />

with the old one. They were unable to response quickly or manage<br />

government microblogs at any time. A government microblog<br />

manager pointed out clearly: “there are only six people in our<br />

office. In order to take care of all the tasks, we could only take<br />

turns to work part-time on microblogs. Gradually we feel<br />

exhausted.”<br />

2.4.7 Lack of Cross-boundary Collaborations<br />

The study has found that most government microblogs are<br />

unlinked with each other, without information sharing or<br />

operational collaborations. Especially in dealing with<br />

emergencies, there are no joint efforts among institutions and<br />

individuals to enhance information dissemination and interaction.<br />

A microblog manager from the railway station cited an example:<br />

“our services are information-based. The source of information is<br />

rather important, but very often in emergencies the information<br />

from other transport units is way beyond our grasp. The customers<br />

were very confused and failed to receive information from our<br />

service counters. The truth is that we didn’t know the information<br />

they asked either, because we didn’t have any sources of<br />

information. Talking about this accident on high-speed railways,<br />

we didn’t receive any notifications from the dispatch center and<br />

other transportation partners. Actually, we knew about this<br />

accident by searching content by ourselves through other<br />

microblogs. Without any information provided by our partners in<br />

transportation, it is not surprising that we couldn’t serve the<br />

passengers well. All complaints are pointed to the front desk,<br />

because we are the service terminal. However, we have no<br />

partnership with other units.”<br />

2.4.8 Information Confidentiality<br />

The government has considerations for security and<br />

confidentiality towards the information published by microblogs.<br />

Some microblog managers worried that “Once the government's<br />

confidential information was revealed on the Internet, the situation<br />

would be difficult to restore”. This would make the government<br />

hesitate to publish information on microblogs.<br />

2.4.9 Information Accuracy<br />

Besides, some interviewees also worried that the limitation of 140<br />

characters for each message may result in information inaccuracy<br />

and ambiguity. “Different people have different interpretations of<br />

the contents, which would affect the accuracy and authority of the<br />

information published by government microblogs.”


3. ACKNOWLEDGEMENT<br />

This research is funded by the Shanghai Pujiang Plan and the<br />

Education Innovation Project by Education Committee, Shanghai<br />

Municipal Government.<br />

4. REFERENCES<br />

[1] China National Academy of Governance (2011). Assessment<br />

Report on Chinese Government Microblogging.<br />

[2] Zheng, L., et al (2011). Studying the Management<br />

Mechanism of Government Microblogs in China: A Research<br />

Plan. Proceedings of the 5th International Conference on<br />

Theory and Practice of Electronic Governance, ACM Press.<br />

266


Study on Social Media Applications by Government in<br />

Hong Kong<br />

ABSTRACT<br />

In the Web2.0 Era, social media is playing a more and more<br />

important role in government affairs. This paper conducts a<br />

research based on 44 accounts opened by Hong Kong government<br />

on five social media platforms, including Facebook, Twitter,<br />

YouTube, SinaMicroblog and Blog. The authors identify fourteen<br />

observation contents of those accounts in order to give a general<br />

picture of the current situation of Hong Kong government social<br />

media application. Finally, give some suggestions to mainland<br />

China social media application practice.<br />

Categories and Subject Descriptors<br />

K.6.1 [Project and People Management]: Management<br />

Techniques<br />

General Terms<br />

Management, Measurement, Performance<br />

Keywords<br />

Hong Kong, Government, Social Media, Application<br />

1. INTRODUCTION<br />

Chinese government agencies and officials have set up microblog<br />

accounts since 2008 and are facing many challenges. Even though<br />

western countries start early in government social media<br />

application, it’s hard to copy their experience due to China’s<br />

unique national contextual. Hong Kong Special Administrative<br />

Region, on one hand, shares the same language and culture origin<br />

with Mainland China. On the other hand, it started social media<br />

application in government earlier. Its experience will have a great<br />

reference value to Mainland China. Through observing 44 social<br />

media accounts of Hong Kong government agencies and officials,<br />

this essay studies the current situation of social media application<br />

by Hong Kong government and gives suggestions for the future<br />

social media practice of mainland government.<br />

2. LITERATURE REVIEW<br />

Many scholars have contributed a lot in the field of government<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Huina Xu and Qian Chen<br />

Department of Public Administration<br />

Fudan University<br />

220 Handan Road<br />

200433, Shanghai, China<br />

{11210170057, 10210170073}@fudan.edu.cn<br />

267<br />

using social media tools in recent days. David Landsbergen (2010)<br />

studies the use of social media by several departments within the<br />

city of Columbus, USA and discusses how social media provide<br />

the government a way to do things in way that government<br />

haven’t done before[1]. Enrique Bonson et al. (2012) find out that<br />

most EU local governments are using social media tools to<br />

enhance transparency[2]. Sergio Picazo-Vela et al. (2012) present<br />

the perceptions of risks, benefits and strategic guidelines about<br />

social media application in Central Mexico[3]. John Carlo Bertot<br />

et al. (2012) indicate how governments promote transparency and<br />

accountability through ICTs, social media, and collaborative egovernment[4].<br />

Chinese scholars also have done some researches<br />

on government using social media. The 2011 China government<br />

microblog research report generally introduced the current<br />

situation of government moicroblogs development in China[5].<br />

Yan Su (2011) introduces several examples of the internet and<br />

social media communication by Hong Kong government[6].<br />

Since Chinese government social media application is now facing<br />

many challenges, this study aims to analyze the current situation<br />

of Hong Kong social media application and give some<br />

suggestions to Mainland China.<br />

3. RESEARCH METHOD<br />

On the basis of non-participant observation and secondary data<br />

analysis, this article studies the current situation of Hong Kong<br />

government social media application from the public management<br />

perspective. This study conducts both quantitative and qualitative<br />

analysis by observing fourteen contents of Hong Kong<br />

government social media accounts. This study selects the research<br />

objects by applying the data provided on Hong Kong Government<br />

portal (www.gov.hk) which has set "social media links" that lists<br />

Hong Kong government agency and official social media<br />

accounts. According to the data updated on the website in April<br />

2011, a total of 44 social media accounts have been opened by 14<br />

Hong Kong government officials and 16 government agencies on<br />

five social media platforms including Blog, Facebook, Twitter,<br />

YouTube and SinaMicroblog. In reference to western countries’<br />

social media application handbooks while considered the actual<br />

situation in Hong Kong, this study identifies the following<br />

fourteen observation contents.<br />

1) Account owner: to distinguish whether the social media<br />

account is owned by government official or government<br />

agency;<br />

2) Social media types: to specify which social media platform<br />

the account belongs to: Blog, Facebook, Twitter, YouTube or<br />

SinaMicroblog;


3) Established year: to specify the established year of the social<br />

media account;<br />

4) Account introduction: to find out whether the social media<br />

account identifies itself as government agency or official<br />

clearly;<br />

5) Account images/photos: whether the Hong Kong government<br />

social media account has its own account image or photo;<br />

6) Amount of followers: refers to the amount of followers who<br />

subscribe the government social media accounts;<br />

7) Amount of followings: refers to the amount of social media<br />

accounts that government social media accounts have<br />

subscribed;<br />

8) Type of followings: refers to the type of accounts that Hong<br />

Kong government agencies and officials subscribe;<br />

9) Amount of posts: refers to the amount of posts that released<br />

from the established date till April 20, 2011;<br />

10) Posting frequency: refers to how often Hong Kong<br />

government agency and official accounts post one piece of<br />

information;<br />

11) Content of posts: such as work-related information,<br />

entertainment information, personal views, etc.;<br />

12) Posting forms: to find out whether government agency and<br />

official accounts use pictures, video or other forms in posting;<br />

13) Language: refers to the type of language used in posting,<br />

including English, traditional Chinese and simplified<br />

Chinese;<br />

14) Interaction: to find out whether there is interaction between<br />

government social media account owners and netizens.<br />

4. RESEARCH FINDINGS<br />

4.1 Account Owners, Social Media Types and<br />

Amounts<br />

The figure 1 shows that the most widely used government social<br />

media types are Facebook and YouTube. The data also shows that<br />

Hong Kong government agencies and officials have different<br />

preference on social media types. Government agencies prefer<br />

opening accounts on Twitter, YouTube and Facebook, while<br />

government officials prefer Facebook and Blog.<br />

Figure 1. The number of Hong Kong government agency and<br />

official accounts on different social media platforms.<br />

The Figure 2 shows that nine out of thirty HK government<br />

agencies and officials have opened more than two social media<br />

accounts, among which seven are government agencies.<br />

Government agencies, compared with government officials, seem<br />

to open two even more social media accounts.<br />

268<br />

Figure 2. Number of social media accounts each Hong Kong<br />

government agency and official opens.<br />

4.2 Established Year and Newly-Opened<br />

Social Media Accounts by Year<br />

Figure 3 shows that Hong Kong government has opened social<br />

media accounts as early as in 2006 (Since the web design of<br />

Facebook is difficult for researchers to find the established year,<br />

Facebook is not included in this statistical analysis.). The annual<br />

amount of the newly-opened government social media accounts<br />

has raised up since 2009. Seventeen new social media accounts<br />

were established in year 2010, which seems to be the peak year of<br />

Hong Kong government social media application development.<br />

Figure 3. Newly-opened HK government accounts by year.<br />

Among seventeen newly-opened social media accounts in 2010,<br />

fourteen are opened by government agencies while three by<br />

government officials (Table 1). Government agencies social<br />

media applications appears to develop faster than government<br />

officials. Furthermore, most newly-opened accounts in 2010 open<br />

on YouTube and Twitter.<br />

Table 1. Newly-opened Hong Kong government social media<br />

accounts in 2010 on different social media platforms<br />

Hong Kong<br />

government<br />

officials<br />

Hong Kong<br />

government<br />

agencies<br />

Twitter 0 4 24%<br />

SinaMicroblog 1 2 18%<br />

YouTube 0 8 47%<br />

Blog 2 0 11%<br />

Percentage<br />

Total 3 14 100%<br />

4.3 Account Instruction<br />

Ninety-five percent of the Hong Kong government social media<br />

accounts clearly identify themselves as government agencies or<br />

officials. All of those accounts not identifying themselves are<br />

Hong Kong government official accounts opened on Facebook.


4.4 Account Images/Photos<br />

All the government social media accounts have their own images<br />

or photos. In terms of the consistency of images/photos of the<br />

same government agency/official on multiple social media<br />

platforms, this study finds out that three Hong Kong government<br />

agencies (Chief Executive's Office, Hong Kong Observatory and<br />

the Investment Promotion Agency) and one government official<br />

(Kenneth Chen, Deputy Secretary of Department of Education)<br />

use the same images and photo on different social media<br />

platforms. Another four government agencies, each of which has<br />

opened more than three social media accounts, use partly the same<br />

image on different social media platforms. One government<br />

agency, the Hong Kong Government, use different images on its<br />

Twitter and Facebook accounts.<br />

4.5 Amount of Followers and Followings<br />

The amount of followers of government agency and official<br />

accounts indicates the coverage and effectiveness of accounts<br />

among the netizens. The analysis of the amount of the followers<br />

of 36 Hong Kong government social media accounts (Since Blog<br />

doesn’t have the function of following, it is not included in this<br />

statistics.) shows that 78% government social media accounts<br />

have 100 to 10000 followers. Only a few accounts have either less<br />

than 100 or more than 10,000 followers.<br />

Compared to the large amount of followers of Hong Kong<br />

government social media accounts, most government agencies and<br />

officials follow only several accounts. Seventy-five percent<br />

government accounts only follow other government accounts,<br />

while 25 percent follow other government accounts as well as<br />

non-government accounts such as news and media, celebrities,<br />

companies, ordinary netizens, etc.<br />

4.6 Amount of Posts<br />

The amount of posts is calculated from the established date to<br />

April 20, 2011. Most Hong Kong government accounts post fewer<br />

than 1000 pieces of information till April 20, 2011. Only four<br />

accounts including Hong Kong Radio on YouTube, Independent<br />

Commission Against Corruption (ICAC) on YouTube and<br />

Government Information Services on both Twitter and YouTube<br />

have posted more than 1000 pieces of information. (Since the lack<br />

of data of the amount of posts on Facebook, accounts on<br />

Facebook are not included in the statistics.)<br />

A cross analysis of amount of posts and social media types<br />

indicates a significant difference among each platform. The<br />

amount of posts of 75% government accounts on Blog is less than<br />

100 while amount of posts on Twitter and SinaMicroblog is<br />

mostly between 100 and 1000. The amount of posts on Blog is<br />

smaller than that on other social media platforms (figure 4).<br />

269<br />

Figure 4. Cross analysis of amount of posts and social media<br />

types.<br />

4.7 Posting Frequency<br />

Posting frequency is calculated as follows: P (frequency) = (the<br />

total number of days from the established date to April 20, 2011) /<br />

(Amount of posts). The authors have classified the calculation<br />

result as follows: (0-1) represents that on average, posting one<br />

piece of information costs less than one day. (1-7) represents that<br />

on average, posting one piece of information requires one to seven<br />

days. (7-30) represents that on average, posting one piece of<br />

information costs more than one week (7 days) but less than a<br />

month; (30-50) represents that the average posting frequency is<br />

more than one month but within two months. Figure 5 shows that<br />

more than half of government accounts post information every<br />

one week. The average highest posting frequency is nine times a<br />

day while the slowest is every 40 days.<br />

Figure 5. Posting frequency of HK social media accounts.<br />

4.8 Content of Posts<br />

Based on observation, most information released by government<br />

accounts is related to the work of agencies and officials.<br />

Government official accounts release information not only related<br />

to their own work but also related to their after-work life and<br />

personal points of view. However, government agencies only<br />

release information related to the agencies themselves.<br />

4.9 Language<br />

Figure 6 shows traditional Chinese is the most widely used<br />

language in Hong Kong Government social media accounts. The<br />

study also finds that some government agencies (such as Hong<br />

Kong Observatory) launched one Chinese version account and<br />

one English version account on the same social media platform.<br />

Those two accounts update synchronously and the content of the<br />

posts are almost the same. Tracing back to the origin of those two<br />

accounts, the information is released in both Chinese and English<br />

in one account. After a period of time, this account is separated<br />

into two accounts, Chinese one and English one.


Figure 6. Language used in Hong Kong social media accounts.<br />

5. INSPIRATION AND SUGGESTIONS<br />

5.1 Government Social Media Applications<br />

and Effects are Influenced by the<br />

Characteristics of Social Media Platforms<br />

Based on the different characteristics of different social media<br />

platforms, the amount of posts, posting frequency and posting<br />

forms on different social media platforms vary a lot. Both the<br />

amount of posts and posting frequency on Blog are the lowest,<br />

compared with Facebook, Twitter and YouTube. In addition, the<br />

social media openness to the public has influence on the<br />

government social media applications. The study indicates that<br />

even though the established date of SinaMicroblog is later than<br />

other social media platforms, the amount of followers on<br />

SinaMicroblog is larger than that on Facebook, Twitter and<br />

YouTube. One possible reason is that SinaMicroblog mainly<br />

targets Chinese which have the largest population in the world. At<br />

the mean time, Facebook, Twitter and YouTube are blocked in<br />

Mainland China.<br />

Each social media platform has its own characteristics which<br />

would attract different user groups. Government agencies should<br />

choose suitable platform to provide service to its target citizens.<br />

5.2 Government Social Media Applications<br />

and Effects are Influenced by the<br />

Characteristics of Government Agencies<br />

and Officials<br />

This study has shown that the functional difference of government<br />

agencies and officials would affect their performance on social<br />

media applications. For example, Government Information<br />

Service and Hong Kong Observatory are two different agencies.<br />

They vary in the command of information resources, posting<br />

techniques, and allocation of human resources and funds. As a<br />

result, their performance on social media applications differs a lot.<br />

Furthermore, the study has shown that government agencies open<br />

more social media accounts than government officials.<br />

Government agencies have professionals to manage accounts and<br />

funds to support the daily account maintenance. On the contrast,<br />

most government officials have to manage account by themselves.<br />

Each additional account would put extra burden on the officials.<br />

That may be the reason why government agencies seem to open<br />

more accounts than government officials.<br />

In general, different government agencies and officials have<br />

different command of posting techniques, human resources and<br />

funding, which would result in the performance difference.<br />

270<br />

Government should match their own characteristics with the<br />

social media platform to achieve the best results.<br />

5.3 The Normalization of Government Social<br />

Media Application Should be<br />

Strengthened<br />

This study has found out that there are still five percent<br />

government accounts not identify themselves. In addition, half of<br />

the government social media accounts, which open more than two<br />

accounts on different social media platforms, don’t share the same<br />

image or photo. Account identification and the same image would<br />

help to enhance the authority of government accounts and make it<br />

easier for citizens to recognize the government accounts.<br />

5.4 Followings Amount Should be Enlarged<br />

Compared with the great amount of followers of government<br />

accounts, the followings should be enlarged. It would help the<br />

government agencies and officials get close to the ordinary people<br />

and know what the people are thinking.<br />

6. CONCLUSION<br />

With the social media playing a more and more important role in<br />

public affairs, government using social media has become<br />

inevitable. Mainland china can learn from the experience of social<br />

media applications by HK government. First, mainland china can<br />

take advantage of different types of social media platforms to<br />

reach different netizens and realize the equalization of services<br />

supply. Second, mainland government agencies and officials<br />

should choose one or more suitable social media platforms and<br />

maximize the advantages of the platform. Third, government<br />

agencies and officials should follow more non-government<br />

agency accounts in order to hear the voice of the people. Finally,<br />

multiple languages should be used in social media applications to<br />

meet the needs of different people working or traveling in China.<br />

7. REFERENCES<br />

[1] Landsbergen, D. (2010). Government as Part of the<br />

Revolution: Using Social Media to Achieve Public Goals.<br />

Proceedings of the 10th European Conference on E-<br />

Government, pp. 243-250.<br />

[2] Bonsón, E., Torres, L., Royo, S., & Flores, F. Local egovernment<br />

2.0: Social media and corporate transparency in<br />

municipalities. Government Information Quarterly, pp.123-<br />

132<br />

[3] Picazo-Vela, S., et al., Understanding risks, benefits, and<br />

strategic alternatives of social media applications in the<br />

public sector, Government Information Quarterly (2012)<br />

[4] Bertot, J. C., Jaeger, P. T., & Grimes, J. M. Using ICTs to<br />

create a culture of transparency: E-government and social<br />

media as openness and anti-corruption tools for societies.<br />

Government Information Quarterly, 27(3), 264–271.<br />

[5] China official microblog research report. (2011). Public<br />

opinion and transmission laboratory.<br />

[6] Yan Su. Internet communication analysis of Hong Kong<br />

Special Administrative Region government. Journalism<br />

Lover, 2011(11), pp.74-75


Session 10<br />

ICT & Governance<br />

Transformation


E-Government and Transformation of Governance and<br />

Service Delivery in Bangladesh: A Developing Country<br />

Perspective<br />

ABSTRACT<br />

As elsewhere around the world, lately e-government has become a<br />

major component of governmental policy in Bangladesh. It has<br />

received a particular push with the launch of ‘Digital Bangladesh’.<br />

The twin pillars of the campaign - ‘connecting citizens’ and<br />

‘offering services to their doorsteps’ - are considered key to<br />

fighting poverty and achieving the Millennium Development<br />

Goals. While enthusiasm for e-government is widespread and a<br />

variety of programs are currently underway that offer endless<br />

opportunities for the future, in a developing country like<br />

Bangladesh road to e-government is not without pitfalls and<br />

challenges. This paper sheds lights on the trajectory of egovernment<br />

in Bangladesh with a particular focus on its current<br />

status and future goals. More specifically, it seeks to highlight<br />

some innovative e-government schemes and their impacts on<br />

service delivery processes and mode of interactions between<br />

government and citizens. The paper focuses on some key<br />

constraints that undermine and frustrate governmental drives for<br />

realizing the vision of Digital Bangladesh. It also comments on<br />

their policy implications.<br />

Category<br />

General Literature<br />

General Terms<br />

Management, Human Factors, Performance, Reliability and<br />

Security<br />

Keywords<br />

E-government, Digital Bangladesh, ICT Policy, Union<br />

Information Service Centres, Digital Divide<br />

1. INTRODUCTION<br />

Public governance around the world has long been subjected to<br />

widespread criticisms for poor performance and procedural<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Noore Alam Siddiquee<br />

Department of Politics & Public Policy<br />

Flinders University<br />

Adelaide 5001, Australia<br />

+ 618 8201 2302<br />

noore.siddiquee@flinders.edu.au<br />

271<br />

rigidities, among others. Decades of public sector reforms appear<br />

to have done little either to improve the delivery of<br />

public services or to brighten the image of service providers.<br />

Inefficiency, lack of accountability and transparency, inflexibility,<br />

red-tape and corruption are among the multitude of problems that<br />

characterize public bureaucracies and service delivery systems.<br />

This is particularly the case in developing countries. The advent of<br />

e-government has offered real prospects of making a difference in<br />

this regard. E-government promises not only to improve<br />

efficiency in service delivery but also to promote transparency and<br />

accountability thereby reducing corruption and mismanagement in<br />

public governance [4; 16]. In addition, it is believed to promote<br />

innovation in delivery of public services, offer increased<br />

flexibility in the service use and foster people’s participation and<br />

empowerment [18]. In developing countries e-government has<br />

assumed an additional significance: it is expected to help eradicate<br />

poverty, boost national economic growth, reduce bureaucratic<br />

complexity and establish good governance [7].<br />

Thus it is nothing surprising that of late e-government has become<br />

a key component of public sector reform across the globe. So<br />

popular is the e-government today that it is hard to find a country<br />

that has not embraced it in recent years. As elsewhere, Bangladesh<br />

has followed the global trend. Since the adoption of e-government<br />

as a policy issue in late 1990s, the government of Bangladesh has<br />

initiated and implemented variety of measures seeking either to<br />

improve internal efficiency of the government agencies or to<br />

enhance external delivery of services to the citizens or both. Egovernment<br />

is seen as strategy for transforming public governance<br />

and service delivery, it is also viewed as a tool for fighting<br />

poverty and achieving Millennium Development Goals (MDGs).<br />

While enthusiasm for e-government is widespread and a variety of<br />

programs are currently underway as part of governmental aim of<br />

developing an efficient, accountable and citizen-centric public<br />

administration, in a developing country like Bangladesh the road<br />

to e-government is anything but smooth and straightforward. In<br />

fact, a large number of countervailing forces and barriers act to<br />

thwart and frustrate governmental drives in this regard. This paper<br />

reviews the trajectory of e-government in Bangladesh. Based<br />

mainly on secondary sources the paper seeks to highlight the roles<br />

of e-government in transforming governance and service delivery<br />

system and some of the constraints and challenges involved.


2. THE EVOLUTION OF E-GOVERNMENT<br />

IN BANGLADESH<br />

Even though development of an efficient, transparent and<br />

accountable system of administration has been a recurrent theme<br />

of all reform initiatives since Bangladesh gained her independence<br />

in the early 1970s, e-government has not found expression in the<br />

governmental policy discourse until the late-1990s. In fact, the<br />

ICT revolution and growth of e-commerce etc. elsewhere did not<br />

generate much interest among the Bangladeshi policy makers.<br />

Thus, the initial period was characterised by what could be termed<br />

as a combination of lack of interest, confusion and neglect on part<br />

of political and administrative leadership. After initial periods of<br />

confusion and inaction the first concrete step towards egovernment<br />

was made by the Awami League government<br />

following its assumption of power in 1996. It agreed to connect<br />

the country with the information superhighway, designated ICT as<br />

a thrust sector, waived taxes on computers and computer<br />

accessories and allocated US $6 million in 1997-98 annual budget<br />

towards supporting the development of ICT sector in the country.<br />

It also formed a Task Force with the Prime Minister as its head.<br />

Composed of representative of the government ministries, the<br />

private sector, academia and NGOs the Task Force was<br />

responsible for providing overall direction concerning the<br />

application of ICT in government in order to improve operational<br />

efficiency, enhance quality of services and advance public welfare<br />

by extending public services even to most remote areas. All this<br />

marked the beginning of Bangladesh’s journey towards egovernment.<br />

Following the political change in 2001 the new government<br />

continued the drives initiated by the previous regime. The<br />

formulation of ICT Policy, 2002 was among significant moves<br />

made during 2001- 2005 period. However, in the absence of<br />

coherent vision and well-designed strategies various agencies<br />

initiated and implemented e-government programs in isolated and<br />

uncoordinated fashion. With the launch of the Access to<br />

Information (A2I) programme in 2006 a new phase of egovernment<br />

development began. Located in the Prime Minister’s<br />

Office and supported by the UNDP the A2I program has played a<br />

catalysing role in promoting people oriented to e-government.<br />

Series of workshops and seminars organised under the A2I<br />

program have led to identification of a large number of citizen<br />

services for implementation at various levels. This has also<br />

encouraged various ministries and divisions of the government to<br />

initiate and implement a range of e-government programs aimed<br />

at offering enhanced services to their respective clients. The<br />

military backed care-taker government that was in power during<br />

2007-2008 was highly supportive of the e-government agenda: it<br />

played a vital role in successfully implementing web-initiatives<br />

and augmenting capacity and awareness at various levels. This<br />

may have marked a shift from infrastructure building towards<br />

delivery of services using ICT, still programs remained largely<br />

isolated and limited in scope.<br />

The incumbent Awami League government having assumed power<br />

in 2009 made e-government a priority and initiated<br />

comprehensive measures to this end. In line with its election<br />

manifestos the new government introduced a charter of change<br />

with ‘Digital Bangladesh’ as an integral component of its Vision<br />

2021. Conceived and implemented under the United Nations<br />

Development Program (UNDP) –funded Access to Information<br />

(A2I) program –Digital Bangladesh represents the cornerstone of<br />

272<br />

e-government in Bangladesh. The Digital Bangladesh agenda<br />

involves a digitised government, ICT enabled services, nationwide<br />

internet connectivity, high-tech parks for businesses and IT<br />

trained professionals. It consists of four pillars: (i) developing<br />

human resources suitable for 21 st century demands; (ii) connecting<br />

citizens in a meaningful ways; (iii) taking services to the<br />

doorsteps of the people and (iv) making private sector more<br />

productive and competitive through the use of ICT [10]. The<br />

Digital Bangladesh campaign has led to a more comprehensive,<br />

sustained and robust approach to e-government with emphasis on<br />

citizen-centred service delivery. Although the drives for<br />

infrastructure development continue in view of country’s overall<br />

e-government development index currently emphasis is placed on<br />

fostering integration and expansion of scopes for transactional<br />

services. Numerous programs and projects (as shown later) are<br />

being implemented towards realizing the vision.<br />

3. INSTITUTIONAL AND LEGAL<br />

FRAMEWORK<br />

E-government is a relatively new phenomenon in Bangladesh.<br />

Hence, the institutional, legal and regulatory framework for egovernance<br />

is still evolving. At the apex of the institutional<br />

framework for e-government in Bangladesh is the Prime<br />

Minister’s Office (PMO) that provides stewardship of the Digital<br />

Bangladesh program. The E-Government Cell established within<br />

the PMO provides policy directives and guidelines for the<br />

implementation of e-government programs including oversight<br />

and coordination of such initiatives. The National ICT Task Force<br />

(NTF) chaired by the Prime Minister is responsible for<br />

mainstreaming ICT throughout the public sector. Renamed<br />

recently as the Digital Bangladesh Task Force it is represented by<br />

stakeholders from the government, the private sector and the civil<br />

society. It is responsible for monitoring milestones in the<br />

implementation of Digital Bangladesh agenda and advising the<br />

government on policy matters and means of achieving goals<br />

identified. A number of government ministries have been given<br />

significant roles to play. The Ministry of Science and Information<br />

Communication Technology (MoSICT) is responsible for the<br />

development of infrastructure and human resources for successful<br />

application of ICT in the society. It also formulates ICT policies<br />

and oversees the implementation of such policies. Given that one<br />

of the responsibilities of the Ministry is to support the overall<br />

socio-economic development of the country through research,<br />

development, extension and successful utilisation of science and<br />

technology including ICT, it has undertaken and implemented<br />

variety of programs including the establishment of computer<br />

training centres throughout the country to impart ICT related<br />

knowledge and skills to government employees as well as<br />

members of the public. The Bangladesh Computer Council<br />

(BCC)- an autonomous agency established in 1990 provides<br />

technical assistance to the MoSICT.<br />

The development of telecommunications infrastructure is the<br />

responsibility of the Ministry of Post and Telecommunications<br />

(MoPT). It lends critical support to the e-government by<br />

promoting the growth of telecommunications sector<br />

commensurate with emerging demands and needs. While the<br />

ministry is responsible for the overall development of the<br />

telecommunications sector, Bangladesh Telecommunications<br />

Company Limited (BTCL) – a public limited company under the<br />

ministry has been mandated to provide basic telecommunications<br />

services throughout the country. It provides landline telephones


and domestic as well as international call services. Likewise, the<br />

Bangladesh Telecommunications Regulatory Commission<br />

(BTRC) - an autonomous body established under the Ministry in<br />

2002 is the licensing authority that regulates telecommunication<br />

service providers – both fixed line and mobile phones throughout<br />

the country. It is also responsible for promoting ICT application<br />

through, among others, oversight of the VSAT operators and<br />

internet service providers, the development of digitisation<br />

schemes and regulation of tariffs and standards. Table 1 lists<br />

major agencies involved along with their primary responsibilities.<br />

Table 1: Important Public Sector Actors in E-Government<br />

Government<br />

Ministry/Agency<br />

Prime Minister’s Office<br />

(E-Government Cell)<br />

Ministry of Science &<br />

Information and<br />

Communication<br />

Technology<br />

Bangladesh Computer<br />

Council<br />

Ministry of Post and<br />

Telecommunications<br />

Bangladesh<br />

Telecommunications<br />

Regulatory Commission<br />

(BTRC)<br />

Responsibilities<br />

Overall policy directions<br />

Policy formulation and<br />

mainstreaming ICT in the public<br />

sector<br />

Support MoSICT and provide<br />

training as well as advisory services<br />

to government and citizens.<br />

Develop telecommunication<br />

infrastructure and services<br />

Regulation of the<br />

telecommunications industry &<br />

licensing<br />

Ministry of Information Dissemination of information<br />

Ministry of Planning Support DBTF to realize its goals<br />

Ministry of Finance Support the e-government programs<br />

with appropriate allocation of funds<br />

Ministry of Education Development of curriculum for ICT<br />

education; computerisation of<br />

schools<br />

Ministry of Law, Justice<br />

and Parliamentary<br />

Affairs<br />

ICT Task Force/Digital<br />

Bangladesh Task Force<br />

National Information<br />

Management<br />

Committee (MoP)<br />

National ICT Education<br />

Task Force<br />

Review of ICT related laws and<br />

policies<br />

Mainstream ICT in the government,<br />

advise ministries/agencies and<br />

monitor progress<br />

Development of citizen<br />

identification card for service<br />

delivery purposes<br />

Advancing educational skills and<br />

quality through ICT<br />

273<br />

Source: Based on [14] & other sources<br />

Likewise, a set of policies and laws have been formulated and<br />

enacted in order to provide a legal framework for e-government in<br />

the country. The National ICT Policy formulated in 2002<br />

represents the first concrete measure that provides a<br />

comprehensive outline of the vision of e-government. The ICT<br />

policy 2002 presented e-government as a strategy for improving<br />

efficiency of the government, reducing wastage of resources and<br />

enhancing planning and raising the quality of public services. It<br />

also envisaged, among others, the establishment of<br />

telecommunication infrastructure nationwide, connecting to<br />

submarine fibre optic cable network, extending internet facility to<br />

rural areas, establishing cyber kiosks in post offices, Union<br />

Parishad and Upazila (sub-district) complexes, setting up an<br />

internet exchange and increasing the bandwidth capacity and<br />

availability [9]. Thus it had underscored the spread of ICT in<br />

governmental agencies across the country. The policy required<br />

each Ministry/Division to have an ICT unit comprised of ICT<br />

professionals and websites with policy documents and updated<br />

information.<br />

However, the implementation of the policy was anything but<br />

satisfactory. Among others, the lack of ownership and<br />

coordination among implementing agencies and absence of<br />

leadership have contributed to the failure of the policy. The<br />

Information and Communication Technology (ICT) Act was<br />

adopted in 2006. The Act was also intended to help prevent<br />

cybercrimes and safeguard online transactions so as to promote ecommerce.<br />

However, the Act could not be implemented in its true<br />

spirit as necessary rules and regulations were never introduced<br />

[9]. Following the launch of the Digital Bangladesh as the flagship<br />

project the government has promulgated a new ICT policy. The<br />

ICT Policy 2009 envisions the ICT as a tool to bring about<br />

‘transparent, accountable and responsible government’ [11]. It is<br />

fairly comprehensive for besides outlining specific objectives and<br />

priorities it has identified over 300 action items for<br />

implementation in key sectors of the economy in order to improve<br />

the delivery of services. It also seeks to develop human resources,<br />

enhance social equity and ensure cost-effective delivery of<br />

governmental services to support the national goal of becoming a<br />

middle-income country within 10 years and joining the ranks of<br />

developed nations within 30 years [11]. Another major legislation<br />

is the ICT Act 2009. This is, in fact, a slightly modified version of<br />

ICT Act 2006 which remained unimplemented. The Act provides<br />

legitimacy of the electronic records and digital signature. While it<br />

is true that the current legal framework of e-government is largely<br />

driven by ICT Policy 2009 and the ICT Act, 2009 a number of<br />

other tools and policy documents as listed in table 2 have had a<br />

significant bearing on e-government. Collectively, they provide a<br />

broad framework of e-governance in the country.<br />

Table 2: Major E-government Policies and Laws<br />

Policy/Legislation Objective(s)<br />

Telecommunications<br />

Act, 2001<br />

Facilitate liberalisation of<br />

telecommunications sector<br />

ICT Policy, 2002 Provide guidelines for development<br />

of the ICT sector


Internet Connection &<br />

Usage Policy, 2004<br />

Copyright (Amended)<br />

Act, 2005<br />

Provide a framework for the use of<br />

internet facilities<br />

Protect intellectual property rights<br />

and legalise electronic<br />

communication<br />

ICT Act, 2006 Provide legal basis of the ICT<br />

Right to Information<br />

Act, 2009<br />

Provide legal entitlement to citizens<br />

to seek public information and<br />

demand transparency &<br />

accountability of public institutions<br />

ICT Policy, 2009 Provide an up-to-date and<br />

comprehensive framework for the<br />

development of ICT with action<br />

plans consistent with Digital<br />

Bangladesh vision<br />

ICT Act, 2009 Improve legal structure of ICT by<br />

incorporating necessary<br />

amendments to ICT Act, 2006<br />

Broadband Policy, 2009 Facilitate the growth of high-speed<br />

internet services at an affordable<br />

price<br />

Telecommunications<br />

Act (Amended), 2010<br />

International Long<br />

Distance<br />

Telecommunication<br />

Services Policy, 2010<br />

Update Telecommunications Act,<br />

2001<br />

Facilitate low-cost ILDTS<br />

including VOIP services<br />

Source: Based on [14] and other sources<br />

4. TRANSFORMATION OF GOVERNANCE<br />

AND SERVICE DELIVERY: SELECTED E-<br />

GOVERNMENT PROGRAMS<br />

Although a late starter, the government of Bangladesh has<br />

initiated and implemented a large number of schemes with the aim<br />

of realizing the visions and goals as outlined above. More<br />

specifically, these programs seek to transform governance and<br />

service delivery system offering citizens with improved services.<br />

In this section of the paper we focus on selected e-government<br />

schemes that portray the current state of e-government in<br />

Bangladesh and the progress made to-date in various spheres.<br />

These are some well-known programmes and they capture G2C,<br />

G2B and G2G dimensions.<br />

4.1 Web-Presence of Government & Forms<br />

Concerted governmental drives during recent years have resulted<br />

in a considerable progress towards making government<br />

information and services available online. One clear indication is<br />

that most government agencies including ministries, divisions,<br />

departments and statutory bodies have web-presence with useful<br />

information and contact details. The national web portal of the<br />

government of Bangladesh (www.bangladesh.gov.bd) serves as a<br />

one-stop access to information and services offered by various<br />

274<br />

agencies and departments. Governmental websites and portals<br />

have begun to offer services beyond information dissemination.<br />

The Prime Minister’s Office has launched a website<br />

(www.forms.gov.bd) which has made virtually all government<br />

forms accessible online. This is a significant development in that<br />

the citizens and businesses are now able to access variety of forms<br />

without having to visit respective offices. This saves time and<br />

helps them avoid the hassle associated with visiting various<br />

agencies.<br />

4.2 Digitisation of Land Records System<br />

This involves digitisation of country’s complex and age-old land<br />

ownership records that are source of huge corruption and<br />

litigations. Following several successful pilot projects the<br />

government decided to spread the benefits of such experiments<br />

throughout the country. Currently in progress, this project would<br />

drastically reduce the complexities and corruption associated with<br />

land administration. This would greatly simplify land<br />

administration and put an end to the current practice where<br />

citizens need to visit more than 10 different agencies to obtain<br />

their records and/or to have them updated.<br />

4.3 Online Hajj Information Management System<br />

The Online Hajj Information Management system of the Ministry<br />

of Religious Affairs is an example of innovation in area of G2C<br />

service. In place since 2002 the portal serves as a source of<br />

information to thousands of pilgrims who go to Mecca to perform<br />

Hajj every year. Besides allowing verification of information like<br />

their location, health condition and flight details etc. the<br />

interactive features of the portal allow easy and reliable<br />

communication between pilgrims and their relatives.<br />

4.4 Land Resources Information System<br />

The Agro-Ecological Zone (AEZ) database of the Bangladesh<br />

Agricultural Research Council (BARC) contains information on<br />

country’s land resources including geography, soil, and climate,<br />

hydrology, cropping system and crop sustainability. This is used<br />

to generate readily accessible information of the physical land<br />

resources of the country for use by researchers, extension workers,<br />

and decision makers in land and agricultural resource<br />

management as well as for agricultural planning. This has served<br />

as the basis for the development of a more comprehensive and<br />

multi-scale GIS-based Land Resources Information System which<br />

helps deal with the intricacies of land resource planning under<br />

complex environmental conditions.<br />

4.5 Electronic Birth Registration System, RCC<br />

The Electronic Birth Registration Information System (EBRIS)<br />

introduced by Rajshahi City Corporation (RCC) with technical<br />

assistance from the UNICEF has earned award as an innovative egovernment<br />

at the local level. It allows registration of birth<br />

electronically, generates birth certificate and immunisation card<br />

for each newly born babies and list of babies due for vaccination<br />

on a particular day. The EBRIS has replaced the manual process<br />

of registration where multiple agencies were involved thus<br />

helping remove duplication of entries and other problem. Also, it<br />

has contributed to achieve near 100 % immunisation coverage in<br />

RCC area [1].


4.6 Computerisation of Railway Ticketing System<br />

Under one of the early e-government projects the Ministry of<br />

Communication computerised the railway seat reservation and<br />

ticketing system nationwide. In operation since 1996 this is now<br />

being expanded to e-ticketing where the passengers of inter-city<br />

trains will be able to purchase electronic ticket using mobile<br />

phones and other devices. This would help rail users to avoid<br />

hassle of travelling all the way to train stations and waiting in long<br />

queues for collecting tickets.<br />

4.7 Automation of Internal Processes: The<br />

Bangladesh Bank<br />

While the drives for process automation can be found in virtually<br />

every public entity, the Bangladesh Bank is among the handful of<br />

agencies that have been successful in integrating ICT in its core<br />

business processes. As such all aspects of its operation including<br />

internal management, export receipts and import payments and<br />

monitoring and supervision of commercial banks have been<br />

automated. It has also made a significant progress with electronic<br />

banking through the introduction of automated check clearance<br />

and e-payment gateway, online money transfers and payment of<br />

utility bills via the internet.<br />

4.8 HRM Database, Ministry of Public Administration<br />

The Ministry of Establishment - recently renamed as the Ministry<br />

of Public Administration was among the first to computerise part<br />

of its internal operation. The Personnel Management Information<br />

System (PMIS) is an online database that covers information of all<br />

class I officers of the government of Bangladesh. It has shown<br />

immense benefits for the ministry as well as the concerned<br />

officials. The supervisory authority uses the database for<br />

personnel management functions including the management of<br />

their annual confidential reports (ACRs). The respective officer<br />

can access his or her personal data sheet (PDS); it also allows<br />

him/her to request updating personal information to reflect<br />

changes to situation such as completion of a training program.<br />

This also helps them to track their career development and<br />

provide regular information on career opportunities.<br />

4.9 Process Automation, NBR<br />

As a result of the successful implementation of a number of<br />

donor-funded projects like Customs Administration<br />

Modernisation Project, Excise, Taxes and Customs Data<br />

Computerisation Project and Modernisation and Automation<br />

Project, much of the core businesses of the National Board of<br />

Revenue (NBR) have already been automated. Thus NBR has<br />

recorded a considerable success in its operations and objectives.<br />

For example 90% of country’s trade are now fully automated<br />

which reduces the cost of doing business on the one hand and<br />

facilitates trade and commerce on the other. This has also<br />

contributed to reduce tax evasion raising governmental revenue<br />

considerably. Significant progress has also been made with<br />

regard to e-taxation especially filing of tax returns by individuals<br />

and small businesses.<br />

4.10 E-Procurement<br />

Currently under active implementation the eGP project seeks to<br />

make public procurement system efficient, transparent and<br />

accountable. This would allow the entire cycle of procurement<br />

decisions and actions from the opening of tender to evaluation of<br />

bids and authorisation and final payment could be done<br />

275<br />

electronically. It will not only reduce time required in completing<br />

tender procedures, it will also reduce corruption leading to<br />

improvement in quality of government purchases. While the<br />

government plans to bring the entire public procurement system<br />

under e-procurement in phases, initially four government<br />

departments/agencies that handle lion’s share of government<br />

contracts - the Directorate of Roads & Highways, Local<br />

Government Engineering Department, Bangladesh Water<br />

Development Board and Rural Electrification Board - have been<br />

selected for the first phase of e-tendering pilot project (Daily<br />

Inqilab, 3 June, 2011).<br />

These alongside many other similar schemes in various spheres of<br />

public administration indicate a new trend where ICT is applied to<br />

improve internal efficiency of the government agencies at the<br />

same time making sure that the citizens and businesses get fast,<br />

reliable and hassle-free services. Clearly, e-initiatives cover all<br />

possible dimensions (G2C, G2B and G2G) of e-government and<br />

offer enormous prospects to redesign governance and service<br />

delivery in future. Progress already achieved, limited though<br />

compared to other similar contexts, like online presence of<br />

government agencies and interactive features is no less significant.<br />

When considered against e-government maturity models, it is<br />

evident that Bangladesh has progressed from information stage to<br />

permit online interaction and transactions with government<br />

agencies [for more on this, see 12, 3 & 4]. Such features allow<br />

citizens to download various government forms, policies and<br />

regulations and a range of other useful services at their own<br />

convenience. Also there are cases where people are able to pay<br />

utility bills, buy train tickets, register for admission into public<br />

universities and get results of public examinations using mobile<br />

phones. However, still benefits of e-government are limited due<br />

mainly to factors like insufficient infrastructure development and<br />

connectivity, inadequate interactive and transactional features and<br />

widespread digital divide in the society.<br />

5. BRIDGING DIGITAL DIVIDE: E-<br />

GOVERNMENT AT LOCAL &<br />

COMMUNITY LEVELS<br />

Such problems however have not escaped attention of the policy<br />

makers and other actors. This is evident in various efforts made to<br />

find innovative solutions to such problems thereby ensuring the<br />

benefits of e-government are widely shared. The Union<br />

Information & Service Centres (UISCs) are cases in point. Driven<br />

by the desire of achieving twin goals of Digital Bangladesh, i.e.,<br />

connecting citizens and delivering services at their doorsteps<br />

UISCs have been established throughout the country (Daily Star,<br />

1 Nov, 2010). Conceived and implemented under the UNDP<br />

funded A2I program, UISCs in fact represents a bold attempt at<br />

bridging digital divide and connecting the rural communities to<br />

the Internet. Equipped with computers and internet UISCs are<br />

now functioning in all 4501 unions – the lowest tier of local<br />

government offering useful services to citizens. The services<br />

offered in UISCs range from email, word processing, printing<br />

and scanning to access government forms, birth and death<br />

registration information, passport and visa support and<br />

information on public examinations to health, education and<br />

disaster management. Modelled on the successful Gyandoot<br />

project of Uttar Pradesh, India the UISCs are housed in in the<br />

local Union Parishad office and managed by local entrepreneurs.<br />

While the initial funding and hardware support came from the A2I


program and the Ministry of Local Government is responsible for<br />

coordinating the overall activities and building capacity by<br />

training relevant personnel [14] the sustainability of the scheme<br />

has been taken care of by involving local youths who run the<br />

centres and charge a modest fee for the services rendered.<br />

It is pertinent to note that a number of non-governmental<br />

initiatives have already laid the foundation for schemes like<br />

UISCs. NGO initiatives have demonstrated success in reaching<br />

out to the unreachable in the countryside. The GramenPhone<br />

Community Information Centres (GCIS) and Pallitathya Kendra<br />

(Village Information Centres) are among the leading nongovernmental<br />

initiatives in this area. GrameenPhone has set up<br />

over 500 information centres in remote locations seeking to<br />

enhance the rural communities’ access to internet and multi-media<br />

services. Managed by local entrepreneurs, who receive training<br />

and initial support from GrameenPhone, these centres offer wide<br />

range of off-line and on-line services. Usual GrameenPhone<br />

services (e.g., payphones and electronic recharge for prepaid<br />

mobile accounts services) aside, these centres provide internet<br />

surfing and emailing, chatting, computer composing, scanning and<br />

printing and information on health and education. Plans are<br />

underway to expand the range of services available via such<br />

centres. Similarly the initial success of the Pallitathya Kendra<br />

project of Development Research Network (D.Net) has led to its<br />

subsequent expansion. Currently, there are over 100 Pallitathya<br />

Kendras around the country that provide IT skills, training in<br />

computer operations, advanced IT courses, ancillary services and<br />

livelihood information. Citizens use these centres to access variety<br />

of information from common agricultural problems, socio-legal<br />

advice and financial services to medical issues [14]. An important<br />

feature of the PK is that mobile InfoLadies help make services<br />

available to those who cannot physically reach the centres. These<br />

Infoladies on their bicycles carry notes, phones and medical<br />

equipment thus making the services to those most disadvantaged<br />

and in the remotest corners of the country.<br />

The other initiatives that seek to address digital divide and make<br />

the benefits of ICT available to the disadvantaged groups include<br />

e-huts and Tathya Toris. BracNet - an affiliate of the Bangladesh<br />

Rural Advancement Committee (BRAC) established e-huts with<br />

the aim of making internet accessible to those living in rural areas<br />

at an affordable price. Currently e-huts provide technological<br />

solutions for small businesses and local people. BracNet aims to<br />

expand the scope and reach by multiplying the number of e-huts<br />

to 1000 - each serving as a one-stop shop for various types of<br />

digital services including internet browsing, basic computer<br />

training, broadband internet services, photocopying and scanning<br />

[6]. Likewise, Tathya Tori (information boat) project of the<br />

GrameenPhone is an innovative scheme that seeks to educate and<br />

empower river-based people with information and services [15].<br />

Under the support from CARE Bangladesh Tathya Toris are<br />

equipped with digital content and serve as mobile centres to<br />

provide internet and associated services to the people living in<br />

haor areas. Besides the provision of periodic medical services<br />

and computer training, Tathya Toris also make available<br />

information on agriculture, fisheries and other livelihood matters.<br />

6. MAJOR CONSTRAINTS &<br />

CHALLENGES<br />

It is obvious from the preceding discussions that Bangladesh has<br />

made slow but steady progress towards implementation of e-<br />

276<br />

government. Wide variety of measures undertaken and<br />

implemented in various spheres has helped raise country’s eprofile<br />

and readiness. However, still the overall progress is rather<br />

modest when considered against other countries around the world.<br />

The 2010 e-government survey ranks Bangladesh at 134position<br />

out of 185 nations globally [19]. Although Bangladesh has<br />

advanced from the earlier position of 142 in 2008 and placed<br />

herself ahead of Bhutan and Pakistan, on the whole this progress<br />

is far from satisfactory given the fact that compared to many other<br />

countries around the world and some of her neighbours (e.g. India,<br />

Sri Lanka and Maldives) this rank is abysmally low and the level<br />

of preparedness is far from what is required to provide integrated<br />

services to the citizens. Table 3 shows the current state of ICT<br />

infrastructure in Bangladesh and the nation’s overall position in<br />

World E-government Index. Currently, governmental drives for<br />

expanding the benefits of e-government are handicapped by a<br />

range of challenges and constraints:<br />

Table 3: Bangladesh’s Position in World E-Government<br />

Development Index, 2010<br />

World E-Government Development<br />

Index Rank<br />

Online Service Component (Rank 60)<br />

a. Points for emerging<br />

information service<br />

b. Points for enhanced<br />

information services<br />

c. Points for transaction services<br />

d. Points for connected<br />

approach<br />

Telecommunication Infrastructure<br />

Component (Rank 161)<br />

a. Estimated user per 100<br />

inhabitants<br />

b. Fixed telephone lines per 100<br />

inhabitants:<br />

c. Mobile subscriber per 100<br />

inhabitants<br />

d. Personal computers per 100<br />

inhabitants:<br />

e. Total fixed broadband per<br />

100 inhabitants:<br />

Human Capital Component (Rank 167)<br />

a. Adult literacy rate:<br />

a. Combined gross enrolment<br />

ratio for<br />

primary, secondary and<br />

tertiary schools:<br />

E Participation index (Rank 102)<br />

Source: [17: p. 117]<br />

2010 2008<br />

134 out<br />

of 190<br />

48<br />

44<br />

05<br />

15<br />

0.32<br />

0.84<br />

27.90<br />

2.25<br />

0.03<br />

53.50<br />

48.46<br />

0.1000<br />

142 out<br />

of 192<br />

NA<br />

NA<br />

NA<br />

NA<br />

0.31<br />

0.79<br />

13.25<br />

2.42<br />

0.00<br />

47.50<br />

56.01<br />

Rank 78<br />

6.1 Infrastructural Challenges<br />

The infrastructure serves as the backbone of e-government. It<br />

encompasses computers and telecommunications capacity in terms<br />

of wireless and broadband networks. In order to avail the fruits of<br />

ICT revolution compatible ICT infrastructure must be in place.<br />

Viewed from this perspective, the overall situation in Bangladesh<br />

is hardly satisfactory. Computer Ownership per 100 people is


abysmally low (2.25). In addition to those presented in table 3<br />

other evidence indicates a poor state of affairs. Internet penetration<br />

rate has been very low: there are only 204 internet service<br />

providers (IPS) 80% based in Dhaka, and the number of regular<br />

internet users is 3 million. Tele-density per 100 people is 32.04;<br />

number of fixed phone lines in 2007 of 1.12 mil and mobile phone<br />

users of 76.43 million (2011). In fact, inadequate infrastructure is<br />

a huge challenge for the government as well as the citizens.<br />

Despite very many efforts made to build strong ICT infrastructure<br />

still most government agencies operate with manual systems and<br />

procedures making digitisation of data an enormous task. The ratio<br />

of personal computers to staff of government offices has improved<br />

–but still low. This means that many of those junior officers and<br />

those working at the field levels are without much needed<br />

computers which hamper the delivery of services online. Also,<br />

government departments and agencies are not interconnected<br />

between themselves and with their field offices; the networking<br />

infrastructure is weak outside capital and major cities [12].<br />

Given the fact that ICT penetration in Bangladesh is still low,<br />

people having no or limited access to Internet are unable to enjoy<br />

the benefits of e-government, even if services are available<br />

electronically. Evidence shows that despite recent improvements<br />

in ICT infrastructure, Bangladesh is still at the bottom of network<br />

readiness index and ranked 118 among 133 countries [8]. The<br />

proportion of households with computers increased from 0.8 in<br />

2002 to 1.9 in 2007 and the proportion of households with internet<br />

has increased from 0.1 in 2002 to 1.3 in 2007. The problem is<br />

exacerbated by inadequate supply of electricity and the<br />

concentration of PC and Internet users in major cities and towns.<br />

Majority of the population in Bangladesh are without electricity<br />

and those having access to it also experience regular blackout and<br />

disruptions without notice. Likewise, computers are still too<br />

expensive for most Bangladeshi households and the Internet<br />

remains costly on the one hand and unreliable in most parts on the<br />

other. Even the introduction of mobile Internet and WiMax<br />

technology that promises to break the barrier of reaching the<br />

unreachable has recorded limited success given that very few<br />

users are currently prepared or trained to use such devices to<br />

access government information and services.<br />

6.2 Digital Divide<br />

Bangladesh is a country of extreme disparities. Such disparities<br />

seem to be widening in recent times as the vast majority of the<br />

population remain unaffected by the ICT revolution,<br />

notwithstanding the governmental drives to bridge the divide by<br />

making the ICT services to those who cannot afford them.<br />

Without doubt, the existing programs are steps in the right<br />

direction- but they are grossly inadequate to tackle the massive<br />

gaps created by the ICT revolution. The government is faced with<br />

an enormous challenge to ensuring that people of various socioeconomic<br />

strata have equitable access to services and benefits. As<br />

noted, access to Internet and ownership of PCs are<br />

disproportionately concentrated in Dhaka and major cities. It is<br />

true that the internet users and broadband networks are growing,<br />

however this appears to create further divide between the cities<br />

and rural areas, between the educated and affluent segments of the<br />

population and the poor and ordinary masses. Although data on<br />

gender, age of ICT users are unavailable, it is conceivable that the<br />

vast majority of those using ICT in Bangladesh are male and<br />

young – not female and elderly. Prevailing problems like massive<br />

277<br />

poverty and inequality, illiteracy and widespread corruption<br />

contribute to widen the gaps further under of e-government.<br />

6.3 Inadequate Human Capital<br />

Low levels of literacy among the general masses and lack of<br />

efficiency among the government servants responsible for<br />

implementing e-government initiatives frustrate governmental<br />

drives. It is ironical that despite being one of the most populous<br />

countries in the world, inadequate human capital continues to be a<br />

major barrier to e-government in Bangladesh. First, lack of literacy<br />

poses a formidable challenge to the development of a competent<br />

user group in the country. Currently Bangladesh’s Human Capital<br />

Index is only 0.5182 with adult literacy rate of 53.5% and the<br />

combined gross enrolment of primary, secondary and tertiary<br />

schools being 48.46% [19]. This low level of literacy makes it<br />

difficult for nearly half of the population fails to understand any<br />

meaning of e-government. Second, though projects are underway to<br />

promote IT literacy among the students the use of those equipment,<br />

especially in rural areas, is far from optimal because of such<br />

setbacks as interrupted power supply, poor location, unavailability<br />

of trained personnel, low motivation and awareness among those<br />

involved.<br />

Third, the current level of skills and expertise available in the public<br />

sector is inadequate. A recent study shows that 52% of the officers<br />

of the Bangladesh who are IT literate do not find their skills<br />

sufficient to perform daily work and only 38.7% use ICT in official<br />

activities. A vast majority of the officers (82%) felt that they needed<br />

training to be able to discharge their duties [13]. Training programs<br />

run by government and private institutions have generally failed to<br />

keep pace with the developments and growing demands; whatever<br />

training is available rarely need-based and carefully planned to<br />

allow application in the workplace. The Bangladesh experience also<br />

shows disconnects between high level policy development and lower<br />

level engagement and commitment, between infrastructure capacity<br />

and field level operations. Many public officials have access to<br />

computers and internet but they rarely make appropriate use of such<br />

facilities. It merely suggests that the potential of such tools remains<br />

mostly underutilised; they are used primarily for purposes other than<br />

service delivery for example word-processing, browsing the internet<br />

and for preparing presentational materials.<br />

6.4 Financial, Legislative and Regulatory Constraints<br />

E-Government in Bangladesh is still in its infancy. Despite the<br />

recent drives and programs, the vision of using ICT to improve<br />

governance and quality of life of citizens has not been fully<br />

embedded in the legal and regulatory framework [14] As<br />

indicated, the current legislative and regulatory framework of egovernment<br />

driven mainly by two important documents - the ICT<br />

Policy 2009 and the ICT Act 2009 has addressed many of the<br />

inadequacies and concerns, yet it fails to provide a comprehensive<br />

and robust basis for e-government. While the government aims to<br />

provide greater public access to ICT and facilitate transactions and<br />

services, the existing laws are insufficient in terms of privacy,<br />

security and intellectual property rights [14]. In the current<br />

context there is a feeling that a far more comprehensive legislative<br />

framework is required than at present, not just for tackling<br />

cybercrimes and for electronic certification and authentication<br />

purposes but also for standardisation of government data and<br />

information, security of shared services platforms and the like [2].<br />

Needless to add that poor legal and regulatory framework along<br />

with insufficient ICT infrastructure serves as a fundamental


constraint on online and integrated services. Also, a key challenge<br />

of e-government in Bangladesh is limited funding from the<br />

government and its heavy reliance on donor support. Budgetary<br />

allocation for e-government has remained inadequate; although it<br />

has increased in volume it continues to remain very low as a<br />

percentage of total developmental spending. The planned target of<br />

increasing governmental spending for ICT sector to 2% of the<br />

annual development plan (ADP) has remained far way off. In<br />

2009-10 budget the government allocated $ 20.83m to ICT<br />

development which represents a mere 0.43% of the total ADP.<br />

7. CONCLUSION<br />

It is obvious that Bangladesh has made slow but important<br />

progress towards implementation of e-government. Although<br />

initial drives began in the late 1990s, the e-government campaign<br />

received a major push in recent times which paved the way for the<br />

development of key ICT infrastructure – both hardware and software<br />

- and some important initiatives. Variety of schemes initiated<br />

and implemented since the early years have raised Bangladesh’s eprofile<br />

and e-readiness. Currently virtually all public agencies<br />

including those at the field level have their web-presence; they<br />

also offer informational and in limited cases, interactive and<br />

transactional services. Bangladesh has also seen the introduction<br />

of a number of innovative schemes that promise to transform<br />

nature of governance and pattern of interaction between the<br />

government and citizens and deliver significant gains in terms of<br />

efficiency, convenience and accountability, among others.<br />

Attempts are currently underway to expand the range of services<br />

that could be offered online and to ensure that those without<br />

access to new technology are able to enjoy the benefits of ICT<br />

revolution. Taken together they have marked the beginning of<br />

citizen-centric public administration: members of the public are<br />

now provided with alternative channels of accessing services in a<br />

more hassle-free environment.<br />

However, it must be emphasized that e-government has yet to<br />

bring about a fundamental change in public governance as most<br />

programs have not gone beyond informational and interactive<br />

stages and the vast majority of services continue to be provided<br />

through traditional channels. The expansion of e-government<br />

benefits has been handicapped by a range of constraints and<br />

limitations. As shown, the barriers and challenges that Bangladesh<br />

faces are complex and multi-dimensional which must be overcome<br />

in order to achieve radical change to the process of governance<br />

and service delivery. In fact, the experience of e-government<br />

around the world shows that there is no quick fix to such<br />

challenges. It requires robust leadership, continuous drive and<br />

innovation in different spheres where the government, the private<br />

sector, NGOs and members of the community all have important<br />

roles to play. Perhaps the most critical in this regard is the<br />

commitment and conviction on part of political and administrative<br />

leadership to carry this task forward. Without such commitment<br />

and sustained efforts the vision of Digital Bangladesh is unlikely<br />

to be realized.<br />

8. REFERENCES<br />

[1] Akther, M.S., Onishi, T. and Kidokoro, T. (2007).’ Egovernment<br />

in a developing country: citizen-centric approach for<br />

278<br />

success’, International Journal of Electronic Governance, 1(1): 38-<br />

51<br />

[2] Bangladesh Enterprise Institute (BEI) (2010). Realizing the<br />

Vision of Digital Bangladesh through E-Government, July.<br />

[3] Bhuiyan, M.S.H. (2010). E-Government Applications in<br />

Bangladesh - Status and Challenges, Paper presented at Fourth<br />

International Conference on Theory and Practice of Electronic<br />

Governance October 25-28, Beijing China.<br />

[4] Bhuiyan, S.H. (2011). ‘Modernizing Bangladesh public<br />

Administration through e-governance: Benefits and challenges’,<br />

Government Information Quarterly, 28: 54-65<br />

[5] Bhatnagar, S. (2004). E-Government: From Vision to<br />

Implementation, New Delhi: Sage Publications<br />

[6] Ebrahim, A. Pirson, M. and Mangas, P. (2009). ‘Brummer and<br />

the bracNet Investment’, Harvard Business School, April.<br />

[7] Faroqi, M.G. and Siddiquee, N.A. (2011). ‘Limping into the<br />

Information Age; Challenges of E-Government in Bangladesh’,<br />

Journal of Comparative Asian Development, 10(1): 33-61.<br />

[8] GITR (2009). The Networked Readiness Index & Ranking<br />

2009-2010, The Global Information Technology Report 2009-10,<br />

World Economic Forum.<br />

[9] Government of Bangladesh (GoB) (2002). National Information<br />

and Communication Technology (ICT), Policy 2002, Dhaka:<br />

Ministry of Science and Information and Communication<br />

Technology.<br />

[10] GOB (2009a). E-Government Bulletin January: Access to<br />

Information Program, Dhaka: Prime Minister’s Office<br />

[11] GOB (2009b). National Information and Communication<br />

Technology (ICT), Policy 2009, Dhaka: Ministry of Science and<br />

Information and Communication Technology.<br />

[12] Hasan, S. (2011). E-Government in Bangladesh Public<br />

administration: Impact on the Procedure of Interaction, PhD thesis<br />

submitted to the University of Sydney, August.<br />

[13] Hoque, S.M.S. and Zaman, F. (undated). ‘E-Government:<br />

Preparedness of the Bangladesh Civil Service’. Unpublished paper.<br />

[14] Institute of Governance Studies (IGS) (2009). Digital<br />

Bangladesh: The Beginning of Citizen-Centric E-Government? IGS:<br />

BRAC University.<br />

[15] Islam, M.A. and Tsuji, K. (2009).’Bridging digital Divide in<br />

Bangladesh: Study on Community Information Centres’, The<br />

Electronic Library, 29(4); 506-522.<br />

[16] OECD (2003). The E-Government Imperative, OECD E-<br />

Government Studies.<br />

[17] Rahman, T. and Khan, N.A. (2012). ‘Reckoning Electronic<br />

Government in Bangladesh’, International Journal of Public<br />

Administration, 35: 112-121<br />

[18] United Nations (UN) (2008). E-Government Survey: From E-<br />

Government to Connected Governance, Ney York.<br />

[19] UN (2010). Global e-Government Survey, 2010, UN<br />

Department of Economics and Social Affairs.


Evaluating and Assessing a Typology of Ubiquitous City<br />

Services by Classifying and Assigning Actual Services<br />

from an Inventory of Identified Services in Practice<br />

Jungwoo Lee<br />

jlee@yonsei.ac.kr<br />

Hyejung Lee<br />

h.jlee@yonsei.ac.kr<br />

Taesung Kim<br />

Yonsei University<br />

Yonsei University IT Policy & Strategy Research Institute<br />

Seodaemungu, Yonseiro 50, NMH 412 Seodaemungu, Yonseiro 50, NMH 412 Seodaemungu, Yonseiro 50<br />

120-749, Republic of Korea, Seoul 120-749, Republic of Korea, Seoul 120-749, Republic of Korea, Seoul<br />

+82-10-5398-7751<br />

+82-2-2123-4526<br />

+82-2-2123-8308<br />

ABSTRACT<br />

Two trends are obvious in urban management. Urban areas are<br />

increasing in scope and population worldwide, and ubiquitous<br />

services(u-services) are becoming critical in urban management<br />

worldwide. Though many u-services are under development, no<br />

consensus seems to be made concerning common typology,<br />

though a number of frameworks are suggested. In this study,<br />

efforts are concerted to heuristically validate a rather<br />

comprehensive typology of u-city services. Using 228 u-services,<br />

inventoried and presented in u-Eco City projects in Republic of<br />

Korea, classifying exercises are conducted, by three experts in the<br />

field, against a most popularly quoted typology. Findings indicate<br />

that the selected typology is high on comprehensively<br />

exhaustiveness and empirical applicability while low on mutual<br />

exclusivity, simplicity and theoretical contribution. Implications<br />

for improving the typology are suggested followed by limitations<br />

and directions for further research.<br />

Categories and Subject Descriptors<br />

K.4.0 [COMPUTERS AND SOCIETY]: General<br />

General Terms<br />

Design, Standardization<br />

Keywords<br />

U-City Services, Service Classification, Classification, Validation,<br />

Service Typology, Typology<br />

1. INTRODUCTION<br />

With the advances in ubiquitous technologies, attempts were<br />

made to change the paradigm of urban development by<br />

introducing those technologies into city planning and<br />

management. These attempts are attracting attentions from city<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

279<br />

sgtkimts@yonsei.ac.kr<br />

administrators. Many cities are developing and implementing uservices<br />

using U-technologies, positioning themselves as u-city or<br />

smart city [1], [2], [17].<br />

U-services are (1) available to a large number of beneficiaries as<br />

they cover almost every dimension of human life and municipal<br />

administration; (2) likely to develop into convergence services by<br />

combining with many different functions; and (3) expected to help<br />

enhance efficiency through inter-service interactions unlike the<br />

existing unit services which are typically walled by functions. In<br />

reality, local governments are developing u-services independent<br />

from each other due to current institutional walls. This seems to<br />

lead into inefficiencies in u-service operations as well as<br />

overlapping investments [3], [4], [5].<br />

To overcome these problems, it is important to standardize uservices.<br />

Relevant authorities’ service systems which have been<br />

separately managed should be connected and talk to each other<br />

using a bit standardized definitions and technical details, enabling<br />

us to build integrated operations centers for different u-cities and<br />

services [17].<br />

These integrated operation centers may play a critical role in<br />

providing efficient u-services to its people and enhancing their<br />

convenience of living and quality of life by using state-of-the-art<br />

IT infrastructure and ubiquitous information services to make the<br />

urban environment more sustainable. For connection and<br />

expansion of u-services, it is necessary to classify the services<br />

first so that their types and interrelationships can be identified,<br />

theoretically and practically. For this purpose, previous studies<br />

have attempted to develop and synthesize a u-service typology.<br />

However, most of these typologies are based on theoretical or<br />

normative point of view. The appropriateness of these typologies<br />

is scarcely put into empirical verification.<br />

In this regard, this study selected a relatively comprehensive<br />

typology of u-services presented in a academic literature, and<br />

evaluate this typology, heuristically and intensively, using 228 uservices<br />

inventoried and identified in U-Eco City projects [1].<br />

Results of the study are presented at the end with suggestions for<br />

enhancements.<br />

2. RELATED WORK<br />

2.1 U-service typology<br />

Table 1 list the previous studies in which any type of u-service<br />

typology are presented. In studies conducted before 2008, the u-


services were mainly classified in terms of service providers,<br />

urban activities/functions and special differences. Many of those<br />

studies failed to depart from the patterns of classifying the<br />

services by pre-defined administrative functions. Moreover, they<br />

have a limitation in understanding inter-service relationships, due<br />

to the lack of view on bigger goals such as objectives, and<br />

methods of classifications [9], [10], [13], [15]. K. S. Jeong claims<br />

to propose an integrated typology combining and merging existing<br />

typologies [6]. His typology uses four larger categories, nine<br />

medium categories and thirty four small categories, covering<br />

physical space, electronic space, service types, and aspects of<br />

service providers, element technologies and values. It is claimed<br />

as a flexible, comprehensive and multi-dimensional typology that<br />

may allow components and elements of a city, providing criteria<br />

Table 1. Previous Typologies of U-Services<br />

for applying in a variety of combinations. In addition to Jeong,<br />

others also have proposed u-service typologies. However, no<br />

efforts have been concerted minimum level of evaluation of such<br />

typologies.<br />

These typologies seem to be not much based on empirical<br />

evidence but formed from a theoretical or normative perspective.<br />

The ideal typology of any kind in scientific research is based on<br />

empirical induction from corroborative data, but actually in social<br />

science research it is difficult to derive such an inductive model<br />

[13], [16]. Therefore, in social sciences, models of intentional<br />

classification are commonly used as alternatives, which are<br />

difficult to evaluate in terms of validity because they have not<br />

been verified with empirical evidence.<br />

Type Service category Service areas<br />

Personal Life Culture/Entertainment, Health/Welfare<br />

Industry classification,<br />

Industrial Economics<br />

KETI 2006 [15]<br />

Business/Commerce, Communications/Broadcasting/Publishing,<br />

Construction, Finance/Insurance, Logistics/Transportation, Information<br />

Public Administration General Administration, Social Security Administration<br />

Public sector<br />

Facilities management, Environmental,<br />

Security /Police/Safety, Transportation, Complaints/Administrative<br />

Service provider, Jung<br />

(2007)[9]<br />

Private sector<br />

Corporations<br />

Individuals<br />

Business/Commerce,Communications/Broadcasting/Publishing,Finance/Ins<br />

urance, Logistics/Transportation, Construction, Information<br />

Dwelling-houses, home, health/welfare, education,<br />

culture/recreation/tourism<br />

Industry support U-work, U-convention<br />

City activities and Community support U-government, U-administration, U-tourism, U-office/business, U-learning<br />

features, Lee (2007)<br />

[10]<br />

Life support<br />

Construct city<br />

U-home, U-health, U-Prevention/Police Administration<br />

U-Port, U-underground facility, U-Traffic, U-Facilities Management, U-<br />

Environmental Management<br />

City component‧<br />

features, Lim (2008)<br />

[12]<br />

Life<br />

Industry<br />

Public<br />

U-Dwelling-houses, U-Education, U-Broadcasting/Communication, U-<br />

Prevention/Police Administration<br />

U-Production, U-Business, U-Logistics, U-security<br />

U-Defence, U-administration, U-health/welfare, U-Culture/Tourism, U-<br />

Traffic/Transportation<br />

Environment U-environment, U-disaster<br />

Laws Regulations<br />

Spatial unit Building, street, district, facility, city, broadband<br />

Space factor<br />

Spatial facilities<br />

Comprehensive<br />

By whom<br />

typology for U-city Human factor<br />

For whom<br />

service, Jeong (2009)<br />

Goals<br />

[6]<br />

Activities<br />

Function factor<br />

media facilities, Unit Space control facilities, Community complex,<br />

integrated control center<br />

Public, private, public-private partnership<br />

Public agencies, citizens, Company<br />

Life support, business support, industrial support<br />

Living healthy, Security and Safety, Community, Education, Economy,<br />

Leisure, Culture<br />

Behaviours Living, Working, Moving, Playing, Cybering<br />

Commonalities Common-based services, Specialized services, Potential service<br />

Also, there are not many studies of the criteria that can be used to<br />

evaluate the social science models of classification. Since it is<br />

difficult to verify the social science models empirically, a<br />

theoretical evaluation must be involved, but there have been few<br />

attempts to study the criteria by which to verify them theoretically.<br />

Recently, in order to resolve the problem, Y. H. Chun suggested<br />

five conditions under which to evaluate the fitness of a typology<br />

[13]. This study aims to make clear the ambiguous definitions of<br />

u-services by empirically and theoretically evaluating Jeong’s<br />

280<br />

typology in view of the five conditions suggested and to suggest a<br />

way to build a better typology.<br />

2.2 General Conditions to be a Good<br />

Typology<br />

Chun suggested that the classification model for a desirable<br />

typology should meet five general conditions: 1) exhaustiveness,<br />

2) mutual exclusiveness, 3) parsimony, 4) empirical workability,<br />

and 5) theoretical fruitfulness [13], [16].


Exhaustiveness indicates that all categories should be included<br />

within a typology. For U-services, exhaustiveness has an<br />

important significance in that the U-services are not fixed or static<br />

but highly likely to develop into convergence services according<br />

to their necessity. If a U-service typology lacks exhaustiveness, it<br />

may be meaningless as a typology because it will not cover all of<br />

the U-services that can be created or terminated depending on<br />

environment.<br />

Mutual exclusiveness can be a good condition for typology in that<br />

confusion may be caused if there is a logical overlap between<br />

categories or if a single concept simultaneously falls into different<br />

categories, but actually it is difficult to meet in social sciences<br />

where each classification target does not have a rapid discontinuity<br />

between categories. In particular, the condition of mutual<br />

exclusiveness is difficult to satisfy in U-services that include many<br />

convergence services, and thus if this is taken into account, it will<br />

end up just in enumeration, not in classification.<br />

Parsimony is the concept that when other conditions are the same,<br />

the simpler classification model the better and the more<br />

complicated the worse. However, the parsimony a typology has is<br />

commonly against the practical value of the classification model.<br />

Accordingly, if a category becomes too wide for parsimony, the<br />

classification may be made simpler than necessary and thus not be<br />

of help in empirical studies or practical applications. For U-service<br />

classification models, it is difficult to ensure parsimony due to the<br />

complexity of U-services themselves. However, if the principle of<br />

parsimony is not met, the U-service classification models can end<br />

up merely serving for enumeration, not as typology, due to the<br />

complexity of services themselves.<br />

Empirical workability indicates that operations for measurement<br />

should be possible when verification is conducted with an<br />

involved person’s arbitrary decisions limited to a minimum in<br />

classification. However, the lack of such empirical workability is a<br />

troublesome problem which is present in most classification<br />

models available in social sciences and can be considered as an<br />

inherent limitation of social science research that takes advantage<br />

of abstract concepts.<br />

Theoretical fruitfulness is that it will be good if eventually a<br />

typology itself presents a generally acceptable theory. As<br />

mentioned above, this theoretical fruitfulness commonly conflicts<br />

with empirical workability. The reason is that due to the<br />

abstractness of classification criteria it is very uncommon that the<br />

classification models making theoretical fruitfulness actually<br />

extend to empirical studies.<br />

In this study, we selected Jeong’s typology and heuristically<br />

classified 228 unit U-services being currently developed in Korea<br />

after their application to the selected system. The results of<br />

classification were empirically analyzed in terms of whether they<br />

are compliant with the five conditions. Through the analysis this<br />

study identified the shortcomings of the total U-service typology<br />

and other things that need to be made up for in the system.<br />

3. ANALYSIS<br />

In evaluating the appropriateness of Jeong’s U-service typology,<br />

this study examined the distribution patterns and characteristics of<br />

current services by assigning 228 unit services to eight medium<br />

classification categories (i.e., spatial units, spatial facilities,<br />

service providers, beneficiaries, service objectives, urban activities,<br />

281<br />

human behaviors, and function-implementing methods), exclusive<br />

of laws/institutions.<br />

3.1 Procedure<br />

The medium category of “laws/institutions,” unlike other<br />

classification criteria, represents which laws include U-servicerelated<br />

provisions, rather than a set of actual services. This<br />

category was excluded because it was not fit for the purpose of<br />

this study, and eight other medium categories of actual services<br />

were used in this study.<br />

In the classification of U-services into eight medium categories,<br />

the 228 unit services were verified through in-depth interviews<br />

with three experts selected from those who participated in the U-<br />

Eco City project for two or more years. As the first activity of<br />

service classification, each expert reviewed a list of 228 Uservices<br />

and classified the U-services appropriately into one of the<br />

given categories. The second activity was to compare the Uservice<br />

classifications with those by two other experts. In the<br />

coherence of service classification, 195 (85.5%) of 228 unit<br />

services were consistently classified by all the three experts as<br />

“culture, tourism or sports” but the classification of 11 services<br />

(4.8%) was completely inconsistent among the experts who<br />

categorized them as “transportation, health care, facility<br />

management or labor/employment.”<br />

3.2 Heuristics Used<br />

Table 2(Fig. 1-8) shows how the services were categorized. The<br />

classification of 228 unit services by the given criteria revealed the<br />

following limitations: (1) the definitions of some small categories<br />

were unclear to use for classification purposes; (2) there was a<br />

preponderance of certain categories in the classification of Uservices;<br />

and (3) there were similar items overlapping between<br />

medium-categories.<br />

First, some classification criteria were unclearly defined. Two<br />

examples are the definition of information media facility services<br />

as types of “services provided from fixed facilities” and the<br />

definition of unit-space control facility services as types of<br />

“services limited to facilities and their attached facilities.” Both<br />

of the definitions reflect the concept of “services provided from<br />

facilities,” and accordingly this causes confusion when services<br />

are actually classified. For instance, the “traffic signal violation<br />

enforcement service” working on the road can be recognized as<br />

being provided from fixed facilities and at the same time viewed<br />

as that limited to attached facilities. Moreover, if it is unclear<br />

whether service beneficiaries are the public or business entities,<br />

the human behavior forms of moving and cybering can be<br />

considered for service classification. Second, when the 228 unit<br />

services were classified in terms of their names, some<br />

classification criteria were found to play only a nominal role rather<br />

than serve as typology. For example, in the service classification<br />

by urban activities, the category of “security/safety” represented<br />

95% of transportation services, 100% of crime/disaster prevention<br />

services, and 93% of facility management services; and the<br />

category of “leisure” included 94% of culture, tourism and sports<br />

services. This typology does not seem to reflect service types in a<br />

balanced way, and therefore further studies need to focus on<br />

reducing the uneven distribution of classification items and<br />

making classification criteria more practical. Third, there were<br />

similar items overlapping between medium categories. Especially,


such overlapping was prominent between the medium categories<br />

of urban activities and human behavior.<br />

In this study, urban activities were subdivided into life/health,<br />

security/safety, community, education, economy and leisure, and<br />

human behavior was classified into living, working, moving,<br />

playing and cybering. In the human behavior category, living,<br />

playing and working seem similar to life/health, leisure and<br />

economy, respectively, in urban activities. Actually, these<br />

similarities were found in the classification of U-services as well.<br />

In the medium category of “service objectives” with three small<br />

categories (i.e., life support, activity support and industrial<br />

support) thereunder, life support and activity support can be<br />

considered as corresponding to life/health and economy,<br />

respectively, in the urban activities category, and likewise they are<br />

also similar to living and working, respectively, in the human<br />

behavior category. Consequently, there are semantic overlaps not<br />

only between the three medium categories of service objectives,<br />

urban activities and human behavior under the large category of<br />

“functional elements” but between their subcategories as well. A<br />

solution to this overlapping problem is to develop different types<br />

of medium categories or provide small categories directly under<br />

the large category of “functions.” More studies will be needed on<br />

the way to improve the classification of functions by removing<br />

overlaps from small categories [Supplementary table 1].<br />

3.3 Analysis Results<br />

The present study analyzed a U-service typology empirically<br />

through the categorization of U-services. In light of the study<br />

findings, we can assume that Jeong’s U-service typology is high in<br />

exhaustiveness and empirical workability and low in mutual<br />

exclusiveness, parsimony and theoretical fruitfulness.<br />

1) Exhaustiveness: Unlike the previous studies which analyzed<br />

services from a single or two points of view, Jeong attempted<br />

to explain his typology from nine different points of view. In<br />

the process of analyzing 228 unit services, his typology<br />

covered all the services as classified. These facts indicate that<br />

Jeong’s typology is highly exhaustive.<br />

2) Mutual exclusiveness: Even though Jeong’s typology<br />

satisfies the condition of exhaustiveness, it is difficult to say<br />

that it is faithful to the principle of mutual exclusiveness,<br />

because of cases where a single unit service falls under more<br />

than one category simultaneously. Emergency medical<br />

service and U-ski service can be taken as examples of this.<br />

Emergency medical service is to give first aid to a patient<br />

while he/she is being carried in an ambulance, reviewing<br />

patient data with a doctor in hospital. U-ski service helps<br />

users to use ski equipment rentals and lifts conveniently and<br />

provides supports for skiers to monitor their movements and<br />

routes in play and check their achievement records. In this<br />

Table 2. Relevance of Jeong’s classification<br />

3)<br />

study, both of the two services were thought to take not only<br />

a form of life support—for example, making life more<br />

convenient or helping the ambulance crew save a patient’s<br />

life—but also a form of activity support—for example,<br />

helping skiers improve their performance. As a result, they<br />

overlapped between two different areas.<br />

Parsimony: Jeong’s typology consists of 9 medium categories<br />

and 34 small categories. It was a good attempt to try to cover<br />

all possible things on a categorical basis, but his typology is<br />

bad in terms of parsimony because it involves too many<br />

subdivision levels and thus takes a very complicated form.<br />

This low parsimony is also associated with overlaps between<br />

medium categories founded in the empirical analysis. It<br />

should be noted that it is somewhat inevitable to sacrifice<br />

parsimony for comprehensiveness and practicability, but if<br />

any typology does not maintain a certain level of parsimony,<br />

it may end up just enumerating or listing things, not<br />

analyzing them as intended.<br />

4) Empirical workability: This is that operations for<br />

5)<br />

measurement should be possible at acceptable level. Some of<br />

classification criteria were found unclear or ambiguous, but<br />

experts who participated in this study showed consensus in<br />

85.5% of the 228 unit services they categorized using the<br />

present typology. This indicates that the system has high<br />

empirical workability. In general, empirical workability is<br />

low in social science studies as abstract concepts are used,<br />

but Jeong’s typology ensures high empirical workability<br />

because his suggested classification criteria are based on<br />

substantial concepts.<br />

Theoretical fruitfulness: The primary purpose of developing a<br />

classification model is to discover a certain pattern and<br />

regularity from real-world information which appears messed<br />

up, scattered and diverse. In this sense, theoretical<br />

fruitfulness is an important principle for evaluating a<br />

classification model. In view of the current level of<br />

contribution, the U-service typology used in this study seems<br />

limited as it just takes a combination of other typology rather<br />

than advances a new theory. This limitation resulted in a<br />

preponderance of certain categories in the empirical analysis.<br />

For example, in the service classification by urban activities,<br />

the “security/safety” category represented 95% of<br />

transportation services, 100% of crime/disaster prevention<br />

services and 93% of facility management services; and the<br />

“leisure” category included 94% of culture, tourism and<br />

sports services. In short, the services were unevenly<br />

distributed among given categories, like a set of services<br />

entirely belonging to a single category. This indicates that the<br />

present typology failed to play its role properly.<br />

Summarizing all the findings above together, relevance of Jeong’s<br />

typology can be described as shown in Table 3.<br />

Exhaustiveness Mutual exclusiveness Parsimony Empirical workability Theoretical fruitfulness<br />

Suitability + - - + -<br />

282


Fig. 1 Spatial Unit<br />

Fig. 3. By whom<br />

Fig. 5. Objectives<br />

Fig. 7. Behaviour<br />

Table 3. Service Classification Results<br />

283<br />

Fig. 2 Spatial facilities<br />

Fig. 4. For whom<br />

Fig. 6. Activities<br />

Fig. 8. Commonality


4. CONCLUSION<br />

This study empirically evaluated the appropriateness of a Uservice<br />

typology by applying 228 unit U-services to Jeong’s<br />

typology for the categorization of the services. As compared to the<br />

previous studies of u-service typologies which regarded it as<br />

meaningful to develop a theoretical framework for classification<br />

of U-services, it is important to note that this study found the<br />

problems with the present typology via empirical heuristic<br />

application and identified problem areas. Jeong’s typology was<br />

found to have high exhaustiveness and empirical workability when<br />

the system was analyzed from empirical and theoretical points of<br />

view. Since u-services are variable according to service categories,<br />

they can be newly developed or combined when the needs for<br />

them increase in future with technological or environmental<br />

changes. The high empirical workability of the typology used in<br />

this study can be explained by the fact that there was a consensus<br />

of 85.5% among experts in U-services when they categorized the<br />

services using the typology. High empirical workability helps<br />

reduce confusion in a process of service development as it allows<br />

U-services to be accurately classified. The results from an<br />

empirical analysis suggest that the classification criteria should be<br />

defined more clearly so that empirical workability is enhanced.<br />

However, Jeong’s U-service typology needs to be improved in<br />

terms of mutual exclusiveness, parsimony and theoretical<br />

fruitfulness. Such typology provides a foundation in building a U-<br />

Eco City and must be organized for extension to broadband<br />

services. This study is significant in that it attempted empirical and<br />

theoretical analyses of a U-service typology and came up with<br />

ways to evaluate and improve the typology, but on the other hand<br />

its research methodology was limited to qualitative approaches. In<br />

order to recover this limitation, future studies will need to build an<br />

improved typology through a quantitative analysis of contents.<br />

5. ACKNOWLEDGMENTS<br />

This work was partially supported by Office of Research Affairs<br />

(2010-7-0571) at Yonsei University, Seoul, Republic of Korea.<br />

Authors also appreciate help and support of Ms. Hahyun Kim and<br />

Dr. Minjung Lee in preliminary analysis of this study.<br />

This research was partially supported by a grant (07High Tech<br />

A01) from High tech Urban Development Program funded by<br />

Ministry of Land, Transportation and Maritime Affairs of Korean<br />

Government. Preliminary results of this study have been reported,<br />

in Korean, in the Journal of Korean Society of IT Services, 11(1),<br />

pp. 325-340, in March 2012.<br />

6. REFERENCES<br />

[1] Ministry of Land, Transport and Maritime Affairs, U-Space<br />

Construction Technology, 2010<br />

[2] H.J. Woo, J.H. Lee, S.Y. Park, "Proposing User-Oriented u-<br />

Service Classification by Ubiquitous Characteristic", Journal<br />

of the Korea Society of IT Services, V.10 N.2, pp.119~139,<br />

2011<br />

284<br />

[3] H. J. Roh, "Analysis on the u-City Conceptual Design Factors<br />

from Ubiquitous Computing Technology", Master Thesis,<br />

Yonsei University, 2005<br />

[4] J. C. Kwon, "A study on Law and Institution environment for<br />

Development of U-city", National Information Society<br />

Agency (http://www.nia.or.kr/), 2006<br />

[5] H. M. Oh, A study on Service Convergence Roadmap for<br />

Ubiquitous Environment, National Information Society<br />

Agency (http://www.nia.or.kr/), 2006<br />

[6] K. S. Jeong, T. H. Moon, S. Y. Heo, "A Study on U-City<br />

Service Classification and the Service Framework for the<br />

Standardization of U-City Service", Korea Planners<br />

Association ,V.44, N.3, 2009<br />

[7] Gu Kim, "A study on U-City service priorities and the spread<br />

strategy", JOURNAL OF KOREAN ASSOCIATION FOR<br />

REGIONAL INFORMATION SOCIETY, V11 No. 1, pp<br />

127-148, 2008<br />

[8] S. J. Ahn, D. H. Oh, "A Study on the Classification Criteria<br />

of U-city based on the Characteristics of U-city Services",<br />

Journal of The Korean Urban Management Association v.23<br />

n.3, 2010<br />

[9] W. S. Jeong, B. S. Cho, "A Study on Priorities of u-City<br />

Services Using Weighted Model", Korea Spatial Planning<br />

Review, V52 N.3,pp 93-214, 2007<br />

[10] J.I. Oh, "Concept, Vision, and Vitalization Strategies of U-<br />

City", Journal of the Korean Information Science Sociaty,<br />

V.23. N.11, pp 21-26, 2005<br />

[11] J.G. Lee, H.S. Uk, "A Study on the diffusion and<br />

advancement of U-city service model", National Information<br />

Society Agency(http://www.nia.or.kr), 2006<br />

[12] C.S. Leem, E.J. Yu, B.G. Kim, N.S. Baek, Y.D. Son, "u-City<br />

PIPE Model", ITR report, IT Research & evaluation, 2008<br />

[13] Y. H. Chun, "The Diversity of Policy Tolls: Issues and<br />

Evaluations of Tool Classifications", Journal of<br />

Governmental Studies, V.13 N.4, pp. 1-37, 2007<br />

[14] K.S. Jeong, T.H. Moon, S.Y. Heo, "A Study on U-service<br />

Pool Evaluation and SRM Template for Development of U-<br />

City SRM", korea Planners Association, V.45 N.13, 2010<br />

[15] W.S. Jeong, B.S. Jo, H.S. Jo, “U-City Industry and Service<br />

Classification Trends”, Korea Electronics Technology<br />

Institute, http://www.eic.re.kr, 2006.08,<br />

[16] Yong-Sik Lee, "Policy Instrument Typology and<br />

Applicationon Sports for All Policy , Korea Sport Science<br />

Institute, Korean Journal of Sport Science, , Vol. 21, No. 3,<br />

1431-1440 2010.<br />

[17] J.W. Lee, S.H. Baik, C.H. Lee, "Building an Integrated<br />

Service Management Platform for Ubiquitous Ecological<br />

Cities", IEEE Computer Society, pp.56-63, 2011


SUPPLEMENTARY TABLE 1. RESULT OF SERVICE CLASSIFICATION<br />

Space<br />

Human<br />

Functions<br />

By spatial unit<br />

By function<br />

By whom<br />

For whom<br />

For what<br />

Activities<br />

Behavior<br />

C/S<br />

Domain<br />

Administration<br />

Traffic<br />

Health & welfare<br />

Environment<br />

Crime & Prevention<br />

Building 2 0 8 1 3 2 6 7 7 7 9 52<br />

Street 5 0 0 0 0 1 0 0 0 0 4 10<br />

District 1 0 3 1 1 0 0 0 2 0 0 8<br />

Facility 2 8 2 3 2 8 3 4 0 0 3 35<br />

City 7 22 12 7 9 1 6 3 2 4 1 74<br />

broadband 0 12 3 5 6 2 2 4 9 6 0 49<br />

Information media 11 13 19 8 6 1 9 4 9 10 4 94<br />

Spatial unit control 3 10 6 5 3 11 4 8 7 7 11 75<br />

Community management<br />

facility<br />

Facilities<br />

Management<br />

0 0 2 0 0 0 4 4 0 1 2 13<br />

Integrated control center 1 19 1 6 12 2 0 2 4 1 0 48<br />

Public 14 29 8 16 20 13 1 11 0 2 4 118<br />

Private 0 4 10 0 0 0 1 4 19 7 7 52<br />

Public-private partnership 1 9 10 3 1 1 15 3 1 8 6 58<br />

Public Agencies 8 3 1 11 12 10 0 2 0 0 0 47<br />

Citizens 7 39 22 8 9 3 17 16 6 6 16 149<br />

Businesses 0 2 5 0 1 1 0 0 14 11 1 35<br />

Life support 7 31 20 10 8 5 16 16 4 2 15 134<br />

Business support 8 11 9 9 13 9 1 3 12 11 2 88<br />

Industrial support 0 0 0 0 0 0 0 0 4 4 0 8<br />

Healthy living 0 1 16 14 0 0 0 0 0 0 4 35<br />

Security and safety 3 40 3 1 21 13 0 0 0 2 2 85<br />

Community service 11 1 9 2 0 0 0 0 0 0 4 27<br />

Education 0 0 0 0 0 0 16 1 0 1 0 18<br />

Economy 1 0 0 1 0 1 1 1 17 14 0 36<br />

Leisure and culture 0 0 0 1 0 0 0 17 3 0 7 28<br />

Living 0 1 17 3 13 3 1 1 0 0 5 44<br />

Working 15 7 10 15 8 11 16 3 19 17 4 125<br />

Moving 0 34 0 0 0 0 0 0 0 0 0 34<br />

Playing 0 0 1 1 0 0 0 15 1 0 6 24<br />

Cybering 0 0 0 0 0 0 0 0 0 0 2 2<br />

Common services 15 29 9 15 17 10 5 0 1 5 0 106<br />

Specialized services 0 13 19 4 4 4 17 13 19 12 17 119<br />

285<br />

Education<br />

Tourism & Sports<br />

Logistics<br />

Labor & Employ<br />

Other<br />

Service total<br />

Total<br />

228<br />

230<br />

228<br />

231<br />

230<br />

229<br />

231<br />

228


286


Explaining the eGovernment Paradox:<br />

An analysis of two decades of evidence from scientific<br />

literature and practice on barriers to eGovernment<br />

Alberto Savoldelli<br />

Independent Consultant<br />

C/ Via Piolti de Bianchi, 48, Milan, Italy<br />

+39 335 1309287<br />

savoldellia@gmail.com<br />

ABSTRACT<br />

Despite the plethora of research, policy analysis and practice<br />

works produced in the last two decades for explaining the<br />

potential of eGovernment and its impact on society, there is still<br />

very limited evidence that the promised productivity gains have<br />

been achieved. To date, its potential remains hypothetical. This<br />

eGovernment paradox contrasts the level of investments with the<br />

little impact produced and/or demonstrated so far. In this paper we<br />

attempt to provide an interpretation of this paradox, looking<br />

specifically at the sharp mismatch between the supply of online<br />

public services (deployment) and their usage (adoption), which<br />

we define as the “Adoption paradox”. The paper on the bases of a<br />

systematic review of the adoption barriers uncovered by almost<br />

twenty years of scientific and practitioner-generated analysis and<br />

evidence, rises the conclusions that, in most mature governments,<br />

the key barriers to real take up of eGovernment are those related<br />

to the lack of both a structured policy evaluation process and an<br />

effective stakeholders' engagement. The paper suggests that the<br />

critical success factor for eGovernment adoption is a transparent<br />

and trustworthy policy decision making process and that its key<br />

prerequisite is the definition and implementation of a well<br />

organized and fully participatory evaluation framework.<br />

Categories and Subject Descriptors<br />

J4 Social and behavioural sciences; K.4 Computers and Society;<br />

K.6 Management of Computers and Information Systems<br />

General Terms<br />

Management, Measurement, Performance, Economics,<br />

Evaluation.<br />

Keywords<br />

eGovernment adoption, Barriers, Drivers, Participation, Trust,<br />

Public Value, Policy Making, Digital Society<br />

1. INTRODUCTION<br />

We are now well into the second decade of Information and<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Cristiano Codagnone<br />

Milan State University<br />

Via Conservatorio, 7, Milan, Italy<br />

+39 02 50321247<br />

cristiano.codagnone@unimi.it<br />

287<br />

Gianluca Misuraca<br />

European Commission, JRC-IPTS<br />

C/ Inca Garcilaso, 3, Seville, Spain<br />

+34 954 480 572<br />

gianluca.misuraca@ec.europa.eu<br />

Communication Technology (ICT) usage in public administration<br />

service delivery. First evidence of this can be found in the<br />

“reinventing government” movement launched in 1992-1993<br />

through the well-known writing of Osborne & Gablear [1-2]. As a<br />

result, a large body of inter-disciplinary scientific literature has<br />

accumulated and been critically reviewed [2-6]. Alongside this<br />

scientific literature, there is also a growing body of institutional<br />

and policy-oriented reports [7-12] and of practitioner-generated<br />

analysis, case studies, and measurement efforts [13-27].<br />

As yet, however, there is very limited evidence that these gains<br />

have been achieved and eGovernment’s potential remains<br />

hypothetical [7]; [13]; [14]; [28]; [29]. Not surprisingly, some<br />

authors have started to talk about the “eGovernment Paradox”<br />

[30]; [31]. This follows the more famous “IT Productivity<br />

Paradox” summarised in Robert Solow’s quip that “you can see<br />

computers everywhere but in the productivity statistics” [32];<br />

[33].<br />

It was not until the mid '90s that the large investments made by<br />

firms into ICT produced productivity gains. The reasons for this<br />

paradox were mainly: a) measurement error (input and output not<br />

properly measured); b) lag time (ICT take time before having an<br />

effect); c) redistribution of profit (the effect can be positive for<br />

some and negative for others leading to a zero sum where no<br />

aggregate effect can be demonstrated); d) mismanagement of ICT<br />

(ineffective deployment not matching ICT with complementary<br />

initiatives such as re-organisation).<br />

In the case of eGovernment, the paradox can be seen in the<br />

contrast between the level of investments and the little impact<br />

produced and/or demonstrated so far [30]. It may also be due to<br />

the fact that delivering citizen-centric eGovernment does not<br />

necessarily reduce costs [29]; [34]. Our view is that the most<br />

evident and straightforward “eGovernment Paradox” is the sharp<br />

mismatch between the supply of online public services<br />

(deployment) and their usage (adoption). In Europe, for instance,<br />

the traditional benchmarking of eGovernment services shows that<br />

supply has reached saturation for most common online services in<br />

a majority of countries [14]. Yet, citizens (and to a lesser extent<br />

companies) are still more likely to use traditional methods (e.g.,<br />

phone calls or in-person visits) than the Web to interact with the<br />

government [14]; [35].<br />

For Europe, a simple description (both longitudinal and crosssectional)<br />

of eGovernment benchmarking data and a look at<br />

Eurostat statistics about usage of eGovernment services clearly<br />

show this mismatch, The supply-side index stands at 70% on<br />

average and the average usage percentage is below 30% of the


adult population. A recent more sophisticated statistical analysis<br />

of this data concluded that there is no statistically significant<br />

correlation between the level of supply of eGovernment services<br />

and the level of usage [29]; [36]. The “Adoption Paradox”<br />

encompasses, in our view, several of the reasons cited by the<br />

authors who introduced the concept of the “eGovernment<br />

Paradox” and those who explained the more famous “IT<br />

Productivity Paradox”. It is almost self-explanatory that if<br />

adoption does not reach significant levels then the financial<br />

resources invested in eGovernment simply creates a stratification<br />

of costs and no benefits, either internal or external (as was the<br />

case at the beginning of Internet banking). So, it is strategic to<br />

investigate in depth the reasons for non-adoption, as they will<br />

include related issues such as the lack of restructuring of policy<br />

making and implementation processes, measurement problems, all<br />

of which explain the excessive time lag between the<br />

implementation of eGovernment and the delivery of its promises.<br />

In Section 2, we illustrate the method and conceptualisation used<br />

and in Section 3 we report the results of the systematic analysis of<br />

the adoption barriers uncovered by about twenty years of<br />

scientific and practitioner-generated analysis and evidence. In<br />

Section 4, we discuss in depth the key findings of our analysis.<br />

These show that in the most mature public administrations, the<br />

key barriers to a real take up of eGovernment are those related to<br />

the lack of a structured policy evaluation process and a lack of<br />

stakeholders' participation in the decision making process. Finally,<br />

Section 5 offers the conclusions and directions for future research.<br />

2. METHOD AND CONCEPTUALISATION<br />

The systematic and diachronic analysis of eGovernment adoption<br />

barriers is based on an extensive literature review of a wide range<br />

of scientific journals and papers published in the last two decades,<br />

as well as practitioner-generated analysis 1 . The results of the<br />

literature review have been classified by re-elaborating the model<br />

proposed in [37], to which we have added one more dimension of<br />

analysis that we have called “Political/Institutional”. This has<br />

been done in order to highlight specific barriers related to the<br />

public policy management process. In order to make the results of<br />

our analysis more intelligible and also actionable in terms of<br />

future redesign of the eGovernment policy design and<br />

implementation processes, we have further developed from the<br />

original and well known work of Layne & Lee, [38, further<br />

improved by Andersen [39] in 2006], our own version of the<br />

Maturity Model (MM) against which the barriers have been<br />

mapped. This re-elaboration integrated the original model with<br />

key characteristics of eGovernment that have been identified by<br />

several scholars in literature [6]; [13]; [16]; [18]; [40]; [41]; [42];<br />

[43]. Our conceptualisation of the MM is illustrated in Figure 1<br />

and it is explained here below. It must be stressed that this model<br />

is a hybrid conceptual mix of empirical and prescriptive elements<br />

in that the later stages of the model are based on very rare best<br />

practices rather than widely observed empirical experiments.<br />

The Maturity Model has two conceptual dimensions:<br />

• Process orientation. This dimension is defined as a<br />

combination of the following variables: a) level of<br />

1 The literature review includes journals such as Government Information<br />

Quarterly; Strategic Information Systems; Business Process Management<br />

Journal; Journal of Global Information Management; Information Polity;<br />

International Journal of Public Sector Management; International<br />

Journal of Public Information System; Public Administration Review).<br />

288<br />

integration within each single public administration [42]; b)<br />

level of integration across public administrations, in jargon<br />

“joined-up government” [40]; [42]; [44]; and c) degree of<br />

processes’ outcomes orientation [16].<br />

• Citizens centricity. This dimension is defined as a<br />

combination of the following variables: a) degree of civil<br />

servants acceptance of, and support to, eGovernment [45];<br />

and b) level of citizen involvement in eGovernment services<br />

design and development [18]; [46]; [47].<br />

Figure 1 – eGovernment Maturity Model Source: Authors<br />

elaboration on [38]; [39].<br />

In the space defined by the two axes, as illustrated in Figure 1, the<br />

Maturity Model is shaped by two key drivers:<br />

• People and Organization driver. This driver concerns: a)<br />

the depth of the cultural changes in relation to eGovernment<br />

both inside the administration and among citizens; and b) the<br />

level of digital divide within which eGovernment is<br />

embedded.<br />

• Technology and Information driver. It helps to determine<br />

which technological stage has been achieved by a given<br />

public organization and the level of integration and openness<br />

of public information and data to civil servants and citizens.<br />

As a result of combining the two dimensions and the two drivers,<br />

the following six stages of maturity can be identified:<br />

• Stage 1 – Web presence through a simple online<br />

transposition of administrative processes without a clear<br />

orientation to outcomes. Typical eGovernment initiatives at<br />

this stage focus on infrastructural projects aimed at bundling<br />

the territory with ICT networks.<br />

• Stage 2 – Communication backbones are laid down and wide<br />

local area networks are completed. At this stage integration<br />

initiatives at both organizational and technological level are<br />

promoted within (among departments) and across public<br />

administrations.<br />

• Stage 3 – At this stage, transaction services are deployed<br />

together with privacy and security solutions to support these<br />

transactions. Dematerialization initiatives are largely adopted<br />

together with significant back office simplification.<br />

Management changes are introduced inside public<br />

administrations. Civil servants’ and public managers’<br />

performance evaluation is largely based upon their capability<br />

to achieve simplification targets.<br />

• Stage 4 – Outcome-oriented processes are widely<br />

implemented thanks to ICT adoption. Actions aimed at<br />

reducing digital divide and stimulating adoption of


eGovernment services to a large extent of the population are<br />

also deployed. Some significant examples of information,<br />

data sharing and data integration among public organizations<br />

are also evident. Measurement systems of public values of<br />

eGovernment services are significantly implemented even if<br />

not fully integrated with policy decision-making processes.<br />

The evaluation of public administration managers is largely<br />

based on their capability to achieve outcome related<br />

objectives.<br />

• Stage 5 – A large extent of data and information are made<br />

available for all and some significant business initiatives<br />

based upon public sector information usage are in place.<br />

Cloud computing infrastructures and cloud repositories for<br />

public administrations data are also largely available and<br />

empowering actions aimed at stimulating citizens and civil<br />

servants towards ICT and eco-sustainability of eGovernment<br />

services are conducted. Measurement systems are fully<br />

implemented and linked with policy decision making<br />

processes.<br />

• Stage 6 – ICT is not anymore a barrier to the take up of<br />

eGovernment services and the behaviour for continuous<br />

improvement is pervasive in public administration also<br />

unleashing social innovation [48] is widely diffuse in<br />

designing and developing public services.<br />

It is clear that the MM applied to eGovernment is not independent<br />

from the broader level of maturity of the Digital Society [49]<br />

within which eGovernment deployment and adoption is embedded<br />

[29]. Yet, the process of digital maturation of a given society or<br />

local community is never as linear as the MM would suggest [6];<br />

[50]; [51]; [52]. Therefore for a long-term sustainability of<br />

eGovernment services we have also to understand the needed<br />

efforts that each public administration has to make for reaching<br />

the required level of maturity suitable for deploying and rollingout<br />

a given eGovernment product/service and, then, supporting its<br />

effective adoption and long-term sustainability [29]; [52].<br />

However in most mature administrations neither the level of<br />

digital divide nor the lack of ICT infrastructures seem to be<br />

among the most constraining barriers to eGovernment adoption. It<br />

is rather the lack of a structured and trustworthy decision making<br />

process, effectively involving citizens and stakeholders that slow<br />

down adoption, which in turn weaken the capability to effectively<br />

and timely absorb and use public funds [53]. In this respect the<br />

lack of formal methods for managing and monitoring<br />

eGovernment initiatives further compound the challenges of<br />

successful adoption of eGovernment services [37 - 54]. These<br />

barriers are more and more evident at local level [4], where there<br />

is still an high variance in performances as commented for<br />

instance in [14]; [55]. At the same time the local government<br />

represents the most favourable ground for enhancing citizen<br />

centred eGovernment services with a real engagement of<br />

stakeholders and beneficiaries and an effective empowerment of<br />

the local community [13]; [19]; [43]; [47]; [56], [57] as discussed<br />

in the next chapters.<br />

3. RESULTS<br />

In this section we first apply a synchronic perspective to better<br />

interpret the evolution of adoption barriers and then extract the<br />

key lessons learned. The synchronic perspective we adopted,<br />

foresees the following three periods of implementation of<br />

eGovernment: 1994-2004; 2005-2009; 2010-2012. The choice of<br />

analysing time periods that have different length is due to the need<br />

289<br />

of observing the eGovernment phenomenon of mature public<br />

administrations in their evolutionary pathways that were quite<br />

slow at the beginning as mainly related to deployment of ICT<br />

infrastructures and awareness actions (see MM in Figure 1) and<br />

faster as much as the pathways were related to deployment and<br />

take-up of eGovernment services:<br />

• 1994-2004: this period ranges from the start-up of the<br />

“reinventing government” [1]; [2]; movement, to the first<br />

review of the Lisbon Strategy [58] launched by the European<br />

Union in the year 2000 with the aim to promote ICT in all<br />

competitive domains, including public administration. The<br />

optimistic view on ICT performance and the Internet<br />

diffusion has led to emphasize the lack of telecommunication<br />

infrastructures [8] and their communication capacity [38] as<br />

key barriers to eGovernment adoption. Both of which in turn<br />

have been associated to the lack of institutional support and<br />

standards [8] as a source of “Political/Institutional” barrier.<br />

The concept of “trust in eServices usage by citizens” is often<br />

associated with the concept of “security in transactions”<br />

and “trust in government in preserving personal data<br />

privacy, once the citizens provided them for using an<br />

eService” [38]; [59]. “Managerial/Organizational” barriers<br />

were also important to overcome with particular reference to<br />

“shortage of ICT skills” in public administration [41], while<br />

[8] sees as important barriers the “information<br />

mismanagement and reluctance to share information among<br />

departments”.<br />

• 2005-2009: the period of implementation of the i2010<br />

strategy in the European Union [60]. ICT infrastructural<br />

problems are still considered relevant and in particular<br />

operational costs and maintenance of eGovernment systems<br />

are considered as crucial obstacle [4]; [9]; [20]; [40]; [44],<br />

especially at the local level where the lack of financial<br />

resources is more evident [4]; [9]; [42]; [55]. Technological<br />

and operational barriers are still mentioned, and the most<br />

noteworthy are the “lack of integration across government<br />

systems”, the “lack of knowledge regarding eGovernment<br />

interoperability”, together with the “lack of citizens’ trust<br />

about eGovernment services privacy and security”. Lack of<br />

ICT skills in governmental organization and lack of<br />

cooperation amongst departments together with resistance to<br />

change of the civil servants are also still mentioned [4]; [9];<br />

[40]; [42]; [43]. During this period, however, the most<br />

important barriers affecting eGovernment adoption are the<br />

lack of “evaluation and measurement of eGovernment<br />

services” [4]; [10]; [39], the “difficulties in establishing a<br />

firm connection between ICT innovation, benefits and<br />

outcomes” [3]; [9] and the “digital divide” [9]. Even if still in<br />

embryonic terms, during this period start to be considerd<br />

important barriers the “lack of demand side involvement in<br />

the eGovernment decision making process” [10], the “lack of<br />

trust on government and on government reform” [45] and the<br />

“cost of the services for the users and their perception of<br />

benefits” [4]; [62]; [63], together with the “lack of<br />

eGovernent policy framework that can be applied at local<br />

level” [4]; [42].<br />

• 2010-2012: this period starts from the launch of the so called:<br />

“Digital Agenda for Europe” [66] until today. Most recently<br />

the “political/institutional” barriers have been seemingly<br />

singled out as the most important obstacle for the full take up<br />

of eGovernment services, with particular reference to “lack


of citizens' participation to the policy making process” and<br />

“lack of measurement system on eGovernment process<br />

performances and outcomes” [7]; [51]; [64]; [65]. According<br />

to the authors discussing them, these barriers have the side<br />

effects of producing a “lack of transparency and trust on<br />

political decisions” [64]; [65]; [66], together with a “lack of<br />

trust and empowerment of the citizens” [13]. Such authors<br />

suggest a possible way for overcoming these barriers by both<br />

tackling the “lack of eGovernment policy framework that can<br />

be applied at local level” [14] and the “lack of formal<br />

methods for supporting eGovernment decision making<br />

process” [5]; [52]; [53]; [65]; [67]. An initial attemp of<br />

analising barriers related to the “lack of sustainability of<br />

eGovernment initiatives” is presented in [51]. At the same<br />

time “technological/operational” barriers seem less<br />

important for the scientific community except for the “lack of<br />

open sources and open data standards” [67] and the<br />

“shortage of financial resources in public sector<br />

organizations” [14]; while the “managerial/organizational”<br />

barriers are considered still important with particular<br />

reference to the behaviour of policy makers and civil servants<br />

in supporting actions enhancing trustworthiness of the<br />

citizens, by reducing “lack of trust in the government<br />

willingness to allow citizens to have their say if their views<br />

contradict official policy”, “lack of transparency and trust in<br />

government” and “lack of personalized and secure services”<br />

[18].<br />

In coherence with the MM (Figure 1), if we make a cross-analysis<br />

of the evolution of the barriers to eGovernment, we can say that in<br />

the last twenty years for the most mature public administrations,<br />

the technological barriers have been significantly reduced but<br />

eGovernment services adoption is far to be effective and there is<br />

no clear evidence of which benefits ICT offer to citizens. This<br />

situation is not so different from what private organizations met at<br />

the early stages of ICT introduction - between the ’80s and the<br />

’90s - where ICT has produced significant expectations. Also in<br />

the private sector at the very beginning of the technological<br />

revolution, ICT possibilities were overestimated [68], and the<br />

“manifesto” of Hammer and Champy [69] in 1993 was considered<br />

the ultimate solution for improving performance and<br />

competitiveness in any private organization. Just few years later<br />

(see [51]; amongst several other authors) ICT assumed the role of<br />

enabling factor for supporting organisational changes and<br />

business process integration [70], and the role of both “change<br />

management” and “customer satisfaction” became central for<br />

competitiveness. No more than fifteen years later similar ICT<br />

adoption pathways and pit-falls have been followed by the public<br />

sector, unfortunately without learning too much from mistakes<br />

and failed experiences occurred in the past in the private sector<br />

[42]; [45]. An evidence of such argumentation can be found by a<br />

comparison of the position papers that Accenture has written on<br />

eGovernment services adoption at the beginnings of the years<br />

2000 and what the same organization has recently considered as<br />

the best approach to the take up of eGovernment services. In the<br />

Accenture’s position paper of 2001 “multichannel delivery and<br />

CRM” were identified as “the key issues government had to<br />

consider to improve the level of online services provided to<br />

citizens and business” [15]; ten years later the same organization<br />

recognized that “only cultural changes in public sector workers<br />

and collaborative learning between citizens and civil servants,<br />

together with ICT as enabling factors, could support an effective<br />

eGovernment adoption” [21]. Therefore it seems now evident that<br />

290<br />

eGovernment adoption in mature public administrations is<br />

affected by the lack of trust on both government behaviour and on<br />

possible misuse of digital information provided by citizens to civil<br />

servants. These two aspects of the problem are more related to the<br />

stakeholders’ and citizens’ perception of the policy making<br />

process and their expectation on eGovernment services [28]; [71].<br />

As Van de Walle [54] says: “achieving good performances in<br />

public services by governments is only a partial way to achieve<br />

citizens satisfaction and to improve trust in government”, only a<br />

transparent and participative policy making process can close the<br />

gap [10]; [47]; [65], as shown in Figure 2, where only a well<br />

structured policy planning process fully integrated with a<br />

performance management system and truly participated by<br />

stakeholders and citizens, can support a wide adoption of<br />

eGovernment services and creating a well established Digital<br />

Society.<br />

But, what does it mean “better Policy Planning Process”? Which<br />

are its key components? Which are main barriers to its adoption<br />

and which are the real benefits gained by its use in public<br />

governance?<br />

Possible answers to these questions are discussed in the following<br />

section, where we have gone deeper in understanding the<br />

meanings and usefulness of Policy Planning Process in<br />

eGovernment adoption.<br />

Figure 2 – eGovernment services adoption virtuous cycle<br />

4. DISCUSSION<br />

From the findings of our review as presented in the previous<br />

section we identified the Policy Planning Process as the core area<br />

where public administrations must make improvements in order to<br />

support eGovernment adoption and the overall development of the<br />

Digital Society. In this section we go a step further discussing key<br />

barriers that hinder an efficient and effective Policy Planning<br />

Process. Before doing that we have to define such process and its<br />

main components.<br />

The Policy planning process. As Heeks [10] says: “Policy<br />

Planning Process has a circular lifecycle”. It starts from needs<br />

arising from the community where the policy makers have been<br />

elected and it follows several stages that describes a policy cycle<br />

as shown in Figure 3, that we have adapted from [10]; [72].<br />

• Step 1 – Policy Strategy Formulation. It is the key step<br />

because it provides motivations and justifications of why a<br />

certain Policy Programme has to be implemented.<br />

Unfortunately, policy makers often begin to formulate a


policy agenda, as Heeks [10] says, based on “poor<br />

comparative benchmark performances” and “scarcely<br />

quantified good news/benefits” of previous eGovernment<br />

initiatives done by the same administration and/or others in<br />

previous Policy cycles. Lack of impact evaluation of past<br />

policies [4]; [39] is certainly one of the main reasons<br />

justifying difficulties of policy makers in defining correct<br />

long-term strategic plans. Another negative effect of lack of<br />

impacts evaluation of past policies is the scarce public<br />

confidence in the results of policy decisions. Citizens<br />

perceive this as lack of transparency of Policy Planning<br />

Process, thus the distance between policy makers and civil<br />

servants on one side and citizens on the other increases [29];<br />

[57]; [65]. In this regard, it is common opinion among<br />

several authors [10]; [13]; [42]; [47] that Policies have<br />

serious difficulties in being adopted without an effective<br />

engagement of beneficiaries and stakeholders since the very<br />

beginning of the Policy Planning Process.<br />

• Step 2 – Policy Guidelines Definition and Approval,<br />

where Policy makers define the strategic objectives of their<br />

policy agenda. To be effective, these objectives, more<br />

commonly called “Outcomes” [6], should be based upon<br />

both citizens’ expectations and needs of stakeholders and<br />

beneficiaries. Unfortunately, often policy makers and public<br />

managers have serious difficulties in linking decisions on<br />

policy strategy (Step1), with outcomes definition (Step 2)<br />

[3]; [9]. On the contrary this link is very powerful for Public<br />

Administrations. Once more this problem is due to a Policy<br />

Planning Process scarcely supported by quantified data and<br />

information on previous policy impacts [21]; [42]. The<br />

consequence of this lack of information is that Policy Plans<br />

are driven by contingencies and constraints, rather than midlong<br />

term strategy and well grounded digital policy.<br />

• Step 3 – Policy Implementation Plan Design and<br />

Approval. Public managers, together with stakeholders,<br />

produce an Implementation Plan of possible eGovernment<br />

initiatives that should be coherent with Policy Guidelines<br />

defined in “Step 2”. Usually such initiatives take the form of<br />

a “Project Idea”, subjected to budget constraints and targeted<br />

project objectives. Often risk assessment actions, together<br />

with possible countermeasures, are also provided at this Step<br />

[11]. The most common problem that usually affects Policy<br />

Implementation Plan design and, then, the success of the<br />

entire Policy Planning Process, is the mismatch between<br />

policy outcomes (as defined in “Step 2”) and project<br />

objectives [12]; [73]. More often civil servants in charge of<br />

Policy Implementation Plan and Stakeholders interested to<br />

promote a given “project idea” are used to describe it in a<br />

quite optimistic way, overestimating challenges and without<br />

considering budget constraints that could reduce the breath of<br />

the project’s impacts. Another important barrier is the lack of<br />

a preventive sustainability assessment of the eGovernment<br />

service to be deployed [46], which quite often mines<br />

eGovernment project's uptaking.<br />

• Step 4 – Policy Implementation through Projects.<br />

eGovernment projects are selected in coherence with the<br />

Implementation Plan and then deployed on the territory<br />

through Projects. Starting from the “project ideas” approved<br />

in the previous “Step 3”, public administrations in charge for<br />

funding the projects launch procurement processes based on<br />

291<br />

technical and administrative specifications. Selected<br />

providers cooperate with beneficiaries and stakeholders for<br />

achieving the expected objectives and for producing the<br />

agreed project’s outputs. Project management capabilities of<br />

Civil servants are required together with good ICT skills and<br />

organizational knowledge [54]; [74]. Once more a key<br />

success factor of this step is the effective involvement of<br />

stakeholders and beneficiaries in project development and<br />

deployment [42]; [67]. To this regard some scholars believe<br />

this involvement would be more effective if anticipated at the<br />

initial stage of Planning Process (“Step 1”), thus citizens’<br />

trust [65] is increased and co-production initiatives [44]; [47]<br />

could have better chances to succeed. More common barriers<br />

are “the resistance to change of the civil servants” [64] and<br />

the “lack of motivation of public managers in sharing and<br />

opening data amongst organization and to the public” [7].<br />

Figure 3, Policy Planning Process Cycle (our elaboration from<br />

Heeks [10].<br />

• Step 5 – Policy and Projects monitoring. This is a<br />

fundamental stage for a successful policy cycle<br />

implementation. Unfortunately, quite often this step mainly<br />

addresses the in-itinere evaluation of on-going eGovernment<br />

initiatives, with a very limited and superficial evaluation of<br />

the outcomes/impacts produced by the policy plan [17]. This<br />

is because eGovernment projects, as all other public<br />

investments, need to demonstrate that the public money<br />

produced the output specified in the legal documents signed<br />

with providers. Usually no specific legal constraints are<br />

agreed between administrations and providers in relation to<br />

impacts on beneficiaries that a given project should obtain.<br />

Moreover, the cost of an effective measurement system of<br />

the impacts of the Policy Plan and the long time frame when<br />

these should be achieved, discourage administrations,<br />

especially local ones, to emphasize this step [7]; [51]. On the<br />

contrary this has to be considered a fundamental step of the<br />

Policy Plan, without which the level of trust between citizens<br />

[65] and Public Administration would be significantly<br />

reduces, further penalising eGovernment adoption.<br />

• Step 6 – Gap Analysis of the Policy Implementation<br />

Plan. This step is aimed at supporting policy makers to move<br />

on to a new cycle, with a new policy based upon key results<br />

of the previous one [10]. However, more often the<br />

importance of this step is underestimated because usually


very poor impact assessment activities are made by public<br />

administrations in the previous “Step 5” [4]; [39].<br />

In theory, policy makers can start policy planning life cycle once a<br />

policy cycle is completed and move on to a new one with new<br />

strategic objectives [10]. In practice this might not happen<br />

because the Policy Planning Process is highly context-dependent<br />

and extremely affected by contingencies and needs that might be<br />

present on the territory and that have a high degree of urgency.<br />

Unfortunately cases from unsuccessful adoption of eGovernment<br />

tell us how difficult it is to define a structured and comprehensive<br />

implementation of such process and its maintenance over time<br />

[60]. Table 2 shows the key barriers to an effective execution of a<br />

Policy Planning Cycle. This is particularly true at the local level<br />

where Policy Makers and Civil Servants are very close to citizens<br />

and stakeholders [13]; [76], and the presence of a well organized<br />

Policy Evaluation Process could produce more direct and<br />

trustworthy effects on eGovernment adoption [4]; [14]; [42]; [55].<br />

Table 2 – Barriers to eGovernment Policy Planning Cycle<br />

execution<br />

eGovernment<br />

Policy<br />

Planning<br />

Cycle<br />

Policy<br />

Strategy<br />

Formulation<br />

Policy<br />

Guidelines<br />

Definition and<br />

Approval<br />

Policy<br />

Implementatio<br />

n Plan (∑ i-n=<br />

Project ideas)<br />

Design and<br />

Approval<br />

Policy<br />

implementatio<br />

n through<br />

Projects<br />

Barriers<br />

• lack of evaluation and measurement of policy<br />

strategy [4]; [39];<br />

• lack of stakeholders and beneficiary involvement<br />

in needs identification [10]; [13]; [43]; [47];<br />

• lack of comprehensiveness and continuity of<br />

policies and programmes [8];<br />

• lack of clear vision [42]; [44];<br />

• lack of exAnte evaluation approach [12];<br />

• lack of a structured evaluation process circle with<br />

an effective engagement of stakeholders and<br />

beneficiaries [22]; [46];<br />

• difficulties in linking policy decision with<br />

outcomes objectives [3]; [9]; [76]<br />

• lack of stakeholders and beneficiary participation<br />

in policy objectives definition [10]; [7]; [43];<br />

• unclear policy management strategy [42]; [44];<br />

• mismatching between policy outcomes (if<br />

•<br />

defined) and project objectives [12]; [74];<br />

project selected on expected outputs and not on<br />

expected outcomes [17];<br />

• lack of stakeholders and beneficiary involvement<br />

in projects design and specification [13]; [43];<br />

[47];<br />

• lack of coordination and/or strategic planning<br />

[8];<br />

• lack of coordination and cooperation between<br />

departments and among administrations [40];<br />

[42]; [44];<br />

• lack of structured risk management procedures<br />

[11];<br />

• lack of stakeholders and beneficiary involvement<br />

in project development [18] [43]; [47]; [54]; [66];<br />

[68];<br />

• lack of project management expertise [54; [74];<br />

• lack of knowledge and skills for assessing the<br />

risk and making contingency plan [7]; [68];<br />

• resistance to change [65];<br />

• Government departments failing to agree and<br />

implement common procedures and standards to<br />

provide shared networked eGovernmnet services<br />

Policy and<br />

Projects<br />

monitoring<br />

and Gap<br />

Analysis<br />

[9];<br />

• Lack of motivation of public managers in sharing<br />

and opening data amongst organization and to<br />

public [7];<br />

• project monitored on achieved outputs and not on<br />

achieved outcomes [17];<br />

• Lack of evaluation and measurement procedure<br />

[4]; [39];<br />

• Lack of measurement system on eGovernment<br />

process performances and outcomes [7]; [52];<br />

[65]; [66];<br />

• Lack of involvement of citizens and stakeholders<br />

in monitoring projects and policies and for<br />

supporting their sustainability [23];<br />

• Lack of transparency of the monitoring process<br />

and its results on project impacts [23]; [66].<br />

5. CONCLUSION AND FUTURE RESEARCH<br />

Our analysis underlines how in the mature government (see the<br />

MM described in Figure 1) technological barriers to eGovernment<br />

adoption have been significantly reduced, but eGovernment<br />

services are far away to be adopted and there are no clear<br />

evidences of which benefits ICT can offer to citizens. Resistance<br />

to change by civil servants and policy makers are now considered<br />

the most important barriers, causing an evident lack of<br />

trustworthiness in the citizens towards political institutions. The<br />

consequences of these barriers is an unstructured and<br />

untrustworthy decision making process, that slow down adoption,<br />

which in turn weaken the capability to effectively and timely<br />

absorb and use public funds.<br />

292<br />

Two fundamental barriers emerge from our study:<br />

� lack of full involvement of stakeholders and beneficiaries<br />

since the very beginning of the Planning Process;<br />

� lack of an evaluation process that should be conducted in<br />

parallel with each step of the Policy Planning Process itself.<br />

This is especially true at the local level that on the contrary might<br />

benefit more thanks to the proximity among Policy decision<br />

makers, civil servants and citizens [14]; [55]; [57]. However as<br />

[65] and [71] clarify, the two key barriers to an effective Policy<br />

Planning Process are not independent from each other, but rather,<br />

they are the two faces of the same coin:<br />

Good Governance implies stakeholders and citizens participation<br />

that cannot be guaranteed without transparency in the decision<br />

making process; high level of transparency cannot be achieved<br />

without a trusted and robust evaluation process.<br />

Figure 4 shows the circularity of both planning and evaluation<br />

processes and their interaction with the stakeholders and<br />

beneficiaries. As described in the figure, the inner circle<br />

represents the Policy Planning Process, while the outer one<br />

describes the Evaluation Process where the ex-Ante evaluation<br />

receives as input the results of the ex-Post evaluation of the<br />

previous Policy Planning Cycle and then, it produces as output the<br />

objectives of the new Policy Planning, that will be subject to both<br />

an in-itinere evaluation and a new ex-Post one. The middle circle<br />

defines the links between the two other circles. The two processes<br />

run in parallel and the key aspect of both is the active involvement<br />

of stakeholders [23]. Moreover the evaluation process that has the<br />

aim to assess the Public Value of a given Policy Strategy, by<br />

measuring the degree of achievement of the Policy


Implementation Plan’s outcomes and the quality 2 of<br />

eGovernment products and services, in the most transparent and<br />

participatory way as possible [11]; [24]; [86], presents the still<br />

unresolved problem of measuring these values in each step of the<br />

Policy Planning Cycle, maintaining the coherence of each<br />

measure and preserving the characteristics of transparency and<br />

reproducibility of the measurement. In this regard, scientific<br />

literature provides several examples of metrics which can be<br />

utilized for quantifying public value to a given eGovernment<br />

Project [81 - 82]. Some of them have been defined also by the<br />

authors of this article in the EU funded eGovernment Economics<br />

Project (eGEP) [83 – 85]. However the majority of them have<br />

been developed to benchmark eGovernment initiatives once they<br />

are already in place and none of them has the capability to<br />

evaluate a Policy Implementation Plan and, at the same time, the<br />

eGovernment projects it underlines. Finally in Figure 5 we have<br />

defined the key drivers for eGovernment adoption that in our<br />

opinion have to be considered to overcome the barriers identified<br />

in our analysis.<br />

Figure 4 – Circular nature of the Evaluation Process and its<br />

relationship with Policy Planning Circle<br />

Figure 5 defines the relationships among key drivers of<br />

eGovernment adoption, starting from the Parasuraman & Grewal<br />

model [87]: eGovernment adoption depends on both high service<br />

and product quality, together with a meaningful Public Value of a<br />

given service [17]; [44]; [61]; [73]; [85]. However, these drivers<br />

are filtered by public opinion’s perceptions on both the value of<br />

service/product deployed and the level of transparency of the<br />

related decision making process [65]; [66]; [76]. Positive<br />

perception of value of both the eGovernment initiatives and<br />

transparency of the decision making process, increases the<br />

citizen’s trust in policy makers and public administration and it<br />

stimulates eGovernment adoption.<br />

2 Measure of the quality of the outputs of eGovernment projects can be<br />

addressed under different perspectives [78-79]. However in our opinion,<br />

the quality of eGovernment Projects should be mainly measured in respect<br />

to the contribution of eGovernment services to increase participation and<br />

co-production (see Figure 1 - eGovernment adoption Maturity Model),<br />

thus the quality dimension should help to understand which is the<br />

capability of a given project to prevent lock in situations and to promote<br />

open technologies/services [80].<br />

293<br />

A higher level of public participation in the decision making<br />

process can improve the quality of the product and services and<br />

their public values and thus it can increase both citizen’s positive<br />

perception and trust of policy makers and public administration<br />

[20]; [26]. The scientific community has already proposed several<br />

approaches to assess citizens perceptions on a given policy<br />

making process [13]; [43]; [65]; [87]; and many have attempted to<br />

explore how to stimulate public participation for a better quality<br />

of eGovernment services and their adoption [39]; [22]; [26]; [27];<br />

[57]; [66]. There are also some examples of practical usage of<br />

citizens satisfaction surveys for create better eGovernment Policy<br />

Programmes, like the “Common Measurement Tool” developed<br />

by the Canadian Government that defined specific guidelines for<br />

assessing the citizens’ satisfactions on eGovernment services<br />

performances [88]. However several authors agree that still exist a<br />

lack of measurement systems in eGovernment process<br />

performance and outcomes [7]; [29]; [51]; [64]; [65]; [87].<br />

Figure 5 – Key drivers of eGovernment adoption: authors'<br />

adaptation from Parasuraman&Grewal [87].<br />

This is particularly true at local level where there is little evidence<br />

of Policy Evaluation Frameworks suitable for supporting Policy<br />

Making Processes [14]; [29]; [55]; [56]; [88]. The scope of this<br />

paper was therefore to contribute closing this gap and identifying<br />

the key barriers and drivers aimed at supporting the full adoption<br />

of eGovernment services towards the realisation of a well<br />

established Digital Society. In future research we aim at further<br />

enhancing the findings of this analysis contributing to the<br />

development of policy evaluation methodologies, frameworks and<br />

related models that can effectively assess the policy planning<br />

process and the impact of eGovernment, including in particular<br />

the ''openness dimension'' that underlines a transparent and<br />

trustworthy participatory policy-planning process.<br />

Disclaimer<br />

The views expressed in this paper are purely those of the authors<br />

and may not in any circumstances be regarded as stating an<br />

official position of the European Commission.<br />

6. REFERENCES<br />

[1] Osborne, D., Gablear, T. (1992). Reinventing<br />

Government: how the entrepreneurial spirit is transforming<br />

the public sector. Published by Addison-Wesley.<br />

[2] Osborne, D., (1993). “Reinventing<br />

Government”. In Public Productivity & Management<br />

Review, 16(4), pp:349-356.


[3] Titah, R., Barki, H., (2005). eGovernmnet<br />

Adoption and Acceptance: a LiteratureReview, Chaire de la<br />

Chaire du Canada en implementation et gestion des<br />

technologies des information. HEC Montreal.<br />

[4] Lofstedt, U., (2005). “eGovernment:<br />

Assessment of current research an some proposal for future<br />

directions”. InInternational Journal of Public Information<br />

System. 1, pp: 39-52.<br />

[5] Yildiz, M., (2007). “eGovernmnet research.<br />

Reviewing the literature, limitation and ways forward”. In<br />

Government Information Quarterly, 24( ), pp: 646-665.<br />

[6] Hassan, H., S., Shehab, E., Peppard, J.,<br />

(2011). “Recent advances in e-services in the public sector:<br />

state of the art and future trend”. In Business Process<br />

Management Journal. 17(3), pp: 526-545.<br />

[7] UN – DESA (United Nations Department of<br />

Economic and Social Affairs), (2010). eGovernmnet survey<br />

2010: leveraging eGovernmnet at a time of financial and<br />

economic crisis.<br />

[8] UN – DESA (United Nations Department of<br />

Economic and Social Affairs), (2003). Benchmarking<br />

eGovernment: A global perspective: Assessing the progress<br />

of the UN member states.<br />

[9] European Commission DG Information<br />

Society and Media Modinis Study, (2006). Breacking<br />

Barriers to eGovernment: Overcoming obstacles to<br />

improving European public services.<br />

[10] Heeks, R., (2006). Understanding and<br />

Measuring eGovernment: International Benchmarking<br />

Studies. Paper prepared for UNDESA workshop on<br />

“eParticipation and eGovernment: Understanding the<br />

Present and Creating the Future”. 27-28 July, Budapest,<br />

Hungary.<br />

[11] OECD, (2007). eGovernment for better<br />

Government. OECD eGovernment Studies.<br />

[12] OECD, (2009), Implementation guidelines on<br />

evaluation and capacity building for local and micro<br />

regional level – “the Hungary case”, OECD publication<br />

[13] Pratchett, L., Durose, C., Lowndes, V., Smith,<br />

G., Stoker, G., & Wales, C., (2009). Empowering<br />

Communities to influence Local Decision Making: a<br />

Systematic Review of the Evidence. London: Department for<br />

Communities and Local Government.<br />

[14] Capgemini, (2010). Digitizing Public Service<br />

In Europe: Putting Ambition into Action, 9th Benchmark<br />

Measurement, (2010). Delivered for the European<br />

Commission, DG Information Society: Brussels.<br />

[15] Accenture, (2001). eGovernment Leadership:<br />

Rhetoric vs Reality – Closing the Gap. Company position<br />

paper.<br />

[16] Gupta, M., P., & Jana, D., (2003).<br />

“eGovernment evaluation: a framework and case study”.<br />

InGovernment Information Quarterly, 20, pp: 365-387.<br />

[17] Perrin, B., (2006). Moving from Outputs to<br />

Outcomes: Practical Advice from Governments Around the<br />

World. Managing for performances and results series.<br />

Report sponsored by World Bank and the IBM Center for<br />

the Business of Government.<br />

294<br />

[18] Kolsker, A., Lee-Kelley, L., (2008).<br />

“Citizens’ attitudes towards eGovernment and eGovernance:<br />

a UK study”. In International Journal of Public Sector<br />

Management. 21(7), pp: 723-738.<br />

[19] Norris, D., F., (2006).Electronic Government<br />

at the Grassroots: the State of the practice. In A. V.<br />

Anttiroiko and M. Malkis (Eds.): Enciclopedia of Digital<br />

Government. Hershey, PA: Idea Group Reference.<br />

[20] Horst, M., Kuttschreuter, M., Gutteling, M.,<br />

J., (2007). “Perceived usefulness, personal experiences, risk<br />

perception and trust as determinants of adoption of<br />

eGovernment services in The Netherlands”. In Computers in<br />

Human Behaviour, 23( ), pp: 1838 -1852.<br />

[21] Accenture, (2011). Driving Public<br />

Enterpreneurship: Governmnet as a catalyst for innovation<br />

and growth in Europe. Company position paper in<br />

conjunction with Oxford Economics.<br />

[22] Jones, S., Irani, Z., Sharif, A., Themistocleus,<br />

M., (2006). eGovernment evaluation: reflection on two<br />

organizational studies. In Proceesings of the 39 th Hawaii<br />

International Conferences on System Science.<br />

[23] Sutton, K., (2004). Local Citizens<br />

Participation: Case Study of a Community Development<br />

Board.<br />

[24] Codagnone, C., Undheim, T.,<br />

(2008).“Government Efficiency and Effectiveness: The<br />

Theory and Practice of Evaluation and Measurment”. In<br />

European Journal of ePractice.1(4), pp: 1-15.<br />

[25] Johnsen, A., (2004), The politics of<br />

performances measurement: what does 25 years of<br />

experiences tell us about the state of performance<br />

measurement in public management, European Group of<br />

Public Administration Conference, Lublijana.<br />

[26] Wang, X., Wan Wart, M., (2007). “When<br />

Public Participation in Administration Lead to Trust: An<br />

Empirical Assessment of Managers’Perceptions: Essays on<br />

Citizens Participation and Governance”. In Public<br />

Administration Review. (2), pp: 265-278.<br />

[27] Reddic. C., G., (2004). “A two stage model of<br />

eGovernment: Theories and empirical evidences for U.S.<br />

cities”. In Government Information Quarterly, 21(1), pp:<br />

51-64.<br />

[28] Dawes, S., S., (2008). An Exploratory<br />

Framework for Future eGovernment Research Investments.<br />

Proceedings of the 41 st Hawaii International Conference on<br />

Systems Science.<br />

[29] Misuraca G. and Rossel, P., (2011).<br />

Reflexivity, modelling and weak signals of transformational<br />

tracks to support both micro- and macro-measuring of<br />

Information society services. In Proceedings of the 5th<br />

International Conference on Theory and Practice of<br />

Electronic Governance (ICEGOV2011), Tallinn, Estonia,<br />

26-28 September 2011 - ACM International Conference<br />

Proceedings Series, ACM Press.<br />

[30] Bertot, J. C., Jaeger, P. T. (2008). The E-<br />

Government paradox: Better customer service doesn't<br />

necessarily cost less. In Government Information Quarterly,<br />

25(2), 149-154.<br />

[31] Castelnovo, W. (2010). Is there an eGovernment Paradox?<br />

In D. O’Donnel (Ed.), 10th European eGovernment


Conference on eGovernment (pp. 90-98). Limerick, Ireland:<br />

Academic Publishing.<br />

[32] Solow, R. (1987). We'd better watch out. New York Times,<br />

July 12, p. 36.<br />

[33] Solow, R. (1998). The productivity paradox.<br />

Issues in Science and Technology, 15(1), 9-10.<br />

[34] Misuraca, G., and Rossel, P., (2011).<br />

Measuring and Meta-measuring; in search of new Pathways<br />

for Modelling Impacts of ICT-enabled services on the<br />

Information Society, (2011). In Proceedings of the IFIP<br />

2011 eGovernment Conference (Delft, Netherland, 28<br />

August – 2 September 2011 - http://www.egovconference.org/egov-2011.<br />

[35] Chabrow, (2004) E., Survey Says Citizens<br />

Want More Than eGovernment.<br />

http://www.informationweek.com/news/21100103.<br />

Retrieved on January 24 2012.<br />

[36] Fernández-i-Marín, X. (2011). The Impact of e-Government<br />

Promotion in Europe: Internet Dependence and Critical<br />

Mass. In Policy & Internet, 3(4).<br />

[37] Kunstelj, M., Vintar, M., (2004). “Evaluating<br />

the progress of eGovernmnet development: A critical<br />

analysis”. In Information Policy, 9(3-4). pp: 131-148.<br />

[38] Layne, K., Lee, J., W., (2001). “Developing<br />

fully functional e-government: a four stage model”. In<br />

Government Information Quarterly, 9(2), pp: 122-136.<br />

[39] Andersen, K., V., Henrisken, H., Z., (2006).<br />

“eGovernment maturity model: extension of the Layne and<br />

Lee model”. In Government Information Quarterly, 23 (2),<br />

pp: 236-238.<br />

[40] Gil-Garcia, J., R., & Pardo, T., A., (2005).<br />

“eGovernment success factors: mapping practical tool to<br />

theoretical foundations”. In Government Information<br />

Quarterly, 22(2), pp: 187-216.<br />

[41] Moon, M., J., (2002). “The evolution of<br />

eGovernment among Municipalities: Rhetoric or Reality”.<br />

In Public Administration Review. 62(4), pp: 424-433.<br />

[42] Norris, D., F., Moon, M., C., (2005).<br />

Advancing eGovernment at the grassoots: tortoise or hare.<br />

In Public Administration Review, 65(1), pp: 64-75.<br />

[43] Pekka, K., (2010). Co-production: a new<br />

concept in evaluation. Paper presented at the 9 th European<br />

Evaluation Society International Conference. October 6 – 8.<br />

Prague, Czech Republic.<br />

[44] Ebrahim, Z., Irani, Z., (2005). “eGovernmnet<br />

adoption: architecture and barriers”. In Business Process<br />

Management Journal, 11(5), p: 589-611.<br />

[45] Kramer, K. L., King. L., (2006). “Information<br />

Technology and Administrative Reform: will the time after<br />

eGovernment be different?” In International Journal of<br />

Electronic Government Research. 2(1), pp: 1-20.<br />

[46] Grimsley, M., Meehan, A., Tan, A.,<br />

(2005).Capital Accounting: Evaluation eGovernment<br />

projects from a Community Development Perspective.<br />

eGovernment Workshop ’05 (eGOV05), September 13,<br />

Brunel University, West London, UK.<br />

[47] Bovaird, T., (2007), “Beyond Engagement<br />

and Participation: User and Community Coproduction of<br />

295<br />

Public Services”. In Public Administration Review. 5, pp:<br />

846–860.<br />

[48] Hochgerner, J., (2011). The Analysis of<br />

Social Innovation as Social Practice.<br />

[49] European Commission, (2010).<br />

Communication from the Commission to the European<br />

Parliament, the Council, the European Economic an Social<br />

Committe and the Committe of the Regions: a Digital<br />

Agenda for Europe. COM(2010) 245. Brussels 19.05.2010.<br />

[50] Cursey, D., Norris, D., F., (2008). “Models of<br />

eGovernmnet: Are They Correct? An empirical<br />

Assessment”. In Public Administration Review. (3). pp:523-<br />

536.<br />

[51] Esteves, J., Rhoda, C. J., (2008). ”A<br />

comprehensive framework for the assessment of<br />

eGovernmnet projects”. In Governmnet Information<br />

Quarterly, 25, pp: 118 -132.<br />

[52] Kunstelj, M., Vintar, M., (2009). Evaluating<br />

One-stop Government: critical analysis of the concept and<br />

its implementation in the selected countries. NISPAcee<br />

Annual Conference, Budva, Montenegro.<br />

[53] Sarantis, D., Charabilidis, Y., Askounis, D.,<br />

(2011). “A goal-driven management framework for<br />

electronic government transformation project<br />

implementation”. In Government Information Quarterly, 28,<br />

pp: 117-128.<br />

[54] Sarantis, D., Smithson, S., Charabilidis, Y.,<br />

Askounis, D., (2010). “A critical assessment of project<br />

management methods with respect to electronic government<br />

implementation challenges”. In Systemic Practices and<br />

Action Research, 23(4), pp: 301-321.<br />

[55] Misuraca, G., Ferro, E. Caroleo, B (2010)<br />

Assessing emerging ICT-enabled governance models in<br />

European cities: results from a mapping survey. In<br />

<strong>proceedings</strong> of the IFIP 8.5 eGOV2010 Conference,<br />

Lausanne, 29 August – 3 September 2010, IFIP, Springer<br />

Publisher, LNCS 6228 (pp. 168-179).<br />

[56] Grimsley, M., Meehan, A. Tan, A., (2004).<br />

Evaluative Design of eGovernmnet Projects: a Community<br />

Development Perspective.Twelfth American Conference on<br />

Informatics Systems, Acapulco, Mexico.<br />

[57] Misuraca, G., Broster, D. and Centeno, C.,<br />

(2011) Digital Europe 2030: Designing scenarios for ICT in<br />

future governance and policy making, in Government<br />

Information Quarterly, Special Issue 10/2011, Elsevier<br />

Publishing.<br />

[58] Blanake, J., Lopez-Claros, A., (2004). The<br />

Lisbon Review 2004: an assessment of policies and reforms<br />

in Europe. Published by the World Economic Forum.<br />

[59] Pavlou, P., A., Chai, L., (2002). ”What drives<br />

electronic commerce across cultures? A cross-cultural<br />

empirical investigation of the theory of planned behaviour”.<br />

InJournal of Electronic Commerce Research. 3(4), pp: 240<br />

– 253.<br />

[60] European Commission, (2005). “i2010 – A<br />

European Information Society for growth and employment”.<br />

Communication from the Commission to the Council, the<br />

European Parliament, the European Economic and Social<br />

Committee and the Committee of the Regions.


[61] Gilbert, D., Balestrini, P., Littleboy, D.,<br />

(2004). “Barriers and benefits in the adoption of<br />

eGovernment”. In Governmnet Information Quarterly, 20,<br />

pp: 365-387.<br />

[62] Van Ryzin, G., (2006). Piece of a puzzle:<br />

linking government performances, citizens satisfaction and<br />

trust. A performing Public Sector: the Second Transatlantic<br />

Dialogue. June, Leuven, Belgium.<br />

[63] European Council, (2010). European Council<br />

conclusion on Europe 2020 strategy inclusive Digital<br />

Agenda. Conclusion of the European Council.<br />

[64] Fugini, M., Maggiolini, P., Krysnaia, N.,<br />

Boselli, R., Cesarini, M., Mezzamanica, M, (2008). Why is<br />

True eGovernment still difficult to be achieved? In IFIP –<br />

International Federation for Information Processing,<br />

Volume 280: “eGovernment; ICT Professionalism and<br />

Competence; Service Science”; Antonino Mazzeo, Roberto<br />

Bellini, Gianmario Motta (Ed. Boston: Springler). pp: 11-<br />

20.<br />

[65] Van Ryzin, G., (2009). Outcome, Process and<br />

citizens’ trust of the civil services. Paper prepared for the<br />

10 th National Management Research Conference, October 1-<br />

4. Ohio State University, John Glenn School of Public<br />

Affairs, Columbus, USA.<br />

[66] Belanger, F., Carter, L., (2008). “Trust and<br />

risk in eGovernment adoption”. In Strategic Information<br />

Systems, 17( ), pp: 165-176.<br />

[67] Anttiroiko, A-V., (2008). Local eGovernment<br />

for Development: preliminary remarks.<br />

[68] Teicholz, E., (1984). “Computer Integrated<br />

manufacturing”.InDatamation. 30(3), pp: 169-170.<br />

[69] Hammer, M., Champy, J., (1993).<br />

Reengineering the Corporation. New York: Harper Collins<br />

Publisher.<br />

[70] Peppard, J., Rowland, P., (1995).The essence<br />

of Business Process Reengineering. Series Edition: Adrian<br />

Buckley.<br />

[71] Van de Walle, S., (2002). Public services<br />

performance and trust in government: the problem of<br />

causality. Paper prepared for the Annual Conference of the<br />

European Group of Public Administration Study. Group 2:<br />

Productivity and Quality in the Public Sector. September 4-<br />

7. Potsdam.<br />

[72] Janssen, D., Rotthier, S., Snijkers, K., (2004).<br />

“If you measure it they will score: an assessment of<br />

international eGovernmnet benchmarking”. In Information<br />

Policy. 9(3/4), pp:121-130.<br />

[73] Heeks R., Molla A., (2009), Impact<br />

assessment of ICT development projects: a compendium of<br />

approaches, Manchester University Institute for<br />

development policy and management, Ed. Development<br />

Informatics Group.<br />

[74] Arnaboldi, M., Azzone, G. Savoldelli, A.<br />

(2004) “Managing a public sector project: the case of the<br />

Italian Treasury Ministry”. In: International Journal of<br />

Project Management 22: 213–223.<br />

[75] Bekkers, V., Homburg, V., (2007). “The<br />

myths of eGovernment: looking beyond the assumptions of<br />

296<br />

a new better government”. In The Information Society,<br />

23(5), pp: 373-382.<br />

[76] Holzer M., Kloby K., (2005), “Sustaining<br />

citizen-driven performances improvement: models for<br />

adaptation and issues of sustainability”. In The Public<br />

Sector Innovation Journal, Vol. 10, No, 1.<br />

[77] Kearns, I., (2004), “Public Value and<br />

Electronic Service Delivery: The UK Experience”. In<br />

eGovernment Reconsidered: Renewal of Governence for the<br />

Knowledge Age. Edited by E. L. Oliver & L. Sanders,<br />

Canadian Plains Research Center, University of Regina.<br />

[78] Omar, K., Scheepers, H., Stockdale, R.,<br />

(2011), eGovernment Services Quality Assessment through<br />

the Public Value Lens., In <strong>proceedings</strong> of the 10 th IFIP WG<br />

8.5 International Conference, EGOV 2011, Delft, The<br />

Netherlands, August/September, pp:431-440.<br />

[79] Shah, R., C., Kesan, J., P., (2010). “Software<br />

Governance”, in eGovernment Information, Technology and<br />

Transformation, Ed H. J. Scholl. AMIIS – Advances in<br />

Management Information Systems, Vladimir Zwass Series<br />

Editor. Chapter 8, pp: 125-140.<br />

[80] Foley, K., (2006). Using the value measuring<br />

methodology to evaluate government initiatives.<br />

Proceedings of the 2006 Crystal Ball User Conference. May<br />

1-3. Denver. Colorado.<br />

[81] US Chief Information Office (US CIO), Value<br />

Measuring Methodology. How to Guide, 2002, US CIO:<br />

Washington DC.<br />

[82] UK Office for Government Commerce,<br />

Measuring the Expected Benefits of E-Government, 2003,<br />

OGC: London.<br />

[83] SDAE (2005), MAREVA Méthode d’Analyse et de<br />

REmontée de la Valeur. Available at<br />

https://www.ateliers.modernisation.gouv.fr/ministeres/doma<br />

ines_d_expertise/budget_et_controle_d/public/foire-auxquestions/downloadFile/file/09.%20FAQ.zip?nocache=1195<br />

568309.47<br />

[84] Codagnone C. (2007). Measuring<br />

eGovernment: Reflections from eGEP Measurement<br />

Framework Experience. European Review of Political<br />

Technologies, 4, 89-106.<br />

[85] Codagnone, C. (2008). eGEP 2.0. Brussels:<br />

Delivered for the European Commission, DG Information<br />

Society.<br />

[86] Parasuraman, A., Grewal, D., (2000). “The<br />

Impact of Technology on the Quality-Value-Loyalty Chain:<br />

a Research Agenda”. In Journal of the Academy of<br />

Marketing Science. 28(1), pp: 168-174.<br />

[87] Dawes, S., S., Pardo, T., (2002). Building<br />

collaborative digital government system. In W.J. McIver, &<br />

A.K. Elmagarmid (Eds.), Advances in digital government.<br />

Technology, human factors and policy. Norwell, MA.<br />

Kluwer Academic Publisher.<br />

[88] Treasury Board of Canada (2004). Performance<br />

Measurement for the Government online Initiative. This<br />

document is available in alternative formats and on the<br />

Treasury Board of Canada Secretariat’s Web site at the<br />

following address:www.tbs-sct.gc.ca


Investigating the Relationships between Accountability<br />

and Governments’ Transformation to eGovernment<br />

ABSTRACT<br />

Many countries are moving towards eGovernment for ensuring<br />

higher efficiency, transparency and accountability in the public<br />

administration. Accountability, the obligation to justify one’s<br />

conduct, has been widely discussed in the social, public and<br />

political spheres. However, it is not so well understood how and<br />

to what extent Government’s accountability is affected with the<br />

transformation to eGovernment. This paper focuses on this aspect<br />

by means of literature review and analyzing indexes related to<br />

eGovernment and the factors associated with accountability<br />

available during the period 2005 -2010. The findings show that<br />

the relationship between accountability and eGovernment among<br />

the countries as whole is not straightforward as it depends on the<br />

characteristics of the individual governance. However, evidence<br />

in general shows that strong accountability, which is measured<br />

here through a level of integrity, influences the government to<br />

adopt eGovernment as it helps to open up the government and its<br />

policy process to its citizens and other stakeholders.<br />

Categories and Subject Descriptors<br />

K.4 [Computers and Society]: General, Public Policy Issues<br />

General Terms<br />

Management, Measurement, Performance, Human Factors<br />

Keywords<br />

eGovernment, Democracy, Accountability, Integrity<br />

1. INTRODUCTION<br />

Accountability is a distinct feature of social life [1] that refers to<br />

that “an actor feels an obligation to explain and to justify his or<br />

her conduct to some significant other” [2]. Accountability has<br />

been much talked in sphere of our lives especially for ordered<br />

social, public and political conducts.<br />

In this contemporary knowledge based society where the<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

M. Sirajul Islam and Åke Grönlund<br />

Örebro University<br />

School of Business (Informatics)<br />

Fakultetsgatan 1, SE-70182, Sweden<br />

+46 76 17 17 193, +46 70 58 51 790<br />

{sirajul.islam, ake.gronlund }@oru.se<br />

297<br />

influence of technologies and human values are unavoidable,<br />

accountability is treated as not only a moral obligation or sense of<br />

responsibilities [3][4] but also as one of the key indicators for<br />

performance measurement which is very evident in the<br />

contemporary public administrations. The United Nations (UN)<br />

defines accountability in public administration as an obligation of<br />

the government officials regarding handling of public resources<br />

and answerability on deviating from any stated performance<br />

objectives [5]. According to this definition, the key<br />

responsibilities of the public administration include not only to<br />

work for operational efficiency and effectiveness, but also to<br />

ensure operational transparency and establishing trust internally<br />

and externally. In a democratic environment, the government<br />

officials are held accountable explicitly as well as implicitly for<br />

their deeds and actions to the society in general and the citizens in<br />

particular. Appropriate use of Information and Communication<br />

Technologies (ICTs) in the public administration is expected to<br />

enhance operational efficiencies and thus paves the way for<br />

improved accountability and administrative effectiveness.<br />

The World Bank [6] defines eGovernment as the use of ICTs by<br />

the government agencies “that have the ability to transform<br />

relations with citizens, businesses, and other arms of government.<br />

These technologies can serve a variety of different ends: better<br />

delivery of government services to citizens, improved interactions<br />

with business and industry, citizen empowerment through access<br />

to information, or more efficient government management. The<br />

resulting benefits can be less corruption, increased transparency,<br />

greater convenience, revenue growth, and/or cost reductions.”<br />

Supplement to this definition, the UN [7] describes eGovernment<br />

as a powerful tool for enhancing the public sector together with<br />

citizens that can address particular development issues in a<br />

transformative society. Nowadays, eGovernment has been a way<br />

of realizing the vision of a global information society as “many<br />

countries are experiencing its transformative power in revitalizing<br />

public administration, overhauling public management, fostering<br />

inclusive leadership and moving civil service towards higher<br />

efficiency, transparency and accountability” [7]. Therefore,<br />

governments of those countries are inclined to transform their<br />

governance to eGovernment gradually. However, research shows<br />

that considering eGovernment as an automatic means of dramatic<br />

change in the public sector accountability is a ‘myth’ [8]. In fact<br />

there is a lack of clarity regarding to what extent and how the<br />

transparency, accountability and eGovernment are associated to<br />

each other [9]. This paper therefore aims at investigating ‘how is<br />

accountability affected when governments transform to<br />

eGovernment?’ by means of literature review and analyzing


available indexes and factors of eGovernment and accountability<br />

of the last five years.<br />

2. LITERATURE REVIEW<br />

“Accountability is a fundamental but underdeveloped concept<br />

[...]” [10]. It comes through a sense of moral responsibility at both<br />

the supply (i.e. the government) and demand (i.e. the citizens)<br />

ends. According to Smith et al. [4], responsibility is a concept that<br />

emerges in a social relationship in the causes of actions and<br />

events, which in turns depends on the person’s knowledge,<br />

capacity, ability to act appropriately as well as access to the<br />

appropriate resources. In addition to human values and qualities,<br />

discretion is an inseparable element of accountability that<br />

ultimately decides whether a particular action from an agent will<br />

be exposed or not in a given situation [4]. Accountability in public<br />

administration is varied depending on the functional spaces and<br />

nature of relationships among the internal as well as the external<br />

stakeholders. Romzek and Dubnick [10] describe four alternative<br />

systems of public administration (Figure 1), each of which is<br />

based on two critical factors – sources of agency control and<br />

degree of control over agency actions.<br />

Figure 1. Types of Accountability Systems [10]<br />

Among these alternatives (Figure 1), bureaucratic accountability<br />

systems are widely used mechanisms that depend on the<br />

organized and legitimate relationship between a superior and a<br />

subordinate as well as close supervision on a stated administrative<br />

rules and regulations. Legal accountability, which is closely<br />

related to bureaucratic accountability, is associated with frequent<br />

application of control to the administrative activities. Such a<br />

controlling application is depended on the relationships between<br />

the internal and external agencies, where external agency is<br />

considered as the ‘lawmaker’ and the internal agency (i.e. the<br />

public administrator) as the ‘executor’. Professional<br />

accountability involves an obligated responsibility of sincerely<br />

meeting the expected performance by the assigned employee with<br />

the expertise or special skills. Finally, political accountability is<br />

related to the democratic pressure that mainly concerns about the<br />

representation of the public administrator to certain<br />

constituencies, such as general public, elected officials, clients<br />

and heads of the agencies, special interests groups and future<br />

generations. Romzek and Dubnick argue that political<br />

accountability is seen on ethical dimension as such systems may<br />

promote favoritism and even corruption in the public<br />

administration. They further state that “the urge for political<br />

accountability, for example, is reflected in open meeting laws,<br />

freedom of information acts, and ‘government in the sunshine’<br />

statutes passed by many states and local governments [in the<br />

US].” [10]<br />

298<br />

Within the systems [10], the processes of accountability can be<br />

evident in three stages – (i) the information provision stage, (ii)<br />

the debating stage, and (iii) the judgment stage. The validity of<br />

information is enquired in the information provision stage, while<br />

it subsequently goes to debating stage for appropriateness of<br />

actions followed by rewarding or sanctioning of the taken actions<br />

in the judgment stage [4]. In this case, ICTs based<br />

communication has potential role over the information provision<br />

stage as such communication and data processing facilities can<br />

make the information easily accessible to wide audience. This<br />

explains that eGovernment is an essential enabler for enhancing or<br />

improving administrative integrity, transparency and<br />

accountability on an ethical dimension. However, there are some<br />

arguments that contradict the positive views on eGovernment in<br />

relation to accountability [8][9][11][12]. According to Kraemer<br />

and Dedrick [11], “In general, computing [in organizations] tends<br />

to reinforce existing tendencies, and by itself is not likely to affect<br />

organizational structure in significant ways”. In this regard, Wong<br />

and Welch [8] argue that the relationship between eGovernment<br />

and accountability is a conditional one as change in the<br />

accountability level depends on the context and characteristics of<br />

the public administration or the kind of bureaucracy.<br />

3. METHOD<br />

This study relies on the arguments on accountabilities in relation<br />

to ICTs available through on-line reports and research papers. In<br />

order to determine the relationship between accountability and<br />

eGovernment, three kinds of indexes are used, these are – UN<br />

global eGovernment indexes, Global Integrity indicators and<br />

EIU’s index of global democracy. There are so far no explicit<br />

indicators that would explain a comparative accountability status<br />

of a country. The 2010 Global Integrity indicators (GII) [13]<br />

scorecard assesses the existence, effectiveness, and citizen access<br />

to key governance and anti-corruption mechanisms through more<br />

than 300 actionable indicators, including some indicators related<br />

to country level accountability. The indicators, which are<br />

associated with the major issues of accountability, are fairly<br />

related to the accountability systems as discussed by Romzek and<br />

Dubnick [10] in the literature study as above. For example,<br />

bureaucratic systems can be related to the third category of GII<br />

(i.e. Government Conflicts of Interest Safeguards & Checks and<br />

Balances), while legal and professional systems can be fitted to<br />

the sixth category of GII (i.e Anti-Corruption Legal Framework,<br />

Judicial Impartiality, and Law Enforcement Professionalism).<br />

‘Public requests for government information’ is one of the<br />

indicators of GII that is close linked to the political accountability<br />

systems. As for an indicative comparison, a table (Appendix 2<br />

available at http://tinyurl.com/cp8ua6m) has been formulated that<br />

shows various performance indications during the period between<br />

2005 and 2010. The list of countries (40 in this study), as shown<br />

in the table, are chosen based on availability of Integrity data of<br />

the last three surveys covering 2006 to 2010 conducted by the<br />

Global Integrity [13].<br />

4. RESULTS AND DISCUSSION<br />

The integrity indicator is closely associated with accountability<br />

systems of the respective countries. Accountability performance<br />

in an environment of transformative governance cannot only be<br />

understood by the various parameters of Integrity [13], but also by<br />

the structure of bureaucracy which can also be well perceived by<br />

the characteristics of a regime, such as full or flawed democracy,


hybrid or authoritarian regime. Bovens [2] in this regard contends<br />

that “public accountability is not just the hallmark of democratic<br />

governance, it is also a sine qua non for democratic governance”<br />

Several regression analyses (Appendix 1 available at<br />

http://tinyurl.com/cp8ua6m) have been done in order to find<br />

relationships among the three variables - eGovernment,<br />

democracy and integrity. Results show that there are positive<br />

correlations exist among these variables, although the strengths of<br />

coefficient of the correlation varied under certain situation. The<br />

multiple regression tests indicates that 37% change in country’s<br />

eGovernment initiatives can be explained by the changes of<br />

democracy and integrity. On the other side, simple regression<br />

shows that democracy and integrity are both strongly correlated.<br />

However, while it comes with eGovernment (Y), country’s levels<br />

of democracy (democratic, flawed, hybrid and authoritarian) are<br />

weakly related. Furthermore, integrity (Y) is strongly correlated<br />

with eGovernment (X).<br />

According to data exhibited in Appendix 2 (available at<br />

http://tinyurl.com/cp8ua6m), determining relationship between the<br />

performances of country’s eGovernment (i.e. 40 countries in this<br />

study) and the other accountability indicators or vice-versa over<br />

the years (2005 to 2010) is not so straightforward. In general,<br />

USA, Canada and Japan demonstrate optimistic association<br />

among these three indicators – eGov, integrity and democracy.<br />

Bulgaria and South Africa have ‘strong integrity’ performance,<br />

but comparatively shown low rankings. One of the explanations<br />

could be that these two countries are quite new in converging to<br />

democracy in comparison to the latter three countries. Except<br />

Kazakhstan, countries with ‘moderate’ integrity either have<br />

flawed democracy or combination of both democratic and<br />

authoritative (i.e. hybrid) structures. According to eGovernment<br />

rankings, their status are highly diverged, for example – Colombia<br />

is the 31 st , while Ghana is at the 147 th position. The case of<br />

Kazakhstan seems interesting as the country is governed by an<br />

authoritarian regime [14], but ranks at the top 50 of global<br />

eGovernment index and holds a ‘fairly moderate’ integrity over<br />

the years. Kazakhstan’s integrity scorecards of the last three<br />

surveys [13] show that they have better performances in anticorruption<br />

measures, election integrity with voting and citizen<br />

participation, procurement process, government oversights and<br />

controls, and rule of laws. However, they are weak in facilitating<br />

public access to information and media, civil service regulations<br />

and ensuring government accountability at the executive,<br />

legislative, judiciary and budgetary processes. Except this, all the<br />

(forty) countries with authoritarian regimes have either ‘week’ or<br />

‘very weak’ integrities and most of them are placed at bottom half<br />

of the eGovernment indexes. Countries like Cameroon, Nigeria,<br />

and Yemen are far away in the ranking of integrity, eGovernment<br />

and democratic representations. Moldova and Bangladesh are<br />

weak in democracy, but demonstrate linear progresses in both<br />

integrity indexes and transforming to eGovernment. Bangladesh is<br />

progressing in the eGovernment indexes within the ‘weak<br />

integrity’ and hybrid structure of regime.<br />

Therefore, it appears that there is a relationship between the<br />

nature or characteristic of regimes and their transformation to<br />

eGovernment. But, how is the integrity affected that could<br />

determine accountability of a country? If we take USA as a bestcase<br />

example, we can see from their integrity scorecards that they<br />

have strong performance in some key areas of governments’<br />

integrity. These are [13], media and access to information, citizen<br />

299<br />

participation in the election, executive, legislative and budgetary<br />

accountabilities, audit institutions, anti-corruption, rule of law and<br />

law enforcement. On the other-side, they have weak presence over<br />

the national ombudsman.<br />

The above results also indicate that we cannot draw a straight line<br />

among the countries as whole in order to determine the<br />

relationship between eGovernment and integrity (as a proxy to<br />

accountability) or eGovernment and democracy. A good<br />

conclusion can be derived at just by analyzing individual country<br />

level performance in those indicators. According to this study, we<br />

found that out of 40 countries, only 9 of them have same level of<br />

indicators irrespective of their eGovernment status. For example,<br />

USA is 4 in all indicators and Yemen is 1 in all. 22 countries<br />

(55%) have similar association between their integrity and<br />

democracy indicators (for example, Argentina and Nepal).<br />

However, the relationship between eGovernment and integrity or<br />

eGovernment and democracy cannot be generalized as it is<br />

interestingly varied among the countries. 17 countries (43%) have<br />

same level of eGovernment and democracy indicators; whereas 13<br />

countries (33%) are with similar level of eGovernment and<br />

integrity (for example, Azerbaijan and Nicaragua).<br />

According to the above discussions and as for the research<br />

question of this paper is concerned, this cannot be so certain as to<br />

how and to what extent the elements of integrity in general and<br />

accountability in particular determine governments’<br />

transformation to eGovernment. Nevertheless, one thing is quite<br />

indicative that strong accountability provokes governments for<br />

strong transformation to eGovernment, whereas strong<br />

accountability depends on the strong democracy that at least<br />

comprises of congenial, transparent and result-oriented<br />

bureaucracy and strong judicial systems (for example USA,<br />

Canada and Japan). In this case, accountability is affected by the<br />

well-defined legal systems and the pressure coming from the open<br />

civil society due to strong presence of IC-based communications.<br />

5. CONCLUSIONS<br />

This paper addresses apparently an unexplored issue as how is<br />

accountability affected when governments transform to<br />

eGovernment. In doing so, it discusses the notion and<br />

characteristics of accountability in a special reference to ICTbased<br />

public administration and communications. The paper uses<br />

indexes of UN global surveys on eGovernment [7], global<br />

integrity [13] and EIU’s global democracy [14] published during<br />

the last five years (2005 -2010). The major finding is that<br />

accountability does influence the governments for transformation<br />

to eGovernment as it helps to open up the government and its<br />

policy process to internal as well as external stakeholders. More<br />

the transformation to eGovernment is, better indication for a<br />

democratic environment and administrative integrity. The study<br />

also indicates that to determine the influence of accountability to<br />

eGovernment transformation or vice-versa requires individual<br />

country level analysis. In fact the answer is not straightforward.<br />

The major limitation of this paper is that it attempts to address a<br />

complicated issue within a brief discussion. However, the findings<br />

can be used mainly for indicative purposes by the government<br />

officials and the researchers concerned about modernizing public<br />

administration and eGovernment. There are many unexplored<br />

elements in the integrity indicators [13] that need to be thoroughly<br />

investigated in order to better understand about the relationship


etween accountability and eGovernment. This suggestion can be<br />

treated as a call for future research as well.<br />

6. REFERENCES<br />

[1] Willmott, H. Thinking Accountability : Accounting for the<br />

Disciplined production of Self. In R. Munro J. Mouritsen<br />

(eds.), Accountability: Power, Ethos and the technologies of<br />

managing. London: International Thompson Business Press,<br />

1996.<br />

[2] Bovens, M. Public accountability. In The Oxford handbook<br />

of public management, ed. E. Ferlie, L. Lynne, and C. Pollitt,<br />

Oxford University Press, 2005, 182–208.<br />

[3] Johnssén, G. Accountability and Responsibility in e-<br />

Government. Presented at the 1 st Scandinavian Workshop on<br />

e-Government, Örebro, Sweden, 2004.<br />

[4] Smith, M., Noorman, M.E., Martin, A.K. Accountabilities,<br />

automations, Dysfunctions, and Values: ICTs in the public<br />

sector. London School of Economics, Working paper series<br />

169, 2008.<br />

[5] Armstrong, E. Integrity, Transparency and Accountability in<br />

Public Administration: Recent Trends, Regional and<br />

International Developments and Emerging Issues. United<br />

Nations Public Administration Network (UN-PAN), 2005.<br />

[6] World Bank. Definition of e-Government. 2005 Available at<br />

http://go.worldbank.org/M1JHE0Z280<br />

300<br />

[7] United Nations E-Government Survey 2010. United Nations<br />

Public Administration Network (UN-PAN), 2010.<br />

[8] Wong, W., Welch, E. Does E-Government Promote<br />

Accountability? A Comparative Analysis of Website<br />

Openness and Government Accountability. Governance, 17,<br />

2, 2004, 275-297<br />

[9] Orelli R.L., Padovani, E., Scorsone E. E-Government,<br />

Accountability, and Performance : A Comparative Analysis<br />

Between European Governments. EGPA 2009 Conference,<br />

Malta September 2-4, 2009.<br />

[10] Romzek, B. S., & Dubnick, M. J. Accountability in the<br />

public sector: Lessons from the challenger tragedy. Public<br />

Administration Review, 47, 3, 1987.<br />

[11] Kraemer, K., Dedrick, J. Computing and Public<br />

Organizations. Journal of Public Administration Research<br />

and Theory, 7, 1997, 89–112.<br />

[12] Heintze, T., Bretschneider, S. Information Technology and<br />

Restructuring in Public Organizations: Does Adoption of<br />

Information Technology Affect Organizational Structures,<br />

Communications, and Decision-Making. Journal of Public<br />

Administration Theory and Research, 10, 2000, 801–830.<br />

[13] Global Integrity Report- 2010. Global Integrity, Washington<br />

DC, USA, 2010.<br />

[14] Democracy Index -2010. Economist Intelligence Unit (EIU),<br />

2010.


Technologies, Tools and Web 2.0 in Support of Public<br />

Administration Workplace Communications<br />

ABSTRACT<br />

The aim of this paper is to investigate which are the technologies,<br />

tools and web 2.0 applications that support public administration<br />

workplace communications. The paper begins with e-<br />

Administration and web 2.0 uses in the context of public<br />

administration 2.0. Then the attention is focused on workplace<br />

communications review and technologies, and tools, which<br />

influence their efficiency and effectiveness. For the purpose of<br />

detailing the used public administration technologies and tools,<br />

O*NET database is investigated in terms of the governance and<br />

public management and administration occupations. In order to<br />

determine, to what extent the identified technologies, tools and<br />

web 2.0 applications are used in practice, an empirical survey is<br />

developed and carried out in “Information services and<br />

technologies” Directorate at Sofia Municipality. The paper<br />

concludes with a proposed PA 2.0 workplace communications<br />

model.<br />

Categories and Subject Descriptors<br />

H.3.5 [Online Information Services]: Data Sharing, Web-Based<br />

Services; H.4.1 [Office Automation]: Groupware, Spreadsheets,<br />

Time Management, Workflow Management; K.4.3<br />

[Organizational Impacts Automation]: Computer-Supported<br />

Collaborative Work<br />

General Terms<br />

Management, Performance, Economics, Human Factors<br />

Keywords<br />

ICT, Web 2.0, Public Administration, Communications<br />

1. INTRODUCTION<br />

“E-Government” refers to the use by government agencies of<br />

information technologies that have the ability to transform<br />

relations with citizens, businesses, and other arms of government.<br />

These technologies can serve a variety of different ends: better<br />

delivery of government services to citizens, improved interactions<br />

with business and industry, citizen empowerment through access<br />

to information, or more efficient government management,<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Milena Krumova<br />

Technical University – Sofia, Bulgaria<br />

Sofia 1000, bul. Kl. Ohridski 8<br />

+359 899 283987<br />

mkrumova@tu-sofia.bg<br />

301<br />

increasing revenue or re-structuring of administrative processes.<br />

[27]. The use of ICTs reflects on: (1) simplify and improve the<br />

internal administrative operations of government and their<br />

relations with other bodies involved in public management and<br />

service delivery; (2) facilitate public service interaction between<br />

government, citizens and other stakeholders, thus enabling better<br />

citizen participation and overall monitoring and evaluation of<br />

decision-making processes and their implementation; and (3)<br />

ensure inclusiveness and equal opportunity for all [14].<br />

According to M.Batorski and D.Hadden, e-Government did not<br />

achieve expected results because enabling technology was Web<br />

1.0 oriented. Social networking provides governments with a new<br />

paradigm: knowledge release rather than knowledge control.<br />

Government software technology can be categorized with the<br />

following framework [1]:<br />

o Internal: internal by governments<br />

o External: external to government with government<br />

involvement<br />

o Structural: follow government structure and mandate<br />

o Social: enable collaboration.<br />

eGovernment, both in practice and in concept, has been one of the<br />

important developments in public administration. The dynamic<br />

changes within the e-government reflect on the public<br />

administration internal and external communications and the<br />

services. The changes are strongly related to the people - public<br />

administrators and working requirements to them. Are they<br />

prepared to use technologies, tools and web 2.0 at their daily<br />

activities and communications?<br />

1.1 Research Objectives<br />

Fundamental and vital to public administration (PA) workplace<br />

communications is the information transmitting and making<br />

oneself understood by another or others. Communications are one<br />

of major challenges because they are a key for providing<br />

information, which results in efficient and effective performance<br />

in PA. The main goal of this study is to examine what are the<br />

main technologies, tools, in particular web 2.0 applications that<br />

support PA workplace communication? It seeks to increase the<br />

understanding that the effective use of technologies, tools and web<br />

2.0 (TTW2.0) possesses potential for communications<br />

improvement.<br />

1.2 Research Questions<br />

What are the major characteristics of e-Administration and PA 2.0<br />

in the context of TTW2.0?; How can PA workplace<br />

communications be improved by TTW2.0?; What are TTW 2.0


that the PA employees need to be well prepared for to work<br />

with?/How are TTW2.0 related to PA occupations according to<br />

O*NET?; In terms of workplace communications, is there a gap<br />

between TTW2.0 within O*NET and the used ones in it and a real<br />

working environment (Sofia Municipality “Information services<br />

and technologies” Directorate)?<br />

1.3 Research Method<br />

In order to meet the research goal, various methodologies were<br />

applied, such as, literature review, a desk-based review,<br />

interviews, web search and a web survey. The survey has been<br />

designed as a blend qualitative and in a small scale quantitative<br />

research technique.<br />

1.4 Structure of the Paper<br />

The paper i) starts with review about e-Administration and PA<br />

2.0. The advantages of technologies usage are outlined. The<br />

workplace communications and the communication itself are<br />

presented in the context of PA. Then, ii) it continues with O*NET<br />

database research related to the Government & Public<br />

Administration occupations. iii) The identified TTW2.0s are<br />

summarized. iv) Based on identified TTW2.0, a survey has been<br />

designed and empirically applied at Sofia Municipality<br />

“Information services and technologies” Directorate. The survey<br />

aimed to identify: “Where are the TTW2.0 used at and how<br />

communications can be improved? Is there a gap between<br />

necessary knowledge, skills and competencies to work with<br />

TTW2.0 and a real working environment in regards to workplace<br />

communications“. The results are presented and discussed. v) The<br />

paper ends with TTW2.0 uses for PA and a proposed abstract PA<br />

2.0 workplace communications model.<br />

2. E-ADMINISTRATION<br />

Electronic public administration or e-Administration is one of the<br />

main eGovernment domains: eSociety; eAdministration; eCitizens<br />

& eServices (Figure 1) [7]. e-Administration is the effective<br />

management of the coordination and control of processes and the<br />

electronic information they create. It has two fundamental<br />

objectives: to increase the efficiency of administrative processes<br />

within institutions and to lessen the administrative burden faced<br />

by all staff during this process [11].<br />

eGovernment domains<br />

1<br />

Building<br />

external<br />

interaction:<br />

eSociety<br />

2<br />

Improving<br />

government<br />

processes:<br />

eAdministration<br />

1<br />

Connecting<br />

citizens:<br />

eCitizens and<br />

eServices<br />

Creating empowerment<br />

Making strategic<br />

connections in government<br />

Managing process<br />

performance<br />

Effective and efficient<br />

communication processes<br />

Improving time<br />

management<br />

Cutting process costs<br />

Figure 1. eGovernment domains<br />

e-Administration is also viewed as an Information and<br />

Communication Technologies (ICT) and tools, with the goal<br />

302<br />

being to improve productivity and performance. It expresses a<br />

mechanism that transforms: traditional offices into paperless<br />

offices, paper processes into electronic processes, internal<br />

communications with other offices and organizations and public<br />

organisms with initiative and transparency. e-Administration<br />

brings many advantages: interoperability, with the administration<br />

and citizens; integration of services that allow total and horizontal<br />

access to information; teleprocessing, telecommunications,<br />

official and administration communication is carried out<br />

electronically; bidirectional communications system; email,<br />

sending documents via email; electronic signature and validation.<br />

e-Administration brings the administration closer to citizens,<br />

integrates administrations, offers the private sector and<br />

associations complete electronic services. It offers citizens and<br />

public administrators 1 new communication channels. A key<br />

purpose of the e-administration is to improve the internal<br />

workings of the public sector by cutting process costs, managing<br />

process performance, creating strategic connections within<br />

government bodies, and creating empowerment (Wikipedia). e-<br />

Administration can encompass both intra-office and inter-office<br />

communication.<br />

JRC study about ICT- driven models of eGovernment, including<br />

eAdministration, tried to provide input for longer-term strategic<br />

planning. A list of technologies was prepared, focusing on the<br />

disruptive potential of the technologies themselves: mobile<br />

devices (PDAs, wearable computers, MP3-players, mobile<br />

phones) intelligent agents (and robotics), sensors, language<br />

processing and semantic technologies, serious games, RFID and<br />

biometrics, ICT infrastructures (WiFi, WiMAX, Broadband), web<br />

technologies (social software) and GRID [8].<br />

3. PUBLIC ADMINISTRATION 2.0<br />

Social computing (also known as Web2.0) is spreading in all<br />

spheres of life including government and public administration. A<br />

research named “Web 2.0 in Government: Why and How?”<br />

addresses the general issues about web 2.0 applications relevance<br />

for the government context: what way web 2.0 is likely to have an<br />

impact on government; how significant could this impact be and<br />

how web 2.0 applications are implemented in the government<br />

context [19].<br />

Definition (Wikipedia): Web 2.0 is web application features that<br />

facilitate participatory information sharing, interoperability, usercantered<br />

design, and collaboration on the World Wide Web. Web<br />

2.0 allows users to interact and collaborate with each other in a<br />

social media dialogue as creators of user-generated content in a<br />

virtual community, in contrast to websites where users<br />

(consumers) are limited to the passive viewing of content that was<br />

created for them. It has been also described as: “a fusion of<br />

sociology and technology, transforming monologues (one-tomany)<br />

into dialogues (many-to-many) and is the democratization<br />

of information, transforming people from content readers into<br />

publishers.” Web 2.0 is created to actively communicate and<br />

participate on the Internet, [16] not just to read a content, listen to<br />

or observe. Much of web 2.0 activities involve individual users<br />

coordinating with others, through many to many communication<br />

channels (Figure 2). Web 2.0 promotes many to many interaction<br />

1 Public administrators are public servants working in public departments<br />

and agencies, municipality, at all levels of government. A civil servant<br />

or public servant is a person in the public sector employed for a<br />

government department or agency.


with resources, peers and experts within and beyond the<br />

organization area. Public servants can use blogs and wikis,<br />

participated in web conferencing and developed podcasts and<br />

videos and become more efficient in their workplace<br />

communications thus indirect influence over quality of public<br />

services.<br />

Wikis<br />

Tagging<br />

Social<br />

networking<br />

Media<br />

sharing<br />

Social<br />

bookmarking<br />

Blogging<br />

Media<br />

manipulation<br />

Many to many<br />

communications<br />

channels<br />

Web 2.0<br />

activities<br />

Figure 2. Web 2.0 activities<br />

Collaborative<br />

editing<br />

Recommender<br />

systems<br />

Conversational<br />

arenas<br />

Virtual<br />

worlds<br />

Syndication<br />

An important shift was seen not just as the use of particular tools<br />

or techniques, but to the fostering of digital engagement. This<br />

involves:<br />

o dialogue: moving from broadcast to conversation;<br />

o not only listening but responding;<br />

o two-way collaboration sharing information, data, discussion;<br />

o opening spaces for peers to interact - facilitating communities;<br />

o moving audience from awareness to action.<br />

Web 2.0 covers a range of technologies. The most widely used are<br />

blogs, wikis, podcasts, information tagging, prediction markets,<br />

and social networks [3] (Figure 3).<br />

303<br />

Web 2.0<br />

technologies<br />

Wikis, commenting,<br />

shared workspaces<br />

Blogs, podcasts,<br />

videocasts, peer to<br />

peer<br />

Prediction markets,<br />

information<br />

markets, polling<br />

Tagging, social<br />

bookmarking/<br />

filtering,<br />

user tracking,<br />

ratings, RSS<br />

Social networking,<br />

network mapping<br />

Figure 3. Web 2.0 technologies<br />

Broad<br />

collaboration<br />

Broad<br />

communication<br />

Collective<br />

estimation<br />

Metadata creation<br />

Social graphing<br />

Broadly discussed in e-Administration field, web 2.0 technologies<br />

enable communication, collaboration and content creation,<br />

individually or together, and then publish to a workplace<br />

community. PA 2.0 can link familiar productivity tools to intranet<br />

publishing and search capabilities, thus public administrators can<br />

communicate and collaborate more efficiently with greater<br />

flexibility and access to information [11]. There are three key<br />

characteristics of web 2.0 applicable to PA: open - accessible and<br />

transparent; social-based on people and contacts/communications<br />

between them and user-oriented [2].<br />

Many initiatives have adopted web 2.0 applications in the<br />

government context. There are relevant applications in the private<br />

sector, which could be transferred to the government context.<br />

According to “E-Government Survey 2012” there has been a<br />

drastic rise of social media at the public administration [26].<br />

Web 2.0 affects different domains of public administrators’<br />

activities. While the debate is mostly focused on the impact in<br />

citizen-government relations (the so-called front-office) at<br />

present, analysis show that web 2.0 applications are also relevant<br />

for the back office activities of public administration [19].<br />

4. PUBLIC ADMINISTRATION<br />

WORKPLACE COMMUNICATIONS<br />

Definition (Wikipedia): Communication is the exchange of<br />

thoughts, messages, or information, as by speech, visuals, signals,<br />

writing, or behavior. According to Herbert A. Simon, who is<br />

known for his theory of administrative behavior “without<br />

communication there can be no organization”. In the context of<br />

internal communication, there are four tasks: categorize the types<br />

of information necessary to be communicated to employees for<br />

the effective functioning of the institution; identify the current<br />

delivery methods for communicating internal information; assess<br />

the effectiveness of the current methods, and recommend<br />

guidelines for effective communication [10]. The PA<br />

communications can be inter-relationship of public servants with<br />

the citizen and “extra-organizational”, communications with<br />

institutions [13]. There are a number of PA communications:<br />

formal and informal; vertical and lateral; verbal and non-verbal.<br />

They can be also viewed as occurring at intranet, extranet or<br />

internet environment [21] (Figure 4).<br />

Category of technology


Without any regards to the form of communication, the<br />

communication itself plays a very important role in the PA. A<br />

number of variables influence the PA effectiveness of<br />

communications. Some are found in the environment, intranet<br />

environment, extranet or internet in which communications take<br />

place, some in the personalities of the sender and the receiver, and<br />

some in the relationship that exists between sender and receiver.<br />

In the present context, PA communications are discussed within<br />

intranet environment. In the literature, there exist many studies<br />

concerning PA communications effectiveness and efficiency.<br />

INTRANET<br />

Workplace<br />

Communications<br />

EXTRANET<br />

Communications<br />

INTERNET<br />

Figure 4. Intranet (workplace) communications<br />

In his study, F. Petru examines the role of communication for the<br />

managerial process effectiveness of public administration [20].<br />

D.Špaček and J.Špalek analyze the relationship between<br />

electronic public administration and the present public<br />

administration model as developed within the reform of public<br />

administration in the Czech Republic, which has a significant<br />

impact on the information flows (communication) and certainly<br />

on the electronic public administration in the Czech context. The<br />

authors argue that, the quality of communication can be<br />

significantly influenced by utilization of modern ICT [25].<br />

“Digital Communities” study accent on wikis or similar tools,<br />

such as Microsoft’s SharePoint or others, that could be used to<br />

standardize business processes, functions and terms across an<br />

entire government. Web 2.0 and social networking preparedness is<br />

also discussed [5].<br />

In the next part of the current research, O*NET database will be<br />

investigated. O*NET is identified as a benchmark database for<br />

occupations [22, 23]. It contains information about hundreds of<br />

standardized and occupation-specific descriptors, including<br />

required technologies and tools for public administration related<br />

occupations.<br />

5. O*NET - TECHNOLOGIES AND TOOLS<br />

@ PUBLIC ADMINISTRATION<br />

OCCUPATIONS<br />

Occupational Information Network (O*NET) 2 is a comprehensive<br />

database of worker attributes and job characteristics [17]. O*NET<br />

is the replacement for the Dictionary of Occupational Titles<br />

(DOT). O*NET is being developed as a timely, easy-to-use<br />

resource that supports public and private sector efforts to identify<br />

and develop the skills of the American workforce. It provides a<br />

2 Occupational Information Network, http://www.onetonline.org/<br />

304<br />

common language for defining and describing occupations. Its<br />

flexible design also captures rapidly changing job requirements.<br />

O*NET database can serve as the engine that drives value-added<br />

applications designed around core information. It provides the<br />

essential foundation for facilitating career counseling, education,<br />

employment, and training activities [18]. The database, is<br />

available to the public at no cost, is continually updated by<br />

surveying a broad range of workers from each occupation. The<br />

database also provides the basis for Career Exploration Tools, a<br />

set of valuable assessment instruments for workers and students<br />

looking to find or change careers. Content Model, is the<br />

conceptual foundation of O*NET (Figure 5).<br />

Figure 5. O*NET Content model<br />

The Content Model embodies a view that reflects the character of<br />

occupations (via job-oriented descriptors) and people (via workeroriented<br />

descriptors). The Content Model also allows occupational<br />

information to be applied across jobs, sectors, or industries (crossoccupational<br />

descriptors) and within occupations (occupationalspecific<br />

descriptors). These descriptors are organized into six<br />

major domains: worker characteristic; worker requirements;<br />

experience requirements; occupational requirements; workforce<br />

characteristics and occupation-specific information. It provides a<br />

framework that identifies the most important types of information<br />

about work and integrates them into a theoretically and<br />

empirically sound system.<br />

Figure 6 shows the occupations related to information:<br />

knowledge, skills, abilities, and interests, general work activities,<br />

work context, including technologies and tools. Figure 6 shows<br />

the investigation path of the current research.<br />

The domains enable the user to focus on areas of information that<br />

specify the key attributes and characteristics of workers and<br />

occupations. Occupation-Specific Information is one of the<br />

domains. It consists of tasks - occupation-specific Tasks and tools<br />

and technology - Machines, equipment, tools, software, and<br />

information technology workers may use for optimal functioning<br />

in a high performance workplace. O*NET advanced search<br />

options allows users to browse by data or career cluster.<br />

Government and public administration career cluster includes:<br />

governance; national security; regulation; planning; revenue and<br />

taxation; public management and administration. In the current<br />

context, government and public management and administration<br />

career cluster are investigated. A number of occupations are<br />

included in each career cluster within O*NET. The investigated<br />

occupations within Public Management and Administration career


cluster were: Court Clerks; Court, Municipal, and License Clerks;<br />

Eligibility Interviewers, Government Programs; License Clerks;<br />

Managers, Municipal Clerks; Postal Service Clerks; Postal<br />

Service Mail Carriers; Postal Service Mail Sorters, Processors,<br />

and Processing Machine Operators; Postmasters and Mail<br />

Superintendents; Social and Community Service Managers. The<br />

investigated occupations within Governance career cluster were:<br />

Administrative Services Managers; Broadcast News Analysts;<br />

Chief Executives; Communications Teachers, Postsecondary;<br />

Eligibility Interviewers, Government Programs; Emergency<br />

Management Directors; General and Operations Managers;<br />

Legislators; Managers; Mapping Technicians; Postmasters and<br />

Mail Superintendents; Public Relations Specialists; Reporters and<br />

Correspondents; Social and Community Service Managers;<br />

Storage and Distribution Managers; Surveying and Mapping<br />

Technicians; Surveying Technicians; Transportation Managers.<br />

O*NET<br />

Bright<br />

outlook<br />

Job Zone<br />

Job family<br />

Career<br />

cluster<br />

Green<br />

economy<br />

sector<br />

Industry<br />

STEM<br />

Discipline<br />

Marketing, sales and services<br />

Education & training<br />

Architecture & construction<br />

Agriculture, food and natural resources<br />

Business, Management & Administration<br />

Art, audio/video technology & communications<br />

Health services<br />

Government & Public<br />

administration<br />

Law, public safety, corrections and security<br />

Human services<br />

Manufacturing<br />

Transportation, distribution & logistics<br />

Finance<br />

Hospitality & tourism<br />

Science, technologies, engineering and<br />

mathematics<br />

Information Technology<br />

The summarized technologies, tools and web 2.0 applications<br />

within O*NET database are as follows:<br />

o Tools: Computer/laptop; Calculators, printers; USB flash<br />

drives; Personal digital assistants PDA; Mobile phones —<br />

smartphones; Scanner; Electronic charts or maps or atlases;<br />

etc.<br />

o Technologies: Spreadsheet software: Microsoft excel; IBM<br />

lotus 1-2-3; Word processing software: Microsoft word;<br />

Electronic mail software: e-mail; Microsoft outlook;<br />

Microsoft project; Presentation software: Microsoft<br />

PowerPoint; Map creation software: mapping software; etc.<br />

Regulation<br />

National Security<br />

Public<br />

Management and<br />

Administration<br />

Governance<br />

Revenue and<br />

taxation<br />

Planning<br />

Figure 6. O*NET – Government & Public administration career cluster<br />

o Web: Web page creation and editing software: Facebook;<br />

Social media software; Blogging software; MySpace;<br />

Podcasting software; Website management software; etc.<br />

It can be concluded that even the fact that technologies and tools<br />

are in the core of e-governance and e-administration, in some<br />

governance and PA within O*NET database, there are no<br />

technologies and tools used. For example, the main activities of<br />

Municipal Clerks are: draft agendas and bylaws for town or city<br />

council; record minutes of council meetings; answer official<br />

305<br />

Skills<br />

Knowledge<br />

Education<br />

Abilities<br />

Interests<br />

Tools and<br />

technologies<br />

Work values<br />

Work styles<br />

Work context<br />

Work activities<br />

Tasks<br />

Wages &<br />

employment<br />

correspondence; keep fiscal records and accounts; prepare reports<br />

on civic needs, where no technologies and tools are used. The<br />

Web page creation and editing exists only in few governance and<br />

public management, and administration occupations, such as<br />

Public Relations Specialists or Reporters and Correspondents.<br />

6. EMPIRICAL SURVEY<br />

Technologies, tools and web 2.0 used in the survey are based on<br />

O*NET investigation. The aim of the survey was to establish


whether there is a gap and what Technologies, Tools and Web 2.0<br />

(TTW2.0) are used in workplace and how they can support<br />

workplace communications. The methodology for empirical<br />

survey was as follows:<br />

1) The questionnaire for the survey was designed. It includes<br />

four groups of questions regarding: (a) public administration<br />

workplace communications; (b) technologies, tools and web<br />

2.0 usages within workplace; (c) benefits from better<br />

communications on the workplace; (d) willingness to learn,<br />

to improve knowledge, skills and competencies to work with<br />

new technologies, tools & Web 2.0. The Technologies and<br />

Tools which are used in the survey are based on the O*NET<br />

investigation. Web 2.0 applications are chosen as a result of<br />

the literary research and discussions with experts in the field.<br />

Particular focus is given to respondents` willingness to learn<br />

about Technologies and Tools and Web 2.0, in order to<br />

improve their knowledge, skills and competencies.<br />

2) Some meetings and interviews were done with representative<br />

from the Sofia Municipality Directorate “Information<br />

services and technologies” which is the main administrative<br />

and territorial unit in Sofia. Based on discussions with the<br />

representatives a decision about which directorate will best<br />

correspond to the goal of the research was made. Most of the<br />

occupations within the Directorate of “Information services<br />

and technologies” are strongly linked to the technologies and<br />

tools.<br />

3) PA staff, who work in the Sofia Municipality Directorate<br />

“Information services and technologies”, were asked to<br />

respond to the survey and about more than half of them<br />

agreed to give their responds. This questionnaire asked each<br />

respondent question about his/her subjective impression of<br />

the technologies and tools used at the workplace. The given<br />

responses were for more than 90% of the questions.<br />

4) The results of the study are presented into four parts: Part 1:<br />

PA workplace communications; Part 2: Technologies, tools<br />

and web 2.0 usage within workplace; Part 3: Benefits from<br />

better communications on the workplace; Part 4: Willingness<br />

to learn how to work with new technologies, tools & Web<br />

2.0.<br />

5) Data collection period: March 2012 – April 2012.<br />

Responding to this survey was not mandatory. Data are<br />

collected directly from survey respondents. The gathering of<br />

responses was done by a free web based surveying tool. It<br />

allowed automatically responses collection and analysis. For<br />

some of the questions five point Likert scale was used.<br />

6) The results are discussed, summarizing the most important<br />

relations between the groups of questions. The study was<br />

conducted to find answers about: what is the usage of<br />

technologies, tools and web 2.0; are there link between<br />

communications efficiency and TTW2.0 usage; are there gap<br />

in TTW2.0 at the public administration workplace; how<br />

many public employees and professionals are ready and<br />

willing to learn for TTW2.0 for improving their knowledge,<br />

skills and competencies.<br />

Many initiatives are conducted for the e-government development<br />

on a national level in Bulgaria. In December 2011, a start was<br />

given to the electronic exchange of documents between five state<br />

administrations, Ministry of Transport, Information Technology<br />

306<br />

and Communications (MTITC), Ministry of Foreign Affairs,<br />

Ministry of Economy, Energy and Tourism, Road Infrastructure<br />

Agency and BULATSA, by sending and receiving documents<br />

electronically until today [12]. These administrations use the same<br />

document management system. The electronic exchange of<br />

documents today saves time, increases efficiency and reduces<br />

administration costs of departments. Sofia Municipality takes an<br />

active role in e-Government development projects, and it is<br />

planned to be a pilot Lot 3 beneficiary Municipality. Currently,<br />

Sofia Municipality use Document Management Software<br />

“АКСТЪР ОФИС” and most of workplace communications are<br />

done by electronic tools and technologies [24].<br />

6.1 Part 1 - Better Communications at<br />

Workplace<br />

This part of the survey includes 18 questions. The starting point is<br />

to identify how each one of the staff communicates at work, what<br />

does he/she think about personal barriers and what does the<br />

information depend on. At the begging the questions are focused<br />

on indirect factors which influence workplace communications.<br />

The survey data showed that all of the respondents like their job,<br />

and about 69,3% of respondents like to be connected during<br />

working time. The data showed that the majority of the<br />

respondents (77%) agree that the communication itself depends on<br />

the Internet and the net and that two side of the communication,<br />

sender and receiver, are equally important (92,3%). Most of the<br />

respondents (84,6%) communicate more often when they are at<br />

work than when they are at home. The respondents who prefer to<br />

receive information in communication verbally are 46,2%, but<br />

those who prefers to receive information by mail are 38,5 %, no<br />

one prefers using Skype. Next question is about how do<br />

employees prefer to communicate. The responses are similar to<br />

the previous ones: 7,7% prefer to communicate online, 30,8%<br />

Face to Face (F2F), 46,2% F2F&online and 15,4% said that it<br />

doesn’t matter. This comes to the conclusion that most of the<br />

respondents prefer to receive information and to communicate by<br />

using electronic technologies. But, in regards to communication<br />

with some colleagues, 53,8% of the respondents said that they<br />

prefer to communicate more via mail than F2F, about 30,8% can`t<br />

say, 15,4% don’t prefer to communicate via mail more than via<br />

F2F.<br />

It can be concluded that the team working environment is not so<br />

good and there is a presence of bad workplace relationships<br />

concerning some of the staff. Most of the respondents (84,6%)<br />

agree that “Better communication will improve time to finish<br />

work, quality of work and his/her labor cost”. “How often do you<br />

contact someone daily?”, 72,7% of the respondents need to<br />

contact someone at least 5 to 19 times per day. About 18,2% of<br />

them need to contact someone at work more than 50 times, which<br />

leads to the conclusion that about ¼ of the respondents dependent<br />

on communicating with other colleagues at work. The survey data<br />

showed that 92,3% feel happy to take part in community events<br />

and are always ready to support someone in her/his work. 61,5%<br />

of respondents said that his/her competency of working with tool<br />

and technology is extremely important to communicate effectively<br />

and for 38,5% they are important. The result is that technologies<br />

have the potential to improve communications at the workplace.<br />

6.2 Part 2 - Technologies, Tools and Web 2.0<br />

This part of the survey contains three subparts. The first subpart<br />

includes technologies (7 questions), the second one includes tools


(8 questions) and the third subpart includes web 2.0 (10<br />

questions).<br />

6.2.1 Technologies<br />

The point is to identify whether the administrators are familiar<br />

with technologies or not. The data showed that the majority of the<br />

respondents are familiar with the technologies. Map creation<br />

software is the least one that is being used at work (no one uses<br />

it), Microsoft Project (9,1%). Word processing software is used at<br />

work (36,4%) and 66,7% of the respondents use it at work & at<br />

home equally. The most used at work is electronic mail software<br />

and spreadsheet software, out of total 63,6% use electronic mail<br />

software at work and 36,4% use it equally at work and at home.<br />

6.2.2 Tools<br />

“How often do you use the tool in your work activities: during the<br />

whole day, half of the day, ¼ of the day, less than an hour or don’t<br />

use it?”. All respondents said that they use computer/laptop durind<br />

the whole day. 18,2% of total respondents said that they use<br />

mobile phones and Smartphones whole day, 9,1% of respondents<br />

use scaners actively. Less used are calculators, USB flash,<br />

electronic charts, map or attlases<br />

6.2.3 Web 2.0<br />

In this subpart of the survey, the questions are related to web 2.0.<br />

Are the employees familiar with web 2.0, do they use web 2.0 at<br />

work or do they not use it? The data shows that, some of them are<br />

well familiar, whereas others are not. 10% of respondent know<br />

about the Blogging, Online virtual games and worlds, Media<br />

sharing and social media software. Most of respondents are<br />

familiar with blogging and social media software but do not use<br />

them. Social networking (Facebook; LinkedIn; My space) is the<br />

most used by the respondents. Out of the total 41,7% use social<br />

networking at home. No one has blog. The survey data shows that<br />

most of the respondents are familiar with web 2.0 applications<br />

but, don`t use them at work. Despite that some of Web 2.0<br />

applications are not allowed to be used at the workplace, the<br />

respondents know about them and used some of them for years.<br />

33,3% of respondents declare that they have Skype account since<br />

3 to 4 years, 33,3% have Skype account for more than 5 years.<br />

Out of the total, 16,4% of the respondents have Facebook account<br />

for more than 5 years.<br />

307<br />

6.3 Part 3 – Technologies, Tools and Web 2.0<br />

Use at the Workplace Communications<br />

Third part of the survey (7 questions) point the effect of<br />

communications based on the technologies, tools and web 2.0<br />

uses. 33,3% of respondents strongly agree, that better<br />

communications will improve mostly working community and<br />

team working (25%). 75% of respondents declare they agree that<br />

the information flows transparency will be improved, 83,3% agree<br />

that information exchange difficulties will be diminished. Out of<br />

the total, 58,3% agree that better communications affect personal<br />

fulfillment, 66,7% agree that misunderstanding along the<br />

communications channels will decrease. 50% of employees<br />

declare that team working will be improved. Only 8,3% of them<br />

strongly disagree that better communications will improve<br />

personal fulfillment.<br />

6.4 Part 4 - Willingness to Learn<br />

Fourth part of the survey includes 8 questions. The survey data<br />

shows that the majority of the respondents strongly agree to learn<br />

in order to improve their knowledge, skills and competencies. The<br />

respondents agree that knowledge and competencies about new<br />

technologies, tools and web 2.0 will indirectly influence work<br />

efficiency. All respondents agree that they would spend time to<br />

learn, no negative response. Of the total, 16,7% are interested in<br />

learning about technologies, 8,3% are interested in tools, 8,3%<br />

are interested in web 2.0. Most of respondents (58,3%) would<br />

spend 6 hours weekly to learn, 16,7% would spend 2 hours<br />

weekly, 16,7% would spend 10hours, and only 8,3% would<br />

spend more than 10 hours weekly. “In case that you enroll in a<br />

learning course for technology, tools and Web 2.0, who will<br />

benefit from it?” 60% of respondents said that the benefit will be<br />

for him/her personally and the organization, 40% said that the<br />

benefit will be for him/her, organization and services.<br />

7. CONCLUSION<br />

This research paper tried to identify technologies, tools and web<br />

2.0 which support public administration communications, while<br />

focusing on the people in the process (Figure 7). Additionally to<br />

the eAdministration and public administration 2.0 literary review,<br />

an investigation within O*NET database was done. The paper<br />

looks at the key issue that the public administrators need not only<br />

to be knowledgeable, highly qualified, skilled and competent for<br />

doing their job, but much more to be familiar and prepared for<br />

using technologies, tools and mostly web 2.0 applications,<br />

relevant to his/her occupation at workplace.


Figure 7. Public Administration 2.0 workplace communications model<br />

Based on the technologies, tools and web 2.0 investigated in<br />

O*NET, an empirical survey was conducted at “Information<br />

services and technologies” Directorate at Sofia Municipality. The<br />

survey showed that the employees apply in their daily<br />

communications most of the analyzed technologies and tools. But<br />

it is identified a little gap in the knowledge of web 2.0<br />

applications. The employees agree that the efficient<br />

communications are a key gateway to success in their work. One<br />

of the most important conclusions is that there exists a potential<br />

for improving communications and that the staff is willing to learn<br />

in order to acquire new knowledge, new skills and develop<br />

competencies in the field of technologies, tools and web 2.0<br />

related to his/her occupation. The survey results do not tend to be<br />

a representative for all public administration offices. The results<br />

are related only to a particular administrative office, “Information<br />

services and technologies” Directorate at Sofia Municipality,<br />

where it was held, but they are a good base for more complex<br />

study at a district or a national level.<br />

8. ACKNOWLEDGMENTS<br />

Thanks to Research laboratory "Technologies and standards for elearning"<br />

TU-Sofia for support in this research. Thanks to Sofia<br />

Municipality, “Information services and technologies” directorate<br />

for support in the research implementation and respond to the<br />

request to participate in this study.<br />

9. REFERENCES<br />

[1] Batorski, M., D.Hadden, Embracing Government 2.0:<br />

Leading transformative change in the public sector, Grant<br />

Thornton LLP, 2010,<br />

http://grantthornton.com/staticfiles/GTCom/Public%20sector<br />

/Gov20Jan2010.pdf<br />

[2] Berlo, D., Civil Servant 2.0 New ideas and practical tips for<br />

working in government 2.0, Civil Servant 2.0 beta Action<br />

steps towards government 2.0, Programma Ambtenaar 2.0,<br />

2008,<br />

http://api.ning.com/files/j8isrYTD1gKgWBE7i2qmYhTXlW<br />

d45ExM*v7-<br />

308<br />

8uXVfuOMwo8kjaOW9sascpHM*IkbLkhb9KchUvIe5gxyo<br />

GROF-CuU0b*SnPe/CivilServant2.0.pdf<br />

[3] Chui, M., A.Miller, and R.Roberts, McKinsey Quarterly: Six<br />

Ways to Make Web 2.0 Work, 2009,<br />

http://www.scribd.com/doc/12599205/McKinsey-Quarterly-<br />

Six-Ways-to-Make-Web-20-Work-Feb-2009-Issue<br />

[4] Constantinides, E., The Web 2.0 as Marketing Tool:<br />

Opportunities for SMEs, The 16th Annual High Technology<br />

Small Firms Conference, 2008,<br />

http://<strong>proceedings</strong>.utwente.nl/96/1/Constantinides.pdf<br />

[5] Digital Communities, Government 2.0: Building<br />

Communities with Web 2.0 and Social Networking, 2008,<br />

http://media.govtech.net/Digital_Communities/assets/DC08_<br />

PAPER_CIO_TASK_10.27.pdf<br />

[6] Dovey,T., W. Eggers, Deloitte Research – Web 2.0: The<br />

future of collaborative government, Discussion Summary<br />

Washington, DC, 2009,<br />

http://www.deloitte.com/assets/Dcom-<br />

UnitedStates/Local%20Assets/Documents/us_ps_web20gove<br />

rnment_March2009.PDF<br />

[7] eGov4Dev, "eGovernment for Development Information<br />

Exchange" Project, University of Manchester's Institute for<br />

Development Policy and Management,<br />

http://www.egov4dev.org/success/definitions.shtml<br />

[8] Frissen, V., et al., The Future of eGovernment. An<br />

exploration of ICT-driven models of eGovernment for the<br />

EU in 2020, European Communities, Joint Research Centre<br />

Institute for Prospective Technological Studies, 2007,<br />

http://ftp.jrc.es/EURdoc/eur22897en.pdf<br />

[9] Huijboom, N., et al., Public Services 2.0: The Impact of<br />

Social Computing on Public Services, 2009,<br />

http://ftp.jrc.es/EURdoc/JRC54203.pdf<br />

[10] Internal Communications Survey, Brookdale Community<br />

College, 2006,


http://ux.brookdalecc.edu/governance/Governance%20Gazett<br />

e%20Page_files/2005-2006/ColLifeSurv.pdf<br />

[11] Joint Information Systems Committee,<br />

http://www.jisc.ac.uk/whatwedo/themes/eadministration.aspx<br />

[12] Ministry of Transport, Information Technology and<br />

Communications Bulgaria, Available from:<br />

http://www.mtitc.government.bg/page.php?category=454<br />

[13] Miron, L., D.Ţicu, The Communication in Public<br />

Administration in Urban Areas, European Integration -<br />

Realities and Perspectives, 2012,<br />

http://www.<strong>proceedings</strong>.univdanubius.ro/index.php/eirp/article/view/1275/1250<br />

[14] Misuraca, G., A. Reid & M. Deakin, Exploring emerging<br />

ICT-enabled governance models in European cities, Analysis<br />

of the Mapping Survey to identify the key city governance<br />

policy areas most impacted by ICTs, EU European<br />

Commission Joint Research Centre Institute for Prospective<br />

Technological Studies, 2011<br />

[15] Musaraj, A., Communication processes, public<br />

administration and performance evaluation, University<br />

Pavaresia, Albania, Academicus International Scientific<br />

Journal, http://www.academicus.edu.al/nr3/Academicus-<br />

MMXI-3-028-037.pdf<br />

[16] NETCOACH,<br />

http://www.netcoach.eu.com/index.php?id=233<br />

[17] O*NET OnLine,<br />

http://www.onetonline.org/find/career?c=4&g=Go<br />

[18] Occupational Information Network,<br />

https://onetmxdev.rti.org/about.cfm<br />

[19] Osimo, D, Web 2.0 in Government: Why and How?,<br />

European Commission Joint Research Centre Institute for<br />

309<br />

Prospective Technological Studies, © European<br />

Communities, 2008, http://ftp.jrc.es/EURdoc/JRC45269.pdf<br />

[20] Petru, F., The role of communication for the managerial<br />

process effectiveness of public administration, 2007,<br />

http://steconomice.uoradea.ro/anale/volume/2007/v1economics-and-business-administration/64.pdf<br />

[21] Ruskov, P., Groupware, Edited by “UNWE” Sofia, Bulgaria,<br />

ISBN 954-494-324-2, p.16-17, 1998 (in Bulgarian)<br />

[22] Shoikova, E., M.Krumova, O*NET and Competency Based<br />

Education, Annual journal of electronics, ISSN 1313-1842,<br />

p.145-151, 2010<br />

[23] Shoikova, E., M.Krumova, Overview of the Occupational<br />

Information Network, Annual journal of electronics, ISSN<br />

1313-1842, p.152-156, 2010<br />

[24] Sofia Municipality, http://www.sofia.bg/en/index_en.as<br />

[25] Špaèek, D., J. Špalek, Communication and Electronic Public<br />

Administration: Some Issues in the Context of the Czech<br />

System of Public Administration,<br />

http://unpan1.un.org/intradoc/groups/public/documents/nispa<br />

cee/unpan027501.pdf<br />

[26] United Nations E-Government Survey 2012 E-Government<br />

for the People, United Nations, 2012, p.3, p.29, Available<br />

from:<br />

http://unpan1.un.org/intradoc/groups/public/documents/un/un<br />

pan048065.pdf, p.7-8<br />

[27] World Bank,<br />

http://web.worldbank.org/WBSITE/EXTERNAL/TOPICS/E<br />

XTINFORMATIONANDCOMMUNICATIONANDTECH<br />

NOLOGIES/EXTEGOVERNMENT/0,,contentMDK:205071<br />

53~menuPK:702592~pagePK:148956~piPK:216618~theSite<br />

PK:702586,00.html


Transforming City Government: A Case Study of Philly311<br />

Taewoo Nam<br />

Center for Technology in Government<br />

University at Albany, SUNY<br />

187 Wolf Road, Suite 301<br />

Albany, NY12205, United States<br />

+1-518-442-3892<br />

tnam@ctg.albany.edu<br />

ABSTRACT<br />

This paper describes the transformation of a city government led<br />

by a 311 program, which provides a consolidated channel for nonemergency<br />

services and information. The paper first discusses the<br />

concept of “smart city” as a foundation for the examination of the<br />

311 program as a practice of government innovation. The paper<br />

then presents the details of the 311 program as instantiated in the<br />

City of Philadelphia. In-depth interviews with Philadelphia City<br />

government officials and managers responsible for creating and<br />

operating the City’s 311 system (Philly311) offer insights into the<br />

contributions the system is making to a more efficient, effective,<br />

transparent, accountable, and collaborative city government.<br />

Performance data provided by Philly311 enables more efficient<br />

resource allocation and informed decision making. Philly311 is<br />

credited with making the process of service delivery more<br />

transparent to the public, and providing traceability of requested<br />

services which imbues service departments with a sense of<br />

accountability. Service level agreements are providing measurable<br />

standards of municipal services and are used to support<br />

accountability in terms of service status. Regular reviews of<br />

service level agreements and content of the system are also<br />

recognized as promoting interdepartmental collaboration. 311<br />

systems are broadly recognized as powerful tools to engage<br />

residents in improving their neighborhoods. Institutionalizing<br />

interdepartmental collaborations emerged from the interviews as a<br />

critical capability in advancing from the initiation stage of<br />

Philly311-like systems to operations and refinement.<br />

Categories and Subject Descriptors<br />

H.4.2 [Information Systems Applications]: Type of systems —<br />

e-government applications.<br />

General Terms<br />

Management, Performance, Human Factors, Theory.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

310<br />

Theresa A. Pardo<br />

Center for Technology in Government<br />

University at Albany, SUNY<br />

187 Wolf Road, Suite 301<br />

Albany, NY12205, United States<br />

+1-518-442-3892<br />

tpardo@ctg.albany.edu<br />

Keywords<br />

311, Non-emergency service, Contact center, Customer service,<br />

Smart city, Service level agreement, E-government, City<br />

government.<br />

1. INTRODUCTION<br />

The phrase “smart city” is used more and more regularly by<br />

elected officials, civil society, the private sector, and academia.<br />

Regardless of this emerging trend, there is no agreed-upon<br />

description of what “smart” implies in the context of a single city.<br />

Some recent conceptual studies have discussed a city’s smartness<br />

[1,4,6,17,20,21]. In these studies, a smart city is broadly<br />

understood as improvements in city infrastructure including<br />

information and communication infrastructures, and physical<br />

infrastructures such as roads, bridges, and buildings, services such<br />

as utilities, social services, and transportation, and a variety of<br />

resources such as natural resources, financial resources, cultural<br />

resources, and human capital. However, the concept of a smart<br />

city is still abstract and even ambiguous.<br />

There is another reason for the lack of agreement around the<br />

“smart city” concept. A smart city often comes across as a<br />

normative claim. People want the cities they are living in to be<br />

smarter; they want to close the gap between their current status<br />

and their expectations. Smart city strategies—e.g., integrating<br />

critical infrastructures and services, consolidating systems, and<br />

interconnecting networks—are emerging as responses to a variety<br />

of complex problems such as crime, health concerns, pollution,<br />

aging populations, deteriorating infrastructure, and traffic<br />

congestion, that cities are currently facing due to dense<br />

congregations of people in spatially limited areas [24]. The<br />

desirable status of being “smart” is an outcome sought by the<br />

public and city officials alike. In this sense, increasing attention is<br />

being paid to those city governments who are successful in<br />

transforming their cities through “smart city” initiatives.<br />

Discussions of and certainly research about smart cities must pay<br />

attention to the characteristics of the city governments that make<br />

their city smarter. Previous studies of smart cities emphasize<br />

smartness of government, administration, and public management<br />

as core factors in the creation of a smart city [6,20,21].<br />

Adopting the view of a smart city as one that has more innovative,<br />

more efficient, and more effective government, this paper<br />

employs a case study of Philly311, the City of Philadelphia’s 311<br />

non-emergency contact program, among a variety of current and<br />

best practice examples of government efforts to make cities<br />

smarter. The concept of “smart city” is used as a foundation for


the examination of the 311 program as a practice of government<br />

innovation, based on a review of current thinking about the<br />

dimensions and components of smart cities. Philly311 is,<br />

according to the Mayor of Philadelphia, Michael Nutter, one of<br />

his flagship initiatives being carried out to make the City smarter.<br />

A case study based on qualitative data from semi-structured<br />

interviews with the City’s executives, Philly311 staff, and<br />

managers of other related departments allows for a close<br />

examination of how the Philly311 service is helping make<br />

Philadelphia a smarter city.<br />

The remainder of this paper is structured into six sections. Section<br />

2 draws on recent research to outline the characteristics of a smart<br />

city and a smart government. Section 3 presents the methodology<br />

used in the study and introduces the case. Section 4 presents the<br />

case analysis with a particular focus on changes observed in city<br />

management and service delivery in the City of Philadelphia and<br />

considered to be consequences of the implementation of<br />

Philly311. Section 5 discusses challenges the City is facing in<br />

operating Philly311 and also opportunities Philly311 offers.<br />

Section 6 further discusses the impacts made by Philly311 as one<br />

instance of smart city initiatives. Section 7 concludes this paper.<br />

2. CONCEPTUALIZING SMART CITY<br />

AND GOVERNMENT<br />

Since we consider a smart city as transformation and innovation in<br />

city government, we use the “smart city” concept as a foundation<br />

to describe a practice of government innovation—in this paper,<br />

Philly311. This section introduces and discusses a set of working<br />

definitions of a smart city, followed by a review of the core<br />

components constituting the concept of a smart city derived from<br />

both academic and practical research. Finally, we discuss how a<br />

smart government is recognized as one of the core capabilities of<br />

a smart city.<br />

Table 1. Working definitions of a smart city<br />

� “An urban area functioning and articulated by modern<br />

information and communication technologies in its various<br />

verticals, providing ongoing efficient services to its population”<br />

[2].<br />

� “A city well performing in a forward-looking way in economy,<br />

people, governance, mobility, environment, and living, built on<br />

the smart combination of endowments and activities of selfdecisive,<br />

independent and aware citizens” [12: p. 11].<br />

� The foundational concepts are instrumented, interconnected,<br />

and intelligent city. “Instrumented refers to sources of near-realtime<br />

real-world data from both physical and virtual sensors.<br />

Interconnected means the integration of those data into an<br />

enterprise computing platform and the communication of such<br />

information among the various city services. Intelligent refers to<br />

the inclusion of complex analytics, modeling, optimization, and<br />

visualization in the operational business processes to make<br />

better operational decisions” [15: p. 1].<br />

� “A city striving to make itself ‘smarter’ (more efficient,<br />

sustainable, equitable, and livable)” [Natural Resources<br />

Defense Council: smartercities.nrdc.org]<br />

� “The use of Smart Computing technologies to make the critical<br />

infrastructure components and services of a city––which<br />

include city administration, education, healthcare, public safety,<br />

real estate, transportation, and utilities––more intelligent,<br />

interconnected, and efficient” [24: p. 2].<br />

311<br />

Several working definitions of a smart city can be found in the<br />

literature (see Table 1). They share some features as well as have<br />

some unique aspects. For example, while Giffinger et al. [12]<br />

view a smart city as one performing in a “forward-looking” way,<br />

the Natural Resources Defense Council considers “smarter” as<br />

more efficient, sustainable, equitable, and livable. Harrison et al.<br />

[15] conceptualize a smart city in a technological sense as<br />

instrumented, interconnected, and intelligent. Similarly,<br />

Washburn et al. [24] see a smart city as intelligent,<br />

interconnected, and efficient.<br />

The definitions from Anavitarte and Tratz-Ryan [2], Harrison et<br />

al. [9], and Washburn et al. [24] each emphasize the role of<br />

information and communication technologies (ICTs). The<br />

technologies include smart computing [24] and a range of<br />

instruments such as sensors, kiosks, meters, personal devices,<br />

appliances, cameras, and smart phones [15]. In sum, a smart city<br />

is defined with some key elements including meanings of<br />

smartness in the urban context, the role of technologies in making<br />

a city smarter, domains that need to be smart, and infrastructures<br />

and services that are provided to the population.<br />

The definitions taken together provide a roadmap for cities<br />

seeking to become smarter. Washburn et al. [24] highlight seven<br />

key areas where cities are investing in becoming “smarter”<br />

including city administration, education, healthcare, public safety,<br />

real estate, transportation, and utilities. Giffinger et al. [12]<br />

identifies six key aspects of a city where smart cities are seeking<br />

to have an impact from their investments: economy, people,<br />

governance, mobility, environment, and living. Chourabi et al. [6]<br />

put forth eight components of a smart city: technology,<br />

management and organization, governance, policy, people and<br />

communities, economy, built infrastructure, and natural<br />

environment.<br />

The components of a smart city included in the definitions are<br />

further specified in both academic literature and practical reports.<br />

Recent studies discuss definitional components and conceptual<br />

dimensions of a smart city. Nam and Pardo [20] suggest three<br />

conceptual dimensions of a smart city—i.e., technological<br />

artifacts, people and communities, and institutional<br />

arrangements—by exploring a wide array of recent research<br />

focusing on a smart city and/or similar (often interchangeably<br />

used) labels such as an intelligent city, innovative city,<br />

information city, knowledge city, and creative city, among others.<br />

Nam and Pardo [20] consider a smart city as a more<br />

comprehensive concept comprising such diverse similar labels.<br />

Technology is central to defining a smart city, but a smart city<br />

cannot be built simply through the use of technology. Importantly,<br />

technology is a means to enable social, environmental, economic,<br />

and cultural progress. Smart cities thus must be capable of<br />

sustaining such progress across the diversity of components and<br />

conceptual dimensions [1,17]. Along with this view, smart city<br />

initiatives driven by municipal governments can be characterized<br />

as innovation in multiple dimensions—i.e., technology,<br />

management, and policy [21].<br />

Three smart city ranking tools and frameworks merit attention as<br />

comprehensive sets of components of smart cities. The ranking<br />

system to score European medium-sized (population between<br />

100,000 to 500,000) cities (www.smart-cities.eu) includes six<br />

categories of smart city evaluation indicators: economy<br />

(competitiveness), people (social and human capital), governance<br />

(participation, transparent governance, the functioning of the


administration), mobility (transportation and ICT), environment<br />

(natural resources, environmental protection, sustainable resource<br />

management), and living (quality of life, cultural facilities, health,<br />

safety) [12]. IBM’s core city systems are categorized into three<br />

systems: operating systems (city services system comprising<br />

public service management and local government administration),<br />

user systems (citizens system comprising health, education and<br />

public safety, and business system), and infrastructure systems<br />

(transport system, communication system, water system, and<br />

energy system) [8,9]. In IBM’s framework, city governance and<br />

city strategy connect across the seven systems. Forrester<br />

Research’s white paper [24] suggests seven critical infrastructure<br />

components and services of a smart city including city<br />

administration, education, healthcare, public safety, real estate,<br />

transportation, and utilities.<br />

Table 2 compares the comprehensive sets of smart city<br />

components suggested by Chourabi et al. [6], European mid-sized<br />

city evaluation tool [12], IBM [8,9], and Forrester [24]. While<br />

each includes technology and government as components (public<br />

service management and local government administration), each<br />

model also stresses unique components.<br />

Table 2. Components of a smart city<br />

Chourabi et<br />

al. [6]<br />

European<br />

mid-sized<br />

cities [12]<br />

IBM [8,9] Forrester<br />

[24]<br />

Technology √ √ √ √<br />

Management &<br />

administration<br />

√ √ √ √<br />

Governance √ √ √<br />

City services √ √ √<br />

People and<br />

communities<br />

√ √<br />

Economy √ √<br />

Built<br />

environment<br />

√ √<br />

Natural<br />

√ √<br />

environment<br />

Note. City services broadly include transportation, safety, heath, water,<br />

energy, housing, and culture.<br />

As shown in Table 2, one of core components of a smart city is a<br />

smart government because a city government is a central actor<br />

that plays a pivotal role to lead and coordinate smart city<br />

initiatives and efforts. In the IBM core city system that Dirks et al.<br />

[9] suggested, the concept of a smart government comprises<br />

public service management and local government administration<br />

as key components. Thus city management and city services can<br />

be identified as two main dimensions of a smart government.<br />

Some previous conceptual studies defined the dimensions of<br />

management and service in smart city activities. Since a smart city<br />

is considered urban innovation, smart city initiatives can be<br />

characterized as government innovation in management and<br />

services [21]. Nam and Pardo [21] considered a smart city in the<br />

aspect of government management as enhancing efficient,<br />

effective management both in front-office and back-office<br />

operations of city government. They also defined managerial<br />

innovation of a smart government as “a mechanism to create<br />

managerial and organizational capabilities for effective use of<br />

technological tools and conditions” [21: p. 187]. On the other<br />

hand, Dirks et al. [8] defined a city services system as “the<br />

312<br />

operational activities and coordination of service delivery<br />

provided by the city authority” (p. 5). In particular, smart service<br />

means “tailoring services to the needs of individual citizens” and<br />

“using technology to integrate the information systems of<br />

different service delivery agencies to enable better services for<br />

citizens [8: p. 11].<br />

In line to these concepts of management and service as smart<br />

government dimensions, many discussions of a smart government<br />

have been recently made. According to Chourabi et al. [6],<br />

management and organization of a city government and its<br />

governance with other actors are key success factors of smart city<br />

initiatives. The smart city model suggested by Giffinger et al. [12]<br />

underscores smart governance as a larger category including a<br />

smart government. The smart governance component comprises<br />

participation in decision making and transparent governance. In<br />

the model of Giffinger et al. [12], the quantifiable measure of<br />

transparent governance represents citizen satisfaction with<br />

transparency of bureaucracy and with fight against corruption.<br />

Washburn et al. [24] saw efficient management of city operations<br />

and effective delivery of city services as key to smart government:<br />

An efficient city administration that provides services to<br />

its citizens and fosters businesses is essential to<br />

today’s service-based economy. A smart government<br />

service is informed about its city’s condition and is able<br />

to reach its citizens effectively. A core component of<br />

this function is using communication and collaboration<br />

technologies to manage city operations. … Moreover, it<br />

uses data and scientific analysis in all phases of the<br />

decision-making process to improve the economy and<br />

quality of life. (p. 5–6)<br />

Thus smart city administration should contribute to greater<br />

efficiency, effectiveness, and the improvement in decision<br />

making. Dirks et al. [9] identify local government expenditure and<br />

staff as prerequisites of a smart government. Elements of the<br />

smart system for management and operation include coordinated<br />

service delivery, e-government application, and the use of ICT for<br />

service delivery. Outcomes of a smart government appear as<br />

increased efficiency and effectiveness of service delivery [9: p. 5].<br />

To sum, a smart government is expected to increase efficiency,<br />

effectiveness, and transparency in organizational management and<br />

service delivery. A smart government also may promote<br />

coordination and collaboration among city departments and with<br />

other external organizations and citizens. Thus a smart<br />

government can facilitate non-governmental entities’ participation<br />

in decision making and monitoring of service delivery. In this<br />

sense, a smart government should include governance with both<br />

internal (within government) and external actors.<br />

Reflecting on this discussion, we create the metrics of assessing a<br />

smart government and will use it to the case of Philly311, as<br />

exhibited in Table 3.<br />

Efficiency<br />

Table 3. Metrics for assessing a smart government<br />

Effectiveness<br />

Transparency<br />

Governance<br />

Management Service


3. CASE STUDY METHOD<br />

This study uses case study methodology to understand why and<br />

how a social phenomenon of interest occurs [25]. The method<br />

helps develop preliminary understanding. Given the emerging<br />

nature of 311 contact centers and the paucity of academic research<br />

on the service centers, case study methodology is an appropriate<br />

approach to conducting this exploratory research [25]. This study<br />

is also inductive so that it contributes to building new<br />

understanding. This section describes data collection, data<br />

analysis, and the case of Philly311 non-emergency contact center.<br />

3.1 Data Collection<br />

In order to identify the relevant interview participants, purposive<br />

sampling was employed. Because of the relative newness of the<br />

research theme, the sampling technique is needed to identify and<br />

target individuals who could provide important information to<br />

understand the social phenomenon [11]. The director of Philly311<br />

as an initial informant was asked to recommend others who have<br />

sufficient information and knowledge in various aspects of 311<br />

operation. Interview participants were selected to avoid redundant<br />

knowledge and maximize new knowledge. Interviewees from<br />

different levels and functions include executive-level officials (the<br />

mayor, the managing director, and the deputy director), Philly311<br />

staff members (director, operation manager, and technology<br />

expert), and representatives of other service departments<br />

(commissioner and chief of staff) related to 311 operations.<br />

In December 2011, the authors conducted 16 semi-structured<br />

interviews with city government officials and managers with<br />

responsibility for managing and operating the City of<br />

Philadelphia’s 311 service center, Philly311. Each face-to-face<br />

interview lasted approximately one hour, and additional<br />

information was collected through follow-up email<br />

communication.<br />

Data was collected using the protocol jointly developed by the<br />

multinational “Smart Cities Service Integration” research team,<br />

which aims to explore the processes of smart city initiatives and<br />

their impacts on cities, people, and city governments. The study of<br />

Chourabi et al. [6] provides a conceptual background of the<br />

interview protocol. Table 4 presents a summary of interview<br />

questions included in the interview protocol.<br />

Table 4. Sample interview questions<br />

Categories Questions<br />

Case<br />

description<br />

� How did Philly311 start?<br />

� What are the main goals of Philly311?<br />

� What organizations are involved and how?<br />

Smart city � What does it mean for a city to be smart?<br />

� What are characteristics of a smart city?<br />

Management<br />

and<br />

organization<br />

� How is Philly311 organized and managed?<br />

(probes: organizational structure, business<br />

process, workflow, progress tracking, staffing,<br />

training, funding, etc.)<br />

� What organizational challenges is Philly311 facing<br />

in achieving its objectives?<br />

� How are those challenges being overcome?<br />

Technology � How is information and communication technology<br />

being used for Philly311? (probes: service<br />

channels, data analysis tools, system integration,<br />

social media use, etc.)<br />

313<br />

� What are the barriers or challenges to using<br />

technologies for Philly311?<br />

Governance � How is Philly311 governed? (probes: governing<br />

body, governance model, decision making<br />

process, and conflict resolution process)<br />

� What’s the authority and role of staff, partners,<br />

and stakeholders?<br />

� How are citizens and other organizations involved<br />

in Philly311?<br />

Policy � What is the relationship between Philly311 and the<br />

policy environment?<br />

Context � How does the larger environment of Philly311<br />

influence Philly311? (e.g., cultural, social, political,<br />

economic, demographic contexts)<br />

People and<br />

communities<br />

� How does Philly311 affect and is affected by the<br />

population and communities of the City?<br />

Economy � What is the impact of Philly311 on the City’s<br />

economy?<br />

Natural<br />

environment<br />

� How does Philly311 affect the City’s natural<br />

environment?<br />

The team also established criteria for case selection including a<br />

focus on service provision, transportation, and human services and<br />

selected cases must have a service integration component that<br />

crosses the boundaries of agencies within a city. Philly311 as a<br />

direct service delivery project and with a focus on city-level<br />

service integration met the selection criteria.<br />

3.2 Case Analysis<br />

Interviews were transcribed and analyzed following an inductive<br />

logic approach and using grounded theory techniques. Employing<br />

a qualitative analysis software tool (Atals-ti), we did a systematic<br />

iterative process of joint coding and analysis to minimize personal<br />

bias. Grounded theory refers to theory that is developed<br />

inductively from empirical data, and the grounded theory<br />

approach is a method of using empirical data without<br />

preconceived theories to generate or discover a theory [13,22].<br />

For this research, coding refers to a process of labeling,<br />

separating, compiling, categorizing, and organizing qualitative<br />

data [5,7,18]. Descriptive codes are used so that interview<br />

transcripts were coded in sentence or multi-sentence chunks.<br />

Glaser and Strauss [13] suggested the four stages of grounded<br />

theory analysis as follows:<br />

• Codes: identifying anchors that allow the key points of the<br />

data to be gathered<br />

• Concepts: collections of codes of similar content that allows<br />

the data to be grouped<br />

• Categories: broad groups of similar concepts that are used<br />

to generate a theory<br />

• Theory: a collection of explanations that explain the subject<br />

of research<br />

Corresponding to the research logic, Table 5 describes the scheme<br />

of this grounded theory analysis.<br />

Table 5. The scheme for the grounded theory analysis<br />

Categories Concepts Codes emergent from the data


Smart<br />

management<br />

Smart service<br />

delivery<br />

Technological<br />

factors<br />

Organizational<br />

factors<br />

Governance<br />

factors<br />

Efficient<br />

management<br />

Effective<br />

management<br />

Transparent<br />

management<br />

Managerial<br />

governance<br />

Efficient service<br />

delivery<br />

Effective service<br />

delivery<br />

Transparent<br />

service delivery<br />

Governance in<br />

service delivery<br />

Technological<br />

challenges<br />

Technological<br />

opportunities<br />

Organizational<br />

challenges<br />

Technological<br />

opportunities<br />

Governance<br />

challenges<br />

Governance<br />

opportunities<br />

Efficient resource allocation; saving<br />

budget; saving human resource;<br />

business process change<br />

Informed decision making; datadriven<br />

management; performance<br />

management; business process<br />

change<br />

Anti-corruption; integrity;<br />

transparency; open government;<br />

service level agreement<br />

Interdepartmental collaboration;<br />

external partnership; service level<br />

agreement<br />

Service integration; channel<br />

consolidation; shared service<br />

capability<br />

Customer-oriented service;<br />

professionalism; internal customers;<br />

external customers<br />

External accountability; internal<br />

accountability; service level<br />

agreement<br />

Citizen engagement; neighborhood<br />

engagement; community<br />

engagement; neighborhood liaison<br />

Under-equipping; cost of upgrading<br />

back-office technologies; timing of<br />

investment of the right technology at<br />

the right time; the digital divide<br />

Channel diversification; emerging<br />

technologies; smart phone<br />

Limited funding; limited operation;<br />

limited staffing; cultural conflict;<br />

interdepartmental difference<br />

Business process change; datadriven<br />

culture; performance-driven<br />

culture; customer-oriented culture<br />

Interdepartmental conflict; the lack<br />

of a formal governing body; informal<br />

interdepartmental collaboration;<br />

more burden for extensive data<br />

analysis<br />

Relational governance; mutual<br />

understanding; citizen engagement<br />

3.3 Case Description<br />

Philadelphia is one of the last cities of its size to activate a 311<br />

non-emergency toll-free number. On the last day of 2008, the<br />

mayor and the managing director of the City opened Philly311 as<br />

a concrete step toward the administration’s strategic goal of<br />

smarter, faster, and better government through customer service,<br />

government efficiency, and accountability. The basic idea—<br />

giving the public a direct way to request services or complain and<br />

using their feedback to hold government accountable—was not<br />

entirely new to Philadelphia. The City already had customer<br />

hotlines, but there was no single, consolidated contact point. The<br />

new 311 contact center absorbed the City Hall Switchboard, the<br />

Mayor’s Action Center, the Department of Licenses and<br />

Inspections’ customer line, and part of the Department of Streets’<br />

customer line. Philly311 offers various ways to contact the City:<br />

phone, in person (Philadelphia is one of a few cities with a walk-<br />

314<br />

in center), email, short message service (SMS), and social media<br />

(Twitter).<br />

4. PHILLY311 AND TRANSFORMING<br />

GOVERNMENT<br />

This section shares some of the finding from the interviews with<br />

Philly311 officials. Overall we heard about two kinds of changes<br />

in resulting in part from the Philly311 initiative; changes in<br />

management and service delivery. The 311-driven changes<br />

discussed below are expounded first in terms of efficiency,<br />

effectiveness, transparency, and governance (See Table 6).<br />

Table 6. Philly311: driving innovation<br />

Efficiency � Efficient use and<br />

allocation of resources<br />

Effectiveness � Informed decision<br />

making<br />

� Data-driven<br />

management<br />

Transparency � Anti-corruption and<br />

integrity<br />

Governance � Internal collaboration<br />

� External partnership<br />

Management Service Delivery<br />

� Frontline service<br />

integration<br />

� Shared services<br />

� Customer-oriented<br />

service<br />

� Professionalism<br />

� Internal and external<br />

accountability<br />

� Citizen engagement<br />

� Neighborhood<br />

engagement<br />

4.1 311-Driven Changes in Management<br />

The 311 service center is recognized as helping other departments<br />

use their resources more efficiently and effectively. One of<br />

Philly311’s objectives involves allowing agencies and<br />

departments to focus on their core mission and manage their<br />

workload efficiently (see www.phila.gov/311). Just as Baltimore’s<br />

original motive for launching its 311 was to reduce the crush of<br />

calls flooding into 911, Philly311 allows Philadelphia’s 911<br />

center to devote their resources to life-threatening and urgent<br />

situations. Philly311 also enables the City Council (the City’s<br />

legislative body) to use their resources more effectively, by saving<br />

their budget and staff time spent on facilitating constituent<br />

services. According to interviewees, this has freed Council<br />

resources, primarily the time of Council members, to other<br />

important needs of city residents.<br />

Furthermore, the information Philly311 provides to other<br />

departments is driving internal business process changes. One<br />

Philly311staff person gave an example of how Philly311 is<br />

contributing to informed decision making in the departments by<br />

helping them easily find hot spots.<br />

[XX department] had a fairly random process in how<br />

they prioritize replacement of street lights. Once we<br />

provide data, we are able to provide GIS map. That<br />

shows where the calls come from—hot spots. They can<br />

visually see the clusters. Now they have a data source.<br />

The data source actually gave them an opportunity to<br />

say “we need to do this.” Always right places.<br />

Interviewees consider Philly311 as crucial to their larger citywide<br />

performance management efforts. Data pulled from Philly311 can<br />

expose what residents care about most. This data is used to


discuss departmental performance at PhillyStat meetings, where<br />

the mayor, the managing director, relevant deputy mayors, and<br />

representatives from the departments and agencies meet regularly<br />

to track and monitor operational performance. The City’s<br />

performance management program now relies heavily on data<br />

from Philly311 and this type of data-driven management changes<br />

the roles of public managers. With the data provided by Philly311,<br />

they act as data managers and process managers as much as direct<br />

problem solvers.<br />

Philly311’s contribution to a smart government involves raising<br />

transparency and integrity in government processes. “[People]<br />

don’t need to know anybody anymore to get services,” said one of<br />

the executive-level interviewees. “Just call 311!” Other<br />

interviewees also agreed that Philly311 transforms the way the<br />

City does its business. Before 311, many citizens did not know<br />

where they should start to request a service. For service requests,<br />

some took advantages of contacting a council person as a<br />

representative of their community. Philly311 has become an<br />

equalizing strategy. Since its launch, citizens can see more clearly<br />

how their government works through Philly311. One interviewee<br />

said,<br />

People didn’t understand the process. The internal<br />

process was mystery. For example, we got a request—<br />

fix that property. We can say here is the process.<br />

Philly311 does that. That’s transparency. Now people<br />

can see what’s happening in the government.<br />

From a managerial perspective becoming a smarter city involves<br />

interdepartmental collaboration. In the case of Philly311, this<br />

takes the form of written service level agreements that codify each<br />

function of the City’s key service departments (i.e., Streets,<br />

Licenses and Inspections, Police, Water, Parks and Recreation,<br />

and Fairmount Park) with a specific timeframe for completion. A<br />

service level agreement refers to “an agreement between the<br />

provider of a service and its customers which quantifies the<br />

minimum quality of service which meets the business need” [16:<br />

p. 14]. It is also considered a formal contract between a service<br />

provider and its customers [14]. Philly311 staff collaborate on<br />

reviewing, updating, and revising both the formal contracts<br />

between Philly311 and other departments and the knowledgebase<br />

for readily available responses to service and information<br />

requests, through regular meetings with internal partners who are<br />

key to citizen service (the departments on service level<br />

agreements).<br />

The review and revision process allows those departments to learn<br />

about Philly311 operations and in turn allows Philly311 to learn<br />

about other departments’ jobs. Philly311 staff listen to them and<br />

work to understand their concerns. The partnership for the service<br />

level agreements increases transparency across city departments.<br />

“We get everybody’s input. People bring their concerns into the<br />

table,” said one Philly311 staff person. “We own the system and<br />

they own the content.” Hence the partnership of Philly311 with<br />

other departments is built, in part, on the integration of the<br />

departmental knowledge (content) into the 311 system.<br />

The management of Philly311 has been supported by strategic<br />

partnerships with external organizations. In the early stages of<br />

Philly311, private sector partners helped finalize a detailed<br />

strategy and implementation plan. They also contributed to<br />

relieving the burden on Philly311 caused by under-staffing,<br />

providing some of their experienced agents (on-loan call agents).<br />

Philly311 call agents benefited from private sector best practices,<br />

315<br />

and in turn the on-loan agents from private call centers learned<br />

more about how the City works. From the preparation period of<br />

Philly311 through its kick off to the present, the partnerships with<br />

the private sector has offered a mentoring opportunity for<br />

Philly311 agents and supervisors.<br />

4.2 311-Driven Changes in Service Delivery<br />

The 311 service center serves both as a front-line contact center<br />

and as a shared service center. Not only does it integrate frontline<br />

services by providing quick and easy access to non-emergency<br />

municipal services and information through a single, consolidated<br />

channel, but it also creates capabilities for shared service, which<br />

denotes “a generic service that is jointly developed by public<br />

agencies and can be used many times in different business<br />

processes of various government agencies” [19: p. 32]. Services,<br />

including the development costs of such services, can be shared<br />

by multiple agencies to avoid the redundant investments in similar<br />

functionality. Philly311 provides shared services to city<br />

departments through its consolidated channel for service requests<br />

and complaints. Shared services promise chiefly three benefits:<br />

reduced costs, improved quality of services, and fewer distractions<br />

[3,10,23]. One interviewee addressed Philly311’s moderate (but<br />

not as much as expected) effect in saving the City’s administrative<br />

costs.<br />

Shared services strategies are based on service level agreements.<br />

The agreements stipulate service standards that are measurable<br />

and can be used to support accountability (e.g., response times).<br />

For instance, a residential property that is not being maintained<br />

must be investigated by the Department of Licenses and<br />

Inspections within forty-five days. A dead animal must be<br />

removed by the Department of Streets in three days and an<br />

abandoned vehicle within thirty days. Similar to this, if a<br />

department has agreed in its service level agreements to deal with<br />

a citizen’s service task in X number of days, the customer should<br />

be informed of that service standard. The department is held<br />

accountable to complete the service in that amount of time or<br />

provide information back to Philly311 as to why the service could<br />

not be completed in the agreed-upon amount of time. City<br />

agencies perform hundreds of tasks, but Philly311 only handles<br />

the ones for which it can hold an agency accountable to the<br />

previously agreed upon service standard and timing.<br />

The 311 system serves for customers as an effective contact point.<br />

One of executive-level interviewees viewed Philly311 as an<br />

interaction tool, by saying “[Philly311] connects people to<br />

government as much as possible. It is interactive to see what’s on<br />

people’s minds.” Through integration of multiple channels for<br />

municipal services and information, Philly311 serves as a main<br />

gate to residents, businesses, and visitors of the City. As well,<br />

Philly311 becomes a front line of service agents reachable via the<br />

toll-free phone line and often digital media. One of the Philly311<br />

launch project team members said:<br />

311 is a front door. Before 311, Philadelphia had<br />

hundreds of front doors. Most were blocked, not open<br />

at all. The City created the best face of the front door<br />

for the City.<br />

The interviews highlighted the agreement among Philly311 staff<br />

that everybody is their customer—not just citizens, businesses and<br />

visitors to the City but other city departments as well. As evidence<br />

of this commitment, the mayor created a unique position among<br />

311 programs; the Chief Customer Service Officer. This role is


currently filled by Philly311’s Director. Given the Director’s dual<br />

roles, organizational responsibility for Philly311 extends to<br />

inspiring all city government officials to view themselves as city<br />

ambassadors who play a major role in building and maintaining<br />

the relationship with those who live in or do business with the<br />

City. Philly311 as a city agency also invests in building customer<br />

service skills through its Customer Service Leadership Academy,<br />

training customer service agents throughout city government. The<br />

program imbues them with customer service professionalism.<br />

Philly311, according to city officials, also serves an accountability<br />

role. For external accountability, callers, senders of emails and<br />

text messages, and walk-in customers receive a tracking number<br />

for their service request. This number allows requestors to followup<br />

either by calling back to the Philly311 Center or visiting the<br />

311 homepage. One executive-level interviewee said, “People<br />

want to see government working in a more connected through<br />

technology.”<br />

For internal accountability, data collected from Philly311 is used<br />

in conjunction with the PhillyStat process to track, evaluate, and,<br />

if necessary, correct service patterns in the departments. PhillyStat<br />

is the City’s performance review program in which the top<br />

leadership members participate. 1 During each regular meeting for<br />

performance management of PhillyStat, city leaders review<br />

departmental performance metrics and progress toward the<br />

mayor’s strategic goals, and each department has the<br />

responsibility to account for their performance in front of the<br />

City’s executives with respect to service standards put forth in the<br />

service level agreements. The guidelines described in the service<br />

level agreements and their use by departments, Philly311 and the<br />

PhillyStat process create a holistic accountability program that<br />

was noticeably absent before 311.<br />

The consolidated channel for non-emergency service and<br />

information requests enables and empowers people to engage in<br />

their communities. As one Philly311 staff member said “311<br />

enables citizens to become involved in their neighborhood by<br />

reporting a problem they see.” Respondents discussed how<br />

citizens are seeing how reporting a problem can impact the<br />

neighborhood—for example, requests for removing graffiti from a<br />

local park or clearing up a vacant property that can be potentially<br />

a place for crime—they are further inspired to become involved in<br />

improving the neighborhood they live in. They talked about the<br />

relationship between 311 services and citizen engagement in<br />

neighborhood environments around such issues as built<br />

infrastructure, public safety, and public facilities. With Philly311,<br />

according to city officials, citizens are seeing in a new way the<br />

connection between their efforts and the quality of life in their<br />

community.<br />

One of Philly311’s unique characteristics is its neighborhood<br />

liaison program. A neighborhood liaison serves their community<br />

by reporting issues directly to the Philly311 system (oftentimes on<br />

behalf of their neighbors) and provides the community with<br />

progress reports. Becoming a Philly311 liaison is open to any<br />

1 There are two types of PhillyStat meetings. PhillyStat Outcomes a<br />

high-level review of the Mayor’s goals and outcomes. PhillyStat<br />

Ops is an operational review of one department or agency, where<br />

performance targets are assessed in five key areas—operations,<br />

human resources, finance and budget, technology, and customer<br />

service within the individual department.<br />

316<br />

residents willing to participate in a two-hour training session,<br />

through which they are made familiar with various city<br />

departments and the electronic reporting system. Neighborhood<br />

liaisons have become important actors in the community by<br />

combining their new training with what they know about their<br />

neighborhoods and the wants and needs of the community more<br />

and better than outsiders. One Philly311 staff person said:<br />

The liaisons are community leaders. We train them to<br />

use our system. They have ability to put information<br />

directly into our system. That’s our strong connection in<br />

a different way of outreach. Multiple sources of<br />

information are embedded in neighborhoods.<br />

The neighborhood liaisons have become contact points for<br />

capturing and integrating service requests. They are critical to<br />

connecting the 311-enabled integrated services with the service<br />

needy, often poor, technology-illiterate, and living in distressed<br />

neighborhoods.<br />

5. CHALLENGES AND OPPORTUNITIES<br />

Philly311 was established under a very tight timeframe—11<br />

months from February to December in 2008. No other city of<br />

Philadelphia’s size launched a 311 center operation under such<br />

time pressure. The aggressive timeline itself was not a serious<br />

problem alone, but early challenges arose from unexpected global<br />

financial crisis. The subsequent budget crisis experienced by the<br />

whole city meant scaling back or postponing key elements of the<br />

project. The budget gap created two severe challenges: understaffing—six<br />

agents short of the operational goal of 57 agents and<br />

recruitment based on internal transfers of inexperienced agents<br />

from other departments—and under-equipping—the use of old<br />

Customer Relationship Management (CRM) software.<br />

These challenges continued through to the present, but according<br />

to interviewees, the first year of Philly311 still provided a set of<br />

practical lessons about how a city with similar challenges could<br />

launch and operate a 311 system. They spoke of the critical role of<br />

strong executive support, strategic partnership with external<br />

organizations, and adaptation and flexibility in staffing and<br />

equipping in mitigating these challenges. One Philly311 founding<br />

official noted:<br />

We clearly could not move forward with upgrading with<br />

our CRM, and we didn’t change our recruitment<br />

strategies. The budget crisis impacted us in a<br />

significant way, but we were still able to achieve a<br />

majority of outcomes.<br />

These outcomes are the changes made by Philly311 in<br />

management and service delivery, as discussed in the preceding<br />

section. The major challenges and concerns faced in Philadelphia<br />

as they worked to transform their city government through 311 are<br />

introduced and discussed below followed by a discussion of new<br />

opportunities for change being uncovered in the current phase.<br />

5.1 Technology<br />

The technological challenges identified were primarily related to<br />

under-equipping. In particular, Philly311 wanted to upgrade back<br />

office software such as the CRM and database systems for<br />

information sharing. One Philly311 staff claimed, “We need the<br />

right technology at the right time.” Interviewees discussed how<br />

the City is recognizing an increasing number of Internet users<br />

accessing Philly311 through their smart phones instead of desktop


or laptop computers. Internet connection through mobile phones is<br />

increasingly being viewed as a strategy for closing the digital<br />

divide in the City. The extension of the 311 system to smart<br />

phones was considered by interviewees as a way to further<br />

promote citizen engagement and active feedback of 311 services<br />

from citizens, while also reaching out to a new segment of the<br />

community.<br />

5.2 Management and Organization<br />

Budgetary constraints generated organizational challenges in<br />

recruiting qualified call center agents and keeping call center<br />

operations open for 24 hours a day, 7 days a week. While these<br />

staffing challenges have continued since the launch of Philly311,<br />

the interviews revealed a new and related challenge. Philly311 as<br />

a city agency has a unique organizational culture distinguishable<br />

from other departments and agencies, because it serves as a leader<br />

and pioneer of customer services in the City government.<br />

According to one Philly311 staff person, call center agents may<br />

feel that they have to comply with a more rigorous internal<br />

standard for excellence in customer services, which is not required<br />

in other departments.<br />

Philly311 may offer government employees a new opportunity to<br />

see their job differently. The way service departments do their<br />

business changes due to the 311 center. Directors and managers in<br />

the city departments are seeing their job in a more efficient,<br />

effective, and transparent way. For example, one of Philly311’s<br />

missions is to “provide recommendations into ways to improve<br />

City government through accurate, consistent measurement and<br />

analysis of service delivery citywide” (see www.phila.gov/311).<br />

By the measurement and analysis, Philly311 helps city<br />

departments have better understanding of what they are doing and<br />

what others are doing. According to one executive-level<br />

interviewee, Philly311 is driving a cultural change in the whole<br />

city government to data-based, performance-driven, and<br />

customer-oriented culture, but that isn’t coming at a short horizon,<br />

given the interdepartmental differences in organizational culture.<br />

5.3 Internal and External Governance<br />

Internal governance-related and also cross-organizational<br />

challenges mostly lie in interdepartmental or interagency<br />

collaboration. A formal governance body for such collaboration<br />

does not exist, but instead some staff members of Philly311 meet<br />

key people from the departments on the service level agreements<br />

in a regular basis. Philly311 staff identified this process as<br />

informal. The City government considers expanding the scope of<br />

services and information provided by Philly311 by including more<br />

departments in the service level agreements. The process through<br />

which the current service level agreements were created is based<br />

on interdepartmental collaboration. To establish the<br />

interdepartmental agreements, Philly311 staff identified<br />

potentially high volume customers (departments) and contacted<br />

them. Through the meetings, Philly311 staff decided who has<br />

knowledge of city services and information. This process has been<br />

semi-regularized, but not based on a formal process. With this<br />

informal process, there is a challenge in bringing new service<br />

departments into the service level agreements, because Philly311<br />

does not have a formal governance body for organizing new<br />

interdepartmental collaboration and cooperation. The mechanism<br />

for interdepartmental workings on revising and updating the<br />

service level agreements currently relies on relational<br />

governance, which refers to governance by commitment, mutual<br />

317<br />

dependence, trust, and interpersonal relationships [14].<br />

Interviewees agreed the process has worked well so far, but<br />

recognized that the process needs to be formalized for expansion<br />

of the service level agreements and Philly311 functions.<br />

On the other hand, the interdepartmental governance around<br />

Philly311 allows Philly311 and the departments in the service<br />

level agreements to create mutual understandings of their jobs.<br />

The series of informal meetings have provided those city<br />

departments with a valuable opportunity for mutual learning.<br />

Furthermore, some Philly311 staff said the interagency<br />

relationship has shifted from competitive on customer services to<br />

complementary. At the beginning of Philly311, other departments<br />

and agencies had a concern that Philly311 takes their own jobs.<br />

Now the mutual learning has developed an understanding that<br />

Philly311 does help their jobs. In addition, Philly311’s past three<br />

years have changed the City Council’s early perception of the 311<br />

center and other departments as well. The City Council does not<br />

concentrate their energies any more on routine constituent<br />

services that they dealt with before 311 by receiving service<br />

requests and complaints pertinent to Council districts. Philly311<br />

reports to the City Council about the status of customer service<br />

delivery by Council districts, and the Council members appreciate<br />

data and information pulled from 311 as an effective tool to better<br />

understand their constituents.<br />

Another side of governance formed by Philly311 indicates the<br />

increasing interactions with citizens. Philly311 provides a new<br />

way by which citizens are involved in their neighborhood<br />

concerns. Philly311 receives requests for service, which may be<br />

the reports of community problems residents see: for example,<br />

removing graffiti, clearing up a vacant property, moving a vacant<br />

car, replacing a street light, and so on. Among them, some<br />

requests, despite a small portion in call volumes, reflect concerned<br />

citizens’ ideas and suggestions for improving neighborhood<br />

environments beyond reporting immediate problems. This citizen<br />

engagement category of calls to 311 merits attention from city<br />

managers, but inbound calls are currently analyzed in terms of the<br />

two main categories (information requests and service requests).<br />

Categorizing some calls into citizen engagement and further<br />

analyzing those calls in depth needs additional efforts of<br />

Philly311 agents.<br />

6. DISCUSSIONS<br />

While a growing number of conceptual studies are exploring cities<br />

and the meaning of being a “smart city”, relatively few studies are<br />

engaging in empirical investigations of smart city activities. A<br />

variety of existing theories and theoretical models of urban<br />

innovation are being considered by scholars in terms of their<br />

relevancy to city-level initiatives being carried out in the interest<br />

of becoming “smarter”. A challenge to such efforts is that, as of<br />

Table 7. Challenges and opportunities of Philly311<br />

Technology � Timing in upgrading<br />

software and systems<br />

Management<br />

and<br />

organization<br />

Challenges Opportunities<br />

� Limited funding<br />

� Cultural differences<br />

between 311 and other<br />

departments<br />

� New technologies to<br />

bridge the digital divide<br />

� Business process<br />

change<br />

� Change to data-based,<br />

performance-driven,<br />

and customer-oriented<br />

culture


Internal and<br />

external<br />

governance<br />

� Reliance on informal<br />

processes in<br />

interdepartmental<br />

collaboration<br />

� Additional efforts for<br />

analyzing calls for<br />

citizen engagement<br />

� Strengthening relational<br />

governance in<br />

interdepartmental<br />

collaboration<br />

� Providing a new way to<br />

citizen engagement<br />

yet, there is no consensus on what constitutes a “smart city”.<br />

Grounded in rich evidence from semi-structured interviews, this<br />

study considers Philly311 as a smart city initiative that contributes<br />

to making the city of Philadelphia more efficient, effective, and<br />

transparent and facilitating city-level governance. The study also<br />

suggests a model, grounded on empirical evidence without<br />

preconceived theories [13,22], to understand smart city programs.<br />

Figure 1. A smart city program model<br />

Organizational<br />

factors<br />

Technological<br />

factors<br />

Smart City Program<br />

To Make a City Government Smarter Efficiency<br />

Effectiveness<br />

Smart City<br />

Management<br />

Smart City<br />

Service Delivery<br />

Transparency<br />

Governance<br />

Cross-organizational<br />

factors<br />

This study explored impacts of a smart city initiative in the form<br />

of a 311 non-emergency service program. Philly311 as a smart<br />

city program is enabling more effective and efficient management<br />

while also informing service delivery strategies. It is also deeply<br />

embedded in a set of technological, organizational and managerial,<br />

and internal and external governance-related factors.<br />

The Philly311 service center serves residents, business, and<br />

visitors as a convenient front line of municipal services. Tailoring<br />

frontline services to the needs of individual citizens is a key to<br />

smart city service delivery [8]. Philly311’s back-end functions<br />

enable the city to gain more efficiency and effectiveness by<br />

allocating and using managerial and operational resources in a<br />

smarter way, based on performance data. City management<br />

leveraging these smart cities strategies and capabilities is thus<br />

contributing to efficiency, effectiveness, and the improvement in<br />

decision making [24]. Enhancing transparency and accountability<br />

of service delivery through Philly311 is also one of the ways to<br />

Philadelphia is becoming smarter. Enhanced transparency and<br />

accountability of city administration contributes to smart<br />

governance [12]. Externally, Philly311 allows citizens to engage<br />

more easily in their neighborhoods and communities. Internally,<br />

Philly311 enables and promotes interdepartmental collaboration<br />

and cooperation. Based on the practice in Philly311, this study<br />

suggests that a characteristic of a smart city engages various<br />

internal (city agencies) and external (individual citizens and civic<br />

groups) stakeholders in making community-related decisions [12].<br />

Some positive changes made by Philly311 are not without<br />

challenge, especially in terms of technology, management, and<br />

governance. This finding can be extended to practical implications<br />

for smart city initiatives. Budgetary constraints and under-<br />

318<br />

equipped technical conditions have continued since the launch of<br />

Philly311. While some smart city programs such as the 311 nonemergency<br />

contact centers consume capital budget, others may be<br />

conducted in a resource-saving way. The case of Philly311 offers<br />

various lessons for smart city practitioners. With the growing<br />

importance of Philly311 as a smart city program of the city, the<br />

data-driven and customer service-oriented culture is increasingly<br />

being imbued across the whole city government of Philadelphia.<br />

Mitigating inter-organizational tensions and conflicts is also vital<br />

to smart city management. In the case of Philly311, internal<br />

governance enables interdepartmental efforts toward producing<br />

service level agreements. Current informal governance<br />

mechanisms leave much room for improvement. To gain much<br />

attention and guarantee active participation of all related actors, a<br />

smart city program needs to be formalized and institutionalized by<br />

a city government.<br />

Philly311 also offers new ways to engage even more citizens in<br />

neighborhood issues. The challenge for cities is in understanding<br />

how best to create new policies and administrative processes to<br />

ensure as well as leverage such engagement. While the whole city<br />

government obviously takes benefits from Philly311 by making<br />

operational management and service delivery smarter, the 311<br />

service center exposes both challenges and opportunities.<br />

7. CONCLUSION<br />

Philly311 is being used as crucial part of the city administration’s<br />

strategy to transform the city government into a smarter, faster<br />

and better city. Interviews with key actors in the creation and<br />

operation of Philly311 shed light on its contribution to a smart<br />

government and ultimately a smart city. According to the<br />

interviewees, a smart government involves operating in a more<br />

efficient, effective, transparent, and open governance-facilitating<br />

way. In this paper, we suggested preliminary understanding of<br />

smart city initiatives in the context of the City of Philadelphia and<br />

its 311 non-emergency contact center. The understanding should<br />

be extended and generalized to other smart city programs. Further<br />

research will focus on more diverse cases of 311 contact centers.<br />

We will revisit findings from this study and extend them through<br />

comparative analysis with additional 311 service center cases as<br />

well as service integration efforts more generally.<br />

8. ACKNOWLEDGMENTS<br />

We thank the many City of Philadelphia government officials who<br />

spent time with us and openly shared their perspectives and<br />

valuable insights on Philly311, PhillyRising, and PhillyStat<br />

programs. We are also grateful to all members of the multinational<br />

research project titled “Smart Cities Service Integration.”<br />

This study is partially supported by a grant from the Social<br />

Sciences and Humanities Research Council (SSHRC) of Canada<br />

and the home institutions of researchers who jointly work on the<br />

multi-national research project. The views and conclusions<br />

expressed in this paper are those of the authors and do not<br />

necessarily reflect the views of the SSHRC or the home<br />

institutions of other researchers.<br />

9. REFERENCES<br />

[1] Allwinkle, S. and Cruickshank, P. (2011). Creating smart-er<br />

cities: An overview. Journal of Urban Technology, 18(2), 1–<br />

16.


[2] Anavitarte, L. and Tratz-Ryan, B. (2010). Market Insight:<br />

‘Smart Cities’ in Emerging Markets. Gartner. Available at<br />

www.gartner.com/id=1468734.<br />

[3] Bergeron, B. P. (2003). Essentials of Shared Services.<br />

Hoboken, NJ: John Wiley & Sons, Inc.<br />

[4] Boulton, A., Brunn, S. D., and Devriendt, L. (2011).<br />

Cyberinfrastructures and “smart” world cities: Physical,<br />

human, and soft infrastructures. In P. Taylor, B. Derudder,<br />

M. Hoyler & F. Witlox (Eds.), International Handbook of<br />

Globalization and World Cities. Cheltenham, UK: Edward<br />

Elgar.<br />

[5] Charmaz, K. (1983). The grounded theory methods: An<br />

explication and interpretation. In R. M. Emerson (Ed.)<br />

Contemporary Field Research: A Collection of Readings.<br />

Boston: Little, Brown.<br />

[6] Chourabi, H., Nam, T., Walker, S., Gil-Garcia, J. R.,<br />

Mellouli, S., Nahon, K., Pardo, T. A., and Scholl, H. J.<br />

(2012). Understanding smart cities: An integrative<br />

framework. In Proceedings of the 45th Hawaii International<br />

Conference on System Sciences (pp. 2289–2297), January 4–<br />

7, Maui, Hawaii, USA.<br />

[7] Denzin, N. K. (2007). Grounded theory and the politics of<br />

interpretation. In A. Bryant & K. Charmaz (Eds.), The Sage<br />

Handbook of Grounded Theory. London: Sage.<br />

[8] Dirks, S. and Keeling, M. (2009). A Vision of Smarter Cities:<br />

How Cities Can Lead the Way into a Prosperous and<br />

Sustainable Future. Somers, NY: IBM Global Business<br />

Services.<br />

[9] Dirks, S., Keeling, M., and Dencik, J. (2009). How Smart is<br />

Your City?: Helping Cities Measure Progress. Somers, NY:<br />

IBM Global Business Services.<br />

[10] Dollery, B. and Akimov, A. (2008). Are shared services as a<br />

panacea for Australian local government? A critical note on<br />

Australian and international empirical evidence.<br />

International Review of Public Administration, 12(2), 89–99.<br />

[11] Floersch, J., Longhofer, J., Kranke, D., & Townsend, L.<br />

(2010). Integrating thematic, grounded theory and narrative<br />

analysis. Qualitative Social Work, 9(3), 407–425.<br />

[12] Giffinger, R., Fertner, C., Kramar, H., Kalasek, R., Pichler-<br />

Milanović, N., and Meijers, E. (2007). Smart Cities: Ranking<br />

of European Medium-Sized Cities. Vienna, Austria: Centre of<br />

Regional Science (SRF), Vienna University of Technology.<br />

[13] Glaser, B. G., & Strauss, A. L. (1967). The Discovery of<br />

Grounded Theory: Strategies for Qualitative Research.<br />

Chicago: Aldine.<br />

319<br />

[14] Goo, J., Kishore, R., Rao, H. R., and Nam, K. (2009). The<br />

role of service level agreements in relational management of<br />

information technology outsourcing: An empirical study.<br />

MIS Quarterly, 33(1), 119–145.<br />

[15] Harrison, C., Eckman, B., Hamilton, R., Hartswick, P.,<br />

Kalagnanam, J., Paraszczak, J., and Williams, P. (2010).<br />

Foundations for Smarter Cities. IBM Journal of Research<br />

and Development, 54(4), 350–365.<br />

[16] Hiles, A. N. (1994). Service level agreements. The TQM<br />

Magazine, 6(2), 14–16.<br />

[17] Hollands, R. G. (2008). Will the real smart city please stand<br />

up? Intelligent, progressive or entrepreneurial. City, 12(3),<br />

303–320.<br />

[18] Holton, J. A. (2007). The coding process and its challenges.<br />

In A. Bryant & K. Charmaz (Eds.), The Sage Handbook of<br />

Grounded Theory. London: Sage.<br />

[19] Janssen, M. and Wagennar, R. (2004). Developing generic<br />

shared services for e-Government. Electronic Journal of e-<br />

Government, 2(1), 31–38.<br />

[20] Nam, T. and Pardo, T. A. (2011a). Conceptualizing smart<br />

city with dimensions of technology, people, and institutions.<br />

In Proceedings of the 12th Annual International Conference<br />

on Digital Government Research, June 12–15, College Park,<br />

MA, USA.<br />

[21] Nam, T. and Pardo, T. A. (2011b). Smart city as urban<br />

innovation: Focusing on management, policy, and context. In<br />

Proceedings of the 5th International Conference on Theory<br />

and Practice of Electronic Governance, September 26–28,<br />

Tallinn, Estonia.<br />

[22] Strauss, A., & Corbin, J. (1998). Basics of Qualitative<br />

Research: Techniques and Procedures for Developing<br />

Grounded Theory (2nd ed.). Thousand Oaks, CA: Sage.<br />

[23] Walsh, P., McGregor-Lowndes, M., and Newton, C. J.<br />

(2008). Shared services: Lessons from the public and private<br />

sectors for the nonprofit sector. The Australian Journal of<br />

Public Administration, 67(2), 200–212.<br />

[24] Washburn, D., Sindhu, U., Balaouras, S., Dines, R. A.,<br />

Hayes, N. M., and Nelson, L. E. (2010). Helping CIOs<br />

Understand “Smart City” Initiatives: Defining the Smart<br />

City, Its Drivers, and the Role of the CIO. Cambridge, MA:<br />

Forrester Research.<br />

[25] Yin, R. K. (2009). Case Study Research: Design and<br />

methods (4th ed.). Thousands Oaks, CA: Sage.


Session 11<br />

IT Governance & Policy


A Literature Review: IT Governance Guidelines and Areas<br />

Ruben Pereira<br />

Instituto Superior Tecnico<br />

Av. Rovisco Pais, 1049-001 Lisboa<br />

+351 966474901<br />

rubenfspereira@ist.utl.pt<br />

ABSTRACT<br />

Lack of business/IT (BIT) alignment affects e-governance<br />

initiatives success. Information Technology Governance (ITG)<br />

has been recognized as a CIO top-10 issue for more than five<br />

years and has risen in priority between 2007 and 2009. Several<br />

Frameworks exist to help organizations in ITG implementation<br />

but lack scientific viewpoint, are complex, and also overlap each<br />

other. In this paper we make a literature review to leverage the<br />

ITG general guidelines and main ITG areas in order to provide a<br />

scientific viewpoint validation. We also evaluate our artefacts<br />

with expert’s interviews in order to provide practitioner viewpoint<br />

validation, and map our artifact with current theories. Finally, we<br />

conclude our research with main contributions and future work.<br />

Categories and Subject Descriptors<br />

H.1.0 [Models and Principles]: General.<br />

General Terms<br />

Management, Performance, Design, Standardization, Theory.<br />

Keywords<br />

IT, Governance, Management, IT Governance Guidelines,<br />

Literature Review, IT Governance Areas, e-Governance<br />

1. INTRODUCTION<br />

Many organizations have become totally reliant on IT for success<br />

and recognize that IT is becoming one of their main<br />

organizational assets [34][16]. However, government bodies have<br />

limited expertise in IT and are slow to leverage their potential for<br />

improving governance what can be fatal for organizations wishing<br />

to implement e-Governance solutions [31][23]. BIT alignment<br />

becomes crucial and ITG has been identified as an appropriate<br />

solution to deal with increasing IT changes and complexity. The<br />

purpose of this paper is to examine both the previous and the<br />

current research in ITG so a basis for further research and the<br />

identification of the main ITG guidelines and main ITG and<br />

Management (ITG/M) areas based on literature and experts’<br />

knowledge could be provided in order to help organization in<br />

future ITG implementations. Indeed, there are studies that show<br />

the positive effect of good ITG implementation in organizations<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

320<br />

Miguel Mira da Silva<br />

Instituto Superior Tecnico<br />

Av. Rovisco Pais, 1049-001 Lisboa<br />

+351 919671425<br />

mms@ist.utl.pt<br />

[50][27], nevertheless, there are also evidences that IT keep being<br />

badly managed and governed [29][14]. Such fact influences the<br />

success of e-Governance initiatives.<br />

Several Frameworks exist to help organizations in ITG<br />

implementation. However, organizations still prefer to design<br />

their own [5]. Such fact is not surprising since most Frameworks<br />

state that there is no single “best” IT organizational structure or<br />

governance arrangement because IT needs to respond to the<br />

unique environments within which exists [29][2] but don’t specify<br />

the factors that can influence each ITG implementation, are seen<br />

as complex [35], too general [32], lacking a theoretical foundation<br />

from a scientific viewpoint [17], and overlap each other [35].<br />

Such statements reinforce the possibility of improvements in the<br />

existing Frameworks.<br />

2. RESEARCH METHODOLOGY<br />

Few researchers attempted to perform empirical studies on ITG<br />

topic [6]. Hence, we constructed and evaluated new and<br />

innovative artifacts following the design research paradigm [21].<br />

Based on the four design artifacts produced by design science<br />

research in information systems - constructs, models, methods and<br />

instantiations - we will focus on constructs (ITG guidelines and<br />

ITG/M areas). Constructs are necessary to describe certain aspects<br />

of a problem domain [37], they provide the language in which<br />

problems and solutions are defined and communicated.<br />

The methodology applied is divided according to the two<br />

processes of design science research (build and evaluate). The<br />

literature review approach used in this paper follows the conceptcentric<br />

methodology of IS literature reviews as outlined in<br />

Webster and Watson [49]. In this article we evaluated our artifacts<br />

through interviews. In addition, by submitting scientific<br />

publications to respected international conferences, we also used<br />

the appraisal of the scientific community as evaluation criteria.<br />

3. LITERATURE REVIEW<br />

Since the 1990s ITG has been a concern. However, good ITG is<br />

no longer a “nice to have”, but a “must have” and can contribute<br />

to higher returns on assets at a time when business is spending<br />

increasing amounts on technology investment [48]. Indeed,<br />

Gartner states that ITG has been recognized as a CIO top-10 issue<br />

for more than five years and has risen in priority during the past<br />

two [16]. ITG potential is also in the fact that the most significant<br />

IT issues, currently and in the future, are not technology-related,<br />

but governance-related [18].<br />

3.1 IT Governance Guidelines<br />

Guidelines have been designed, used, and adopted in several<br />

domains [21][4][43]. As a result, they should be considered an<br />

instrument that ought not to be underestimated since guidelines


are necessary to obtain a uniformity regarding functionality, as<br />

well as a desired quality level [4]. Reviewing available literature<br />

on the subject under study is an essential part of developing<br />

guidelines which can be based on experience - either practical or<br />

theoretical [45]. We summarize our guidelines in Table 1.<br />

3.2 IT Governance/Management Main Areas<br />

Many frameworks exist and each one calls their processes/areas<br />

with different names which culminate in overlap and contribute to<br />

organization confusion as well as waste of resources [35].<br />

Therefore a formalization of ITG and ITM areas is needed. We<br />

summarize the ITG and ITM areas in Table 2.<br />

4. EVALUATION<br />

In order to validate our artefacts, besides the complete literature<br />

review and despite the little empirical work concerning ITG in the<br />

literature, we also mapped the artefacts with current theories and<br />

Table 2. Main ITG/M Areas summary<br />

Main Area Description Topics/subjects Literature Reference<br />

Strategy<br />

Management<br />

Service<br />

Management<br />

Resource<br />

Management<br />

Risk<br />

Management<br />

Development<br />

Management<br />

Architecture<br />

Management<br />

Project<br />

Management<br />

Quality<br />

Management<br />

Investment<br />

Management<br />

Outsourcing<br />

Management<br />

Support<br />

Management<br />

Compliance<br />

Management<br />

Improvement &<br />

Innovation<br />

Management<br />

Table 1. ITG Guidelines Summary<br />

Guidelines About what? What do we need? Literature Reference<br />

1 Where do we want to be? BIT objectives and vision<br />

BIT strategies<br />

BIT goals<br />

[34][41][27][48][16][12][43]<br />

[38][15][46][33]<br />

2 Where are we now?<br />

BIT alignment, maturity,<br />

BIT strategic plan<br />

Core competences, assess IT department and maturity,<br />

assess enterprise, assess BIT alignment<br />

[34][41][27][48] [16][12][43]<br />

[38][15][46][33]<br />

3 What do we need to get there?<br />

Structures, processes, and<br />

mechanisms<br />

Collect information about contingency factors of the<br />

organization, define the necessary mechanisms<br />

[1][13][9][29] [8][46][33] [2][22]<br />

4 How do we get where we want to be? IT processes Materialize the plan defined in the previous step [41][48][12] [44][43][15] [46][2]<br />

5<br />

How do we know we have arrived<br />

there?<br />

Metrics<br />

Measurements<br />

IT Balance Scorecard<br />

Enterprise Balance Scorecard<br />

[1][41][27][48] [44][8][39]<br />

[46][33][30]<br />

6<br />

Are we following the market’s best<br />

practices?<br />

Best practices<br />

Frameworks<br />

Be aware of best practices frameworks and standards [28][17][12] [8][11]<br />

7<br />

How do we know we are doing it<br />

right?<br />

Compliance<br />

Audit<br />

Audit regularly<br />

Internal and external compliance<br />

[41][36][24]<br />

8 How do we keep it on track?<br />

Improvement<br />

Innovation<br />

Collect information to I&I in order to prepare organization<br />

for current and future challenges<br />

[16][38][15] [2][24][19]<br />

Responsible for business/IT objectives and alignment, contingency<br />

factors, and other reasons pointed out as possible differentiators of ITGI.<br />

Responsible for service definition, service catalogue, service portfolio,<br />

service levels, and other subjects about provided services.<br />

Accountable for the correct management of the organization’s resources,<br />

like people, technology, applications, etc. Training is included.<br />

Responsible for the correct assurance of the business’ continuity by<br />

anticipating and preventing possible risks of the IT department, which are<br />

correlated with business risk.<br />

Responsible for the design and development of software as well as its<br />

maintenance.<br />

Responsible for the design of the necessary architectures for the good<br />

functioning of the IT department.<br />

Accountable for the management of the entire cross IT department<br />

project, all kinds of projects.<br />

Responsible for the assurance of the required procedures to guarantee<br />

functionality and provide services and products with the required quality.<br />

In charge of assuring the correct financial functioning of the IT<br />

department and of providing budget, costs, and financial plans.<br />

Manages all the aspects concerning outsourcers, as contracts, service<br />

levels, relations, etc.<br />

Responsible for user interaction and mainly keeps user satisfaction<br />

Accountable for the control of internal and external regulations, as well as<br />

report and measurement.<br />

Responsible for the management of the improvements and innovations<br />

that can be required or provided by the entire IT department.<br />

321<br />

also used the results of a series of experts interviews.<br />

We used structured interviews covering a diverse sample of<br />

organization types, sizes, and roles. By space limitations we won’t<br />

present interviewees details. The respondents have a lot of<br />

experience in the area. To support the interviews, we designed a<br />

questionnaire to lead the discussion. In the interviews, the<br />

majority of the questions weren’t open-response questions<br />

because of the nature of the information we need to elicit. The<br />

interviews were conducted over a one month period. Each session<br />

lasted from 60 to 90 minutes and was transcribed into digital data.<br />

We performed nine interviews with ITG experts who have<br />

strategic alignment and ITG knowledge in their organizations.<br />

Seven interviews were performed in Portugal and two in Ireland<br />

by Skype. The interviewees were 3 consultant organizations (1, 2<br />

and 7) and 6 non-consultant (3, 4, 5, 6, 8 and 9) organizations.<br />

Table 3 shows a summary of the results. We used “yes/no” to<br />

Demand Management, Market analyze,<br />

IT/Business strategy plan/definition/alignment<br />

Service Level Management<br />

Service Portfolio<br />

Human resource, Hardware, Software, Capacity<br />

and Configuration Mngt., Information Mngt.<br />

Disaster recovery, Backups and security<br />

Management, Business continuity, Identity and<br />

access Management<br />

Application Management<br />

Application maintenance<br />

IT architecture and engineering<br />

Infrastructure Management<br />

Project Portfolio Management<br />

Project Management<br />

Quality control<br />

Product Quality Management<br />

Portfolio and Value Mngt., Define budgets,<br />

Manage costs<br />

Manage contracts<br />

Control outsourcers<br />

Incident and Problem Mngt.<br />

Service desk<br />

[41][28][48][12][47]<br />

[39][15][46][2][11][19]<br />

[30]<br />

[34][24][26]<br />

[13][41][28][47][39][2]<br />

[19][30]<br />

[29][48][15][46][2]<br />

[11][30]<br />

[50][12][2]<br />

[13][41][12][47][39]<br />

[43][15][2]<br />

[13][41][16][12][39]<br />

[15][30]<br />

[42][40][7]<br />

[14][29][48][16][12]<br />

[15][39][46][2][24][30]<br />

[47][39][15][2][24]<br />

[20][3][10][25]<br />

Audit, Policy and Report Mngt., Internal Control [44][15][24]<br />

Analyze reports and options<br />

Prospection, Improvement and Innovation,<br />

Change Mngt<br />

[39][39][15][2][24][19]<br />

[30]


Interviewees<br />

Useful?<br />

Table 3. Interview Results<br />

Guidelines ITG/M Areas<br />

General?<br />

Complete?<br />

Remove step?<br />

Complete?<br />

Remove?<br />

Missing?<br />

1 Yes Yes Yes No No No Yes G G<br />

2 Yes Yes Yes No No No Yes G G<br />

3 Yes Yes No Yes Yes No No G G G G<br />

4 Yes Yes Yes No Yes No No G G<br />

5 No Yes Yes No Yes No No G G G<br />

6 Yes Yes Yes No Yes No No G G<br />

7 Yes Yes Yes No Yes No No G G G<br />

8 Yes Yes Yes No Yes No No G G G<br />

9 Yes Yes Yes No Yes No No G<br />

Strategy<br />

Investment<br />

highlight the positive and negative responses.<br />

The third interviewee was the only one to disagree with the<br />

proposed guidelines. He argued that guidelines 4, 6, and 8 are not<br />

needed and a new one about investment decision making between<br />

guideline 2 and 3 was missing. However, since we have strong<br />

literature support and only one interviewee mentioned this<br />

argument, we decided to keep the guidelines without changes. The<br />

fifth interviewee stated that such guidelines were not useful since<br />

COBIT already has guidelines with such abstraction. However<br />

COBIT has it for each COBIT process and not for general ITG<br />

implementation. Fifth, sixth and seventh interviewees affirmed<br />

that some factors were missing. Fifth, sixth and seventh<br />

interviewees stated that some factors were missing.<br />

Several conclusions could be withdrawn from the interviews:<br />

most of the interviews see the guidelines as useful, compete and<br />

general; Strategy Management and Investment Management are<br />

almost consensual between interviewees as the main ITG areas;<br />

all the areas without any appointment will be assumed as<br />

management areas<br />

This research provided us some important learning in ITG field.<br />

Based on both scientific and practitioner viewpoint with achieved<br />

the formalization of the contingency factors, ITG general<br />

guidelines and ITG/M main areas. Besides the consensual<br />

identification of the Strategy and Investment Management as ITG<br />

areas by practitioners, few other areas still dubiety in<br />

practitioner’s viewpoint.<br />

5. CONCLUSION<br />

Our research provides interesting contributions in a moment<br />

where BIT alignment becomes a crucial issue. The approach<br />

allows for a better understanding of the implementation of ITG in<br />

a corporate environment.<br />

Our artefacts are based on literature review giving them<br />

theoretical foundation. Yet, in order to keep providing practitioner<br />

viewpoint we also performed interviews with ITG experts. Then<br />

we argue that our artefacts were build under both scientific and<br />

practitioner viewpoint.<br />

Since current IT frameworks are complex and lack the correct<br />

initial roadmap with the identification of the general guidelines<br />

that organizations must follow in order to know what must be<br />

implemented or addressed first given the context of each<br />

organization, we argue that our general guidelines add valuable<br />

knowledge to ITG field and community. Moreover, current<br />

frameworks also overlap each other, then the formalization of the<br />

Compliance<br />

Risk<br />

Resource<br />

Architecture<br />

Innovation<br />

322<br />

main ITG/M areas also validated in both scientific and<br />

practitioner viewpoint is added value. Including BIT concerns in<br />

our artefacts we argue that we are proposing important artefacts in<br />

order to increase the e-Governance initiatives success in<br />

organizations.<br />

Future work must pass by the integration of the presented artefacts<br />

in an IT governance framework as well as a research in-deep of<br />

each identified area taking into consideration the most known<br />

frameworks applied in the area. Furthermore, real-world case<br />

studies should be performed.<br />

6. REFERENCES<br />

[1] Adams, C.R., Larson, E.C. and Xia, W. IS/IT Governance<br />

Structure and Alignment: An Apparent Paradox. MISRC,<br />

(2008).<br />

[2] Agarwal, R. and Sambamurthy, V. Principles and Models for<br />

Organizing the IT Function. MISQ 1(1), (2002).<br />

[3] Bartolini, C., Stefanelli, C. and Tortonesi, M. Analysis and<br />

performance improvement of the IT incident management<br />

process. In: TNSM, (2010), 132–144.<br />

[4] Bohl, O., Frankfurth, A., Schelhase, J. and Winand, U.<br />

Guidelines – A Critical Success Factor in the Development<br />

of Web-based Trainings. In: ICCE, (2002), 545–546.<br />

[5] Broussard, F.W. and Tero, V. Configuration and Change<br />

Management for IT Compliance and Risk Management: The<br />

Tripwire Approach. White Paper. IDC, 2007.<br />

[6] Brown, A.E. and Grant, G.G. Framing the Frameworks: A<br />

Review of IT Governance Research. CAIS 15, (2005),696-<br />

712.<br />

[7] Corea, S. and Levy, M. Quality of IT support for corporate<br />

environmental management: A paradigmatic framework. In:<br />

2nd ICDIM, (2007), 424–429.<br />

[8] Dahlberg, T. and Lahdelma, P. IT Governance Maturity and<br />

IT Outsourcing Degree: An Exploratory Study. In: HICSS,<br />

(2007), 236a.<br />

[9] De Haes, S. and Grembergen, W. Analysing the Relationship<br />

between IT Governance and Business/IT Alignment<br />

Maturity. In: 41st HICSS, (2008),428.<br />

[10] Diao, Y., Jamjoom, H. and Loewenstern, D. Rule-Based<br />

Problem Classification in IT Service Management. In:<br />

CLOUD, (2009), 221-228.<br />

[11] Fasanghari, M., NasserEslami, F. and Naghavi, M. IT<br />

Governance Standard Selection Based on Two Phase<br />

Clustering Method. In: 4 th NCM, (2008), 513-518.<br />

[12] Fink, K. and Ploder, K. Decision Support Framework for the<br />

Implementation of IT-Governance. In: HICSS, (2008), 432.<br />

[13] Gallagher, K.P. and Worrel, J.L. Organizing IT to Promote<br />

Agility. Inf. Tech. Manag. 9, 1 (2008),71-88.<br />

[14] Gao, S., Chen, J. and Fang, D. The Influence of IT Capability<br />

on Dimensions of Organization Structure.In: 2 nd FITME,<br />

(2009), 269-273.<br />

[15] Gerrard, M. Defining IT Governance: The Gartner IT<br />

Governance Demand/Supply Model. Gartner ID:G00140091,<br />

2010.<br />

[16] Gerrard, M. IT Governance, a Flawed Concept: It’s Time for<br />

Business Change Governance. GartnerID:G00171658 (2009)


[17] Goeken, M. and Alter, S. Representing IT Governance<br />

Frameworks as Metamodels. In: EEE’08, (2008),48-54.<br />

[18] Guldentops, E., Grembergen V. W. & De Haes, S.: Control<br />

and Governance Maturity Survey: Establishing a Reference<br />

Benchmark and Assessment Tool. ISCJ, 6, (2002), 32-35.<br />

[19] Guney, S. and Cresswell, A.M. IT Governance as<br />

Organizing: Playing the Game. In: 43rd HICSS, (2010), 1-10.<br />

[20] Gupta, R., Prasad, K.H. and Mohania, M. Automating ITSM<br />

Incident Management Process. In: ICAC, (2008), 141-150.<br />

[21] Hevner, A.R., March, S.T., Park, J. and Ram, S. Design<br />

Science in Information Systems Research. MISQ, 2, 1<br />

(2004),75-105.<br />

[22] Hosseinbeig, S., Karimzadgan-Moghadam, D., Vahdat and<br />

D., Moghadam, R.A. IT strategic alignment maturity and IT<br />

governance. In: 4th ICIS, (2011), 67-72.<br />

[23] Iyengar, J. and Gadgil, R. User Centered IT for the Public: A<br />

Corporate Partnership in e-Governance. In: ICTD, (2007), 1-<br />

6.<br />

[24] Jacobson, D.D. Revisiting IT Governance in the Light of<br />

Institutional Theory. In: 42 nd HICSS, (2009), 1-9.<br />

[25] Jun, L., Xiao, Li, L. and Jun, W. A problem classification<br />

approach in business service management. In: ICCASM,<br />

(2010), 354-356.<br />

[26] Lahtela, A., Jantti, M. and Kaukola, J. Implementing an<br />

ITIL-Based IT Service Management Measurement System.<br />

In: 4th ICDS, (2010), 249 - 254.<br />

[27] Lingyu, H., Bingwu, L., Ruiping, Y. and Jianzhang, W. An<br />

IT Governance Framework of ERP System Implementation.<br />

In: CCIE, (2010), 431-434.<br />

[28] Losso, S. and Goeken, M. Application of Best-Practice<br />

Reference Models of IT Governance. In: 18th ECIS (2010).<br />

[29] Lunardi, G.L., Becker, J.L. and Macada, A.C.G. The<br />

Financial Impact of IT Governance Mechanisms' Adoption:<br />

An Empirical Analysis with Brazilian Firms. In: 42 nd HICSS,<br />

(2009).<br />

[30] Maidin, S.S. and Arshad, N.H. IT governance practices<br />

model in IT project approval and implementation in<br />

Malaysian public sector. In: ICEIE, (2010), V1-532 -V1-536.<br />

[31] Marawar, T., Kale, S. and Araspure, K. E-Governance. In:<br />

DSDE, (2010), 183-186.<br />

[32] Morimoto, S. Application of COBIT to Security<br />

Management in Information Systems Development. In: 4 th<br />

FCST, (2009), 625 – 630.<br />

[33] Nabiollahi, A. and Sahibuddin, S. Considering Service<br />

Strategy in ITIL V3 as a Framework for IT Governance. In:<br />

ITSim, (2008), 1-6.<br />

323<br />

[34] Park, H.Y., Jung, S.H., Lee, Y. and Jang, K.C. The Effect of<br />

Improving IT Standard in IT Governance. In: CIMCA,<br />

(2006), 22.<br />

[35] Pereira, R. and Mira da Silva, M. A Maturity Model for<br />

Implementing ITIL V3 in Practice. In: EDOCW, (2011), 259<br />

– 268.<br />

[36] PrinceWaterHouseCoopers. Risk Based Compliance<br />

Monitoring & Compliance Function Effectiveness - A new<br />

approach to managing compliance in the financial services<br />

industry, 2008.<br />

[37] Schermann, M., B¨Ohmann, T. and Krcmar, H. Explicating<br />

Design Theories with Conceptual Models: Towards a<br />

Theoretical Role of Reference Models. In J. Becker, H.<br />

Krcmar & B. Niehaves, (2009).<br />

[38] Shpilberg, D., Berez, S., Puryear, R. and Shah, S. Avoiding<br />

the Alignment Trap in Information Technology. MIT Sloan<br />

Management Review 49, 1(2007), 51-58.<br />

[39] Silva, E. and Chaix, Y. Business and IT Governance<br />

Alignment Simulation Essay on a Business Process and IT<br />

Service Model. In: 41 st HICSS, (2008), 434.<br />

[40] Silva, L.F. and Brito e Abreu, F. An IT Infrastructure<br />

Patterns Approach to Improve IT Service Management<br />

Quality. In: 7 th QUATIC, (2010), 171–176.<br />

[41] Simonsson, M. and Ekstedt, M. Getting the Priorities Right:<br />

Literature vs Practice on IT Governance. In: PICMET,<br />

(2006), 18-26.<br />

[42] Simonsson, M. and Johnson, P. The IT Organization<br />

Modeling and Assessment Tool: Correlating IT Governance<br />

Maturity with the Effect of IT. In: HICSS, pp.431. (2008).<br />

[43] Simonsson, M., Johnson, P. and Ekstedt, M. IT Governance<br />

Decision Support Using the IT Organization Modeling and<br />

Assessment Tool. In: PICMET, (2008), 802-810.<br />

[44] Simonsson, M., Lagerström, R. and Johnson, P. A Bayesian<br />

network for IT governance performance prediction. In:<br />

ICEC, (2008), 1-8.<br />

[45] Smith, S. L. and Mosier, J. N. Guidelines for designing user<br />

interface software. Technical Report ESD-TR-86-278, 1986.<br />

[46] Symons, C.: IT Governance Framework. Forrester (2005).<br />

[47] Tanriverdi, H. Performance Effects of Information<br />

Technology Synergies in Multibusiness Firms. MISQ 30,<br />

1(2006), 57-77.<br />

[48] Webb, P., Pollard, C. and Ridley, G. Attempting to Define IT<br />

Governance: Wisdom or Folly? In: HICSS, (2006), 194a.<br />

[49] Webster, J. and Watson, R.T. Analyzing the Past to Prepare<br />

for the Future: Writing a Literature Review. MISQ, 26,<br />

2(2002), xiii-xxiii.<br />

[50] Weil, P., and Ross J.W. IT Governance: How Top<br />

Performers Manage IT Decision Rights for Superior Result.<br />

Harvard Business School Press, Boston, Massachusetts,2004


Assessment of Success Factors of e-Government Project<br />

Implementation: Challenges for the Kosovo e-Government<br />

Perspective<br />

Artan Rexhepi, Blerim Rexha and Agni Dika<br />

Faculty of Electrical and Computer Engineering<br />

University of Prishtina<br />

10000 Prishtina,KOSOVO<br />

+377 44 115 651, +377 44 627 251, +377 44 500 721<br />

artan.rexhepi@uni-pr.edu, blerim.rexha@uni-pr.edu, agni.dika@uni-pr.edu<br />

ABSTRACT<br />

Among European countries, Kosovo is ranked low with respect to<br />

the provision of on-line e-Government services. The challenges in<br />

the introduction of e-Government in Kosovo were largely related<br />

to launching simple service delivery and integration of<br />

governments back offices. There is still a big disparity between<br />

what is being provided and what citizens’ requirements for the e-<br />

Government services are. This study has conducted a survey<br />

regarding the perception of current on-line e-government services<br />

among Kosovo citizens. By analyzing the current situation from<br />

the view of citizens, this paper analyzes the status, requirements<br />

and prerequisites for the implementation of a sustainable egovernment<br />

portal. The objective of this research is to emphasize<br />

the appropriate factors, ranging from information and<br />

communication services, application of electronic forms and<br />

provision of transaction services, electronic management of<br />

documents to the effective administration processes, which could<br />

significantly increase the likelihood of success of such egovernment<br />

projects. Based on the gathered and analyzed<br />

data, the paper discusses action recommendations for an<br />

acceptable and sustainable portal, which would be utilizable by a<br />

majority of citizens in Kosovo.<br />

Categories and Subject Descriptors<br />

J.1 [Administrative Data Processing]: Government<br />

General Terms<br />

Management, Documentation, Performance, Human Factors<br />

Keywords<br />

E-Government, Assessment, Kosovo, Electronic Government,<br />

Information and Communication Technology, Digital<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

324<br />

Government<br />

1. INTRODUCTION<br />

There is currently no reliable assessment of the e-government<br />

indicators and parameters required for the measurement of the<br />

present e-government development in Kosovo. As per the UN<br />

DPADM E-country report, Kosovo’s progress to e-government<br />

was rated at its beginning, ranking with this Kosovo low with<br />

respect to provision of e-services to the citizens [1]. However,<br />

over the past few years the understanding of governance and egovernance<br />

by the Kosovo government has been continuously<br />

changed. There are growing pressures and expectations from the<br />

citizens to the public administration aiming for governance with a<br />

modern approach for an efficient and effective administration. In<br />

addition, the transition period has shown that the government<br />

needs to be more transparent and accountable to the public. This<br />

and the need for reorganizing many processes within the public<br />

sector, covering a wide range of tasks and work arrangements,<br />

have been understood and it has lead to initiatives, such as the<br />

Kosovo Strategy for E-Government [2]. Nevertheless, there is still<br />

a big gap evident between the political priorities and agenda on<br />

the one hand and the actual implementation and users<br />

expectations on the other hand.<br />

The initial requirements for the government start with a detailed<br />

remodeling of work processes within the public sector and by<br />

translating them into a digitalized e-service format model for<br />

citizens. The existing relationships between the government and<br />

the citizen will be therefore redefined by introducing new<br />

processes at work in the public sector and by opening new<br />

opportunities.<br />

The Kosovo Government’s E-Government Strategy 2009-2015<br />

has identified the major priorities and objectives that need to be<br />

realized. During the past few years, several projects were<br />

identified and fully or partly implemented as a basis for the<br />

provision of e-services, such as the central register of citizens, the<br />

register of economic entities and various registers of cadastre and<br />

immovable properties for land administration. Besides such<br />

important projects, there is now a need for development and<br />

implementation of new projects that will allow the provision of<br />

specific e-services, on the basis of which the ordinary citizens can<br />

experience the expected benefits of e-government and the<br />

information society.


Despite the fact, that the integration of e-government services in<br />

Kosovo through the governmental portal for both citizens and<br />

businesses is still in its initial phase, there are certain<br />

improvements evident, which were made by some institutions<br />

such as certain Ministries and municipal governments. However,<br />

most of them are primarily offering information to citizens, while<br />

the direct citizen interaction with the government is still in its<br />

development stage.<br />

A fully functional governmental e-portal as a one-stop access to<br />

the most important interactive and transactional e-services,<br />

leading to integrated delivery of all government services to<br />

citizens and businesses is one of the most important challenges in<br />

Kosovo. The development of technological, legal and institutional<br />

infrastructure will enable the development of such services to the<br />

level of performing full e-government transactions by citizens.<br />

However, while the ICT infrastructure remains one of the main<br />

pillars of the e-government, the importance of the technology<br />

aspect is regularly weighted more than importance of new or<br />

revised structures and processes within the public sector. The<br />

introduction of e-Government may show its expected benefits<br />

only if it is properly planned and if it owns a full social, cultural<br />

and political support [3] including the acceptance at the user side.<br />

For assessing the effectiveness and ensuring that the frequent<br />

rhetoric of a successful implementation of e-government is also<br />

matched by reality, the performance of the e-government project<br />

implementation needs to be measured [3]. The growing political<br />

interest for e-Government in Kosovo together with the increased<br />

idea that governments should be more accessible to the citizens<br />

through internet shows a big opportunity and a favorable<br />

momentum which needs to be appropriately exploited for<br />

enhancing the current level of e-government performance and for<br />

setting up new e-government projects. In order to prevent such an<br />

opportunity from disappearing, a quick and tangible success is<br />

required in the implementation of e-government projects for<br />

citizens. The success depends heavily on the simplification and<br />

implementation of information, communication and transaction<br />

processes respectively on the quality of administrative services,<br />

especially those which are fully transactional [4].<br />

With the objective of measuring the success of e-government, the<br />

aim of this study is the assessment the current developments of egovernment<br />

project implementation in Kosovo from the<br />

perspective of users at the demand side.<br />

2. E-GOVERNMENT PERSPECTIVE–<br />

BACKGROUND OF THE STUDY<br />

The main challenges faced currently by the public sector in<br />

Kosovo mainly relate to the issues of maintenance of databases of<br />

various organizational units, their processing and communication.<br />

These data are recorded and archived in different locations and<br />

media. The communication between specific institutions in the<br />

organizational view is very deficient, which is consequently<br />

causing delayed or wrong decisions and other mistakes in<br />

managing the processes within government institutions and the<br />

service delivery to citizens. There is a great potential to improve<br />

the information exchange by applying the information technology<br />

and communications, and thus directly increase the efficiency of<br />

the e-Governance.<br />

The Kosovo Government’s E-Government Strategy 2009-2015<br />

was released by the Department of Information Technology of<br />

Ministry for Public Services in September 2008 [2]. This paper<br />

325<br />

reflected the introduction of the Information and Communication<br />

Technologies environment, sets out the intentions of the egovernment<br />

programme by 2015, aims to clarify what are the<br />

goals for the e-government service delivery and confirms the<br />

continues commitment of the government for the development of<br />

standards, interoperability and the government enterprise<br />

architecture for achieving the goals of this strategy. It also briefly<br />

outlines the current activities undertaken across some of the<br />

government bodies for the achievement of these goals.<br />

The main goal is to give access to the citizens to government<br />

information and services, participate in the democracy using the<br />

internet and other technologies. The better service improves the<br />

relationships with citizens by achieving convenience and<br />

satisfaction, with this the internal performance of the government<br />

will be more integrated and efficient and the citizens participatory<br />

role in the decision making process will be increased.<br />

The starting point for this study is the fact that despite<br />

considerable investments and a large number of ongoing and<br />

completed technical assistance projects, the e-Government<br />

services in Kosovo have not experienced the anticipated take-up.<br />

A systematic consideration of e-service delivery arrangements is<br />

required, specifications must be drawn up with great care and<br />

therefore the public administration must ensure that particularly<br />

the requirements of citizens are addressed during the<br />

implementation of the e-Government project [5]. The common<br />

requirement for a successful product development and acceptance<br />

by the clients is the analysis of the needs of users and the concrete<br />

definition and detailed documentation and validation of these<br />

requirements [6], however, according to Horan [7], the e-<br />

Government research arena still suffers from a lack of users<br />

satisfaction measurements.<br />

3. RESEARCH METHODOLOGY AND<br />

DATA COLLECTION<br />

For the e-Government demand side measurement and evaluation<br />

one of the most important questions is the decision what to<br />

measure and how to design the survey. For this reason the most<br />

influencing factors for the success of e-Government are to be<br />

identified.<br />

The first task was to compile the list of factors to be surveyed,<br />

while the success factors have to be determined on an individual<br />

basis [8]. These factors need to be adjusted to the context of this<br />

specific research. The list of factors to be included shall only<br />

consist of qualities, which may have a particular significance for<br />

the information system [9]. It is assumed that there are only a<br />

limited number of success factors that have an impact on the<br />

overall success of information systems [10]. The selected success<br />

factors have to cover various fields of information systems such as<br />

provision of e-services, communication, competence of staff and<br />

the role of the information system [11]. The main objective of the<br />

assessment of success factors is to analyze the contribution of<br />

particular factors and through this to identify the strengths and the<br />

weaknesses in the implementation of ICT systems, which is a<br />

requirement for deriving necessary measures for the improvement<br />

of the overall success and assessment of its urgency [13]. The<br />

selection and evaluation of success factors in this research was<br />

based on the list of success factors and methods defined and used<br />

by Heeks [12], Hoffmann [13] and Salzmann [14].


In view of different theoretical approaches to e-government<br />

demand-side evaluation, a suitable and locally acceptable<br />

evaluation method was to be identified and to be used in this<br />

research for measuring the success of the e-government project<br />

implementation from the users’ point of view. The several egovernment<br />

surveys methods, which are generally used for data<br />

collection for the purpose of reviewing the existing performance<br />

of the e-government implementation, range from direct interviews<br />

with citizens or government officials [15], [16], focus groups [15],<br />

visits to government websites [17] to questionnaire surveys to<br />

citizens [18]. In order to include a large number of respondents<br />

from a broad territory, for practical reasons this survey has<br />

utilized the questionnaire survey method.<br />

An empirical study has been conducted for measuring the success<br />

of the e-Government project implementation. The research<br />

utilized a structured questionnaire used by Hoffmann [13] which<br />

was adjusted to adapt to local conditions. The questionnaire used<br />

for the collection of data included 23 questions classified to<br />

measure the citizens perception of the priority and performance of<br />

selected factors, important for the success of the overall egovernment<br />

information system. Apart from these, the<br />

questionnaire contained additional 20 questions typical to<br />

demographics, internet usage habits, their awareness on the<br />

availability and their expectations for e-government services.<br />

Some questions additionally referred to their opinion regarding<br />

the future development of e-government services. The questions<br />

on the success factors required the responder to assess the priority<br />

of every factor on a scale from 1 (not important) to 4 (most<br />

important) as well as the current performance of the same factor<br />

from 1 (not implemented in practice) to 4 (fully implemented in<br />

practice). (Questionnaire can be provided on request).<br />

The probability method used for the selection of the survey<br />

sample was based on random sampling. A total of 350<br />

questionnaires were used by targeting various citizens and in<br />

order to reflect the entire adult Kosovo population and to ensure a<br />

representative sample in terms of demographic and sociological<br />

structure, the questionnaires were distributed to random citizens<br />

through University students, employers of various private and<br />

public companies and institutions, unemployed and elderly people<br />

throughout 9 different Kosovo municipalities. For practical<br />

reasons the data collection was conducted in only 9 out of 37<br />

Kosovo municipalities. In order to have a adequate statistical<br />

representation of collected data, Prishtina, as the capital city,<br />

together with all six secondary municipalities, where the majority<br />

of the Kosovo population resides, were included in this sample.<br />

Additionally two smaller minority municipalities were also<br />

included of this survey in order to obtain a representative sample<br />

from various municipalities. Out of this number a total of 300<br />

questionnaires were validated and were selected for this empirical<br />

study, representing a sample size with a standard confidence level<br />

of 95% and confidence interval of 5.5%. The data collected<br />

through this survey was digitalized, coded and analyzed using<br />

statistical analysis software for descriptive statistics and<br />

relationships.<br />

The purpose of analyzing success factors is to evaluate the<br />

contribution of specific factors to the overall success of an<br />

information system and with this to determine the specific<br />

strengths and weaknesses in the implementation of information<br />

systems. The direct output is a set of required measures for<br />

326<br />

improvement of the overall success. The results of the study will<br />

be illustrated using available tools for graphical analysis.<br />

The profile diagrams and the portfolio matrix are used for the<br />

graphical evaluation of success factors. The priority and the<br />

perceived implementation of success factors are presented in the<br />

same diagram while their values are marked with corresponding<br />

points on a scale from one to four.<br />

The graphical portfolio matrix is used for the data analysis. This<br />

graphical tool is based on a two dimensional diagram,<br />

which illustrates the research results in a simple and<br />

understandable manner [13]. The portfolio matrix axes show the<br />

features explored, in which the priority/expectation is shown on<br />

the X-axis and the performance/implementation is shown on the<br />

Y-axis. In order to allow a simple evaluation of the results, the<br />

matrix is divided into nine clusters. All factors that are listed in<br />

the portfolio matrix by combining their characteristics fall<br />

into one of these matrix clusters. The clusters are used for<br />

gathering factors with similar characteristics in respective groups,<br />

for which pre-standard recommendations for action will be<br />

defined.<br />

This method is used for analyzing the success of implemented egovernment<br />

projects and to draw specific recommendations<br />

for further action in relation to improvement of the overall success<br />

of specific factors.<br />

4. RESULTS AND DISCUSSION<br />

The target survey population of this study comprised a<br />

representative sample of people residing in various Kosovo<br />

municipalities during 2011. The study population was comprised<br />

of 300 adult persons of various age groups. The Figure 1 outlines<br />

the age groups of the study population by gender: a total of<br />

38.3% of all male and female respondents were under age 25,<br />

31.7% were within the age group interval from 26 through 35,<br />

18% were between 36 through 45, 8.3% between 46 through 55<br />

and 3.7% above 55. In absence of final data from the 2011 census<br />

in Kosovo, for comparison purposes the Figure 2 shows the<br />

estimated population of Kosovo by age groups as assessed<br />

through the results of the 2009 labor force survey conducted by<br />

the Statistical Office of Kosovo.<br />

From the gender perspective, Figure 3 shows that 58.7% of total<br />

respondents were Males and 41.3% were Females and the gender<br />

differences were significant (χ2= 9.01, P=0.03, thus P


Figure 1. The structure of respondents by the age-group and<br />

gender<br />

Figure 2. Estimated Population by age-groups in Kosovo (%),<br />

2009 [19]<br />

Figure 3. The structure of respondents by gender<br />

327<br />

Figure 4. The structure of respondents by their employment<br />

The total percentage of unemployed respondents from this survey<br />

has not exceeded 2%, a figure below the assumed high rate of<br />

unemployment in Kosovo. It is however anticipated that the<br />

responders working in the informal sector have not declared<br />

themselves as on unemployment. As an additional comparison, a<br />

first important labor market indicator is the relative size of the<br />

working age population, e.g., the persons between the ages of 15<br />

and 64, which approximately defines the potential available<br />

manpower. In Kosovo, this figure from the 2009 SOK LFS is<br />

comparatively low with only 64.0%. The reason for this becomes<br />

apparent by looking at the age structure. Kosovo has a relatively<br />

young population, with almost one of the third of age 15 and<br />

under and 7.8% aged 65 or above.<br />

Traditionally the younger generations are more familiar and show<br />

more interest in information technologies and feel more motivated<br />

in using e-government. It shall be noted that such a young<br />

population structure during this survey, with a majority of survey<br />

responders younger than 35, represents a factor which may<br />

heavily shape the results of this study. It is however apparent that<br />

this factor coincides also with the general population structure and<br />

therefore appropriately corresponds to the real situation in the<br />

field.<br />

Table 1. The structure of respondents by education<br />

Level of Education N %<br />

Secondary School 134 44.7<br />

Tertiary/University degree 164 54.7<br />

Total 300 100.0<br />

The Table 1 outlines the structure of respondents by education.<br />

The survey revealed that the general interest in e-government in<br />

Kosovo is very high, since 92% of people questioned have<br />

confirmed that they would prefer to complete all administrative<br />

processes online, while only 7% of them were not interested in<br />

using administrative services online (Figure 4.). The usage<br />

statistics revealed that while 71% of respondents have indicated<br />

that they have visited the Kosovo e-government portal site, the<br />

percentage of internet users who have already used e-services is<br />

low (34%) (Figure 5.). As a comparison, Heeks [20] uses an


approximate figure of 60% of internet users in Europe and other<br />

developed and transition countries that have ever accessed egovernment<br />

e-services, mainly for information purposes, while<br />

only 10-25% of users have undertaken online transactions. On the<br />

other hand, the Kosovo survey revealed that 55% of people<br />

questioned would be interested for the provision of e-government<br />

services at a transaction level (Table 2.).<br />

Figure 5 The results of current use of e-government<br />

Table 2. Preferred level of interaction<br />

N %<br />

Information level 70 23.3<br />

Communication level 63 21.0<br />

Transaction level 167 55.7<br />

Total 300 100.0<br />

Table 3. Statistics of internet access at home<br />

What is the type of your internet access at<br />

home N %<br />

No internet access available 8 3.0<br />

Other modem/other narrow band 57 19.0<br />

Cable modem 230 77.0<br />

No answer 5 2.0<br />

Total 300 100.0<br />

Surprisingly, 95% of respondents have reported to have an<br />

internet access at home (Table 3.). The most reasons for the use of<br />

internet are emailing and communication (80%) and reading news<br />

(62%) while less than 18% of respondents have used the internet<br />

for purchasing products online and lesser for online banking.<br />

328<br />

Table 4. Internet usage statistics<br />

The use of internet N %<br />

Not using or very rarely use 1 0.3<br />

Less than 1 hour/week 15 5.0<br />

1 to 5 hour/week 96 32.0<br />

15 to 40 hours/week 125 41.7<br />

More than 40 hours/week 63 21.0<br />

Total 300 100.0<br />

The Table 4 reveals the current practices on the use of internet,<br />

showing that more than 62% of respondents are intensively using<br />

internet more than 15 hours weekly.<br />

Table 5. Assessment of overall governmental e-services<br />

The overall assessment of the online services<br />

offered by the public administration N %<br />

Nonexistent 65 21.7<br />

Inadequate 191 63.7<br />

Adequate 34 11.3<br />

Excellent 4 1.3<br />

No answer 6 2.0<br />

Total 300 100.0<br />

The Table 5 reveals that the majority of respondents<br />

(21.7%+63.7%) are not satisfied with the current level of<br />

government e-services. This majority’s assessment of e-services<br />

provided by the government is that these do not exist or are<br />

inadequately implemented. This is to some extend consistent with<br />

71% of participants that have visited the governmental portal vs.<br />

85% indicating that the current level of e-services is<br />

unsatisfactory. The individual evaluation of data received from<br />

the questionnaires of the 28% of respondents that have never<br />

visited the e-government portal (Figure 5.) shows that 84.5% of<br />

them have rated the online e-services as unsatisfactory.<br />

Table 6. Main reasons for the use of e-services<br />

N %<br />

Total 300 100.0<br />

Time saving 255 85.0<br />

Performing administrative tasks 243 81.0<br />

from Avoiding home waiting queues 227 75.7<br />

Shorten case processing and<br />

220 73.3<br />

response Immediate time notification about<br />

207 69.0<br />

missing Independence documents from office<br />

132 44.0<br />

working Cost savings hours<br />

130 43.3<br />

Other 4 1.3<br />

The respondents were also asked to provide their most important<br />

reasons for the use of governmental e-services. The main reasons<br />

presented, as shown in Table 6, were related to the time saving<br />

factor (85%), completion of administrative processes from home<br />

(81%), avoiding queuing at administrative offices (75%) and the<br />

quicker response time by the administration (73%). The majority


(69%) has also highlighted the importance of getting personal<br />

feedback from the government in case some documents would be<br />

additionally required during the administrative process.<br />

A more detailed review of the results show that the users are least<br />

satisfied with the communication with public servants by email,<br />

while the visual design, ease of use and navigation scored better<br />

(Figure 6.) (Table 7.). The factor of appointing a public servant as<br />

a contact person appears high in the list of citizens’ requirements<br />

for a successful e-government project implementation. While this<br />

question was unfortunately not detailed further in the<br />

questionnaire, it is most possible that this specific requirement is a<br />

result of the citizens’ overall distrust towards the public<br />

administration and their habits in dealing with the administration<br />

in traditional means through direct contact with the public servant<br />

in the administration office.<br />

The actual requirements for e-government services derive from<br />

the evaluation of citizens’ priorities that were provided for each<br />

success factor listed in the questionnaire. A high priority of a<br />

success factor is a demand for the information system [21].<br />

Figure 6 The average values of the perceived<br />

implementation/performance of success factors (shown in red<br />

color) vs. their priority (shown in blue color)<br />

Table 7. List of success factors that were assessed together<br />

with the calculated difference between their average priority<br />

and implementation values<br />

# Success factor Difference<br />

F-1 Multilingualism 0.3<br />

F-2 Unified appearance 0.8<br />

F-3 Visually attractive design 0.8<br />

329<br />

F-4 Easy to use 1.1<br />

F-5 Easy to navigate 1.2<br />

F-6 Large amount of information 1.3<br />

F-7 Cost saving factor 1.4<br />

F-8 Services supporting specific activities 1.4<br />

F-9 Provision of samples 1.4<br />

F-10 Grouping of services by life situation 1.5<br />

F-11 Client-oriented services 1.5<br />

F-12 Continuously updated content 1.5<br />

F-13 Integration of services between central and local<br />

level<br />

1.5<br />

F-14 Acceptance of digital signatures 1.6<br />

F-15 Large amount of services 1.6<br />

F-16 Support of general processes 1.6<br />

F-17 Simplification of administration processes 1.6<br />

F-18 Time saving factor 1.6<br />

F-19 Support of communication 1.7<br />

F-20 Appointment of a contact person 1.7<br />

F-21 Acceptance of e-mail messages 1.9<br />

F-22 Support for email notifications 1.9<br />

F-23 Rapid response by administration 1.9<br />

The Figure 6 details the average values of assessed<br />

implementation (shown in red color) in a scale from 1 (not<br />

important) to 4 (most important) vs. the average values of their<br />

priorities (shown in blue color) using a similar scale from 1 (not<br />

implemented) to 4 (fully implemented). The Table 7 provides the<br />

list of all measured factors and presents the calculated difference<br />

between the values of assessed implementation and the priority<br />

for each measured factor. The difference figure shows how large<br />

is the discrepancy between the citizens’ priority for a specific<br />

success factor and their assessment of its current implementation<br />

in practice.<br />

Figure 7. Portfolio matrix of implementation/performance vs.<br />

priority of identified success factors<br />

The actual values of success factors implementation and their<br />

priorities are shown with the portfolio matrix (Figure 7),<br />

illustrating that all success factors are located within a grouping<br />

cluster, which requires appropriate adjustment by increasing the<br />

level of their implementation. All success factors are placed just<br />

below the matrix cluster with highest priority and excellent<br />

implementation. Except the success factor F-1 (Multilingualism),<br />

which is considered appropriately implemented due to its slight


difference between its priority and actual implementation and its<br />

location in the edge of the cluster with highest priority and<br />

excellent implementation, all other success factors are located<br />

inside the cluster with high priority and lower implementation<br />

level, requiring immediate adjustment.<br />

5. CONCLUSIONS<br />

The survey conducted with this research presented the citizens’<br />

priorities and perceived performance of the public administration<br />

in the e-government project implementation. The research<br />

concludes with highlighting some key findings and<br />

recommendations as outlined below:<br />

o This study has confirmed that there is a gap between the<br />

citizens’ requirements and interests and the actual<br />

o<br />

implementation of governmental e-services in Kosovo, since<br />

more than two third of respondents, covered in this study,<br />

registered their disappointment that the current online<br />

services offered by the public administration in Kosovo are<br />

deficient and require immediate attention for improvement.<br />

Over 90% of respondents have declared that they regularly<br />

use internet more than 1 hour per week. More than 60% are<br />

using internet for more than 15 hours per week, showing that<br />

in relation to age and gender, the use of internet has rapidly<br />

increased among citizens in Kosovo resulting with a growing<br />

population of possible e-government users, which could<br />

directly benefit from a successful e-government project<br />

implementation.<br />

o The study has shown that the majority of respondents have<br />

expressed their interest for the use of e–services.<br />

o<br />

Remarkably, more than 55% of the respondents would like to<br />

change from the traditional way of dealing with the<br />

administration to a transaction based administration eservices,<br />

in contrast to just downloading or filling the forms<br />

online.<br />

Through the significant discrepancy between the priorities of<br />

citizens and the implementation of e-services in practice, this<br />

study has confirmed that the e-government Kosovo<br />

administration lacks its customer relation in the sense of<br />

tailoring their services towards customers’ needs. It should<br />

be also noted that one of the reasons, why most survey<br />

respondents were classifying the priority of all success<br />

factors fairly high, may be because of the fact that there is<br />

not yet an appropriate e-government practice in Kosovo. It<br />

could be expected that at a later stage the priorities of success<br />

factors may be differently assessed.<br />

o As long the citizens don’t know that e-services are available,<br />

they won’t use them. To deal with this problem, the<br />

government needs to market the available online services<br />

through press releases, flyers, promotional events and public<br />

service announcements [22] in order to approach the<br />

potential users that have not visited the governmental portal<br />

yet.<br />

o It is important to start implementing a generally accepted<br />

online payment modality, which would be accepted by the<br />

public and integrated as a standard tool within all relevant<br />

products developed by the central and local level of the<br />

public administration.<br />

o In absence of its own capacities, the government shall<br />

identify potential partners, who in collaboration with the<br />

330<br />

o<br />

public administration could assist the government in<br />

implementing certain online services for administrative<br />

institutions in the form of a public-private partnership.<br />

However, under a public-private partnership the government<br />

should continue to keep the key driver role for the promotion<br />

of e-government initiatives.<br />

The most critical factors that would contribute to the success<br />

of e-government in Kosovo relate to the change and<br />

simplification of administrative processes and the<br />

establishment of appropriate communication channels<br />

between citizen and administration, which would generate a<br />

sense of accountability and assurance. The political<br />

willingness, an adequate technological infrastructure and an<br />

overall client oriented development strategy remain the most<br />

critical factors for the e-government project implementation.<br />

As a further research it is recommended to conduct such empirical<br />

studies on a regular basis in order to follow up and compare with<br />

different empirical studies addressing comparable success factors.<br />

6. REFERENCES<br />

[1] Public Administration Country Profile for Kosovo, Division<br />

for Public Administration and Development Management,<br />

Department of Economic and Social Affairs, United Nations,<br />

December 2003.<br />

[2] Electronic Government Strategy 2009-2015, Ministry of<br />

Public Services, Department of Information Technology,<br />

October 2008<br />

[3] Asgarkhani M.: The Effectiveness of e-Service in Local<br />

Government: A Case Study, The Electronic Journal of e-<br />

Government Volume 3 Issue 4, 2005, www.ejeg.com<br />

[4] Becker J. et al.: e-Government Success Factors, EGOV<br />

Third International Confererence, Springer, 2004<br />

[5] Leitner C., eGovernment in Europe: The State of Affairs,<br />

EIPA Maastricht, 2004<br />

[6] van der Linden, F., Schmid, K., Rommes, E., Software<br />

Product Lines in Action, Springer Verlag, 2007<br />

[7] Horan, T., Abhichandani, T., Rayalu, R.: Assessing User<br />

Satisfaction of E-Government Services: Development and<br />

Testing of Quality-in-Use Satisfaction with Advanced<br />

Traveller Information Systems, 39th Hawaii International<br />

Conference on System Sciences, 2006<br />

[8] Lehner, F: Die Erfolgsfaktoren Analyse in der Informationsverarbeitung,<br />

Zeitung Betriebs-wirtschaft, 1995<br />

[9] Camp, O. Filipe, J., Hammoudi, S. Piattini, M., Enterprise<br />

Information Systems, Kluwer Academic Publishers, 2004<br />

[10] Krcmar, H., Informationsmanagement, Springler Verlag,<br />

2005<br />

[11] Heinrich L.: Informationsmanagement, Oldenbourg<br />

Wissenschaftsverlag, 2005<br />

[12] Heeks, R. eGovernment for Development: Causes of<br />

eGovernment Success and Failure: Factor Model, IDPM,<br />

University of Manchester, 2003.<br />

[13] Hoffmann, R., Anforderungs- und Erfolgsanalyse von E-<br />

Government Anwendungen, VDM Verlag, 2008


[14] Salzmann, M. e-Government im Kanton Zuerich – Strategie<br />

und Umsetzung, Paul Haupt Verlag, 2004<br />

[15] Agimo.: E-Government Benefits Study. Australian<br />

Government Information Management Office:<br />

http://www.agimo.gov.au/archive/publications_noie/2004/10<br />

/annrep03-04/part_3_-_performance_report.html.<br />

[16] P. Crook, S. J. Rohleder, and A. Simmonds, CRM in<br />

Government: Bridging the Gaps. Atlantic and Europe,<br />

Accenture, 2003.<br />

[17] UNPAN. (2005, July) Global Readiness Report: From<br />

eGovernment to eInclusion.<br />

http://www2.unpan.org/egovkb/global_reports/05report.htm.<br />

[18] A. Dexter and V. Parr, Government Online Study, Taylor<br />

Nelson Sofres, 2003.<br />

331<br />

[19] Ministry of Public Services:, Series 5: Social Statistics,<br />

Results of the labor force survey 2009, Statistical Office of<br />

Kosovo (SOK) 2010,<br />

[20] Heeks, R.: Benchmarking eGovernment: Improving the<br />

National and International Measurement, Evaluation and<br />

Comparison of eGovernment, IDPM, University of<br />

Manchester, 2006<br />

[21] Scheer, A., ARIS Modellierungsmethoden, Metamodele,<br />

Springer Verlag, 1998<br />

[22] Eggers, W., Boosting E-Government Adoption, FTA Annual<br />

Conference, 2004,<br />

http://taxadmin.org/fta/meet/04am_pres/eggers.pdf


Computer Supported Contractor Selection<br />

for Public Administration Ventures<br />

Zbigniew Paszkiewicz<br />

Department of Information Technology<br />

Poznań University of Economics<br />

6 Mansfelda str., 60-854 Poznań, Poland<br />

+48 61 8480549<br />

zpasz@kti.ue.poznan.pl<br />

ABSTRACT<br />

Ventures undertaken by public administration significantly<br />

contribute to development of economy. Such ventures are usually<br />

complex, so they require effective collaboration of a number of<br />

autonomous organizations. To face the challenge of efficient<br />

cooperation, public administration should adopt the model of<br />

Virtual Organizations (VO). A key phase in each VO life-cycle is<br />

selection of partners which in case of public administration takes<br />

a form of public auctions. In this paper a Collaborative<br />

Contractor Selection method, denoted C-CS, is proposed to<br />

support selection of contractors for a portfolio of public ventures.<br />

In the C-CS method a number of requirements are considered<br />

associated with contractor offer properties, contractor<br />

competences, and social relationships among them. The selection<br />

is performed step by step as successive ventures are performed. If<br />

justified, the selection is done in collaboration between<br />

administrative units and potential contractors. The C-CS method<br />

provides an opportunity for better computer support of public<br />

auctions leading to more efficient and effective realization of<br />

public administration ventures.<br />

Categories and Subject Descriptors<br />

J.1 [Computer Applications]: Administrative Data Processing:<br />

Business, Government<br />

K.4.3 [Computers and Society]: Organizational Impacts:<br />

Reengineering, Computer-Supported Collaborative Work<br />

General Terms<br />

Economics, Human Factors, Performance, Design, Algorithms<br />

Keywords<br />

Public Administration, Virtual Organization, Agility, Adaptive<br />

Business Processes, Process Mining<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

332<br />

Wojciech Cellary<br />

Department of Information Technology<br />

Poznań University of Economics<br />

6 Mansfelda str., 60-854 Poznań, Poland<br />

+48 61 8480549<br />

cellary@kti.ue.poznan.pl<br />

1. INTRODUCTION<br />

In every country, public administration is a significant economical<br />

actor, quite often a major one. Ventures undertaken by public<br />

administration are usually complex and cannot be handled by a<br />

single organization but require effective collaboration of a number<br />

of autonomous organizations from both the public and private<br />

sector. Cooperation on complex ventures is usually a challenge for<br />

public administrations. To face this challenge, public<br />

administration should adopt the model of Virtual Organizations<br />

(VO) [1, 2, 3] which permits to deal with complexity, pursuit for<br />

agility, and take advantages of broad use of information<br />

technologies in economic and managerial operations. VO is “a set<br />

of at least two autonomous partners, where at least one of them is<br />

an organization, cooperating within a particular structure of social<br />

and legal relationships in order to carry out a particular venture<br />

due to the demand from virtual organization clients and having a<br />

plan to carry out this venture” [4]. Partners collaborating within a<br />

VO are organizations – enterprises, public administration units,<br />

and non-government organizations – people, and information<br />

systems.<br />

The success of a VO strongly depends on ability of all<br />

participating organizations to efficiently and seamlessly cooperate<br />

via Internet. Good level of cooperation may be achieved by an<br />

appropriate selection of partners. In case of public administration<br />

ventures this selection takes a form of public auctions. In<br />

European Union, approaches to conducting a public auction are<br />

regulated by two main directives 2004/17/EC and 2004/18/EC [5].<br />

Due to importance and complexity of partner selection problem, a<br />

number of computer supported methods has already been<br />

proposed. Modern approaches to modeling cooperation among<br />

organizations are built around the concept of service and the<br />

paradigm of Service-Oriented Architecture (SOA) [2]. Examples<br />

of methods supporting selection of partners and service for VO<br />

have been described in [6, 7]. In some of the proposed<br />

methods [2, 8] existence of Virtual Organization Breeding<br />

Environment VOBE is assumed. Public administration playing a<br />

role of VOBE is presented in [1]. So far, none of the proposed<br />

methods, has been evaluated for the use in public auctions.<br />

Existing methods have the following shortcoming preventing<br />

them from effective application to contractor selection for public<br />

administration ventures: (a) the aspect of past collaboration<br />

between potential contractors is not included; (b) it is assumed<br />

that the process model of a venture is known in advance and that<br />

it does not change; (c) all the partners are selected before a<br />

venture starts, while in practice new partners may be required<br />

when the venture progress, or some initially selected partners may


appear useless so the evolving aspect of the partner selection is<br />

not addressed.<br />

In this paper a C-CS method is presented in which selection of<br />

contractors based on multi-variant analysis is not seen as a single<br />

act, but as a process conducted in parallel to the public<br />

administration ventures. In the C-CS method legal restrictions<br />

following from the public auctions are taken into account. The C-<br />

CS method takes advantage of process mining techniques for<br />

analysis of past contractor selections and provides<br />

recommendations for ongoing and future contractor selections<br />

processes. The above features make the C-CS method well suited<br />

for big public administration ventures.<br />

The remainder of this paper is organized as follows. In Section 2,<br />

the main law regulations concerning public contracts and public<br />

auctions are presented. In Section 3, the approach to selection of<br />

partners to portfolio of projects is justified. In Section 4, the<br />

proposed C-CS method supporting contractor selection is<br />

presented. Finally, Section 4 concludes the paper.<br />

2. PUBLIC AUCTIONS IN EUROPEAN<br />

UNION<br />

The aim of a public auction is to elaborate a public contract<br />

between one or more economic operators and one or more<br />

contracting authorities. Contracting authorities mean here the<br />

state, regional or local authorities, bodies governed by public law<br />

or their groups. An economic operator is understood as any<br />

organization which offers on the market products or services. An<br />

economic operator or a set of economic operators undersigning a<br />

public contract and responsible for its realization is called a<br />

contractor.<br />

European Union directives define five main procedures allowing<br />

contractors to be selected: open procedures, restricted<br />

procedures, competitive dialogue, negotiated procedures, and<br />

design contests. To establish a complex public contract defined as<br />

a one where “the contracting authorities: are not objectively able<br />

to define the technical means, capable of satisfying their needs or<br />

objectives, and/or are not objectively able to specify the legal<br />

and/or financial makeup of a project” competitive dialog or<br />

negotiated procedure procedures are used.<br />

Conduction of the competitive dialog and negotiations is based on<br />

collaboration that takes place on two levels: (1) inside public<br />

administration units, and (2) among public administration and<br />

candidates for contractors. Collaboration inside public<br />

administration units arises during preparation of public auction<br />

and during the interaction with candidate contractors.<br />

Collaboration concerns contractor selection participants<br />

comprising domain experts, public administration unit<br />

representatives, legal and technical advisors, non-government<br />

organizations, etc. Collaboration aims at: (1) definition of the<br />

contract notice content; (2) agreement on the set of economic<br />

contractors invited to take part in selection procedures;<br />

(3) evaluation of offer variants submitted by candidates during<br />

negotiations and dialog. Cooperation on the second level with<br />

economic contractor is the essence of negotiation and competitive<br />

dialog. It relies on exchange of information aiming at<br />

identification and definition of the means best suited to satisfying<br />

the needs of contracting authorities.<br />

333<br />

A basic observation is that public administration usually has to<br />

conduct not just one but a portfolio of projects. A common<br />

approach to management of such projects favored by public<br />

administration is selection of one contractor per project. In this<br />

approach, however, the managerial role of public administration is<br />

reduced to supervision. A contractor manages a network of<br />

specialized organizations executing different tasks comprising the<br />

project. Currently, public administration is focused on selection of<br />

contractors for single ventures in separation from one another,<br />

while paying not enough attention to the holistic view of the<br />

whole portfolio of ventures. As a result, contractor selection for<br />

public administration ventures is not performed effectively and<br />

often leads to non-effective realization of public ventures.<br />

Current approaches to contractor selection for public<br />

administration ventures has the following shortcomings:<br />

(1) limited support for analysis of potential contractors in terms of<br />

relationships existing among them, while these relationships can<br />

have a great impact on efficiency of realization of the portfolio of<br />

projects; (2) limited support for analysis of correlation among<br />

former and ongoing public auctions, while the result or the course<br />

of one public auction should be taken into account during others;<br />

(3) limited support for analysis of sets of economic contractors<br />

involved in many public auctions; (4) limited sharing of good<br />

practices concerning public auctions among public administration<br />

units due to the fact that such practices are difficult to be<br />

identified; such good practices may concern used requirements,<br />

definition of public auction scope, association among auctions and<br />

projects, economic contractors, experts, public administration<br />

units, non-government organizations involved in the selection<br />

process, and invited economic operators for negotiations.<br />

3. CONTRACTOR SELECTION FOR<br />

PORTFOLIO OF VENTURES<br />

To deal with drawbacks of the current selection process, it is<br />

necessary to change the approach to conduction of public auctions<br />

and management of public administration project portfolio. In this<br />

paper we propose to consider a portfolio of projects and apply a<br />

coordinated partner selection process in a number of auctions to<br />

all the projects contained in the portfolio, instead of selecting<br />

independently a contractor per project. The contractors selected<br />

need to be able to mutually communicate, synchronize, and<br />

cooperate to efficiently realize a set of projects. Thus, in the<br />

proposed approach analysis of interrelations among potential<br />

contractors is included. Public administration together with all the<br />

contractors (a contractor per project) constitute a VO within<br />

which they collaborate as partners to conduct a portfolio of<br />

projects. The Collaborative Contractor Selection (C-CS) method<br />

proposed in this paper in Section 4 refers to computer support of<br />

two the most complex cases of public auctions, i.e. competitive<br />

dialog or negotiated procedure.<br />

In the C-CS method the contractor selection for public<br />

administration venture is a process consisting of a set of possibly<br />

overlapping public auctions associated with a set of projects.<br />

These auctions lead to definition of a set of public contracts<br />

associated with the execution of projects comprising project<br />

portfolio. The input for starting a contractor selection process for<br />

public administration is a project portfolio. Contractor selection<br />

process encompasses: (1) definition of a set of public auctions to<br />

be conducted for the project portfolio, relationships existing<br />

among these auctions, and main assumptions of these auctions;


(2) conduction of the public auctions, where each auction is<br />

followed by establishment of a public contract for each project;<br />

(3) if applicable, as contractor selection proceeds (i.e. subsequent<br />

auctions are performed and concluded), redefinition of the set of<br />

auctions, relationships among them, their scope and assumptions.<br />

Step 3 captures the evolving aspect of contractor selection.<br />

Contractor selection is completed when all the projects from the<br />

project portfolio have assigned public contracts.<br />

4. C-CS METHOD<br />

The C-CS method is a refinement of the MAPSS method proposed<br />

in [8]. The refinement of the method encompasses: (1) selection<br />

of contractors for a subset of projects composing a portfolio–<br />

economic operators are not assigned to all the projects at once;<br />

(2) analysis of social relations among contractors selected during<br />

several public auctions; (3) collaborative approach to contractor<br />

selection involving interested parties; (4) support for contractor<br />

selection participant activities by recommendation of good<br />

practices in the form of activity patterns; (5) support for analysis<br />

of various variants of possible assignment of contractors to<br />

projects, where variant evaluation is based on requirements and<br />

preferences of selection process participants including social<br />

aspects.<br />

4.1 C-CS Concept<br />

It is assumed that a contractor selection process consists of a set of<br />

public auctions. he aim of each public auction is to find a<br />

contractor providing the best offer that observes the requirements:<br />

(1) defined in the public notice and (2) imposed on an auction as<br />

a consequence of already completed auctions. Such constraints<br />

usually take a form of social requirements. They follow from a<br />

holistic approach to selection of contractors for a portfolio of<br />

projects. Subsequent auctions may be organized in parallel to<br />

venture proceeding.<br />

A contractor specification is a set of requirements that an<br />

economic operator must satisfy to be assigned to a particular<br />

public contract. An offer specification is a set of requirements that<br />

an offer of an economic operator must satisfy to be assigned to a<br />

particular public contract. Social requirements concern<br />

relationships among contractors. An acceptable contractor is an<br />

economic operator satisfying requirements defined in the<br />

contractor specification. An acceptable offer is an economic<br />

operator offer satisfying requirements defined in the offer<br />

specification.<br />

Public contract specification is a pair: . An acceptable public contract is a pair<br />

. Requirements defined<br />

in a specification may refer to expected experience of contractor,<br />

financial stability, etc. Social requirements express dependencies<br />

among contractors being public auction outputs. Note that each<br />

acceptable contractor can be a VO. Thus, requirements defined in<br />

contractor specification may refer also to internal structure of such<br />

a VO, e.g., a requirement concerning maximum number of<br />

subcontractors. Social relationships may concern: past<br />

cooperation, recognition, former financial exchange, etc.<br />

4.2 Overview of C-CS Phases<br />

In every stage of contractor selection, the C-CS method consists<br />

of four phases and follows the general selection method<br />

334<br />

guidelines presented in [2]: (1) specification of public auctions<br />

envisioned for contractor selection stage – definition of<br />

requirements and associated evaluation criteria (preferences,<br />

fitness function); this phase is performed within public<br />

administration and its output is published in a form of contract<br />

notices; (2) contractor analysis prior negotiations – the set of<br />

acceptable public contracts is created and analyzed internally<br />

within public administration; the aim of the analysis is to define<br />

the best possible contractor group that the public administration<br />

will strive to achieve; such analysis is used for preparation of a set<br />

of economic operators to be invited to participate in negotiations<br />

or a competitive dialog; (3) contractor analysis during<br />

negotiations – the set of acceptable public contracts is created on<br />

the basis of acceptable offers submitted by candidate contractors<br />

during negotiation or competitive dialog; the aim of the analysis is<br />

to identify the group of best acceptable public contracts or<br />

indicate the shortcoming of the acceptable public contracts being<br />

currently negotiated; (4) stage conclusion – selection of the best<br />

acceptable public contract for each public auction envisioned in<br />

this contract selection stage.<br />

All the phases of the C-CS method are performed in a<br />

collaborative manner. Phase 1 assumes collaboration of public<br />

administration units, employees, domain experts and others.<br />

Phases 2-4 include in addition acceptable contractors.<br />

4.3 Information Model and Selection<br />

Technique<br />

The C-CS method is based on the concept of public administration<br />

being a VOBE [1]. It is assumed that public administration<br />

collects information concerning former public auctions and their<br />

results for future reuse. Collected information may include<br />

properly documented former experience of economic operators or<br />

recommendations from former clients. Such information refers<br />

both to single economic operators as well as relationships among<br />

them. Such information is stored in a repository consisting of four<br />

modules: (1) contractor and offer specification module – provides<br />

relevant information concerning economic operators, their<br />

operations and their offers (offer variants) submitted during past<br />

and current public auctions, (2) social network module – provides<br />

information about relationships among contractors and between<br />

contractors and their offers, (3) requirement module – provides<br />

information concerning requirements used in various public<br />

auctions; (4) participant’s activity module – stores information<br />

concerning activities performed by contractor selection process<br />

participants throughout selection processes.<br />

The C-CS method aims at finding a subset of economic<br />

contractors and offers submitted for an ongoing auction and stored<br />

in the repository that are best suited for activities analyzed during<br />

a given contractor selection stage. The contractor selection is<br />

performed on the basis of specification created in Phase 1. As the<br />

result of the specification phase, the formulated public contract<br />

specifications are published in a form of public notices and a set<br />

of requirements concerning social relationships. Requirements<br />

associated with specifications may be selected from the repository<br />

or created for the need of a particular contractor selection stage.<br />

Definition of requirements for contractor selection includes also<br />

definition of: (1) preferred value; (2) fitness functions. In Phase 2<br />

and Phase 3, contractor analysis is divided into two steps: (1)<br />

acceptable public contract analysis, (2) acceptable public contract<br />

group analysis.


In the acceptable public contract analysis step, on the basis of<br />

public contract specifications defined in Phase 1, a set of<br />

acceptable public contracts is created for each public contract<br />

specification. Identified acceptable public contracts are ranked<br />

according to the level of conformance to corresponding<br />

specification. The conformance is calculated on the basis of<br />

preferences and fitness functions defined in Phase 1. Analysis<br />

performed in this step is followed by effective selection of<br />

promising acceptable public contracts and rejection of those that<br />

should be disregarded. The number of potential acceptable public<br />

contract group that may be constituted for the contractor selection<br />

stage with acceptable public contracts identified in the previous<br />

step is usually high. The goal of acceptable public contract group<br />

analysis step is to search for a sorted list of acceptable public<br />

contract group ranked according to a fitness function. This step<br />

takes advantage of technique proposed as a part of the MAPSS<br />

method [8]. Genetic algorithm is used for generation of optimal<br />

acceptable public contract groups ranked according to a fitness<br />

function. In this phase each contractor selection participant may<br />

define his/her own fitness function. Thus, suggestion concerning<br />

best acceptable public contract groups may be different depending<br />

on a participant. In this phase, social relationships among<br />

acceptable contractors are verified and validated.<br />

In the stage conclusion phase, once all public contract<br />

specifications that are defined for contractor selection stage have<br />

assigned acceptable public contracts, this fact is registered in the<br />

repository. If applicable, this stage encompasses redefinition of<br />

the set of planned upcoming auctions, relationships among them,<br />

their scope and assumptions<br />

4.4 Recommendations During Contractor<br />

Selection<br />

Characteristics of a contractor selection process are such that in<br />

general prediction of its full course is impossible. Nevertheless,<br />

identification of its repeatable parts is useful in context of<br />

boosting efficiency of selection execution and promotion of good<br />

practices among selection process participants, especially those<br />

being representatives of public administration.<br />

Mechanism of recommendation in the C-CS method aims to<br />

detect activity patterns in contractor selection process, where<br />

activity pattern is a set of activities that are frequently performed<br />

in a structured way in a particular context by a contractor<br />

selection participant. Identified activity patterns are later<br />

recommended to other selection participants. Identification of<br />

activity patterns is possible due to information stored in<br />

participant’s activity module of the repository. To identify activity<br />

patterns, the approach presented in [4] is used.<br />

5. CONCLUSIONS<br />

The C-CS method contributes to increased efficiency of the<br />

contractor selection process. It is achieved by computer support<br />

for multi-variant automatic analysis of economic operators and<br />

offers submitted by them. A structured approach is proposed to<br />

definition and reuse of requirements, stored in a repository in a<br />

form of contractor or offer specifications. An important aspect of<br />

the C-CS method is an analysis of relationships among candidate<br />

335<br />

contractors from various ongoing or completed public auctions.<br />

Such analysis eliminates the risk of selection of a set of<br />

contractors unable to mutually collaborate which could lead to<br />

one or more project failures. Identification of activity patterns in<br />

every phase of the C-CS method addresses the problem of process<br />

evolution and unpredictability. Activity patterns allow good<br />

practices to be identified and reused. Recommendations generated<br />

on the basis of activity patterns enable more effective execution of<br />

contractor selections.<br />

6. ACKNOWLEDGMENTS<br />

This work has been partially supported by the Polish National<br />

Science Center. Grant no. DEC-2011/01/N/ST6/04205<br />

7. REFERENCES<br />

[1] Cellary, W., Picard, W., Agile and Pro-Active Public<br />

Administration as a Collaborative Networked Organization,<br />

in: Proceedings of the 4th International Conference on<br />

Theory and Practice of Electronic Governance<br />

ICEGOV2010, October 25-28, 2010, Beijing, China, ACM,<br />

2010<br />

[2] Rabelo, R., Gusmeroli, S., The ECOLEAD Collaborative<br />

Business Infrastructure for Networked Organizations, in:<br />

Camarunha-Matos, L.M, Picard, W. (eds), Pervasive<br />

Collaborative Networks, PRO-VE 2008, Springer, 2008<br />

[3] Janowski, T., Pardo, T. A., Davies, J., Government<br />

Information Networks - Mapping Electronic Governance<br />

cases through Public Administration concepts, in:<br />

Government Information Quarterly, vol. 29, Elsevier, 2012<br />

[4] Paszkiewicz, Z., W. Cellary, Computer Supported<br />

Collaborative Processes in Virtual Organizations , in:<br />

Proceedings of the 20th Annual World Business Congress,<br />

Poznań, Poland, pp. 85-94, IMDA Press, 2011,<br />

[5] Directives 2004/17/EC and 2004/18/EC of the European<br />

Parliament and of the Council of 31 March 2004<br />

coordinating the procurement procedures of entities<br />

operating in the water, energy, transport and postal services<br />

sectors<br />

[6] Ermilova E., H. Afsarmanesh: Competency and Profiling<br />

Management in Virtual Organization Breeding<br />

Environments. in: Camarinha-Matos, L.M., Afsarmanesh, H.<br />

Ollus, M. (eds.) Network-Centric Collaboration and<br />

Supporting Frameworks, pp. 131-142. Springer, 2007<br />

[7] Canfora, G., Di Penta, M., Esposito, R., Villani, M.L., An<br />

approach for QoS-aware service composition based on<br />

genetic algorithms, in: Proceedings of the 2005 conference<br />

on Genetic and evolutionary computation, pp. 1069-1075,<br />

2005<br />

[8] Paszkiewicz, Z., Picard, W. MAPSS, a multi-aspect partner<br />

and service selection method. in: L.M., Camarinha-Matos, X.<br />

Boucher, H. Afsarmanesh (Eds.), Collaborative networks for<br />

a sustainable world, 11th IFIP working conference on virtual<br />

enterprises, PRO-VE 2010 Boston, USA: Springer, 2010.


E-Government Success Factors in the Context of an ITenabled<br />

Budget Reform: A Questionnaire Report<br />

ABSTRACT<br />

The adoption of e-government initiatives is not in vacuum. They<br />

are usually adopted in complex settings influenced by not only IT<br />

factors but other factors from different structures, such as<br />

contextual, organizational, collaboration, knowledge, and trust.<br />

These structures come from the context in which the egovernment<br />

project is embedded. The goal of this research is to<br />

explore the multiple factors from various structures involved in egovernment<br />

success using a contemporary case of an IT-enabled<br />

budget reform in Mexico. This study comprises a descriptive<br />

summary of answers from a questionnaire applied over federal<br />

and state government officials who participated in this initiative<br />

who adopted it into their daily practice. Due to the context of the<br />

IT-enabled budget reform, questions about the factors from<br />

different structures including the budgeting structure were<br />

analyzed. General characteristics and potential benefits of the egovernment<br />

initiative were also examined. The main motivation<br />

of this study is to extend our understanding of possible enablers<br />

and inhibitors that public officials face during the adoption of egovernment<br />

projects into work routines and different contexts.<br />

Derived from the questionnaire results, a selection of 11 “practical<br />

advices” were identified as useful for a successful adoption of egovernment<br />

projects.<br />

Categories and Subject Descriptors<br />

J.1 ADMINISTRATIVE DATA PROCESSING [Computer<br />

Applications]: Government – applications, government.<br />

General Terms<br />

Management, Human Factors, Theory.<br />

Keywords<br />

Electronic Government; Success Factors; Questionnaire.<br />

1. INTRODUCTION<br />

Most of e-government projects involve a complexity of the<br />

multiple factors and actors involved in practice [18,19,24,34,38].<br />

In the literature, there are many frameworks that attempt to<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Gabriel Puron-Cid<br />

Centro de Investigacion y Docencia<br />

Economicas (CIDE)<br />

gabriel.puron@cide.edu<br />

336<br />

integrate these multiple factors and actors involved in the<br />

implementation of e-government initiatives [18,19,34]. These<br />

efforts have contributed to our understanding of e-government<br />

mechanisms of success and failure, but neglect other interacting<br />

structures and actors involved in the phenomenon [18,19,24,34].<br />

Depending on the type of e-government, other relevant structures<br />

and factors need to be considered in practice and consequently in<br />

theory [8,18,19,34]. For this paper, structures are analytical<br />

dimensions considered in interaction in the adoption of egovernment,<br />

while factors are particular features of this<br />

interaction. This study accounts for the multiple success structures<br />

and factors, not only from information systems, but from other<br />

disciplinary fields and policy domains that are involved in the<br />

adoption of e-government [18,19,34].<br />

One of the most critical applications of e-government is present in<br />

the field of budgeting [34]. Because of the intensive informational<br />

content and technological use in the budget process, information<br />

systems have become central to budgeting operations in<br />

government, and vice versa [27,28]. As Joyce, Lee, & Johnson<br />

[26: 397] noted “Contemporary approaches to budgeting and<br />

accounting obviously require considerable amounts of information<br />

for decision making and evaluation. Information Systems, then,<br />

constitute an effort to bring about greater coordination of [diverse]<br />

organizational units in the collection, storage, manipulations,<br />

retrieval, and analysis of information.” This paper examines the<br />

multiple factors of e-government success by using an IT-enabled<br />

budget reform in Mexico as a contemporary e-government case in<br />

the field of budgeting. This case not only helps to understand the<br />

traditional structures from information systems and actors such IT<br />

staff members involved in e-government initiatives, but also it<br />

considers other critical structures and actors interacting as well<br />

from other fields and staff areas (i.e. budgeting, planning,<br />

management, evaluation, auditing, etc.). Since late 1980s,<br />

Mexican government has reformed its budget system involving<br />

the adoption of various information systems and managerial<br />

techniques across time. The last of these reforms, known as PbR-<br />

SED for its Spanish abbreviation of “Budgeting based on Results-<br />

Performance Evaluation System”, was recently designed and<br />

enacted in 2008 and its purpose is to transform the way agencies<br />

spend public resources based on results and cost savings, new<br />

information systems, and novel budgetary techniques. The PbR-<br />

SED represents an ongoing and complex transformation and is<br />

expected to condense multiple factors and actors from different<br />

organizations.<br />

This exploratory study comprises a descriptive summary of the<br />

answers of the questionnaire over the PbR-SED adoption. The<br />

questionnaire was applied over federal and state government<br />

officials who participated in the initiative. With a response rate of


14.9% (221 respondents), the goal of the questionnaire was to<br />

evaluate a variety of structures and factors deemed as influential<br />

for a successful adoption of the PbR-SED from the perspective of<br />

the public officials who adopt it. The structures revised were:<br />

general characteristics of the initiative, benefits of the initiative,<br />

contextual factors, budgetary and information systems factors,<br />

collaboration factors, and knowledge and trust factors. The main<br />

motivation of this study is to derive useful evidence for extending<br />

our understanding about possible obstacles and enablers of egovernment.<br />

The purpose is that e-government community of<br />

practitioners and scholars use these findings for advising a<br />

successful adoption of e-government into working routines and<br />

particular contexts. Derived from the analysis of the questionnaire<br />

results, a selection of 11 “practical advices” were identified as<br />

useful for a successful adoption of e-government. The structure of<br />

the paper is organized in six sections including these introductory<br />

remarks. The second reviews the literature about the multiple<br />

factors involved in e-government adoption. The third section<br />

details research design and methods. The fourth section discusses<br />

results of the questionnaire in seven subsections: 1) general<br />

characteristics of the initiative, 2) benefits of the initiative, 3)<br />

contextual factors 4) budgetary and information systems factors,<br />

5) collaboration factors, 6) knowledge factors, and 7) trust factors.<br />

The fifth section discusses 11 "practical advices" resulting from<br />

the analysis of the questionnaire which we believe are useful for a<br />

successful adoption of the e-government. The sixth section makes<br />

some concluding remarks.<br />

2. LITERATURE REVIEW<br />

The literature of the fields of information systems and budgeting<br />

was reviewed by considering that e-government initiatives for<br />

budget reforms engage in practice more than just information<br />

systems and technology components [6,14,23,29,34]. The review<br />

was not exhaustive, but sufficient for the purpose of exploration<br />

of the multiple factors and structures involved in e-government<br />

success. There are multiple disciplinary and paradigmatic<br />

inquiries to understand the compound effects of different<br />

structures and factors involved in the adoption of e-government<br />

initiatives [8,14,18,19,34,40]. This article classifies them in two<br />

categories: benefits of e-government and factors influencing egovernment<br />

success.<br />

In terms of benefits, the literature shares 8 potential benefits:<br />

increase efficiency and cost reduction [17,18,34]; improve public<br />

services [11,19,34]; strengthen accountability [15,34,35]; increase<br />

communication based on performance information [22,34];<br />

improve collaboration between different staffs [3,34]; improve<br />

collaboration between different organizations [3,9,16,34]; and<br />

increase knowledge sharing [31,34].<br />

In the case of factors, the literature can be classified into 5 groups:<br />

contextual, information systems, collaboration, knowledge, and<br />

trust. Because of the particular context of budgeting in which the<br />

e-government initiative is implemented, the literature of budgeting<br />

was revised and budgetary factors were included. Different<br />

authors have identified the role of contextual factors in egovernment<br />

success [5,8,30,34,40]. In particular, it is<br />

acknowledged the relevance of economic, social, political,<br />

institutional, and organizational contexts for e-government<br />

success [14,19,30,34,40]. Economic factors represent the<br />

pressures for resource allocation on IT-related projects [14,19,34].<br />

Social factors involve social challenges influencing e-government<br />

337<br />

adoption such as: security concerns, rapid technological change,<br />

reforms and other social demands [30,34]. Political factors include<br />

political support from top officials, legislators and policy makers<br />

[30,32,34]. Institutional factors refer to the legal framework in<br />

which e-government is embedded [8,14,19,34]. Organizational<br />

factors involve four dimensions: strategic alignment between egovernment<br />

and organization’s mission [6,14,34]; level of<br />

standard setting of government processes and activities [30,34];<br />

level of centralization [5,11,34]; and size and number of<br />

jurisdictions in terms of diversity of users or organizations<br />

involved in the project [8,11,34].<br />

Budget factors include four dimensions: methodology, strategy of<br />

implementation, and procedures. Methodology factors involve the<br />

information format, content and methods for budgeting and<br />

accounting [27,34,39]. Strategy of implementation factors are the<br />

intentions of designers of the reform [12,34,37] and the proposed<br />

direction of this change—top-down or bottom-up- [34,39].<br />

Procedures factors include the roles of budgetary authorities and<br />

their scope of action in the budget process [25,34,37,39].<br />

Information systems factors involve three dimensions of factors<br />

influencing e-government success: characteristics of official<br />

information systems [30,34]; interoperability issues from<br />

participant organizations [34,36]; and data integration as<br />

challenges of information sharing [2,10,34].\<br />

Collaboration factors occupy four structures: authority, leadership,<br />

governance, and resource sharing. Authority factors include the<br />

formal designation of responsible(s) of the project and the<br />

development of effective policies and technical standards<br />

[32,34,37]. Leadership factors consider support mechanisms to a<br />

leader or team as well as guided actions through policies and other<br />

boundary objects [32,34,41]. Governance factors are indicated the<br />

procedures and mechanisms for making and monitoring decisions<br />

regarding e-government such as selection of teams or networks,<br />

and other mechanisms of interaction between participants<br />

[1,33,34]. Resource sharing factors engage the potential inputs<br />

required for coordination and adoption of e-government in<br />

organizations such as financial, staff, technical infrastructure and<br />

training [27,34].<br />

Knowledge factors consider five dimensions: professional<br />

experience, teamwork experience, information systems<br />

knowledge, and budgetary knowledge. Professional experience<br />

considers specific task knowledge and expertise to conduct the job<br />

including professional background, job and operation experience,<br />

and training [11,34]. Teamwork experience implies abilities<br />

learned to work in team such knowledge sharing and previous<br />

experiences working in team [7,34]. Information systems<br />

knowledge suggests the technical expertise required to understand<br />

technology in use, data bases, and other information structures<br />

[31,34]. Budgetary knowledge represents the particular use of<br />

information from the budgetary field [27,34].<br />

Trust factors entail four dimensions: confidence based on<br />

budgetary knowledge; confidence based on information systems<br />

knowledge; clear roles and responsibilities; and motivation.<br />

Building confidence based on knowledge, in this case in the fields<br />

of budgeting and information systems, has been identified in the<br />

literature as crucial [27,30,34]. Clarifying roles and<br />

responsibilities has been also detected as influencial for building<br />

trust among participants in the initiative [13,30,34]. Finally,


creating different incentives and public recognition has also been<br />

influential to e-government success [21,34,37].<br />

3. RESEARCH DESIGN AND METHODS<br />

This research applied a questionnaire to civil servants from<br />

various ministries and government agencies of the federal and<br />

state governments. The data of participants were collected from<br />

the lists of staff who participated in the official training of the<br />

PbR-SED initiative during 2009 and 2010 and contact information<br />

of high officials at the federal and state governments available<br />

online. 2.048 potential participants were first invited to participate<br />

during the month of June 2011. 566 emails were not valid or<br />

rejected by security measures from their organizations’ email<br />

administrators. Only 1,482 emails were sent back and valid. Only<br />

221 questionnaires were completed with a response rate of 14.9%<br />

in general. This rate is considered normal for research via<br />

electronic or online [4]. However, there are sections of the<br />

questionnaire that reported lower rates of response (in particular<br />

the last sections of the questionnaire). The questionnaire was<br />

designed and developed using an electronic tool called<br />

SurveyMonkey. The tool offers a platform that makes the<br />

questionnaire available online for participants. The questionnaire<br />

contains seven sections of questions (see Table 1). The first<br />

section welcomes and provides information about the study. The<br />

second section includes 12 questions of multiple choice about the<br />

general characteristics of the project (it considers an option for<br />

"others" in several questions). The third to the sixth sections, the<br />

questionnaire includes 105 questions using a 7-point Likert scale<br />

(from “totally agree” to “totally disagree” options), asking<br />

“Was… [factor]… influential for PbR-SED success?” or<br />

“Was…[benefit]…derived from the successful adoption of the<br />

PbR-SED?”.<br />

Only 54 questions are reported in this study in blocks of factors (8<br />

for benefits, 12 for contextual, 5 for budgetary, 5 for information<br />

systems, 9 for collaboration, 9 for knowledge, and 6 for trust).<br />

The last section of the questionnaire contains 8 questions about<br />

demographic aspects of respondents (see Table 1 for each<br />

dimension and type of factor). The results are presented in<br />

percents of two modalities of response: agreement and<br />

disagreement. The percent of respondents “agree” coded the<br />

opinions under the categories of "somehow agree", "agree" and<br />

"totally agree". The percent of respondents “disagree” coded the<br />

opinions under the categories from “neutral” to “totally disagree”.<br />

The average, standard deviation, and level of agreement of each of<br />

the 54 questions are reported.<br />

The questionnaire registered the opinion of public officials at<br />

different levels of responsibility in the areas of budget,<br />

management programs, information systems, and other areas. On<br />

average, respondents reported 16.4 years of job experience in<br />

government and 6.5 years of experience in actual position. The<br />

most common levels of education were undergraduate and<br />

graduate level mainly in the fields of accounting, economics,<br />

management, information systems, law and various engineering<br />

fields. The average age of respondents was 45 (with a minimum<br />

of 25 years and a maximum of 69 years). Gender of respondents<br />

was reported as 33.6% women and 66.4% men.<br />

Questions<br />

Table 1. Factors and Questions<br />

338<br />

Benefits<br />

1. Increase efficiency<br />

2. Cost reduction<br />

3. Improve public services<br />

4. Strengthen accountability<br />

5. Increase communication based on performance information<br />

6. Improve collaboration between different staffs<br />

7. Improve collaboration between your organization and others<br />

8. Increase knowledge sharing<br />

Contextual Factors<br />

1. Influence of present economic situation [Economic]<br />

2. New law, crisis or elections [Social]<br />

3. Social demand [Political]<br />

4. Support of top officials in your organization [Political]<br />

5. Support of congress people [Political]<br />

6. Budgetary norms and regulations [Institutional]<br />

7. Public investment norms and regulations [Institutional]<br />

8. Civil service norms and regulations [Institutional]<br />

9. Strategic planning in your organization [Organizational]<br />

10. Standards for processes and tasks in your organization [Organizational]<br />

11. Level of decentralization of decision making in your organization [Organizational]<br />

12. Size and number of jurisdictions in your organization [Organizational]<br />

Budget Factors<br />

1. Budgetary methodology for performance information<br />

2. Top-bottom strategy of implementation from the ministry of finance<br />

3. Strategy of implementation from the ministry of finance<br />

4. Flow for enter, revise, and authorize performance information in the budgetary process<br />

5. Official calendar of activities in the budgetary process<br />

Information Systems Factors<br />

1. Development and use of proprietary systems in your organization<br />

2. Previous experience developing information systems and data bases in your organization<br />

3. Official information system of the ministry of finance<br />

4. Definition of roles and accesses in the official information system<br />

5. Sharing data bases, catalogues, and tables with others<br />

Collaboration Factors<br />

1. Use of memos, internal norms and manuals to set rules in the initiative [Authority]<br />

2. Official designation of a responsible of the initiative in the organization [Authority]<br />

3. Use of official memos, internal norms and manuals to support the leader or team members<br />

responsible of the initiative [Leadership]<br />

4. Leadership of the person in charge or team members responsible of the initiative<br />

[Leadership]<br />

5. Designation of a multi-disciplinary team in the organization as responsible of the initiative<br />

[Governance]<br />

6. Meetings and its documents such as minutes, plans and other material [Governance]<br />

7. Staff assigned in the initiative [Resources]<br />

8. Technical infrastructure assigned in the initiative [Resources]<br />

9. Resources for training [Resources]<br />

Knowledge Factors<br />

1. Professional background [Professional Experience]<br />

2. Job experience [Professional Experience]<br />

3. Management operation experience [Professional Experience]<br />

4. Previous reform experience [Professional Experience]<br />

5. Knowledge sharing with members from different areas [Teamwork]<br />

6. Previous experience working with members from different areas [Teamwork]<br />

7. Budget management experience [Budgetary Knowledge]<br />

8. IS and technology use and experience [IS Knowledge]<br />

9. Official training [Training]<br />

Trust Factors<br />

1. Level of budgetary knowledge created confidence to work in the initiative [Confidence<br />

based on budgetary knowledge]<br />

2. Level of IS and technology created confidence to work in the initiative [Confidence based<br />

on IS knowledge]<br />

3. My role and responsibility in the initiative were clear [Clear roles and responsibilities]<br />

4. The role and responsibilities of other organizations and participants were clear to me [Clear<br />

roles and responsibilities]<br />

5. Attractive incentives to participate in the initiative [Motivation]<br />

6. My effort collaborating in the initiative was publicly recognized [Motivation]<br />

* Note: A 7-points Likert scale was used from “totally agree” to “totally disagree”.<br />

4. ANALYSIS OF RESULTS<br />

4.1 General Characteristics<br />

This section of the survey includes the opinion of respondents<br />

about the following features of the PbR-SED initiative: goals, type<br />

of staffs collaborating, organizations involved, roles and<br />

responsibilities, schemes of governance, and type of resources<br />

assigned to the initiative.


4.1.1 Goals for the e-government initiative. The results of the<br />

questionnaire show that establishing multiple goals for the<br />

initiative creates confusion. Few but well-defined and clear set of<br />

objectives generates certainty and perspective about the adoption<br />

of the initiative in the organization. Figure 1 presents an opinion<br />

from respondents over the perceived goals of the PbR-SED<br />

initiative. Only 35.2% of respondents believed that the main<br />

purpose of the PbR-SED is to develop administrative capacity.<br />

32.8% of respondents believe that the goal of the initiative is to<br />

comply with a legal mandate from the Executive or the ministry<br />

of finance. Only 21.9% of participants agree that the goal of the<br />

PbR-SED is to provide a specific solution for a problem in<br />

government through the use and analysis of performance<br />

information. Approximately 10% of opinions present "other"<br />

goals such as improving the planning, assessment, and budgeting<br />

operations of public spending. The lesson is that the establishment<br />

of multiple objectives for e-government creates confusion among<br />

the participants on the terms, scope and purpose of the initiative in<br />

their organization.<br />

Figure 1. Goals of the initiative (210 responses)<br />

4.1.2 Inter-disciplinary collaboration. Results from the<br />

questionnaire show the presence of collaboration between actors<br />

from different staffs than just information technology. Figure 2<br />

shows that the 22.4% of respondents involved in the adoption of<br />

the PbR-SED belong to budget staffs. However, the vast majority<br />

of participants come from different professional areas or staffs<br />

such as: planning (27.4%), management of public programs<br />

(18.4%), information systems (13.87%), and internal controls and<br />

audits (8.4%). The results of the questionnaire also identify staff<br />

from "other" areas such as evaluation, public investment, public<br />

works management, and other administrative officers. These<br />

results present evidence of the importance of the inter-disciplinary<br />

nature of collaboration among the different staffs involved in the<br />

adoption of the PbR-SED.<br />

This interdisciplinary collaboration also varies along the process<br />

of adoption. Table 2 shows different types of staffs collaborating<br />

across the stages of adoption of the e-government initiative. For<br />

example, staff members of planning areas have a very active role<br />

in all stages of adoption, followed by project leaders and budget &<br />

finance staff members. Members from information systems and<br />

management of programs staffs engage more actively at the stages<br />

of project planning, project design, development of information<br />

systems, and implementation. The results also identified members<br />

from "other" staffs, such as training, evaluation, internal controls,<br />

339<br />

and monitoring. On average, participants of the PbR-SED<br />

initiative spent 34.4% of their weekly time for the adoption of the<br />

PbR-SED. This is an important finding due to the need of<br />

recognition that initiatives like the PbR-SED consume<br />

considerable amounts of time and effort during the different<br />

phases of the project.<br />

Figure 2. Staffs involved in the initiative (206 responses)<br />

Table 2. Number of participants by type of staff and stage of<br />

adoption (204 responses)<br />

4.1.3 Inter-organizational collaboration. The literature has<br />

been predominantly aimed at studying the role of the legislative<br />

branch members and the executive office in e-government success<br />

[18,19,34,39,40]. Figure 3 shows that the first level of<br />

collaboration was given at the interior of the organizations rather<br />

than at the exterior. The first manifestation of collaboration of the<br />

PbR-SED initiative occurs across different staffs within the<br />

organization (inter-disciplinary collaboration). The second layer<br />

of collaboration happens between various organizations from<br />

federal, state or local levels of government (inter-organizational<br />

collaboration). After the internal level of collaboration, the<br />

collaboration between organizations and control agencies was<br />

critical. Our respondents also identified other levels of<br />

collaboration with different levels of government, private<br />

organizations, and international organizations such as the World<br />

Bank, the Inter-American Development Bank (IDB), the<br />

Economic Commission for Latin America (ECLAC), the Latin


American and the Caribbean Institute of Economic and Social<br />

Planning (ILPES). Collaboration with universities was also<br />

reported such as the Autonomous University of Mexico (UNAM)<br />

and the Center for Economic Research and Teaching (CIDE). In<br />

“others” option, respondents considered coordination with certain<br />

agencies specialized in particular policy domains in Mexico like<br />

the National Council of Evaluation for Social Policy<br />

(CONEVAL), the National Commission of Housing (CONAVIS),<br />

the Mexican Youth Institute (IMJUVE), the National Institute of<br />

Women Affairs (INMUJERES), the National Commission on<br />

Human Rights, the Federal Electoral Institute (IFE), and the<br />

Superior Audit Organization. The results of the questionnaire<br />

made evident that inter-organizational collaboration is multilevel<br />

involving different organizations with different missions,<br />

functions and responsibilities.<br />

Figure 3. Types of inter-organizational collaboration in the<br />

initiative (210 responses)<br />

4.1.4 Governance scheme. The literature points out the<br />

predominance of the ministry of finance and other control<br />

agencies in the process of adoption of reforms. This represents a<br />

strong disincentive for implementer agencies to get involved in<br />

the process of adoption of the initiative [34]. Figure 4 provides an<br />

overview of the predominance of federal government in the<br />

governance scheme of the initiative progress. The oversight of<br />

control agencies in the federal government like SHCP, SFP and<br />

CONEVAL is stronger for the adoption of the initiative. However,<br />

there are instances of governance involving state and local levels<br />

of governments and very few cases from other organizations like<br />

the World Bank and the IDB. Puron-Cid [34] suggests that<br />

participatory governance involving organizations other than just<br />

control agencies may enrich the process of adoption and may<br />

ensure more innovation of the project in the organization.<br />

4.1.5 Strategies of resources supporting the initiative.<br />

Governance schemes are predominantly supervised by the federal<br />

government. Strategies of assigning resources to support the<br />

adoption of the initiative primarily come from the federal<br />

government as well. This type of “centralized” support of<br />

resources by control agencies at the federal level has advantages<br />

and disadvantages. The great advantage of this strategy is that<br />

offers a general framework for adoption across organizations<br />

based on incentives and resources. However, this scheme also<br />

suggests a lack of involvement by implementers due to the<br />

imposed structures for adoption, and their low investment and<br />

involvement in the project. Standard models of support may not<br />

340<br />

correspond to the needs of operation of implementer agencies.<br />

The questionnaire identifies five types of resources and source of<br />

support for the adoption of the PbR-SED initiative (see Figure 5):<br />

financial, training, information technology, ICT knowledge and<br />

staff, and experts and consultants.<br />

Figure 4. Types of organizations supervising the initiative (205<br />

responses)<br />

Figure 5. Types of support for the initiative (193 responses)<br />

On average, federal government assists on average 73% of these<br />

supports. In the same way, state governments operate on average<br />

17% of this aid and international organizations such as the World<br />

Bank and the IDB orchestrated on average 24% of this help. It is<br />

important to note that municipal governments presented almost no<br />

participation in these support strategies. Future research should<br />

corroborate if this pattern of support strategy corresponds to a<br />

shortage of resources, a lack of involvement, or a failure in the<br />

centralized design of the project at the federal level.<br />

4.2 Benefits<br />

Table 3 lists the results for the category of benefits of the adopted<br />

e-government initiative. The benefit with higher level of<br />

agreement is knowledge sharing. Respondents agreed that the<br />

PbR-SED helped members from different staffs to share expertise,<br />

knowledge and information across different areas like program


management, budget, and information systems (82.7%). The<br />

second largest benefit perceived by respondents was improving<br />

inter-disciplinary collaboration. Respondents consider that the<br />

PbR-SED makes more effective working relationships between<br />

different internal areas and staffs in the organization such as<br />

planning, budget, program management, and information systems<br />

(78.2%). With regards to the increase in communication,<br />

respondents felt that the PbR-SED generated performance<br />

information useful for decision-making of public programs<br />

(70.4%). Respondents consider more strengthened accountability<br />

between different staffs and areas within the organization as a<br />

benefit as well (69.8%). For the benefit of improving public<br />

services, respondents felt that the PbR-SED gave them rise to a<br />

better delivery of public services based on performance (66.5%).<br />

In terms of improving inter-organizational collaboration, a 64.2%<br />

of respondents consider that the PbR-SED resulted in a better<br />

collaboration between their organizations and other agencies and<br />

ministries. About the benefit of increasing efficiency, respondents<br />

perceived that the PbR-SED improves the organizations efficiency<br />

(60.9%). In contrast to the benefit of cost reduction, respondents<br />

have a divided opinion over whether the PbR-SED really saves or<br />

reduces costs (50.8%).<br />

Table 3. Benefits of e-government (179 responses)<br />

* Note: A 7-points Likert scale was used from “totally agree” to “totally disagree”.<br />

For the % agree, only the categories of "somehow agree", "agree" and "totally agree"<br />

were considered.<br />

These results present areas of improvement. On one hand, the<br />

adoption of PbR-SED has resulted in: better collaboration across<br />

different members within the organization (inter-disciplinary<br />

collaboration); a critical tool to enhance accountability within the<br />

organization; and an instrument to share knowledge and<br />

information among different areas of expertise like program<br />

management, budgeting, and information systems. However, there<br />

are some divided opinions if the PbR-SED has really improved<br />

efficiency in the organization, reduced costs, improved public<br />

services, and enhanced inter-organizational collaboration between<br />

different agencies and organizations involved in the initiative<br />

(inter-organizational collaboration).<br />

4.3 Contextual Factors<br />

Table 4 lists the results for each contextual factor. The contextual<br />

factors more influential in the adoption of the PbR-SED are the<br />

support of top officials (75.6%) and the usefulness of the strategic<br />

planning (75.0%). The first is political and the second is<br />

organizational. Other contextual factors were less influential but<br />

significant such as budgetary norms and regulations (75.0%),<br />

341<br />

level of standardization of processes and tasks (67.4%), level of<br />

centralization (64.5%), and size and number of jurisdiction<br />

(59.9%). The economic factor, social factors and the political<br />

factor of support of congress people present divided opinions<br />

about their influence on the success of the PbR-SED. In sum, the<br />

political factor of top officials support, the institutional factor of<br />

budgetary norms and regulations, and all organizational factors<br />

were considered influential.<br />

Table 4. Contextual factors of e-government (172 responses)<br />

* Note: A 7-points Likert scale was used from “totally agree” to “totally disagree”.<br />

For the % agree, only the categories of "somehow agree", "agree" and "totally agree"<br />

were considered.<br />

4.4 Budget & Information Systems Factors<br />

Table 5 lists the results for the budget and information systems<br />

factors. Three budget factors were considered influential by<br />

respondents: budgetary methodology for performance information<br />

(80.2%), top-bottom strategy of implementation (68.5%), and<br />

strategies of implementation of the ministry of finance (63.6%).<br />

Information systems factors presented lower levels of agreement<br />

about their influence on the adoption of the PbR-SED, but two<br />

factors figured among this battery of questions: development and<br />

use of proprietary information systems in implementer<br />

organizations (60.0%), and definition of roles and accesses in the<br />

official information system (59.9%). There were divided opinions<br />

for two budget factors: the influence of flow of performance<br />

information (54.3%) and official calendar (44.4%). Similarly,<br />

divided opinion was also present for some information systems<br />

factors such as: the official information system (57.4%), previous<br />

experience developing information systems and data bases in the<br />

organization (57.4%), and sharing data bases, catalogues, and<br />

tables (46.3%). In general, budget factors reached higher levels of<br />

agreement than information systems factors.<br />

Table 5. Budget & Information Systems factors of egovernment<br />

(162 responses)


* Note: A 7-points Likert scale was used from “totally agree” to “totally disagree”.<br />

For the % agree, only the categories of "somehow agree", "agree" and "totally agree"<br />

were considered.<br />

4.5 Collaboration Factors<br />

Most of collaboration factors were perceived by respondents as<br />

critical for adoption of the PbR-SED (see Table 6). For authority,<br />

the use of memos, norms and manuals to set rules (74.4%) and the<br />

official designation of a responsible of the initiative in the<br />

organization (69.9%) were considered important. In terms of<br />

leadership, similar use of memos, norms and manuals to support<br />

the people leading the project (76.9%) and the work of the<br />

leader(s) or team in charge of the initiative (67.9%) were<br />

considered influential. Governance presents contrasting results,<br />

while the designation of a multidisciplinary team to coordinate the<br />

initiative presents a considerable level of agreement (69.9%),<br />

mechanisms of governance such as meetings and its boundary<br />

objects such as minutes, plans and other material had lower<br />

percent of agreement (58.3%). Finally, the use of human resources<br />

presented higher level of agreement (64.7%) than the resources<br />

assigned to technical infrastructure (55.8%) and official training<br />

(50.0%). In sum, the role of authority, leadership and certain<br />

aspect of governance were evaluated by respondents as influential<br />

for a successful adoption of the PbR-SED initiative.<br />

Table 6. Collaboration factors of e-government (156<br />

responses)<br />

342<br />

* Note: A 7-points Likert scale was used from “totally agree” to “totally disagree”.<br />

For the % agree, only the categories of "somehow agree", "agree" and "totally agree"<br />

were considered.<br />

4.6 Knowledge Factors<br />

All knowledge factors obtained the highest levels of agreement<br />

across all factors in this study (see Table 7). In particular,<br />

professional experience showed to be highly critical for a<br />

successful adoption of the PbR-SED. Except for previous reforms<br />

experience (71.1%), professional background, job experience, and<br />

management operation experience presented higher levels of<br />

agreement more than 80%. In terms of teamwork, knowledge<br />

sharing across members from different staff areas presented<br />

84.9% level of agreement while previous experience working with<br />

members from other areas obtained 73.7%. These results suggest<br />

that previous experience is critical, but not as much as<br />

professional experience of individuals. Budget management,<br />

information systems experience and technology use also present<br />

important effects on the adoption of the PbR-SED with 75% of<br />

agreement across respondents. These findings are aligned with the<br />

idea that professional experience of participants in the initiative<br />

may be enriched or complemented by disciplines’ knowledge.<br />

Finally, the lowest level of agreement in this battery of questions<br />

for knowledge factors is the official training with 70.4% level of<br />

agreement. This evidence suggests that official mechanisms of<br />

increasing knowledge and experience prescribed by reformers<br />

“centrally” are not adequate for the particular needs and<br />

operations of implementer agencies.<br />

Table 7. Knowledge factors of e-government (152 responses)


* Note: A 7-points Likert scale was used from “totally agree” to “totally disagree”.<br />

For the % agree, only the categories of "somehow agree", "agree" and "totally agree"<br />

were considered.<br />

4.7 Trust Factors<br />

Most of trust factors obtained high levels of agreement about their<br />

influential effects such as (see Table 8): confidence based on<br />

budgetary knowledge (71.7%), confidence based on information<br />

systems knowledge and technology use (71.1%), and clear roles<br />

and responsibilities (78.3% and 69.1%). Only motivation factors<br />

presented low levels of agreement: incentives (39.5%) and public<br />

recognition (37.5%). Building trust is an important enabler for egovernment<br />

success not only by establishing clear roles and<br />

responsibilities, but by enhancing knowledge and expertise of<br />

participants across multiple disciplines (not just IT).<br />

Table 8. Trust factors of e-government (152 responses)<br />

* Note: A 7-points Likert scale was used from “totally agree” to “totally disagree”.<br />

For the % agree, only the categories of "somehow agree", "agree" and "totally agree"<br />

were considered.<br />

5. PRACTICAL ADVISES<br />

These results from the questionnaire allow us to derive 11<br />

“practical advices” for a successful adoption of e-government.<br />

There are five advises taken from the general characteristics<br />

section: (1) Avoid multiple goals for the e-government initiative;<br />

(2) establish inter-disciplinary mechanisms of collaboration<br />

343<br />

among participants from different staffs at the interior of the<br />

organization as first level of coordination of the e-government<br />

initiative; (3) establish inter-organizational mechanisms of<br />

collaboration among participants from different organizations as a<br />

second level of coordination of the e-government initiative; (4)<br />

define better and more complete governance schemes for the<br />

organization by creating channels of participation between key<br />

organizations, not just the traditional reformer agencies; in order<br />

to (5) establish strategies of support of the initiative by sharing<br />

financial, human, technological, training and knowledge<br />

resources. Results from the benefits section suggest that (6)<br />

specifying a clear set of goals and activities helps to direct action<br />

towards achievable plans. For agencies, it was easier to improve<br />

by having a clear set of goals and performance indicators for<br />

improving a particular public service than goals set in general<br />

terms. With the complex goals of the PbR-SED, respondents were<br />

only able to improve knowledge sharing and interdisciplinary<br />

collaboration, but efficiency, cost reduction, and public services.<br />

From the contextual section, (7) the lesson is to consider in<br />

advance potential economic, social, political, institutional, and<br />

organizational risks that may influence the adoption of the<br />

initiative. It was found that economic, social and political factors<br />

cannot be forecasted, but general trends can be detected and<br />

prevented for a better adoption of the initiative. Institutional and<br />

organizational factors may enable or inhibit internal strengths for<br />

e-government success. An analysis of contextual factors provides<br />

a useful map for where the initiative is standing. For budgetary<br />

and information systems’ components, it is critical to consider that<br />

(8) both work together not in isolation. Depending of the context<br />

and necessary fields of expertise required in the project, egovernment<br />

initiatives need to acquire relevant disciplinary<br />

knowledge and experience across participants for a successful<br />

adoption. For collaboration, (9) implementers should preview the<br />

multiple levels of collaboration. It is necessary to exercise clear<br />

mechanisms of collaboration such as authority, leadership,<br />

governance and different types of resources to support potential<br />

interdisciplinary and inter-organizational collaborations during the<br />

adoption of the initiative. In terms of knowledge, (10) reformers<br />

need to provide official training in different disciplines (not just<br />

budgeting) as an incubating step in the process of adoption. It is<br />

critical to pay attention of the professional experience, teamwork<br />

experience, and different disciplinary and areas of knowledge and<br />

expertise of participants, project leaders, members of teams, and<br />

people involved in the e-government initiative. Finally for trust,<br />

(11) there are motivational schemes that build confidence among<br />

participants and motivate participation and collaboration. This<br />

study found influential to build confidence the following<br />

mechanisms: promoting knowledge and expertise on the different<br />

areas or disciplines; setting clear roles and responsibilities; giving<br />

monetary and non-monetary incentives like public recognition.<br />

The lack of these trust builders may act as inhibitors of egovernment<br />

adoption.<br />

6. CONCLUSIONS<br />

This research provides evidence of the multiple structures and<br />

factors involve in e-government adoption. The results also suggest<br />

the multi-dimensional nature of the structures involved in egovernment<br />

success. It is not the intention to suggest that “all<br />

matters”, but to provide a conceptual map for evaluation that<br />

serves to diagnose what components of the initiative require the<br />

attention of both, reformers and implementers, for a successful<br />

process of adoption. The questionnaire as research instrument


showed to be useful, for collecting data from respondents from<br />

their natural settings. Using an online technique to collect<br />

responses was limited, but useful to collect the data across<br />

participants of the PbR-SED dispersed in the territory. This<br />

allowed less expensive and more control process of data<br />

collection. Particular attention of the phrasing of questions needs<br />

to be considered carefully for this type of research method. In<br />

particular, the section of questions valuated by using the 7-point<br />

Likert scale proved to be very useful for capturing the opinion of<br />

respondents. The dispersion of responses shows that the scale<br />

goes from high levels of agreement to low levels of agreement<br />

(disagreement). This dispersion was useful to scale the opinions<br />

about factors influence going from enabling or positive impact to<br />

inhibiting or negative impact over a successful adoption of the<br />

PbR-SED. In other words, the results show that there is a set of<br />

powerful enablers and inhibitors during the adoption of the PbR-<br />

SED initiative. For enablers (equal or higher than 5.0 on average),<br />

this study found some particular political, organizational, and<br />

budgetary factors, but among all collaboration, knowledge and<br />

trust factors obtained the highest levels of agreement about their<br />

influence on e-government success. For inhibitors, several factors<br />

across different structures showed low levels of agreement (less<br />

than 5.0 on average) meaning not necessarily no relation with egovernment<br />

success, but a negative impact on e-government<br />

success. Another important result from this study is that the<br />

connection between the goals of the e-government initiative and<br />

the benefits perceived is weak. This may be resulted from the lack<br />

of clarity about the goals and expected results of the PbR-SED in<br />

organizations creating confusion across participants of the project.<br />

In general, participants share knowledge and information,<br />

collaborate more with others, and are more accountable for what<br />

they do; however, they are unable of clear set of goals and<br />

performance indicators for improving efficiency, cost reduction<br />

and improving public services.<br />

7. REFERENCES<br />

[1] Agranoff, R. and McGuire, M. 2001. "Big questions in<br />

public network management research". Journal of Public<br />

Administration Research and Theory, 11. 295-326.<br />

[2] Ambite, J. L. et al. 2002. Data integration and access. In<br />

William J. McIver and Ahmed K. Elmagarmid. Advances in<br />

digital government technology, human factors, and policy.<br />

Boston, MA: Kluwer Academic Publishers.<br />

[3] Andersen, D. F. and Dawes, S. S. Government information<br />

management. A primer and casebook. Prentice Hall,<br />

Englewood Cliffs, NJ, 1991<br />

[4] Bryman, A. Social Research Methods. Oxford University<br />

Press, 2004.<br />

[5] Cresswell, A.M., Pardo, T.A., and Hassan, S. 2000.<br />

"Assessing Capability for Justice Information Sharing', The<br />

Proceedings of the 8th Annual International Digital<br />

Government Research Conference 2000.<br />

[6] Cresswell, A.M., Pardo, T.A., Canestraro, D.S. and Dawes,<br />

S.S. 2005. Why Assess Information Sharing Capability?<br />

Center for Technology in Government.<br />

[7] Davenport, E. and Hall, H. 2002. "Organizational knowledge<br />

and communities of practice". Annual Review of Information<br />

Science and Technology, 36 171-222.<br />

344<br />

[8] Dawes, S.S. and Eglene, O. 2008. New models of<br />

collaboration for delivering government services: A dynamic<br />

model drawn from multi-national research. CTG Working<br />

Paper No. 01-2008<br />

[9] Dawes, S. S., and Pardo, T. A. 2002. Building collaborative<br />

digital government systems. Systematic constraints and<br />

effective practices. In W. J. McIver and A. K. Elmagarmid<br />

(Eds.), Advances in digital government. Technology, human<br />

factors, and policy (pp. 259-273). Norwell, MA: Kluwer<br />

Academic Publishers.<br />

[10] Dawes, S. S., Helbig, N., and Gil-García, J. R. 2004.<br />

Highlights: Exploring the feasibility of a digital government<br />

journal. Albany, NY: Center for Technology in Government,<br />

University at Albany, SUNY.<br />

[11] Dawes, S. S. 1996. "Interagency information sharing:<br />

Expected benefits, manageable risks". Journal of Policy<br />

Analysis and Management, 15(3), 377-394.<br />

[12] De Lancer Julnes, P., and Holzer, M. 2001. "Promoting the<br />

utilization of performance measures in public organizations:<br />

An empirical study of factors affecting adoption and<br />

implementation". Public Administration Review, 61(6), 693-<br />

708.<br />

[13] Dirks, K. T. and Ferrin, D. L. 2001. "The Role of Trust in<br />

Organizational Settings," Organization Science, vol. 12(4),<br />

pp. 450-467.<br />

[14] Fountain, J. E. 2001. Building the virtual state: Information<br />

technology and institutional change. Washington, D.C.: The<br />

Brookings Institution Press.<br />

[15] Gant, D. B., Gant, J. P., and Johnson, C. L. 2002. State Web<br />

Portals: Delivering and Financing EService. The<br />

PricewaterhouseCoopers Endowment for the Business of<br />

Government, Arlington, VA.<br />

[16] Gant, J. P. 2004. Digital Government and Geographic<br />

Information Systems. In A. Pavlichev and G. D. Garson<br />

(Eds.), Digital Government: Principles and Best Practices.<br />

Hershey, PA: Idea Group Publishing.<br />

[17] Garson, G. D. 2004. The promise of digital government. In<br />

A. Pavlichev and G. D. Garson (Eds.), Digital government:<br />

Principles and best practices (pp. 2-15). Hershey, PA: Idea<br />

Group Publishing.<br />

[18] Gil-Garcia, J. R. and Pardo, T. A. 2005. "E-Government<br />

Success Factors: Mapping Practical Tools to Theoretical<br />

Foundations". Government Information Quarterly, 22(2),<br />

187–216.<br />

[19] Gil-Garcia, J. R. 2005. Enacting state websites: A mixed<br />

method study exploring e-government success in multiorganizational<br />

settings. Unpublished Doctoral Dissertation,<br />

University at Albany, State University of New York, Albany,<br />

NY.<br />

[20] Gil-Garcia, J. R., Pardo, T. A., and Burke, G. B. 2007.<br />

"Government leadership in multi-sector IT-enabled<br />

networks: Lessons from the response to the West Nile Virus<br />

outbreak", Paper presented at “Leading the Future of the<br />

Public Sector” – The Third Transatlantic Dialogue, Newark,<br />

DE, Mon, 02 Jun 2007


[21] Grizzle, G.A. and Pettijohn, C. D. 2002. "Implementing<br />

Performance-Based Program Budgeting: A System-<br />

Dynamics Perspective", Public Administration Review,<br />

January/February 2(X)2, 62(1)<br />

[22] Gurbaxani, V., and Whang, S. 1991. “The impact of<br />

Organizations System on Organizations and Markets,”<br />

Communications of the ACM, Vol. 34, No. 1, January, pp.<br />

59-73<br />

[23] Hall, H. and Andrews, M. 2005. "Reforming Budget Ritual<br />

and Budget Practice: The Case of Performance Management<br />

Implementation in Virginia", International Journal of Public<br />

Administration, 28: 255–272.<br />

[24] Heeks, 2006. Implementing and Managing eGovernment. An<br />

International Text. London: Sage Publications.<br />

[25] Joyce, P. G. 2004. Linking Performance and Budgeting:<br />

Opportunities in the Federal Budget Process, (IBM Center<br />

for the Business of Government, October 2003—2nd<br />

Printing January 2004).<br />

[26] Joyce, P. G., Lee, R. D. and Johnson, R. W. 2004. Public<br />

Budgeting Systems, 7th Edition, Jones and Bartlett<br />

Publishers.<br />

[27] Melkers, J.E. and Willoughby, K.G. 2001. "Budgeters' view<br />

of state performance-budgeting systems: Distinctions across<br />

branches", Public Administration Review, January/February,<br />

Vol. 61(1).<br />

[28] OECD. 2007. Performance Budgeting in OECD Countries,<br />

Paris, France: Organisation for Economic Co-operation and<br />

Development.<br />

[29] Orlikowski, W.J., and Baroudi, J. 1991. "Studying<br />

Information Systems in Organizations: Research Approaches<br />

and Assumptions," Information Systems Research, Vol. 2,<br />

No. 1, pp. 1-28.<br />

[30] Pardo, T.A., Cresswell, A. M., Dawes, S. S. and Burke, G. B.<br />

2004. "Modeling the social and technical processes of<br />

interorganizational information integration". In HICSS2004,<br />

37th Hawaiian International Conference on System Sciences.<br />

[31] Pardo, T. A., Cresswell, A. M., Thompson, F., and Zhang, J.<br />

2006. "Knowledge Sharing in Cross-Boundary Information<br />

Systems Development". Journal of Information Technology<br />

and Management, 7(4).<br />

[32] Pardo, T.A., Gil-Garcia, J.R. and Burke, G.B. 2007. Informal<br />

Leadership and Networks: Lessons from the Response to the<br />

345<br />

West Nile Virus Outbreak, in Paul Cunningham and Miriam<br />

Cunningham (Eds), Expanding the Knowledge Economy:<br />

Issues, Applications, Case Studies, IOS Press, 2007<br />

Amsterdam<br />

[33] Peterson, R. 2004. "Crafting information technology<br />

governance". Information Systems Management, 21(4), 7-22.<br />

[34] Puron-Cid, G. 2010. Extending Structuration Theory: A<br />

Study of an IT-enabled Budget Reform in Mexico. Ph.D.,<br />

University at Albany, State University of New York, Albany,<br />

New York.<br />

[35] Rocheleau, B. 2003. Politics, Accountability, and<br />

Governmental Information Systems. In G. D. Garson (Ed.),<br />

Public Information Technology: Policy and Management<br />

Issues. Hershey, PA: Idea Group Publishing.<br />

[36] Sadri, F., Subramanian, I. N. and Lakshmanan, L. V. S.<br />

1996., "Schema SQL - A language for interoperability in<br />

relational multi-database systems", ACM Symposium on<br />

Principles of Database Systems (PODS), June 1996.<br />

[37] Schick, A. 2008. Getting Performance Budgeting to Perform.<br />

Paper presented at the Conferencia Internacional de<br />

Presupuesto por Resultados, Mexico City.<br />

[38] Scholl, Hans J. 2009. Electronic Government: A Study<br />

Domain Past its Infancy, In Scholl, H.J. (ed.) Electronic<br />

Government: Information, Technology and Transformation,<br />

M.E. Sharpe Armonk.<br />

[39] Van Reeth, W. 2002. The bearable lightness of budgeting.<br />

An explorative research on the uneven implementation of<br />

performance oriented budget reform. Ph.D. Doctoral Degree<br />

Thesis, Catholic University of Leuven, Leuven, Germany.<br />

[40] Van Veenstra, A. F., Marijn, J., & Tan Y. H. 2010. Towards<br />

an Understanding of E-Government Induced Change—<br />

Drawing on Organization and Structuration Theories. In<br />

M.A. Wimmer et al. (eds): EGOV 2010. LCNS 6228,<br />

International Federation for Information Processing, pp. 1-<br />

12.<br />

[41] West, D. M. 2005. Digital Government. Technology and<br />

Public Sector Performance. Princeton, USA: Princeton<br />

University Press.<br />

Zheng, H. Y. 2000. Data warehousing in government agencies:<br />

Conceptual and managerial issues. In G.D. Garson (Ed.),<br />

Handbook of public information systems (pp. 447-462). New<br />

York: Marcel Dekker.


Public CIO, Figurehead or Decision-Maker? The case of<br />

Germany.<br />

Niels Proske<br />

University of Potsdam, Chair of<br />

Business Information Systems and E-<br />

Government<br />

August-Bebel-Str. 89<br />

14482 Potsdam, Germany<br />

+49 331 977 4681<br />

nproske@wi.uni-potsdam.de<br />

ABSTRACT<br />

In this paper, we analyze the position of CIO in the German states.<br />

In Germany, public CIOs range from figureheads to real decisionmakers.<br />

We identified three CIO types: first, the Political CIO,<br />

who has substantial resources but less IT competencies; second,<br />

the Operational CIO, who manages IT primarily close to actual<br />

projects; third, the Decorative CIO, who serves predominantly for<br />

public image. Thus, the institution of CIO moves between<br />

catchphrase and e-government enabler.<br />

Categories and Subject Descriptors<br />

K.6.1 [Project and People Management]: Strategic Information<br />

Systems Planning<br />

General Terms<br />

Management, Human Factors, Theory, Legal Aspects<br />

Keywords<br />

CIO, Leadership in Public Authorities, Empirical Comparison<br />

1. INTRODUCTION<br />

CIOs gladly accept prizes for excellent e-government strategies,<br />

give keynote addresses at fairs or conferences and are interviewed<br />

about the importance of collaboration under public authorities.<br />

But what is their actual impact on shaping and advancing the use<br />

of IT in the public sector? Whereas research has given a lot of<br />

attention to the position of Chief Information Officer in<br />

companies, their equivalents in the public sector however have<br />

been scarcely addressed by research. Given the public sector’s<br />

peculiar determining conditions that are likely to affect the CIO’s<br />

design and functions, findings from both science and practice,<br />

should not be transferred carelessly. Especially since high<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Moreen Heine<br />

University of Potsdam, Chair of<br />

Business Information Systems and E-<br />

Government<br />

August-Bebel-Str. 89<br />

14482 Potsdam, Germany<br />

+49 331 977 4690<br />

mheine@wi.uni-potsdam.de<br />

346<br />

Norbert Gronau<br />

University of Potsdam, Chair of<br />

Business Information Systems and E-<br />

Government<br />

August-Bebel-Str. 89<br />

14482 Potsdam, Germany<br />

+49 331 977 4681 3372<br />

ngronau@wi.uni-potsdam.de<br />

expectations are tied to the introduction of the CIO position.<br />

Leadership failures or even the lack of adequate management is<br />

one of the biggest obstacles of e-government activities, which are<br />

for the most part activities of strategy and organizational change<br />

[2] [5] [10]. A lack of political guidelines and an often too late<br />

integration of crucial decision makers are constraining egovernment<br />

progress in general. As a mean to address these<br />

shortcomings, the concept of a Chief Information Officer, inspired<br />

by private sector, emerged in public sector.<br />

Introducing CIOs in the public sector indicates a shift towards<br />

greater centralization as well as recognition that in order to<br />

succeed in e-government a more holistic, inter-agency approach is<br />

necessary [7] [8]. Thought to bridge the gap between IT and<br />

highest-level executives [2], the position of CIO is also<br />

understood as institutionalization of the organization’s egovernment-strategy<br />

[6]. The rise of the CIO concept underlines<br />

in particular the strategic importance of e-government for<br />

organizational change in the public sector overcoming it’s<br />

limitation to merely technical means [4].<br />

CIOs in public sector are exposed to a particular environment,<br />

with political implications, directly affecting their working<br />

conditions. This leads to certain CIO models that often reflect<br />

both power structures and relevance attached to e-government.<br />

The objective of this paper is to explore and describe roles and<br />

functions of CIOs in German federal state governments and to<br />

assess whether this so gloriously titled position is actually more<br />

than just symbolic.<br />

2. DEFINITION OF TERMS<br />

The term Chief Information Officer firstly appeared in the early<br />

1980s in the private sector [1]. For W. R. Synnott the CIO is “the<br />

highest ranking executive with primary responsibility for<br />

information management. The CIO is responsible for the planning<br />

and architecture of the firm’s information resources, for<br />

promoting information technology throughout the firm, and for<br />

looking after the corporation’s investment in technology” [9]. The<br />

implementation is a visible expression of a changed view on<br />

information and information systems that had become a<br />

substantial production factor [12] and "can increase productivity<br />

and provide better management support" and hence created a new<br />

management dimension [11]. Focussing on hierarchy Boyle and<br />

Burbridge define the CIO position as "an executive with broad


esponsibility for information technology [...] who reports to a<br />

high-level corporate officer (e.g. president or CEO) [13]. Hence,<br />

the CIO is part of the organisation’s top management or at least<br />

directly tied to it. A clear definition of CIO position is almost<br />

impossible to give [1], which is predominantly due to the various<br />

roles and in the manifold modification of the CIO's<br />

responsibilities. Generally in public sector the concept of a CIO is<br />

well established for now almost two decades [5] [14]. Often their<br />

introduction is part of broader e-government initiatives such as egovernment<br />

strategies or similar action plans (e.g. in the state of<br />

Mecklenburg-Vorpommern), coalition agreements (e.g. in the<br />

state of Baden-Württemberg) or even by law (e.g. planned in the<br />

state of Berlin; Clinger-Cohen Act in the U.S.).<br />

However, it is hardly feasible to determine the specific date, when<br />

the first CIO position was created in a German state. In 2003 the<br />

German state of Hessen was the very first state, which has<br />

established a so titled CIO position. However, a similar position<br />

was already set up in 1996 by the German state of Hamburg,<br />

albeit as a department on a lower hierarchical level and not<br />

denominated as Chief Information Office. And even since 1985<br />

there is a so-called Federal Commissioner for ICT<br />

(Landessystembeauftragter) in the state of Baden-Württemberg, a<br />

position clearly assigned with CIO functions and a dedicated<br />

administrative body. Introducing a CIO position does not<br />

necessarily mean adopting an innovation but often merely<br />

establishing a prominent title, as will be shown later [2]. Today 13<br />

out of 16 federal states have established corresponding positions,<br />

even if the denomination is used rather rare.<br />

3. STUDY DESIGN<br />

We explore the design of CIO positions in public authorities by<br />

comparing the German states. The data collection is mainly based<br />

on content analysis. We used organization charts, schedules of<br />

responsibilities, coalition agreements and online presences of the<br />

16 states. Further, we conducted three expert interviews about the<br />

design and intentions of CIO positions in three German states.<br />

The following characteristics were collected:<br />

o Placing<br />

o Function<br />

o Level of separate resources<br />

o Relationship to other departments<br />

o Representation in the Federal IT committee<br />

The placing of the CIO concerns both vertical and horizontal<br />

dimension. The higher he is positioned in the hierarchy the more<br />

assertiveness can be assumed. However, in such a case he is most<br />

likely not involved in concrete IT affairs, because he has to direct<br />

several departments which may be far away from IT subjects.<br />

CIOs that are not on the level of a state secretary are actually able<br />

to operate as IT managers even though they are not authorized to<br />

issue directives. With a view to the horizontal placing it is crucial<br />

but not always in fact, that the CIO is positioned in that<br />

department that is in charge of statewide IT topics.<br />

CIOs fulfill several functions such as planning, governance and<br />

controlling of IT issues focusing on strategic tasks [1]. In our<br />

study the functional range of the CIOs is documented for every<br />

state and finally accounts for the identification of special CIO<br />

types.<br />

347<br />

To unfold full impact and to operate independently, the CIO<br />

should be equipped with resources, for example directly dedicated<br />

organisational units as well as budgetary means to initiate<br />

projects, assign studies and drive agenda setting. The importance<br />

of the CIO position should also be reflected in the crossdepartmental<br />

IT committees over which he has to preside. In this<br />

regard, there should be clarity about the relationship to the heads<br />

of IT on lower hierarchical levels within the specific departments.<br />

Every German state delegates a high-ranking representative (state<br />

secretary) to the Federal CIO council (IT Planungsrat), so do the<br />

the fereral government and representatives of the municipalities.<br />

The council is responsible for an overall IT steering. For the<br />

efficiency of each CIO position it is relevant whether the CIO is<br />

also member of the Federal CIO council. If not, it can be supposed<br />

that there is a lack of capacity to act at the interface of the own<br />

and the overall IT strategy.<br />

4. EMPIRICAL FINDINGS<br />

Altogether 13 federal states possess a CIO, which is not to say that<br />

among the remaining states CIO functions are not implemented.<br />

The word CIO seems to be a kind of catchphrase. Some federal<br />

states are afraid to use it, but actually have implemented an<br />

analogous position but put the phrase in brackets. Another<br />

symptom of this near-hype is that some states entitle a state<br />

secretary, who is busy being in charge of several sections, to a<br />

CIO. Under these circumstances the position is called Decorative<br />

CIO, who has in addition mostly no own resources. Otherwise,<br />

state secretaries are actually able to fulfil the CIO mission,<br />

provided that they have any resources they need, which are time,<br />

money, qualification and staff. In this case it is a Political CIO.<br />

The third type focuses on IT qualification and more operative<br />

tasks without neglecting strategic issues and is called Operative<br />

CIO. In the majority of cases our three CIO types are hard to<br />

distinguish from each other. Thus, the cases are assigned to the<br />

types by concentrating on the main points.<br />

4.1 Political CIO<br />

As a state secretary the Political CIO performs primarily strategic<br />

tasks. As its name implies, he distinguishes himself in his<br />

commitment to political offices. He is provided with authority to<br />

impact the IT governance, ideally cross-departmental. In the case<br />

of federal states, he is the head of IT for the whole state<br />

administration. The Political CIO has the budget responsibility. In<br />

collaboration with other federal states and face to face with local<br />

authorities he acts with the necessary power of representation.<br />

This CIO type is almost completely observable in the Free State of<br />

Bavaria. At first glance the state of Hessen possesses a similar<br />

CIO position, but actually it seems to be a position for special IT<br />

tasks (first, Digital Mobile Radio Network for emergency services<br />

& government agencies; and second, the activities in the Federal<br />

IT Council). The basic e-government department is not under his<br />

command. Without fixed coordination operations this situation<br />

tends to result in isolated CIO offices with a very decorative<br />

character. On the surface he appears as virtual head of IT. It is a<br />

peculiarity that the CIO is associated to two ministries, the<br />

Ministry of Interior and the Ministry of Finance. This is due to<br />

budget requirements. Requiring high spending but then enabling<br />

high savings, IT projects have strong financial impacts. Hence, it<br />

will be very advantageous, if CIOs have well-established and<br />

formal relations to both professional and financial departments.


4.2 Operative CIO<br />

The Operative CIO is characterized by his IT competence.<br />

Political CIOs are more often than not almost laymen in IT issues.<br />

The Operative CIO is head of the IT department without further<br />

engagements. Thus, he is able to concentrate on his root tasks. On<br />

management level the Operative CIO is involved in projects.<br />

Requests from other authorities like local communities or other<br />

federal states are addressed to him, even though he is not entitled<br />

to make binding decisions.<br />

The federal city state of Hamburg has an Operative CIO as<br />

described above. Hamburg provides both a global fund for IT<br />

projects and a pool with specialized staff. IT specialists are<br />

delegated to work on projects within the operating department. All<br />

in all Hamburg has a powerful CIO organization. The state of<br />

Saarland has also an Operative CIO, but not as ideal as Hamburg.<br />

Introducing a CIO organization means always a certain need of<br />

concentration. That did not succeed, because there are still two<br />

departments which handle statewide important IT issues. The CIO<br />

of the state of Saarland is positioned as a staff unit at the Ministry<br />

of Finance and is completely oriented on the project “IT reengineering”<br />

with the aim to consolidate. It seems that the CIO<br />

day-to-day business is not included.<br />

4.3 Decorative CIO<br />

Missing adequate resources Decorative CIOs are not able to reach<br />

significant results. They only serve for image brightening.<br />

Decorative CIOs have little or no managerial function. The state<br />

of Brandenburg has a CIO with only representative functions. The<br />

CIO is positioned deep within a department of the Ministry of<br />

Interior and he is ancillary to the head of this department, which is<br />

in charge of e-government and IT. Thus, Brandenburg has a CIO<br />

but nothing else. The state of Lower Saxony also holds a CIO with<br />

questionable reliability performance. Initially they recruited a CIO<br />

from the private sector. This year the position was upgraded. The<br />

state secretary took over additional task. To the present this is not<br />

communicated in detail, which indicates that this CIO design is<br />

located along the border to decorativeness.<br />

4.4 Synopsis<br />

Political CIOs are most common, seven german states have a CIO<br />

that predominantly serve political purposes. That may be because<br />

of their role in the federal IT council. The states seek to delegate<br />

representatives who are able to speak on equal terms (two out of<br />

three Decorative are also in the position of state secretaries).<br />

Another three states’ CIO positon can be classified as Operational<br />

CIO, three as Decorative CIO. Three German states have no CIO<br />

position so far.<br />

A further aspect is the department, in which the CIO performs.<br />

Traditionally IT issues are handled in the Ministry of Finance.<br />

That is because the first data possessing systems were introduced<br />

for the tax authorities. Six German CIOs are employed at financial<br />

departments. Another six CIOs are at the Ministry of Interior,<br />

which is as a rule in charge of Public Service Modernization.<br />

Possessing the CIO in the Ministry of Justice and Europe, Saxony<br />

is an outliner.<br />

Deriving from the localization of the state CIO in a certain<br />

ministry is the hegemony over priorities and aims associated to<br />

the use of technology [18] [19]. One can expect that a CIO<br />

employed at financial departments is more likely to stress the<br />

348<br />

potential of ICT to strengthen efficiency in order to save money,<br />

whereas a CIO at Ministry of Justice is more likely to focus on<br />

subjects such as data protection or the restriction of crossauthority<br />

exchange of data.<br />

5. EXPLANATION APPROACH<br />

One of the most fundamental lessons learned from evaluations of<br />

the New Public Management is to take into account the public<br />

sector’s specific conditions before transferring concepts from<br />

private sector, as both sectors differ in a couple of basic<br />

dimensions [15]. Although they clearly affect the CIO position in<br />

the public sector, we do not want to elaborate on these basic<br />

characteristics (such as stakeholder structure, orientation to the<br />

common good or administrative culture) but to stress those<br />

principles and conditions, which are directly tied to CIO’s<br />

capacity to act and might explain our findings.<br />

Probably as the most important difference, it starts with the<br />

position in organisation hierarchy. Whereas in private sector the<br />

CIO is member of the executive board or at least closely tied to it,<br />

there is no comparable body in state governments. Unlike the<br />

municipal level, where a central management body can be<br />

identified (albeit with significant differences to private sector), a<br />

state government’s cabinet combines the state ministers who lead<br />

their respective departments independently and under their own<br />

responsibility (departmental principle). It falls to the ministers, to<br />

decide whether, where and how tasks are to be administrated.<br />

For the CIO’s capacity to act consensus must exist on his crossdepartmental<br />

responsibilities, and his respective remit clearly<br />

defined, in particular if establishing the CIO function is<br />

accompanied by the delegation of hitherto decentralised functions.<br />

Some states and countries describe responsibilities, authority and<br />

the allocation of dedicated resources by specific legislation.<br />

Each type of CIO in public sector can be seen as an expression of<br />

certain political conditions, thus as the result of intense<br />

negotiations. Consensus is yet needed on where to establish the<br />

prominent position, a question that might easily become subject of<br />

envy, taking into account the idealistic understanding of<br />

technology as a metaphor for progress and innovation. And<br />

ministries are likely to seek being recognized as progressive and<br />

innovative. Willingness on to abandon and cede once owned<br />

responsibilities by delegating functions, capabilities or staff can be<br />

seen as huge challenge. Thus, public sector CIO is also always a<br />

moderator between the respective departments (and their IT<br />

managers) likewise towards politics.<br />

Considering constantly changing political power structures, hence<br />

changing policies and priorities, the need for consensus is a steady<br />

companion. For instance strategic and organisation wide planning,<br />

which is without doubt one of the CIO’s key field of activity, is<br />

subject to particular challenges specific to the public sector [3].<br />

But what if consensus is reached neither on where to establish a<br />

CIO function nor on its responsibilities or authority? A weak, thus<br />

rather decorative CIO is likely to be the result. If departments<br />

insist on keeping staff, capabilities or activities, if comprehensive<br />

planning is not wanted, the CIO’s room for manoeuvre will dry<br />

out. In case of Decorative CIOs a gap between the glorious title<br />

and the actual rather slight capacity to act is self-evident.<br />

But why do they introduce CIO-positions anyhow? From the<br />

perspective of sociological new institutionalism [17] [16] they do<br />

precisely because there is a need for decoration, in terms of a


substantial demand for highlighting ICT as metaphor for<br />

effectiveness, efficiency and performance, or just to be state-ofthe-art.<br />

Stakeholders demand public sector to be efficient, with<br />

sophisticated e-government as a catchy expression. Introducing a<br />

CIO appears to be a plausible response, even more if other states<br />

do. Even in case of insufficient political will, reluctance to agree<br />

on to delegate responsibilities and resources or political costs,<br />

estimated as too high, the subject of e-government appears well<br />

addressed when a CIO position is established.<br />

New institutionalism emphasises the role of legitimacy in order to<br />

ensure support and secure the organisation’s survival. By<br />

establishing a CIO position, as a significant institutional rule, that<br />

organisations incorporate, illegitimacy can be avoided. John W.<br />

Meyer and Brian Rowan describe a gap between the formal<br />

structure and actual work as decoupling, as a mean of dealing with<br />

conflicts. "Decoupling enables organizations to maintain<br />

standardized, legitimating, formal structures while their activities<br />

vary in response to practical considerations." [17] The type of<br />

Decorative CIO may be interpreted as a response to the<br />

simultaneousness of environmental demands and differing<br />

understandings of rational organizations but also to political costs<br />

that do not match the actual priority.<br />

6. FUTURE PROSPECTS<br />

This paper’s aim was to assess and describe the CIO position in<br />

German state governments and to point out the potential impact<br />

on e-government. Being still ongoing work, the paper sets a<br />

starting point to unfold a rich field of future research work. One<br />

subject of further research is to assess the actual impact,<br />

regardless of available resources or position in hierarchy, as<br />

personal attributes may outweigh shortcomings, such as the lack<br />

of a dedicated administrative body. Describing requirements for a<br />

full-spectrum CIO position [1] is stressing especially leadership<br />

competencies, networking abilities as well as being an innovator.<br />

Another desideratum of research is the assumption that<br />

establishing a merely Decorative CIO refers to differing<br />

estimations of a CIO’s impact on organizational goals and<br />

performance. Moreover the assumed link between the statewide<br />

policy of the Chief Information Officer and the determining basic<br />

priorities of the ministry he is assigned to is posing another<br />

interesting research question, in order to assess the impact of a<br />

CIO in the public sector.<br />

7. REFERENCES<br />

[1] Krcmar, H.: Informationsmanagement, Springer, Berlin,<br />

Heidelberg, New York, 2005.<br />

[2] Heine, M.: Transfer von E-Government-Lösungen, Gito,<br />

Berlin, 2010.<br />

[3] OECD: OECD E-Government Studies. e-Government for<br />

better Government. OECD Publishing, 2005.<br />

[4] Mehlich, H.: Electronic Government. Die elektronische<br />

Verwaltungsreform, Gabler, Wiesbaden, 2002.<br />

349<br />

[5] Eynon, R. and Margetts, H.: Organisational Solutions for<br />

Overcoming Barriers to eGovernment. European Journal of<br />

ePractice 1 (November 2007), 73-85.<br />

[6] OECD: Bessere Rechtsetzung in Europa. Deutschland.<br />

OECD Publishing, 2010.<br />

[7] Jupp, V.: Realizing the Vision of eGovernment, Journal of<br />

Political Marketing, 2:3-4, 128-145, 2003.<br />

[8] Borins, S.: A Holistic View of Public Sector Information<br />

Technology, Journal of E-Government, 1:2, 3-29, 2005.<br />

[9] Synnot, W.R.: The Information Weapon: Winning Customers<br />

and Markets with Technology. John Wiley & Sons, 1987.<br />

[10] Abele, J.: Methoden für Strategie und Organisation. In:<br />

Zechner, A. (ed.): Handbuch E-Government, Deutschland<br />

Online and Fraunhofer eGovernment Zentrum, 197-211,<br />

2007.<br />

[11] Declan O'Riordan, P.: The CIO: MIS Makes Its Move into the<br />

Executive Suite, Journal of Information Systems<br />

Management, 4:3, 54-56, 1987.<br />

[12] Buhl, H.U.; Kreyer, N. and Wolfersberger, P.: Die Rolle des<br />

Chief Information Officer (CIO) im Management.<br />

Wirtschaftsinformatik, 43(4), 408, 2001.<br />

[13] Boyle, R.D. and Burbridge, J.J.: Who needs a CIO?<br />

Information Strategy. The Executive's Journal, 7:12-18,<br />

1991.<br />

[14] McClure, C.R. and Bertot, J.C.: The chief information officer<br />

(CIO): assessing its impact, Government Information<br />

Quartely, 17:1, 7-12, 2000.<br />

[15] Reichard, C.: Zur Naivität aktueller Konzepttransfers im<br />

deutschen Public Management, in: Edeling, T., Jann, W. and<br />

Wagner, D. (eds.): Öffentliches und privates Management.<br />

Fundamentally Alike in All Unimportant Respects?, Leske +<br />

Budrich, Opladen, 53–70, 1998.<br />

[16] DiMaggio, P.J. and Powell, W.W.: The iron Cage Revisited.<br />

Institutional Isomorphism and Collective Rationality in<br />

Organizational Field, in: Powell, W.W. and DiMaggio, P.J.,<br />

(eds.): The New Institutionalism in Organizational Analysis,<br />

University of Chicago Press, Chicago, London, 1991.<br />

[17] Meyer, J.W. and Rowan, B.: Instituationalized<br />

Organizations: Formal Structure as Myth and Ceremony. In:<br />

American Journal for Sociology 83, 1977.<br />

[18] Killian, W. and Wind, M.: Verwaltung und Vernetzung.<br />

Technische Integration bei organisatorischer Vielfalt am<br />

Beispiel von Agrar- und Umweltverwaltungen, Opladen,<br />

Leske + Budrich, 1997.<br />

[19] Pollitt, C.: Technological Change: A Central yet Neglected<br />

Feature of Public Administration. The NISPAcee Journal of<br />

Public Administration and Policy, III (2), 31-53, 2010


Session 12<br />

Implementation & Impact


Design and Implementation of a Public School<br />

Government-to-Employee System<br />

Carl Strang a<br />

a Capital Region BOCES<br />

900 Watervliet Shaker Road<br />

Albany, NY 12205<br />

+1 518 862 5300<br />

ABSTRACT<br />

In this paper, we describe NERIC Connect, a Government-to-<br />

Employee (G2E) system for public schools, which is a work in<br />

progress. NERIC Connect provides teachers and administrators<br />

with timely, contextually meaningful information and automated<br />

alerts, which can be used to catch students before they fall through<br />

institutional cracks. The system addresses the missed benefit<br />

resulting from islands of data contained in disparate, independent<br />

computer systems. Relying on any single view of the data is not<br />

sufficient for effective data-driven decision making. NERIC<br />

Connect provides a unified view that results in school district<br />

employees having actionable information that can be used to<br />

improve instruction.<br />

Categories and Subject Descriptors<br />

J.1 [Administrative Data Processing]: Administrative Data<br />

Processing – Government, Education; K.6.1 [Management of<br />

Computing and Information Systems]: Project and People<br />

Management – Strategic Information Systems Planning<br />

General Terms<br />

Management, Measurement, Performance, Human Factors<br />

Keywords<br />

E-government, Education, Government-to-Employee, Data-<br />

Driven Decision Making, Portal<br />

1. INTRODUCTION<br />

If children are our future, then ensuring that they receive a proper<br />

education is of critical concern to everyone. In the United States,<br />

the No Child Left Behind Act of 2001 (NCLB) [1] attempts to do<br />

just that by making states and local school districts accountable<br />

for student outcomes via standardized assessments that are aligned<br />

with state and federal academic standards. Under NCLB, teachers<br />

are encouraged to provide instruction to ensure that each student<br />

meets or exceeds the assessed standards, and administrators are<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

{carl.strang, ira.goldstein}@neric.org<br />

350<br />

Ira Goldstein ab<br />

b University at Albany: SUNY<br />

1400 Washington Avenue<br />

Albany, NY 12222<br />

+1 518 442 4687<br />

provided with data to monitor student progress and to make datadriven<br />

decisions. This paper addresses one approach to the open<br />

question of how best to provide teachers and administrators with<br />

meaningful access to disparate student data in order to make<br />

informed data-driven instructional decisions.<br />

Relying solely upon standardized assessments is not sufficient for<br />

effective data-driven decision making. In addition to standardized<br />

assessment results, various types of data, such as attendance, final<br />

examination results, and data acquired on intake can collectively<br />

form a comprehensive view that may be used to help improve<br />

education. The data can be used for curricula implementation,<br />

development of differentiated instruction, encouraging selfdirected<br />

learning, and professional development. Using<br />

educational theory as our lens, we find that teachers and<br />

administrators should base their decisions on the evidence<br />

provided by multiple data sources [2, 3]. For example, while<br />

standardized assessments can be used to inform a teacher about a<br />

given student’s level of mastery of a topic, this information needs<br />

to be put into context based upon the student’s attendance and<br />

performance in other classes, as well as the performance of other<br />

students working on the same topic [4]. Even though schools<br />

collect a large amount of data [5], simply collecting data is not<br />

enough to lead to instructional improvement or to effectively<br />

monitor key indicators of student success. Schools need systems<br />

that present data to teachers and administrators in the context of<br />

actionable information, but often do not have the means to<br />

implement complex data mining tools.<br />

According to Ackoff [6], data can be considered collections of<br />

raw facts or symbols. Information is data that has been processed<br />

to help answer “who,” “what,” “when,” and “where” questions.<br />

Knowledge is a collection of information that can answer “how”<br />

questions. Wisdom requires judgment and enables looking at what<br />

could be. Ideally, a G2E system should help teachers and<br />

administrators move from collecting data to acquiring wisdom.<br />

The New York State Education Department (NYSED) may not<br />

mandate any particular management software for functions such<br />

as payroll, accounting, or student information. It is the<br />

responsibility of each local school district to select the individual<br />

systems that best meet their needs. In the absence of mandated<br />

systems, islands of information often form within a given school<br />

district. It is not unusual to find that student information is stored<br />

redundantly in a school district’s student information, library,<br />

transportation, cafeteria management, and special education<br />

systems. Compounding the problem, neighboring school districts<br />

often adopt disparate systems, impeding the sharing of<br />

information and region wide data analysis.


NYSED is responsible for collecting, processing, and reporting<br />

the data needed to meet state and federal accountability<br />

requirements. As a result of NCLB, NYSED has mandated the<br />

electronic transmission of data for accountability reporting<br />

through a statewide network of reporting centers. This collection<br />

of data provides, in part, an opportunity for the standardization of<br />

data for purposes other than accountability reporting.<br />

The New York State Legislature created Boards of Cooperative<br />

Educational Services (BOCES), consortia referred to as<br />

intermediate service units, “for the purpose of carrying out a<br />

program of shared educational services” [7] to school districts<br />

within the state. School districts within New York State are able<br />

to acquire services from BOCES that a given district may be not<br />

be able to afford on their own. As of 2012, there were 37 BOCES<br />

that provided shared services to 688 school districts [8]. While a<br />

BOCES can offer services, it may not mandate adoption by the<br />

school districts in their catchment area.<br />

The BOCES’ have established 13 Regional Information Centers<br />

(RICs) to provide computing and networking services. One of<br />

these is the Northeastern Regional Information Center (NERIC),<br />

which has provided a variety of computer services to school<br />

districts for over 40 years. These services include payroll,<br />

accounting, student information, school lunch, and special<br />

education systems. NERIC serves 136 school districts and 7<br />

BOCES in a 17 county area in the northeastern corner of New<br />

York. This service area is home to districts located both in the<br />

northern part of the Appalachians and most of New York’s<br />

Adirondack State Park, two of the least populated areas of the<br />

state, as well as in small cities such as Schenectady and Albany.<br />

We describe one approach to address the missed benefits caused<br />

by of islands of data contained in disparate, independent computer<br />

systems. We begin with the premise that relying on any single<br />

view of the data is not sufficient for effective data-driven decision<br />

making. We create an extensible Operational Data Store (ODS)<br />

which draws the disparate data together. We provide a user<br />

friendly data dashboard that contextualizes the data and creates<br />

actionable information.<br />

2. GOVERNMENT TO EMPLOYEE<br />

SYSTEMS<br />

There are four main areas of e-government, government-tocustomer<br />

(G2C), government-to-business (G2B), government-togovernment<br />

(G2G), and government-to-employee (G2E) [9]. The<br />

objective of G2E is to improve internal efficiencies and<br />

effectiveness needed by government employees. Typical G2E<br />

services include payroll, benefits, travel, and training [9, 10].<br />

G2E systems should act as a foundation for the user experience,<br />

offer flexibility to users while adhering to governance tenets,<br />

include person-centric (e.g., social networking) components, and<br />

be based on an architecture which allows for a rapid response to<br />

changes in demand [11]. Given that the desired data is often<br />

stored in many different locations, a robust G2E system must have<br />

the ability to "mash-up" data from various sources [12]. Mash-ups<br />

take data from multiple sources and create a new service with a<br />

new purpose [13]. To assist in their adoption, G2E systems should<br />

meet the specific needs of employees [14].<br />

351<br />

3. NERIC CONNECT<br />

Relying exclusively on the results from standardized assessments<br />

is not sufficient for effective data-driven decision making. NERIC<br />

determined that teachers and administrators needed a way to bring<br />

together their disparate data in order to process, analyze and apply<br />

the data to the mission of educating students. Since 2006 NERIC<br />

has been working with the emerging technologies of data mining<br />

in order to develop a means for teachers and administrators to<br />

actively investigate the relationship between various data<br />

elements and student achievement scores on state exams. The first<br />

set of technologies NERIC published, referred to as NERIC IQ,<br />

provided an interactive interface that allowed the teachers and<br />

administrators to pivot on a variety of data elements as they<br />

related to one another. While a handful of districts adopted this<br />

system, the technologies never reached the hoped for level of<br />

utilization.<br />

Current research indicates that schools are challenged with finding<br />

the resources required to provide data analysts and data coaches<br />

who can help teachers learn to use the tools to mine data and to<br />

analyze the data once it has been mined [15, 16]. Specific<br />

recommendations include the development of user friendly data<br />

dashboards to help teachers contextualize data. In addition, it was<br />

recommended that this data be refreshed in a manner to provide<br />

timely and meaningful access [15].<br />

Districts do not make use of all their collected data [16]. Merely<br />

collecting the data necessary to create actionable information is<br />

insufficient. However, most school districts have no systems in<br />

place that present data in the context of actionable information.<br />

Furthermore, the development of systems that present actionable<br />

information takes time, money, and knowledge.<br />

Due to its role as a provider of integrated information technology<br />

related services to school districts, and having custody of the<br />

districts’ authoritative data, NERIC is uniquely positioned to<br />

address this void. NERIC Connect is envisioned as a G2E system<br />

that meets the goal of providing a single point of access for<br />

actionable information. This actionable information can be used to<br />

monitor student progress, helping to ensure that student<br />

intervention and new curricula better coincide with the needs of<br />

each student. Such a system will not, and can not, replace the<br />

teachers’ and administrators’ relationships with students. The<br />

intent is to help ensure that no student falls between the cracks by<br />

tracking and reporting key indicators of student success.<br />

3.1 Challenges<br />

School districts often implement separate computer systems for<br />

managing different aspects of student information. This results in<br />

information stored independently, and redundantly, in a school<br />

district’s various data systems. In addition, school districts in the<br />

same region often adopt disparate systems. Given a high rate of<br />

student transiency, the use of these disparate systems makes it<br />

difficult to transfer information when students move from district<br />

to district. Even when two districts adopt the same software,<br />

creative usage of the system can impede the sharing of<br />

information. For example, the authors are aware of one district<br />

that uses an asterisk in the “Tuition” field in order to indicate that<br />

the student completed their foreign language requirement.<br />

Teachers and administrators need to make informed, data-driven,<br />

instructional decision. Storing data in disparate systems can be<br />

considered the primary inhibitor to providing such access.


The United States Department of Education [17] found that only<br />

25% of all teachers reported having access to the prior year’s<br />

assessments for their current students and fewer than 11%<br />

reported having access to multiyear assessments. Teachers are<br />

increasingly using computer systems to input attendance, course<br />

scores, and interim assessment information. However, it may well<br />

be that teachers are accessing the system only for reporting<br />

purposes [15] and not for actionable information. This is not to<br />

say that the individual existing systems cannot produce reports.<br />

The mature and well-understood reports available from existing<br />

systems were developed for purposes other than programmatic<br />

and instructional interventions, and only include data from their<br />

one source. While these systems may excel at managing the data<br />

for a given function, they were not developed for the purpose of<br />

providing actionable information to teachers and administrators.<br />

At issue is the need to provide contextually meaningful reports<br />

which can be used to improve instruction. If existing systems<br />

cannot combine data from multiple systems, then alternatives<br />

must be considered. However, individual schools often do not<br />

have the development resources needed to implement solutions,<br />

even when the tools are available.<br />

The frequency with which data are refreshed is important in any<br />

decision making environment. The data refresh rate needs to<br />

reflect the speed or frequency of change. Data that are refreshed<br />

on a timely basis, and include school process related information,<br />

are exceptionally helpful. The process of refreshing data presented<br />

to teachers and administrators cannot be delayed in order to<br />

accommodate existing information processing cycles. Some data<br />

types, such as period-by-period student attendance, may need to<br />

be updated several times a day. It has been shown that refreshing<br />

data on a cycle greater than two weeks may be too long a period<br />

to effect meaningful interventions [18].<br />

3.2 Design<br />

NERIC Connect is built on Microsoft’s SharePoint environment.<br />

The SharePoint platform provides a secure environment to<br />

leverage Microsoft’s SQL (MSSQL) server technologies. MSSQL<br />

technologies are used extensively to provide role based, user<br />

specific contextualized and interactive data displays. SharePoint<br />

provides a simple, uncluttered, consistent user experience. NERIC<br />

Connect can run on any Web-enabled computer, offers automated<br />

workflow processes, integrates Microsoft Office products, and<br />

provides a centralized location for documents and collaboration.<br />

Built-in functionality allows for easy access to surveys, document<br />

management, and virtual meeting workspaces. NERIC Connect<br />

enables teachers and administrators to make better informed<br />

decisions by securely presenting critical information about their<br />

students from one central location, at anytime, from anywhere.<br />

NERIC Connect creates a mash-up of the data from multiple<br />

sources. It presents a customized user friendly data dashboard to<br />

help teachers and administrators contextualize their data. Each<br />

dashboard is generated in real-time, is specific to the user, and<br />

limits the data presented based on their role and responsibility. In<br />

other words, each user views their own customized dashboard that<br />

contains up to date information, that is specific to their needs, and<br />

that merges redundant data into a consistent presentation. The<br />

dashboard takes disparate data and provides actionable<br />

information that can be used to alert teachers to situations that<br />

may need their attention. For example, if a student skips their<br />

352<br />

math class, all of their teachers, not just the math teacher, become<br />

immediately aware of this change in behavior.<br />

In order to aid adoption, NERIC Connect offers several features<br />

which meet the needs of teachers and administrators. In addition<br />

to a contextually relevant dashboard, the system provides a<br />

dynamic collection of frequently used tools and documents. It also<br />

will provide a virtual classroom for safe, controlled collaboration<br />

between and among teachers and students.<br />

An extensive and extensible ODS (see Figure 1) was developed to<br />

provide a canonical model for data elements required for<br />

reporting. NYSED maintains a data warehouse, which is driven<br />

by NCLB and is primarily used for storing data for enrollment and<br />

assessment reporting purposes. However, the underlying data<br />

model is insufficient to provide the data required for producing<br />

actionable information to assist teachers and administrators in<br />

improving student performance. The ODS draws not only from<br />

the NYSED data warehouse; it also draws from student<br />

information, employee payroll, special education systems, as well<br />

as any district based data that contain key indicators of when a<br />

student may need intervention.<br />

Operational<br />

Data Store<br />

Employee<br />

Data<br />

Enrollment &<br />

Assessment<br />

Query<br />

Reply<br />

Application<br />

Server<br />

Extract<br />

Transformatio<br />

n Load<br />

Student<br />

Information<br />

Systems<br />

Figure 1- Logical Data Flow<br />

Web Front<br />

End<br />

District<br />

District<br />

Based<br />

Based Data<br />

Data<br />

Special<br />

Education<br />

The NERIC Connect system has a governance group and a<br />

development advisory committee comprised of chief school<br />

officers and other district administrators, as well as NERIC<br />

administrators and staff. Their purpose is to identify desired<br />

modification to the existing system and to plan for major updates<br />

and rewrites of the system that can lead to improving student<br />

achievement. These groups have already focused on the<br />

development of key indicators of student success.<br />

While performing data analysis of standardized assessments can<br />

reveal specific instructional gaps and provide accountability<br />

information, such analysis takes time to produce. In order to<br />

empower teachers so that they can provide timely interventions,<br />

school districts need to rely on more than just assessments. The<br />

governance group helps to develop, and to fine tune, the key<br />

indicators of student success, such as attendance information or<br />

even if the student has overdue library books. Key indicators do<br />

not need to imply causation; it is up to teachers and administrators<br />

to look at root causes. Key indicators of student success can be


considered markers that are able to draw attention to a potential<br />

problem and provide actionable information. Once the key<br />

indicators of success have been agreed to, “at risk” algorithms can<br />

be developed. If a student exceeds a predetermined threshold, then<br />

automated alerts are initiated. Multiple thresholds, or pools of<br />

thresholds, can be developed so that combinations of key<br />

indicators can be used to ensure that no student falls through the<br />

cracks. Specific “at risk” algorithms can be localized for a given<br />

district. One of the open tasks in this in-progress work is to<br />

determine if there are any best practices that can be used as the<br />

initial threshold(s).<br />

Unique to the BOCES/RIC model is the capability to provide<br />

application developers who work under the supervision of<br />

education administrators to evolve applications of information<br />

technology that meet more than just the needs of public education.<br />

They can evolve them to assist teachers and administrators in<br />

doing the work they are inspired to do.<br />

Representatives from the subscribing school districts and NERIC<br />

leadership and developers meet monthly to identify enhancements<br />

and modifications that integrate NERIC Connect technologies into<br />

the daily process of progress review and planning. These<br />

enhancements will help teachers make the best use of their time<br />

by providing a digital snapshot of student progress in their class,<br />

as well as throughout the school.<br />

4. CONCLUSIONS AND NEXT STEPS<br />

School districts maintain independent systems that accumulate<br />

data for a specific function (e.g., bus routing or grade reporting).<br />

Each of these systems provides only a partial view of the available<br />

data, and does not enable data-driven decision making. Driven by<br />

the educational theory that instructional decisions should be based<br />

on the evidence provided by multiple data sources, NERIC<br />

Connect addresses the open question of how best to provide<br />

meaningful access to disparate student data in order to make<br />

informed data-driven instructional decisions. NERIC Connect is a<br />

G2E system that mashes-up data from multiple sources and<br />

creates a new service with a new purpose. It helps teachers and<br />

administrators move from merely collecting data to having access<br />

to actionable information.<br />

NERIC Connect use is growing and evolving, and will be rolled<br />

out to additional school districts. Once these additional school<br />

districts are on board, the system will then begin to provide crossdistrict<br />

and region wide access to the data. Other plans include<br />

providing virtual classrooms to offer state of the art technologies<br />

to support constructivist learning pedagogy and collaboration<br />

capabilities from a myriad of internet enabled devices.<br />

5. ACKNOWLEDGMENTS<br />

The authors wish to thank the NERIC Regional Advisory<br />

Committee for their support of NERIC Connect.<br />

6. REFERENCES<br />

[1] An act to close the achievement gap with accountability,<br />

flexibility, and choice, so that no child is left behind. Pub L<br />

107-110, 115 Stat 1425. United States 2001.<br />

[2] Bernhardt V. L. Data tools for school improvement.<br />

Educational Leadership. 62,5 (2005), 66-9.<br />

353<br />

[3] Schildkamp K. and Kuiper, W. Data-informed curriculum<br />

reform: Which data, what purposes, and promoting and<br />

hindering factors. Teaching & Teacher Education. 26,3<br />

(2010), 482-96.<br />

[4] Black P. and Wiliam, D. Assessment and classroom learning.<br />

Assessment in Education: Principles, Policy & Practice. 5,1<br />

(1998), 7.<br />

[5] Stecker P. M., Fuchs, L. S., Fuchs, D. Using curriculumbased<br />

measurement to improve student achievement.<br />

Psychology in the Schools. 42,8 (2005), 795-819.<br />

[6] Ackoff R. L. From data to wisdom. Journal of Applied<br />

Systems Analysis. 16, (1989), 3-9.<br />

[7] Establishment of boards of cooperative educational services.<br />

NYS Ed Law §1950 1948.<br />

[8] New York State Education Department. Boards of<br />

Cooperative Educational Services (BOCES). 2011 [cited 9<br />

March 2012]; Available from:<br />

http://www.p12/nysed.gov/mgtserv/boces/<br />

[9] Siau K. and Long, Y. Synthesizing e-government stage<br />

models - a meta-synthesis based on meta-ethnography<br />

approach. Industrial Management & Data Systems. 105,4<br />

(2005), 443-58.<br />

[10] Evans D. and Yen, D. C. E-government: Evolving<br />

relationship of citizens and government, domestic, and<br />

international development. Government Information<br />

Quarterly. 23,2 (2006), 207-35.<br />

[11] Murphy J. Build an enduring portal strategy for a wave of<br />

change on the web.: Gartner; 2011. No.: G00213225.<br />

[12] Meng J. and Chen, J. A mashup model for distributed data<br />

integration. In Proceedings of International Conference on<br />

Management of e-Commerce and e-Government (ICMECG),<br />

Nanchang, China, 2009.<br />

[13] Di Lorenzo G., Hacid, H., Paik, H.-Y., Benatallah, B. Data<br />

integration in mashups. SIGMOD. 38,1 (2009), 59-66.<br />

[14] Ebrahim Z. and Irani, Z. E-government adoption:<br />

Architecture and barriers. Business Process Management<br />

Journal. 11,5 (2005), 589-611.<br />

[15] Means B., Padilla, C., DeBarger, A., Bakia, M., Department<br />

of Education Office of Planning Evaluation & Policy<br />

Development. Implementing data-informed decision making<br />

in schools: Teacher access, supports and use: US Department<br />

of Education; 2009.<br />

[16] Strang C. F. The systemic use of data to inform improvement<br />

in student achievement: A qualitative study of six school<br />

districts [Doctoral dissertation]. Albany, NY: The Sage<br />

Colleges; 2011.<br />

[17] Bakia M., Yang, E., Mitchell, K., Office of Planning<br />

Evaluation and Policy Development Policy and Program<br />

Studies Service. National educational technology trends<br />

study: Local-level data summary: US Department of<br />

Education; 2008.<br />

[18] Deno S. L., Reschly, A. L., Lembke, E. S., Magnusson, D.,<br />

Callender, S. A., Windram, H., et al. Developing a schoolwide<br />

progress-monitoring system. Psychology in the<br />

Schools. 46,1 (2009), 44-55.


E-Governance and Millennium Development Goals:<br />

Sustainable Development Perspective in Rural India<br />

ABSTRACT<br />

The year 2015 is fast approaching for the countries and the United<br />

Nations pursuing Millennium Development Goals (MDG). In the<br />

United Nation (UN) Millennium Summit 2000, 191 countries<br />

adopted the Millennium declaration. Information and<br />

Communication Technology (ICT) supported E-Governance is a<br />

critical element in achieving MDGs. National E-Governance<br />

strategies have hastened ICT interventions. Recent global<br />

assessments on MDGs suggest that though many countries have<br />

shown noticeable results in meeting MDGs with scope for<br />

supporting sustainable development strategies. In this paper, it is<br />

posited that efforts to meet MDGs in India need to have<br />

converged efforts at the village levels. This is desired because<br />

local development processes are likely to influence the national<br />

agenda. Village households being units of development processes<br />

need to understand the contours of MDGs and its effects in lives<br />

of the household. Use of E-governance supported services by<br />

these units for meeting MDGs has influences to meet sustainable<br />

development of the households. This paper includes studies in<br />

some sample villages in the state of Gujarat to examine the effects<br />

of E-Governance in meeting MDGs and sustainable development.<br />

It discusses the process of convergence and contributions of E-<br />

Governance services to meet MDG agenda and overall sustainable<br />

development.<br />

Categories and Subject Descriptors<br />

H5.2. [Information Systems]: Information Interfaces and<br />

Presentation- User Interfaces Evaluation/Methodology, Theory<br />

and Methods.D4.8. [Software Engineering Performance]:<br />

Measurement, Modeling and Prediction.<br />

General Terms<br />

Management, Measurement, Documentation, Performance,<br />

Design, Experimentation, Human Factors, Theory, Verification.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Harekrishna Misra<br />

Institute of Rural Management Anand<br />

Anand, Gujarat, India<br />

91-2692-221612<br />

hkmishra@irma.ac.in<br />

354<br />

Keywords<br />

ICT for Development, E-Governance, Millennium Development<br />

Goals, Modeling Convergence, Sustainable Development, Citizen<br />

Centered Services<br />

1. INTRODUCTION<br />

MDG is considered as an important agenda for the United Nations<br />

(UN) with the aim to address poverty reduction globally. UN, in<br />

its Millennium Summit in the year 2000, resolved to acknowledge<br />

poverty as a global phenomenon. MDG having a set of eight goals<br />

aims to achieve targeted objectives by the year 2015 and<br />

recognizes inter-twined relationships among all these goals in<br />

order to foster sustainable development. UN, in its declaration,<br />

aims to address two major dimensions. One of the dimensions is<br />

to have commitment of developed nations to extend increased<br />

Official Development Assistance (ODA) with better export<br />

market for developing nations. The second dimension is to ensure<br />

that each developing nation has its own national policy with the<br />

objective to reduce the gap between goals and achievements<br />

[41],[42],[43],[33]. While the deadline for achieving MDG is fast<br />

approaching, the results of the planned activities under UN’s<br />

mandate are found to be discouraging and all the member<br />

countries are showing mixed results across all the eight goals.<br />

ODA has reduced over the years and the assistance has so far been<br />

0.31 percent of the Gross National Income against the UN’s target<br />

of 0.7 percent [44],[40],[39]. As regards role of E-Governance for<br />

development with specific reference to MDG, goal 8F suggests<br />

effective inclusion of ICT as component for the development<br />

process. While recognizing the progress in embracing E-<br />

Governance among all participating nations, UN acknowledges<br />

the persistence of digital divides in the form of affordability,<br />

access to technology, usage and usability of the services rendered.<br />

However, most of the countries have shown considerable progress<br />

in establishing ICT infrastructure and services to implement E-<br />

Governance strategies. World Summit on the Information Society<br />

(WSIS) have acknowledged the impact of E-Governance on the<br />

development and suggested a ten-point agenda for ICT related<br />

interventions for supporting sustainable development and achieve<br />

committed targets by the year 2015 [14],[15],[37],[38],[36]. In<br />

real terms MDG has not been able to focus on the role of ICT to<br />

ensure that all the goals are inter-twined for a converged effect on<br />

sustainable development.<br />

ICT for development globally has shown mixed results despite<br />

wider deployment and acceptance of E-Governance services[4].<br />

The core area of successful ICT enabled development processes<br />

has been limited to E-Governance efforts with direct support to


many of the MDGs. The direct impact has been in the form of<br />

establishing ICT infrastructure, networks among governments and<br />

access to telephony, television and other modes of<br />

communication. Despite mixed results, most of the countries have<br />

incubated E-Governance projects with the active participation of<br />

entrepreneurs from public, private and civil society organizations<br />

[3],[28],[14]. E-Governance projects are quite complex in nature<br />

due to the inherent characteristics of the development process<br />

involving government, society, citizen, market and business<br />

issues. Thus there is a need for understanding this complex<br />

phenomenon of convergence among various stakeholders<br />

involved in the development process so that citizens accept this<br />

new environment for fostering the development of their own life<br />

and the society as envisaged in MDGs and meeting sustainable<br />

development challenges.<br />

The paper is organized with the objectives of understanding the<br />

reasons for having mixed results despite clearly defined MDGs,<br />

and growth in E-Governance services. It also explores the effects<br />

of e-readiness for each of the MDGs based on primary surveys,<br />

their influences on overall sustainable development indicators.<br />

Organization of the paper is as follows. In section two, MDGs and<br />

E-Governance are discussed in order to establish proposed<br />

causality in achieving MDGs with support of E-Governance. In<br />

this section global perspectives are presented with specific<br />

references to Indian scenarios. This section includes discussions<br />

on sustainable development and possible roles of E-Governance<br />

and MDGs. In section three, research motivations are discussed to<br />

present the contributions of E-Governance services to achieve<br />

MDGs and overall sustainable development in local context. In<br />

section four, research methods are discussed to establish the<br />

proposed causality among various contributors to the overall<br />

success of MDGs. A research model is also developed to assess<br />

the contributing factors of E-Governance to achieve MDGs and<br />

overall sustainable development. Hypotheses are developed in this<br />

section to present various dimensions of the causality including<br />

the approach for their validations. In section five, data collection<br />

processes are discussed and analyses are presented. In section six,<br />

conclusions are discussed. In section seven limitations of the work<br />

and scope for further studies in this area are discussed.<br />

2. RESEARCH MOTIVATION<br />

As discussed in the introduction section, MDGs are now<br />

embedded in the policies of the member countries. Goal 8F of<br />

MDG recognizes the importance of E-Governance in meeting<br />

various objectives set in the MDG. In order to bring in more<br />

clarity in adopting E-Governance strategies for development<br />

WSIS has provided ten goals for the member countries<br />

[33],[10],[15]. In this section a link between MDG and E-<br />

Governance with WSIS agenda in the backdrop is discussed. In<br />

table 1 below agenda of WSIS and MDG goals with E-<br />

Governance focus are presented.<br />

Table 1. MDG and E-Governance Deliveries [15],[19],[26]<br />

MDG Goals Expected E-Governance Interventions<br />

1.Eradicate<br />

extreme<br />

poverty and<br />

hunger<br />

2.Achieve<br />

universal<br />

WSIS MDGs<br />

Connect Villages with<br />

e-services and establish<br />

access points<br />

Connect Universities,<br />

Colleges, Secondary<br />

Rise in individual<br />

income with eservices<br />

Increase supply of<br />

e-services of<br />

355<br />

MDG Goals Expected E-Governance Interventions<br />

primary<br />

education<br />

3.Promote<br />

gender<br />

equality and<br />

empower<br />

women<br />

4.Reduce<br />

child<br />

mortality<br />

5.Improve<br />

maternal<br />

health<br />

6.Combat<br />

HIV/AIDS,<br />

malaria, and<br />

other diseases<br />

7.Ensure<br />

environmental<br />

sustainability<br />

8.Develop a<br />

global<br />

partnership<br />

for<br />

development<br />

WSIS MDGs<br />

and Primary Schools,<br />

Public Libraries,<br />

Scientific and Research<br />

Centres<br />

World’s population<br />

should have access to<br />

Television and Radio,<br />

facilitate use of eservices<br />

to have<br />

information on internet<br />

in local languages<br />

trained teachers,<br />

establish networks<br />

among teachers,<br />

internet<br />

connectivity in<br />

schools, improved<br />

student/computer<br />

ratio; distance<br />

learning<br />

Focus on e-literacy<br />

among girls, adopt<br />

e-communication<br />

to encourage<br />

women to<br />

contribute to the<br />

society<br />

Increase in use of e-services by Health<br />

Workers, increase in awareness<br />

Enhance accessibility to specialists by village<br />

health workers through remote access, training<br />

through e-services<br />

Increase in use of e-services by Health<br />

Workers, increase in awareness<br />

Use of GIS and Remote Sensing Technologies<br />

enabled e-services, maintain transparency<br />

Ensure that World’s<br />

population have<br />

access to ICT<br />

Currency in<br />

databases, networks<br />

WSIS though has not been specific in setting the agenda for ICT<br />

interventions for implementing the MDGs (Goals 4,5,6,7), there<br />

are continued efforts in these areas. As per the predictions of<br />

WSIS, ICT interventions would be quite significant in the areas of<br />

mobile communications, basic radio and television services by the<br />

year 2015. Progress in the areas related to e-governments has also<br />

been quite reasonable as per WSIS study. But as per WSIS, the<br />

barriers for larger use ICT would be in the form of availability of<br />

electricity and internet. UN’s MDG report for the year 2010<br />

indicates that due to targeted interventions with sustained effort<br />

through political and administrative (including funding) support,<br />

there are significant progresses in achieving MDGs. However,<br />

many important goals are still unmet for the poor, living in remote<br />

areas, and the progress has been uneven. More importantly the<br />

report recognizes that gender inequality and women<br />

empowerment concerns are not adequately addressed which are<br />

preconditions for overcoming poverty, hunger and disease<br />

[1],[31],[30],[29].<br />

Linking E-Governance services to achieve MDGs is not a new<br />

approach [1],[29],[11]. While addressing the challenges for<br />

linking E-Governance with MDGs, UN has accepted various<br />

dimensions related to measurements including impact, policy<br />

development, resource mobilization, global alliance and initiatives


[43],[44]. E-governance at the national level has now progressed<br />

for supporting MDGs either directly or indirectly. Every nation<br />

now has adequate plans to display its e-readiness and has<br />

strategies to support the MDGs effectively [32]. It is thus<br />

imperative that each MDG needs to be assessed in terms of the<br />

contributions of E-Governance in meeting the agenda across all<br />

the levels of governance with adequate focus at the local level. In<br />

Indian context, this is more relevant as part of the development<br />

process because of the fact that local development has larger<br />

ramifications in meeting the national goals [29].<br />

Sustainable development strategies are constantly focusing on<br />

MDGs [12],[10]. E-Governance strategies are also being termed<br />

as effective contributors to sustainable development.<br />

Measurements of sustainable development and assessment of<br />

critical success factors of MDGs provide common base for<br />

understanding readiness of a nation to address sustainable<br />

development with social, economic and ecological dimensions. In<br />

this paper assessment of causality for achieving successful MDGs<br />

through E-Governance is explored. It considers dimensions<br />

related to sustainable development as important contributors. In<br />

Table 2 below the stated dimensions are related to the E-<br />

Governance readiness indicators with specific relationships with<br />

MDGs[19].<br />

Table 2. MDG and E-Governance Readiness<br />

MDG Goals E-Governance Readiness<br />

Indicators<br />

1.Eradicate<br />

extreme<br />

poverty and<br />

hunger<br />

2.Achieve<br />

universal<br />

primary<br />

education<br />

3.Promote<br />

gender<br />

equality and<br />

empower<br />

women<br />

4.Reduce<br />

child<br />

mortality<br />

5.Improve<br />

maternal<br />

health<br />

6.Combat<br />

HIV/AIDS,<br />

malaria, and<br />

other diseases<br />

7.Ensure<br />

environmental<br />

sustainability<br />

8.Develop a<br />

global<br />

partnership<br />

for<br />

development<br />

Government E-Readiness to<br />

provide support for<br />

economic issues at the local<br />

level. This readiness<br />

indicates citizens’ readiness<br />

to achieve higher income<br />

through better education,<br />

skills, reduction in<br />

information asymmetry,<br />

information on market<br />

Government E-Readiness to<br />

socially network the<br />

community, enhance<br />

awareness among women<br />

with multi-media services<br />

Government E-Readiness to<br />

network the community,<br />

enhance awareness and<br />

provide inputs to the citizens<br />

to use natural resources<br />

effectively with holistic<br />

environmental considerations<br />

Sustainable<br />

Development<br />

Dimensions<br />

Economic<br />

Social<br />

Environmental<br />

356<br />

Global readiness reports on E-Governance have maintained that<br />

national E-Governance efforts are likely to bring in the desired<br />

effects in achieving sustainable development indicators [25],[23].<br />

2.1 Research Model and Hypotheses<br />

Sustainable development is a complex and multifaceted issue that<br />

has been challenging each and every nation [12]. Various attempts<br />

are made to attain this through MDGs and there are various<br />

instruments used to assess the level of attainment of these goals.<br />

National E-Governance readiness for each nation has been a<br />

routine phenomenon that showcases readiness of each nation with<br />

benchmarking to provide insights to the efforts being made for<br />

attaining sustainable development goals though ICT interventions<br />

[14],[15]. These efforts, especially in the context of India, need to<br />

examine the causal relations among E-Governance readiness and<br />

sustainable development.<br />

This research includes assessment of following relationships:<br />

1. Contributions of E-Governance services in the village can be<br />

used for assessment of e-readiness to meet the MDGs.<br />

It is argued that e-readiness (excluding ICT infrastructure<br />

readiness which is a subset of overall e-readiness) is made<br />

available through E-Governance services. Such services need to<br />

be designed with active collaborations of citizens.<br />

2. E-readiness to support MDGs is likely to contribute to the<br />

empowerment of the village households for meeting sustainable<br />

development indicators in the village.<br />

It is argued that MDGs need to direct E-Governance services at all<br />

levels of the nation. This would facilitate creation of success<br />

factors for the E-Governance services provided. In absence of<br />

such directed efforts e-readiness may get limited to establishment<br />

of IT infrastructures.<br />

In order to answer the research questions some research<br />

hypotheses are proposed as discussed below. These hypotheses<br />

are leveled in three tiers.<br />

Tier-I Hypothesis: In Figure 1 the first hypothesis is presented. It<br />

posits that every goal under MDG at the local level is influenced<br />

collectively by the citizens, community groups and government<br />

agencies.<br />

H1<br />

Household<br />

Affinity<br />

Community<br />

Affinity<br />

Government<br />

Support<br />

MDG #<br />

Figure 1. MDG and Stakeholders<br />

Tier-I includes collective contributions from the local level<br />

citizens, community groups to successfully meet the MDGs. It is


strongly believed that local governance has far reaching effects at<br />

the national level in terms of sustainable development [21]. This<br />

is quite significant because of the local self governance in India<br />

has provided the rights to use and develop local resources for<br />

development. Government agencies are responsible to these local<br />

empowered agencies and extend support in terms of awareness,<br />

expertise and finance development interventions. Collective effort<br />

is therefore, essential to attain MDGs. It is because successful<br />

development process needs collective efforts from the planners<br />

and mediating agencies and the citizens [20],[42]. In such<br />

scenarios, the contributions are multilevel oriented and therefore,<br />

predictability of their contributions will be influenced by<br />

collective participation [20],[1].<br />

Hypothesis H1. Citizens, Community Groups, Government<br />

Agencies contribute collectively to the success of MDGs<br />

Tier-II Hypotheses: E-governance readiness is a major contributor<br />

to each and every MDG due to the enormous benefits of ICT<br />

envisaged in the MDG agenda. E-Governance aims to bring<br />

appropriate services closer to the citizens with optimized cost,<br />

time and relevance [1], [19], [3]. Thus it is important to find the<br />

causal effects of E-Governance efforts and their contributions to<br />

the MDGs. In order to measure this effect, it is posited that E-<br />

Governance supported efforts for MDGs are reflected through<br />

display of readiness across all the dimensions of sustainable<br />

development. It is also considered important that group of MDGs<br />

are likely to support a particular dimension of readiness for<br />

sustainable development. There is a continuous process adopted<br />

by World Bank, World Economic Forum through INSEAD and<br />

ITU etc. to look at the progress done in the areas of e-readiness. In<br />

Figure 2 below India’s position on e-readiness (reports of<br />

INSEAD are used here) is presented [2],[35]. This e-readiness<br />

exercise provides comprehensive analyses on various metrics<br />

driven performance assessment (termed as indices) of various<br />

countries participating in the process. Major indices which are<br />

presented in Figure 2 reflect the ICT adoption behaviour in India<br />

vis-à-vis global scenarios [6],[7],[8],[9]. Indices used in this<br />

assessment provide a percentile score. A higher percentile<br />

provides better status for the country. The percentiles are<br />

presented longitudinally by using data of INSEAD since the year<br />

2002. It may be noted that these e-readiness assessment<br />

indicators are useful to evaluate the role of E-Governance in<br />

meeting MDGs.<br />

Figure 2. ICT Indices for India [2]<br />

Eight MDGs envisaged for improving the quality of life of people<br />

in member countries are grouped as presented in Figure 2 and in<br />

the following manner. MDG#1 and MDG#2 are related to ereadiness<br />

for rendering services related information, optimizing<br />

cost and time of availing information on income generation<br />

opportunities, enhancing skills through education, government’s<br />

effort to use ICTs for providing networks among wage earners,<br />

357<br />

schemes for income opportunities and providing transparency in<br />

such processes. In India there are many E-Governance initiates<br />

aimed at all these defined areas of interventions including Unique<br />

Identification Authority of India (UIDAI) [35]. MDGs# 3,4,5,6<br />

relate to social issues which reflect in gender inequity, women<br />

health, HIV etc. In India, this is quite challenging because of<br />

various social, cultural and infrastructural issues [31]. It is noted<br />

that despite improvements in health services including National<br />

Aids Control Programme, National Rural Health Mission, rural<br />

India in particular is not recording encouraging results as per<br />

MDG reports [27],[29]. It is thus posited that social empowerment<br />

can be measured through e-readiness to support MDG#3,4,5,6.<br />

MDG<br />

#8<br />

MDG #7<br />

MDG #6<br />

MDG #5<br />

MDG #4<br />

MDG #3<br />

MDG #2<br />

MDG #1<br />

Figure 3. MDG and E-Readiness<br />

MDGs#7,8 encompass larger issues related to environment. In<br />

India e-readiness to support this cause needs active interfaces with<br />

networks, and awareness among the rural citizens. It is posited<br />

that role of E-Governance in these areas is expected to enhance<br />

the e-readiness in managing environment. In Table 3 various E-<br />

Governance programs are planned to meet the MDG agenda.<br />

Table 3: E-Governance Programmes in India [5],[6],[7]<br />

MMP Level Description of the Service<br />

Central Government Income Tax, Central Excise,<br />

Passports/Visa & Immigration, MCA<br />

21, National ID, Pensions, Banking,<br />

Insurance<br />

State Governments<br />

H23<br />

H22<br />

H21<br />

E-Readiness -<br />

Environment<br />

E-Readiness -<br />

Social<br />

Empowerment<br />

E-Readiness -<br />

Economic<br />

Empowerment<br />

H3<br />

Sustainable<br />

Developmen<br />

t<br />

Agriculture, Land Records, Transport,<br />

Treasuries, Commercial Taxes, Gram<br />

Panchayats, e-Health, Registration,<br />

Police, Employment Exchange, e-<br />

Districts (State can add 5 MMPs as


MMP Level Description of the Service<br />

Integrated<br />

per their choice)<br />

e-Business, Electronic Data<br />

Interchange, India Portal, Electronic<br />

Government Gateway, E-Courts, E-<br />

Office, E Procurement<br />

Hypotheses H2 in Tier-II includes e-readiness assessment of three<br />

dimensions of sustainable development with the considerations<br />

that MDGs need to harness the goals with active support of ICTs<br />

and E-Governance services in order to attain the objectives of<br />

sustainable development [6],[7],[8],[13]. Sustainable development<br />

requires holistic approach and thus there is a need to assess the<br />

strengths of E-Governance in meeting social, economic and<br />

environmental needs [19]. In the process, H2 posits three subhypotheses<br />

as follows:<br />

Hypothesis H21: E-Governance services available for MDG#1<br />

and MDG#2 collectively contribute to E-Readiness for Economic<br />

Empowerment<br />

Hypothesis H22: E-Governance services available for MDG#3,<br />

MDG#4, MDG#5, MDG#6 collectively contribute to E-Readiness<br />

for Social Empowerment<br />

Hypothesis H23: E-Governance services available for MDG#7,<br />

MDG#8 collectively contribute to E-Readiness for Environment<br />

In these hypotheses E-Readiness for Economic Empowerment,<br />

Social Empowerment and Environment are the latent variables<br />

which are measured through the contributions of the ICT enabled<br />

services for MDGs.<br />

Lastly in these Tier II hypotheses, it is posited that MDGs need to<br />

contribute to the overall sustainable goals in India and this is<br />

possible because of the sustainable development at the local levels<br />

[11],[12].<br />

Hypothesis H3: E-Readiness for Economic Empowerment,<br />

Social Empowerment and Environment collectively contribute to<br />

Sustainable Development.<br />

3. EMPIRICAL VALIDATION OF THE<br />

MODELLING<br />

This study involved primary survey among rural citizens, rural<br />

communities and government agencies who are major<br />

stakeholders in supporting MDGs. For the purpose some villages<br />

in the state of Gujarat were considered for pilot studies. The<br />

sample size was 194. This includes 24 government<br />

representatives, 52 village community members and 118 village<br />

citizens in eight sample villages in the district of Panchmahals in<br />

the state of Gujarat. This number was arrived during visits to eight<br />

villages where access could be possible due to the support from<br />

government officials and intervening agencies. In Figure 4<br />

sampling frame is presented.<br />

358<br />

Figure 4. Sampling Frame<br />

3.1 Validation of Tier-I Hypothesis<br />

The sampling indicates that samples are multi leveled and thus<br />

their collective orientation in assessing MDGs would be<br />

beneficial. In reality villagers, village community groups and<br />

government representatives are not same in numbers and their<br />

strength varies in the shape of a pyramid. Due to this structure of<br />

population, stratified layering of the sample respondents and<br />

divergence in their objectives in contributing to MDGs, dummy<br />

coding principle was chosen to validate the collective<br />

contributions [24]. In dummy coding one of the major<br />

considerations is to identify the controlling variable in the<br />

stratified layers. In this case, citizens are considered as the<br />

controlling variables because their contributions are deterministic<br />

for the success of MDGs. Communities and government<br />

representatives are mostly characterized as service provisioning<br />

and supporting agencies for overall progress of the citizens.<br />

Besides, citizen empowerment is quite critical in managing<br />

MDGs. Validations for H1 include dummy coding and ANOVA<br />

to predict the overall contributions through Dunnet values which<br />

is used for dummy coding [18]. For each MDG this validation<br />

procedure is adopted and in Table 4, variables and related<br />

measurement instruments are presented.<br />

Table 4: Variable Descriptions, Measurement Instruments<br />

Goal Variables Measurements<br />

1<br />

N=194<br />

Community<br />

Affinity<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

Community groups are using ICT to<br />

share information on Income generation<br />

Community groups are using ICT for<br />

networks<br />

Community groups have influence on<br />

Individuals<br />

Government representatives are using<br />

ICT to share information on Income<br />

generation<br />

ICT has enhanced transparency in<br />

getting wages<br />

Internet is available in village<br />

Information is useful<br />

Information is available on Mobile<br />

ICT has enhanced transparency in


Goal Variables Measurements<br />

2<br />

3<br />

Community<br />

Affinity<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

Community<br />

Affinity<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

4 Community<br />

Affinity<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

5 Community<br />

Support<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

6 Community<br />

Affinity<br />

getting wages<br />

Possibility has increased to enhance<br />

skill through ICT<br />

Parents are sending children to schools<br />

Community groups are using ICT to<br />

share information<br />

Community groups influence child<br />

education<br />

Availability of computers in schools<br />

Availability of internet in schools<br />

Teachers get support from teachers<br />

from other schools through computers<br />

Teachers get support for using library<br />

through internet<br />

Students are using computers<br />

Government representatives are using<br />

ICT to share information<br />

Availability of Teachers in the Schools<br />

Teachers are trained to teach ICT<br />

based courses<br />

Households are interested in ICT based<br />

education<br />

Community groups are using ICT to<br />

share information<br />

Volunteers are using ICT to share<br />

information<br />

Computers have local language<br />

interfaces<br />

Government representatives/volunteers<br />

are using ICT to share information<br />

Girls are using computers<br />

Broadcast media are used for<br />

disseminating information<br />

Community groups are using ICT to<br />

share information<br />

Health workers are using ICT to<br />

network with doctors and other<br />

agencies<br />

Government representatives/volunteers<br />

are using ICT to share information<br />

Information on child care is available<br />

Broadcast media are used for<br />

disseminating information<br />

Community groups are using ICT to<br />

share information<br />

Health workers are using ICT to<br />

network with doctors and other<br />

agencies<br />

Government representatives/volunteers<br />

are using ICT to share information<br />

Information on maternal care is<br />

available<br />

Broadcast media are used for<br />

disseminating information<br />

Community groups are using ICT to<br />

share information<br />

359<br />

Goal Variables Measurements<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

7 Community<br />

Affinity<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

8 Community<br />

Affinity<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

Health workers are using ICT to<br />

network with doctors and other<br />

agencies<br />

Government representatives/volunteers<br />

are using ICT to share information<br />

Information on HIV/AIDS care is<br />

available<br />

Broadcast media are used for<br />

disseminating information<br />

Community groups are using ICT to<br />

share information<br />

Government Representatives/<br />

volunteers are using ICT to share<br />

information<br />

Households are using ICT to remain<br />

aware of environmental issues<br />

Broadcast media are used for<br />

disseminating information<br />

ICT enabled Library and information<br />

services are available in the village<br />

Community groups are using ICT to<br />

share information<br />

Government representatives/volunteers<br />

are using ICT to share information<br />

Village has ICT enabled networks with<br />

other villages<br />

Broadcast media are used for<br />

disseminating information<br />

The measurement instruments are used with the help of Likert<br />

Scales in a five point scale (1- strongly unsatisfactory…., 5strongly<br />

satisfactory) [22]. In Table 5 below, a generic example of<br />

dummy coding structure is presented as applicable to MDG#1.<br />

Explanation of the Table is as follows. It is argued that households<br />

(citizens) control the overall objectives of MDGs. MDG#1 as<br />

explained in Table 5 below is the mean of the responses obtained<br />

from the subjects through Likert scale. This summative nature of<br />

Likert scale is used since all the independent items are proved to<br />

be reliable and are not mostly non-dimensional (Nunnally,1978).<br />

The purpose of dummy coding is to understand whether<br />

collectively respondents across the three layers (strategic, tactical<br />

and operational) do collectively display their holistic<br />

understanding in projecting preparedness as hypothesized as<br />

MDG#1. D1 and D2 are two dummy coded vectors associated<br />

with each group. In this case there are three independent groups<br />

for predicting validations of MDG#1 i.e. MDG#1Community Affinity,<br />

MDG#1Governmnet Support and MDG#1Household Affinity. As per dummy<br />

coding procedures, vectors are to be identified which is n-1 (i.e., if<br />

number of groups are 3, number of vectors would be 2). In this<br />

case number of groups are 3. Out of two vectors one vector in a<br />

group is assigned “1” whereas other vector is assigned “0”. All the<br />

vectors in one group are assigned with “0” which is termed as<br />

control group. For example, MDG#1Household Affinity, (MDG# 1) has<br />

three contributors i.e, Community Affinity (with 2 instruments (j))<br />

and position in the dummy table is 1 (i). Thus MDG#1 is thus<br />

∑MDG1ij /n where n=2 in this case. Likert values will have their<br />

mean which is dependent on number of measurement instruments<br />

used. MDG#1 will have sample response mean.


Stratified<br />

Layers<br />

Community<br />

Affinity<br />

E-Governance<br />

Support<br />

Household<br />

Affinity<br />

(Control)<br />

Table 5: Dummy Table for MDG#1 (sample data)<br />

Sample<br />

Size*<br />

(n)<br />

MDG# 1<br />

Objectives<br />

52 (Mean<br />

3.16, SD<br />

0.81,<br />

Cronbach<br />

Alpha<br />

0.719)<br />

24 (Mean<br />

3.14, SD<br />

0.86,<br />

Cronbach<br />

Alpha<br />

0.716)<br />

118 (Mean<br />

3.11, SD<br />

0.76,<br />

Cronbach<br />

Alpha 0.65)<br />

Dummy<br />

Code<br />

(D1)<br />

Dummy<br />

Code<br />

(D2)<br />

Remarks<br />

1 0 MDG1 =<br />

∑MDG1ij<br />

/n; i=1, j=n<br />

0 1 MDG1 =<br />

∑MDG1ij<br />

/n; i=1, j=n<br />

0 0 MDG1 =<br />

∑MDG1ij/n;<br />

i=1, j=n<br />

*N=194<br />

In Table 6 below the F-Test and other relevant results for MDG#1 are<br />

presented.<br />

Table 6: F-Statistics for MDG#1 through Dummy Coding (ANOVA)<br />

Sum of df Mean Square F- Sig.<br />

Squares<br />

Statistics<br />

a<br />

Regression 1.304 2 .652 3.194 .046<br />

Residual 19.193 191 .204<br />

Total 20.497 193<br />

N=194<br />

The major contributor for this regression is the F-Statistics which is<br />

observed as 3.914 and is above the desired value of 2.3 [18]. Thus the<br />

hypothesis H1 for MDG#1 is validated in favour of collectively predicting<br />

contributions of E-Governance in achieving MDG#1. In Table 7 below<br />

results for all the MDGs are presented.<br />

Table 7: F-Statistics for al MDGS through Dummy Coding<br />

MDG# F-Statistics<br />

(Observed)<br />

F-Statistics<br />

(Expected)<br />

1 3.194 2.3 .046<br />

2 6.574 2.3 .002<br />

3 25.925 2.3 .000<br />

4 8.524 2.3 .000<br />

5 10.694 2.3 .000<br />

6 4.807 2.3 .010<br />

7 18.516 2.3 .000<br />

8 10.053 2.3 .002<br />

N=194<br />

Significance<br />

(P-Value)<br />

360<br />

It may be noted here that results available through F-Statistics for all the<br />

MDGs supported hypothesis H1. Barring MDG#1 and MDG#6 where pvalues<br />

were statistically significant with more than 1 percent, all other<br />

MDGs predicted affirmatively the collective contributions of E-<br />

Governance services. It implies that households, community groups and<br />

government representatives collectively contribute to meet the MDGs with<br />

E-Governance support.<br />

3.2 Validation of Tier-II Hypotheses<br />

Hypotheses defined in Tier II i.e., H2 and H3; deal with latent<br />

variables in order to validate contributions of MDGs for attaining<br />

overall sustainable development. Dealing with latent variables to<br />

predict complex phenomena requires careful theoretical modeling.<br />

Theoretical models and their validations are restricted to depict<br />

behavior of the constructs through approximations. Virtually in all<br />

cases we do not expect to have a completely accurate description<br />

of reality. If the model helps us to understand the relations<br />

between variables matching (fitting) the data, we may judge it (the<br />

model) as validated [16],[17]. It is known that model tries to<br />

approximate the reality. During the validation process it is<br />

essential to understand the relationship among the variables<br />

governing the outcome of the proposed model. Adequacy of a<br />

model is typically determined using conceptual definitions of the<br />

unobserved (endogenous) variables, along with observed variables<br />

(exogenous). Increasingly, model-to-data fit and parameter<br />

estimates form measurement models that utilize structural<br />

equation analysis are being pursued. Model-to-data fit and<br />

parameter estimates are derived from the hypotheses and from<br />

structural models utilizing structural equation analysis. For<br />

theoretical model testing researchers tend to agree that specifying<br />

and testing models using unobserved variables with multiple item<br />

measures of these unobserved variables (endogenous) and survey<br />

data involves: i) defining model constructs, ii) stating<br />

relationships among these constructs, iii) developing appropriate<br />

measures of these constructs, iv) gathering data using these<br />

measures, v) validating these measures, and vi) validating the<br />

model (i.e., testing the stated relationships among the constructs)<br />

[16].<br />

In the case of validating Tier-II hypotheses, Structural Equation<br />

Modelling (SEM) is adopted using LISEL 8.8[17]. In Table 8<br />

constructs are presented with their role on the model proposed in<br />

Figure 3.<br />

Table 8. Variables Used for the Model<br />

Hypothesis Variables<br />

Endogenous Exogenous<br />

H21 MDG#1 E-Readiness -<br />

MDG#2<br />

Economic<br />

Empowerment(ErEco)<br />

H22 MDG#3 E-Readiness - Social<br />

MDG#4<br />

MDG#5<br />

MDG#6<br />

Empowerment(ErSoc)<br />

H23 MDG#7 E-Readiness -<br />

MDG#8<br />

Environment(ErEnv)<br />

H3 E-Readiness - Economic Sustainable<br />

Empowerment (ErEco) Development<br />

E-Readiness - Social<br />

Empowerment(ErSoc)<br />

E-Readiness –<br />

Environment(ErEnv)<br />

(MDG_Ready)


Hypothesis Variables<br />

Endogenous Exogenous<br />

H3 Social Development Sustainable<br />

Economic Development<br />

Environmental<br />

Sustainability<br />

Development<br />

(MDG_Ready)<br />

The model considered H3 as an important contributor to assess<br />

successful E-Governance services adoption for achieving MDGs.<br />

Figure 5. The Observed Model (Path Diagram using LISREL 8.8)<br />

It is posited that sustainable development needs to be pursued<br />

notwithstanding the adoption of MDGs listed in national agenda.<br />

Sustainable development is argued to have three major<br />

dimensions and rural India needs careful interventions to achieve<br />

them. In this research work, hypothesis H3 therefore, considers it<br />

important to include empowerment of citizens through economic,<br />

social and environmental dimensions.<br />

Table 9: Testing of Hypotheses proposed through the Model<br />

Hypothesis Path<br />

Coefficient<br />

T-<br />

Statistics*<br />

Remarks<br />

H21 0.35 16.27 Path coefficient is positive<br />

and t-statistics is<br />

0.35 16.37<br />

significant, Hypothesis<br />

H21 is validated<br />

H22 0.22 9.02 Path coefficient is positive<br />

and t-statistics is<br />

0.24 10.34 significant, Hypothesis<br />

H22 is validated<br />

0.31 11.94<br />

0.25 10.25<br />

H23 0.13 2.62 Path coefficient is positive<br />

and t-statistics is<br />

0.19 2.83 significant, Hypothesis<br />

H23 is validated<br />

H3 0.92 0.38 Path coefficient is positive<br />

-0.25 0.22<br />

except in the case of<br />

Environment where the<br />

0.36 1.61<br />

coefficient is negative and<br />

t-statistics is significant,<br />

0.48 13.91 Hypothesis H3 is not<br />

validated<br />

0.46 19.06<br />

361<br />

Hypothesis Path<br />

* p < 0.05<br />

Coefficient<br />

T-<br />

Statistics*<br />

0.48 20.82<br />

Remarks<br />

It may be noted here that H3 has been negatively influenced by<br />

the environmental factors. It means that e-readiness is not<br />

encouraging in the areas of environmental empowerment in the<br />

levels of households, communities and government agencies.<br />

Other hypotheses in Tier-II have shown positive contributors for<br />

attaining overall sustainable development. The overall model<br />

fitness exercise has generated following structural equation:<br />

MDG_Ready = 0.36*ErSoc -0.25*ErEnv+0.92*ErEco,<br />

Errorvariance = 0.033, R² = 0.97 ----------------------------(1)<br />

This equation (1) explains the relationship between Dependent<br />

Exogenous Variable “MDG_Ready” (Overall e-Readiness of<br />

MDG) and the Endogenous Variables “ErSoc”(contributions of<br />

e-Readiness to Social empowerment), “ErEco”(contributions of<br />

e-Readiness to Economic empowerment) and<br />

“ErEnv”(contributions of e-Readiness to support Environmental<br />

empowerment). This structural equation with R 2 of 0.97 has<br />

indicated a “good fit” [16],[34] and with less error variance of<br />

0.033. It implies that MDG readiness with E-Governance as a<br />

component is influenced by the E-Governance services aimed at<br />

social, economic and environmental issues. It is important to note<br />

that the structural equation showed a negative contributions of E-<br />

Governance services for ensuring environmental sustainability.<br />

This denotes that there is enough scope for policy makers to<br />

prioritize E-Governance efforts in this direction. As regards<br />

contributions of E-Governance services in other two dimensions<br />

of sustainable development, most of the contributions are towards<br />

economic empowerment (0.92) followed by social empowerment<br />

(0.36).<br />

Further analysis on overall readiness of MDG driven sustainable<br />

development “MDG_Ready” indicates that respondents have<br />

indicated almost equal concerns for e-Readiness across all the<br />

three sustainable development dimensions (Economic 0.48, Social<br />

0.46 and environmnet0.48). This implies there is scope for<br />

establishing ever increasing role of E-Governance services in<br />

attaining MDGs for sustainable development.<br />

4. CONCLUSION AND FURTHER<br />

RESEARCH<br />

MDGs are expected to achieve its targets with active<br />

collaborations of the citizens, government agencies and other<br />

stakeholders. E-Governance services are aimed at providing the<br />

basis of networking among stakeholders, and providing desired<br />

information and services to the citizens. This scenario, particularly<br />

in the rural environment and in developing countries, is a<br />

necessity in which E-Governance services are made available with<br />

optimized cost, time, and latency. In this research, it is posited and<br />

proved that collaborative efforts are possible through ICT enabled<br />

E-Governance services. It is also shown that E-Readiness needs to<br />

be assessed at the local level to achieve MDGs in a nation like<br />

India. Besides, MDGs need to extend its purviews to support<br />

sustainable development and thus overall effort is to be made to<br />

empower local level entities including citizens to contribute to this<br />

cause.


Global perspectives in providing E-Governance services for<br />

development indicate that e-readiness for India is of great concern<br />

and needs improvement in order to enhance its effectiveness.<br />

Most of e-readiness parameters assessed by the INSEAD indicate<br />

that the digital divide continues to exist despite improvements in<br />

many areas including individual readiness. However, analyses of<br />

the survey conducted in the sample eight villages in the district of<br />

Panchmahals in the state of Gujarat suggest that most people<br />

living in rural areas are yet to gain access to such services. Rural<br />

teledensity too is a prime concern in India despite mobile<br />

penetration having gone up. As regards services’ usage in India<br />

vis-à-vis global contexts as per INSEAD, India has not shown an<br />

encouraging performance and has been ranked low in all the areas<br />

including broadband services, bandwidth availability and network<br />

coverage etc. Thus it is important to note that there is a designreality<br />

gap in all the parameters that may be used to assess the role<br />

of E-Governance to support MDGs and sustainable development<br />

in Indian context. It is worth mentioning following statements<br />

that are relevant for Indian E-Governance and its role in<br />

supporting MDGs.<br />

“India lives in Villages”<br />

“ You must be the change you wish to see in the world”<br />

- Mahatma Gandhi<br />

“You have to decide whether development means affluence or<br />

whether development means peace, prosperity and happiness. “<br />

-Sunderlal Bahuguna<br />

“While the distribution of wealth and income need not be equal, it<br />

must be to everyone’s advantage, and at the same time, positions<br />

of authority must be accessible to all.”[27]<br />

It is imperative that MDGs in India need to ensure its<br />

contributions to sustainable development while making efforts to<br />

make quantifiable progress in achieving the goals. Role of E-<br />

Governance services needs to concentrate on bringing in<br />

transparency in government and governance while ensuring<br />

adequate measures in optimizing the costs and time for the<br />

citizens dwelling in the access layer of the governance. In India,<br />

people in this access layer form the core of the development<br />

process and they are poor. These people are still affected by the<br />

digital divides. In absence of an appropriate strategy to enforce<br />

convergence among E-Governance services and with an aim to<br />

empower people in access layer to collaborate, it would be<br />

difficult for India to have sustainable development despite<br />

improvements in MDGs.<br />

4.1 Limitations<br />

This research has several limitations. First, the research has been<br />

limited to a homogeneous sample of respondents in a particular<br />

district which does away with the scope for generalization. A<br />

larger number of samples need to be included covering diverge<br />

demographic areas with heterogeneity. Secondly, E-Governance<br />

services considered for the study are limited to government webaccess<br />

alone. Other sources like civil society and business<br />

organizations providing such services need to be included in order<br />

to make the analyses broad-based. Thirdly, User Centered Designs<br />

(UCD) are quite relevant in such studies to assess Quality of<br />

Services (QoS), cost and latency. These could not be assessed as<br />

most of these services are yet to be availed by the sample<br />

respondents. There is scope to include these dimensions while<br />

362<br />

validating the model (especially in capturing information needs of<br />

uses and their intentions to use E-Governance services).<br />

5. ACKNOWLEDGEMENTS<br />

The author acknowledges the support of the SDTT, Panchmahals<br />

District Collectorate and Panchmahals District Milk Cooperative<br />

Union for the successful conduct of the study.<br />

6. REFERENCES<br />

[1] Aisha Ghaus-Pasha, 2007, Governance for The Millennium<br />

Development Goals, International Journal of Information<br />

Technology and Knowledge Management, Volume 4, No. 1,<br />

pp. 119-124<br />

[2] Dutta, Soumitra, and Mia, Irene, 2011, The Global<br />

Information Technology Report, 2010-2011, INSEAD,<br />

World Economic Forum, Geneva.<br />

[3] European Union (EU),2007, “Inclusive e-Government:<br />

Survey of status and baseline activities”, European<br />

Commission, DG Information Society and Media, e-<br />

Government unit, December<br />

[4] Gilhooly, Denis, 2004, Mainstreaming Information &<br />

Communication Technologies for the Achievement of the<br />

Millennium Development Goals, Report UN ICT Task<br />

Force, Berlin, 18-20 November.<br />

[5] Government of Gujarat,2011, Gujarat Informatics Limited,<br />

Enabling e-Governance. url: www.gujaratinformatics.com.<br />

Accessed on 15.07.2011.<br />

[6] Government of India, 2007, Country Strategy Paper, 2007-<br />

2013, Planning Commission, New Delhi.<br />

[7] Government of India,2011, Agmarknet, A Step towards<br />

Globalization of Indian Agriculture, Ministry of Agriculture,<br />

New Delhi. url: www.agmarknet.nic.in accessed on<br />

15.07.2011.<br />

[8] Government of India,2011, National Informatics Center. url:<br />

ww.nic.in accessed on 15.07.2011<br />

[9] Government of India,2011, Saaransh, A Compendium of<br />

Mission Mode Projects under NeGP, Ministry of IT, New<br />

Delhi. url: http://www.mit.gov.in/content/mission-modeprojects<br />

accessed on 17.07.2011;<br />

http://www.mit.gov.in/sites/upload_files/dit/files/Compendiu<br />

m_FINAL_Version_220211.pdf accessed on. 14. 07.2011.<br />

[10] Heeks, R. and A. Molla,2009, “Impact Assessment of ICTfor-Development<br />

Projects: A Compendium of Approaches”,<br />

Working Paper 36, Institute for Development, Policy and<br />

Management (IDPM), University of Manchester.<br />

[11] IBRD, 2011, Improving the Odds of Achieving the MDGs<br />

Heterogeneity, Gaps, and Challenges, Global Monitoring<br />

Report, 1818 H Street NW Washington DC 20433<br />

[12] IISD, 1997, Assessing Sustainable Development, Principles<br />

in Practice, The International Institute for Sustainable<br />

Development, December, ISBN 1-895536-07-3<br />

[13] India Statistics , 2011, Revealing India Statically. url:<br />

www.indiastat.com. accessed on 14.07.2011.<br />

[14] International Telecommunication Union (ITU), 2010, World<br />

Telecommunication/ICT Development Report 2010,<br />

Monitoring the WSIS Target: A Mid Term Review, Geneva,<br />

Switzerland.<br />

[15] International Telecommunication Union, 2010. World<br />

Telecommunication/ICT Development Report 2010,<br />

Monitoring the WSIS Target: A Mid Term Review, Geneva,<br />

Switzerland.


[16] Joreskog, K.G., and Sorbom, D., (1989), LISREL 8:<br />

Structural Equation Modelling with SIMPLIS command<br />

Language, Hillsdale, NJ: Lwarence Associates.<br />

[17] Kline, R. B. (1998), Principles and Practice of Structural<br />

Equation Modeling, New York: The Guilford Press.<br />

[18] Mcliver, John P., and Carmines, Edward G., 1994,<br />

Unidimensional Scaling, International Handbook of<br />

Quantitative Applications in the Social Sciences, Volume 4,<br />

Sage Publications, London, UK,<br />

[19] Misra, H. K. 2012, Understanding ICT Enabled<br />

Development Interventions With MDG Perspectives in<br />

Indian Context : A Study in Panchmahal District, Working<br />

Paper 230, IRMA.<br />

[20] Misra, H. K., 2011. Information Kiosk Based Indian Rural E-<br />

Governance Service Delivery, Value Chain Based<br />

Measurement and Acceptance Modelling. The 5th<br />

International Conference on Theory and Practice of<br />

Electronic Governance (ICEGOV2011), Tallin, Estonia, 26-<br />

28 September.<br />

[21] Misra, H.K. 2010, “Citizen-Centric Service Dimensions of<br />

Indian Rural E-Governance Systems: An Evaluation”, in<br />

Hakikur Rahman (ed.) Cases on Adoption, Diffusion, and<br />

Evaluation of Global E-Governance Systems: Impact at the<br />

Grass Roots. Hershey, USA: IGI Global Publishing.<br />

[22] Nunnally, J C., 1978, Psychometric Theory, New York,<br />

McGraw-Hill.<br />

[23] OECD, 2004, Measuring Sustainable Development,<br />

Integrated Economic, Environmental and Social<br />

Frameworks.<br />

[24] Pedhazur, E. J., 1997, Multiple Regression in Behavioral<br />

Research (Third Edition), Harcourt Brace College Publishers,<br />

New York.<br />

[25] Peter Hardi and Terrence Zdan, 1997, Assessing Sustainable<br />

Development, Principles in Practice, 161 Portage Avenue<br />

East - 6th Floor Winnipeg, Manitoba, R3B 0Y4, ISBN 1-<br />

895536-07-3<br />

[26] Rahman Naimur, 2010, MDGS, Inclusive Growth and<br />

Governance, One World Foundation India, New Delhi.<br />

[27] Rawls, J. (1971). A theory of justice. Cambridge, MA:<br />

Harvard University Press<br />

[28] Richard Gerster And Sonja Zimmermann, 2005, Up-Scaling<br />

Pro-Poor ICT-Policies and Practices: A Review of<br />

Experience with Emphasis on Low Income Countries In Asia<br />

And Africa, Swiss Agency for Development and Cooperation<br />

(SDC), Gerster Consulting, CH–8805 Richterswil,<br />

Switzerland<br />

[29] Roman Mogilevsky and Anara Omorova, 2011, Assessing<br />

Development Strategies to Achieve MDGs in Asia<br />

Macroeconomic Strategies of MDG Achievement in the<br />

Kyrgyz Republic, Center for Social and Economic Research,<br />

Warsaw, CASE Network Report No.95<br />

[30] Sakiko Fukuda-Parr, 2008, Are the MDGs Priority in<br />

Development Strategies and Aid Programmes? Only Few<br />

Are!, Working Paper number 48, October, The New School<br />

University, New York. http://www.ipcundp.org/pub/IPCWorkingPaper48.pdf<br />

accessed on<br />

02.03.2012<br />

[31] Sanjay Jamwal, 2011, Project Proposal on Impact<br />

Assessment Of Village Resource Centres (VRC) In<br />

Achieving Millennium Development Goals<br />

[32] Satterthwaite, David (Ed.), 2003, The Millennium<br />

Development Goals and Local Processes, Hitting the target<br />

363<br />

or missing the point? IIed, 3 Endsleigh Street, London,<br />

WC1H 0DD, UK<br />

[33] Tomasz, J. et al. ,2011, ICEGOV 2011. Tallinn, Estonia:<br />

Tutorial on Electronic Governance for Development.<br />

[34] Spector, P E., (1988), “Development of the Work Locus of<br />

Control Scale”. Journal of Operational Psychology, 61,<br />

pp.335-340.<br />

[35] UIDAI, 2010, Unique Identification Authority of India<br />

Strategic Overview, Unique Identification Authority of India,<br />

Planning Commission, Government of India, New Delhi.<br />

[36] UN, 2007, Development Goals: Core Issues And Good<br />

Practices, 7th Global Forum on Reinventing Government<br />

Building Trust in Government, 26-29 June , Vienna, Austria<br />

[37] UN, 2008, UN E-Government Survey, From E-Government<br />

to Connected E-Governance, New York UN, 2011,<br />

Measuring Impacts of Information and Communication<br />

Technologies for Development, Geneva.<br />

[38] UN,2010, Current Strategies on MDGs Monitoring and<br />

Evaluation: The MDG Africa Group Cluster on Statistics,<br />

Second Meeting of the Statistical Commission for Africa<br />

(StatCom Africa - II), 17 – 22 January, Addis Ababa,<br />

Ethiopia<br />

[39] UNCTAD,2011. Measuring Impacts for Information and<br />

Communication Technologies for Development, United<br />

Nations Conference on Trade and Development, New York<br />

and Geneva.<br />

[40] UNDP, 2010, What Will It Take to Achieve the Millennium<br />

Development Goals? An International Assessment, United<br />

Nations Development Programme, One United Nations<br />

Plaza, New York, NY 10017, USA<br />

[41] United Nations, (UN),2008, UN E-Government Survey, New<br />

York: E-Government to Connected E-Governance. url:<br />

http://www.indiatelecomonline.com accessed on 14.07.2011.<br />

[42] United Nations,2001, Road map towards the implementation<br />

of the United Nations Millennium Declaration, United<br />

Nations, New York.<br />

[43] United Nations,2010, The Global Partnership for<br />

Development at a Critical Juncture. MDG Gap Taskforce<br />

Report, United Nations, New York.<br />

[44] United Nations,2011, Millennium Development Goals<br />

Report, New York.


Harnessing Renewable Energy Technologies for ICT and<br />

e-Governance Services in Un-Electrified Communities in Rural Nepal<br />

Mona Sharma<br />

Winrock International<br />

P.O.Box 4927<br />

Kathmandu, Nepal<br />

977 1-4467087; 977 9851146002<br />

msharma@winrock.org.np; mona33sharma@gmail.com<br />

ABSTRACT<br />

The Government of Nepal’s electronic-governance initiatives<br />

remain beyond the access of the majority of Nepal’s population.<br />

Many are not even aware that such services exist. This is because<br />

due to Nepal’s difficult terrain, two vital vehicles for egovernance<br />

services -access to energy/the national electricity grid<br />

and internet penetration - are both negligible. Rural populations<br />

stand to benefit the most from e-governance services, yet they<br />

continue to be overlooked by government and non-government<br />

information and communications (ICT)-based development<br />

activities largely on grounds of lack of access to energy sources.<br />

A recently completed ICT project funded by Intel Corporation and<br />

implemented by Winrock International challenged this bottleneck<br />

to efficient rollout of e-governance services, and has demonstrated<br />

a successful shift in the national rural ICT paradigm. This paper<br />

communicates the experience of a pioneering community-based<br />

activity to extend electronic services, including e-governance, in<br />

remote un-electrified communities in Nepal. This public-private<br />

partnership between rural communities, local and national<br />

governments, and a non-government organization harnessed<br />

energy generated from small solar photovoltaic and micro-hydro<br />

systems to operate power-efficient ICT and e-services. The ICT<br />

infrastructure is housed in local government schools, and has<br />

enabled rural communities to access multifaceted e-services<br />

beyond the electricity grid network.<br />

Categories and Subject Descriptors<br />

K.6.1 [Management of Computing and Information Systems]:<br />

– Project and People Management – System Analysis and Designs<br />

General Terms<br />

Management, Documentation, Performance, Design, Reliability,<br />

Human Factors<br />

Keywords<br />

Renewable Energy Technologies; Nepal; Program Management<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

364<br />

1. INTRODUCTION<br />

The Government of Nepal (GoN) has introduced numerous ICT<br />

interventions for development and poverty alleviation over the<br />

past five years. An E-Governance Master Plan has also been<br />

rigorously researched and developed. The focus of government<br />

and non-government ICT initiatives to date has been on rollout of<br />

infrastructure, hardware, software packages, online applications<br />

such as e-governance services, and capacity building of human<br />

resources. While all these aspects are crucial for effective<br />

implementation of ICTs nationwide, a major challenge continues<br />

to be largely overlooked: access to electricity to power equipment<br />

and deliver services. This paper chronicles the experiences and<br />

findings of a pioneering attempt to break this barrier by<br />

introducing power-efficient computing and electronic public<br />

services based on alternative energy sources. This pilot project has<br />

demonstrated to all stakeholders that ICT services and<br />

applications can be taken to the 60 percent of rural communities<br />

that currently remain beyond the national electricity grid (see<br />

Figure 1). The pilot was carried out in conjunction with GoN’s<br />

Alternative Energy Promotion Project (AEPC) and the High Level<br />

Commission for Information Technology (HLCIT) at the Ministry<br />

of Environment (MoE). AEPC has since incorporated the model<br />

in the national renewable energy technology (RET) expansion<br />

program, and replicated the community-based model in over<br />

twenty additional locations.<br />

2. BACKGROUND<br />

Nepal’s difficult topography has long challenged extension of<br />

basic services and infrastructure across the country. Road<br />

networks are limited; the national electricity grid currently serves<br />

only 40% of the population as illustrated in Figure 1 below. Even<br />

today, many communities walk days to district headquarters to<br />

access governance services such as birth registrations and transfer<br />

of deeds. Such communities would benefit immensely from<br />

access to E-governance and other online services in their own<br />

villages.<br />

Figure 1. National Electricity Grid of Nepal


GoN has addressed the challenge to nation-wide electrification by<br />

expanding access to RETs for electrification in rural areas. This<br />

government initiative promotes domestic and institutional<br />

electrification based on locally-available sources of renewable<br />

energy, including micro hydro and solar photovoltaic (solar pv)<br />

systems. Even where it is available, RET-based rural<br />

electrification systems are very limited as they are designed for<br />

lighting for a set number of households. They generally cannot<br />

support the power requirements of appliances, and basic ICT<br />

equipment. These compounded factors have resulted in limited<br />

access to, and expansion of ICT applications and electronicservices<br />

beyond urban and peri-urban areas. Nepal’s terrain has<br />

also impeded expansion of the internet backbone. Internet service<br />

providers are gradually extending connectivity through vertical<br />

spurs from the backbone, yet terrestrial systems are feasible only<br />

along the plains area. The majority of the country relies on<br />

wireless and satellite-based connectivity, which is expensive.<br />

Consequently, remote communities needing vital access to<br />

information and communications services, the potential key<br />

beneficiaries of the national E-Governance initiatives, remain<br />

deprived of electronic and ICT services. Public access services do<br />

not exist, and ICTs have been unable to be integrated into rural<br />

governance and education systems.<br />

2.1 Challenges to Rural ICT<br />

o Limited access to grid electricity<br />

o Limited power from RET-based power systems<br />

o Limited penetration of information ICT infrastructure<br />

o High power consumption of conventional computers<br />

o Inadequate integration of ICTs into rural tapestry<br />

o Inadequate rural-appropriate online-based applications<br />

3. APPROACH<br />

In this scenario, Winrock International has pioneered an approach<br />

to introduce and establish locally appropriate electronic services<br />

based on RET-power. Basic details are presented in Table 1; the<br />

geographic diversity of the pilot sites is presented in Figure 2.<br />

Name<br />

Table 1. Project Details<br />

Rural Livelihood Enhancement<br />

through Increased Access to<br />

Information and Communication<br />

Technologies project<br />

Location Four remote communities in rural<br />

Nepal<br />

365<br />

Timeline April 2009- February 2012<br />

The primary focus of the approach:<br />

o Increase public access to rural electronic and ICT services<br />

o Increase awareness of power-efficient options<br />

o Foster the right to information<br />

o Internet-based services to local communities<br />

o Renewable energy, rural ICT, and education services through<br />

partnerships<br />

o Ensure sustainability through partner networks<br />

o Computer and internet literacy<br />

− E-services, applications and services for MDGs<br />

− Poverty alleviation and overall development through<br />

access to information and communication on health,<br />

agriculture, and education<br />

3.1 Innovative Model<br />

The project has leveraged Intel funding to demonstrate maximum<br />

impacts on rural development by establishing the last mile of<br />

connectivity, and using the internet to enhance lives. Multistakeholder<br />

partnerships have been forged with government as<br />

well as non-government bodies to deliver appropriate internetbased<br />

services to local communities. Partners contributing to the<br />

project activities at various levels have contributed additional<br />

funds, forging a sense of ownership of the activity across sectors,<br />

and enabling multiple activities to be carried out towards the<br />

single common goal of sustainable rural development. The model<br />

is illustrated in Figure 3.<br />

Figure 2. Topographic map of Nepal indicating project<br />

districts


Figure 3. The Project Model<br />

Simultaneously, this has also strengthened the sustainability of<br />

services, as well as replication potential through the diverse<br />

networks of each contributing partner. The project facilitated<br />

access to electronic and ICT services in rural Nepal by mobilizing<br />

partnerships to provide a package for holistic rural development<br />

package, from installation of RETs; infrastructure for access to the<br />

internet; low-power hardware; to development of locally<br />

appropriate online products and internet-based services; and<br />

capacity building of locally-based internet service providers to<br />

ensure sustainable internet services.<br />

Figure 4 (L). Solar photovoltaic for ICT center<br />

Figure 5 (R). Microhydro powerhouse<br />

3.2 What We Did<br />

a) Power-efficient ICT facilities<br />

o Isolated micro hydro stations; solar photo voltaic<br />

systems<br />

o Low power equipment at school labs and telecenters,<br />

including Netbooks, Rural Connectivity Platforms<br />

(RCP) and other wireless media<br />

o Enabling environment and vehicle for e-governance in<br />

off-grid areas<br />

b) Dual purpose services<br />

o ICT labs school hours; rural telecenter non-school hours<br />

o Online and offline locally appropriate services<br />

366<br />

o Enhance poverty alleviation, attainment of Millennium<br />

Development Goals, and overall development through<br />

access to information and communication, and eservices<br />

c) Enabling rural E-services<br />

o Strengthening ICT service providers<br />

o Locally appropriate ICT-based applications<br />

o Channel for information dissemination for government<br />

initiatives across sectors, including health, agriculture,<br />

and e-governance<br />

o Rural access to government e-governance initiatives<br />

o Digital content and complete e-curriculum for six<br />

grades as part of the formal school curriculum<br />

o E-Granary type servers to house content for schools and<br />

public for offline use<br />

d) Multi-sector Public Private partnerships<br />

o Government Renewable energy, rural ICT, rural<br />

development Ministries<br />

o Rural schools and communities<br />

o Private ICT service providers and vendors, including<br />

internet service providers and equipment importers<br />

o Non-government agencies, including Open Learning<br />

Exchange and local community-based organizations<br />

(CBO)<br />

3.3 How We Did It<br />

The approach was two-pronged. First, the project leveraged ties<br />

between AEPC, communities and schools to establish computer<br />

labs and ICT service centers based on RET. Second, the project<br />

demonstrated the use of locally available micro hydro and solar<br />

photovoltaic, expanding the reach of electronic services to<br />

deprived rural areas. Figures 4 and 5 illustrate the power sources<br />

for two of the solar and micro hydro pilot sites.<br />

The internet facilities were housed in government schools for<br />

maximum development impact. Placement of these facilities in<br />

the schools is a deliberate attempt to avail children from deprived<br />

communities that may not have access to modern forms of energy<br />

to the benefits of electricity at least during school hours. The<br />

school children have used computer facilities as a computer<br />

laboratory in structured sessions during school hours. Before and<br />

after school hours, as well as during school breaks, the computer<br />

facilities have served as community-based rural ICT centers. By<br />

serving as rural ICT centers, the labs have provided wider<br />

communities reliable communication through the internet, and<br />

locally-appropriate internet based services. Figures 6 and 7, and 8<br />

and 9 illustrate both sets of services at the pilot schools. This has<br />

included information on health, education rights awareness, and<br />

agriculture among others. Facilities such as e-governance<br />

services, search for employment opportunities, and promotion of<br />

products for livelihood enhancement etc have also been provided.<br />

A structured tariff system for these services will support<br />

maintenance costs.


Figures 6 and 7. Computer classes at schools<br />

Figures 8 and 9. Public access services at telecenters<br />

4. THE OUTCOME<br />

a) Created enabling environment for rural ICT<br />

o Demonstrated use of low-power pcs in rural areas<br />

to the government and other stakeholders.<br />

b) Promoted government endorsement of ICT for rural<br />

development through cross-sector use of ICTs for<br />

education, e-governance, and agriculture.<br />

c) Fostered delivery channel for GoN E-governance and<br />

other electronic services.<br />

d) Demonstrated mainstream computer education through<br />

low-power computer labs in government schools.<br />

e) Incorporated ICT facilities for rural access in GoN RET<br />

extension strategy. This will contribute to the overall<br />

rural development, and attainment of MDGs resulting<br />

from access to power.<br />

f) Leveraged local development<br />

g) Service provider training for schools/rural ICT centers<br />

o Integrating E-teaching in schools<br />

o Providing public ICT services<br />

o Hardware and software fundamentals<br />

h) E-content and applications<br />

o Updating online platform for rural users<br />

o ICT-enabled full-year curriculum in Nepali,<br />

English, and Science Grades 6, 7, 8, 9, and 10<br />

Table 2. Impacts from four community-based pilot sites<br />

Beneficiary Group Direct Beneficiaries<br />

Schoolchildren 3200<br />

Individuals 5500<br />

Rural households 1100<br />

367<br />

5. SUSTAINABILITY<br />

5.1 Localized Services<br />

This approach is unique in that it presents a holistic approach in<br />

installing and using RET, and wireless technology to bring about<br />

direct economic impacts upon vulnerable communities. The<br />

project has been integrated into the local community to ensure<br />

optimum development impact, and respond to demand-based<br />

online resources and applications. Offline services and products<br />

have been integrated along with online services. Offline services<br />

have strengthened the business plan of the entrepreneurs as they<br />

cost much less to provide in terms of investment cost, but deliver<br />

constant fees for services. Offline services are integral in the<br />

initial phase to encourage rural clientele not used to online<br />

resources to enter the service facilities and gradually build<br />

comfort in using technology.<br />

Activity sustainability has been ensured by:<br />

1) Offsetting the access to energy, and upfront and operating<br />

cost barriers through multi-sector linkages<br />

2) Providing diversified use of the ICT center facilities to the<br />

local population as public access services<br />

3) Localizing content to meet needs at rural schools, including<br />

E-granary server and E-curriculum<br />

4) Creating ownership and demand for ICT services through<br />

partial subsidy towards local commitment to deliver Egovernance<br />

and other services<br />

5.1 Contributing to the National Agenda<br />

This initiative has addressed major barriers to national expansion<br />

of electronic services. This project has precipitated synergy<br />

between multi-sectoral activities, and mobilized financial and<br />

human resource investments from multiple players at the local as<br />

well as national level in order to translate technological scopes<br />

into direct impacts upon rural lives. Winrock International's<br />

previous efforts in rural information and communication activities<br />

strongly indicate that public-private-partnerships are a pivotal<br />

aspect of sustainability following project completion. Impacts on<br />

direct beneficiaries, the children from grades six through ten, and<br />

households in the vicinity in the four pilot sites alone has been<br />

immense, as indicated in Table 2. With the initiation of public<br />

access ICT services and computer classes using just 14 Netbooks<br />

per site in villages averaging 300 households, schools report<br />

enhanced enrollment in the pilot government schools, and better<br />

student retention and attendance rates as students are more regular<br />

in coming to school. Successful demonstration has made this<br />

model universally replicable in partner networks: MoE has<br />

delivered project-developed capacity building trainings in<br />

government rural ICT initiatives; AEPC has replicated the project<br />

model in their microhydro communities as ICTs enable access to<br />

crucial public services, and make productive use of the electricity<br />

generated. The project-developed curriculum has also been<br />

adopted as a locally-appropriate resource by many schools<br />

nationally. This level of commitment from the national to<br />

grassroots players is anticipated to continue to foster strong<br />

ownership of the approach, thereby supporting the development of<br />

locally-appropriate online electronic services and applications.


5.2 Challenges Remain<br />

a) Lobby with central and district governments for:<br />

− Integration into Computer Science curriculum<br />

− Qualified human resources<br />

− Rural development initiatives<br />

b) Inadequate human resources for ICT-aided teaching<br />

c) Communities not adequately e-ready<br />

d) High cost of bandwidth<br />

e) Keyboard issues with Netbooks<br />

− Dust infiltration<br />

368<br />

− Loose keys following constant use<br />

f) Frequent power fluctuations affecting power supply and<br />

connectivity<br />

6. ACKNOWLEDGMENTS<br />

Our thanks to ACM SIGCHI for allowing us to modify templates<br />

they had developed.<br />

7. REFERENCES<br />

[1] Nepal Living Standards Survey 2011. Central Bureau of<br />

Statistics, Kathmandu, 2012.<br />

[2] GoN E-Governance Master Plan and ICT Policies, 2011.


ICT-enabled Delivery of Maternal Health Services<br />

ABSTRACT<br />

Fresh opportunities are being created daily for the deployment of<br />

Information and Communication Technologies (ICT) [42]<br />

particularly in the area of poverty alleviation and sustainable<br />

economic growth in developing countries in particular. Therefore,<br />

the adoption of mobile telephones as service and information<br />

delivery tools and platform is expected to foster partnership and<br />

efficiency in improving health through dissemination of health<br />

information and data and supporting communication and<br />

collaboration within the entire health sector.<br />

This paper examines the integration of a sectoral policy and<br />

strategy in the area of health and national ICT Policy in the<br />

developmental context. Specifically, it investigates if a mobiletelephony<br />

based e-Health strategy has proven sustainable,<br />

stimulated acceptance of mobile phone-based health information<br />

or awareness of stakeholders on the benefits of mobile phonebased<br />

health information and services, thus accelerating the pace<br />

of reduction in maternal mortality in Ghana. The analysis<br />

presented in the paper is based on secondary material collected<br />

from government website and data directly obtained from<br />

policymakers and users involved in the initiative.<br />

Categories and Subject Descriptors<br />

Computers and Society, General<br />

General Terms<br />

Human Factors, Public Policy<br />

Keywords<br />

Mobile Phones, ICT4D, e-Governance, Development, Maternal<br />

Mortality, Ghana<br />

1. INTRODUCTION<br />

Nine years ago, the UN General Assembly endorsed the World<br />

Smmit on the Information Society, held in two phases, in Geneva<br />

003 and Tunis 2005. In particular, it encouraged governments, as<br />

part of their implementation of the Tunis Agenda for the<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Johanna E. Awotwi<br />

Centre for e-Governance<br />

P.O. Box MP 270<br />

Mamprobi- Accra, GHANA<br />

+233 (0) 243 408 047<br />

jeawotwi@ghanaceg.org<br />

369<br />

Information Society, to establish before 2010, “ comprehensive,<br />

forward –looking and sustainable national e-strategies, including<br />

ICT strategies and sectoral e-strategies, as integral parts of<br />

national development plans and poverty reduction strategies.”<br />

Responding to this call, most countries have met the WSIS target<br />

of developing national e-strategies by 2010. At least 84% of all<br />

economies have a national e-strategy in place, and at least 14<br />

economies are in the process of developing such a strategy [33].<br />

Ghana met the WSIS target for developing national e-strategies<br />

with, two policies which are driving ICT developments – ICT for<br />

Accelerated Development Policy (ICT4AD) and National<br />

Telecom Policy (NTP). The ICT4AD Policy has the overall<br />

objective of supporting an ICT-led socio-economic development<br />

process aimed at transforming Ghana into a middle income,<br />

information-rich, and knowledge-based society [24]. On the other<br />

hand, says the policy, the goal of the NTP is to establish market<br />

structures that will be most beneficial to Ghana’s citizens and<br />

businesses, and to set in motion the procedures and incentives that<br />

will boost the market’s development.<br />

Efforts have been made to implement some of the strategies<br />

enunciated in these two policy documents [20]. One such<br />

important e-strategy is the Health Sector ICT Policy and Strategy,<br />

2005 which underlining vision is to significantly enhance and<br />

improve all areas of health delivery. The strategy is specifically,<br />

meant to provide quality primary healthcare services that are<br />

affordable, sustainable and meet the needs of patients, by<br />

overcoming geographical barriers through ICTs [24]. For a lowincome<br />

country such as Ghana, the policy is welfare –oriented.<br />

It is instructive to note that ICT4AD Policy (2003) is currently<br />

under review after a review forum in May 2011. New thematic<br />

areas are being added to the policy including cyber security,<br />

climate control and green ICTs, Broadband Strategy and<br />

Geospatial policies [50].<br />

The main objective of this paper is to lay emphasis on integration<br />

of a sectoral policy and strategy on health in the developmental<br />

context; and to investigate if a mobile–telephony based<br />

intervention has proven sustainable, stimulated acceptance or been<br />

able to create awareness on benefits of mobile health information<br />

and services and the consequent impact on maternal mortality and<br />

governance in Ghana. The availability of up-to-date and accurate<br />

information, created and disseminated by ICTs, has decisive<br />

impact on peoples’ lives and on the socioeconomic development<br />

of a country as a whole says [53]. Further, “countries that have<br />

created an enabling environment are experiencing revolutionary<br />

effects especially in the governance, education, health and<br />

business sectors, as its citizens are now more empowered, can<br />

change the equilibrium of power and start creating choices and<br />

opportunities for themselves.” “Yet,” it continued, ‘there are


countries in Africa where people are not able to make informed<br />

decisions on their daily lives because of lack of access to ICTs,<br />

information and knowledge.”<br />

Ghana’s response to the above realities especially in the health<br />

sector is the focus of this paper with the recognition of the<br />

positive potential of mobile phones. The background of this paper<br />

will review ICT integration at both practice and policy levels in<br />

general and investigate attempts by Ghana, to initiate, formulate<br />

and implement national e-strategies with a view to achieving<br />

development goals. Section, 2 will focus on a short history of<br />

ICTs under eHealth. The analysis in this section will be on how<br />

developing countries disadvantaged due to lack of capital and<br />

knowledge of the internet and Information Technology [42] could<br />

carve out solutions which harness ICTs to improve internal<br />

administrations, with the potential for interactions with<br />

stakeholders to attain improved political representation,<br />

institutional effectiveness and economic management. Sections 3<br />

and 4 outline the general framework for analyzing the solutions or<br />

interventions through mobile telephony, with Ghana country data<br />

used, Section 5 dwells on acceptance, sustainability and<br />

acceptance impacts. Section 6 focuses on a review of the results,<br />

their implications, and concludes on possible future research<br />

directions.<br />

2. BACKGROUND<br />

[52] stresses that response to considerable challenges in providing<br />

high quality, affordable and universally accessible care have led to<br />

policymakers, donors and program implementers to search for<br />

innovative approaches, to eliminate the geographical and financial<br />

barriers to health. Consequently, lately, there has been an<br />

increasing interest in the potential of ICTs in resolving these<br />

issues. The use of mobile technology or m-health, a subset of ehealth,<br />

is growing in the low- and – middle income or developing<br />

countries.<br />

There is also the recognition that National e-strategies act as<br />

fundamental preconditions for bridging the digital divide, that is,<br />

the gap between people with access to ICT and those with limited<br />

or no access to them [30]; [36]. Further, e-strategies are believed<br />

to enable socio-economic development. The WSIS outcomes,<br />

according to the ITU, encourage countries to incorporate ICT into<br />

their national development plans and, in the particular case of<br />

lower income economies, to integrate national e-strategies into<br />

their poverty reduction plans. It defines for a better understanding<br />

of the concepts; ‘ICT strategy is a general plan on how to bring a<br />

society and its economy forward through the use of ICT; sectoral<br />

e-strategies, on the other hand, break down the general ICT<br />

strategy into policies for specific sectors, such as health, education<br />

or administration. Sectoral strategies are called “e” for electronic,<br />

followed by the name of the area the strategy applies to, for<br />

instance, e-health, e-learning or e-government. Together, ICT<br />

strategies and sectoral e-strategies constitute national e-strategies,<br />

which is the super-ordinate concept.’ As of April 2010, 163<br />

countries and territories, that is, 85.3 percent of all ITU Member<br />

States, already had a national e-strategy in place, while another 13<br />

countries and territories (6.8%) are currently formulating and<br />

adopting one. Six countries (3.2%) do not have a national estrategy<br />

in place, and the status of ICT strategy formulation in the<br />

remaining 9 economies (4.7%) is unknown, due to lack of<br />

information, the report declares. It is possible, however, that some<br />

of the economies in the latter group have also formulated an ICT<br />

370<br />

strategy or are in the preparatory process. In general, Africa is the<br />

continent with the lowest penetration of ICT, continued [30], as<br />

well as the region where the formulation of ICT strategies has<br />

taken place at the slowest pace. By the first phase of WSIS in<br />

2003, only 17 African countries had developed ICT strategies.<br />

According to a recent ECA survey however, 90 percent of the<br />

African countries consider ICT as their national priority. As<br />

suggested by the ITU, “Several ICT strategies are still lacking a<br />

real strategic approach. Despite the existence of numerous good<br />

practices and innovative and forward-looking strategies, some<br />

plans are merely a collection of initiatives and projects.<br />

Governments, societies and economies would benefit from an<br />

overarching strategic direction and from the formulation of a<br />

long-term vision. Further, sectoral e-strategies should be rooted in<br />

these overarching national e-strategies in order to unleash the full<br />

potential of ICT in each sector, making best use of existing<br />

synergies.” For instance, there should be coherence between a<br />

country’s health sectoral strategy and the National ICT Policy.<br />

The ICT4AD which was approved by the Ghanaian Parliament<br />

and Cabinet in early 2004 fully takes into account the aspirations<br />

and provisions of key socio-economic development framework<br />

documents including: The Vision 2020 Socio-Economic<br />

Development Framework; the Ghana Poverty Reduction Strategy<br />

(GPRS) (2002-2004) and the Co-ordinated Programme for<br />

Economic and Social Development of Ghana [18]. “The e-Health<br />

Strategy means application of the Internet and other related<br />

technologies in the healthcare industry to improve the access,<br />

efficiency, effectiveness and quality of clinical and business<br />

processes utilized by healthcare organizations, practitioners,<br />

patients and consumers to improve the health status of patients”<br />

[8].<br />

Several other governments have developed e-health strategies.<br />

The World Health Organization (WHO) defines e-Health as “...the<br />

use, in the health sector, of digital data - transmitted, stored and<br />

retrieved electronically- in support of health care, both at the local<br />

site and at a distance.” eHealth technologies are essential when<br />

they are integrated into health services that meet basic needs, have<br />

been proven to be cost-efficient and are evidence-based. They are<br />

evidence-based when they meet well-defined specifications and<br />

have been validated through controlled clinical studies or rest on a<br />

widely accepted consensus by experts. Some of the benefits of ehealth<br />

include faster and easier access to medical data; improved<br />

delivery of healthcare services, in particular in rural and remote<br />

areas, and the reduction of costs for healthcare services.<br />

Many ICT strategies include approaches for the adoption of egovernment<br />

which are the most common type of sectoral estrategies.<br />

Many of these sectoral strategies focus on improving<br />

the effectiveness and transparency of public administration<br />

activities by making use of ICT in government-to-government,<br />

government-to-citizen and government-to business. With its ICT<br />

strategies in place, Ghana’s Minister of Communications reported<br />

in October 2011 that, “in 2010, Ghana’s GDP expanded by 5.9%,<br />

with the Services Sector (dominated by ICT) contributing 32.8%<br />

and surpassing traditional agriculture.<br />

The ICT/Telecom industry is therefore playing significant and<br />

vital role in driving wider economic growth across the country<br />

and contributing substantially to the government kitty” [40].


3. E-HEALTH<br />

3.1 ICTs and Health Communication<br />

[26] suggests; there has been abundant anecdotal evidence that<br />

ICTs could be applied to livelihood enhancement and thus directly<br />

address financial poverty, but it was not at all clear that these<br />

applications were reproducible, scalable and sustainable. There<br />

has been significant focus on using ICTs to actually deliver<br />

healthcare (telemedicine) and as a way of educating people on<br />

health issues. Health is vital to development he adds and “the lack<br />

of adequate healthcare is one of the most onerous aspects of<br />

poverty” and in developing countries especially Sub-Saharan<br />

Africa, poverty has deepened the crisis in health-care delivery and<br />

the mass exodus of professionals to the developed world have<br />

further worsened this problem.<br />

The 2008 UN report on progress toward meeting the Millennium<br />

Development Goals (MDGs) indicates continuing dire conditions<br />

in crucial public health areas. Reliable information about the rates<br />

and trends in maternal mortality is essential for resource<br />

mobilization, and for planning and assessment of progress<br />

towards Millennium Development Goal 5 (MDG 5), the target for<br />

which is a 75% reduction in the maternal mortality ratio (MMR)<br />

from 1990 to 2015 [38].<br />

Ghana has an estimated population of 23.48 million accounting<br />

for 2.97% of the African population [62]; 49% of the population<br />

lives in urban areas (regional average 37%). Ghana has relatively<br />

better health system indicators in the region. In 2007, life<br />

expectancy was 57 years (52 years in the WHO African region<br />

and 57 years in low-income countries), maternal mortality ratio<br />

was 560 per 100,000 live births (900 in the region and 650 in low<br />

income countries), infant mortality rate was 73 per 1,000 live<br />

births (88 in the region and 80 in low income countries, antenatal<br />

care (at least 4 visits) coverage was 69% (45% in the region and<br />

38% in low-income countries) and proportion of births attended<br />

by skilled health personnel was 50% (46% in the region and 41%<br />

in low-income countries).<br />

[43] state there are a few concerns though. Ghana’s human<br />

development index (HDI) worsened from 0.563 in 2001 to 0.520<br />

in 2005 [23]. Similarly, infant mortality rate rose from 71 in 2000<br />

to 73 in 2007 [62].<br />

The level of health spending is low at 5.1% of GDP with<br />

household out-of-pocket spending accounting for 51.2% of it says<br />

[56]. It is therefore, worthwhile to find out whether access to<br />

proven and powerful ICTs can improve health indicators which<br />

also happen to be an ongoing debate. Does the process of social<br />

change through ICTs enhance positive health outcomes in low and<br />

middle income countries such as Ghana? A growing number of<br />

people are searching to understand the meaning of empowerment<br />

and ways it can be used to change their settings and lives. Most of<br />

the literature associates empowerment with personal control.<br />

[45] points out that "by empowerment I mean our aim should be<br />

to enhance the possibilities for people to control their own lives."<br />

The Ottawa Charter for Health Promotion notes that "people<br />

cannot achieve their fullest health potential unless they are able<br />

take control of those things which determine their health" [60]. It<br />

is obvious that lack of empowerment leads to poverty which also<br />

has an important informational dimension [19].<br />

371<br />

Poor people often lack access to information that is vital to their<br />

lives and livelihoods, including weather reports, market prices,<br />

healthcare information and income-earning opportunities. Such<br />

lack of information or empowerment, adds to the vulnerability of<br />

the people concerned. Infact, in terms of livelihood strategies,<br />

information plays a dual role: informing and strengthening the<br />

short-term decision-making capacity of the poor themselves, and<br />

informing and strengthening the longer-term decision-making<br />

capacity of intermediaries that facilitate, assist, or represent the<br />

poor. The contribution of ICT to poverty reduction through<br />

enterprise lies in its power to give poor women especially, and<br />

men access to improved information and better communications<br />

to help them build assets for better living conditions [19]. There<br />

has been considerable international discussion about the potential<br />

of ICTs to make major impacts in improving the health and well<br />

being of poor and marginalized populations, combating poverty,<br />

and encouraging sustainable development and governance [63].<br />

Used effectively ICTs have enormous potential as tools to<br />

increase information flows and the dissemination of evidencebased<br />

knowledge, and to empower citizens. However, despite all<br />

its potential, a major challenge is that ICTs have not been widely<br />

used as tools that advance equitable health care access.<br />

A critical mass of professional and community users of ICTs in<br />

health has not yet been reached in developing countries. Many of<br />

the approaches being used are still at a relatively new stage of<br />

implementation, with insufficient studies to establish their<br />

relevance, applicability or cost effectiveness [63]. This makes it<br />

difficult for governments of developing countries to determine<br />

their investment priorities.<br />

The topic of e-government and e-governance has become<br />

increasingly acknowledged over the last few years, and many<br />

governments desire for online services. However developing<br />

countries are disadvantaged due to lack of capital and knowledge<br />

of the internet and Information Technology.<br />

[42], while acknowledging what ICT brings through improved<br />

effectiveness & efficiency in governance, improved customer<br />

satisfaction and enhanced public participation in Government’s<br />

policies / decision and making processes and provision of quality<br />

services; said there are difficulties in bringing components that<br />

make these a reality. Reality involves a clear, well planned and<br />

easy to implement strategy, connectivity infrastructure such as<br />

broadband technologies, database management, and enabling<br />

technologies such as those for pervasive/mobile access amongst<br />

others [4].<br />

E-Governance in an implementation sense is restricted primarily<br />

to the use of computer based internet access to deliver services. In<br />

countries where the penetration of computers and internet is<br />

relatively low, such as in Ghana, there is an apprehension that the<br />

reach of e-Governance may be limited. Such limited reach of e-<br />

Governance has made governments think of new technologies,<br />

such as mobile phones, to reach the residents and to deliver public<br />

services.<br />

The use of mobile phones in healthcare settings can potentially<br />

deliver important benefits, because of their ability to provide and<br />

improve access to communication and information resources [13].<br />

Mobile phones have tremendous potential to expand the access to<br />

and reach of public services in developing economies. The<br />

relevance of mobile platform as a medium for delivery of public


services in Ghana is also evident from the subscriber base of<br />

mobile phones as seen in Chart 1.<br />

The use of mobile and wireless technologies to support the<br />

achievement of health objectives (m-Health) has the potential to<br />

transform the face of health service delivery across the globe and<br />

a powerful combination of factors is driving this change, [13]<br />

stresses. These include rapid advances in mobile technologies and<br />

applications, a rise in new opportunities for the integration of<br />

mobile health into existing eHealth services, and the continued<br />

growth in coverage of mobile cellular networks.<br />

According to the International Telecommunication Union (ITU),<br />

there are now over 5 billion wireless subscribers; over 70% of<br />

them reside in low- and middle income countries. The GSM<br />

Association reports commercial wireless signals cover over 85%<br />

of the world’s population, extending far beyond the reach of the<br />

electrical grid [59].<br />

A multitude of m-Health solutions have emerged over the years in<br />

countries such as Ethiopia, Kenya, Nigeria and South Africa,<br />

which are leading the way in using mobile health services,<br />

according to the Global Observatory for e-Health at the World<br />

Health Organization (WHO). Getachew Sahlu of the WHO<br />

identified the convergence of the following factors as the driving<br />

force behind the current rapid m-Health growth in developing<br />

countries: (1) a record growth of mobile phone users, (2) rapid<br />

expansion of mobile networks, (3) the decline in mobile phone<br />

costs, and (4) the innovation in mobile technology [36].<br />

Mobile connects four times as many people as landline telephony<br />

because of its better reach, convenience, and functionality and its<br />

lower costs [31];[32]. Mobile telephony also surpasses the<br />

landline Internet by more than 3.5 billion users, reports [29],<br />

while driving economic growth and important societal benefits, as<br />

documented in the World Economic Forum’s Global Information<br />

Technology Report 2008–2009: Mobility in a Networked World<br />

and other research.<br />

At the recent Mobile World Congress held this year in Barcelona,<br />

Mr. H. Toure, Secretary-General of ITU confirmed, ‘Over the past<br />

twenty years or so we have seen an extraordinary transition from a<br />

world where most people did not have access to even basic<br />

telecommunications, to a world where we have six billion mobile<br />

cellular subscriptions, and where 2.3 billion people use the<br />

Internet. The key to this extraordinary communications miracle,<br />

he added, has of course been mobile, which has conquered the<br />

globe and brought ICTs within reach of virtually all of the world’s<br />

people [51].<br />

Mobile health solutions—whether used to automate electronic<br />

health records or treat chronic diseases—enable governments to<br />

more easily, quickly, and cost-effectively bring the benefits<br />

associated with access to comprehensive healthcare services to<br />

their citizens. Mobile remote monitoring devices and services that<br />

transmit information about the condition of patients and<br />

applications that remind patients when to take their medications<br />

will allow many more people to lead healthier, more independent<br />

lives[15]. Accordingly, a recent Juniper Research study forecasted<br />

remote patient monitoring using mobile networks to be a US$1.9<br />

billion market by 2013 [35].<br />

Table 1. Justifying mHealth<br />

372<br />

CHALLENGES EXPLANATION<br />

Infrastructure Absence of electricity in rural areas<br />

and low bandwidth<br />

Cultural attitudes Superstitions due to illiteracy<br />

Sustainability Lack of financial capability after<br />

initial donor assistance. Therefore,<br />

inability to afford technology<br />

upgrades<br />

Environmental Dusty regions affect equipment<br />

Human Resource Lack of ICT skilled personnel<br />

(Author)<br />

m-Health represents a cost-effective technology solution to many<br />

of these challenges if implemented correctly and brought to scale.<br />

The costs of mobile handsets and usage are declining as demand<br />

for mobile services increases and mobile networks are being<br />

rapidly expanded [36]. The use of mobile phones has been noted<br />

in the area of prevention and monitoring for pregnant women, to<br />

reduce infant and maternal mortality through treatment, and<br />

provide post-natal follow-up healthcare support [34].<br />

The discipline of m-Health has been gaining ground as mobile<br />

device penetration rates grow rapidly, increasingly prompted by<br />

plunging hardware and usage costs, as developing world<br />

consumers adopt this accessible communication technology<br />

[16];[28];[47];[27]. Case studies have been recorded in the<br />

instances of using Short Message Service (SMS) for HIV/AIDS<br />

prevention and control, and for treatment of tuberculosis in South<br />

Africa [46]; consultation services and dissemination of critical<br />

health information in rural communities in India [48]; [5]; and<br />

using Personal Digital Assistants (PDAs) to collect data and teach<br />

medical students in Ghana and Uganda respectively 12].<br />

4. GHANA-CASE STUDY<br />

4.1 E-Health in Ghana context<br />

[49] state, “similar to Rwanda, Kenya and Ghana, in 93rd and<br />

97th position, respectively, suffer from low levels of ICT<br />

readiness due to the underdevelopment of ICT infrastructure and<br />

the lack of a widespread skill base that would enable society to<br />

make an optimal use of technology.<br />

However, according to [2], the services sector in Ghana recorded<br />

a 6.1% growth in 2010 compared with 5.9% in 2009. Financial<br />

services and expansion in the telecommunications industry<br />

continued to spearhead growth of the sector in 2010. The<br />

telecommunications sub-sector expanded by 10.8% in 2010<br />

raising total telephone access lines to about 17 million in 2010<br />

from 15.2 million in 2009. In 2010 Ghana achieved telephone<br />

penetration rate of nearly 74%, with mobile telephony accounting<br />

for about 98% of the total access lines. As at July 2011 the total<br />

telephone subscriptions in Ghana stood at 19,805,896 yielding a<br />

tele-density of 80.2%.<br />

This chart is distributed by Market Share as follows:-


Chart 1 [40] GHANA – Total Telephone Subscription<br />

The growth in penetration and use of mobile phones presents<br />

unprecedented opportunities to communicate with rural audiences,<br />

and may soon be the largest media opportunity in rural Ghana,<br />

especially for enhancing healthcare delivery.<br />

[50] informed in personal communication with the author that “as<br />

at the last count on March 2nd, 2012 the National Communication<br />

Authority (NCA) had registered over 25 million SIM cards and<br />

assuming 20 percent double or triple SIM registrations, we are<br />

likely to have over 80% of Ghanaians owning phones including<br />

citizens in the rural areas. This phenomenon has obviously made<br />

communication across the country very efficient and brought great<br />

relief to rural folks,” he added.<br />

Ghana’s health sector reforms were guided by five principles:<br />

integration, decentralization, partnerships, ownership, and<br />

common financing. During the process of decentralization,<br />

decision making authority and management of health care services<br />

was transferred from the national level to the regional and district<br />

levels [23]. With the unprecedented opportunities offered by<br />

mobile phones to communicate with rural audiences, Ghana’s<br />

Health Sector reforms made room for the maximum use of ICTs.<br />

The Ghana Health Service (GHS) intends to coordinate and<br />

mainstream all m-Health projects in Ghana to derive the<br />

maximum benefit for the people, ensure sustainability and<br />

ownership after the pilots by the current implementing<br />

organizations for the project to survive beyond the donor-funded<br />

period.<br />

4.1.1 Health Sector Strategies in Ghana<br />

Poor people often lack access to services, because of physical and<br />

financial barriers, lack of information, unavailability of care, and<br />

other factors [9].<br />

[14] adds, “Although developed-world newsflashes tell us that<br />

the whole world is “wired” and that people in the farthest reaches<br />

globally are able to surf the ’net, the reality is that the poorest of<br />

the poor do not have access to even the most basic of health<br />

information.<br />

A recent analysis showed that young women from the poorest<br />

households in 12 low and middle income countries were more<br />

likely to enter in early marriages, to have given birth at an early<br />

age, and to be less likely to be using maternal health services [54].<br />

It must be noted that the response to exploitation of ICTs in the<br />

health sector in Ghana has been only modest, what with continued<br />

low bandwidth problems causing a digital divide between the<br />

health headquarters in the capital and the various regions. The<br />

promise of mobile technology is what could speed up the<br />

transformation process- recognized by that part of the sector ICT<br />

373<br />

Policy and Strategy’s plan of work which states the wish to,”<br />

improve efficiency of health delivery by improving both<br />

management and technical efficiency of the sector through<br />

reliable information dissemination systems and by supporting the<br />

decision –making process through the prompt availability of<br />

information for all decision-makers” [24].<br />

The Mobile Technology for Community Health (MoTeCH)<br />

initiative recognized Ghana Government’s desire according to its<br />

ICT Policy to, “improve ICT infrastructure in the health sector by<br />

networking all health facilities and by providing adequate ICT<br />

tools and service delivery management.’’, albeit on a smaller pilot<br />

scale as a beginning. In 2007, strategies and priorities were<br />

articulated [21] within the context of Government’s development<br />

agenda as spelt out in the GPRS and of the three priority areas for<br />

transforming Ghana into a Middle Income Country by 2015<br />

include, Private Sector Development, Good Governance and<br />

Human Resource Development. The Ghana Reproductive Health<br />

Strategic Plan (2007-2011) includes six high-level objectives<br />

under its Safe Motherhood Policy, the first of which is to “reduce<br />

maternal morbidity and mortality.”<br />

In the author’s consultation with Ghana’s Head of Monitoring and<br />

Evaluation Department of the Ministry of Health Dr. A. Ofosu, he<br />

emphasized that ‘the use of mobile devices in the health sector in<br />

Ghana, has been increasing over the past five years. There are<br />

various pilot projects in Ghana where mobile devices are being<br />

used to; collect health data, facilitate Telemedicine, provide health<br />

messages to clients, follow-up children and women to reduce<br />

drop-out from service, manage logistics to reduce stock-outs,<br />

conduct Health Surveys and conduct facilitative supervision.’<br />

The mobile devices in use range from Pocket digital Assistants to<br />

simple phones and smart phones. Some of the initial pilots, using<br />

mobile devices, used pocket digital assistants, due to the low<br />

telephone network coverage. With the increase in availability of<br />

mobile communication service providers, phones of varying<br />

complexity have become the choice tool for use in various fields<br />

in health. Mobile technology holds immense potential for<br />

addressing health delivery bottlenecks. Indeed mobile devices will<br />

become as important as the stethoscope in the years ahead, Dr.<br />

Ofosu added.<br />

4.1.1.1 The Mobile Technologies for Community<br />

Health (MoTeCH) Initiative<br />

Improved maternal health, as is well known, is a major indicator<br />

for development and global initiatives to intensify policy<br />

intervention for maternal mortality began with the Safe<br />

Motherhood Initiative in 1987, a response to growing recognition<br />

that primary health-care programmes in many developing<br />

countries were not adequately focused on maternal health [10]. In<br />

an article by Rosemary Ardayfio titled ‘Improved Maternal<br />

Health. An Indicator of Development,’ reference was made to<br />

health delivery in the Northern Region ‘which is beset with<br />

several challenges including poor road networks, lack of<br />

electricity and inadequate community health workers’ [3].<br />

[1] in a paper, also discussing obstacles challenging maternal<br />

health in Ghana, listed them as limited geographical access by<br />

some clients, limited human resources; ageing midwives, and their<br />

numbers, inadequate funding, inadequate collaboration among


Ministries, Departments and Agencies (MDAs) and between<br />

MDAs and the Private sector, Socio-economic challenges, Lower<br />

literacy rate among females leading to low empowerment level,<br />

high poverty levels and poor health-seeking behaviours. Low risk<br />

perception. Service availability is also low and where available<br />

utilization is generally low especially in the rural and peri-urban<br />

areas, not forgetting harmful traditional practices.<br />

When ICTs are integrated into donor strategies implementation of<br />

programmes in developing countries produce effective results; the<br />

degree of corruption is reduced and democracy heightened.<br />

Within this context, the Ghana MoTeCH initiative which begun<br />

May 2010, aims to determine whether mobile phones can be an<br />

effective tool in managing healthcare data and transmitting health<br />

information to remote populations, with the ultimate goal of<br />

empowering rural folks by improving maternal and child health<br />

outcomes in rural Ghana. The project is led by the Ghana Health<br />

Services, in partnership with Columbia University’s Mailman<br />

School of Public Health and the Grameen Foundation. It is funded<br />

by the Bill and Melinda Gates Foundation. MoTeCH is currently<br />

in its pilot phase, with plans to expand throughout Ghana in the<br />

future. The Upper East is one of the smallest and least urbanized<br />

regions in Ghana, with 85 percent of the population living in<br />

dispersed communities throughout the rural areas [58].<br />

The low population density and infrastructure barriers create a<br />

challenge for health care delivery, necessitating a communitybased<br />

approach. Over the past decade or so, Ghana has been<br />

operating its Community Health Planning and Services (CHPS)<br />

program, which utilizes traditional institutions and social<br />

networks with support from outreach nurses employed by the<br />

Ministry of Health to reach as many people in the rural areas as<br />

possible. It is on these CHPS centers and the nurses who work<br />

there, in particular, that MoTeCH focuses its efforts [[58] informs.<br />

The local communities’ aspect of the project investigates the<br />

question, “Can mobile phones be utilized to meaningfully answer<br />

questions and provide information to individuals in impoverished<br />

rural communities in a way that promotes better health<br />

practices[11];[6] evaluates the project as designed to answer<br />

policy questions regarding possible health service benefits of<br />

information technology. It is expected to build upon the promising<br />

healthcare reform efforts underway in Ghana by examining the<br />

feasibility of utilizing mobile phone technology for reforming<br />

routine health information operations and improving community<br />

healthcare worker efficiency and health service effectiveness. The<br />

project is working toward this goal by: reviewing existing health<br />

information systems and assessing community health service<br />

information needs, designing standardized registers for client<br />

information for community-based nurses; developing a<br />

community service delivery system for testing mobile phonebased<br />

information systems for improving maternal, newborn, and<br />

early childhood care; developing the district health management<br />

system software needed to accommodate mobile phonetransmitted<br />

service information; eavaluating the impact of mobile<br />

phone technology introduction on health service volume and<br />

delivery, and disseminating lessons learned about mobile phone<br />

applications to key stakeholders, policy makers, and health system<br />

managers so that, if effective, this type of data gathering can be<br />

replicated in similar settings [7].<br />

374<br />

Figure 1. Main Flows of Client and Reporting for MoTeCH<br />

Information Source: (Grameen Foundation, March, 2011)<br />

Figure 2. MoTeCH Impact (Author)<br />

are increasingly using mobile phones to create new livelihoods to<br />

enhance their lifestyles, while governments are using them to<br />

improve service delivery and citizen feedback mechanisms<br />

5. IMPACT ASSESSMENT<br />

5.1 Acceptance<br />

Mobile phones, are opening up a powerful new avenue of<br />

ommunication and information‐sharing for the population, and a<br />

alberg Global Development Advisors study, commissioned by the<br />

UN Foundation and Vodafone Foundation Technology<br />

Partnership notes that monitoring and evaluation efforts can face<br />

critical challenges in the short term, particularly with limited<br />

budgets to fund such activities such as the MoTeCH initiative<br />

[55]. As mHealth applications improve the process of data<br />

collection and the incorporation of data into decision making, will<br />

provide a foundation upon which to conduct long-term impact<br />

evaluations.<br />

In the MoTeCH context, one could safely say the target<br />

population has developed the capabilities for effective use of the<br />

mobile phone since the women feel less afraid and are more<br />

confident because the information conveyed is coming from<br />

health professionals. The messages are also helping them to


change their behaviour, improve their diet, seek care when they<br />

need it, and convince their husbands and families that many<br />

traditional beliefs and practices may not be good for the mother or<br />

baby [25].<br />

Nurses meanwhile are reporting that women are indeed coming to<br />

the health facility because of information received through the<br />

mobile phone. Additionally, the time that nurses save in not<br />

having to aggregate their monthly data returns manually, due to<br />

the electronic reports MoTeCH generates, means significantly<br />

more time can be spent on patient care. Efficiency and<br />

effectiveness are illustrated here.<br />

The Upper East Regional Director of Health Services, Dr Koku<br />

Awoonor-Williams, has said MoTeCH has improved health care<br />

delivery after its inception in some districts in the region There<br />

are improvements in deliveries from 45 percent to 52 percent and<br />

postnatal registrants from 26.9 percent to 63 percent [6]. This<br />

makes it possible to assert that MoTeCH has empowered pregnant<br />

women and new mothers to make the right choices concerning<br />

their conditions or even protected their human rights.<br />

5.2 Sustainability<br />

[28], in focusing on sustainable mobile Health or m-Health in<br />

developing countries, has noted that Health projects are far more<br />

likely to be sustainable in cases where buy-in from governmental<br />

or public bodies is secured. In this way, the project is<br />

institutionalized into existing government health programs and<br />

can receive budget attention. It is very important that a mobile<br />

Health project have the support of government. Ghana has done<br />

this through its Health Sector reforms which have made room for<br />

the maximum use of ICTs. The majority of m-Health projects are<br />

currently funded by international agencies or corporate social<br />

responsibility (CSR) initiatives of companies. For every m-Health<br />

project, therefore, it is critical to ensure that the program is<br />

aligned with the strategic goals of the national health system.<br />

Even though health sector funding has gradually increased over<br />

the years, the percentage that goes into actual service delivery<br />

remains low. About 90% of the health sector budget is spent on<br />

salaries and wages; since 2006 the share allocated to capital<br />

spending has dropped [41] continued. Current policy<br />

environments, business models and funding schemes around m-<br />

Health have fuelled the proliferation of pilot projects without<br />

enabling them to scale up in a meaningful, replicable way. An<br />

additional, and perhaps most significant, obstacle to improving<br />

and scaling the implementation of m-Health initiatives is the lack<br />

of monitoring and evaluation (M&E) and use of meaningful,<br />

consistent indicators and rigorous evaluation methods [36]<br />

laments. Additionally, [39] point out, “to overcome these<br />

obstacles around cost, access, and standards, healthcare systems<br />

must be highly innovative and inventive in their approach to<br />

delivering services. One way is to leverage the experience of other<br />

sectors that have used technology to improve their processes’ To<br />

avoid implementations such as MoTeCH being seen as a<br />

temporary project, visible ownership by the local implementation<br />

partner needs to be built in from the outset. Involvement of the<br />

375<br />

local partner needs to be not only in decision-making at the top<br />

but also in day-to-day management in the field [25].<br />

While these have been possible with the project, there is the need<br />

to step up future plans and actions of participants which could be<br />

used to customize future like-minded programs. As is well known,<br />

mobile phone usage in whatever field whether agriculture,<br />

banking and so on, derive from livelihood needs.<br />

The MoTeCH initiative recognized Ghana Government’s desire<br />

to, “improve ICT infrastructure in the health sector by networking<br />

all health facilities and by providing adequate ICT tools and<br />

service delivery management’’[24].<br />

The subject of long term sustainability is however in doubt. [25]<br />

believes that for MoTeCH system to survive beyond the life of the<br />

grant, ‘A broader country strategy for m-Health will help with<br />

sustainability.’<br />

This means if the Ministry of Health and Ghana Health Service<br />

could develop a comprehensive strategy for how m-Health will be<br />

approached, it should facilitate NGOs and other stakeholders<br />

coming together to design programs that fit together; a measure<br />

for continuous evaluation of systems, as one passes through<br />

various stages of implementation. Its framework too, can be tested<br />

on real or simulated environment to prove its worthiness the<br />

Foundation emphasizes.<br />

5.3 Awareness<br />

By mobilizing supply and demand, MoTeCH manages to deploy<br />

important and relevant messages to the target population.<br />

Community Health Workers (CHOs) transmit information<br />

obtained through the mobile phone to the patient database which<br />

in turn gets automatic reporting to the Ghana Health Service.<br />

Alerts and reminders are sent to CHO from patient database which<br />

facilitate scheduling of home visits in communities, ensure that<br />

services to pregnant women are provided in a timely manner.<br />

These include reminders on vaccinations for children. These<br />

reminders serve as awareness channels for the target population.<br />

There is broad agreement therefore, that access to communication<br />

is one of several essential components to enhance improvement in<br />

maternal health services. Here, the use of mobile phones has much<br />

potential. However, there is a need for robust evidence on<br />

constraints and impacts, especially when financial and human<br />

resources will be invested say [37].<br />

5.4 Implications of Mobile Phone Usage<br />

This paper believes in the suggestion that human capital is created<br />

by changing persons so as to give them skills and capabilities that<br />

make them able to act in new and improved ways. Development<br />

of the capabilities for effective use of a mobile phone also leads to<br />

enhancement of social capital or empowerment as noted<br />

elsewhere in this paper. Malcolm Gladwell said “poverty is not<br />

deprivation. It is isolation.” Often the “smallest technological<br />

advances create the largest social impacts” [22].<br />

Communication is important and universal and this paper affirms<br />

that mobile technology helps provide a cure against the isolation.<br />

6. DISCUSSION<br />

While the benefits are undeniable, mobility comes at its own<br />

price. It is imperative to plan extensively before deployment and


continue monitoring after implementation to prevent issues and<br />

maintain an optimal user experience. The benefits of mobile<br />

technology, combined with the improvement that mobile phones<br />

offer over PDA's in terms of data loss and uploading difficulties,<br />

make mobile phones a feasible method of data collection that<br />

needs to be further explored. Mobile-phone based technology for<br />

health is an emerging field in addressing health problems in the<br />

developing world declares [14], but it is imperative to note that<br />

most of the world –wide initiatives are disease specific and<br />

importantly, they are not integrated into health strategies, as<br />

Ghana is doing. Without integration into national ICT Policies,<br />

inefficiencies in this m-Health system remain unaddressed. For<br />

example, MoTeCH would have failed if PDAs and smart phones<br />

were used because they are expensive; this obviously makes<br />

impact of these initiatives more often than not “methodologically<br />

unsound”. MoTeCH is not disease-specific. Its focus is to improve<br />

access to a broad range of essential health services with special<br />

emphasis on pregnant women and infants.<br />

eHealth technologies according to [61] are essential when they are<br />

firstly, integrated into health services that meet basic needs,<br />

secondly, have been proven to be cost-efficient and also, when<br />

they meet well-defined specifications and have been validated<br />

through controlled clinical studies or rest on a widely accepted<br />

consensus by experts.<br />

The Head of Monitoring and Evaluation of the Ministry of Health<br />

in Ghana Dr Ofosu has admitted, during the author’s<br />

consultations, that the MoTeCH innovation was possible because<br />

of a mixture of factors including the significant health gaps,<br />

targeted private and public funding, and most important of all, the<br />

flourishing mobile markets. With the use of Mobile phones it is<br />

easy to track health outcomes and deviations may improve the<br />

healthcare system's ability to assess population health. Similarly,<br />

mobile applications could be used to track health trends as an<br />

early indicator of emerging health issues.<br />

On the question of trends that have developed as a result of the<br />

use of mobile technology, Dr. Ofosu mentioned that, the effect<br />

has been ‘huge’ in his words, ‘increase demand for services that<br />

makes service adjust to accommodate the increase contributes to<br />

improvement in quality of care.’ In other words, there is improved<br />

access to data for generating information for decision making.<br />

This definitely leads to an improvement in post-treatment<br />

understanding. Mobile technology gives pregnant women and the<br />

Community Health workers, a convenient medium to monitor ante<br />

and post natal instructions and double check prescriptions.<br />

Medication accuracy, a huge patient safety issue, could improve<br />

as a result. One can therefore, safely assume that MoTeCH mainly<br />

addresses information gap in pregnant women and the population<br />

- a way to advance the use of mobile telephony to support the<br />

achievement of the Millennium Development Goals for health.<br />

Research has revealed the beneficial outcome of savings of<br />

transportation costs, time and also the ability to reallocate the<br />

saved income from travel to other important activities. Overall,<br />

however, there is lack of empirical data and research concerning<br />

how the poor absorb the costs of mobile phones, and uncertainty<br />

about possible negative outcomes associated with the reallocation<br />

of cash resources such as between male and female household<br />

members [17]. Evaluation is part of a process that can determine<br />

cost-effectiveness, and involves educating the public about the<br />

benefits of m-Health, and leads to government policy – all of<br />

which were reported as among the most important barriers to m-<br />

376<br />

Health adoption by Member States [59]. Despite the need for<br />

evaluation, a survey found that results-based evaluation of m-<br />

Health implementations is not routinely conducted. Only 12% of<br />

Member States reported evaluating m-Health services. This may<br />

be because short term challenges of limited funding are faced by<br />

the implementing agencies. m-Health applications improve the<br />

process of data collection and the incorporation of data into<br />

decision making, Thus providing a foundation upon which to<br />

conduct long-term impact evaluations [57]. The use of mobile<br />

phones in the health sector as confirmed by [33] and, necessarily<br />

leads to; quick, timely high quality affordable healthcare for all,<br />

everywhere, at any time; overcomes shortage of healthcare staff<br />

and funding and optimization of patient care; Enhances preventive<br />

care; Protects human rights; and educates and thus empowers<br />

citizens, and so on.<br />

7. CONCLUSIONS<br />

Currently, there has been a proliferation of multiple approaches to<br />

thinking about health systems and there are many ways in which<br />

the term “health system strengthening” is used [37]. The<br />

penetration of mobile phone networks in many low- and middleincome<br />

countries surpasses other infrastructure such as paved<br />

roads and electricity, and dwarfs fixed Internet deployment. The<br />

growing sophistication of these networks – offering higher and<br />

higher speeds of data transmission alongside cheaper and more<br />

powerful handsets – are transforming the way health services and<br />

information are accessed, delivered, and managed. With increased<br />

accessibility comes the possibility of greater personalization and<br />

citizen-focused public health and medical care [59].<br />

Universally speaking, cellular technology has six main intrinsic<br />

features appropriate for its adoption in developing countries: low<br />

infrastructure investment, ease of use, low energy consumption,<br />

affordability of services and devices, surpassing unfavorable<br />

geographic structures and less vulnerability to vandalism and<br />

natural disasters than other technologies. With a myriad of<br />

obstacles preventing low-income countries from increasing their<br />

ICT uptake, this paper shows that Ghana’s MoTeCH project is<br />

truly cutting-edge. It fills critical knowledge gaps about the<br />

feasibility of using mobile phone technology to improve routine<br />

maternal health information operations, and demonstrates the<br />

possibility of using information systems as a tool to deliver<br />

community healthcare more efficiently and effectively [7].<br />

However, still in its infancy, mHealth runs the risk of not realizing<br />

full potential due to small‐scale implementations and pilot<br />

projects with limited reach. [37] has insisted in research work on<br />

the topic with others. The Ghana Health Service admits that little<br />

research has been done on the feasibility of utilizing mobile phone<br />

technology for reforming routine health information operations<br />

and improving community health care worker efficiency and<br />

health service effectiveness. Also, few studies have investigated<br />

the use of mobile phones as a data collection tool in low income<br />

countries. [46] suggests; with the increasing application of ICT<br />

and e-networks within countries, the concept of e-governance has<br />

arisen. E-governance deals with the whole spectrum of the<br />

relationships and networks within government that involve the use<br />

and application of ICTs as shown in Chart 1 of the MoTeCH<br />

initiative. Similarly, the advent of global ICT networks and<br />

globalization is challenging these recent concepts, and global ehealth<br />

governance is emerging as a major issue, Scott continued.<br />

A concluding question for future research is how to control


activities such as the MoTeCH partnership (health related and<br />

otherwise) that increasingly reside in the hands of globally<br />

distributed entities.<br />

8. REFERENCES<br />

[1] Aboagye, D. (2005). Achieving MDGs 4 & 5. WHO.<br />

[2] African Economic Outlook. (2011). Ghana. AfDB, OECD,<br />

UNDP, UNECA.<br />

[3] Ardayfio, R. (2012, March 26th). Improved Maternal Health.<br />

Major indicator of development. Daily Graphic , p. 11.<br />

[4] Arora, S. Strategies in e-Governance.<br />

http://www.mgsipap.org/egov-conference.<br />

[5] Asheeta Bhavnani, R. W.-W. (June, 2008). The role of<br />

Mobile Phones in Sustainable Rural Poverty Reduction .<br />

Washington, DC: UN ICT Policy Division (GICT).<br />

[6] Awoonor-Williams, D. J. (2012). MoTeCH - Population and<br />

Family Health. NY: Colombia University.<br />

[7] Awoonor-Williams, J. K. (2012). Mobile Technology for<br />

Community Health. Population and Family Health .<br />

[8] Boateng, V. (2009). E-Government and e-Health Strategies.<br />

ECOSOC Africa Regional Ministerial Meeting on e-Health :<br />

E-Government and E-Health Strategies. Accra: ECOSOC.<br />

[9] Bos, E. (2008). Improving Maternal Health:The need to<br />

focus on reaching the poor. The World Bank.<br />

[10] Campbell, O. M. What Are Maternal Health Policies in<br />

Developing Countries and Who Drives Them? A Review of<br />

the Last Half-century. London: UK DID -JSI Europe.<br />

[11] Center, D. P. (August 2009). MOTECH: m-Health<br />

Ethnography Report. Grameen Foundation.<br />

[12] Chetley, A. (2006). Improving Health, Connecting people:<br />

the role of ICTs in the health sector of developing countries.<br />

INFODEV.<br />

[13] Chib, A. (20-21 May, 2009). The Aceh Besar Midwives with<br />

Mobile Phones Program: Design and Evaluation Perspectives<br />

using the Information and Communication Technologies for<br />

Healthcare Model. Pre-conference workshop at the<br />

International Communication Association (ICA)<br />

Conference“Mobile 2.0: Beyond Voice?”. Chicago, Illinois:<br />

International Communication Association (ICA).<br />

[14] Columbia University Mailman School of Public Health.<br />

Ghana Health Service. Grameen Foundation. (n.d.).<br />

MoTeCH: A Comprehensive Overview. Mobile Technology<br />

for Community Health .<br />

[15] Davidson, W. B. (2012). The GIT Report- Mobile<br />

Broadband:Redefining Internet Access and Empowering<br />

Individuals. GENEVA: WEF/INSEAD.<br />

[16] Donner, J. (7-8 June 2004). Innovations in Mobile-Based<br />

Public Health Information Systems in the Developing<br />

World:An example from Rwanda. Mobile Technologies and<br />

Health: Benefits and Risks. Udine (Italy): The Center for<br />

Global Health and Economic Development The Mailman<br />

School of Public Health The Earth Institute at Columbia<br />

University.<br />

377<br />

[17] Duncombe, R. (2012). Understanding Mobile Phone Imact<br />

on Livlihoods in Developing Countries: A New Research<br />

Framework. Manchester: University of Manchester.<br />

[18] Dzidonu, P. C. (2005). Ministerial ICT Policy- Opening<br />

statement. Accra, Ghana: Ministry of Communications -<br />

Government of Ghana.<br />

[19] Fredriksson, T. (2010). The Growing Possibilities of<br />

Information and Communication Technologies for Reducing<br />

Poverty. Geneva: The Global Information Technology<br />

Report 2010–2011 © 2011 World Economic Forum.<br />

[20] Frempong, G. (2010). Ghana ICT Sector Performance<br />

Review Performance Review.2009/2010 . Towards Evidence<br />

-based ICT Policy and Regulation. ResearchICTAfrica.net ,<br />

Volume 2 Policy Paper 8.<br />

[21] Ghana Health Service. (May 2009). Ghana Maternal Health<br />

Survey 2007. Accra: Ghana Statistical Service,Ghana Health<br />

Service,Macro International Inc.<br />

[22] Gladwell, M. (2009). The Tipping Point. Social Implications<br />

of Mobile Technology in Developing Worlds .<br />

[24] GoG. (2007). National health policy: Creating wealth<br />

through health. Accra: Government of Ghana- MInistry of<br />

Health.<br />

[25] Government of Ghana. (2005). Ghana ICT4AD Policy.<br />

Retrieved April 6th, 2012, from<br />

http://www.ict.gov.gh/pdf/Ghana%20ICT4AD%20Policy.pdf<br />

[26] Grameen Foundation. (March, 2011). Mobile Technology for<br />

Community Health in Ghana- Early Lessons Learned.<br />

Grameen Foundation.<br />

[27] Greenberg, A. (2005). ICTs for Poverty Alleviation:Basic<br />

Tool and Enabling Sector. Montreal: SIDA.<br />

[28] Harry McConnell, w. P. (2008). Leapfrog technologies for<br />

health and development . Global Forum Update on Research<br />

for Health Volume 5- Technological Innovations.<br />

[29] Iluyemi, A. (2007). Mobile eHealth for health workers in<br />

developing countires:impacts on organisational process, and<br />

users' behaviour-Research in progress. Portsmouth, UK:<br />

University of Portsmouth.<br />

[30] Internet World Statistics. (2001-2012, April 1). Internet<br />

World Stats- Usage and Poulation Statistics. Retrieved April<br />

7th, 2012, from Internet World Stats.<br />

[31] ITU. (2010). National e-Strategies for Development. Global<br />

Status and Perspectives 2010. GENEVA: ITU.<br />

[32] ITU. (2012). Report of the Partnership on Measuring<br />

Information and Communication Technology for<br />

Development. UNSTATS.<br />

[33] ITU. (2011). The World in 2011-ICT Facts and Figures.<br />

Geneva: ITU.<br />

[34] ITU-D. (2010). Mobile eHealth Solutions for Developing<br />

Countries- qUESTION 14 2-2. Geneva: ITU.<br />

[35] Jayanthy Maniam, C. C. (2007). Mobile Phone based<br />

Pregnancy Support System . Washington DC USA: UNPAN.


[36] Juniper Research. (2011, April 13). The Mobile Healthcare<br />

Opportunity-Monitoring, Applications & mHealth Strategies<br />

2010 - 2014. Juniper Research Reports , p. 83 pages.<br />

[37] Lemaire, J. (December 2011). Scaling up Mobile<br />

health:Elements necessary for the successful scale up of<br />

mHealth in developing countries. Advanced Development<br />

for Africa.<br />

[38] Marchal B, C. A. (2009). Global Health Actors Claim To<br />

Support Health System. PLoS Medicine Volume 6 | Issue 4,.<br />

[39] Margaret C Hogan, K. J. (April 12, 2010). Maternal mortality<br />

for 181 countries, 1980–2008:. The Lancet .<br />

[40] McKinsey and Company and GSMA. (2010). mHealth a new<br />

vision for healthcare. London, Milan and Gurgaon Haryana:<br />

United Nations Foundation.<br />

[41] NCA- Ghana. (2011, October). Broadband Wireless Access<br />

(BWA)Licences in the 2500MHz – 2690MHz Band. Accra,<br />

Ghana.<br />

[43] OAU. (2001). Abuja Declaration on HIV/AIDS,Tuberculosis<br />

and other Related Infectious Diseases. African Summit on<br />

HIV/AIDS, Tuberculosis and other Related Infectious<br />

Diseases (pp. 1-8). Abuja: OAU.<br />

[44] OECD. (2003). Integrating Information and Communication<br />

Technologies in Development Programmes. OECD Policy<br />

Brief .<br />

[45] Osei, D. A. (2007). Implementation of the National Health<br />

Insurance Scheme (NHIS) in Ghana: experience sharing.<br />

Cape Town.<br />

[46] Rappaport, J. (1985). The power of empowerment language.<br />

Social Policy, 16(2), , 15-21.<br />

[47] Rifat A. Atun, S. R. (2005). Uses and Benefits of SMS in<br />

Healthcare Delivery. Centre for Health Management, Tanaka<br />

Business School. Imperial College London , V21.1.<br />

[48] Scott, R. E. (2009). Global e-health policy: from concept to<br />

strategy. canada: IDRC.<br />

[49] Sheila Kinkade, K. V. (2008). Wireless Technology for<br />

Social Change:Trends in Mobile Use by NGOs. Washington,<br />

DC / Newbury, UK: United Nations Foundation: Vodafone<br />

Group Foundation.<br />

[50] Singh, B. a. (2007).<br />

[52] Soumitra Dutta, B. B.-O. (2012). The GITREPORT 2012-The<br />

Networked Index 2012. GENEVA: WEF/INSEAD.<br />

[53] Tevie, M. W. (2012, February 12). Director-Generalof<br />

National IT Authority (NITA). (J. E. Awotwi, Interviewer)<br />

378<br />

[54] Touré, D. H. (2012). Mobile Broadband Vision and The<br />

Broadband Commission. Mobile World Congress (MWC<br />

2012)-Government Mobile Forum . Barcelona, Spain: ITU.<br />

[55] Trevor Lewis, C. S. (2012). E-Health in Low-and-middle -<br />

income countries:findings from the Center for Health Market<br />

Innovations. Bull World Health Organization , 332-340.<br />

[56] UNESC & ECA. (2003). Report on e-Strategies in<br />

Africa:National, Sectoral and Regional ICT Policies, Plans<br />

and Strategies. Addis Ababa, Ethiopia: UN Economic and<br />

Social Council and Economic Commission of Africa.<br />

[57] UNFPA. (2009). UNFPA's Contribution To The Joint UN<br />

Accelerated Support to Countries in Maternal and Newborn<br />

Health. UNFPA.<br />

[58] United Nations Foundation & Vodafone Foundation<br />

Technology Partnership. (2011, February). Health<br />

Informationas Healthcare - The Roleof Mobiles in unlocking<br />

Health Data and WellnessS. Washington,D.C.: United<br />

Nations Foundation & Vodafone Foundation Technology<br />

Partnership.<br />

[59] Varatharajan Durairaj, S. D. (2010). Ghana's Approach to<br />

Social Health Protection-World Health Report<br />

(2010).Background Paper, 2. Geneva: WHO.<br />

[60] Vital Wave Consulting. (2009). mHealth for Development-<br />

The Opportunity of Mobile Technology for Healthcare in the<br />

Developing World. Washington D.C. USA and Newbury,<br />

Berkshire, UK: United Nations Foundation and Vodafone<br />

Foundation.<br />

[61] Weinstein, J. (2011, June Wednesday 8th). MoTeCH's<br />

Mobile Apps Bridging Rural Gap for Pregnant Women.<br />

Retrieved April Saturday 7th, 2012, from NextBillion.net.<br />

[62] WHO. (2011). mHealth- New Horizons for health through<br />

mobile technologies. Global Observatory for eHealth Series ,<br />

Volume 3.<br />

[63] WHO. (1986). Ottawa Charter for Health Promotion.<br />

International Conference on Health Promotion. Ottawa:<br />

Health and Welfare Canada, Canadian Public Health<br />

organization.<br />

[64] WHO. (2004). STRATEGY 2004-2007. eHealth for Healthcare<br />

Delivery. Taking basic health solutions to countries.<br />

Geneva: WHO.<br />

[65] WHO. (2009). World Health Statistics, 2009. Geneva: World<br />

Health Organisation.<br />

[66] Wikihealth. (n.d.). ICT in Health care delivery system: A<br />

Framework for developing nations. Retrieved April 5th,<br />

2012, from ICT for Health.


If We Build it Will They Come? A Mixed-Method<br />

Exploration of High Speed Broadband Access and<br />

Economic Development<br />

ABSTRACT<br />

High speed broadband internet is often heralded as an effective<br />

economic development tool. To realize the purported benefits of<br />

broadband services, federal, state and local governments are<br />

investing in its expansion. However, the relationship between high<br />

speed broadband and the economic health of North Carolina<br />

communities is unknown. Using quantitative and qualitative<br />

methods, this study explores the relationship between high speed<br />

broadband and the economic health and economic development<br />

activities in North Carolina.<br />

Categories and Subject Descriptors<br />

B.4.3[INPUT/OUTPUT AND DATA COMMUNICATIONS]:<br />

Interconnections (Subsystems) - Fiber Optics; C.2.5<br />

[COMPUTER-COMMUNICATION NETWORKS]: Local and<br />

Wide-Area Networks - High Speed (Fiber), Internet; G.3<br />

[MATHEMATICS OF COMPUTING]: Probability and Statistics<br />

- Correlation and Regression Analysis, Multivariate Statistics;<br />

K.4.2 [COMPUTERS AND SOCIETY]: Social Issues -<br />

Employment<br />

General Terms<br />

Measurement, Economics, Theory<br />

Keywords<br />

High Speed Broadband, Economic Development, ICT, North<br />

Carolina<br />

1. INTRODUCTION<br />

1.1 Background<br />

High speed broadband internet (hereafter referred to as<br />

broadband), defined by the FCC as a connection of at least 768<br />

kbps downstream and greater than 200 kbps upstream at the time<br />

of this analysis, is often heralded as an effective economic<br />

development tool. Proponents argue it should enhance<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Amy Huffman<br />

Center for Public Technology<br />

CB #3330<br />

Chapel Hill, NC 27599<br />

arhuffman7@gmail.com<br />

379<br />

communities’ ability to attract new businesses and industries<br />

while retaining and improving their existing businesses [6]. To<br />

realize broadband’s projected economic and social benefits,<br />

federal, state and local governments are investing in its expansion<br />

[9]. In North Carolina, several governmental agencies and nonprofits<br />

such as the Golden LEAF Foundation, MCNC, and local<br />

governments invested in building a broadband infrastructure with<br />

hopes of positive results [16]. However, the literature on the<br />

relationship between broadband and economic growth is mixed<br />

and little research on its impact on NC communities has been<br />

conducted to date.<br />

1.2. Literature Review<br />

While ample research on broadband’s overall impact on society<br />

exists, few studies focus exclusively on its impact on the<br />

economic health of local economies and their economic<br />

development efforts. However, several studies measure and<br />

analyze the relationship between broadband infrastructure and<br />

economic growth. Czernick et. al, argue an increase in broadband<br />

availability positively impacts economic growth at a macro-level<br />

as their data from 25 OECD countries over eleven years (1996-<br />

2007) to draw these conclusions [2]. Koutroumpis also studied 22<br />

OECD countries from 2002-2007 to measure broadband’s impact<br />

on economic growth using a structural econometric model<br />

measuring the supply of and demand for broadband infrastructure<br />

[10]. He found evidence for a significant causal positive link<br />

between broadband infrastructure and economic growth [10]. Lehr<br />

et al. found broadband access positively impacts economic growth<br />

through statistical analysis of broadband penetration at the state<br />

level nationwide, individual communities, and a matched sample<br />

analysis of residential and small businesses broadband use [11].<br />

Kolko found similar results in California [9]. Kolko’s research,<br />

however, questioned whether a causal relationship between<br />

broadband infrastructure and economic growth exists [9]. He<br />

noted it is unclear whether there indeed is a causal relationship or<br />

if the correlation is a function of advancements in other areas [9].<br />

Kolko also suggested that while broadband expansion offers some<br />

economic benefits, the economic benefits to individual citizens<br />

are limited [9].<br />

Ford & Koutsky studied the impact municipal investment in<br />

broadband expansion has on economic growth [6]. They used an<br />

econometric model to compare one county, Lake County, who<br />

possessed an extensive municipally-owned broadband network, in<br />

comparison to other counties in Florida [6]. The authors found<br />

Lake County’s economic activity doubled relative to comparable<br />

Florida counties [6]. In addition, the authors also argued<br />

municipal broadband infrastructure is more successful than


private broadband infrastructure in improving economic growth<br />

[6].<br />

Other studies focused on geography and demographics and their<br />

relationship to broadband’s economic impact. Horrigan et al.<br />

found that broadband use increases in larger cities, cities with<br />

large telecommunications-intensive economic sectors and other<br />

demographics heavily influence broadband use [7]. Kandilov and<br />

Renkow question whether an investment made by the US<br />

Broadband Loan Program or sheer proximity to urban areas is a<br />

better predictor of economic growth [8]. They used quantitative<br />

data and an econometric model to measure the impact the US<br />

Broadband Loan Program has had on increasing economic vitality<br />

in rural areas [8]. Their findings suggest the positive outcomes are<br />

not a result of the loan program, but of a specific location’s<br />

proximity to other urban areas [8].<br />

The FCC’s National Broadband Plan suggests the absence of<br />

broadband infrastructure is more important in a business’s<br />

location decision than the presence of broadband. The report<br />

predicts, “Communities without broadband infrastructure will find<br />

it more difficult to attract investment,” [4]. Similarly, in a survey<br />

conducted by the International Economic Development Council,<br />

broadband was determined to be one of many factors that<br />

influence business’s location decisions [14].<br />

Thus, while some studies suggest broadband is important in<br />

stimulating economic growth still others argue proximity to urban<br />

areas is more influential than broadband in increasing economic<br />

growth, indicating the disagreement among scholars on<br />

broadband’s influence on economic health in local communities<br />

[2, 6, 8, 10, 11]. To date, research also suggests businesses<br />

consider broadband during the location decision process, although<br />

the absence of broadband is more important than its presence in<br />

their decision [4, 14]. NC specific research is limited, and the<br />

relationship between broadband and economic growth and<br />

broadband and economic development efforts in NC communities<br />

is currently unknown.<br />

2. RESEARCH QUESTIONS<br />

As long as these gaps in the literature and empirical research<br />

remain, North Carolina local governments have little information<br />

on how their current broadband infrastructure impacts their local<br />

economy and even less information to guide their use of<br />

broadband to improve economic development efforts. This study<br />

seeks to understand the impact broadband has on the economic<br />

health of North Carolina counties and what some communities are<br />

doing to utilize broadband to improve their economic well-being<br />

through economic development efforts. To inform local<br />

governments how to best leverage broadband as an economic<br />

development tool while addressing the gap in the existing<br />

literature on broadband access and economic development this<br />

study addresses the following research questions:<br />

How has access to high speed broadband internet affected North<br />

Carolina communities’ 1 economic health?<br />

1<br />

For the purposes of this study, community(ies) is defined as a<br />

county or a municipality.<br />

380<br />

How are some North Carolina communities’ using high speed<br />

broadband internet to support their economic development<br />

efforts?<br />

3. METHODOLOGY<br />

3.1. Overview<br />

To understand the county level impact and the strategic<br />

implications of broadband on NC communities’ economies and<br />

their economic development efforts, a mixed-method, two phased<br />

approach was employed. North Carolina was chosen because of<br />

the author’s affiliation with the state as a North Carolina native. In<br />

addition, this study focuses on North Carolina as a complement to<br />

the current “Rural Broadband Initiative Evaluation,” of<br />

broadband’s impact in North Carolina being conducted by the<br />

UNC-School of Government’s Center for Public Technology [16].<br />

The county was the primary unit of analysis for phase one, while<br />

the level of analysis in phase two was the community, which<br />

includes two counties and one municipality.<br />

In phase one, a series of correlations were performed to first<br />

determine if a relationship between broadband and the economic<br />

health of communities existed. After a significant relationship was<br />

found, a multivariate regression was performed to determine the<br />

level of impact broadband has on employment growth in North<br />

Carolina’s 100 counties. Employment growth rate, a proxy for the<br />

health or performance of a local economy, from 2005 to 2010 was<br />

chosen as the dependent variable [1, 15]. Data were collected for<br />

the model’s seven independent variables: broadband penetration,<br />

proximity to urban county, projected education level, population<br />

density, median household income, annual average temperature<br />

(a proxy for climate as an influential factor in location decisions),<br />

and average unemployment rate. Each independent variable was<br />

chosen to represent different factors traditionally considered to<br />

impact employment growth rate [1, 15].<br />

In phase two, comparative case studies of three communities<br />

provide an in-depth understanding of broadband’s impact on<br />

economic development efforts at the community level,<br />

specifically addressing the second research question.<br />

Communities with known investments in high-speed connectivity<br />

were explicitly chosen so lessons on how to best use broadband as<br />

an economic development tool could be gained. Experts in the<br />

field identified several communities satisfying this requirement,<br />

after which a standardized selection method considering<br />

geography, jurisdictional type, economic tier level, as defined by<br />

the North Carolina Department of Commerce, and broadband<br />

ownership further narrowed the list of qualified communities [13].<br />

Catawba County, Rutherford County and the City of Wilson were<br />

selected based on their fulfillment of the selection criteria. Data<br />

were gathered through eleven semi-structured interviews with<br />

local government officials 2 and other experts identified through<br />

expert selection and snowball sampling. The interviews consisted<br />

of a standard set of fifteen pre-tested interview questions. Content<br />

analysis was performed then coded for theme development.<br />

3.2. Limitations<br />

2 Interviewees identities are anonymous and confidential, thus any<br />

identifier such as their position or title is not listed to further<br />

ensure their anonymity.


The methodology contains inherent limitations. The standard data<br />

available for measuring broadband penetration in the United<br />

States is a scaled measure rather than an exact number of<br />

households subscribing to broadband services, or the penetration<br />

rate. 3 The scaled measure is inherently a weak measure because<br />

of its inability to account for slight differences in the penetration<br />

rate. It only encapsulates large differences, thus a granular<br />

investigation of broadband’s impact on employment growth is not<br />

possible with the available data. However, until more granular<br />

data is made more widely available to researchers, the use of this<br />

data is standard. In addition, data for the penetration rate is not<br />

available at the county level prior to December of 2008 [5]. By<br />

2008, much of the broadband infrastructure had been installed in<br />

North Carolina, thus determining the precise economic effect<br />

broadband has on economic growth is not possible with the<br />

current data.<br />

The employment growth rate and unemployment rate data were<br />

skewed due to the financial recession between 2008 and 2010. As<br />

such, employment and unemployment growth rates were<br />

calculated from 2005-2010 to account for any variance the<br />

recession may have caused. The interviews were subject to<br />

respondent induced biases as most interviewees had a vested<br />

interest in their community’s high-speed broadband infrastructure<br />

and thus strongly believe it improves their economic development<br />

efforts. Finally, due to time and resource constraints,<br />

representatives of the business communities were not included in<br />

the interview sample. As such, secondary sources provide<br />

information on broadband’s effect on business’ location decisions.<br />

4. ANALYSIS<br />

4.1 Quantitative Analysis<br />

Understanding how broadband currently affects the local<br />

economy fosters the design of policies and strategies that more<br />

comprehensively address issues facing broadband expansion and<br />

its relationship to the local economy and economic development<br />

efforts. For this reason, a quantitative analysis, consisting of<br />

correlations and a multivariate regression, was undertaken to<br />

explore the relationship between broadband and the overall<br />

economic health of North Carolina counties.<br />

The correlation for broadband penetration and employment<br />

growth was .327, demonstrating a relationship between broadband<br />

and employment growth rate exists. The multivariate regression<br />

model, which controls for variables that typically influence<br />

employment growth, indicates broadband availability does not<br />

significantly influence the employment growth rate between 2005<br />

3 FCC Form 477 measures Residential Fixed High-Speed<br />

Connections at least 768 kbps downstream and greater than 200<br />

kbps upstream per 1000 Households (BTOP/BIP Definition) on<br />

a scale of zero to five on the following scale: 1=Greater than<br />

0 and less than/equal to 200 households connected per 1000<br />

households 2=Greater than 200 and less than/equal to 400<br />

households connected per 1000 households 3=Greater than 400<br />

and less than/equal to 600 households connected per 1000<br />

households 4=Greater than 600 and less than/equal to 800<br />

households connected per 1000 households 5=Greater than 800<br />

households connected per 1000 households<br />

381<br />

and 2010. As shown in Figure 1, the model’s adjusted r squared<br />

was .364, however, broadband penetration’s significance was<br />

.266, indicating it has no influence on the employment growth rate<br />

between 2005 and 2010.<br />

Model Summary<br />

Model R R Square Adjusted<br />

R Square<br />

Std. Error<br />

of the<br />

Estimate<br />

1 .639 .409 .364 5.19031<br />

Figure 1. Regression Model Summary<br />

Many factors could cause broadband’s lack of significance in<br />

influencing the employment growth rate. However, its lack of<br />

significance in the current model is at least in part due to the high<br />

level of penetration in North Carolina by 2008. For example, a<br />

2007 e-NC Authority report found that at that time broadband was<br />

available to 79.64 % of residents in rural counties and 86.98% of<br />

residents in urban counties [3]. As access increases, the relative<br />

level of its impact on economic growth diminishes or decreases<br />

[12]. Thus, it is likely North Carolina has already realized the<br />

majority of the possible economic gains broadband, as it is<br />

currently measured, fosters. Henceforth it is likely broadband’s<br />

impact on economic growth will be more localized, occurring at<br />

an individual community or even sub-community level; which<br />

may not hold significance at the county level if economic gains<br />

are not widespread.<br />

4.2 Qualitative Analysis<br />

The qualitative analysis’s primary goal is to provide an in-depth<br />

understanding of how broadband affects economic development<br />

efforts at the community level. The case studies were compared<br />

and contrasted on the following dimensions: background and<br />

contextual information, broadband’s use in supporting business<br />

recruitment, retention and expansion, and its use in other<br />

economic development efforts.<br />

4.2.1 Catawba County<br />

Catawba County’s broadband infrastructure was primarily<br />

installed by private providers who continue to provide services to<br />

both citizens and businesses. Between 400 and 600 residents per<br />

1000 residents have access to broadband in Catawba County. 4<br />

Catawba County primarily uses broadband to recruit, retain and<br />

expand businesses, specifically high-tech data centers. One<br />

interviewee explained broadband’s importance in the process in<br />

the following way: “Well, certainly with our focus on data<br />

centers, the broadband is not simply a requirement it is one of the<br />

most important priorities. Behind power, broadband availability<br />

with redundancies is the most important issue. That’s one of our<br />

three primary target markets. And so, the access to broadband is<br />

mandatory to be able to target that sector, and we’re counting on<br />

that sector as a strong component of our future economy.”<br />

Interviewees indicated without Catawba County’s broadband<br />

infrastructure Apple would not have located there. One<br />

interviewee said, “Let’s just say, the world’s largest technology<br />

4 As of December 2010. From FCC Form 477. The date is the<br />

same for Rutherford County and the Wilson.


company is now located in Catawba county and in North Carolina<br />

only as a result of having broadband capabilities. Every iPhone<br />

and iPad application is being shipped through Catawba County<br />

and North Carolina now. So that’s a pretty dramatic reality that<br />

we would have missed had broadband infrastructure not been in<br />

place.” While another interviewee described broadband to be as<br />

important as other utilities in terms of economic development<br />

when they said, “It’s a utility that’s expected.” In addition, the<br />

county experiences direct economic benefits in the form of jobs<br />

and capital investments as several firms responsible for fiber<br />

production are located in Catawba County.<br />

Catawba County also uses broadband to improve the citizens’<br />

quality of life and enable businesses to offer employees the option<br />

to telecommute, and to attract employees wishing to telecommute.<br />

As one interviewee explained, broadband enables people who<br />

want to relocate to Catawba County to do so even if their job is<br />

not located in the county. The interviewee said, “We’re finding at<br />

this point there’s a number of people relocating to Catawba<br />

County. And they’re relocating there because their job is actually<br />

giving them enough flexibility that they can work anywhere.”<br />

4.2.2 Rutherford County<br />

The primary broadband infrastructure in Rutherford County was<br />

funded and installed through a partnership with the county, the<br />

Golden Leaf Foundation and other funders, and local non-profits<br />

Polk Area Network for Government Academic and Enterprise<br />

Activities, PANGAEA, and Foothills Connect. Based out of Polk<br />

County, PANGAEA provides and sells fiber fostered broadband<br />

services to local government agencies, education facilities,<br />

healthcare providers, first responders and other non-profits [17].<br />

The broadband infrastructure serves between 200 and 400<br />

residential connections per 1000 households.<br />

Like Catawba County, Rutherford County uses their broadband<br />

network to recruit and retain high-tech firms. Rutherford County<br />

recruited Facebook and the State Data Center, two large<br />

organizations that interviewees said would not have located there<br />

but for their broadband network. As one interviewee said,<br />

“Indirectly I can definitely say Facebook would not have located<br />

one of their server farms in Rutherford County had there not been<br />

adequate broadband infrastructure in the county. The same can be<br />

said of the state data center which is also located in Rutherford<br />

County.”<br />

Rutherford County also uses broadband to support entrepreneurial<br />

development. A non-profit, Foothills Connect, used broadband to<br />

set up a website for local farmers to sell their produce to regional<br />

buyers. The program enables farmers to sell to customers and<br />

markets they would not have access to without the broadband<br />

facilitated program. An interviewee described the program as a<br />

place, “Where people will go online, they’ll register as customers<br />

and clients and they will order online directly from the farmers.<br />

And it all comes through the Foothills Connect Farmer’s Fresh<br />

Market website program. And this allows farmers who ordinarily<br />

would not have had access; you know easy convenience access, to<br />

these markets and these people and buying clubs, so that they can<br />

sell their produce. And what the Farmer’s Fresh Market Program<br />

does is it connects these clients with these farmers.”<br />

4.2.3 The City of Wilson<br />

Private providers and Greenlight, the city-owned broadband<br />

network established in 2008 by the City of Wilson, built Wilson’s<br />

infrastructure. As one of the only city-owned broadband providers<br />

382<br />

in North Carolina, Greenlight competes with private companies<br />

such as Time Warner and Century Link in selling broadband<br />

internet as well as television and phone services to Wilson’s<br />

citizens and businesses. Between 400 and 600 per 1000 residents<br />

have access to broadband in Wilson.<br />

Similar to Catawba and Rutherford Counties, Wilson also uses<br />

broadband to attract businesses, particularly high-tech firms.<br />

However, among the three communities, Wilson is the most<br />

proactive in using broadband to retain, expand, and support<br />

existing businesses. Wilson prides itself in providing high-quality<br />

products at a low cost, competitive with private providers, through<br />

Greenlight. Interviewees indicated local businesses subscribing to<br />

Greenlight’s services realize significant monetary savings, which<br />

can then be reinvested into their businesses. In addition, Wilson<br />

also uses their network to improve the quality of life their<br />

community offers citizens. One interviewee explained the network<br />

improves quality of life in the following way, “When you’re<br />

trying to attract pharmaceutical companies, high end technical<br />

companies, their employees and their staff are going to want very<br />

good connectivity at home as well so that they can telecommute<br />

when necessary or when that’s available to them. And we can do<br />

that through our broadband network.”<br />

5. FINDINGS<br />

5.1 Broadband Does Not Significantly Impact<br />

Employment Growth<br />

Similar to other studies, the quantitative analysis suggests a strong<br />

relationship between broadband and economic health does not<br />

exist. However, some studies have found it may impact some<br />

industry sectors, such as information technology, more than others<br />

[15]. Thus, analyzing broadband’s impact on each industrial<br />

sector could yield different results. In addition, as employment<br />

growth has been used as a proxy for the economic health of a<br />

community in this and other studies, and results have not been<br />

found, it is possible that employment growth rate is too broad or<br />

rough as a measure of economic health. Thus the use of a different<br />

dependent variable, such as the number of new business startups,<br />

could yield different results. Indeed, the qualitative analysis<br />

suggests there is a stronger relationship between broadband and a<br />

community’s economic health than the quantitative analysis<br />

demonstrates.<br />

5.2 Broadband is Important in Attracting and<br />

Retaining Businesses<br />

The qualitative analysis’s most significant finding is that<br />

broadband is used as a business attraction and retention tool by<br />

local government leaders involved in the business recruitment and<br />

retention process. Similar to findings from the literature, the case<br />

studies’ findings suggest broadband ranks as important as water,<br />

sewer and electricity to communities as they work to attract and<br />

retain businesses [6]. As one interviewee said, “…honestly I think<br />

that everyone needs to look at it as basic infrastructure like a<br />

water line or a sewer line because in the last few years that is<br />

basically what it has become.” The remaining ten interviewees<br />

echoed this sentiment, saying they viewed broadband as a utility<br />

or an essential part of their basic infrastructure in their<br />

communities. They also all said they use broadband to recruit<br />

businesses, especially high-tech data centers and firms. They do<br />

so through a variety of means, but primarily by providing


information about their broadband system’s speeds, rates and<br />

access. Each community stressed the importance of a high-quality<br />

broadband system with the capacity for high-speed uploads and<br />

downloads in attracting high-tech industries.<br />

All three communities also use broadband as a tool in aiding<br />

business retention and expansion, albeit less so than it is for<br />

business attraction. Interviewees from Catawba and Rutherford<br />

indicated the proliferation of broadband contributes to business<br />

satisfaction and enables expansion, thus improving business<br />

retention and expansion efforts.<br />

While it is evident broadband is important in business recruitment,<br />

retention and expansion, its importance relative to other factors<br />

influential in business location and expansion decisions is unclear.<br />

Some respondents indicated broadband was the most important<br />

factor in recruiting certain businesses while others believed it was<br />

important to have, but was not the most important factor. As one<br />

respondent stated, “I’ve had some other industries who have said<br />

it was not a significant factor or deciding factor, but was among<br />

the factors that led to their decision to locate.” Conversely,<br />

interviewees from Catawba and Rutherford County indicated that<br />

without their broadband infrastructure neither Apple nor<br />

Facebook, respectively, would have located in their communities.<br />

While it is unclear whether broadband is more important than<br />

other business location decision factors, it may create a serious<br />

disadvantage for communities without an existing adequate<br />

infrastructure. As one respondent noted, “Despite the economic<br />

downturn that we have been experiencing, not one person or<br />

business is using less data than they were using before the<br />

downturn. Every one of us expects to have more power,<br />

computing power, and communications power in our hands or on<br />

our desk despite the downturn. And so a community that doesn’t<br />

realize their future is tied to communications facilitated by<br />

broadband, they’re probably missing the biggest opportunity<br />

coming down the pipes.” Similarly, another respondent said, “If it<br />

(broadband infrastructure) is not there, they (businesses) won’t<br />

locate there.” Similar to findings in the literature, the negative<br />

impact of not having broadband seems it may be more significant<br />

than the positive impact of having broadband available in one’s<br />

community [4]. Through this study, it is evident some businesses<br />

view broadband as an essential utility or piece of infrastructure<br />

that needs to be present if they are to locate there. Thus, as the<br />

FCC’s National Broadband Plan predicted, it is possible<br />

broadband’s absence may be more significant as a deterrent than<br />

its presence is as an attraction for businesses [4].<br />

5.3 Broadband Can Support Other Economic<br />

Development Activities<br />

The qualitative analysis suggests broadband also affects nontraditional<br />

economic development activities or strategies such as<br />

entrepreneurial development and attracting quality employees<br />

improving citizens’ quality of life. Several interviewees noted<br />

broadband improved their citizens’ quality of life through the<br />

provision of faster internet access, and the provision of the<br />

opportunity to telecommute. As an interviewee from Wilson<br />

explained, the opportunity to telecommute is particularly<br />

important in attracting pharmaceutical and high-tech firms<br />

because their employees want and expect to be able to<br />

telecommute if permitted.<br />

383<br />

6. RECOMMENDATIONS FOR FUTURE<br />

RESEARCH AND CONCLUSION<br />

6.1. Recommendations for Future Research<br />

Although this study’s findings add to the existing literature on<br />

broadband’s impact on the economic health of local communities<br />

and its relation to economic development activities in some<br />

communities, many questions surrounding broadband and<br />

economic development remain. More research is needed to<br />

determine broadband’s importance relative to other business<br />

location decision factors, whether the lack of broadband indeed<br />

disadvantages communities and if so how it does so. In addition,<br />

more research is needed to determine whether the lack of<br />

broadband indeed is more significant as a disadvantage than its<br />

presence is as an advantage for communities. Future research<br />

should also focus on businesses and how different types of<br />

businesses use and view broadband.<br />

6.2. Conclusion<br />

While many questions remain, this study explores the relationship<br />

between broadband and the economic health and economic<br />

development activities in North Carolina, using quantitative and<br />

qualitative methods. The quantitative data shows there is no<br />

significant correlation between employment growth rate and<br />

broadband in North Carolina’s counties, however, the case studies<br />

indicate there is more to the story. Broadband may not impact<br />

total employment growth at the county level, but at a more local<br />

level, it is influential. As an interviewee said, “It particularly<br />

matters to those who either do not have an existing broadband<br />

network, or whose network does not meet the community’s<br />

needs.” Understanding broadband’s utility as a business<br />

recruitment, retention and expansion tool, as well as its ability to<br />

serve as an economic development tool in other ways can aid<br />

North Carolina communities in improving their overall economic<br />

health and become a competitive player in the local, state, national<br />

and global economies.<br />

7. ACKNOWLEDGMENTS<br />

I would like to recognize and thank my committee members:<br />

Shannon H. Tufts (chair), William Lambe, and Jonathan Morgan.<br />

8. REFERENCES<br />

[1] Coomes, Paul. A. “Economic Performance Measures for<br />

Metropolitan Areas,” Journal of Economic and Social<br />

Measurement, 24, 1998, 157-179.<br />

[2] Czernich, N., Falck, O., Kretschmer T., and Woessmann., L.,<br />

Broadband Infrastructure and Economic Growth. The<br />

Economic Journal, Vol. 121(552), 2011, 505-532.<br />

[3] E-NC Authority. High Speed Internet Access in North<br />

Carolina. 2007. Accessed on 2/24/12.<br />

http://ncbroadband.gov/baller_footnotes/34.html<br />

[4] Federal Communications Commission. (2010). Connecting<br />

America: The National Broadband Plan. Washington, DC:<br />

US Government Printing Office. 2010. p291.<br />

[5] Federal Communications Commission. Form 477 website.<br />

Retrieved on 10/20/12.<br />

http://transition.fcc.gov/wcb/iatd/comp.html


[6] Ford, G. S., & Koutsky, T.M. Broadband and Economic<br />

Development: A Municipal Case Study from Florida. Review<br />

of Urban & Regional Development Studies, Vol. 17(3), 2005,<br />

219-229.<br />

[7] Horrigan, J. B., Stolp, C., & Wilson, R. H. Broadband<br />

Utilization in Space: Effects of Population and Economic<br />

Structure. The Information Society, Vol. 22(5), 2006, 341-<br />

354.<br />

[8] Kandilov, I. T., & Renkow, M. Infrastructure Investment and<br />

Rural Economic Development: An Evaluation of USDA’s<br />

Broadband Loan Program. Growth and Change, Vol. 41(2),<br />

2010, 165-191.<br />

[9] Kolko, Jed. “Does Broadband Boost Local Economic<br />

Development? Public Policy Institute of California,” January<br />

2010. 1-34.<br />

[10] Koutroumpis, P. The Economic Impact of Broadband on<br />

Growth: A Simultaneous Approach. Telecommunications<br />

Policy, 33, 2009, 471-485.<br />

[11] Lehr, W.H., Osorio, C.A., Gillett, S.E, & Sirbu, M.A.<br />

Measuring broadband’s economic impact. Tepper School of<br />

384<br />

Business. Paper 457, 2005.<br />

http://repository.cmu.edu/tepper/457.<br />

[12] Mankiw, G. The Principles of Economics, 4 th Edition.<br />

Thomas-South-Western. 2007.<br />

[13] North Carolina Department of Commerce website. Retrieved<br />

on 9/1/11. http://www.nccommerce.com/researchpublications/incentive-reports/2011-county-tier-designations.<br />

[14] Settles, Craig. Community Broadband Snapshot Report,<br />

“Broadband’s Impact on Economic Development: The Real<br />

Deal,” International Economic Development Council, Sept.<br />

2010.<br />

[15] Shideler, D., Badasyan, N. and Taylor, L. “The Economic<br />

Impact of Broadband Deployment in Kentucky,” Federal<br />

Reserve Bank of St. Louis Regional Economic Development,<br />

2007, 3(2), pp. 90.<br />

[16] Tufts, Shannon. “Golden LEAF Rural Broadband Initiative<br />

Annual Evaluation Report,” December 2011. p26.<br />

[17] PANGAEA website. Retrieved on 12/12/2011.<br />

http://www.pangaea.us/company/history.php.


Session 13<br />

E-democracy & Participation 2


An e-Democracy experience: Digital Cabinet Office of Rio<br />

Grande do Sul State (Brazil)<br />

Marie Anne Macadar<br />

Pontifical Catholic University of<br />

Rio Grande do Sul<br />

Av. Ipiranga, 6681, Prédio 50<br />

Zip Code: 90.619-900<br />

Porto Alegre – RS - Brazil<br />

Phone: (55) (51) (3320-3524)<br />

marie.macadar@pucrs.br<br />

ABSTRACT<br />

This paper aims to identify the influence of institutional factors in<br />

implementing e-Democracy practices at the Digital Cabinet Office<br />

of Rio Grande do Sul State (Brazil). Institutional theory is used as<br />

the theoretical framework in this case study and supported the<br />

construction of the conceptual model based on some propositions.<br />

This is a research in progress and, therefore, just a few initial<br />

issues are pointed out. However, they show that the researchers<br />

must continue working in this case study in order to bring some<br />

contributions to e-Government theory.<br />

Categories and Subject Descriptors<br />

K.4.1 [Computers and Society]: Public Policy Issues - Use/abuse<br />

of power<br />

General Terms<br />

Management, Theory<br />

Keywords:<br />

e-Government, e-Democracy, Participation<br />

1. INTRODUCTION<br />

In the last decades, the social setting of human life has been<br />

remodeled by the technological revolution produced by<br />

Information and Communication Technologies [4]. Considering<br />

current technological changes, one feels the need for an effective<br />

ICT management in government. The Brazilian reform in public<br />

management idealized in 1995 has emphasized such a need. The<br />

term electronic government (e-Gov) has been introduced to refer<br />

to the use of ICT in public management for improving<br />

administration, for delivering government information and<br />

services, and also for introducing citizen engagement and<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Gabriela Viale Pereira<br />

Pontifical Catholic University of<br />

Rio Grande do Sul<br />

Av. Ipiranga, 6681, Prédio 50<br />

Zip Code: 90.619-900<br />

Porto Alegre – RS - Brazil<br />

Phone: (55) (51) (3320-3524)<br />

gabiviale@terra.com.br<br />

385<br />

participation in government [5][10].<br />

Vanessa Marques Daniel<br />

Pontifical Catholic University of<br />

Rio Grande do Sul<br />

Av. Ipiranga, 6681, Prédio 50<br />

Zip Code: 90.619-900<br />

Porto Alegre – RS - Brazil<br />

Phone: (55) (51) (3320-3524)<br />

nessa.daniel@gmail.com<br />

Heeks and Bailur [11] regard the acknowledgement of contextual<br />

factors - besides technological ones - as a positive aspect in e-<br />

Government research. This study is, therefore, relevant since it<br />

aims to analyze the relation between institutional factors and the<br />

implementation of e-Democracy practices in Brazil.<br />

This research is in the context of IT government adoption and<br />

management for widening communication channels between these<br />

organizations and society by means of web portals for citizen<br />

participation. Our goal is to identify the influence of institutional<br />

factors in the implementation of e-democracy practices. The<br />

theoretical framework used here is institutional theory, which<br />

postulates that organizations tend to adopt similar structures<br />

forming a homogeneous field in order to get the recognition in the<br />

environment they are inserted. Institutional theory has constructs<br />

which allow the analysis of the organizational environment of<br />

public management and the influence of institutional factors in the<br />

adoption of technology in organizations.<br />

This paper is an early study about the Digital Cabinet in Rio<br />

Grande do Sul (Brazil) and, as pointed out before, institutional<br />

theory will provide our theoretical basis, briefly presented in<br />

sections 2 and 3 below. Section 4 shows the methodological<br />

aspects of the research and the propositions to be tested. The case<br />

study is then introduced in section 5 and final considerations are<br />

made in section 6.<br />

2. THE INSTITUTIONAL PERSPECTIVE<br />

AND GOVERNANCE<br />

There is a consensus that influential organizations have the power<br />

to legitimate others in their social environment and the ability to<br />

influence their decision-making process. In this context,<br />

governments are regarded as the organizations with more power<br />

to intervene in others [14]. However, King et al. [12] argue that<br />

institutional factors are essential components to understand the<br />

adoption of innovations in IT that cross-organizational borders.<br />

According to Scott [16], regulative, normative and cognitive<br />

factors exert influence on the adoption of IS in public<br />

administration. Regulative factors "involve the capacity to<br />

establish rules, inspect others' conformity to them, and, as<br />

necessary, manipulate sanctions-rewards or punishments-in


attempt to influence future behavior" (p.52)[15]. Processes<br />

attached to laws, norms or sanctions bring about pressure for<br />

adjustment in the organizational field. The normative pillar is<br />

conditioned to certification and accreditation. As pointed out by<br />

Scott: “These beliefs are not simply anticipations or predictions,<br />

but prescriptions-normative expectations of how specified actors<br />

are supposed to behave” (p.55)[15]. Last but not least, the<br />

cognitive system is related to common beliefs and shared logic<br />

and is supported by culture.<br />

Thus, institutional theory is concerned with aspects of social<br />

structure, reflecting on the processes by which structures –<br />

schemes, rules, norms and routines – are set as guidelines for<br />

social behavior [15]. Avgerou [1] suggested that new<br />

institutionalism provides a conceptual platform to analyze actions<br />

resulting from cultural processes and from the power underlying<br />

organizations and their social environment.<br />

2.1 Institutions and Organizations<br />

DiMaggio and Powell [6] questioned what makes organizations so<br />

similar to one another. For them, institutions in a given<br />

organizational field become homogenous in an effort to get<br />

legitimacy through isomorphism. The authors identified three<br />

mechanisms from which isomorphical institutional changes take<br />

place: coercive isomorphism, mimetic isomorphism, and<br />

normative isomorphism. As far as the adoption of technology is<br />

concerned, there is a tendency for similarity through different<br />

isomorphisms.<br />

One of the main propositions in institutional analysis is that<br />

organizations tend to be grouped together in fields and each field<br />

tend to develop similar structures and processes [1]. DiMaggio<br />

and Powell [6] define organizational field in institutional analysis<br />

as organizations which form a recognized area and undergo a<br />

process of homogeneity through isomorphism in order to become<br />

legitimate. This is a strong tendency for public organizations,<br />

which need to be legitimate to remain active in government, to<br />

share some similarities in structures and services.<br />

As pointed out before, DiMaggio and Powell [6] identified three<br />

mechanisms according to which institutional isomorphic changes<br />

occur: coercive isomorphism, which derives from political<br />

influences, mimetic isomorphism, which results from models of<br />

other organizations, and normative isomorphism, associated with<br />

professionalization.<br />

According to the authors, coercive isomorphism results from<br />

formal and informal pressures by organizations on which others in<br />

the same field depend, providing legitimacy to organizational<br />

structures, to their processes and results. Avgerou [1] adds that<br />

government mandates and legal systems in regional, national and<br />

international organizational contexts constitute forms of coercive<br />

pressure, and rules are the mechanism which determines<br />

structures and processes in the public sector.<br />

Avgerou [1] states that normative pressures refer to the effects of<br />

professional practice. DiMaggio and Powell [6] point out that an<br />

important aspect of professionalization, which provides<br />

isomorphism, is the support to formal education and the<br />

legitimacy provided by a cognitive basis coming from university<br />

specialists. They argue that normative mechanisms generate<br />

groups that occupy a similar position in the organization and share<br />

similarities in terms of orientation and control [6].<br />

386<br />

Mimetic mechanisms are defined by Avgerou [1] as the<br />

acquisition of structural and process characteristics from<br />

successful organization models. DiMaggio and Powel [6] believe<br />

that mimetic mechanisms can arise due to uncertainties resulting<br />

from the lack of understanding of organizational technologies<br />

taking other organizations as models. The authors claim that<br />

homogeneity in organizational structures derives from active<br />

search for models like the ones belonging to older organizations.<br />

2.2 Governance<br />

Following Bresser-Pereira [3], managerial public administration<br />

has come to existence at the end of the 20th century with the<br />

challenge to make the public sector more efficient and transparent<br />

to society. According to Diniz et al. [7], the use of IT has made a<br />

change in the model of public management possible with the<br />

arising of e-Government. This challenge for public organizations<br />

to remain in a complex and dynamic environment has driven<br />

organizations to adopt models focused on governance principles<br />

that ensure a more transparent result based management. The need<br />

for transparency and for results has emerged from environment<br />

pressure that public organizations should consider issues like<br />

efficiency, efficacy, transparency, and mechanisms of control and<br />

accounts of government. In order to do so, it is necessary for such<br />

organizations to adopt ICT resources as essential tools to<br />

strengthen governance and transparency in public organizations<br />

[2].<br />

2.3 Electronic Governance<br />

The use of ICT in the public sector, which used to be called<br />

electronic government in 1990, is now referred to as electronic<br />

governance or e-Government since it encompasses broader<br />

concepts like, for example, the application of ICT in public<br />

governance [5; 2]. According to Barbosa et al. [2], there are<br />

currently other IT applications to be considered besides the access<br />

to public services on the internet like, for instance, improvement<br />

of administrative processes, increase in efficiency, control of<br />

public policies, integration between governments and electronic<br />

democracy.<br />

Electronic governance comprises the use of IT not only for<br />

improving management of resources and governmental processes<br />

(public e-Administration) but also for upgrading citizens e-<br />

Services and for increasing citizens democratic participation in<br />

governments practices (e-Democracy) [5].<br />

2.3.1 Electronic Democracy<br />

Electronic democracy is concerned with a more interactive<br />

environment, creating opportunities for cooperation between<br />

citizens and social groups and, therefore, increasing political<br />

participation in decision-making processes [10]. For Frey [10], the<br />

governmental sector must have an active role in devising<br />

electronic governance practices meant to freshen up democracy.<br />

Furthermore, discussion forums should approach topics related to<br />

citizens' real life problems in order to make them engage in<br />

democratic practice.<br />

Digital forms of participation are mapped by Pell [14], who<br />

relates electronic democracy practices with information, enquiries<br />

and deliberation baselines. As far as baseline information is


concerned, Pell [14] makes reference to web sites, search engines,<br />

data bases and online discussion forums. On web search queries<br />

there are e-mails, referendums, electronic enquiries and electronic<br />

petitions. As for baseline deliberation, there are discussion groups,<br />

teleconferences, and community pages on the web. According to<br />

Pell, digital technologies can increase the number and the mode of<br />

such participation methods even further.<br />

3. METHODOLOGY<br />

This is a qualitative research which aims to understand an issue by<br />

examining a case study. Flick [9] states that in qualitative research<br />

there is a mutual interdependence of isolated parts in the process<br />

and, therefore, it is not possible to regard research stages as linear<br />

but rather continuous and related to one another.<br />

The research strategy chosen here is case study since it is our goal to<br />

focus on the study of a specific phenomenon, as pointed out by<br />

Eisenhardt [8]. The case was selected following Flick [9]’s criteria in<br />

the sense that a particularly typical single instance was chosen and<br />

analyzed consistently before any comparative analysis was carried<br />

out.<br />

Primary data will be collected during field research for<br />

investigating different facets of the case study. Then semistructured<br />

interviews with different stakeholders and the main<br />

actors involved in the implementation of the web portal will be<br />

conducted. Another research tool that will be used is document<br />

analysis since documents can provide important information to<br />

corroborate research results.<br />

The current research is still getting under way. A preliminary<br />

theoretical study has been made and an interview with the<br />

executive coordinator of the Digital Cabinet was conducted in<br />

December 2011.<br />

Proposition<br />

P1:<br />

Proposition<br />

P1a:<br />

Proposition<br />

P2:<br />

Proposition<br />

P2a:<br />

Proposition<br />

P3:<br />

Proposition<br />

P3a:<br />

Public organizations dependent on<br />

funding and on political influence are<br />

coerced into implementing e-Democracy<br />

practices due to coercive pressures<br />

Political influence and retention of<br />

funds by dominant organizations have<br />

an impact on coercive pressure for the<br />

implementation of e-Democracy<br />

practices by dependent public<br />

organizations.<br />

Public organizations which need<br />

acceptance in their organizational field<br />

tend to implement e-Democracy<br />

practices due to normative pressure.<br />

The existence of a desired behavior in<br />

the organizational environment reflects<br />

in normative pressure for the<br />

implementation of e-Democracy<br />

practices in public organizations.<br />

Public organizations that need<br />

legitimacy tend to use successful models<br />

in the implementation of e-Democracy<br />

practices due to mimetic pressure.<br />

The existence of successful models of e-<br />

Democracy practices in organizational<br />

environment result in mimetic pressure<br />

on the implementation of such practices<br />

by public organizations.<br />

387<br />

4. CONCEPTUAL MODEL<br />

On the basis of the theoretical framework adopted in this research,<br />

a conceptual model and some propositions were defined with the<br />

aim to analyze the influence of institutional pressures on the<br />

implementation of e-democracy.<br />

Figure 1: Conceptual model<br />

Table 1: Theoretical propositions<br />

5. THE DIGITAL CABINET: AN<br />

INTRODUCTION TO THE CASE<br />

The Digital Cabinet is the web portal to the State Government of<br />

Rio Grande do Sul (Brazil). It follows the concept of e-<br />

Democracy since it is characterized as a means of citizen<br />

engagement and participation. It is, as stated in the web portal<br />

(2011), "a space for participation which aims to encourage a new<br />

culture of governance in the public sector by creating new<br />

channels of communication and cooperation with society through<br />

the use of digital tools". It started operating in 2011 and has four<br />

tools: "Governor listens", “Collaborative Agenda”, "Governor<br />

answers" and "Governor asks".<br />

The tool "Governor listens" offers public hearings on the Internet<br />

for citizens to participate and chat with the government. The<br />

"Collaborative Agenda” consists in contributions from citizen<br />

members to bring issues forward and help make the governor's<br />

agenda on his visits to the countryside. The tool "Governor<br />

answers" constitute an environment in which members of the<br />

public can ask questions to the Governor and choose by vote a<br />

question they want to have answered on a video at the end of each<br />

month. Finally, “Governor asks” is a tool through which the<br />

Governor puts forward a given topic and citizens are asked to<br />

discuss it and give their contribution to the discussion of<br />

important local issues. The authors of the most voted<br />

contributions meet the governor personally and debate the topics<br />

with him.<br />

5.1 The Institutional Perspective of the Digital<br />

Cabinet<br />

The initiative of creating the Digital Cabinet, according to its<br />

executive coordinator, Mr. Fabricio Solagno, follows similar<br />

experiences around the world, especially in Obama's government<br />

in the US and in Canada. There are also reports of a similar<br />

experience by the Secretary for Communications in Ceará, Brazil.<br />

One of the main differences between the Digital Cabinet in Rio<br />

Grande do Sul (RS) and similar initiatives in Brazil is that<br />

participation tools are managed by Secretaries for<br />

Communications, which is not the case in RS. As pointed out by<br />

Solagno, "we are inside the Governor's cabinet and that's where all<br />

decision-making comes from".


Evidence shows that cognitive factors affect the implementation<br />

of e-Democracy practices. The cognitive pillar can be observed in<br />

the existence of a common sense on the benefits of creating a web<br />

portal for organized public participation in view of the legitimate<br />

experience of other successful web portals. The influence of web<br />

portals from other countries, for instance, the USA, was thus<br />

identified as a positive model to be followed and adapted to<br />

different demands.<br />

6. CONCLUDING REMARKS<br />

Considering the present situation of web collaboration, e-<br />

Democracy practices tend to be a requirement for new forms of<br />

government in order to meet the demands of contemporary<br />

society. Collaboration in e-Democracy digital environments can<br />

be seen as a gain not only for the population, which looks for<br />

ways of effective participation, but also for governments that<br />

expect to achieve legitimacy and recognition in the web.<br />

This paper reports a research in progress and, therefore, it is not<br />

meant to present an analysis of the case. It has been possible,<br />

however, to establish directives for further reflections on the<br />

matter. The first directive refers to the peculiarity of this case<br />

study, in special to its structuring (being inside the Governor's<br />

Cabinet), which being examined in the light of Institutional<br />

Theory, can shed light into important questions. A second aspect<br />

to be explored concerns the limitations of national and<br />

international cases of collaboration in government virtual<br />

environments and the effective participation of citizen in public<br />

decision-making. Limited experiences entail a specific and<br />

peculiar outlining to cultural, social, and political conditions.<br />

Once again Institutional Theory can be proved useful as a<br />

guideline to analysis. In the analysis of the only interview that<br />

has been carried out so far, it is possible to identify some<br />

influence of mimetic pressures in the implementation of e-<br />

Democracy practices which will be corroborated in a further stage<br />

of this research.<br />

7. ACKNOWLEDGMENTS<br />

Our thanks to CNPq and FAPERGS for partial support for this<br />

research. The authors also want to thank CAPES for the financial<br />

support given to take part in ICEGOV 2012.<br />

8. REFERENCES<br />

[1] Avgerou, C. 2002. Information systems and global diversity.<br />

Oxford University Press, New York.<br />

[2] Barbosa, A. F.; Faria, F. I.; Pinto, S. L. 2007. Governança<br />

eletrônica no setor público. In: Knight, P. T.; Fernandes, C.<br />

C. C.; Cunha, M. A. (Orgs). e-Desenvolvimento no Brasil e<br />

no mundo: subsídios e Programa e-Brasil. São Caetano do<br />

Sul: Yendis Editora.<br />

[3] Bresser-Pereira, L. C. B. 2002. Reforma da nova gestão<br />

pública: agora na agenda da América Latina, no entanto...<br />

Revista do Serviço Público, 53,1.<br />

[4] Castells, M. 2000. A The Rise of the Network Society: The<br />

Information Age: Economy, Society, and Culture Volume I<br />

(Information Age Series), Wiley-Blackwell; 2nd edition.<br />

[5] Cunha, M. A.; Annenberg, D.; Agune, R. M. (Prestação de<br />

serviços públicos eletrônicos ao cidadão. In: Knight, P. T.;<br />

Fernandes, C. C. C.; Cunha, M. A. (Orgs). 2007. e-<br />

Desenvolvimento no Brasil e no mundo: subsídios e<br />

Programa e-Brasil. São Caetano do Sul: Yendis Editora.<br />

388<br />

[6] Dimaggio, P. J.; Powell, W. W. 1983. The iron cage<br />

revisited: Institutional isomorphism and collective rationality<br />

in organizational fields. American Sociological Review, 48,<br />

2, p.147-160.<br />

[7] Diniz, E. H.; Barbosa, A. F.; Junqueira, A. R. B.; Prado, O.<br />

2009. O governo eletrônico no Brasil: perspectiva histórica a<br />

partir de um modelo estruturado de análise. Revista de<br />

Administração Pública (RAP), Rio de Janeiro, 43, 1, p.23-<br />

48.<br />

[8] Eisenhardt, K. M. 1989. Building Theories from Case Study<br />

Research. Academy of Management Review, 14, 4, p.532-<br />

550.<br />

[9] Flick, U. 1998. An introduction to qualitative research.<br />

London: Sage.<br />

[10] Frey, K. 2009. Perspectivas da democracia local na era<br />

digital. In: Cunha, M. A. V. C.; Frey, K.; Duarte, F. (Orgs.).<br />

Governança local e tecnologias da informação e<br />

comunicação. 1. ed. Curitiba: Champagnat.<br />

[11] Gil-Garcia, J. & Luana-Reyes, L. 2006. Encyclopedia of E-<br />

Commerce, E-Government and Mobile Commerce. IDEA<br />

Group Reference.<br />

[12] Heeks, R.; Bailur, S. 2007. Analyzing e-government<br />

research: Perspectives, philosophies, theories, methods, and<br />

practice. Government Information Quarterly, 24, p.243-265.<br />

[13] King, J. L.; Gurbaxani, V.; Kraemer, K. L.; McFarlan, F. W.,<br />

Raman, K. S.; Yap, C. S. 1994. Institutional Factors in<br />

Information Technology Innovation. Information Systems<br />

Research, 5, 2, p.139-169.<br />

[14] Peel, D. 2009. Utilizando tecnologias digitais para a<br />

ampliação da participação pública no planejamento. In:<br />

Cunha, M. A. V. C.; Frey, K.; Duarte, F. (Orgs.).<br />

Governança local e tecnologias da informação e<br />

comunicação. 1. ed. Curitiba: Champagnat.<br />

[15] Rodriguez, C. L.; Diniz, E. H.; Ferrer, F. 2007. Influência<br />

governamental e estratégias institucionais na difusão de<br />

inovações em economias emergentes. Revista de<br />

Administração de Empresas (RAE), 47, 1, p.10-21.<br />

[16] Scott, W. R. Institutional theory P408-14 In: Encyclopedia of<br />

Social Theory, George Ritzer, ed. Thousand Oaks, CA: Sage,<br />

2004.<br />

[17] Scott, W. R. 2008. Institutions and organizations: ideas and<br />

interests. 3. ed. Thousand Oaks: Sage.


Social Inclusion and Digital Divide: eParticipation<br />

dilemmas in municipalities<br />

Lukasz Porwol<br />

DERI, NUI Galway, Ireland<br />

lukasz.porwol@deri.org<br />

John Breslin<br />

DERI, NUI Galway, Ireland<br />

john.breslin@deri.org<br />

ABSTRACT<br />

Citizen-participation faces a large number of obstacles.<br />

eParticipation is considered to be one of the key tools to ensure<br />