15.11.2012 Views

icegov2012 proceedings

icegov2012 proceedings

icegov2012 proceedings

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2012<br />

ALBANY, NEW YORK<br />

UNITED STATES<br />

6 INTERNATIONAL CONFERENCE<br />

ON THEORY AND PRACTICE OF<br />

ELECTRONIC GOVERNANCE<br />

TH<br />

22 - 25 OCTOBER 2012<br />

EDITED BY J. RAMON GIL-GARCIA, NATALIE HELBIG & ADEGBOYEGA OJO


The Association for Computing Machinery<br />

2 Penn Plaza, Suite 701<br />

New York New York 10121-0701<br />

Copyright © 2012 by the Association for Computing Machinery, Inc. (ACM) Permission to make digital or hard copies of<br />

portions of this work for personal or classroom use is granted without fee provided that the copies are not made or distributed for<br />

profit or commercial advantage and that copies bear this notice and the full citation on the first page in print or the first screen in<br />

digital media. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is<br />

permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or<br />

a fee. Send written requests for republication to ACM Publications, Copyright & Permissions at the address above or fax +1<br />

(212) 869-0481 or email permissions@acm.org.<br />

For other copying of articles that carry a code at the bottom of the first or last page, copying is permitted provided that the percopy<br />

fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.<br />

Notice to Past Authors of ACM-Published Articles. ACM intends to create a complete electronic archive of all articles and/or<br />

other material previously published by ACM. If you wrote a work that was previously published by ACM in any journal or<br />

conference <strong>proceedings</strong> prior to 1978, or any SIG Newsletter at any time, and you do NOT want this work to appear in the ACM<br />

Digital Library, please inform permissions@acm.org, stating the title of the work, the author(s), and where and when published.<br />

ACM ISBN: 978-1-4503-1200-4<br />

ii


Foreword<br />

The 6 th International Conference on Theory and Practice of Electronic Governance, ICEGOV2012, was held in Albany, New<br />

York, United States (US) from October 22-25, 2012. It was hosted by the Center for Technology in Government, University at<br />

Albany, State University of New York under the patronage of the United States National Archives and Record Administration.<br />

The conference was supported by the Center for Electronic Governance of the United Nations University - International Institute<br />

for Software Technology (UNU-IIST), Macao SAR, which is the ICEGOV Series Organizer.<br />

The ICEGOV (International Conference on Theory and Practice of Electronic Governance) series focuses on the use of<br />

technology to transform relationships between government and citizens, businesses, civil society and other governments<br />

(Electronic Governance). Established in 2007 by the Center for Electronic Governance, UNU-IIST, the series looks beyond the<br />

traditional focus on technology-enabled transformation in government (Electronic Government) towards new forms, new<br />

paradigms, and new foundations for technology-enabled governance, collaboration and sustainable development. ICEGOV is a<br />

forum where researchers and practitioners meet to test theories, share insights and report their experiences. It facilitates networkand<br />

capacity-building through a diversity of presentation formats. The conference also provides a unque developmental<br />

opportunity for participants from developing countries, nations in transition, United Nations agencies, and from a range of<br />

governmental and non-governmental organizations. Since its establishment, the series has traveled the globe from Macao SAR<br />

(ICEGOV2007), to Cairo (ICEGOV2008), Bogota (ICEGOV2009), Beijing (ICEGOV2010), Tallinn (ICEGOV2011), and now<br />

to Albany (ICEGOV2012); with each edition generating significant local interest and stakeholder engagement.<br />

Continuing the ICEGOV tradition, ICEGOV2012 featured a rich academic, capacity-building and network-building program of<br />

keynote lectures, tutorials, doctoral colloquium, plenary sessions, thematic sessions, paper sessions, poster session and discussion<br />

panels. All these session were built on the contributions from researchers and practitioners from around the world. Individuals<br />

from over 60 countries were involved in the preparations for ICEGOV2012, as authors, reviewers or committee members. The<br />

2012 edition provided a unique forum for rich interactions between digital government researchers in the United States and North<br />

America and peers from Africa, Asia, Latin America and Europe.<br />

The conference featured three keynote lectures by distinguished experts who offered government, academic and international<br />

perspectives on Electronic Governance. David Ferriero, the Archivist of the United States, National Archives and Records<br />

Administration, presented the first keynote. Nigel Shadbolt, Co-founder of the Open Data Initiative, Professor of Artificial<br />

Intelligence at the University of Southampton, and Head of the Web and Internet Science Group, presented the second keynote<br />

on Open Data Ecosystems. The third keynote was presented by Dr. Beth Simone Noveck, former United States Deputy Chief<br />

Technology Officer on the Future of Governance in the Digital Age.<br />

Seven tutorials were provided as part of the conference exploring areas such as Contests and Prizes in the Age of Social Media,<br />

Digital Curation for Public Sector Professionals, Open Data, Fraud Detection using Modeling and Simulation for Practice and<br />

Research, Public Value Assessment of Open Government Efforts, and Smart Cities, Smart Government: A Research and Practice<br />

Consortium..<br />

Six plenary sessions were organized on topics including: Value Creation through Open Data Ecosystem moderated by Alex<br />

Howard from O’Reilly Media; Open Government: Vision, Value and the Way Forward moderated by Chris Vein, US Deputy<br />

Chief Technology Officer; Information Stewardship: Policy Foundations for Open Government moderated by Miriam Nisbet,<br />

Director of the Office of Government Information Services (OGIS), US National Archives and Records Administration; Smart<br />

Innovation for Sustainable Urban Growth and Development moderated by Meghan Cook, Program Manager, Center for<br />

Technology in Government; Women and ICTs: Access and Empowerment moderated by Dina Refki, D.A., Executive Director<br />

for the Center for Women in Government & Civil Society, University at Albany; and Celebrating 20 Years of UNU-IIST: A<br />

Conversation about the Future of Government in the Digital Age moderated by Tomasz Janowski, Senior Research Fellow, IIST<br />

Center for Electronic Governance.<br />

An interactive Doctoral Colloquium was co-organized by Elsa Estevez, UNU-IIST Center for Electronic Governance, Macao<br />

SAR and Lei Zheng from Fudan University, China providing doctoral students from different countries and disciplines an<br />

opportunity to discuss a variety of themes related to electronic governance research and topics and issues associated with their<br />

dissertation research and career plans. The colloquium included a keynote presentation from Wojciech Cellary, Professor and<br />

Head of Department of Information Technology, Poznan University of Economics and a representative of Elsevier on how to<br />

publish scholarly articles.<br />

Eight thematic sessions were organized by invited experts from academia, government, industry, non-governmental organizations<br />

(NGO), the World Bank, the United Nations, and New York State Government. Each session drew attention to specific electronic<br />

governance concerns in a particular country or on an issue of particular topical interest.. These sessions cover the following<br />

topics.<br />

iii


• Civic Platforms and Coalitions<br />

• Regional Integration through e-Governance in UN-ESCWA region organized by UN Economic and Social<br />

Commission for Western Asia<br />

• Smart Cities - Sustainable Urban Innovation organized by European Commission, JRC-IPTS, Information Society Unit<br />

• Financial Transparency and the Role of Government organized by the OrgPedia Project;<br />

• Developing Public Value Metrics for Return on Government ICT Investments organized and sponsored by Microsoft<br />

• Big Data Analytics organized and sponsored by EMC<br />

• Bridging the North and South Gap in ICT-enabled Policy Modeling and Governance co-organized by UN-IIST Center<br />

for Electronic Governance, Center for Technology in Government, and the EgovPoliNet/Crossover project<br />

In response to the call for submissions, the conference received 166 submissions from 68 countries. Five kinds of contributions<br />

were sought in the call – (1) Completed research or practice papers (2) Short research or practice papers , (3) Demonstrations – 2<br />

pages in length, (4) Posters and (5) Tutorials proposals. The conference organizers received a total of 98 completed works, 49<br />

ongoing works, 2 demonstrations, 11 posters and 5 tutorial. The members of the program committee and expert colleagues<br />

anonymous peer review (on average, three reviews were carried out for each submission). This process resulted in, 23<br />

submissions accepted as Completed Research work, 10 as Completed Practice/Policy work, 24 as Ongoing Research Work, 14 as<br />

ongoing Practice Work, 33 as Posters, 2 as Tutorials and 1 as Demonstration. This was an acceptance rate of 34%. All accepted<br />

submissions have been included, in revised form, in this volume, which is organized into 15 paper sessions, a poster section and<br />

a tutorial section.<br />

Many people and institutions contributed to the organization of ICEGOV2012. We wish to express our most sincere thanks to the<br />

official host of ICEGOV2012 – the Center for Technology in Government, University at Albany, and particularly to the Dr.<br />

Nancy Zimpher, Chancellor of the State University of New York (SUNY), and George M. Phillip, President of the University at<br />

Albany, for creating the enabling environment to turn ICEGOV 2012 into a reality. We also wish to thank Gerald D. Jennings,<br />

the Mayor of the City of Albany, for supporting and hosting the conference in the beautiful city of Albany, New York. We also<br />

wish to thank the conference patron, The U.S. National Archives and Records Administration for endorsing the conference.<br />

We would like to thank our Silver Sponsors Accenture and the Macau Foundation whose contributions have allowed ICEGOV to<br />

be one the premier international conferences in electronic governance. We would also like to recognize Microsoft and EMC for<br />

their dedication to ICEGOV since its inception—it could not have grown without their support. Special gratitude is due to Macao<br />

SAR Government, Public Administration and Civil Service Bureau (SAFP) and Macao Foundation, particularly to Ms. Florinda<br />

da Rosa Silva Chan, Secretary for Administration and Justice; Mr. José Chu, Director of SAFP and the President of the Macao<br />

Foundation; for supporting ICEGOV2012, the ICEGOV global conference series, and the e-Macao Program as the origin of the<br />

series.<br />

Our sincere thank you goes to the host of ICEGOV2012: the Center for Technology in Government (CTG), University at Albany.<br />

In particular we would like to recognize the efforts of Theresa Pardo, Jana Hrdinova, Jane Krumm-Schwan, Meghan Cook,<br />

Alison Heaphy, Paula Rickert, Jim Costello, and the whole CTG team for their time, energy, and dedication to ICEGOV2012.<br />

We are grateful to the General Conference Chairs in particular, David Ferriero, Archivist of the United States, National Archives<br />

and Records Administration and Haiyan Qian, Director of the Division for Public Administration and Development Management,<br />

United Nations Department of Economic and Social Affairs. We are appreciative of the guidance and support provided by the<br />

International Steering Committee and the National Steering Committee at various stages of the conference planning. We thank<br />

Sharon Dawes for chairing the Best Paper Awards Committee and the members of the committee for conducting a thoughtful and<br />

rigorous selection process. We would like to thank all of the members of the Program Committee and additional reviewers for<br />

their efforts in carrying out a quality review process which is the foundation of a strong conference program. We are most<br />

grateful to the keynote speakers, to the organizers and chairs of tutorials, doctoral colloquium, plenary sessions, thematic<br />

sessions, paper sessions and discussion panels, and to all panelists and speakers for their contributions. We are most thankful to<br />

all authors for their efforts in preparing, submitting and presenting papers at ICEGOV2012. Last but not least, we would like to<br />

acknowledge the efforts of the ICEGOV2012 Conference Committee and the team at the Electronic Governance Center, UNU-<br />

IIST towards organizing ICEGOV2012.<br />

We believe ICEGOV2012 has contributed to the ongoing efforts of building a global community of research and practice for<br />

Electronic Governance that is able to cross not only national but also institutional and thematic borders, and that the contacts,<br />

discussions and ideas in Albany in October 2012 will continue well after the conference is over and continue to build as we<br />

approach ICEGOV2013.<br />

Albany, NY October 2012 J. Ramon Gil-Garcia, Centro de Investigación y Docencia Económicas, Mexico<br />

Natalie Helbig, Center for Technology in Government, SUNY, United States<br />

Adegboyega Ojo, United Nations University, Macao<br />

Program Co-Chairs<br />

ICEGOV 2012<br />

iv


Table of Contents<br />

Forward .......................................................................................................................................................................................... iii<br />

Table of Contents ........................................................................................................................................................................... v<br />

Conference Organization ................................................................................................................................................................ x<br />

Session 1: Open Government Data<br />

o Beyond Open Government: Ontologies and Data Architectures to Support Ethical Consumption ........................................ 1<br />

Luis Luna-Reyes, Djoko Sigit Sayogo, Jing Zhang, Theresa Pardo, Giri Kumar Tayi, Jana Hrdinova, David Andersen<br />

o Exploring Process Barriers to Release Public Sector Information in Local Government ....................................................... 5<br />

Peter Conradie, Sunil Choenni<br />

o Implementation Framework for Open Data in Columbia ........................................................................................................ 14<br />

Lydia Marleny Prieto, Ana Carolina Rodriguez, Johanna Pimiento<br />

o Increasing Kenyan Open Data Consumption: A Design Thinking Approach ......................................................................... 18<br />

Leonida Mutuku, Jessica Colaco<br />

o New Perspectives for Electronic Government in Brazil: The Adoption of Open Government Data in National and Subnational<br />

Governments of Brazil ............................................................................................................................................................. 22<br />

Ricardo Matheus, Manuella Maia Ribeiro, José Carlos Vaz<br />

o Open Government 2.0: Citizen Empowerment through Open Data, Web and Mobile Apps .................................................. 30<br />

Rodrigo Sandoval-Almazan, Luis Luna-Reyes, J. Ramon Gil-Garcia, Dolores E. Luna, Yaneileth Rojas-Romero<br />

Session 2 - E-democracy & Participation 1<br />

o A Logistic Multilevel Model for Civic Engagement and Community Group Impact in the Digital Age ............................... 34<br />

B. Joon Kim, Stephen Kleinschmit<br />

o Designing Online Deliberation Using Web 2.0 Technologies: Drafting a Bill of Law on Internet Regulation in Brazil ....... 38<br />

Fabro Steibel<br />

o E-Participation in the Era of Web 2.0: Factors Affecting Citizens' Active E-Participation in Local Governance ................. 44<br />

Jooho Lee, Soonhee Kim<br />

o Genres of Communication in Activist eParticipation: A Comparison of New and Old Media ............................................... 48<br />

Marius Rohde Johannessen<br />

o Internet Voting: Fatally Torn Between Conflicting Goals? ..................................................................................................... 58<br />

Marco Prandini, Marco Ramilli<br />

Session 3: Policies 1<br />

o A New Roadmap for Next-Generation Policy-Making ........................................................................................................... 62<br />

Francesco Mureddu, David Osimo, Gianluca Misuraca, Stefano Armenia<br />

o Best International Practices for Access, Ownership and Use of Information and Communication Technologies for People<br />

with Sensory Disabilities ......................................................................................................................................................... 67<br />

Marco Peres, Paula Suárez<br />

o E-Government Education at the Public Administration Departments in Turkey .................................................................... 71<br />

Cenay Babaoglu, H. Serkan Akilli, Mehmet Akif Demircioglu<br />

o e-Government in Latin American Countries: Are they Building National Policies with a Regional Perspective? ................. 75<br />

J. Ignacio Criado<br />

o e-Government in Russia: Is or Seems? .................................................................................................................................... 79<br />

Lyudmila Bershadskaya, Andrei Chugunov, Dmitrii Trutnev<br />

Session 4 - EGOV Adoption and Usage<br />

o Framework for Useful Transparency Websites for Citizens .................................................................................................. 83<br />

Josune Arcelus<br />

o The Circular Continuum of Agencies, Libraries, and Users: A Model of E-Government in Practice .................................. 87<br />

Natalie Greene Taylor, Paul Jaeger, Ursula Gorham, John Bertot, Ruth Lincoln, Elizabeth Larson<br />

o The Critical Success Factors for Websites for Chinese Migrant Farmer Workers: A Multi-case Study ............................... 95<br />

Fang Wang, Lihong Gu<br />

o The Development of Public Smart Phone Apps in Korea: Empirical Approach ................................................................... 105<br />

Eom Seok-Jin, Mi Yeon Lee, Jun Houng Kim<br />

o Understanding Citizens' Perceptions of E-Government Services in Mexico ......................................................................... 109<br />

Juan M. Gomez Reynoso, Celene Navarrete, Rodrigo Sandoval Almazan<br />

v


Session 5 - Information Sharing, Models, & Platforms<br />

o Factors Influencing Exchange Activities in Transnational Knowledge Networks: The Case of the Hajj-MDSS ................. 113<br />

Mohammed Gharawi, Theresa Pardo<br />

o Information Sharing and Financial Market Regulation: Understanding the Capability Gap ................................................. 123<br />

Djoko Sayogo, Theresa Pardo, Peter Bloniarz<br />

o On Public Service Provision Informative Phase: A Dialogue-based Model and Platform .................................................... 132<br />

Efthimios Tambouris, Vassiliti Outsetari, Konstantinos Tarabanis<br />

o The Complexity of Cross-Boundary Information Sharing: An Organizational Perspective on Taiwan E-Government ....... 143<br />

Tung-Mou Yang<br />

Session 6: Digital Records & Information Management<br />

o A Patent System Ontology for Facilitating Retrieval of Patent Related Information ............................................................ 147<br />

Siddharth Taduri, Gloria Lau, Kincho Law, Jay Kesan<br />

o Digitisation of Electoral Rolls: Analysis of a Multi-Agency E-Government Project in Pakistan ......................................... 158<br />

Hasnain Bokhari, Mustafa Maqsood Khan<br />

o Integrating Argumentation Technologies and Context-Based Search for Intelligent Processing of Citizens' Opinion in Social<br />

Media ...................................................................................................................................................................................... 166<br />

Carlos Chesñevar, Ana Maguitman, Elsa Estévez, Ramón Brena<br />

o Preparing for Digital Curation Governance: Educating Stewards of Public Information ...................................................... 171<br />

Christopher Lee, Helen Tibbo<br />

o REGNET: Regulatory Information Management, Compliance and Analysis ....................................................................... 175<br />

Kincho Law, Gloria Lau<br />

Session 7: Policies 2<br />

o From Information-poor to Information-rich: Bridging Regional Economic Disparities in Nigeria through e-Governance<br />

................................................................................................................................................................................................. 184<br />

Sanjo Faniran, Kayode Olaniyan<br />

o ICT for Development and the MuNet Program: Experiences and Lessons Learnt from an Indigenous Municipality in<br />

Guatemala ............................................................................................................................................................................... 188<br />

Jorge López-Bachiller, Javier Sáenz-Coré, Diego Cardona<br />

o ICT Policy in Africa a Comparative Study of Ghana and Kenya: Drawing on Lessons from Developed Countries ........... 192<br />

Agnes Odongo<br />

o Laggards or Victims of Socioeconomic Conditions? Findings from Ongoing Survey of Female Slum-dwellers Without Cell<br />

Phone Ownership ................................................................................................................................................................... 202<br />

Devendra Potnis, Kanchan Deosthali<br />

o Promoting User Uptake of E-Government in Colombia ........................................................................................................ 206<br />

Diana Parra Silva, Johanna Pimiento Quintero<br />

Session 8: Measurement 1<br />

o From Failure to Success: Using Design-Reality Gap Analysis as a Mid-implementation Assessment Tool for e-Government<br />

................................................................................................................................................................................................. 210<br />

Lemma Lessa, Solomon Negash, Mesfin Belachew<br />

o Measuring Organizational Interoperability in Practice: The Case Study of Population Welfare Department of Government of<br />

Sindh, Pakistan ....................................................................................................................................................................... 216<br />

Devender Maheshwari, Marijn Janssen<br />

o Ranking and Hotspot Detection Methods on Infant Health for Districts in Java, Indonesia: E-Governance Micro Tools ... 226<br />

Yekti Widyaningsih, Wayne Myers<br />

o Technological Assessment of e-government Web presence in Nigeria ................................................................................. 236<br />

O. Michael Awoleye, Blessing Ojuloge, Willie Siyanbola<br />

Session 9: Social Media in Government<br />

o Exploring Social Media Usage in Saudi E-Government Websites ........................................................................................ 243<br />

Hend Al-Khalifa, Muna Al-Razgan, Nora Al-Rejebah, Ameera Al-Masoud<br />

o Government Crisis Communication on the Microblog: A Theory Framework and the Case of Shanghai Metro Rear-End<br />

Collision ................................................................................................................................................................................. 248<br />

Xiao Liang<br />

o Government Official Microblogs: An Effective Platform for Facilitating Inclusive Governance ........................................ 258<br />

Xinping Liu, Lei Zheng<br />

o Managing Chinese Government Microblogs: Enablers and Barriers ..................................................................................... 262<br />

Lei Zheng<br />

o Study on Social Media Applications by Government in Hong Kong .................................................................................... 267<br />

Huina Xu, Qian Chen<br />

vi


Session 10: ICTs & Governance Transformation<br />

o E-Government and Transformation of Governance and Service Delivery in Bangladesh: A Developing Country Perspective<br />

................................................................................................................................................................................................. 271<br />

Noore Siddiquee<br />

o Evaluating and Assessing a Typology of Ubiquitous City Services by Classifying and Assigning Actual Services from an<br />

Inventory of Identified Services ............................................................................................................................................. 279<br />

Jungwoo Lee, Hyejung Lee, Taesung Kim<br />

o Explaining the E-Government Paradox: An Analysis of Two Decades of Evidence from Scientific Literature and Practical<br />

on Barriers to E-Government ................................................................................................................................................. 287<br />

Alberto Savoldelli, Cristiano Codagnone, Gianluca Misuraca<br />

o Investigating the Relationships between Accountability and Governments' Transformation to E-Government .................. 297<br />

M. Sirajul Islam, Åke Grönlund<br />

o Technologies, Tools & Web 2.0 in Support of Public Administration Workplace Communications ................................... 301<br />

Milena Krumova<br />

o Transforming City Government: A Case Study of Philly311 ................................................................................................ 310<br />

Taewoo Nam, Theresa Pardo<br />

Session 11: IT Governance & Policy<br />

o A Literature Review: IT Governance Guidelines and Areas ................................................................................................. 320<br />

Ruben Pereira, Miguel Mira da Silva<br />

o Assessment of Success Factors of e-Government Project Implementation: Challenges for the Kosovo e-Government<br />

Perspective ............................................................................................................................................................................. 324<br />

Artan Rexhepi, Blerim Rexha, Agni Dika<br />

o Computer Supported Contractor Selection for Public Administration Ventures ................................................................... 332<br />

Zbigniew Paszkiewicz, Wojciech Cellary<br />

o E-Government Success Factors in the Context of an IT-enabled Budget Reform: A Questionnaire Report ........................ 336<br />

Gabriel Puron-Cid<br />

o Public CIO, Figurehead or Decision-Maker? The Case of Germany .................................................................................... 346<br />

Niels Proske, Moreen Heine, Norbert Gronau<br />

Session 12: Implementation & Impact<br />

o Design and Implementation of a Public School Government-to-Employee System ............................................................. 350<br />

Carl Strang, Ira Goldstein<br />

o E-Governance and Millennium Development Goals: Sustainable Development Perspective in Rural India ....................... 354<br />

Harekrishna Misra<br />

o Harnessing Renewable Energy Technologies for ICT and e-Governance Services in Un-electrified Communities in Rural<br />

Nepal ...................................................................................................................................................................................... 364<br />

Mona Sharma<br />

o ICT-enabled Delivery of Maternal Health Services ............................................................................................................... 369<br />

Johanna Awotwi<br />

o If We Build It, Will They Come? A Mixed-Method Exploration of High Speed Broadband Access and Economic<br />

Development .......................................................................................................................................................................... 379<br />

Amy Huffman<br />

Session 13: E-democracy & Participation 2<br />

o An e-Democracy Experience: Digital Cabinet Office of Rio Grande do Sul State (Brazil) .................................................. 385<br />

Marie Anne Macadar, Gabriela Viale Pereira, Vanessa Marques Daniel<br />

o Social Inclusion and Digital Divide: eParticipation Dilemmas in Municipalities ................................................................. 389<br />

Lukasz Porwol, Padraic O'donoghue, John Breslin, Chris Coughlan, Brendan Mulligan<br />

o Studying Chinese Government Microblogs: Content and Interactions .................................................................................. 393<br />

Tuo Zheng, Lei Zheng<br />

Session 14: Information Structure<br />

o CRHIS: Cloud-based Rural Healthcare Information System ................................................................................................. 402<br />

Manas Ranjan Patra, Rama Krushna Das, Rabi Prasad Padhy<br />

o Data collection in a degraded network: case of developing countries or countries in crisis .................................................. 406<br />

Jiomekong Azanzi Azanzi, Broto Laurent, Hagimont Daniel, Tchuente Maurice<br />

o The Secure Platform Problem: Taxonomy and Analysis of Existing Proposals to Address this Problem ............................ 410<br />

Michael Schläpfer, Melanie Volkamer<br />

vii


Session 15: Measurement 2<br />

o Anti-Corruption Online Monitoring Systems in Brazil .......................................................................................................... 419<br />

Ricardo Matheus, Manuella M. Ribeiro, José Carlos Vaz, Cesar A. de Souza<br />

o E-Government Portals in Central America: A Preliminary Evaluation and Ranking (2011-2012) ....................................... 426<br />

Rodrigo Sandoval-Almazan, J. Ramon Gil-Garcia, Nancy Karina Saucedo Leyva<br />

o Evolving e-government Benchmarking to Better Cover Technology Development and Emerging Societal Needs ............. 430<br />

Jeremy Millard, Kim Andreasson, Mikael Snaprud<br />

o Impacts of the Public Procurement Reform in Chile on the Municipal Level ....................................................................... 440<br />

Gaston Concha, Roberto Anrique<br />

Posters<br />

o A Crowdsourcing Model for Public Consultations on Draft Laws ........................................................................................ 450<br />

Vasiliy Burov, Evgeny Patarakin, Boris Yarmakhov<br />

o A Novel Scheme of Government Information Sharing System for Implementing Paperless Government ........................... 452<br />

John (Jong Uk) Choi, Joowon Cho, Dong Hwa Kim, Chang Hun Yoo<br />

o A structure oriented evaluation model for readiness of e-governance ................................................................................... 454<br />

Uranchimeg Tudevdagva, Uyanga Sambuu<br />

o An Initial Exploration of Hyperlinks of African Government Portal Websites ..................................................................... 456<br />

Abebe Rorissa<br />

o C-DAC Pan India Strategy in High Performance Computing for Human Advancement ...................................................... 458<br />

Kapil Mathur, Sandeep Agrawal, Sucheta Pawar, Abhishek Das, Goldi Misra<br />

o Crowdsourcing as Data Sharing: A Regional Web-based Real Estate Development Database ............................................ 460<br />

Robert Goodspeed, Christian Spanring, Timothy Reardon<br />

o Drivers for Public Sector Contests ......................................................................................................................................... 460<br />

Claudia Louis<br />

o E-Reconciliation in Rwanda ................................................................................................................................................... 464<br />

Erika Bagambiki<br />

o Electronic Participation System: The Nigerian Perspective .................................................................................................. 468<br />

Ibrahim Aliyu<br />

o Enterprise Systems and Government Organizational Changes: A Socio-materiality Analysis ............................................. 470<br />

Loni Hagen, Donghee Sinn<br />

o Evaluation of E-Governance Projects of Nepal ..................................................................................................................... 472<br />

Ganesh Adhikari<br />

o Exploiting the FLOSS Paradigm in Collaborative e-Learning: Application to e-Government ............................................. 474<br />

Sara Fernandes, Antonio Cerone, Luis Barbosa<br />

o From Inter-agency Information Sharing to Open Data: A Case Study of Taiwan E-Government ........................................ 477<br />

Tung-Mou Yang<br />

o From International Open Government Dataset Search to Discovery: A Semantic Web Service Approach ......................... 480<br />

Eric Rozell, John Erickson, Jim Hendler<br />

o Implementation of Integrated Tax System COTS Product .................................................................................................... 483<br />

Uyanga Sambuu, Zolbayar Chuluunbat, Esbold Unurkhaan<br />

o Information Sharing in Inter-departmental Collaboration: A Conceptual Framework for Local Government Authorities .. 485<br />

Alinaghi Ziaee Bigdeli, Muhammad Kamal, Sergio de Cesare<br />

o Interagency Collaboration in Providing Public Services in Russia: A Legal Perspective ..................................................... 487<br />

Evgeny Styrin, Andrey Zhulin<br />

o Monitoring Methods of e-Governance Development Assessment: Comparative Analysis of International and Russian<br />

Experience .............................................................................................................................................................................. 490<br />

Lyudmila Bershadskaya, Andrei Chugunov, Dmitrii Trutnev<br />

o Moroccan E-government Ten years Evolutions ..................................................................................................................... 492<br />

Mohamed Mohyi Eddine El Aichi<br />

o Opportunities for Improving eGovernment: Using Language Technology in Workflow Management ................................ 495<br />

Ola Knutsson, Eriks Sneiders, Alyaa Alfalahi<br />

o Prioritization and Geo-spatiotemporal Hotspot Detection of Forest Loss Hotspot Using NDVI as a Response Variable .... 497<br />

Koli Rajesh E., Rao Anil G., Ranei Guari M., Joshi Manish R.<br />

o Quality Assurance Case Study of an ICT Supported Legally Binding Election in Austria ................................................... 500<br />

Klaus John, Andreas Ehringfeld<br />

o Quality Assurance Model for e-Governance Projects: A Case Study on e-Counseling ........................................................ 502<br />

Rama Krushna Das Pabitrananda Patnaik, Manas Ranjan Patra<br />

o Regulation Room: Moving Towards Civic Participation 2.0 ................................................................................................. 504<br />

Josiah Heidt, Jackeline Solivan<br />

viii


o Revival of Farming Community with M-Agriculture ............................................................................................................ 506<br />

Swapna Veldanda<br />

o Social Media Usage Guidelines for the Government of the United Arab Emirates .............................................................. 508<br />

Ibrahim Elbadawi<br />

o System For Measuring E-Gov: A Multi-Stakeholder Approach ............................................................................................ 511<br />

Camilo Cristancho Mantilla, Juan Carlos Noriega Silva<br />

o The Digital Divide's Devaluing of Local E-Government ...................................................................................................... 513<br />

Richard Huff, Liana Kleeman<br />

o The Importance of Electronic Accessibility in Brazilian Juridical Electronic Process .......................................................... 516<br />

Adriana Simeao Ferreira, Daniel Goncalves de Melo, Leondeniz Freitas<br />

o The Use of Mobile and Wireless Technology and Food Quality Control in China ............................................................... 518<br />

Shuhua Monica Liu, Qianli Yuan, Danyao Li, Lei Zheng<br />

o The Use of Recursive Bisection in the Mapping of Sample New York State Electoral Districts ......................................... 520<br />

David Molik, Michelle Sharer<br />

o Toward Interoperable Government: A case of Bangladesh ................................................................................................... 522<br />

M. Shakhawat Hossain Bhuiyan<br />

o Trust Issues in the E-Government Implementation in Nepal ................................................................................................. 524<br />

Garima Dhakal, Prajwal Amatya, Bal Krishna Bal<br />

o eGovernance Implementation Model for Public Sector Innovation ........................................................................................ 526<br />

M. Irfanullah Arfeen, Nawar Khan<br />

Tutorials<br />

o Tutorial: Digital Curation for Public Sector Proffesionals ..................................................................................................... 528<br />

Christopher A. Lee and Helen Tibbo<br />

o Use of Agent-Based Modeling for e-Governance Research ................................................................................................... 531<br />

Yushim Kim, Callie McGraw<br />

ix


Conference Organization<br />

Host<br />

Center for Technology in Government, University at Albany, State University of New York (SUNY)<br />

Patron<br />

U.S. National Archives and Records Administration<br />

Conference Committee<br />

David FERRIERO, Conference Co-Chair - Archivist of the United States, National Archives and Records<br />

Administration, USA<br />

Theresa PARDO, Conference Co-Chair - Director and Research Professor, Center for Technology in Government,<br />

University at Albany, USA<br />

Haiyan QIAN, Conference Co-Chair - Director, Division for Public Administration & Development Management<br />

(DPADM), UN Department of Economic and Social Affairs, USA<br />

Jose Ramon GIL-GARCIA, Program Co-Chair - Associate Professor and Director, Data Center for Applied<br />

Research in Social Sciences, Centro de Investigacion y Docencia Economicas, Mexico<br />

Natalie HELBIG, Program Co-Chair - Senior Program Associate, Center for Technology in Government, University<br />

at Albany, USA<br />

Adegboyega OJO, Program Co-Chair - Academic Program Officer, Center for Electronic Governance, UNU-IIST,<br />

Macao SAR<br />

Jana Hrdinova, Organization Chair - Program Associate, Center for Technology in Government, University at<br />

Albany, USA<br />

Meghan Cook, Fundraising Chair - Program Manager, Center for Technology in Government, University at Albany,<br />

USA<br />

Alison Heaphy, Publicity Chair - Communication Manager, Center for Technology in Government, University at<br />

Albany, USA<br />

xii


International Steering Committee<br />

John Carlo BERTOT, Professor and Co-Director, Information Policy and Access Center (iPAC), University of<br />

Maryland, USA<br />

Francisco CAMARGO, Director General Programa Gobierno en Linea, Colombia<br />

Wojciech CELLARY, Professor, Department of Information Technology, Poznan University of Economics, Poland<br />

Samuel CHAN, Member of Administrative Committee, Science and Technology Development Fund, Macao SAR,<br />

China<br />

Jim DAVIES, Professor and Director, Software Engineering Programme, Department of Computer Science and<br />

Governing Body Fellow, Computing Laboratory, University of Oxford, UK<br />

Sharon DAWES, Senior Fellow & Professor Emeritus of Public Administration, Center for Technology in<br />

Government, University at Albany, USA<br />

Matthias FINGER, Professor, Faculty of Technology and Management, Ecole Polytechnique Federale de Lausanne,<br />

Switzerland<br />

Tomasz JANOWSKI, Senior Research Fellow and Head, UNU-IIST Center for Electronic Governance, Macao<br />

SAR, China (Series Coordinator)<br />

Lorenzo MADRID, Chief Technology Officer for the Latin America Region and World Wide Director for the<br />

Government Interoperability Initiative, Microsoft Corporation, USA<br />

Henk G. SOL, Professor and Founding Dean, University of Groningen, The Netherlands<br />

Maurice TCHUENTE, Pro-Chancellor University of Buea, Cameroon<br />

Saleem ZOUGHBI, Regional Adviser (ICT), UN Economic and Social Commission for Western Asia, Lebanon<br />

National Advisory Committee<br />

Cary COGLIANESE, Penn Program on Regulation, University of Pennsylvania Law School<br />

Mitch LEVENTHAL, Global Affairs, State University of New York<br />

Kim McKINNEY, New York State Office of Information Technology Services (ITS)<br />

Beth NOVECK, Democracy Design Workshop, New York Law School<br />

Robert SAMSON, New York State Spending and Government Efficiency (SAGE) Commission<br />

Jim HENDLER, Departments of Computer Science and Cognitive Science, Rensselaer Polytechnic Institute<br />

David L. McCLURE, Citizen Services and Innovative Technologies, GSA<br />

Miriam NISBET, Government Information Services (OGIS), National Archives and Records Administration<br />

Douglas ROBINSON, National Association of State Chief Information Officers<br />

Chris VEIN,The White House Office for Science and Technology Policy<br />

xiii


Awards Committee<br />

Sharon S. DAWES, University at Albany, SUNY – USA, Committee Chair<br />

Nicolau REINHARD -- Universidade de Sao Paulo, Brasil<br />

Enrico FERRO – Istituto Superiore Mario Boella, Italy<br />

Marijn JANSSEN - Delft University of Technology, The Netherlands<br />

Lei ZHENG – Fudan University, China<br />

Luis F. LUNA REYES – Universidad de las Amércias Puebla, Mexico<br />

Rejean ROY – CEFRIO, Canada<br />

Gbenga ADEBUSUYI, Nigeria<br />

Johanna AWOTWI, Ghana<br />

Program Committee<br />

Gustav AAGESON, Norwegian University of Science and Technology, Norway<br />

Gbenga ADEBUSUYI, National e-Government Strategies, Nigeria<br />

Rodrigo SANDOVAL-ALMAZAN, Universidad Autonoma del Estado de México, Mexico<br />

Kim ANDERSEN, Copenhagen Business School, Denmark<br />

Jean-Pierre AUFFRET, International Academy of CIO, USA<br />

Johanna Ekua AWOTWI, Center for e-Governance, Ghana<br />

Frank BANNISTER, Trinity College Dublin, Ireland<br />

Joerg BECKER, University of Illinois at Chicago, School of Art and Design, USA<br />

Jaro BERCE, University of Ljubljana, Slovenia Deepak BHATIA, World Bank, USA<br />

Melanie BICKING, University of Koblenz-Landau, Germany<br />

Nikolaj BJORNER, Microsoft Corporation, USA<br />

Brian BURKE, Center for Technology in Government, University at Albany, USA<br />

Luis CAMARINHA-MATOS, UNINOVA, Portugal<br />

Donna CANESTRARO, Center for Technology in Government, University at Albany, USA<br />

Lemuria CARTER, Mississippi State University, USA<br />

Alejandra CECHICH, National University of Comahue, Argentina<br />

Wojciech CELLARY, Poznan University of Economics, Poland<br />

Yannis CHARALABIDIS, National Technical University of Athens, Greece<br />

Venkatesh CHOPPELLA, IIIT Hyderabad, India<br />

Eleni CHRISTODOULOU, University of Ciprus, Ciprus<br />

Gabriel PURON-CID, Centro de Investigación y Docencias Económicas, México<br />

Soon Ae CHUN, University of New York, USA<br />

Meghan COOK, Center for Technology in Government, University at Albany, USA<br />

Antonio CORDELLA, Information Systems and Innovation Group at the Department of<br />

Management at the London School of Economics, UK<br />

Anthony CRESSWELL, Center for Technology in Government, University at Albany, USA<br />

Ignacio CRIADO, Universidad Autonoma de Madrid, Spain<br />

xiv


Jim DAVIES, Computing Laboratory, University of Oxford, UK<br />

Sharon DAWES, Center for Technology in Government, University at Albany, USA<br />

Rahul DE, Indian Institute of Management, Bangalore, India<br />

Zamira DZHUSUPOVA, Center for Electronic Governance, UNU-IIST, Macao SAR<br />

Sara ERIKSEN, Blekinge Institute of Technology, Sweden<br />

Elsa ESTEVEZ, Center for Electronic Governance, UNU-IIST, Macao SAR<br />

Enrico FERRO, Istituto Superiore Mario Boella, Italy<br />

Pablo FILLOTRANI, National University of the South, Argentina<br />

Simon FONG, University of Macau, Macao SAR<br />

Jose FORMAZ, Swiss Graduate School of Public Administration, Switzerland<br />

Mila GASCO, Institute of Governance and Public Management, ESADE, Spain<br />

Rimantas GATAUTIS, Kaunas University of Technology, Lithuania<br />

Jeremy GIBBONS, University of Oxford, UK<br />

Robert GOODSPEED<br />

Mary GRIFFITHS, The University of Adelaide, Australia<br />

Thad HALL, University of Utah, USA<br />

Steve HARRIS, Computing Laboratory, University of Oxford, UK<br />

Karim HAMZA, Maastricht school of Management, Netherlands<br />

Paul HENMA, University of Queensland, Australia<br />

Andrew HOPPIN, New Amsterdam Ideas LLC, USA<br />

Princely IFINEDO, Cape Breton University, Shannon School of Business, Canada<br />

Sirajul ISLAM, Bangledesh Center for eGovernance & Örebro University, Sweeden<br />

Tomasz JANOWSKI, Center for Electronic Governance, UNU-IIST, Macao SAR<br />

Marijn JANSSEN, Delft University of Technology, Netherlands<br />

Atreyi KANKANHALLI, School of Computing, National University of Singapore, Singapore<br />

Andrea KAVANAUGH, Virginia Tech, USA<br />

Jay KESAN, University of Illinois, USA<br />

Ralf KLISCHEWSKI, German University in Cairo, Egypt<br />

Trond KNUDSEN, Research Council of Norway, Norway<br />

Padmanabhan KRISHNAN, Bond University,<br />

Kincho LAW, Stanford University, USA<br />

Deidre LEE, National University of Ireland, DERI, Ireland<br />

Christine LEITNER, Center for European Public Administration, Danube University Krems, Austria<br />

Calvin LEONG, SAFP, Macao SAR Government, Macao SAR<br />

Miriam LIPS, Victoria University of Wellington, New Zealand<br />

Nikos LOUTAS, Digital Enterprise Research Institute, Ireland<br />

Luis LUNA-REYES, Universidad de las Americas-Puebla, Mexico<br />

Ann MACINTOSH, University of Leeds, Institute of Communication Studies, United Kingdom<br />

Egle MALINAUSKIENE, Mykolas Romeris University, Lithuania<br />

Albert MEIJER, University of Utrecht, Netherlands<br />

Vassilis MENEKLIS, University of Piraeus, Greece<br />

Ines MERGEL, Syracuse University, USA<br />

Jeremy MILLARD, Danish Technological Institute, Centre for Policy and Business Analysis,<br />

Denmark<br />

Gianluca MISURACA, EC Joint Research Centre, Institute for Prospective Technological Studies,<br />

Spain<br />

Hrushikesha MOHANTY, University of Hyderabad, India<br />

Fawzi MULKI, Social and Economic Directorate, Royal Hashemite Court, Jordan<br />

Taewoo NAM, University at Albany, USA<br />

Toshio OBI, Waseda University, Japan<br />

Theresa PARDO, University at Albany, USA<br />

xv


Marco PERES USECHE, Universidad Externado de Colombia, Colombia<br />

Vasillios PERISTERAS, Digital Enterprise Research Institute, Ireland<br />

Chris REDDICK, The University of Texas at San Antonio, USA<br />

Scott ROBERTSON, University of Hawaii, USA<br />

Tomáš SABOL, Technical University of Košice, Slovak Republic<br />

Steve SAWYER, Syracuse University, USA<br />

Apetipe SEAKOW, Stamford International University, Thailand<br />

Bory SENG, Seoul National University, South Korea<br />

Jochen SCHOLL, University of Washington, USA<br />

Charles SCHWEIK, University of Massachusetts at Amherst, USA<br />

Aadya SHUKLA, Harvard University, USA<br />

Stuart SHULMAN, University of Massachusetts, Amherst, USA<br />

Henk SOL, University of Groningen, Netherlands<br />

Alberto Savoldelli<br />

Marco Prandini<br />

Maurizio Leo<br />

Eleni Panopoulou<br />

Efthimios Tambouris<br />

Alberto Savoldelli<br />

Walter Cerroni<br />

Marco Ramilli<br />

Franco Callegati<br />

Hans-Dieter Zimmermann<br />

Maddalane SORRENTINO, University of Milan, Italy<br />

Evgeny STYRIN, Higher School of Economics (HSE), Russia<br />

Ivar TALLO, e-Governance Academy, Estonia<br />

Efthimios TAMBOURIS, University of Macedonia, Greece<br />

Vishanth WEERAKKODY, Brunel University, UK<br />

Maria WIMMER, University of Koblenz and Landau, Germany<br />

Gamel WIREDU, University of London, UK<br />

Peter WINSTANLEY, Scottish Government, UK<br />

Jing ZHANG, Clark University, USA<br />

Lei ZHENG, Fudan University, China<br />

Jozef ZURADA, University of Louisville, USA<br />

Additional Reviewers<br />

xvi<br />

Jörg Becker<br />

Petra Wolf<br />

Eleni Kaliva<br />

Efthimios Tambouris<br />

Carl Erik Moe<br />

Brunella Caroleo<br />

Elisa Pautasso<br />

Enrico Ferro<br />

Evangelos Kalampokis<br />

Manabu Nakashima<br />

Djoko Sayogo


Session 1<br />

Open Government Data


Beyond Open Government: Ontologies and Data<br />

Architectures to Support Ethical Consumption<br />

Luis F. Luna-Reyes<br />

Universidad de las Americas-Puebla<br />

luisf.luna@udlap.mx<br />

Theresa A. Pardo<br />

University at Albany – SUNY<br />

tpardo@ctg.albany.edu<br />

ABSTRACT<br />

Two important trends on openness are promoting improved<br />

accountability from government and private organizations. The<br />

case of private transparency finds its roots in consumer and other<br />

stakeholder movements. The open government movement in the<br />

US is looking for alternatives to “smart disclosure,” which implies<br />

providing consumers with better information to make better<br />

buying choices. We explore current knowledge on ethical<br />

consumption, as well as two influential technological tools to<br />

support consumer decisions. Our initial discussion suggests that<br />

the use of ontologies and data architectures, together with the<br />

appropriate policy environment and governance system, may<br />

solve some of the current problems identified.<br />

Categories and Subject Descriptors<br />

K.4.1 [Public Policy Issues]: Private Sector Transparency and<br />

Ethical Consumption<br />

General Terms<br />

Management, Design, Human Factors, Standardization,<br />

Languages, Theory, Legal Aspects<br />

Keywords<br />

Sustainability, Supply-Chain, Ethical Consumption, Private Sector<br />

Transparency<br />

1. INTRODUCTION<br />

In the last years we have witnessed two parallel but closely related<br />

trends. First, governments around the world have increasingly<br />

worked to make their operations and decisions more open [17].<br />

On the other hand, a there is a trend pushing corporate<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Djoko Sigit Sayogo<br />

University at Albany – SUNY<br />

dsayogo@ctg.albany.edu<br />

Giri Kumar Tayi<br />

University at Albany – SUNY<br />

g.tayi@albany.edu<br />

David F. Andersen<br />

University at Albany – SUNY<br />

fadum@albany.edu<br />

1<br />

Jing Zhang<br />

Clark University<br />

jizhang@clarku.edu<br />

Jana Hrdinova<br />

University at Albany – SUNY<br />

jhrdinova@ctg.albany.edu<br />

organizations to be more accountable, transparent, and ethical<br />

[2,6]. Although the first documented stakeholder actions to hold<br />

corporations accountable and transparent took place in the early<br />

1600’s [2], the movement has intensified in the last decades<br />

through grassroots movements lead by NGOs to address perceived<br />

failures by States to protect workers [6], and more recently,<br />

because of an increased consumer interest in the environment and<br />

sustainability [14]. In the US, government has also included as<br />

part of its open government initiative, the need to take regulatory<br />

approaches to “smart disclosure” of information needed to help<br />

consumers to make better choices 1 [19].<br />

Although there are many formal attempts to measure and<br />

communicate corporate practices to consumers (surveys, indexes,<br />

or technology applications), there is no agreement on what<br />

information should be disclosed to consumers to better help their<br />

decision making. Moreover, there is even less agreement in terms<br />

of how to ensure data availability, reliability, and validity, as well<br />

as transparency of the processes to disclose such information [14].<br />

Thus, the purpose of this paper is to explore what is the relevant<br />

information for consumers, as well as feasible ways of pulling the<br />

information together to fulfill consumers’ needs. To accomplish<br />

this objective, we explore the literature on ethical consumption<br />

and two prominent tools for ethical consumption in the US and<br />

the European Union. The paper ends by proposing the use of open<br />

architecture and innovative governance systems not only to enable<br />

interoperability along the supply chain, but also to improve<br />

consumer access to information to make better buying decisions.<br />

2. LITERATURE REVIEW<br />

2.1 Understanding Ethical Consumer Values<br />

and Preferences<br />

A large body of literature focusing on ethical consumption is<br />

based on the premise that consumer behavior is “rational”. As a<br />

rational actor, a consumer will seek a product that satisfies his/her<br />

needs by optimally considering all available alternatives and<br />

information [7]. The consumer consumption behavior is guided by<br />

1 http://www.whitehouse.gov/sites/default/files/omb/inforeg/foragencies/informing-consumers-through-smart-disclosure.pdf


the combination of their moral sentiments and economic motives,<br />

especially for the sustainable products [1].<br />

Based on their information seeking behavior, consumers can be<br />

categorized into: the “super-informed” and the “ignorant” [12].<br />

The “super-informed” consumers actively search for product<br />

information related to social and environmental values. These<br />

types of consumers consider social attributes such as fair labor<br />

practices [13], environmental attributes such as climate change,<br />

carbon footprint, recycling, energy conservation and other. The<br />

“ignorant” consumers have to rely on the information provided by<br />

supply-chain actors and government. Disclosure of organizational<br />

and industry information becomes a valuable tool to guide ethical<br />

consumption decisions [5].<br />

Other streams of literature depict some ethical consumers as<br />

altruistic actors. These consumers adopt their ethical values into<br />

their life styles [13], and adjust their behavior to consume<br />

environmental friendly, ethical or fairly traded products and show<br />

pro-environment behaviors [3,13,16]. Consumers who are more<br />

involved in ethical lifestyles perceived higher benefits from<br />

additional information [18].<br />

Other research shows that the degree of commitment to the ethical<br />

values also depends on economic factors. Ethical consumers have<br />

to make a compromise due to conflicting and competing priorities<br />

[16]. The social and environmental attributes and consumer<br />

lifestyles serve as interacting and/or moderating variables in the<br />

determinants of ethical consumption behavior. Research show that<br />

consumers deal with three interacting factors in ethical<br />

consumption behavior, price, quality and convenience [3].<br />

2.2 Sustainability Liability<br />

Following ethical consumption could become a liability for the<br />

consumers. In general, although consumers might shift their<br />

purchasing preference from cheaper non-labeled products, they<br />

may not venture to choose more expensive alternatives [16].<br />

Buying unethical products is usually cheaper than buying better<br />

equivalent products thus hindering the proliferation of ethical<br />

consumption [5]. Researchers argue that this is due to the fact that<br />

higher costs to the environment does not translate into higher<br />

price to consumers, and capturing all social and environmental<br />

costs associated with a product is hard to accomplish [5].<br />

2.3 The Role of Trust for Ethical Consumer<br />

Trust in information plays also a key role in consumption<br />

decisions. Trust formation is affected by shared values and joint<br />

beliefs held by consumers and companies about certain social or<br />

ethical behavior [15]. Consumers rely on existing information to<br />

assess the conformance of ethical values practiced by particular<br />

companies [15]. Findings from these streams of research suggest<br />

that consumer’s trust in the product depends partly on consumer’s<br />

trust in the company’s ethical conduct and partly on product<br />

labeling. Thus, some research explores the role of trust in the<br />

context of corporate social responsibility (CSR). This research<br />

found that ethical conduct reflected in the CRS report influences<br />

consumers’ perception of trust toward the company [4,15].<br />

However, trust based on the CSR practices does not always<br />

account for corporate success in the market [4]. The positive<br />

impact of trust depends on factors such as consumers’ perceptions<br />

of the social reputation of a company [4], product quality and<br />

consumer satisfaction [15].<br />

2<br />

Other stream of research assesses consumers’ trust based product<br />

labeling or certification. This research explores the values that<br />

consumers attach to certification and labels. For instance,<br />

consumers positively correlate organic certification with values<br />

such as stricter production standards and control system, domestic<br />

origination of product, and familiarity with the logo as source of<br />

trust [8]. Customers rely on the label regardless of their<br />

understanding of the meaning behind label [3].<br />

3. METHOD<br />

We used a convenience sampling approach to identify the current<br />

tools providing consumers with information for value-based<br />

purchasing. We chose to evaluate Barcoo and GoodGuide based<br />

on the following considerations: 1) each tool was developed and is<br />

primarily used on a different continent, thus enabling us to make a<br />

comparison. Barcoo was established and widely used in Europe<br />

while GoodGuide was established and extensively used in North<br />

America. 2) Both tools are currently popular tools used for valuebased<br />

purchasing considerations.<br />

4. RESULTS<br />

4.1 Ethical Consumption – Online<br />

Information Strategy<br />

This section evaluates the above mentioned tools that are designed<br />

to help consumers make ethical purchasing decisions. The<br />

evaluation focuses on examining the data problems related to<br />

building the tool, identifying the source of trust on the<br />

measurements used in each tool and delineating the possible<br />

limitations of each tool.<br />

4.1.1 GoodGuide (www.goodguide.com)<br />

GoodGuide was founded in 2007 by Dara O’Rourke, a professor<br />

specializing in global supply chain at the University of California<br />

at Berkeley. The mission of GoodGuide is to transform the<br />

marketplace by helping consumers make value-based purchasing<br />

decisions. It provides expert judgment about the health,<br />

environment, and social performance of products and companies<br />

with a team of scientific and technology experts. GoodGuide<br />

gives four 1-10 numeric ratings, with one general score and three<br />

sub-scores for health, environmental and social performance of<br />

the product or the company respectively.<br />

4.1.2 Barcoo (www.barcoo.com)<br />

Barcoo is an independent service that offers consumers product<br />

information on their mobile phone. Consumer can use their<br />

mobile phone to scan the barcode of products and obtain<br />

background information about the product. Barcoo has a customer<br />

base of more than two million in Germany. It is used mostly in<br />

Europe. The information provided by Barcoo includes ingredients,<br />

nutrition value, certification, and other environmental<br />

information, as well as price comparison and users reviews.<br />

A summary of the evaluation on GoodGuide and Barcoo is<br />

presented in Table 1. The assessment on both tools indicates<br />

several limitations that exist in both tools: 1) lack of clarity in the<br />

mechanism to generate the score, 2) data collection, matching, and<br />

processing is manual resulting in limited scalability, 3) the<br />

transparency and accuracy is limited in the sense that both tools<br />

cannot drill down to the data at product level, and 4) because of<br />

the lack of source data and verification capacity, the construction<br />

of trusted information is primarily based on human judgment,


such as users based assessment in the case of Barcoo or<br />

combination of users and experts in the case of GoodGuide. These<br />

limitations are arguably affecting the trustworthiness of the<br />

information provided to the users. In addition, their inability to<br />

integrate information across the supply-chain impacts the validity<br />

of their result. In the next section, we will argue for the case of I-<br />

Choose as an architecture that could assist web tools such as<br />

Barcoo and GoodGuide with increasing the credibility and<br />

trustworthiness of the information produced.<br />

Table 1. Comparison of Barcoo and GoodGuide<br />

Indicators GoodGuide Barcoo<br />

Information<br />

elements &<br />

scoring<br />

Data Source<br />

Source of<br />

Trust<br />

Data<br />

Problem<br />

1 – 10 numeric ratings:<br />

General score, Health,<br />

Environment, and Social<br />

scores<br />

• Over 1,000 third party<br />

sources<br />

• Comprehensiveness of<br />

data sources<br />

• Experts and Users<br />

judgment<br />

• Company image<br />

• Clarity of scoring<br />

• Manual data collection<br />

• Human judgment<br />

biases<br />

• Limited granularity of<br />

data<br />

• Credibility of data<br />

source<br />

Product background<br />

information:<br />

Ingredients, nutrients,<br />

certifications, price<br />

• Third party providers<br />

• Independent sources<br />

• Data sources – facts<br />

• Legitimacy of partners<br />

& their database<br />

• Users judgment<br />

• Limited granularity of<br />

data<br />

• Reliance on 3rd party<br />

• Credibility of data<br />

source<br />

4.2 I-Choose As An Architecture to Empower<br />

Current Tools and Trends<br />

In this section, we develop a proposal that could make a<br />

contribution to research and practice of ethical consumption.<br />

4.2.1 Main Gaps from the Literature<br />

Although there is an agreement in the literature that the main<br />

consumer concerns are associated with both environmental and<br />

social impacts of corporate activities, there is not an agreement on<br />

how to measure such impact. Rahman and Post [14] found 15<br />

different ways to define environmental impacts, and different<br />

ways to measure them.<br />

Another gap is the difficulty in creating transparent and reliable<br />

measures. Data is not equally available for all corporations, and<br />

because of that, all available scores require the intensive use of<br />

expert judgment, making them highly costly. Moreover, many of<br />

the either publicly available or proprietary data are not transparent<br />

enough, and do not report on reliability and validity [14].<br />

Research in the area has also shown the importance of labeling in<br />

buying decisions [11]. However, labels that certify low<br />

environmental or social impacts may present very similar<br />

information to the consumer at the point of sale, but use very<br />

different criteria or processes in order to get the certification.<br />

3<br />

Researchers have explored extensively key factors affecting<br />

consumer buying decisions, however, we could not find literature<br />

on the impacts of the use of tools such as Barcoo or GoodGuide in<br />

these decisions. More research in the area is needed. This research<br />

may benefit from current efforts on understanding adoption of<br />

software to aid consumer decision making [17]. Some of the<br />

research that we found suggested that incorporating the cost of<br />

externalities in price is yet another way to promote ethical<br />

consumption [5]. However, there is little research on ways to<br />

account for externalities such as environmental impact. There is<br />

still less research exploring the economic impacts of a policy of<br />

this nature.<br />

Finally, a potentially important problem with this area of research<br />

is the fact that most is looking for ways to promote ethical<br />

consumption, without exploring the possibility of consuming less<br />

or changing significantly current consumption patterns.<br />

4.2.2 A Pathway Forward: A Socio-Technical System<br />

for Opening Private Sector Information to<br />

Support Consumer Choice<br />

Our current research suggests that some of the current gaps and<br />

shortcomings of tools that support ethical consumption can be<br />

addressed by the creation of a socio-technical system such as I-<br />

Choose to facilitate information sharing and interoperability<br />

among stakeholders in the supply chain [10]. Our current efforts<br />

are focusing on coffee produced and traded in the NAFTA region.<br />

Coffee producers and consumers have made an effort to attach<br />

additional information to specific kinds of coffee –such as organic<br />

or Fair Trade—to differentiate them and to allow consumers to<br />

make ethical decisions. Lessons from our current project have the<br />

potential to be used by other industries and in different<br />

geographical areas.<br />

We envision that I-Choose should include at least three different<br />

components: a set of data standards to share information across<br />

the supply chain, a set of Application Programming Interface<br />

(API) standards to make it possible for developers and other<br />

interested groups to create specific applications to make this<br />

information usable by regular consumers, and a governance<br />

system, which will be in charge of creating and modifying the<br />

standards over time. We are calling this system the I-Choose<br />

system [9].<br />

In terms of the data standards for information sharing and<br />

interoperability, we are currently developing an ontology-based<br />

set of standards to integrate information from the coffee supply<br />

chain. There are already many higher order ontologies or data<br />

classifications that can be used to support this interoperability<br />

such as the XBRL standard for financial information. Because of<br />

that, our focus is on data components that are related to<br />

certification, which will link to other data standards.<br />

Shared data promoted by I-Choose will benefit efforts such as<br />

GoodGuide or Barcoo by providing better and wider information.<br />

However, this kind of ventures will need to have a way to access<br />

the information. Thus, the second component of I-Choose should<br />

be an API to ease the development of these kinds of applications.<br />

Finally, those two technical components need to meet the<br />

requirements of usability, utility, trust and openness to be widely<br />

adopted and used. To accomplish this objective, we believe that a<br />

multi-stakeholder group needs to collaborate to set the standards,<br />

but also to maintain and adjust them over time. Our current efforts


involve the creation of a Network of coffee stakeholders that we<br />

believe can constitute a very first group to promote this kind of<br />

standards. The group must include government regulators,<br />

industry associations, consumers, consumer associations,<br />

producers and other stakeholders. The group will need to have in<br />

place a series of policies and procedures to ensure the fairness of<br />

the process, avoiding standards that become driven only by the<br />

larger players in the supply chain.<br />

5. CONCLUDING REMARKS<br />

This paper aims to explore feasible ways of drawing relevant<br />

information to fulfill consumers’ needs in making ethical<br />

purchasing decision. To do this, we explore extant literature on<br />

ethical consumption and evaluate two existing tools available to<br />

support consumers’ ethical consumption. Our exploration<br />

identifies some of the current gaps and shortcomings of the<br />

existing tools supporting ethical consumption. We then proposed<br />

a scalable socio-technical system to facilitate information sharing<br />

and interoperability among stakeholders in the supply chain. This<br />

system comprises of three different but interrelated components,<br />

namely: 1) a set of data standards to share information across the<br />

supply chain, 2) a set of Application Programming Interface (API)<br />

standards to make it possible for developers and other interested<br />

groups to create specific applications to make this information<br />

usable by regular consumers, and 3) a governance system, which<br />

will be in charge of creating and modifying the standards over<br />

time. We are calling this system the I-Choose system. We further<br />

call for more attention to the role of government in the<br />

management of an architecture such as I-Choose.<br />

6. ACKNOWLEDGMENTS<br />

Research reported in this paper is supported in part by the US-<br />

NSF (Grant No. IIS-0540069), CONACYT-Mexico (Grant No.<br />

133670), and COMEXUS-Fulbright Commission in Mexico. The<br />

views and conclusions expressed in this paper are those of the<br />

authors alone and do not necessarily reflect the views of<br />

COMEXUS, CONACYT or NSF.<br />

7. REFERENCES<br />

[1] Barnett, C., Cloke, P., Clarke, N., and Malpass, A. Consuming<br />

Ethics: Articulating the Subjects and Spaces of Ethical<br />

Consumption. Antipode 37, 1 (2005), 23–45.<br />

[2] Baue, B. and Murninghan, M. The Accountability Web:<br />

Weaving Corporate Accountability and Interactive<br />

Technology. Journal of Corporate Citizenship, 41 (2011), 27–<br />

49.<br />

[3] Carrigan, M. and Attalla, A. The myth of the ethical consumer<br />

– do ethics matter in purchase behaviour? Journal of<br />

Consumer Marketing 18, 7 (2001), 560–578.<br />

[4] Castaldo, S., Perrini, F., Misani, N., and Tencati, A. The<br />

missing link between corporate social responsibility and<br />

consumer trust: the case of fair trade products. Journal of<br />

Business Ethics 84, 1 (2009), 1–15.<br />

4<br />

[5] Chouinard, Y., Ellison, J., and Ridgeway, R. The Sustainable<br />

Economy. Harvard Business Review 89, 10 (2011), 52–62.<br />

[6] Doorey, D. The Transparent Supply Chain: from Resistance<br />

to Implementation at Nike and Levi-Strauss. 2011.<br />

[7] Freestone, O.M. and McGoldrick, P.J. Ethical positioning<br />

and political marketing: the ethical awareness and concerns<br />

of UK voters. Journal of Marketing Management 23, 7-8<br />

(2007), 651–673.<br />

[8] Janssen, M. and Hamm, U. Consumer perception of different<br />

organic certification schemes in five European countries.<br />

Organic Agriculture, (2011), 1–13.<br />

[9] Luna-Reyes, L.F., Andersen, D.F., Andersen, D.L., Derrick,<br />

D., and Jarman, H. Full Information Product Pricing (FIPP)<br />

Regimes: Policy Implications for US-Mexico Sustainable<br />

Commerce. (2012).<br />

[10] Luna-Reyes, L.F., Zhang, J., Whitmore, A., et al. Full<br />

Information Product Pricing: An Information Strategy for<br />

Harnessing Consumer Choice to Create a More Sustainable<br />

World. 2011.<br />

[11] De Magistris, T. and Gracia, A. Do Consumers Pay Attention<br />

to the Organic Label When Shopping Organic Food in Italy?<br />

In M. Reed, ed., Organic Food and Agriculture - New Trends<br />

and Developments in the Social Sciences. Janeza Trdine,<br />

Croatia, 2011.<br />

[12] McEachern, M.G. and McClean, P. Organic purchasing<br />

motivations and attitudes: are they ethical? International<br />

Journal of Consumer Studies 26, 2 (2002), 85–92.<br />

[13] Michaelidou, N. and Hassan, L.M. Modeling the factors<br />

affecting rural consumers’ purchase of organic and freerange<br />

produce: A case study of consumers’ from the Island<br />

of Arran in Scotland, UK. Food Policy 35, 2 (2010), 130–<br />

139.<br />

[14] Rahman, N. and Post, C. Measurement Issues in<br />

Environmental Corporate Social Responsibility (ECSR):<br />

Toward a Transparent, Reliable, and Construct Valid<br />

Instrument. Journal of Business Ethics 105, 3 (2012), 307–<br />

319.<br />

[15] Swaen, V. and Chumpitaz, C.R. Impact of Corporate Social<br />

Responsibility on consumer trust. Recherche et Applications<br />

en Marketing (English Edition) 23, 4 (2008), 7–33.<br />

[16] Szmigin, I., Carrigan, M., and McEachern, M.G. The<br />

conscious consumer: taking a flexible approach to ethical<br />

behaviour. International Journal of Consumer Studies 33, 2<br />

(2009), 224–231.<br />

[17] Xiao, B. and Benbasat, I. E-Commerce Product<br />

Recommendation Agents: Use, Characteristics and Impact.<br />

MIS Quarterly 31, 1 (2007), 137–209.<br />

[18] Zander, K. and Hamm, U. Consumer preferences for<br />

additional ethical attributes of organic food. Food Quality<br />

and Preference 21, 5 (2010), 495–503.<br />

[19] MOU for the Heads of Executive Departments and Agencies<br />

- Informing Consumers through Smart Disclosure. Executive<br />

Office of The President - Office of Management and Budget,<br />

Washington, DC, 2011.


Exploring Process Barriers to Release Public Sector<br />

Information in Local Government<br />

Peter Conradie<br />

Creating 010<br />

Rotterdam University of Applied Sciences,<br />

P.O. Box 3001 HA Rotterdam<br />

The Netherlands<br />

003110 794 4801<br />

p.d.conradie@hr.nl<br />

ABSTRACT<br />

Due to expected benefits such as citizen participation and<br />

innovation, the release of Public Sector Information is getting<br />

increased attention on various levels of government. However,<br />

currently, data release by governments is still novel, with little<br />

experience and knowledge thus far about the benefits and barriers<br />

of release. This is compounded by a lack of understanding about<br />

how internal processes influence data release. Our aim in this<br />

paper is to get a better understanding of these processes and how<br />

they influence data release, i.e, to find determinants for the release<br />

of public sector information. For this purpose, we conducted<br />

workshops, interviews, questionnaires and desk research. We find<br />

that the way data is used by a department, the way data is<br />

obtained, how data is stored, and the suitability of data to become<br />

open, as crucial indicators for open data release. We conclude<br />

with lessons learned based on the research findings. These are that<br />

we should take a nuanced approach towards data release, avoid<br />

releasing data for it’s own sake and take small incremental steps<br />

to explore data release.<br />

Categories and Subject Descriptors<br />

H.3 [Information Systems]: Information Storage and Retrieval;<br />

K.4 [Computers and Society]: Public Policy Issues<br />

General Terms<br />

Design, Experimentation<br />

Keywords<br />

Open Data, PSI, Participatory Action Research<br />

1. INTRODUCTION<br />

The release of Public Sector Information by governmental<br />

organisations is getting increasing attention from government on<br />

several levels, local, national and international. For example, early<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

5<br />

Sunil Choenni<br />

Research and Documentation Centre<br />

Ministry of Security and Justice<br />

P.O. Box 20301 2500 EH, The Hague<br />

The Netherlands<br />

0031648100301<br />

r.choenni@hr.nl<br />

in his presidency, United States President Obama called for<br />

increased release of public sector information [24]. Similarly,<br />

European Commissioner for Digital Agenda, Neelie Kroes is a<br />

strong advocate for the release of Public Sector Information in the<br />

European Union, by its member states, but also by the<br />

commission [21]. Her view is supported by the 2003 PSI<br />

Directive the European Parliament and the European Council<br />

[11].<br />

Oft cited motivations for data release are hopes of increased<br />

citizen involvement in government, increased transparency and<br />

improved decision making [2, 21, 24]. Besides the premise of<br />

increased citizen involvement, open data is also seen as fuel for<br />

innovation. To illustrate, the MEPSIR study places the estimated<br />

value of the PSI market at 27 billion within the EU [10].<br />

Furthermore, open data may give also a boost to the field of egovernance.<br />

However, this increased call for data release by governmental<br />

agencies presents data professionals with tasks that are as of yet<br />

unknown, in addition to having side effects that are hard to predict<br />

on a large scale. The cost associated with data release is also not<br />

always known, while the benefits that open data can have need to<br />

be explored. Having said that, the directives from higher levels of<br />

government are putting pressure onto local governments to find<br />

answers to pressing questions in relation to open data, such as<br />

what are the challenges, potentials, barriers and impact of open<br />

data?<br />

In The Netherlands the calls for the re-use of data has not gone<br />

unheard. On various levels of national government in The<br />

Netherlands initiatives have been launched to free data for re-use<br />

in the public domain. These include local city councils, ministries<br />

and provincial governments. To illustrate: recent months has seen<br />

the launch of a national platform of data release [20], but also<br />

platforms on metropolitan level, as the that of the Dutch city<br />

Enschede [19].<br />

While possible barriers and potentials of open data are reported by<br />

several researchers (see Section 2), a deep understanding of the<br />

underlying processes for these barriers is missing. In this paper,<br />

we study the underlying processes that pertain to data release in a<br />

local context, i.e., we search for crucial determinants for the<br />

release of open data. We have studied the processes involved in<br />

releasing data at four organizations of the municipal Rotterdam,<br />

which is the second largest city in the Netherlands, with a<br />

population of 680 000. The municipality currently has 12 000<br />

employees. We have implemented a participatory action research


approach [28] to expose indicators that play a significant role in<br />

releasing data for public at the four organizations. Important<br />

elements in this approach are desktop research, workshops,<br />

questionnaires, and in-depth interviews with key persons at<br />

different levels of the organizations. We have found that<br />

important indicators for data release are the way data is stored in<br />

an organization (distributed/decentralized versus centralized),<br />

whether data is internally produced or externally gathered, the use<br />

of data, and the availability of guidelines to determine whether<br />

data is suitable for release. We discuss how these indicators may<br />

contribute to shape an open data policy at a local level.<br />

We note that while the combination of the indicators may be<br />

considered as a predictor of data release by an organization, the<br />

focus of the paper is rather to identify these indicators.<br />

The remainder of this paper is organized as follows. In Section 2,<br />

we embed our work in the field of open data in more detail. In<br />

Section 3, we motivate the use of a participatory action research<br />

approach for our purpose, while we implement this approach in<br />

Section 4. In Section 5, we present our findings from the<br />

participatory action research sessions. Section 6 is devoted to the<br />

lessons that we have learned so far. Section 7 reports about our<br />

future activities, while Section 8 concludes the paper.<br />

2. RELATED WORK<br />

Despite the pressures from higher levels of (federal) government<br />

to realise data release on local level, there are barriers along<br />

several dimensions to open data release. From a user perspective,<br />

major barriers are the access to proper datasets and the adequate<br />

use of datasets. The access to proper datasets is aggravated by the<br />

fact that the datasets are fragmented and offered at several<br />

websites, which are in some case hard to find [3, 17]. Moreover,<br />

access to datasets are in some cases restricted to specific user<br />

groups. Adequate use of datasets is hindered since metadata with<br />

regard to datasets are poorly documented, and therefore the<br />

semantics of the data may be ambiguous. Furthermore, how to<br />

determine the quality of a dataset is an open question. In [29] an<br />

overview of the barriers that users may encounter in using public<br />

sector information is provided.<br />

Along with barriers from a user perspective, data providers also<br />

encounter barriers to data release. From this perspective, major<br />

barriers are the lack of knowledge to deposit data, the economical<br />

loss that data release may entail, and the lack of knowledge to<br />

decide which datasets are eligible to release. In order to deposit a<br />

dataset, often this dataset should be formatted and processed<br />

according to the system requirements that accepts the dataset.<br />

Especially dataset providers who are not familiar with the<br />

technical aspects of data processing should deliver a lot of effort<br />

to deposit a dataset.<br />

The economic impact of data release becomes clear when taking<br />

into account that some European public sector bodies used a cost<br />

recovery model to fund data collection. For example, the Dutch<br />

Business Register (KvK), knows a cost recovery ratio of 19,50%<br />

[25]. By releasing data that is currently sold, certain agencies<br />

loose a valuable source of income [27].<br />

Organizations need practical frameworks that support them to<br />

decide whether a dataset is eligible to release or not [30]. In these<br />

frameworks, special attention should be given to privacy issues.<br />

Nowadays, organizations are struggling with the questions<br />

whether a dataset is or may become privacy sensitive [7]. For<br />

6<br />

example, according to [16, 18], combining datasets could lead to<br />

undesirable results such as revealing the identity of persons.<br />

Additionally, publishing data that was gathered and managed for a<br />

one purpose might lead to different conclusions if implemented in<br />

an unrelated context [16]. The potential violation of privacy, has<br />

especially gained a lot of attention in the literature, see for<br />

example [1, 5, 13, 16, 22, 23, 26].<br />

In [5] a study is devoted on the impact that information<br />

technology has on several privacy issues. While the field of<br />

database security [1] mainly focuses to technical solutions that<br />

enforce the “need to know principle” i.e., access control policies,<br />

which may prevent the disclosure of privacy, more comprehensive<br />

alternatives to prevent the disclosure of privacy are proposed in<br />

[4, 16, 26]. In [26] a framework is proposed to protect the privacy<br />

of citizens, while in [4] and [16] comprehensive architectures are<br />

proposed to minimize the violation of privacy law and regulations.<br />

In [13], the authors plea for a so-called ambient law that<br />

articulates fundamental legal protections, including privacy,<br />

within the socio-technical infrastructure. In [23] privacy concerns<br />

about using cameras and solutions to these concerns are discussed<br />

in the context of monitoring dementia patients, while [8, 22] do<br />

the same in the context of public safety.<br />

However, PSI, is not always personally bound. Moreover, the<br />

barriers that may be encountered depends on the type of data at<br />

hand to be released. Therefore, for different types of data,<br />

different kind of barriers may be encountered. At a national level,<br />

there are also barriers to data release above and beyond privacy. A<br />

comparative study by [15] highlights these issues. Barriers to data<br />

release on national level are cited as traditionally closed<br />

government culture, but also limited data quality or uncertain<br />

economic impact of data release.<br />

These studies, while providing a view to data release on a national<br />

level, lack the focus on issues as experienced on a local level by<br />

public sector information professionals. There is a lack of<br />

understanding on local government levels on the impact, barriers<br />

and opportunities of open data release. Our study focus on the<br />

understanding of the underlying processes entailed by open data at<br />

a municipal level. The rationale to choose this level instead of a<br />

national level is that data is mainly gathered at local levels, and<br />

therefore their support are of crucial importance for the success of<br />

open data. To prevent that the understanding of the underlying<br />

processes will be dominated by privacy issues, we will place our<br />

emphasis in this study on the release of data that not are<br />

personally bound, and therefore the chance that data is privacy<br />

sensitive is minimized. For example, we focus on the underlying<br />

process that are entailed by the release of data that pertains to all<br />

trees in Rotterdam, such as the number of trees in a street, the<br />

kind of trees in the street, the year that a tree is planted and so on.<br />

3. APPROACH<br />

As mentioned above, there is a lack of understanding of how data<br />

should be released, what the effects of release might be, and the<br />

processes needed to facilitate data release. This applies not only to<br />

national or federal governments, but also on a local level. Within<br />

our education program experience has also shown that data<br />

release is not self-evident.<br />

In order to explore data release, the University of Applied<br />

Sciences in Rotterdam initiated a research project with four<br />

services that form part of the Municipality of Rotterdam. They are


Figure 1. Stakeholders in the Participatory Action<br />

Research<br />

City Development (Stadsontwikkeling), City Works<br />

(Gemeentewerken), Library (Bibliohteek) and City Archive<br />

(Gemeentearchief).<br />

The participating services form part of a consortium exploring the<br />

barriers and benefits of open data for the local council and<br />

represent one of the clusters that comprises the municipality. The<br />

Library and the City Archive focuses on clients accessing its<br />

services, City Development is more involved with executing and<br />

developing urban policy, while City Works makes products such<br />

as detailed city maps in addition to maintaining objects and<br />

infrastructure in the city. These roles will be elaborated on later in<br />

Section 4. First, we motivate in the following the choice for a<br />

participatory action research approach and describe how we will<br />

apply this approach.<br />

3.1 Participatory Action Research<br />

In order to understand barriers of data release, we employ a<br />

participatory approach to research, where stakeholders from the<br />

various public services are co-researching through action and<br />

participation how an open data policy can be implemented.<br />

Formally referred to as Participatory Action Research (PAR), this<br />

approach focuses on co-research with participants [28].<br />

From the previous sections, it is clear that the barriers – e.g.:<br />

technical issues, privacy or law - associated with data release<br />

require expertise from different branches of knowledge. Seen<br />

from this perspective, PAR can be an appropriate methodology,<br />

due to its applicability in multidisciplinary research [28].<br />

Furthermore, PAR is often a combination of theory and practice<br />

and thus brings together academic researchers and practitioners as<br />

problem solvers. PAR research aims to advance practical<br />

knowledge and is often built on an understanding that results from<br />

field experience [6]. According to [14], where knowledge<br />

embedded in local context, a PAR approach can be beneficial.<br />

What also speaks to more methodologically flexible approaches<br />

such as PAR is the context in which research is taking place.<br />

Organizations such as the local council are not found in a<br />

7<br />

laboratory environment where variables can be tightly controlled<br />

in order to conduct experiments. Instead, individuals are busy<br />

conducting their regular tasks. Given this, a more flexible<br />

approach to research is required, where results can be quickly<br />

incorporated into the research.<br />

While [28] has expressed the benefits of PAR from a sociological<br />

point of view, [12] mentions that such an approach also benefits<br />

the development of information systems. For instance, the<br />

participatory process can elicit increased commitment, while<br />

helping create support for proposed solutions. This resonates with<br />

the recommendation of [28] that PAR can help to prevent<br />

misconceptions about research results and interpretations, because<br />

participants are involved in research. [12] further mentions that a<br />

more participative approach is less likely to result in change to<br />

resistance from users (i.e.: data professionals in the local council)<br />

during implementation, which is also relevant in the context of the<br />

implementation of open data policy.<br />

In practice, PAR thus means a more involved approach by all<br />

participating stakeholders. In the context of our research, this has<br />

meant not only conducting interviews with our participants, but<br />

also organization of workshops to discuss emerging themes about<br />

data release on a local level. Researchers also aim to be involved<br />

with discussions relating to PSI release by attending internal<br />

events at the council about PSI and data release. Furthermore,<br />

events are organized to involve external stakeholders in the<br />

process, by giving a platform from which issues related to open<br />

data could be discussed.<br />

Throughout the project, there is also a strong focus on the use of<br />

cases that will guide data release. These cases are thematically<br />

tied to the middle and long-term goals of the local council. These<br />

themes were distilled down to projects, to be performed in our<br />

education program by students. The goal is to let the projects act<br />

as driver for data release in the local council, first by animating<br />

the participating partners to quickly supply data for project<br />

purposes, but also to highlight the type of data that is most<br />

wanted, and the potential re-uses of data. Results from the<br />

education program can subsequently be used by participants why<br />

data re-use can be valuable.<br />

Data release cannot be seen in isolation. In the long term, the goal<br />

of open data is to foster innovation, transparency and<br />

participation. This is achieved with actors found externally from<br />

the municipality. Additionally, the municipality, through its very<br />

nature serves goals of others. As such, PSI release is not in and of<br />

itself the goal. The aim is also to explore the value of data for the<br />

city, whether expressed financially, or through other metrics such<br />

as social cohesion o participation.<br />

This prescribes the involvement of stakeholders from outside the<br />

public sector, such as the local creative industry. Several<br />

commercial companies partake in exploring, through their active<br />

involvement in our educational program. The cooperation<br />

between Creative Industry as potential user of data, the Public<br />

Sector as data supplier, education and research is shown in Figure<br />

1. We believe that in bringing these four stakeholders together, a<br />

broad view of the issues can sketched, with education and creative<br />

industry acting as data users, while the public sector<br />

experimentally supplies data, with researchers cataloguing data<br />

release.


4. IMPLENTING PAR<br />

In order to come to a deeper understanding of the underlying<br />

processes for the barriers to data release, we have studied the<br />

participating services provided by the four organizations at the<br />

municipality. This happened first through an exploratory<br />

workshop with consortium partners where earlier experiences<br />

with regards to data release within each service was highlighted.<br />

This was attended by a representative of the four services, plus a<br />

member of the Management Service (Bestuursdienst) (n=6). In<br />

addition to this, we performed desk research about the services.<br />

This was followed up with a questionnaire with all the participants<br />

(n=11). Subsequently, the questionnaire was also filled in by other<br />

civil servants (n=50). Questions were based around five themes,<br />

introduced by [15]: internal; judicial, social cultural, economic<br />

and technical barriers to data release. The statements relating to<br />

these themes were given, asking respondents to agree or disagree,<br />

on a 5-point Likert scale. Examples include: Because my<br />

department generates income through licensing data, I think my<br />

department should retain the right to license the data, or, Within<br />

my department, too much of the data is too privacy sensitive to<br />

release.<br />

The answers from the questionnaire formed the input for<br />

subsequent in-depth interviews with participants (n=11). As part<br />

of the project, a workshop was also attended, where statements<br />

regarding data use was introduced and discussed by attendees<br />

(n=8). Following this, a second workshop was organized where<br />

the benefits and barriers of data release was discussed (n=6).<br />

These various investigations were used to construct the indicators<br />

for the underlying processes. Below we present the results from<br />

these investigations.<br />

Participants work at various departments within the local council<br />

and were recruited as a result of previous engagement with<br />

projects at the University. Respondents also came from services<br />

outside of the project consortium, in order to give a broader<br />

impression of open data. Interviews were loosely structured and<br />

conducted on site.<br />

The goal of these initial interviews was to explore how data<br />

release is currently facilitated within the organization. It also<br />

helped in connecting the internal processes of the council with the<br />

barriers, leading to a better understanding of how data is managed.<br />

Interviews were created based on themes that emerged from a first<br />

open workshop about data release, where participants reflected on<br />

earlier experiences. These results were compared with existing<br />

research on data release by national governments, to form a better<br />

picture of the subject. Respondents also filled out a questionnaire<br />

prior to the interview, which helped to focus the interview themes<br />

and identify some barriers as expressed by the participants<br />

The first impression gathered from the interviews is the large<br />

variety between the profiles of the services and how this impacts<br />

data treatment. City Development executes and develops urban<br />

development policies such as new housing complexes, or new<br />

traffic routes. For this task, City Development uses data<br />

extensively. The organization has a traditional decentralized data<br />

structure, where data is used to execute policy, but is subsequently<br />

often not re-used. The sources of the data also varies. In some<br />

cases, it is gathered by a certain department, for example through<br />

sensors on the road. In other cases, data might be bought<br />

externally, or requested from a service of department controlling<br />

8<br />

the data. Illustrative of this is the use of quantitative interview<br />

data from 17000 citizens in Rotterdam. These interviews,<br />

conducted by an external bureau, is subsequently analysed and<br />

presented in booklet form. This booklet might influence policy,<br />

but the underlying data: interview results with 17 000, or even the<br />

data interpretation that results from an analysis of the data is not<br />

necessarily used again for different purposes within the<br />

department, nor is it centrally controlled. Ownership of the data is<br />

also opaque, in addition to its status as public sector information,<br />

due to the fact that it was bought from an external agency.<br />

While City Development creates policy, City Works has as task to<br />

maintain the objects and infrastructure of the city. This includes<br />

trimming trees, maintaining garbage bins, or removing unwanted<br />

growth from bicycle paths, but also large infrastructure project<br />

planning and advice. Additionally, City Works also produces a<br />

variety of products, such as detailed maps of the city. These tasks<br />

require intensive use of data, either because data is needed to<br />

identify the location of objects due for maintenance, or simply<br />

because it is a core aspect of created products such as maps. City<br />

Works also supplies data to organizations inside the local council.<br />

This would include sharing data with City Development to assist<br />

policy development. For all these tasks City Works has<br />

traditionally been very reliant on data management. Data must be<br />

easily accessible and findable because not only is it important for<br />

the internal functioning of the department, it is also one of the<br />

core services offered.<br />

The Library relates to City Works and City Development in the<br />

sense that data is essential for the internal functioning of the<br />

service. Data is collected about books to make them findable<br />

online or in a local catalogue, but the library also keeps data about<br />

all their customers, to ensure efficient service delivery. However,<br />

data is either personally bound, or might be subjected to copyright<br />

law. For example, meta data about books might contain<br />

descriptions supplied by publishers, unavailable for re-use.<br />

However, the Library is also in the midst of reorganization and<br />

might in the future not be part of the city council, at least not in its<br />

current form. This essentially means that the data gathered and<br />

used by the library might not be considered as PSI. Subsequently,<br />

the legal frameworks, as recommended on European and national<br />

level might not be applicable. This creates uncertainty about the<br />

status of the data and to what extent in might be made available.<br />

The last service, the City Archive, is fundamentally already an<br />

active participant in open data, albeit in a largely non-digital form.<br />

Currently, the archive consists of almost 20 kilometres of archived<br />

material, stretching back 800 years. The legacy of, until recent<br />

years, always working with physical artefacts means that<br />

digitization is not traditionally part of the role of the Archive.<br />

However, the Archive has already digitized more than 150TB<br />

worth of data. This data has not been imported into any<br />

centralised system for easy retrieval. There is thus a significant<br />

amount of available information, but a proportionally small<br />

amount is currently accessible through the digital archive. A scan<br />

on demand services has also been launched, but it seems illusory<br />

that the entire archive will be available online soon. Additionally,<br />

certain objects are not easily scanned: these would include objects<br />

that are of unusual format, or very fragile. The City Archive also<br />

possesses very little geographical information about catalogued<br />

objects, prohibiting its use in maps, or other geographic<br />

applications.


This sketches the picture of the four services participating in the<br />

research. Through our interviews we also identified certain<br />

recurring themes, as identified by respondents. What follows is a<br />

closer look at the most important subjects.<br />

5. OBSERVATIONS<br />

The data collection in our PAR results in a number of interesting<br />

observations. In the following two subsections we report on these<br />

observations. We have classified the observations in two<br />

mainstreams. Observations that pertain to underlying thresholds of<br />

data release, and therefore indirectly determine the release of data,<br />

and observations that directly determine the release of data. From<br />

the latter observations, we derive a set of indicators that are<br />

relevant for the release of data. In Section 5.1, we outline the main<br />

underlying thresholds that play a role in data release. Section 5.2<br />

is devoted to the observations and a set of indicators that directly<br />

determine the release of data.<br />

5.1 Underlying Thresholds<br />

5.1.1 Fear of False Conclusions<br />

A recurring theme was the fear of false conclusions being drawn<br />

from released data. An example of this would be the potential<br />

decrease in property value if details would surface about policy<br />

plans of new city developments, even if these were not yet<br />

finalised. Interpretations of data by outsiders without prior<br />

knowledge about the goal of data gathering could also lead<br />

unwanted situations. For example, research performed on the<br />

demographic profile of certain neighbourhoods might not appear<br />

nuanced enough to an outsider without knowledge about statistical<br />

methods. In the case that there are judicial frameworks in place to<br />

mitigate such issues, there might not be known to individuals<br />

dealing with a particular data request.<br />

5.1.2 Financial Effects of PSI Release<br />

On the economic front, licensing fees also formed a barrier to<br />

release. As mentioned earlier, some public bodies charge usage<br />

fees for data. This is also the case for City Works. While research<br />

has shown that the data recovery model results in proportionally<br />

low amounts of income and that less restrictive data release can in<br />

some cases lead to increases in revenue and or, in the case of free<br />

data, lower transaction costs [25], services find themselves in a<br />

transitional phase. Even proportionally low amounts of income<br />

from data licenses need compensation. The current climate of<br />

decreased government spending aggravates the problem since it is<br />

not a given that lost income from releasing previously licenced<br />

data for free will be compensated by the national government or<br />

the council.<br />

5.1.3 Opaque Ownership and Unknown Data<br />

Locations<br />

There are also significant questions regarding ownership of data.<br />

Due to vertical data management in the past, data sharing between<br />

departments has historically not always been the case. As a result,<br />

services and, in extreme cases, departments within a service, lack<br />

a complete picture about which data others control. Additionally,<br />

even if the location of data is known, its ownership remains<br />

opaque, inhibiting release. Merely identifying a dataset that would<br />

strictly speaking be suitable for release does not warrant its<br />

appropriateness as open data.<br />

9<br />

5.1.4 Priority<br />

Finally, from our interviews and workshops, it transpired that<br />

open data is not necessarily a priority within the council and does<br />

not form part of existing tasks. This is not a consequence of<br />

unwillingness, but simply because data release is not part of the<br />

regular work for many data professionals. In combination with<br />

this, the immediate benefits of data release are not always explicit,<br />

making it an extra task, without clear incentives.<br />

While the interviews conducted provide insights into the<br />

experience of data release by the data professionals in the city<br />

council, it neglects exploring the actual process of data release in<br />

an empirical form. In the following section, we elaborate on the<br />

released data, but also on the data that has, as of yet, not been<br />

easily released. From these observations, we derive a set of<br />

indicators that determines the release of data.<br />

5.2 Indicators for Data Release<br />

For our educational program, the focus has been to release data<br />

that can be described as the low hanging fruit. This was for the<br />

most part non-personal data related to objects in the city, for<br />

reasons elaborated on earlier. A majority of data relates to public<br />

property – in essence everything controlled by the municipality<br />

that can be observed in the public space. Given this, a major<br />

supplier has been City Works. The data released includes data<br />

such as the locations of objects like trees, roads, or parks.<br />

However, release has not only been swift because of the types of<br />

data, but also due to the central data storage at City Works.<br />

However, data released by the City Works was not made available<br />

for re-use outside of our education program. The reason behind<br />

this is the lack of clear judicial rules with regards to data re-use on<br />

a wider scale. This effectively means that the data cannot strictly<br />

be referred to as open data: it may not be used without restrictions<br />

outside of our education program.<br />

Despite the ease with which data about objects was released, other<br />

types of data that relate to the internal processes of the council is<br />

much more sensitive. For example, data about the maintenance<br />

costs of objects has not been released, even within the education<br />

program. This would include data about how often trees are<br />

treated for various disease and the costs associated with cutting<br />

the grass in public parks, or what the budgets are for keeping the<br />

city maintained. Anecdotal evidence from our education program<br />

suggests that this type of data (such as the maintenance cycle of<br />

objects, or the costs associated with taking care of trees), can form<br />

interesting input for applications. Also from the perspective of<br />

transparent government, this data seems valuable. However, in the<br />

short term, this is not forthcoming.<br />

The lack of judicial frameworks and the ease of release stands in<br />

stark contrast with data from City Development. This department<br />

has made explicit decisions about data release, by classifying data<br />

released under Creative Commons Zero (CC0) license. Applying<br />

this license means that, unless otherwise indicated, the contents of<br />

data objects such as traffic information is available for any type of<br />

reuse. An exception to this might be the presence of copyrighted<br />

material inside a document. For example, a policy document<br />

could be supplied, unless it contains a photograph that does not<br />

fall under the CC0 license. Furthermore, it is not required to state<br />

the source of the data by the re-user. However, it is prohibited to<br />

create the impression that the local council agrees with any


conclusions that might arise rom the data, when interpreted by<br />

external parties [9].<br />

Notwithstanding, despite having seemingly unambiguous<br />

permission to release data to the public, the City Development<br />

department is often in the dark as to where data actually resides.<br />

Even if the data location is fully known, it does not warrant<br />

release. Illustrative of this is a request for the locations of public<br />

transport data. While this data is controlled by City Development,<br />

the data is owned on a metropolitan regional level. As a result,<br />

requests for the data’s release needs to go to metropolitan level,<br />

even though the data location is known. Due to its ownership<br />

being external, it is subsequently unclear whether the data can be<br />

classified under the CC0 license mentioned above. This illustrates<br />

that defining the judicial aspects of data release does not translate<br />

to release. Practical or technical issues remain.<br />

Due to the product focussed work process present at City<br />

Development, the extreme decentralization is not conducive to an<br />

open data policy. Additionally, departments within City<br />

Development are controllers of datasets, but do not necessarily<br />

own them. This potentially creates uncertainty as to the<br />

applicability of the license, but also ambiguity as to who has the<br />

final word in releasing the data.<br />

Furthermore, while City Development has been very clear in<br />

taking care of the judicial side of open data, the data that is<br />

currently classified for re-use does not compromise all data. The<br />

real-time status of many parking garages in the city is such an<br />

example. This data, whilst known and shown in certain locations<br />

in the city, is not available to third parties.<br />

While City Development and City Works both deal for a big part<br />

with data in a digital format, the City Archive is historically much<br />

more focussed on physical artefacts. Data release by City Archive<br />

has up until now been limited to the opening up of the search<br />

Application Programming Interface (API), in order to access the<br />

object metadata. There is thus no raw, unedited data about<br />

archived objects such as high-resolution images, or historical<br />

maps available in digital form, for reasons discussed earlier.<br />

Table 1. Indicators of data release based on observations<br />

Themes City Development City Works Library City Archive<br />

Use of data Execute development policy. Maintain public<br />

objects, producing<br />

geographical products.<br />

Support core services,<br />

internally and<br />

externally<br />

Source of data Externally gathered Internally produced Internally produced<br />

through services<br />

processes and<br />

externally bought<br />

Enhance services,<br />

catalogue objects<br />

Metadata internally<br />

created, artefacts<br />

externally supplied<br />

Data storage Decentralized Central Central Central (meta data<br />

only)<br />

Suitability of data for Medium: combination of High: many sets related Low: data personally High: data not<br />

release personally identifiable to public objects, non- identifiable or subject personally identifiable<br />

information, live sensor data personal.<br />

to copyright<br />

and owned by the<br />

and object data.<br />

Archive<br />

Data released None Object data of public Book metadata Search API of archive<br />

artefacts<br />

metadata<br />

Biggest threshold Decentralized data storage No legal framework for Personally identifiable Costs associated with<br />

and internal data<br />

the supply of data, data, uncertain digitalization of<br />

management processes. commercial interests. organizational status,<br />

copyright.<br />

archive artefacts.<br />

10<br />

As mentioned before, the Library has more comprehensive digital<br />

service provision, due to the reliance on data to manage the<br />

collection and serve the public. However, the only set of<br />

information that is currently available for use contains book meta<br />

data. The use of this data currently falls into a grey zone:<br />

bibliographic information gets bought from a commercial<br />

organization, which has implications on its release as open data,<br />

while for education purposes, re-use would be allowed. While the<br />

library is also in possession of other data that is without copyright<br />

restrictions, this comprises information about book lending, or<br />

statistics about members. This data could theoretically be<br />

personally identifiable, which complicates its use as open data.<br />

Even in cases where data is anonymized it might still be possible<br />

to extract personally identifiable data, through methods discussed<br />

by [18].<br />

From these observations, we note that the judicial issues, which<br />

include privacy and copyright concerns, the way data is collected<br />

and how it is stored, play an important role in data release.<br />

Therefore, we distinguish the following indicators that may be<br />

important for data release:<br />

o Use of data, i.e., the way data is used by the department.<br />

o Source of data, i.e., how is a set of data obtained?<br />

o Data Storage, i.e., is data stored centrally, or decentralized?<br />

o Suitability of data for release, i.e., are there rules and<br />

regulations that determine whether a dataset may be released<br />

or not, such as privacy or copyright.<br />

In Table 1, we summarize how the several departments score on<br />

each of the indicators together with the results of dependent<br />

variable “data released”. Based on the research performed, we<br />

also name the biggest threshold to data release. These relate to<br />

indicators important for data release.<br />

This overview of the release of data for use within the education<br />

program provides an initial view to the barriers of data release as<br />

experienced by the various participating partners. In the following


section we will elaborate more on how these findings can impact<br />

open data policy on local level.<br />

6. LESSONS LEARNED<br />

First and foremost, the act of freeing up data is new to the services<br />

at the city council. This results in many questions by public<br />

servants about how data requests should be handled. Because<br />

there is, as of yet, no real framework in place to answer these<br />

questions, data release stumbles. However, beyond the fact that<br />

data professionals lack clear guidelines to support data release to<br />

external parties, there are some more fundamental issues<br />

concerned with data release.<br />

Due to the urgency of the education program, the most effort has<br />

also been on acquiring easy datasets, without prioritizing data<br />

according to demand. As a result, our inquiry reveals where data<br />

is most easily retrieved, but also, by virtue of not being easily<br />

accessible, what types of data needs further exploration. This<br />

revealed that the easiest data to technically and practically release<br />

was non-personal object data and especially due to the centralized<br />

data storage of such data.<br />

Below we will elaborate more in depth about the main lessons<br />

learned from the research.<br />

6.1 Nuanced Approach to Data Release<br />

While the municipality typically presents itself as one entity to the<br />

outside world, there is a much more complex organisational<br />

reality. Even though our focus had merely been on four services,<br />

the heterogeneous character of these services are immediately<br />

apparent. This ranges from the types of tasks conducted, such as<br />

servicing the public (Library), to developing policy (City<br />

Development). Additionally, while some of the services are<br />

involved with interacting with the public as a core task (City<br />

Archive), others focus more on maintaining objects in the public<br />

space. Our attempts at data release further emphasized this view.<br />

This complex picture effectively also means that these services<br />

deal with data in different ways. City Development, as a service<br />

that is primarily concerned with developing and executing policy,<br />

uses data for the creation of a product (such as a policy<br />

recommendation). The data itself in this context merely supports a<br />

task. As a result, data requested by the service remain unused,<br />

except for the times when it is being applied in policy<br />

development or creation of various products such as informational<br />

publications about the city.<br />

These processes of data usage thus impacts data release. Services<br />

where data is used and stored very centrally has shown to be much<br />

quicker in being able to release data, as the Library and City<br />

Works have shown. This does not take into effect the suitability of<br />

the data for release. The converse is true of City Development,<br />

where data is important, but where the emphasis is on the products<br />

that result from the data. Data storage is decentralized and<br />

ownership opaque, complicating data release.<br />

The suitability of PSI for release as open data also varies. Based<br />

on two factors, privacy sensitivity and copyright restrictions, we<br />

identify that internally produced data about public objects are the<br />

most suitable, while at the other end, Library data, which is partly<br />

bought from third parties and pertains to persons have a lower<br />

suitability.<br />

11<br />

Different barriers to data re-use apply. While only one service,<br />

City Development, has made explicit arrangements with regards<br />

to judicial matters, this service, as our interviews and data release<br />

shows, is not in a position to release data under a CC0 licence for<br />

reuse because of how it treats data.<br />

This too would be the case for data release by the City Archive. In<br />

the event that the Archive has a legal framework about data<br />

release it still might not possess the types of data that is easily<br />

released, due to physical limitations to what the archive can<br />

digitize, or financial restrictions. Conversely, the library can, and<br />

has, released data for re-use. However, this data is not widely<br />

reusable due to copyright, and the data that is not subject to<br />

copyright law can be sensitive to privacy.<br />

Given this, it seems that a nuanced view is needed to data release<br />

strategies on a local level, with all the implications this has for<br />

associated policy. Prior to formulating policy it remains important<br />

to look at how services deal with data storage by taking into<br />

account whether data is easily accessible, stored centrally, or<br />

available in digital formats and what the other financial, internal<br />

or judicial aspects might be.<br />

6.2 Data Release for its Own Sake<br />

The difficulties of data release, either as a result of technical<br />

issues, uncertain judicial frameworks, uncertain economic<br />

outcomes or simply not being able to find the data, means that<br />

data release can still be a costly, labour intensive activity. Our<br />

experience up until now has been that simply requesting “all” data<br />

yields no results.<br />

This means that choices are necessary to decide which data should<br />

be released. In reflecting back on the motivation behind PSI<br />

release, it is clear that the aim should not be merely the release of<br />

data for its own sake. Rather, the ambition of PSI release policy is<br />

to contribute to transparent government, innovation and increased<br />

public participation. This however, is easier said than done. The<br />

current state of affairs mean that to ensure efficient use of released<br />

data, it is important to consider the return on investment, not<br />

merely in a financial sense, but in the context of highest re-use<br />

achieved by datasets when compared to effort needed to realise its<br />

release. A more focused approach to data release has the potential<br />

to mitigate some of the problems identified earlier. For example,<br />

if finding the location of data is currently prohibiting release, as is<br />

indeed currently the case, a demand-based approach to data<br />

release might be applicable.<br />

To facilitate the release of data based on demand, it remains<br />

necessary to inform potential end users of the types of data<br />

currently controlled by a service or department. This is currently<br />

attempted within the department of Traffic and Mobility at City<br />

Development. Through our education program, students are given<br />

insight into the types of data that is regularly used at the<br />

department. Request for data can then be performed with much<br />

more focus and results of release, whether failure or success, can<br />

be documented. Through this, the demand is articulated and effort<br />

spent on data release yields quicker results.<br />

Additionally a stronger focus can be achieved without big<br />

investments into infrastructure: by exploring data release on a<br />

small scale, data is released with clearer end-goals, which also<br />

explicitly demonstrates the benefits of PSI.


6.3 Large Scale Implementation<br />

In relation to the heterogeneity of the separate public sector<br />

organizations and in combination with the transaction costs<br />

associated with data release we identify that the large-scale<br />

implementation of open data infrastructure is likely to encounter<br />

significant difficulties. First and foremost, such an<br />

implementation would be troublesome to achieve due to the<br />

inherent heterogeneity of the services as discussed earlier. For<br />

example, significant efforts would first need to take place to<br />

ensure efficient data release and due to the differences in place at<br />

the various services this process could be lengthy and costly. In<br />

our context, merely clearing the judicial hurdles for the four<br />

participating services in cases where data is deemed usable could<br />

slow down development significantly. Even more illustrative of<br />

this is the change needed in internal processes, as would be the<br />

case in organizations with very fragmented data storage.<br />

Furthermore, a large-scale implementation implicitly requires<br />

large amounts of data to be made available. As discussed above,<br />

even where there are judicial frameworks in place and data release<br />

is technically feasible, there are still transaction costs related to<br />

the release of data, such as locating datasets, or digitization. The<br />

resources needed to build op a large-scale infrastructure that could<br />

facilitate data release, might not be justified in relation to the<br />

uncertainty of the actual re-use of the data that is finally released.<br />

This holds especially true in a time when governments on local<br />

and national scale in industrialized countries are seeking to reduce<br />

expenditures.<br />

This sketches the conclusions of the research. In the following<br />

section we will reflect on how these barriers might be addressed<br />

in our own work.<br />

7. OUTLOOK<br />

This research up until now presents a complicated picture with<br />

regards to open data release. We believe that the appropriate way<br />

to deal with data release on the local level is to run small pilots<br />

and cases where there is a continual focus on data release where<br />

direct effects of the value of data can be illustrated. Below we will<br />

elaborate on a practical case that acts as driver for data release.<br />

The data thus far collected is restricted to the easiest to release<br />

information. While this provides insights into what the low<br />

hanging fruit are, it does not answer questions about data that is<br />

harder to release, and what changes the underlying processes will<br />

have to undergo to facilitate release. In order to get a fuller<br />

understanding of data release, more effort should be placed on<br />

harder to release data.<br />

To achieve this we have identified a portion inside the city that<br />

can act as city laboratory for open data. Named the 1km3, this is a<br />

space where an Open Data experiment is being conducted.<br />

Located in the centre of the city, the 1km3 encompasses a place<br />

where people live, shop, play and work. Within the confines of<br />

this area, the goal is to gather as much data as possible. The case<br />

acts to motivate participants by showing the role PSI is playing<br />

for the city and its potential for interaction between residents and<br />

local government. This should also highlight, in addition to the<br />

barriers to data release, the potential benefits that PSI can have on<br />

a local scale. Because the 1km3 is a limited area, a more focused<br />

approach can be taken. Additionally, the limited scope is<br />

appropriate to analyse the process of data release by local<br />

12<br />

authorities, allowing the research results to be applied on a<br />

broader scale.<br />

The results from the first exploratory phases of the project and the<br />

barriers introduced in Table 1 currently forms a basis from which<br />

stakeholders can attempt data release within their own<br />

department. Additionally, the results from the education program<br />

is assistive in illustrating data re-use in the municipality as a<br />

whole.<br />

In referring back to the PAR approach, this city lab provides<br />

conditions where stakeholders can actively play a role to explore<br />

efficient data release. Due to its small size, we can also focus on<br />

the barriers of individual services, whilst releasing data with<br />

explicit goals in mind. Such a pilot also precludes large<br />

information systems, but rather allows smaller explorations.<br />

8. CONCLUSION<br />

In this paper, we explored data release on a local level. For this<br />

purpose, we conduct interviews, workshops, questionnaires and<br />

desk research. Through this we identified underlying thresholds<br />

that inhibit data release, summarized in Section 5.1. Most<br />

importantly, we identified indicators for data release, seen in<br />

Table 1, based on our observations. These include the use of data<br />

within a service, where data is stored and the suitability of data for<br />

release. More studies could show whether there is a dependency<br />

between indicators. This could assist in focussing efforts of<br />

process change to best suit an organization, based on discovered<br />

themes.<br />

To realise the ambition of open data on a wide scale on local<br />

level, there needs to be more questions answered about data<br />

release. Clear examples are needed that illustrate the benefit of an<br />

open data policy to civil servants, on a small scale. Large ICT<br />

projects that attempt to solve all these problems in one attempt<br />

might, in the current financial climate, not feasible. The focus<br />

should be on using pilot projects that illustrate, on a local,<br />

measurable level, the potential impact of open data.<br />

9. ACKNOWELDGEMENTS<br />

We thank our colleagues of the Rotterdam University, both the<br />

researchers of the research lab Creating 010 and the teachers and<br />

students of the School of Communication, Media and Information<br />

Technology involved in the Rotterdam Open Data projects and the<br />

participants from the council of Rotterdam. Special thanks to<br />

Judith Lemmens. The work has been partly funded by the<br />

Rotterdam Media Commission and RAAK Publiek.<br />

10. REFERENCES<br />

[1] Bertino, E. and Sandhu, R. 2005. Database security -<br />

concepts, approaches, and challenges. IEEE.<br />

[2] Bertot, J.C., Jaeger, P.T. and Grimes, J.M. 2010. Using ICTs<br />

to create a culture of transparency: E-government and social<br />

media as openness and anti-corruption tools for societies.<br />

Government Information Quarterly. 27, 3 (Jul. 2010), 264–<br />

271.<br />

[3] Boulton, G., Rawlins, M., Vallance, P. and Walport, M.<br />

2011. Science as a public enterprise: the case for open data.<br />

The Lancet. 377, 9778 (2011), 1633–1635.


[4] Braak, S. van den, Choenni, R. and Verwer, S. Combining<br />

and Analyzing Judicial Databases. Discrimination and<br />

Privacy in the Information Society: Effects of Data Mining<br />

and Profiling Large Databases. Springer.<br />

[5] Broeders, D., Cijpers, C. and Prins, C., (eds) 2011. De Staat<br />

van Informatie. Wetenschappelijke Raad voor het<br />

Regeringsbeleid.<br />

[6] Chesler, M. 1991. Participatory action research with self-help<br />

groups: An alternative paradigm for inquiry and action.<br />

American Journal of Community Psychology. 19, 5 (Oct.<br />

1991), 757–68.<br />

[7] Choenni, S., Dijk, J. van and Leeuw, F. 2010. Preserving<br />

privacy whilst integrating data: Applied to criminal justice.<br />

Information Polity. 15, 1-2 (2010), 125–138.<br />

[8] Choenni, S. and Leertouwer, E. 2010. Public safety mashups<br />

to support policy makers. Proceedings of the First<br />

international conference on Electronic government and the<br />

information systems perspective. Springer-Verlag.<br />

[9] Creative Commons — CC0 1.0 Universal: 2011.<br />

http://creativecommons.org/publicdomain/zero/1.0/.<br />

Accessed: 2012-04-10.<br />

[10] Dekkers, M., Polman, F., Velde, R. te and Vries, M. de 2006.<br />

Mepsir: Measuring European Public Sector Information<br />

Resources.<br />

[11] European Commission 2003. Communication of the Re-use<br />

of Public Sector Information – Review of Directive<br />

2003/98/EC. Regulation.<br />

[12] Fitzgerald, B., Russo, N. and Stolterman, E. 2002.<br />

Information Systems Development: Methods-in-Action.<br />

McGraw-Hill Higher Education.<br />

[13] Hildebrandt, M. and Koops, B.-J. 2010. The Challenges of<br />

Ambient Law and Legal Protection in the Profiling Era.<br />

Modern Law Review. 73, 3 (2010), 428–460.<br />

[14] Hughes, J. 2003. Commentary: Participatory action research<br />

leads to sustainable school and community improvement’.<br />

School Psychology Review. 32, 1 (2003), 38–43.<br />

[15] Huijboom, N. and Broek, T.V.D. 2011. Open data: an<br />

international comparison of strategies. European Journal of<br />

ePractice. 12, April (2011), 1–13.<br />

[16] Kalidien, S., Choenni, S. and Meijer, R. 2010. Crime<br />

statistics online: potentials and challenges. Proceedings of<br />

the 11th Annual International Conference on Digital<br />

Government Research (2010), 131–137.<br />

[17] McLaren, R. and Waters, R. 2011. Governing Location<br />

Information in the UK. Cartographic Journal, The. 48, 3<br />

(2011), 7.<br />

13<br />

[18] Ohm, P. 2009. Broken Promises of Privacy: Responding to<br />

the Surprising Failure of Anonymization. Social Science<br />

Research Network. 57, 6 (2009), 1–64.<br />

[19] Open Data Enschede: 2012. http://opendata.enschede.nl/.<br />

Accessed: 2012-04-10.<br />

[20] Open data | Overheid.nl Open Data: 2012.<br />

https://data.overheid.nl/. Accessed: 2012-04-10.<br />

[21] Public data for all – opening up Europe’s public sector: 2011.<br />

http://blogs.ec.europa.eu/neelie-kroes/public-data-for-all-–opening-up-europes-public-sector/.<br />

Accessed: 2012-04-10.<br />

[22] Reiman, J. 2012. Driving to the Panopticon: A Philosophical<br />

Exploration of the Risks to Privacy Posed by the Highway<br />

Technology of the Future Santa Clara Symposium on Privacy<br />

and IVHS. Clara Computer &amp; High Technology. 11, 1<br />

(2012).<br />

[23] Schikhof, Y., Mulder, I.J. and Choenni, S. 2010. Who will<br />

watch (over) me? Humane monitoring in dementia care.<br />

International Journal of Human-Computer Studies. 68, 6<br />

(Jun. 2010), 410–422.<br />

[24] Transparency and Open Government | The White House:<br />

2009.<br />

http://www.whitehouse.gov/the_press_office/Transparency_a<br />

nd_Open_Government. Accessed: 2012-04-10.<br />

[25] Vries, M. de, Kapff, I., Achiaga, M.N., Wauters, A., Osimo,<br />

D., Foley, P., Szkuta, K., O’Connor, J. and Whitehouse, D.<br />

2011. POPSIS: Pricing Of Public Sector Information Study.<br />

[26] Warner, J. and Chun, S.A. 2008. A Citizen Privacy<br />

Protection Model for E-Government Mashup Services.<br />

Proceedings of the 2008 international conference on Digital<br />

government research (2008), 188–196.<br />

[27] Weiss, P. 2002. Borders in Cyberspace : Conflicting Public<br />

Sector Information Policies and their Economic Impacts.<br />

Federal Register. February 2002 (2002).<br />

[28] Whyte, W.F. 1989. Advancing scientific knowledge through<br />

participatory action research. Sociological Forum. 4, 3 (Sep.<br />

1989), 367–385.<br />

[29] Zuiderwijk, A., Janssen, M. and Choenni, S. 2012. Open<br />

Data Policies: Impediments and Challenges. 12th European<br />

Conf. On E-government, June 14-15 (Barcelona, Spain,<br />

2012), 794–80.<br />

[30] Zuiderwijk, A., Janssen, M., Meijer, R., Choenni, R.,<br />

Charalabidis, Y. and Jeffery, K. 2012. Issues and Guiding<br />

Principles for Opening Governmental Judicial Research<br />

Data. Proc. EGOV 2012, 11th European Conf. On Electronic<br />

Government, September 3 - 6, LNCS (Kristiansand, Norway,<br />

2012).


Implementation Framework for Open Data in Colombia<br />

Lydia Marleny Prieto<br />

IT Development Manager<br />

GEL Programme, Ministry of ICT<br />

Cr 8 12-00 Bogotá, Colombia<br />

+57 (1) 3442270 x1501<br />

lydia.prieto@<br />

gobiernoenlinea.gov.co<br />

ABSTRACT<br />

This document contains an executive summary of the Open Data<br />

strategy for Colombia represented in an open data model fit into<br />

the Government online strategy, which allows operating and<br />

managing the supply, as well as the demand, of public access data.<br />

Colombian Open Data Model has been made with the objective of<br />

supporting the generation of economic and social progress in the<br />

country, by allowing citizens and business to have access to<br />

public information, so that it can be used for developing<br />

government services that create value to society in general; and to<br />

promote transparency in the country, through information and<br />

data available to citizens and businesses.<br />

Categories and Subject Descriptors<br />

K.4. [Computers and Society]: Public Policy Issues<br />

General Terms<br />

Documentation, standardization, legal aspects, management<br />

Keywords<br />

Open data, open data strategy, open data model, online<br />

government, transparency, public data, support and operation.<br />

1. INTRODUCTION<br />

Information generated by public agencies can be considered as a<br />

public asset. According to the Colombian Constitution citizens<br />

have the right to access such information. The concept of open<br />

government data arises as part of the efforts made to structure<br />

information. Governments can have more effective<br />

administrations by means of being more transparent and by<br />

working on improving citizen’s quality of life.<br />

In Colombia, the e-government program has been implemented in<br />

a systematic and coordinated way in all public agencies. Starting<br />

in 2000 with Presidential Directive No. 02 [4], followed in 2008<br />

with Decree 1151 [3], a general framework for e-government<br />

strategy was defined. With the growth of the e-government<br />

strategy, from 2011, a new maturity model was developed, and<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Ana Carolina Rodríguez<br />

Research and Politics Manager<br />

GEL Programme, Ministry of ICT<br />

Cr 8 12-00 Bogotá, Colombia<br />

+57 (1) 3442270 x 1007<br />

ana.rodriguez@<br />

gobiernoenlinea.gov.co<br />

14<br />

Johanna Pimiento<br />

General Manager<br />

GEL Programme, Ministry of ICT<br />

Cr 8 12-00 Bogotá, Colombia<br />

+57 (1) 3442270 x 1500<br />

johanna.pimiento@<br />

gobiernoenlinea.gov.co<br />

new topics such as Open Government [2] and Open Data have<br />

been included in the file of topics to develop, by taking concrete<br />

actions.<br />

Article 230 of the National Development Plan 2010 - 2014,<br />

introduced this directive: "Government online as a strategy of<br />

good governance: All public agencies shall forward the actions<br />

identified by the national government through the Ministry of<br />

Information Technologies and Communications" [5].<br />

"Gobierno en Linea" (GEL) is the Colombian online strategy,<br />

led by a program with the same name, that contributes to<br />

developing a more efficient, transparent and participative<br />

government, which provides better services by means of ICT<br />

(http://www.gobiernoenlinea.gov.co). This strategy guides the<br />

delivery of online services by public agencies at both national and<br />

local levels.<br />

GEL strategy contributes to build an efficient, transparent and<br />

participative government which provides better services with the<br />

collaboration of the whole society through the use of information<br />

technologies in order to increase competitiveness and to improve<br />

the quality of life for the prosperity all throughout Colombia.<br />

Heading towards such objective, the open government data model<br />

for Colombia has been developed. International best practices,<br />

grounded on political and legal principles as well as technological,<br />

cultural, organizational and budgetary perspectives have been<br />

used to enable the publication of data by government agencies.<br />

The openness of information publicly available has been<br />

leveraged by citizens, academia, developer communities and<br />

agencies, along with some policy framework.<br />

Such work aims to introduce the open government data<br />

framework in Colombia, plus the strategic guidelines needed for<br />

its implementation. Chapters two and three describe the research<br />

methodology and the model design. In chapter four current results<br />

are described: a technical prototype for data and application<br />

catalogs implementation, a regulatory framework, and a road map<br />

to continue working until 2014. Lastly, conclusions and lessons<br />

learned are addressed.<br />

2. RESEARCH METHODOLOGY<br />

This research was developed combining a mix approach of<br />

quantitative and qualitative components. It focused on the<br />

construction of the information that would support the formulation<br />

of guidelines and regulations for the open data strategy in the<br />

Republic of Colombia.


In order to have elements of analysis to produce knowledge,<br />

experiences of other countries in the implementation of actions<br />

and policies of open data were studied. Focus groups led by<br />

experts on specific topics were carried out, as well as case studies<br />

were conducted in eight local national public institutions, mainly<br />

ministries and administrative departments.<br />

Case studies aimed to assess the implementation of the strategic<br />

framework along with the methodological and technological tools<br />

developed by GEL program. This analysis involved a catch effort<br />

through interpretation by the research team against focus groups<br />

and case studies.<br />

A benchmarking study including United Kingdom, Canada, USA,<br />

Australia, Spain and Chile open data models, helped to identify<br />

the main steps needed to develop the framework: a) definition of<br />

the objective situation; b) gap analysis between the objective<br />

situation and the current situation; c) definition of the necessary<br />

components for the model; d) definition of the proposed<br />

architecture for each of the perspectives; e) identification of<br />

elements and organizational structure, actors and components<br />

required to implement the initiative; f) identification of<br />

technological and regulatory elements; g) identification of sociocultural<br />

elements to cope with change; and h) identification of the<br />

mechanisms, actions and budgets required to implement the<br />

initiative.<br />

Through quantitative analysis, results of case studies were<br />

evaluated using surveys to officials of the organizations involved.<br />

Such surveys measured the quality of the concepts, content and<br />

language used in the proposed framework, which were studied<br />

through scales from 1 to 5. Concepts were transformed variables,<br />

identifying areas of improvement used for the formulation of the<br />

final version of the framework toolkit.<br />

3. OPEN DATA MODEL<br />

3.1 Objectives<br />

The open government data model in Colombia seeks to fulfill the<br />

following objectives:<br />

o Support the generation of economic and social progress in<br />

the country by allowing citizens and business to have access<br />

to public information, so that it can be used or transformed<br />

for developing government services that create value to<br />

society in general.<br />

o Promote transparency in the country by means of information<br />

available to citizens and businesses.<br />

3.2 Principles<br />

Taking into account the objectives, the expectations of the<br />

Colombian Government, and the best practices identified, the<br />

following are the fundamental principles for open government<br />

data, illustrated in Figure 1. Basic principles are grouped into<br />

four perspectives: politic and legal, socio-cultural, organizational<br />

and budgetary, and technological.<br />

Politic and legal principles guide the policies handling political<br />

and legal efforts, and establish responsibilities and competences<br />

for its enforcement; sociocultural principles lead strategies, tools<br />

and actions necessary for the promotion and appropriation of good<br />

practices, and guidelines for policy massification by public bodies<br />

and third party application developers; Organizational principles<br />

give directives in policies, business processes, competencies,<br />

roles, organizational structures and resources required to<br />

15<br />

implement the initiative in public administration; and<br />

technological principles guide the definition of protocols,<br />

standards, tools and methodological guidelines necessary to<br />

implement the strategy.<br />

Socio-cultural principles<br />

§� Pursue balance between supply and demand.<br />

§� Seek for support from software development<br />

communities, private companies and<br />

academia.<br />

§� Promote of interaction and feedback from<br />

citizens and businesses about the relevance,<br />

quality and timeliness of published data.<br />

§� Focus on the satisfaction level of citizens,<br />

businesses, the public and the media.<br />

Strategic lines<br />

and<br />

fundamental<br />

principles<br />

Politic and legal principles<br />

§� Support from all levels of government.<br />

§� Phase out restrictions that limit access and use of<br />

public information (such as payments or licenses).<br />

§� Legal establishment of responsibilities and<br />

competencies.<br />

§� Progressive coverage of the initiative, for all<br />

branches of government and private agencies<br />

exercising public functions.<br />

§� Agencies responsible and autonomously publishing,<br />

hosting, maintaining and updating data<br />

§� Support from a legal system that integrates open<br />

data guidelines and policies.<br />

Organizational and budgetary principles Technological principles<br />

§� Leadership, control and monitoring of the<br />

implementation strategy from the central level.<br />

§� Encouraging and supporting generation of local<br />

and thematic initiatives.<br />

§� Considered a common practice throughout<br />

public agencies.<br />

§� Supported by a sustainable budget.<br />

§� Aligned with e-government GEL maturity model.<br />

§� Encouraging quality of data being published.<br />

§� Data easily found by others at a central point.<br />

§� One main data catalog for the country and<br />

multiple synchronized federate catalogs at local<br />

and thematic levels.<br />

§� When possible, government should guarantee the<br />

authenticity of published data.<br />

§� Multiple publication mechanisms to suit the<br />

conditions of the different public agencies.<br />

Figure 1. Fundamental principles for open government data<br />

3.3 Model components<br />

Based on the principles outlined before, Colombian open<br />

government data model has been structured. It was organized for<br />

describing the elements that should be considered at the strategic,<br />

tactical, operational and support levels, as displayed in Figure 2.<br />

This model seeks to generate value-added services to society<br />

through the development of applications made by third parties<br />

(development communities, infomediaries industry, and<br />

academia), using open government data from public agencies.<br />

The elements associated with the model are described below.<br />

3.3.1. Strategic Elements<br />

Strategic elements describe the articulation that must exist<br />

between the proposed open data strategy and the general GEL<br />

strategy. It contributes to the achievement of GEL vision under<br />

the following considerations:<br />

1) Facilitate the efficiency and collaboration within and<br />

between state agencies as well as society as a whole.<br />

2) Strengthen the conditions for increasing competitiveness and<br />

improving the quality of life.<br />

3) Contribute to increase transparency in public administration.<br />

4) Promote citizen participation using electronic media.<br />

3.3.2. Tactical Elements<br />

Tactical elements sought to link operational and strategic<br />

components. For materializing this, an element of institutional<br />

articulation and public policy was formulated through which the<br />

responsibilities and powers of each of those involved in the open<br />

government data initiative in Colombia were defined. Three main<br />

indicators that allow the monitoring and continuous evaluation of<br />

the open data initiative were defined:<br />

1) Compliance: Monitoring the level of compliance of open<br />

data policies and regulations by government agencies,<br />

through the criteria defined in GEL manual.


2) Usage: Assessed by quantifying the use of published data,<br />

taking into account feedback provided by users.<br />

3) Impact: Evaluated considering the applications that had been<br />

built using published data.<br />

Evaluation<br />

Strategic<br />

Tactic<br />

Operational<br />

Support<br />

Open Data Offer<br />

Preparation<br />

Identification<br />

Analysis and Prioritization<br />

Documentation<br />

Structuration, uploading and publishing<br />

Promotion and follow up<br />

Access and use of<br />

information and data<br />

Legal and regulation<br />

Information and<br />

data publishing<br />

Open Data Objectives and alignment with GEL<br />

strategy<br />

Institutional and public policy articulation<br />

Publishing<br />

responsibility<br />

Responsibility of<br />

information /data<br />

access and use<br />

Continued<br />

Feedback<br />

Culture<br />

Strengthening<br />

Publishing<br />

management<br />

Demand and value-added<br />

services generation<br />

Demand identification<br />

Published data access<br />

Applications development<br />

and registration<br />

Processes<br />

Support and<br />

maintaining<br />

Technology<br />

Non-functional<br />

Conceptual model<br />

requirements<br />

Monitoring<br />

Services<br />

consumption<br />

Citizens<br />

Sectors, unions,<br />

NOGs<br />

Stekeholders<br />

GEL Developers,<br />

Infomediary<br />

Agencies<br />

Academy Allies<br />

Figure 2. Open Government Data Model for Colombia<br />

3.3.3. Operational Elements<br />

Operating elements are those which bear with the “day to day”<br />

implementation of the open data model. These elements are solely<br />

responsible for promoting the provision of open government data,<br />

the generation of services around them and the balance between<br />

supply and demand through continuous public feedback and<br />

reinforcement of cultural strategies.<br />

Data supply is the backbone of the operation by which<br />

information is published by public agencies (and private<br />

companies with public functions) at national and local levels in<br />

structured and reusable formats under defined quality parameters.<br />

The demand for data that supports the operation allows<br />

identifying the needs that users have of open data and the<br />

requirements of added value services needed by citizens and<br />

companies.<br />

3.3.4. Support Elements<br />

Support elements include the legal and regulatory framework,<br />

business processes and technological components.<br />

Legal framework establishes determination and the institutional<br />

mandate not only to formulate an open data policy, but also to<br />

implement that policy across the government, including the legal<br />

mechanism that establishes the fundamental principles, rights and<br />

obligations related to open government data. It focuses on four<br />

pillars: access to and use of information; publication of<br />

information; responsibility for publication; and responsibility for<br />

access and use of information.<br />

Technological framework comprises: a conceptual view that<br />

illustrates the different functional modules; a logical view that<br />

identifies the principal components of the required software<br />

structured by means of a layered architecture in which the external<br />

resources, the integration components, the presentation<br />

components, the business logics and the transversal and support<br />

components are identified; and a deployment view that identifies<br />

the possible physical distribution of the technical infrastructure<br />

components and some non-functional requirements identified as<br />

quality attributes of the required platform.<br />

16<br />

For the correct operation of the proposed model, two activities to<br />

support initiative processes were created: release management, for<br />

accompaniment of the implementation, and support and<br />

maintenance, a process including management of the catalog data<br />

portal, plus the promotion and distribution of data dissemination<br />

and application development.<br />

3.4 Road Map<br />

The road map proposed for the implementation on the open data<br />

initiative in Colombia comprises an incremental strategy that is<br />

aligned with GEL maturity model [9]:<br />

The initial level refers to having the institutional conditions that<br />

are necessary to establish open data. At this level some public<br />

agencies start publishing their information inventory, best<br />

practices are shared and an intra-governmental community of<br />

open data advocates starts to be created.<br />

At the basic level, all data sets are prioritized, collaborative<br />

focused events are performed, and feedback from citizens and<br />

organizations start to be significant.<br />

At the advanced level, the open data process has moved beyond<br />

the simple fulfillment of baseline requirements. Impact<br />

measurement, quality assurance, collaboration platforms and<br />

massive collaborative events will be performed.<br />

The maximum level will be reached with continuous processes of<br />

innovation, transparency, and public/private cooperation.<br />

Sustainability of the best applications is reached, key performance<br />

indicators are monitored and the use of semantic components is<br />

achieved [1].<br />

3.5 User Guidelines<br />

A guide for public servants interested in easily acquiring open<br />

data knowledge and a toolkit were developed. It was structured in<br />

five stages of an ongoing process that guide them to publish data<br />

in open formats:<br />

o Identification of information: At this stage the identification<br />

and characterization of all the information held by entities is<br />

performed.<br />

o Analysis of publishable information: At this phase<br />

o<br />

information is classified by filtering what is publishable from<br />

what it is not, according to legal framework policies.<br />

Prioritization of data: This phase organizes the data that<br />

needs to be published according to a strategic analysis which<br />

generates the inventory and working plan of public data to be<br />

published.<br />

o Documentation: This phase fully describes data to be<br />

published, producing useful metadata to make it<br />

o<br />

understandable and easy to find and use.<br />

Structuring, upload and publishing: This phase performs the<br />

preparation of data in open formats, and the execution of<br />

ETL processes to load and release data on the technology<br />

platform for subsequent open access.<br />

3.6 Government data and application catalogs<br />

The primary tool for data supply is the Colombian Government<br />

data catalog prototype available at http://www.datos.gov.co, a<br />

web portal that allows citizens and enterprises to centralize search<br />

and access to all public data – illustrated in Figure 3. This<br />

platform meets two goals: 1) It should make it as easy as possible<br />

for citizens – especially developers—to discover interesting


datasets and to reuse them. 2) It should make it as easy as possible<br />

for government data stewards to make their datasets available for<br />

public consumption. As a pilot case study, nine datasets provided<br />

by national agencies including Transport, ICT and Education<br />

Ministries, Planning Department were identified and published.<br />

Data supply involved the development of a prototype of an online<br />

government operated clearinghouse for publishing third party<br />

applications using open government data, now available at<br />

http://ww.aplicaciones.gov.co. This tool allows third party agents<br />

(volunteers, civil society groups, government itself) to upload<br />

apps, and citizens to search and download apps that provide<br />

government services, using open published datasets.<br />

3.7 Legal Framework<br />

Definitions and actions associated with open data strategy in<br />

national regulations were absent and needed to be developed in<br />

order to implement the mandatory compliance of the model by<br />

public agencies in Colombia. In this sense the inclusion of a law,<br />

a draft decree and two manuals guiding public policy are being<br />

prepared.<br />

National Open Data<br />

Plataform<br />

Citizens<br />

Local and<br />

Thematic Open<br />

Data Platforms<br />

GEL Storage<br />

Datasets<br />

www.datos.gov.co<br />

National Open<br />

Data Catalog<br />

Data load website<br />

www.datosentidad.gov.co<br />

Federated<br />

Storage<br />

Datasets<br />

Federated<br />

Open Data<br />

Platform<br />

Agency Data<br />

Base National, thematic and local web sites<br />

Figure 3. Open Government data platform<br />

First, the draft "Law on Transparency and the Right to Access<br />

National Public Information" [9], included the enforcement for<br />

agencies to allow access to and use of public information, rules<br />

for information publication, accountability in the publication, and<br />

responsibility in access to and use of information.<br />

Second, the draft "Decree for establishing general guidelines<br />

for GEL strategy for the Republic of Colombia" [7],<br />

establishes the open data strategy as one of the priorities for the<br />

country, and identifies the rules for the disposal of information<br />

from public institutions to citizens, free of charge.<br />

Third, the matter of open data was incorporated into the<br />

guidelines contained in the "Manual for the Implementation of<br />

GEL strategy in Colombia" [8], as well as in the "Unique<br />

Manual of Accountability" [6], as mechanisms to promote<br />

openness, transparency and accountability in the Colombian<br />

Government.<br />

4. DISCUSSION & CONCLUSIONS<br />

Open data model developed by GEL provides a framework for<br />

data opening in a structured and organized manner, establishing<br />

balance and sustainability between supply and demand of data,<br />

and outlining a clear route for accomplishing a transparent,<br />

participative and collaborative strategy. Added value must be<br />

obtained from solutions that solve citizens’ needs and agencies<br />

required services for them.<br />

17<br />

At the moment, results from Colombian open government data<br />

initiative are still incipient. Complexity perceived by public<br />

agencies regarding the openness process is one of the main<br />

barriers for the model implementation. Agencies face diverse<br />

problems when trying to comply with the model. Those problems<br />

are mainly related to human behavior and fright to change: fear of<br />

losing control over data, lack of legal responsibility for<br />

publishing, and concern and distrust of third parties that would<br />

market or use the information to publish, summarize the main<br />

concerns.<br />

Currently GEL open data team is working on improving the<br />

technological platform, optimizing the existing instruments,<br />

defining the uptake model, setting the initial legal framework and<br />

developing training campaigns to disseminate the strategy.<br />

In the near future some actions need to be included in the work<br />

agenda: quick gathering of data to be published that can be easily<br />

identified, such as data from national research statistics, already<br />

published at web portals; engage citizens themselves in the<br />

decisions about what data to publish; creation of open channels<br />

for developers to provide information about the use and impact of<br />

the data; and the design of an environment that gives developers<br />

the flexibility to use a full range of software tools to manipulate,<br />

and to add value to, government information, among others.<br />

5. ACKNOWLEDGMENTS<br />

This research was performed in the framework of the Inter-<br />

Administrative Cooperation Agreement No. 308-2011, subscribed<br />

between “Fondo de Tecnologías de la Información - FONTIC and<br />

Centro de Investigación de las Telecomunicaciones – CINTEL”,<br />

with participation of “Everys Colombia” in its development.<br />

6. REFERENCES<br />

[1] Cantera Fonseca, J. M., Hierro Sureda, J. J. and Romo<br />

Zabala, P.A. Web semántica: Tecnologías y arquitectura.<br />

Revista Comunicaciones de Telefónica I+D. ISSN 1130-<br />

4693, Nº. 39, 2006, 211-221.<br />

[2] Corojan, A. and Campos, Eva. Gobierno abierto: alcance e<br />

implicaciones. Fundación Ideas. ISBN: 978-84-15018-73-5.<br />

2011.<br />

[3] Decreto 1151 de 2008. Ministerio de Comunicaciones de la<br />

República de Colombia. Diario Oficial No. 46.960 de 14 de<br />

abril de 2008.<br />

[4] Directiva Presidencial No. 02 de 2000: Gobierno en Línea<br />

del 28 de Agosto de 2008<br />

[5] Ley 1450 de 2011. Por la cual se expide el Plan Nacional de<br />

Desarrollo, 2010-2014. Congreso de la República de<br />

Colombia. Diario Oficial No. 48.102 de 16 de junio de 2011.<br />

[6] Manual Único de Rendición de Cuentas. Proyecto de ley<br />

estatutaria no. 133/11 cámara– Por la cual se desarrollan<br />

disposiciones para la promoción, protección y garantía del<br />

derecho a la participación ciudadana en Colombia<br />

[7] Proyecto de Decreto para establecer los lineamientos de la<br />

Estrategia Gobierno en Línea para la República de Colombia.<br />

2012.<br />

[8] Programa Agenda de Conectividad – Estrategia de Gobierno<br />

en línea. Manual 3.0 para la Implementación de la<br />

Estrategia de Gobierno en Línea en las entidades del orden<br />

nacional de la República de Colombia. Junio 2011.<br />

[9] Proyecto de Ley 156 de 2011 Senado, 228 de 2012 Cámara.<br />

Por medio de la cual se crea la ley de transparencia y del<br />

derecho de acceso a la información pública nacional y se<br />

dictan otras disposiciones. 2011.


Increasing Kenyan Open Data Consumption: A Design<br />

Thinking Approach<br />

Leonida N. Mutuku<br />

iHub Research<br />

Bishop Magua Centre, Ngong Road<br />

P.O. Box 58275 – 00200 Nairobi<br />

+254 732792987<br />

leo@ihub.co.ke<br />

ABSTRACT<br />

In July 2011, the Kenyan Government became the twenty-second<br />

government worldwide and the second in Africa to release many<br />

of its data sets in an open and reusable format on the Open Kenya<br />

portal. This open data portal has presented great opportunities to<br />

develop applications, especially on the mobile platform. There<br />

have been, however, challenges in engaging the technical and<br />

industry experts in conversations around the open data. We are<br />

conducting an ethnographic study on an experiment that brings<br />

together subject matter experts in the Water, Education,<br />

Transport, and Local County sectors, together with open data<br />

evangelists and software developers to guide them through a<br />

design thinking approach to identifying, idea-ting, and<br />

prototyping open data applications. The main objective of this<br />

study is to identify best practices in increasing open data<br />

consumption through scalable mass appeal mobilization and civic<br />

engagement tools and applications.<br />

Categories and Subject Descriptors<br />

A.1 [General Literature]: General – Conference Proceedings<br />

General Terms<br />

Documentation, Design<br />

Keywords<br />

Kenya, Open Data, Design Thinking, Ethnography<br />

1. INTRODUCTION<br />

Over the past couple of years, various governments and public<br />

institutions have launched numerous initiatives to make their data<br />

sets open. Open data is data that is freely accessible, easily<br />

redistributed and reused [8]. The US Government and the World<br />

Bank were among the first of these institutions to release, in 2009,<br />

numerous data sets in an open format for access by all.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

18<br />

Jessica Colaco<br />

iHub Research<br />

Bishop Magua Centre, Ngong Road<br />

P.O. Box 58275 – 00200 Nairobi<br />

+254 735203733<br />

jessica@ihub.co.ke<br />

Since then, we have seen more than 20 governments and other<br />

major institutions around the world release their data, in a bid to<br />

democratize this public information by making it accessible to all<br />

citizens; and to promote innovation of local solutions to socioeconomic<br />

development issues that afflict the respective countries<br />

[13]. By providing this public information to citizens, the<br />

governments empower them to query this data and in this way<br />

promote accountability, transparency and innovation in service<br />

delivery.<br />

2. THE KENYA OPEN DATA INITIATIVE<br />

In July 2011, the Kenyan Government became the twenty-second<br />

country worldwide and the second in Africa [16] to release many<br />

of its data sets in an open and reusable format on the Open Kenya<br />

[13] portal. The Vision given for this initiative is that “with the<br />

launch of Open Kenya, Africa will have its own story of<br />

promoting transparency through open data to celebrate, learn from<br />

and share” [13]. At the launch of the portal, there were over 400<br />

data sets released to the public in easily manipulated formats.<br />

2.1 Potential of the Open Data Initiative<br />

The Kenya Open Data Initiative enables Kenyans to interact with<br />

government data at different levels and use this information to<br />

engage [11] further with the government in accordance with the<br />

new Constitution’s provisions on access to information [14]. The<br />

government has released many more large data sets since the<br />

launch of the portal, ranging from national census data to statistics<br />

on government spending at national and county level [9].<br />

Various opportunities to develop applications that use the newly<br />

available open data as a basis to represent information have<br />

emerged. Over 90 dataset requests surfaced within the first month<br />

of the launch by developers and other stakeholders, which<br />

indicates a great interest to explore this data in meaningful ways<br />

and represent it visually, while providing useful insights into the<br />

information that lies within this data.<br />

This opportunity could be explored further in the mobile space to<br />

create mobile open data applications. With over 99% of users that<br />

access Internet in Kenya doing so through their mobile phones,<br />

[4] a much faster and more efficient tool to disseminate open data<br />

information to citizens may be through mobiles. It is therefore<br />

worth considering mobile applications as an important<br />

dissemination method of open data information [9].


Giving Kenya’s citizens greater access to government data<br />

enables communities to mobilize and demand better services<br />

based on evidence provided by open data. [1]<br />

2.2 Importance of Open Data to Governance<br />

Through continuous interaction and providing feedback on the<br />

platform and its data sets, in the long term, open data promotes<br />

not only transparency and accountability, but also democracy. As<br />

previously highlighted, improved service delivery will be<br />

promoted by the feedback loops that arise through frequent<br />

querying of the open data by both citizens and government<br />

agencies. For example, the resource allocations and government<br />

expenditures could be queried and insights obtained by analyzing<br />

the open data accessed. In this manner, open data will allow for a<br />

paradigm shift from a centralized governance model to a citizencentric<br />

governance model.<br />

The government realizes these important values of the open data<br />

platform and has been a strong advocate for the platform,<br />

evangelizing about its potential and benefits at various events and<br />

public functions. In return, many developers and journalists have<br />

embraced the Open Data Portal with a number of applications that<br />

query the database being developed. Examples of such<br />

applications include: Huduma [10], MsemaKweli [12],<br />

CountyScoreCard [5] and CDF Review [3]. Further, the<br />

government has promoted interaction with these data sets by<br />

providing grants of up to $30,000 for the development of<br />

applications based on open data. [6]<br />

The World Bank has also been instrumental in the education and<br />

awareness campaigns on the importance and opportunities of the<br />

open data portal by sending in their own open data evangelists and<br />

members of the finances’ open data team to officiate at boot<br />

camps with a focus on data journalism and open data<br />

visualization.<br />

Despite these numerous efforts, the potential of the open data<br />

portal has only barely been realized.<br />

3. OPEN DATA CONSUMPTION<br />

3.1 Open Data Evangelism<br />

The openness of the platform is subject to interpretation because,<br />

though the data sets are available online, this does not necessarily<br />

translate to the data being available to all Kenyan citizens. This is<br />

because currently, the data is only available on a web or mobilebased<br />

portal. Less-educated citizens may not be comfortable<br />

accessing information through the Internet or mobile phones.<br />

Alternatively, the less educated citizens may not be Englishliterate.<br />

These less educated citizens may be the users who have<br />

the most need for the open data information. Therefore, for the<br />

portal to be a success, citizens, end users, and beneficiaries must<br />

be made aware of what information lies on the data platform and<br />

its relevance and usefulness. This awareness can be raised through<br />

direct interpretation of the data on the portal, but perhaps more<br />

importantly, from easily-digestible information created by<br />

intermediary parties from analysis and visualization of the open<br />

data.<br />

These intermediary parties essentially interact directly with the<br />

platform creating applications based on the data. To reap<br />

maximum benefits from the open data sets, the applications<br />

19<br />

created must address real needs and not just be fancy visuals with<br />

no real value behind them.<br />

Despite the many efforts discussed above, there has been no real<br />

measurable engagement of industry and sector experts in these<br />

open data conversations to date. These are important stakeholders<br />

when it comes to formulate problem statements based on these<br />

data sets and advice on the solution development [2]. While<br />

software developers may create great visualization tools, great<br />

value is derived from their engagement with industry experts who<br />

together, will assist to build necessary service to serve the likes of<br />

those who will not readily accept or understand the data on the<br />

platform.<br />

Figure 1: How different stakeholders engage with<br />

opendata.go.ke<br />

There is a need to bridge the gap between those who can make<br />

sense of the data sets and interpret the seemingly random numbers<br />

to software developers, in a manner that can then be easily<br />

adapted and captured in innovative useful products and<br />

applications. This research aims to test the hypothesis that the<br />

realization of the full potential of open data will be achieved when<br />

easily interpretable open data products are made for the general<br />

public, the final end user of these data sets.<br />

3.2 Design Thinking Approach<br />

3.2.1 The Open Data Pre-Incubator<br />

We are currently carrying out this research study around a sixmonth<br />

experiment, a pre-incubator, which aims to accelerate the<br />

ability for the public to make sense of open data in order to<br />

increase their engagement around critical public issues: in the<br />

sectors of Water, Education, Transport, and Local Counties. The<br />

Pre-incubator experiment will test a model that will be put to use<br />

in a broader two-year Incubator effort, endorsed and supported by<br />

the highest levels of government, which will be led by public<br />

mobilization agents with support from the technological<br />

community.<br />

In this Pre-Incubator, four Open Data Fellows have been<br />

embedded in civil society and media organizations and are<br />

working to build an application or service or platform around key<br />

thematic issues. These host organizations and fellows are<br />

conducting a close consultation process with issue expert working<br />

groups who provide insight into specific use cases and technical


insight into available data resources. The specific outcomes of this<br />

experiment are the creation of analytical dashboards and data tool<br />

kits for knowledge professionals; and the creation of mass appeal<br />

mobilizations applications/platforms for civic engagement.<br />

The multi-stakeholder groups will then follow a Design Thinking<br />

approach to ideate the solutions and create meaningful and useful<br />

applications based on these insights from the data. This will be<br />

done in five steps, following concepts derived from the Stanford<br />

D. School Design Thinking methodologies [15], namely:<br />

o Empathizing - observing, engaging, and immersing the<br />

developers and subject matter experts together so as to<br />

understand the needs of the general citizens. This will take<br />

place in a workshop where there will be brainstorm sessions<br />

around four thematic areas: Water, Education, Transport and<br />

Local County Data.<br />

o Defining -Problem statements will be formulated by the<br />

fellows and the working groups formed. These problem<br />

statements will be based on the synthesis of the empathy<br />

findings in terms of compelling needs and insights, scoping<br />

specific and meaningful challenges to solve. This will take<br />

place in another workshop where a number of projects will<br />

be selected with which to proceed.<br />

o Idea-ting - This will be done around the numerous problem<br />

statements and go further into strengthening solutions for the<br />

selected projects. The idea-tion will be supported by a boot<br />

camp where an initial prototype will be designed to be built<br />

in selected teams. This event will also have a public outreach<br />

component to help educate researchers and the broader<br />

public about the use of open data.<br />

o Prototyping and testing - The actual prototyping will then<br />

follow where all the ideas generated are actualized as<br />

applications and technology services to address the problems<br />

identified to be solved using open data. This step will involve<br />

different levels of prototyping and showcasing demos of the<br />

published data applications.<br />

3.2.1.1 The Research Process<br />

The specific objectives of the research are to:<br />

1) Document the Open Data Outreach process in order for it to<br />

be replicable in other communities and countries<br />

2) Use evaluation mechanisms of the design thinking approach<br />

and the documentation to understand how to make the Open<br />

Data Outreach initiative sustainable and scalable.<br />

This research is being conducted as an intense study that involves<br />

active participation and observation in the entire process of ideation<br />

and development of the open data applications through the<br />

pre-incubator model. Specifically, the study is using ethnographic<br />

models in order to fully understand this pre-incubator model in the<br />

development of open data applications, and uncover new and<br />

consequential variables [7] to consider in the construction of the<br />

larger incubator model.<br />

This research includes an exploratory survey and initial literature<br />

review to help determine scope of the project and verifiable<br />

metrics for success to aid in this evaluation and analyze the<br />

replicability of the open data pre-incubation process so as to<br />

provide targeted recommendations for scaling up the initiative.<br />

These have been identified so far, at a high level, as the successful<br />

20<br />

development of open data applications that will be scaled in the<br />

region or continent of Africa; and the creation of an ecosystem at<br />

the grass root level (the communities) around open data, through<br />

the use of these applications.<br />

The research will continue to review the documentation of event<br />

<strong>proceedings</strong> and activities related to the process as well as<br />

qualitative research conducted through ethnographic observation<br />

and participatory approach, in-depth interviews and audience<br />

analysis.<br />

The documents of the process of building and running the open<br />

data pre-incubator will then be critically analyzed and used to<br />

deliver use cases and recommendations that can be used for<br />

actionable planning in a larger incubator model. This may call for<br />

a review strategy for sustaining such open data incubator model<br />

by analyzing successes, weaknesses, opportunities & challenges<br />

for making this data more ‘mainstream’.<br />

The findings will then be presented at the end of the experiment as<br />

use cases, recommendations, tool kits and a critical analysis of the<br />

process that can be used for actionable planning of a similar open<br />

data consumption product.<br />

Overall, the specific goals of the Pre-Incubator process are to<br />

create one app or service or platform that used at scale across<br />

Kenyan society and drastically increases the use of open data and<br />

the research will support this further by the recommendations<br />

delivered for a sustainable and scalable model.<br />

4. CONCLUSIONS<br />

This project will contribute in creating a knowledge community<br />

on this open data of experts and non-experts alike and spurring<br />

conversations around this open data. The research process will not<br />

only inform the underlying project, the pre-incubation model, but<br />

hopes to raise new questions on how further to promote<br />

engagement of the ordinary citizen with their government through<br />

the usage of other mass appeal applications. This research hopes<br />

to come up with an effective sustainable toolkit on how subject<br />

experts and developers can interact with the Open Kenya portal<br />

and in collaboration, build tools and services around the datasets<br />

that can benefit all citizens in spite of their literacy levels with<br />

regards to the platform.<br />

As we embrace new ideas of living, applications revolving around<br />

various sectors like Water, Education and Health will go a long<br />

way to assist the country in transitioning to more citizen<br />

engagement and efficient service delivery. Consequently, this will<br />

lead to identification of proper open data innovations that solve<br />

real problems within the society and essentially assist in achieving<br />

the objectives with regards to the release of open data.<br />

5. REFERENCES<br />

[1] Beeman, H. 2011. Uses for open data<br />

http://hadleybeeman.net/2011/01/26/uses-for-open-data/<br />

Accessed August 2012<br />

[2] Business Daily, Government portal must have the required<br />

impact, 2011<br />

http://www.businessdailyafrica.com/Opinion+++Analysis/G<br />

overnment+portal+must+have+the+required+impact/-<br />

/539548/1199730/-/10sesc1/-/index.html Accessed in April<br />

2012


[3] CDF Review website, http://cdfreview.on.co.ke/ Accessed in<br />

April 2012<br />

[4] CCK Quarterly Sector Statistics Report. 2012, 19<br />

http://www.cck.go.ke/resc/downloads/SECTOR_STATISTI<br />

CS_REPORT_Q1_11-12.pdf<br />

[5] CountyScoreCard website, http://countyscorecard.on.co.ke/<br />

Accessed in April 2012<br />

[6] Daily nation. Kenya frees Government data on the internet,<br />

2011. http://www.nation.co.ke/sports/-/1090/1196768/-<br />

/item/0/-/bdooo5z/-/index.html Accessed in April 2012<br />

[7] Genzuk M, PH.D. A Synthesis Of Ethnographic Research,<br />

Center for Multilingual, Multicultural Research, University<br />

of Southern California. 1999.<br />

[8] Halonen, A. Being Open About Data. Finnish Institute in<br />

London, London, 2012<br />

[9] Howard, A. Open government data to fuel Kenya's app<br />

economy, 2011,http://radar.oreilly.com/2011/07/open-kenyagovernment-data.html<br />

Accessed in April 2012<br />

[10] Huduma Website, http://huduma.info/ Accessed in April<br />

2012<br />

21<br />

[11] Madera, C. 2010 Solving Urban Challenges With Open Data<br />

http://americancity.org/daily/entry/solving-urban-challengeswith-open-data<br />

Accessed in August 2012<br />

[12] MsemaKweli website,<br />

http://msemakweli.ihub.co.ke/pages/home.php Accessed in<br />

April 2012<br />

[13] Open Kenya Portal. https://opendata.go.ke/ Accessed in<br />

April 2012<br />

[14] Rahemtulla, H., Kaplan, J., Gigler, B., Cluster, S., Kless, J.<br />

and Brigham, C. Open Data Kenya: Case Study of the<br />

Underlying Drivers, Principal Objectives and Evolution of<br />

One of the First Open Data Initiatives in Africa. Open<br />

Development Technology Alliance, 2011.<br />

[15] Stanford D. School, Design Thinking<br />

http://dschool.stanford.edu/use-our-methods/ , Accessed in<br />

April 2012<br />

[16] Were, D. Ushahidi Welcomes Kenya Open Data Initiative.<br />

http://blog.ushahidi.com/index.php/2011/07/12/ushahidiwelcomes-kenya-open-data-initiative/<br />

accessed in April 2011


New Perspectives for Electronic Government in Brazil:<br />

The Adoption of Open Government Data in National and<br />

Subnational Governments of Brazil<br />

Ricardo Matheus<br />

University of São Paulo<br />

ricardomatheus@gmail.com<br />

ABSTRACT<br />

The development of information and communication technologies<br />

(ICTs) enabled production of bases containing raw data which can<br />

be freely manipulated, filtered or being crossed to build new<br />

applications. These possibilities of using this raw data and its<br />

manipulation have been called Open Government Data (OGD).<br />

The aim of this paper is to present the State of Art of the Open<br />

Government Data in Brazilian National, State and Municipal<br />

governments. Some benefits that OGD have been promoted are:<br />

transparency promotion, and, improvements of social control and<br />

citizen participation. The methodology used is the literature<br />

review mainly about concepts of Open Government Data and<br />

three case studies about Brazilian governmental initiatives of<br />

OGD Portals. It was conducted an exploratory study of Brazilian<br />

initiatives National and Subnational governments that aims to<br />

verify the Brazilian level of OGD based on the eight principles of<br />

OGD and the five stars of open linked data, the last one was<br />

created by Tim Berners-Lee to measure the level of open data in<br />

websites. The final considerations reveal Brazilian initiatives<br />

adopt almost the entire principles of OGD. Further, the initiatives<br />

are in the third stage of a completely open linked data (three<br />

stars).<br />

Categories and Subject Descriptors<br />

J.1 [Computer Applications]: Administrative Data Processing –<br />

Government<br />

General Terms<br />

Management, Theory<br />

Keywords<br />

Electronic Government; Transparency; Social Control; Citizen<br />

Participation; Open Government Data<br />

1. INTRODUCTION<br />

Recently, the Information and communications technology (ICT)<br />

development have been bringing new possibilities for promotion<br />

of transparency and availability of public data, mainly through the<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Manuella Maia Ribeiro<br />

Fundação Getúlio Vargas<br />

maiamanuella@gmail.com<br />

22<br />

José Carlos Vaz<br />

University of São Paulo<br />

vaz@usp.br<br />

internet. Through ICTs the promotion of transparency has been<br />

increased because ICTs allowed an easier ambient to access data<br />

and information of public information from governments. The<br />

possibilities of using new technologies by governments to<br />

promote transparency, social control and citizen participation are<br />

constantly presented in the literature [1, 2, 3, 4, 5].<br />

The first phase of the transparency process of governments was<br />

governmental portals of transparency, where several kind of<br />

information, especially financial information, was published in<br />

zipped format. This kind of publication is characterized by the<br />

fact that it is the government who decides what and how it will be<br />

seen. This applies to the publication of financial reports or data<br />

non-interactively. A second phase is characterized by the<br />

possibility of performing custom queries to databases. Some<br />

interested parties could access government databases and interact<br />

with them. This implies they could order structured queries<br />

producing crossed researched of specific data or, at least allowing<br />

filtering databases in search of detailed information. For example,<br />

this applies to appointments to the financial implementation of the<br />

Union, States and Municipalities in Brazil [2, 6, 7, 8, 9].<br />

A new phase becomes possible more recently: the open<br />

government data (OGD). Afforded by the development of ICTs,<br />

OGD can go further publication of reports or queries to access the<br />

databases. It became possible to offer database in its raw state, to<br />

be freely manipulated, filtered or mixed with others, including<br />

allowing the construction of new knowledge and applications by<br />

civil society. Some of consequences of this new possibility of<br />

governmental transparency are social control and citizen<br />

participation through collaboration [10, 11, 12, 13, 14, 15, 16].<br />

However, the limits of them are not yet fully known. Neither its<br />

boundaries were fully exploited [17, 18, 19].<br />

Several new applications are emerging in some developed<br />

countries such as United States, New Zealand, United Kingdom<br />

and Australia, as well as movements on the part of organized<br />

sectors of society who are pressing for its implementation [11, 12,<br />

16, 17, 18]. The pioneering example is United States of America.<br />

The federal government created a level of openness of<br />

government information by creating unprecedented memo on<br />

transparency and open government requires that all actions of the<br />

ministries themselves were based on transparency, citizen<br />

participation and collaboration between government and society.<br />

In addition, the Ministry of Science and Technology created the<br />

Open Government Initiative ("Open Government Initiative") to<br />

effect the availability of open government data [20, 21].<br />

While civil society organizations have emerged around the world<br />

that pressure governments to open their data in open format. In<br />

according with [21], in the United States, the Sunlight Foundation,<br />

OMB Watch and the League of Women Voters have created a


movement to pressure for open government data and creating<br />

applications for society from these data. Thus, also received<br />

support from large organizations in the country as the Open<br />

Society Institute, the Omidyar Foundation and the Ford<br />

Foundation.<br />

Despite the limited knowledge available on the subject, it is<br />

possible to envisage the emergence of OGD is appearing in many<br />

countries of the world.<br />

This article will explore the state of the art of using OGD in<br />

Brazil. The methodology used was literature on subject of OGD<br />

and an exploratory study of some of the few experiences in Brazil.<br />

Due to its recent creation, websites that provide open data were<br />

not analyzed by its impacts, but only their potential for promoting<br />

transparency, social control and citizen participation by offering<br />

OGD.<br />

First, the paper presents a concept discussion about OGD. Then, it<br />

was chosen three Brazilians cases to analyze through two methods<br />

of analysis of Brazilian initiatives: the eight principles of OGD<br />

and the five stars of linked data ranking. The data collection<br />

occurred through structured inspection of these three OGD<br />

Portals.<br />

Regardless of open data might be considered in both the public<br />

and in private, this article, as a matter of focus, is only open to<br />

government data in government. Once the conceptual discussion,<br />

the article identifies some of the experiences of reference and uses<br />

them to make an exploratory reflection on the limits and<br />

possibilities of the OGD contribute in social struggle around the<br />

transparency practices and the relationship between government<br />

and civil society, because the data open not only relate to the<br />

dissemination of information but also to encourage new uses for<br />

the citizens of public data.<br />

2. LITERATURE REVIEW<br />

2.1 Open Government Data<br />

Open Government Data (OGD) is a term used to denote<br />

governmental information available via the Internet in the public<br />

domain for free use by society [17]. This concept refers to the<br />

protection of public data as belonging to the citizen, which should<br />

have unrestricted access to government information, advocated by<br />

several authors [22, 17, 23], among others. It also refers to the<br />

context of recent development of ICT, where the Internet,<br />

databases, tools, standards and open formats allow and facilitate<br />

the provision and access to this information.<br />

The idea of the OGD is developed from the discussion on open<br />

data engendered by Tim O'Reilly, owner of O'Reilly Media in<br />

mid-2007. In the same year, along with O’Reilly’s with others<br />

specialists joined by 30 supporters of open government to discuss<br />

OGD and its importance to democracy [24]. At this meeting of<br />

experts and advocates of OGD, it was developed the eight<br />

principles OGD. These principles state that the OGD should be:<br />

1) Complete: All public data is made available. Public data is<br />

data that is not subject to valid privacy, security or privilege<br />

limitations.<br />

2) Primary: Data is as collected at the source, with the highest<br />

possible level of granularity, not in aggregate or modified<br />

forms.<br />

3) Timely: Data is made available as quickly as necessary to<br />

preserve the value of the data.<br />

23<br />

4) Accessible: Data is available to the widest range of users for<br />

the widest range of purposes.<br />

5) Machine understandable: Data is reasonably structured to<br />

allow automated processing.<br />

6) Non-discriminatory: Data is available to anyone, with no<br />

requirement of registration.<br />

7) Non-proprietary: Data is available in a format over which no<br />

entity has exclusive control.<br />

8) License-free: Data is not subject to any copyright, patent,<br />

trademark or trade secret regulation. Reasonable privacy,<br />

security and privilege restrictions may be allowed.<br />

Civil society organizations are using these principles of<br />

governments to levy the availability of government information.<br />

[25] presented at an event in 2009, the three laws of open<br />

government data:<br />

1) A blog about the project;<br />

2) If data is not found and indexed on the web, it does not<br />

exist;<br />

3) If not already open and available in machine-understandable<br />

format, it cannot be exploited;<br />

4) If any legal provision does not allow its replication, it is<br />

useless.<br />

Benefits of adopting the OGD in the field of transparency and<br />

social control are, at least in theory, evident. The provision of<br />

OGD tends to contribute to the increased transparency of<br />

government, creating better opportunities for social control of<br />

government actions. However, given the relative newness of the<br />

topic, yet there have been no studies that show the whole of this<br />

possibility.<br />

A second category of benefits can also be addressed. It is the<br />

possibility of creating new information and applications from the<br />

open government data. In this case, transparency is not only<br />

encouraged, but also new services may originate from the<br />

interaction between government and society through the<br />

exploitation of OGD. These services can be generated through<br />

new ways of working collaboratively across the participatory<br />

government and private institution, since the concept of OGD<br />

avoids the vision of the citizen as a mere recipient of public<br />

information.<br />

The focus on the concept of citizen open government data is<br />

emphasized by [26], pointing the concept relates to an<br />

understanding that the way governments have their information<br />

available allows the intelligence collectively create better ways to<br />

work with them than the governments themselves could do. As an<br />

example, [26] says that “it would be possible to optimize<br />

resources in public administration, if they leach from the traffic<br />

data in urban open format”. Thus, citizens who would take care<br />

through the use of ICT to produce charts and graphs on traffic.<br />

To [23], "the provision of open government data allows<br />

information to be used in the manner and convenience of the<br />

person concerned so that they can be mixed and matched to add<br />

more value to the data." For this author, the purpose of the public<br />

information is made available under the rules of open data is<br />

overcome the limitations that exist for users of public information<br />

can easily find, access, understand and use the public data<br />

according to their interests and convenience [23].


Not without reason therefore that the World Wide Web<br />

Consortium (W3C), an international consortium that aims to<br />

develop Web standards, defines government data as open: the<br />

publication and dissemination of public sector information on the<br />

web , shared in raw format and open, understandable of course, to<br />

allow its reuse in digital applications developed by society [27]. In<br />

addition, the W3C considers that governments should encourage<br />

citizens to use the open data available by governments, ie, they<br />

should be encouraged to reuse the data according to their needs<br />

and wants. The [23] summarizes the purpose of this incentive:<br />

"There is value in providing open government data if the company<br />

has no interest in re-use them".<br />

Likewise, the Declaration on the Public Service Open Europe<br />

believes that public bodies must provide the government data: in<br />

open formats and reusable, public institutions should seek to act<br />

as a platform for building of public value. Public organizations<br />

should offer citizens the ability to solve problems for themselves<br />

by providing them the proper tools to do so [17]. Protection of<br />

open data as a promoter of transparency is due to the possibilities<br />

of making government records accessible to eliminating all<br />

restrictions concerning technology, accessibility and legislation to<br />

International Initiatives of Portals of Open Government Data<br />

Worldwide, activists, international organizations and governments<br />

are thinking about access to public information from the data<br />

open. Although the discussion on this topic is new, there are<br />

already some experience of government provision of open data.<br />

Several national and subnational governments now provide their<br />

data from the orientations of open government. Among the<br />

countries that have policies of open data include: United States,<br />

United Kingdom, Australia and New Zealand [26, 17]. These<br />

countries have developed national policies on access to public<br />

data and created web portals that provide public information in<br />

different formats. Moreover, they often encourage citizens to<br />

create new applications and ways of using information published<br />

in their portals.<br />

2.1.1 The Australian, New Zealand and United<br />

Kingdom Portals of Open Government Data<br />

The Australian government created the portal Data Australia in<br />

February 2010. The objective of the portal of transparency is to be<br />

the database of public information government of this country.<br />

They encourage us to use the information contained within the<br />

portal to create gadgets and computer programs by users who do<br />

social control of all information within the portal. The website of<br />

the New Zealand government was created this year to offer<br />

information and intelligence agencies and public bodies of<br />

government. It has space for discussion through forums that may<br />

be proposed by citizens.<br />

The example of the United Kingdom intends to offer data and<br />

information to citizens in public administration for the expansion<br />

of government social control. It has space for the wiki, online<br />

community, and sends in new web applications, among others. In<br />

2008, Britain ceded public information to a competition to<br />

develop solutions to public data named Show us a better way.<br />

2.1.2 The United States Portal of Open Government<br />

Data<br />

The flagship plan for adoption of open data is the U.S. Initiatives<br />

in this country can also be found in the sub-national governments.<br />

According to [26], Washington DC was one of the pioneers in<br />

developing the incentive to collaborative work between<br />

24<br />

government and society with public data. President Obama early<br />

in the mandate, set policies for the promotion of transparency that<br />

encourages the provision of government data in open format.<br />

The memo sent by the president on January 21, 2009 to all heads<br />

of government called the Federal Transparency and Open<br />

Government. This memo pledged to create "unprecedented levels<br />

of openness" in government. The president called the<br />

representatives of the executive to work to ensure trust and<br />

establish a system of transparency, public participation and<br />

collaboration. The opening will strengthen democracy and will<br />

promote efficiency and effectiveness to government "[20, 26].<br />

The Open Government Initiative policy aimed to guarantee the<br />

realization of this memo. Among its actions, is the portal<br />

Data.gov, created in May 2009. The aim of Data.gov, portal<br />

transparency of the federal government is offering information<br />

and expand the creative use of government data through web<br />

applications, encouraging innovative ideas to provide greater<br />

transparency of governmental actions. The site contains<br />

information about hundreds of government agencies and offices<br />

separated by organ. Statistics tell visitors monthly, daily, yearly. It<br />

also has space for participation of citizens wishing to express their<br />

will.<br />

2.1.3 Private Portals of Open Government Data<br />

Besides the government experiences, there are already nongovernmental<br />

organizations that seek to promote and support the<br />

adoption of open data policy. For example, the Sunlight<br />

Foundation and Project Open Government Data, Access the Open<br />

Knowledge Foundation Info. These experiences advocate in favor<br />

of adopting the policy of open data by governments and perform a<br />

variety of activities from research to encourage the creation of<br />

solutions and standards for open formats. In short, despite the<br />

recent discussion of existence and availability of open government<br />

data, there are already examples of governments that adopt this<br />

theory as a public policy to promote transparency and<br />

collaboration between government and society.<br />

2.2 How to Measure the Level of OGD in<br />

Governmental Portals?<br />

One of the methods to measure the level of OGD in governmental<br />

Portals was created by Tim Berners-Lee. It was denominated the<br />

five stars of open linked data [27].<br />

Actually, this method was created to “(…) categorise the<br />

publication of open data on the Web in levels of increasing<br />

usefulness, that encapsulate the present shared vision of the<br />

Semantic Web as a Web of Linked Open Data, and that<br />

individuals can use to rate their own data publication” [27].<br />

It was divided in five categories [28]:<br />

1) One star: available on the web (whatever format) but with an<br />

open licence, to be open data.<br />

2) Two stars: available as machine- readable structured data<br />

(e.g. excel instead of image scan of a table).<br />

3) Three stars: as (2) plus non proprietary format (e. g. CSV<br />

instead of excel).<br />

4) Four star: all the above plus, use of open standards from<br />

W3C (RDF or SPARQL) to identify things, so that people<br />

can point at your stuff.<br />

5) Five stars: all the above, plus: link your data to other<br />

people’s data to provide context.


3. RESEARCH APPROACH<br />

The objective of this article is to present the State of Art of the<br />

OGD in Brazilian National and Subnational governments. To<br />

achieve this goal, firstly, it was done a literature review that<br />

guided this study focused on the key concept: Open Government<br />

Data (OGD) and its main examples in governments (United<br />

States, Australia, United Kingdon and New Zealand) and entities<br />

that promote OGD (Sunlight Foundation and Open Knowledge<br />

Foundation). This allowed us to highlight the possibilities that, in<br />

theory, the DGA can offer as tools for promoting transparency,<br />

social control, and reuse by civil society, among others. However,<br />

the virtually nonexistent literature on DGA in Brazil has required<br />

an exploratory study to identify the initiatives already undertaken<br />

by governments.<br />

It was decided to perform preliminary research from experts and<br />

publicity materials on the Internet, which identified experiences<br />

promoted by the federal, state and municipal governments. After<br />

identifying the set of experiences available, it was decided to<br />

carry out structured visits to the following government websites<br />

that publish open government data (one from each level of<br />

government): DadosGov Project (Federal Government),Open<br />

Government SP (Government of the State of São Paulo) and São<br />

Paulo City Council (Municipal level).<br />

Other initiatives were found such as the portal of the State of<br />

Ceará Municipalities Court of Audits (TCM-CE) and the Public<br />

Security Secretariat of Rio Grande do Sul State. These two<br />

initiatives it was not chosen to a further analysis because they are<br />

isolated experiences in their states. We were looked for initiatives<br />

such as portals and initiatives from Executive or Legislative.<br />

In Brazil there is still no transparency portal experience that is<br />

associated totally with a central policy of open government data<br />

available [26, 17, 23]. In general, cases in Brazil are far short of<br />

international experiences, such as the United States and United<br />

Kingdom. Therefore, the availability of open government data in<br />

Brazil does not have a systematic policy as the United States.<br />

Nevertheless, there are individual experiments and partial<br />

availability of public data by some government agencies and<br />

specific laws that encourage the adoption of open data by<br />

governments.<br />

The objectives of the structured inspections in these three<br />

initiatives were to verify that the Brazilian OGD Portals achieve<br />

the eight principles of OGD and the five stars of open linked data<br />

presented above in the literature review.<br />

A series of structured inspections on these websites was done<br />

between 02/08/2012 e 04/01/2012. Data collected were used to<br />

assess how the eight principles of open government data proposed<br />

by [24] and the five stars of open linked data are presented in<br />

these cases. The exploratory study was conducted because the<br />

cases we found are recent experiences, once OGD are a very<br />

recent issue in Brazil. Therefore, there was no way to make an<br />

analysis of its impacts yet.<br />

Thus, the steps of this research were:<br />

1) An exploratory research of Brazilian governmental initiatives<br />

of OGD through Internet search;<br />

2) Definition of the studies cases. The conditions were:<br />

different levels of governments, preferably of Executive or<br />

Legislative and preferably portals.<br />

3) Structured inspections in these cases to find how many<br />

principles of OGD and stars they have.<br />

25<br />

4) Defining the results and State of Art in Brazilian OGD.<br />

4. RESULTS OF THE EIGHT PRINCIPLES<br />

4.1 Open Government Data in Brazilian<br />

Federal Government<br />

In December 2010, the federal government launched the first site<br />

that aims to provide public data on this being an open format. The<br />

Brazilian Portal of OGD was denominated DadosGov<br />

(http://beta.dados.gov.br/). The project was developed by<br />

Information Organizing Committee from the Presidency of the<br />

Republic (IOC-PR) which consists of the following Federal<br />

Government agencies: Office of Deputy Information for Decision<br />

Support, President's Chief of Staff, Institutional Relations<br />

Secretariat (SRI-PR), Department of Logistics and Information<br />

Technology , and two federal government-owned IT companies<br />

that provide services to government.<br />

The aim of this website is to organize and make available to the<br />

President, general government agencies and society governmental<br />

information, a reliable and easily accessible. For this, DadosGov<br />

website is structured to provide data in open format to be taken by<br />

anyone interested. The data come from federal government<br />

agencies, ministries and other public organizations. The table<br />

below shows the main government agencies that provided data to<br />

the project:<br />

Table 1. Main data provided by DadosGov Project<br />

Government<br />

Organization<br />

Ministry of<br />

Education<br />

(MEC)<br />

Ministry of<br />

Social Welfare<br />

(MPS)<br />

Ministry of<br />

Agrarian<br />

Development<br />

(MDA)<br />

Ministry of<br />

Justice<br />

(MJ)<br />

Ministry of<br />

Agriculture<br />

(MAPA)<br />

Time<br />

Series<br />

252<br />

132<br />

131<br />

127<br />

110<br />

Examples of content<br />

Childhood Education, School<br />

Health Program, University<br />

Scholarships (PROUNI), Student<br />

Loans Fund for Higher<br />

Education (FIES), among others.<br />

Ministry branches.<br />

Rural microcredit, Family Farm<br />

Insurance, among others.<br />

Services to women victims of<br />

domestic violence, Amnesty<br />

Commission deliberations,<br />

among others.<br />

Contracts for urban food<br />

suppliyng.<br />

Source: DADOSGOV Project (2012)<br />

DadosGov portal like the site of the U.S. federal government,<br />

cataloging data that were already available in public bodies, but<br />

were not systematized in a single portal and open format. Over 30<br />

agencies have provided historical series of public information for<br />

use of both governments and citizens. Among the sites studied is<br />

the one that provides more information. Due to the large amount<br />

of data available was not possible to verify that all data presented<br />

were the raw data.<br />

Data are presented usually by historical series that can be<br />

analyzed by the user via graphics, tables or records. Extractions of<br />

the series are in the following formats: CSV, RTF, PDF, XLS, and<br />

XML.


Another principle adopted by this site is that user identification is<br />

not required for data extraction. Although there is no space on site<br />

to discuss applications and other uses of the available information,<br />

there is an incentive for citizens to use these: "The idea of linked<br />

data formats is to allow civil society to development tools able to<br />

read data supplied by the government and make comparisons and<br />

analysis" [31]. Regarding to license to use the data, the site is not<br />

clear what are the chances of reproduction and use of information<br />

available.<br />

In 2010, federal government, through the Secretariat of Logistics<br />

and Information Technology of the Ministry of Planning has<br />

initiated a project to create the Open Data National Infrastructure<br />

(ODNI). The initiative focuses on interoperability and<br />

standardization of information resources. It also intends to<br />

promote best practices for the provision of open government data.<br />

It is defined as an "integrated set of technologies, policies,<br />

procedures and mechanisms for coordination and monitoring,<br />

standards and agreements necessary to facilitate the storage,<br />

access, sharing, dissemination and use of open data" [31].<br />

Factors that motivated the ODNI launching were difficulties for<br />

searching, accessing and reusing government data, both for the<br />

society and the government itself. The initiative seeks to support<br />

demands of changes in relationship between government and<br />

society, promoting transparency, control of government by<br />

citizens and citizen participation in policymaking. The ODNI will<br />

use existing experiences in the dissemination of public data<br />

available in the federal government as a starting point, including<br />

some isolated actions in federal agencies and two centralized<br />

operations of the federal government: the aforementioned<br />

DadosGov portal and federal government's Transparency Portal<br />

(http://www.portaltransparencia.gov.br/).<br />

ODNI's staff points out as a challenge to the success of the<br />

initiative the federal agencies involvement and a successful<br />

consensus around a single set of concepts. Implementation<br />

strategy for ODNI has some main elements: launching a virtual<br />

community for collaborative work involving officials of various<br />

public agencies, scripts and roadmaps for publishing open data,<br />

voluntary membership by various public agencies, technical<br />

training of civil servants in ontology modeling and<br />

implementation of a pilot project on public procurement.<br />

Portal was based on the availability of summary information and<br />

statistical series in a single location on the Internet. ODNI means<br />

a step forward from the experience of DadosGov. The ODNI's<br />

proposal takes a different approach: to create conditions for the<br />

various agencies to make available their data in a decentralized<br />

way. With this, ODNI will provide integrated data with a high<br />

level of interoperability through technologies such as Linked<br />

Data,. This strategy will make ODNI able to foster the opening of<br />

a much larger volume of data.<br />

A beta version was launched in the beginning of 2012. This<br />

version was done by civil servants and hackativists. One of the<br />

goals of creating this new portal is to guarantee the commitment<br />

proposed in the Open Government Partnership (OGP), a global<br />

effort to make governments better through open government.<br />

4.2 Open Government Data in Brazilian State<br />

Government<br />

The São Paulo State Government Portal created SP Open<br />

Government portal in 2010. Its goal is to make available to civil<br />

society, via the Internet, copies of databases and information<br />

which is not confidential and gives unrestricted access to the<br />

26<br />

organs and entities of the State Public Administration. The decree<br />

that created the portal provides the rules of data and creation of<br />

the portal, summarized in its second article:<br />

o Rules of provision, information, guidance and providing<br />

access to databases, as well as to the responsibilities of the<br />

parties.<br />

o Conditions of use of these bases provided, supposed to be<br />

free for any purpose or activity, safeguarding the legal<br />

restrictions and associated regulations.<br />

o Register of available bases, containing the identification and<br />

detailed description of each one and identify the agency or<br />

entity responsible.<br />

o Tools to facilitate collaboration between users of the<br />

available databases, including self-identification for who<br />

obtains a copy of available basis, including information of<br />

purpose for which the base was required; and registration and<br />

publication of products generated through the use of bases,<br />

identifying their authors.<br />

The São Paulo law falls largely to the principles of open<br />

government data to ensure the free reuse of all available nonsensitive<br />

state data. The Open Government SP portal was released<br />

in January 2011. The website seeks to stimulate launching of new<br />

electronic services, promoting transparency and improving the<br />

quality of information of interest to society by providing updated<br />

copies of their public databases, on a free and open basis, using<br />

the Internet. Databases provided are produced by the State<br />

Statistical Agency (SEADE Foundation), which has most state<br />

social and economic indicators, the Department of Treasury and<br />

the Court of Auditors. However, the website does not provide data<br />

from other agencies in São Paulo, i.e. not all data are available on<br />

site. Among the information available are: Elections (information<br />

concerning the elections in São Paulo between 1998 and 2008);<br />

state indicators (Sao Paulo State Social Responsibility Index -<br />

IPRS), catalogue of public services offered through the Internet;<br />

Information from municipalities. Unlike other sites, rules<br />

regarding use and availability of data are clear. All data available<br />

on the site are non-sensitive and have unrestricted access. The<br />

only requirements are that users accept the rules set out in this.<br />

Registration is optional for accessing the data. Developers can<br />

register applications built within the portal itself. However, for<br />

sending and accessing applications created registering is<br />

mandatory.<br />

4.3 Open Government Data in Municipal<br />

Level<br />

The São Paulo City Council Portal has a space to present the<br />

project “Open Data Parliament Program”. The project was created<br />

with the purpose of making databases and non-confidential<br />

information in electronic open format, in accordance with the<br />

principles of public administration and observance of<br />

internationally accepted recommendations, such as those<br />

presented by the Open Knowledge Foundation and the<br />

International World Wide Web Consortium (W3C).<br />

The idea of a OGD Portal in the São Paulo Parliament was<br />

defined after the seminar “The Era of Open Data” in October<br />

2011, conducted by the São Paulo City Council.<br />

The Portals presents:<br />

1) International manuals of OGD such as the Open Data<br />

Handbook [29].


2) An explanation about how civil society can open and read<br />

archive in open format;<br />

3) A blog about the project;<br />

4) Some City Council data in open format.<br />

The open data presented in the website is: a) Presence of<br />

councilors at ordinary and extraordinary plenary sessions; b) Vote<br />

of councilors in ordinary and extraordinary plenary sessions; c)<br />

Budget of the Municipality of São Paulo in 2011; d) Budget<br />

allocations from the Municipal Education in 2011; e) Ratio of<br />

employees (updated monthly); f) Budget Execution of the<br />

Municipality of São Paulo (since January 2010);g) Monthly<br />

Balance of Performance Budget Revenues - Direct<br />

Administration; and, h) Historical Series of the benefits of Aid<br />

Accounts-General Charges In Office.<br />

The data presented in this Portal are few in relation to all<br />

information that has a City Council. But it is a primary and timely<br />

data. They use mainly XML format. Despite claiming that they<br />

follow the recommendations of international organizations, it is<br />

not clear what are the licenses used. They also do not have a<br />

space to present applications that use their data. The following<br />

table summarizes how open government data principles of are<br />

adopted by the Brazilian experiences:<br />

Table 2. OGD principles adoption in Brazilian cases<br />

Principles<br />

Dados<br />

Gov<br />

Governo<br />

Aberto SP<br />

São Paulo<br />

City<br />

Council<br />

No<br />

Complete<br />

Data<br />

No No<br />

Primary<br />

Data<br />

No No<br />

X<br />

Timely<br />

Data<br />

X X<br />

X<br />

Accessible<br />

Data<br />

X X<br />

X<br />

Machine<br />

understandable<br />

X X<br />

X<br />

Non<br />

Discriminatory<br />

X X<br />

X<br />

Non<br />

Proprietary<br />

X X<br />

X<br />

Free License X X<br />

Info not<br />

provided<br />

Source: Created by authors from cases website<br />

Therefore, when we compare these cases and the principles of<br />

open government data, we can realize that most of the principles<br />

are used in the examples of Brazil. Data are not complete and<br />

most are not primary. However, there was still little information<br />

available. There is also lack of clarity about the license of the data<br />

presented in the case of São Paulo City Council.<br />

A positive point is that they all have current data, accessible and<br />

understandable by machines. Furthermore, it is not necessary a<br />

register to data access.<br />

27<br />

5. OGD in Brazil and the Five Stars of Open<br />

Linked Data<br />

In the case of Tim Berners-Lee method, the Brazilian cases are in<br />

the following phase:<br />

1) One Star: the first stage requires that the website contains<br />

data available independently of the format, but with an open<br />

license. All the cases studies presented data available and an<br />

open license. For example, Dados Gov from Federal<br />

Government uses Creative Commons License. We found<br />

three problems to guarantee the excellence of the first stage<br />

in Brazilian initiatives: a) There are few data presented in<br />

these Open Data Portals in relation to public data that<br />

governments have; b) São Paulo City Council does not<br />

explain clearly what open license they use; and c) DadosGov<br />

has some data that is not open license.<br />

2) Two Stars: All portals presented data available as machinereadable<br />

structured data.<br />

3) Three Stars: The Portals use mainly non-proprietary archives<br />

such as XML, CSV and HTML, so, they achieved the third<br />

stage.<br />

Unfortunately, it was not found the four and five stars. To achieve<br />

these stars, the governmental portals have to: i)Use URIs, so<br />

people can point at their stuff, and; ii) Link their data to other data<br />

to provide context.<br />

6. FINAL CONSIDERATIONS<br />

The emergence of the OGD requires a shift in thinking about the<br />

transparency of governmental actions and information. This need<br />

is not just theoretical. The very practice of social actors involved<br />

is creating new demands for transparency, not served by<br />

traditional practices in electronic government.<br />

There is a major change in the principles that guide the handling<br />

of demands for transparency. So far, everything that was not<br />

confidential should be made available to the public upon request,<br />

or kept available as possible. The new framework gives rise to a<br />

new level of demand for transparency: everything that is not<br />

confidential should be available on the internet as open data in a<br />

way people cannot just access data, but also create new services<br />

and analysis with these open data.<br />

Logically, implementing broader OGD programs will face huge<br />

barriers, because most governments wouldn't be mobilized to<br />

increase the level of social control over them. However, the<br />

complexity of the issue makes it impossible to reduce it only to<br />

the interest of governments in promoting transparency through the<br />

OGD. Civil society has an important role, too.<br />

In addition, comprehensive programs to spread open government<br />

data require using data formats and technologies are not always<br />

employed by governments themselves. Therefore it will be a<br />

difficult task even for well-intentioned governments and surely<br />

will took many years to reach a high level of open government<br />

data availability.<br />

According to [17] technology already exists for governments and<br />

civil society to use government data as they decide. Available<br />

technology can support new ways and new indicators of thinking<br />

about public administration. In this way, civil society could<br />

generate more innovation from unrestricted access to public data.<br />

For these authors, the development of open government data<br />

depends on: a clear policy of the Administration in regard to


access to public information, changes in public sector strategies<br />

aiming to foster transformation of relations between state and<br />

society. Moreover, it depends on a change in the central locus of<br />

public organizations as interpreters of social needs” and also as<br />

service delivery agents [17].<br />

[30] argues that to achieve the goal of providing open government<br />

records should be observed three fronts:<br />

o Map of Youth and Adults School (EJA): map showing the<br />

openings of adult education in public schools in Brazil;<br />

o Tr3e: website that crosses over the information of<br />

deforestation in Brazil;<br />

o Open Parliament: website designed to facilitate access to<br />

information about MPs in Brazil.<br />

These civil society initiatives demonstrate how the issue is<br />

increasingly taking up space on the agenda of organizations and<br />

groups interested in using IT to promote democratic developments<br />

in Brazil. Taken together with the emergence of new government<br />

initiatives, these initiatives show a clear sign of an expanding<br />

supply of OGD in the coming years.<br />

Despite the existence of few theoretical and empirical data on<br />

open government in Brazil, there is a clear expansion of national<br />

experiences and discussions.<br />

If we take the experience of Transparency Portal of the federal<br />

government as a reference, it can be said that the ODNI has great<br />

potential to accelerate the adoption of open government data<br />

initiatives in the country. Its impact should go beyond the limits of<br />

the Federal Government and stimulate initiatives at the<br />

subnational level, by giving greater visibility to the idea of the<br />

OGD, and by offering standards and roadmaps that may be<br />

adopted by states and municipalities.<br />

Besides the few public sites that adopt the open government data,<br />

there is a law that deals with open data in known Freedom<br />

Information Act, which regulate access to government<br />

information as provided in the Constitution.<br />

The Brazilian law on transparency emphasizes the information<br />

technologies and communication (ICTS), in particular the<br />

Internet, encouraging and requiring public organizations to make<br />

the information on the World Wide Web. The internet is regarded<br />

as a means of easy access and opportunities to reach a large<br />

number of people.<br />

Among the required data are public expenditures and the general<br />

data for the monitoring of programs, activities, projects and public<br />

works. There is an obligation of public agencies not only to<br />

disclose such information, but also make them available so that<br />

they are easily accessed, understood and updated.<br />

Open government means that public data should be disclosed in<br />

the most disaggregated level possible and in different formats.<br />

Disclosure must attain the raw data which should be able to be<br />

viewed on any type of machine for anyone who want to make use<br />

of such data. Thus, the law has principles of open government<br />

(even if not explicitly quote) for the dissemination of public<br />

information.<br />

Future additional studies would be useful for better understanding<br />

demands for OGD and evaluate impacts of present and new cases<br />

of OGD to promote transparency, social control and citizen<br />

participation. In future studies, it would be also important to check<br />

what are the challenges of Brazilian governments to achieve the<br />

five stars.<br />

28<br />

7. REFERENCES<br />

[1] Ribeiro, Manuella Maia. Transparency on the portals of<br />

Federal Government: The cases of Comprasnet and portal of<br />

transparency. University of São Paulo (USP), 2009.<br />

[2] Pinho, José Antonio Gomes. Investigating states portals of<br />

electronic government in Brazil: Lots of technology, poor<br />

Democracy. Journal Public Administration (RAP), 42 (3):<br />

471-93, MAY/JUN. 2008.<br />

[3] Welp, Yanina. Democracy and the digital divide in Latin<br />

America. International Conference of Direct Democracy in<br />

Latin America, 14-15.MAR. 2007.<br />

[4] Prado, Otávio & Loureiro, Maria Rita. Electronic<br />

Government and transparency: evaluation of advertising the<br />

public accounts of the Brazilian capitals. Reach Magazine,<br />

vol.13, n.3, p. 355-372, SEP/DEC 2006.<br />

[5] Vaz, José Carlos. Prospects and challenges for the expansion<br />

of electronic government in the municipalities. International<br />

Seminar on Electronic Government and Local Governments.<br />

Brasília, 2003.<br />

[6] Ferrer, F. & Borges, Z.. Electronic government:<br />

transparency, efficiency and inclusion. In: E-gov.br: the next<br />

revolution in Brazil: efficiency, quality and democracy:<br />

electronic government in Brazil and abroad. Prentice Hall.<br />

2004.<br />

[7] Ruediger, Marco Aurelio. Electronic Government and<br />

Electronic Governance - Alternative Concepts in the Use of<br />

Information Technologies for Providing Access to<br />

mechanisms of Civic Government and State Reform. Contest<br />

XVI Ensayos y Monografías del CLAD Reforma del Estado y<br />

on Modernización de la Administración Pública "Electronic<br />

Government”. Caracas, 2002.<br />

[8] Diniz, Eduardo Henrique et al. Electronic government in<br />

Brazil: a historical perspective from a structured model of<br />

analysis. Journal Public Administration (RAP). 43( 1):23-48,<br />

JAN./FEB. 2009.<br />

[9] Mello, Gilmar Ribeiro de & Slomski, Valmor. Electronic<br />

Governance Index of Brazilian States : Within The<br />

Executive Branch. JISTEM J.Inf.Syst. Technol. Manag.<br />

(Online) [online]. 2010, vol.7, n.2, pp. 375-408. ISSN 1807-<br />

1775.<br />

[10] Yildiz, Mete. E-government research: Reviewing the<br />

literature, limitations, and ways forward. Government<br />

Information Quarterly. Volume 24, Issue 3, July 2007.<br />

[11] Althrop D. & Ruma, L. Open Government: Collaboration,<br />

Transparency, and Participation in Practice. O’Reilly Media.<br />

P11-39. 2010.<br />

[12] Nam, Taewoo. New Ends, New Means, but Old Attitudes:<br />

Citizens’ Views on Open Government and Government 2.0.<br />

Proceedings of the 44 th Hawaii International Conference on<br />

System Sciences. 2011.<br />

[13] Parks, W.. The open government principle: Applying the<br />

right to know under the constitution. The George Washington<br />

Law Review. 26(1), 1-22, 1957.<br />

[14] Parycek, P. & Sachs, M. Open Government: Information<br />

flow in Web 2.0. European Journal of ePractice. 9(1), 59-70.<br />

2009.


[15] Robinson, David, Yu, Harlan, Zeller, William P. & Felten,<br />

Edward W.. Government Data and the invisible hand. Yale<br />

Journal of Law and technology, 160. 2008.<br />

[16] Sheridan, John & Tennison, Jeni. Linkin UK Government<br />

Data. LDOW 2010, April 27, 2010, Raleigh, North Carolina.<br />

2010.<br />

[17] Agune, Roberto Meizi; Gregorio Filho, Alvaro Santos &<br />

Bolliger, Sergio Pinto. Open government SP: provision of<br />

databases and information in an open format. III Congress<br />

Consad of Public Management, 2010.<br />

[18] Vaz, J. C., Matheus, R. & Ribeiro, M. M.. Open government<br />

data and its impact on the concepts and practices of<br />

transparency in Brazil. Cadernos PPG-AU/FAUFBA, 2010.<br />

[19] Torkington, N.. Rethinking Open Data - O'Reilly Radar.<br />

O'Reilly Radar. 2010.<br />

[20] Obama, B., Memo from President Obama on Transparency<br />

and Open Government. In D. Lathrop & L. Ruma, eds. Open<br />

Government.<br />

http://www.whitehouse.gov/open/documents/opengovernment-directive.<br />

2010.<br />

[21] Fung, A. & Weil, D.. Open Government and Open Society.<br />

In: Open Government: Collaboration, Transparency, and<br />

Participation in Practice. O'Reilly Media. 2010.<br />

[22] Laporte, T.; Demchak, C., Friis, C.. Webbing governance:<br />

national differences in constructing the face of public<br />

29<br />

organizations. In: GARSON, G. Handbook of public<br />

information systems. Marcel Dekker Publishers. 2000.<br />

[23] Diniz, Vagner. How to achieve open government data. In III<br />

Congress Consad of Public Management, 2010.<br />

[24] Open Gov Data. Eight principles of open government data.<br />

http://resource.org/8_principles.html. 2010.<br />

[25] Eaves, David. The three laws of open government.<br />

http://eaves.ca/. 2010<br />

[26] Silva, Daniela Bezerra. Transparency in public<br />

interconnected. College Casper Libero, 2010.<br />

[27] Berners-Lee, Tim. Linked Data.<br />

http://www.w3.org/DesignIssues/LinkedData.html. 2011.<br />

[28] Shotton, David. The five stars of online journal articles – a<br />

framework for article evaluation.<br />

http://www.dlib.org/dlib/january12/shotton/01shotton.html.<br />

2012.<br />

[29] Open Data Handbook. http://opendatahandbook.org/. 2011.<br />

[30] World Wide Web Consortium (W3C).<br />

http://www.w3c.br/divulgacao/. 2010.<br />

[31] Miranda, C. & Silva, N. National Infrastructure Open Data.<br />

www.w3c.br/conferenciaegov/05_ODNI_Christian_Nitai.pdf<br />

. Brasília. 2010


Open Government 2.0: Citizen Empowerment through<br />

Open Data, Web and Mobile Apps<br />

Rodrigo Sandoval-Almazan<br />

Universidad Autonoma del Estado<br />

de México<br />

rsandovala@uaemex.mx<br />

J. Ramon Gil-Garcia<br />

Centro de Investigación y Docencia<br />

Económicas<br />

joseramon.gil@cide.edu<br />

ABSTRACT<br />

Although the open government concept is not new, current trends<br />

in open government imply a change in focus from the traditional<br />

principle of accountability to a concept of citizen empowerment,<br />

collaboration and information sharing. In this paper, we explore<br />

the use of open data and mobile apps in the top countries<br />

according to the UN 2010 e-Government Survey. Our exploration<br />

suggests that, although not all countries yet offer mobile apps to<br />

their citizens, there is a great diversity of apps to create citizen<br />

value. Moreover, private companies and citizens are getting<br />

involved in the creation of such apps. More research is needed to<br />

understand ways to promote the development of this kind of<br />

government applications.<br />

Categories and Subject Descriptors<br />

Design, performance, human factors<br />

General Terms<br />

Performance, Design, Human Factors<br />

Keywords<br />

Government apps, apps, mobile apps<br />

1. INTRODUCTION<br />

During the last years, governments around the world have<br />

emphasized the need of a more open and transparent government<br />

[1]. Although the idea of freedom of information and open<br />

government can be traced back to the 50s[2], the principle has<br />

been invigorated with the Open Government initiative from the<br />

Obama administration. Moreover, the traditional focus for open<br />

government was accountability, while current efforts are<br />

emphasizing on information sharing and citizen empowerment<br />

[3]. In fact, the US government has made available about 390,000<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Luis F. Luna-Reyes<br />

Universidad de las Américas-Puebla<br />

luisf.luna@udlap.mx<br />

Dolores E. Luna<br />

Universidad de las Américas-Puebla<br />

dolorese.luna@udlap.mx<br />

30<br />

Yaneileth Rojas-Romero<br />

Universidad Autonoma del Estado<br />

de México<br />

yrojasr@uaemex.mx<br />

data sets of raw and geospatial datasets to the public through the<br />

data.gov website. Many other States are following the US<br />

initiative, making raw data available to the public. On the other<br />

hand, the popularization of mobile devices and social media tools<br />

and platforms have promoted the emergence of new forms of<br />

interaction between organizations and the public, or even among<br />

the public themselves[4].<br />

Small applications running on web pages or in mobile devices (or<br />

mobile apps) have become a wide-adopted way of interaction.<br />

Mobile apps stores were estimated to serve 17.7 billion downloads<br />

in 2011, and it is expected that they will serve 185 billion<br />

downloads by 2014 [5]. It is expected that mobile computing will<br />

replace desktop computing by 2015 [6] . Again, just in data.gov,<br />

about 1,500 web and mobile applications (apps for short) have<br />

been developed, more than 200 by citizens themselves. We<br />

believe that these two trends together have the potential to<br />

transform the relationships between government and the public.<br />

Despite this emerging context, we still know very little about the<br />

level of adoption of apps in government websites anrd their use.<br />

In this way, the purpose of this paper is to give a first step to<br />

answer this set of questions, looking for an initial categorization<br />

of practices among top-rated governments in terms of the use of<br />

information technologies, as well as providing some examples of<br />

current app use in government websites. To accomplish this<br />

objective, the paper will be divided in five main sections. This<br />

introduction constitutes the first section. The second section<br />

includes a literature review. The third section describes the<br />

method that we followed to survey the websites and to classify the<br />

apps. The fourth section includes initial results, and the final<br />

section discusses the findings and provides some future research.<br />

2. LITERATURE REVIEW<br />

The literature review includes social media in government, and<br />

the trend of web and mobile apps.<br />

2.1 Web 2.0 in Government<br />

At least since 2008 government web sites have been including<br />

web 2.0 tools to become more interactive with citizens [7] [8] [9]<br />

[10]. All of these applications, although may be very different in<br />

purpose and function, they share some common features like the<br />

collective generation and classification of content, the integration<br />

of communities, and the production and consumption of socially<br />

distributed knowledge. Web 2.0 is a social network platform


ecause some of its content is user-generated –as if it were a<br />

collective intelligence— converting into co-producers of content<br />

and not just passive subjects who only receive information.<br />

Interaction plays a vital role in this platform [11], and offers a<br />

great opportunity as a way of approaching citizens and making<br />

sure their participation enriches government efforts [12].<br />

Wilson and colleagues proposes that web 2.0 must be understood<br />

as “the second generation of the Web, wherein interoperable,<br />

user-centered web applications and services promote social<br />

connectedness, media and information sharing, user-created<br />

content, and collaboration among individuals and organizations”<br />

[13] (p. 2).<br />

The Web 2.0 tools and applications have been used in government<br />

websites in several countries [14] , [Eliason, 2006 #10752].<br />

Lerman and his colleagues researched about social tagging using<br />

the example of Digg [15]. They find that the use of these tools<br />

depends on context events and not ordinary or common use for<br />

activities.<br />

In the near future, it looks like mobile government will adopt<br />

more web 2.0 tools and features The different programs of the<br />

Somus project suggest a promising trend for the use of these tools<br />

on citizen-government interaction in the following years [16].The<br />

use of web 2.0 in the current activities of citizens and politicians<br />

is an ongoing work.<br />

2.2 Desktop and Mobile Apps<br />

Research on the development of apps is not as extensive as the<br />

number of domains for which them have been developed. There is<br />

some evidence that the current app movement is promoting new<br />

development approaches and delivery channels allowing small<br />

ventures to compete globally [5]. However, there is still<br />

dominance of the global mobile media corporations in the market<br />

[17]. The Apple store was the first to open on July 2008. Nine<br />

months later one billion of apps were downloaded. On April 2010,<br />

just 185,000 apps were available for the Iphone [18]. The offer of<br />

apps grew with Android market (346,526 apps until January 21,<br />

2012), the windows phone marketplace, the Samsung apps, the<br />

blackberry App World, and Nokia Ovi Store.<br />

In this environments, independent software developers, as well as<br />

private and public organizations, design tailor apps with almost<br />

any imaginable objective. In fact, many professional areas are<br />

encouraging their members to write their own applications, by<br />

showing its value as well as how-to guides and approaches [19]<br />

[20] .<br />

On the government side, apps have been proposed to provide G2G<br />

inter-agency collaboration [21] and public services [22]. Mobile<br />

applications have the potential to improve service delivery, as<br />

well as efficiency and efficacy in government operations[4] .<br />

Furthermore, mobile apps create the capability of creating<br />

Location-based Services (LBS), such as traffic, bus or parking<br />

applications[4]<br />

Nowadays there are several websites and organizations that<br />

promote the use of apps in the government. However, maybe the<br />

most high impact applications of these mobile technologies come<br />

when government partners with NGOs or private organizations to<br />

allow citizens to get information, add value to it, giving it back to<br />

government to solve important problems and create value [3] .<br />

This implies that government will need to find creative ways of<br />

promoting the creation of ecosystems where vendors, developers,<br />

and citizen hackers use public information made available by<br />

31<br />

government or promoted to be public by government regulations<br />

to solve important problems [3].<br />

In summary, we think that apps expand the potential for egovernment<br />

to allow citizens to access content, create content,<br />

send communications to government officials, adding in some<br />

cases value to information and allowing citizens to create<br />

ecosystems interested in solve important public problems. One<br />

first step that we want to do in this paper is to explore some of the<br />

current applications that exist in government websites.<br />

3. METHOD<br />

In this paper, we follow the approach of Internet-mediated<br />

research (IMR) [23], which consists of “the gathering of novel,<br />

original data to be subjected to analysis in order to provide new<br />

evidence in relation to a particular research question” (p. 58).In<br />

order to make our exploration on the current adoption and use of<br />

government apps more systematic, we decided to look for current<br />

applications in the top 10 countries in the 2010 UNPAN e-<br />

Government Survey [24]. Given that we did not find enough<br />

examples in these initial countries, we decided to increase the<br />

sample size, exploring the first 35 countries in the list,, finding<br />

applications only in 7 out of the 35. We started our search on the<br />

main country websites, exploring to find mobile applications<br />

and/or publicly available data sets. We visited the English<br />

versions of each website during January and February 2012.<br />

4. Government Apps: an Exploratory Survey<br />

The current section of the paper presents an overview of the use of<br />

apps and some examples of how governments are making<br />

available apps for citizens.<br />

4.1 App use by Governments<br />

Results from our initial survey are shown on Table 1. US apps are<br />

mainly linked to the Data.gov website. The apps from U.K. are<br />

linked to the Direct Gov site. In the case of Canada, we did not<br />

found the official number of apps, but we identified some apps<br />

that match our criteria. Similar cases are New Zealand and Japan.<br />

We have four main findings from this sample. The first one, is<br />

that the total number of apps in each country is not easy to find<br />

given that they are not always readily available in a single<br />

repository. On the other hand, only 7 out of 35 countries are<br />

apparently using this kind of applications, which still seems as a<br />

low level of adoption. The second finding is related to the use of<br />

the apps, most of them are focus on access government content, a<br />

very few enable citizens to interact with government sending data,<br />

reusing it, or collaborate making comments using the apps.<br />

Table 1. Apps and categories on egov websites in our sample<br />

Country #Apps<br />

UNITED<br />

KINGDOM<br />

Mobile<br />

Apps<br />

Web-based<br />

Apps<br />

1854 103 1751<br />

UNITED STATES 1164 153 1011<br />

CANADA N.A. N.A. N.A.<br />

AUSTRALIA 80 25 55<br />

SINGAPORE N.A. 61 N.A.<br />

KOREA N.A. 6500 N.A.<br />

SWEDEN N.A. 1 N.A.


As a third finding, we also found a limited number of apps related<br />

to citizens’ relevant issues such as health or finances. We found<br />

also a number of apps for personal development, and not related<br />

to government information. Finally, the fourth finding is that<br />

some apps are created not only by government, but also by<br />

citizens, non-government organizations or consultants. Some of<br />

these apps are developed with marketing purposes such as<br />

acquiring clients, recognition or just to contribute for government.<br />

In this way, open data is in fact opening the opportunity of<br />

sharing, collaborating and disseminating knowledge through this<br />

kind of applications.<br />

4.2 Selected Examples of Government Apps<br />

on Several Application Domains<br />

In order to give a better sense of the kinds of applications that are<br />

being made available for mobile devices, we introduce in this<br />

section several examples of the different kinds of apps that is<br />

possible to find in government web sites in our sample.<br />

One kind of applications that we found involves apps addressing<br />

the needs of individuals to search and manage information. The<br />

example we selected is Ask Karen from the US Department of<br />

Agriculture (see Figure 1a). Ask-Karen provides 24/7 virtual<br />

assistance and tips on preventing foodborne illness, safe food<br />

handling and storage, and safe preparation of meat, poultry, and<br />

egg products.<br />

The Accounting and Corporate Regulatory Authority (ACRA) has<br />

developed the ACRA app. This app searchs on the agency<br />

database to check if a business firm, company, has limited liability<br />

partnership (LLP), limited partnership (LP), Public Accounting<br />

Corporation (PAC) or Public Accounting Firm (PAF) is registered<br />

in Singapore in order to validate this data. One of the main<br />

features is to search by name or business registration number (see<br />

Figure 1b).<br />

(a) (b)<br />

Figure 1. Information App: Ask Karen and Content Access<br />

App: ACRA<br />

A different version is the ACRA iPhone app which provides the<br />

business community free information that would help users in<br />

their decision-making and planning. This application is a mobile<br />

directory search function facilitates the search of names of all<br />

business firms, local companies, foreign companies, limited<br />

liability partnerships (LLP). A complementary feature is<br />

ASKACRA Mobile, which allows to have easy access to a FAQs<br />

section on related business.<br />

We found applications that can be used for educational purposes.<br />

“Libraries for Ottawa” is an application providing access to the<br />

information of different libraries in the region (Figure 2a). The<br />

application provides name, address, phone number and location<br />

32<br />

using Google Maps, hours of operation. It is important to mention<br />

that this application is an independent development that uses data<br />

from the official website. The author is SKB Wireless<br />

Technology.<br />

Another kind of applications we found can be categorized as<br />

simulation apps. For example, an online financial health checker<br />

has been launched to help people make the most of their money in<br />

the UK website. The application offers money advice on the basis<br />

of a series of queries to the user. Application developers declare<br />

that they care about confidentiality of the user answers. The<br />

author is Direct Recruit LTD (see Figure 2b).<br />

(a) (b)<br />

Figure 2. Educational App: Public Libraries and Simulation<br />

Software: Health Check<br />

One last type of apps that we were able to identify constitutes a<br />

mobile enterprise application. GovPro is a remarkable example<br />

for e-procurement and purchasing of Government. This<br />

application delivers news, product trends and events in the<br />

government market place. The Author is Penton Inc (see Figure<br />

3).<br />

Figure 3. Enterprise Software: GovPro<br />

These are only few examples of the current diversity of mobile<br />

applications and its use in government.<br />

5. FINAL REMARKS<br />

In this paper we have presented some initial findings related to the<br />

use of mobile apps on e-government portals of the top countries<br />

according to the United Nations 2010 survey on e-Government<br />

[24]. Only 7 of the 35 selected countries have adopted this kind of<br />

applications by the time we did the review. Similarly to main<br />

corporations, governments may consider to include a single<br />

repository of government apps to improve discoverability, as it is<br />

one of the main determinants of app adoption by the citizen. Even<br />

this small sample size, governments are fostering the use of apps<br />

to interact with open data. We can not measure this impact yet,<br />

because only a few government websites make available the


information of their apps. However, further research could show<br />

this new trend as a facing change on the government strategy for<br />

interact with citizens.<br />

Previous research reports that government portals expand their<br />

capabilities by using web 2.0 tools, empowering citizens to<br />

collaborate with government and other NGOs to produce relevant<br />

information and solve important citizen problems. That is to say,<br />

governments expands their own limits when a citizen can send<br />

reports of problems with public services or safety problems,<br />

allowing government to respond faster, and overtime,<br />

accumulating information to respond better [3]. Our initial<br />

exploration suggests that most common applications are still those<br />

to access information, and that we are still short of applications<br />

that will increase government-citizen collaboration.<br />

If analysts are correct in their predictions of the predominance of<br />

mobile over desktop devices by 2015[6], the initial trend reported<br />

here has the potential of transforming the current ways in which<br />

government attempts to get in touch with their constituencies,<br />

moving to a digital convergence of voice, text and multimedia in<br />

the citizen’s smartphone. More research is needed on the new<br />

roles that government portals should play in this transformation<br />

process.<br />

Our research provides some preliminary evidence that suggests<br />

government portals are changing direction [7]. Also citizens are<br />

using open data for their own purposes and developing new apps<br />

to interact with government data. This change on the relationship<br />

among citizen-Government interaction must be analyzed and<br />

promoted as a new trend of collaboration and coproduction.<br />

Finally, current trends and analysis suggest that ecosystems of<br />

citizens, vendors and developers will be created around<br />

government open data, and most analysis are quite optimistic [3].<br />

There are also other potential constraints related to attitudes of<br />

citizens towards privacy, credit card adoption or language [25].<br />

This paper is then a first step in the direction to understand the use<br />

of government mobile apps, its evolution and impact on<br />

government innovation.<br />

6. ACKNOWLEDGMENTS<br />

This research is partially supported by the Consejo Nacional de<br />

Ciencia y Tecnología (CONACYT) in Mexico under grant No.<br />

107154. Any opinions expressed in this material are those of the<br />

authors and do not necessarily reflect the views of CONACYT.<br />

7. REFERENCES<br />

[1] Scholl, H. J. and Luna-Reyes, L. F. Transparency and<br />

openness in government: a system dynamics perspective. In<br />

Proceedings of the Proceedings of the 5th International<br />

Conference on Theory and Practice of Electronic Governance<br />

(Tallinn, Estonia, 2011).<br />

[2] Parks, W. The Open Government Principle: Applying the<br />

Right to Know under the constitution. The George Washington<br />

Law Review, 26, 1 1957), 1-22.<br />

[3] Nath, J. Reimagining government in the digital age. Fall, City,<br />

2011.<br />

[4] Trimi, S. and Sheng, H. Emerging trends in M-government.<br />

Communications of the ACM, May2008), 53-58.<br />

[5] Anthes, G. Invasion of the mobile apps 2011, p 18-18.<br />

[6] Milam, L. and Avery, E. J. Apps4Africa: A new State<br />

Department public diplomacy initiative. Public Relations Review,<br />

38, 2 2012), 328-335.<br />

33<br />

[7] Sandoval-Almazan, R. and Gil-Garcia, J. R. Are E-<br />

Government Portals Becoming Central Components for Public<br />

Information Sharing Networks? An Initial Exploration of Local<br />

Governments in Mexico. Government Information Quarterly,<br />

Forthcoming2011).<br />

[8] Reynolds, W. N., Weber, M. S., Farber, R. M., Corley, C.,<br />

Cowell, A. J. and Gregory, M. Social media and social reality.<br />

City.<br />

[9] Mennecke, B. E., Mc Neill, D., Roche, E. M., Bray, D. A.,<br />

Townsend, A. M. and Lester, J. Second Life and Other Virtual<br />

Worlds: A Roadmap for Research. Communications of the<br />

Association for Information Systems2008), 371-388.<br />

[10] Kavanaugh, A., Fox, E. A., Sheetz, S., Yang, S., Li, L. T.,<br />

Whalen, T., Shoemaker, D., Natsev, P. and Xie, L. Social Media<br />

Use by Government : From the Routine to the Critical. Computers<br />

and Society2011).<br />

[11] Haythornthwaite, C. Democratic Processs in Online Crowds<br />

and Communities. In Proceedings of the Conference for<br />

Democracy and Open Government (Austria, May 2011, 2011),<br />

[insert City of Publication],[insert 2011 of Publication].<br />

[12] Woods, E. Web 2.0 and the public sector - Public Sector -<br />

Breaking Business and Technology silicon.com Driving Business<br />

Through technology, City, 2007.<br />

[13] Wilson, D., Lin, X., Longstreet, P. and Sarker, S. Web 2.0: A<br />

Definition, Literature Review, and Directions for Future Research.<br />

AISNET.org, City, 2011.<br />

[14] de Kool, D. and van Wamelen, J. Web 2.0: A New Basis for<br />

E-Government? , City, 2008.<br />

[15] Lerman, K. User Participation in Social Media: Digg Study.<br />

2007 IEEEWICACM International Conferences on Web<br />

Intelligence and Intelligent Agent Technology Workshops,<br />

02007), 255-258.<br />

[16] Näkki, P., Bäck, A., Ropponen, T., Kronqvist, J., Hintikka,<br />

K. A. and Harju, A. Social media for citizen participation Report<br />

on the Somus project. City, 2011.<br />

[17] Mascaro, C. M., Novak, A. and Goggins, S. Shepherding and<br />

Censorship: Discourse Management in the Tea Party Patriots<br />

Facebook Group. IEEE, City.<br />

[18] Isaacson, W. Steve Jobs Biography. Simon & Schuster;,<br />

2011.<br />

[19] Pocatilu, P. Developing Mobile Learning Applications for<br />

Android using Web Services. City, 2010.<br />

[20] B. Boardman No app for that? Write one! Industrial<br />

Engineer: IE, 44, 3 (Marzo 2012.), 44–48.<br />

[21] Beer, D., Kunis, R. and Runger, G. A component based<br />

software architecture for e-government applications. Ieee, City,<br />

2006.<br />

[22] Estevez, E. and Janowski, T. Programmable Messaging for<br />

Electronic Government - Building A Foundation. LNCS,<br />

Springer, City, 2007.<br />

[23] Hewson, C. Internet-mediated research as an emergent<br />

method and its potential role in facilitating mixed methods<br />

research. Guilford Press, City, 2008.<br />

[24] United Nations Global E-Government Development Report<br />

2010. City, 2010.


Session 2<br />

E-democracy & Participation 1


A Logistic Multilevel Model for Civic Engagement and<br />

Community Group Impact in the Digital Age<br />

B. Joon Kim<br />

Department of Public Policy<br />

Indiana University-Purdue University Fort Wayne<br />

Fort Wayne, Indiana, 46805<br />

+1-260-481-0133<br />

ABSTRACT<br />

kimbj@ipfw.edu<br />

Prior research has demonstrated that a citizens’ socioeconomic<br />

status is a significant determinant of the extent of citizen<br />

involvement via ICT [18]. Others have focused on its impact on<br />

civic engagement in terms of community group impacts, finding<br />

that such groups play an important role in increasing citizen<br />

involvement within democratic processes [8]. Thus, previous<br />

research has examined effects aggregated at the ‘individual level’<br />

and ‘group level,’ respectively. This paper seeks to reconcile these<br />

levels in order to assess the impact of ICT on civic engagement.<br />

Our study examines the interplay of individual level and<br />

community group level factors through analysis of the data from a<br />

household survey (N=717) taken in Blacksburg, Virginia in 2005.<br />

This study identifies the idiosyncratic influences at both levels by<br />

applying a multilevel model (specifically, a logistic hierarchical<br />

linear model). In particular, we verify the positive impact of<br />

community groups utilizing ICT in increasing civic engagement.<br />

This research will be used to form the basis of a comparative<br />

study of civic engagement through eGovernment portals, mobile<br />

technology and social media, and to assess their impact on<br />

facilitating group communication and sensemaking.<br />

Categories and Subject Descriptors<br />

H.5.3 [Information Interfaces and Presentation]: Group and<br />

Organization interfaces-Collaborative Computing.<br />

General Terms<br />

Measurement, Human Factors, Theory<br />

Keywords<br />

E-governance, Civic Engagement, Information and<br />

Communication Technology, Community Group Impact,<br />

Hierarchical Linear Model.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

34<br />

Stephen W. Kleinschmit<br />

Department of Public Policy<br />

Indiana University-Purdue University Fort Wayne<br />

Fort Wayne, Indiana, 46805<br />

+1-260-481-6351<br />

kleinscs@ipfw.edu<br />

1. INTRODUCTION<br />

Information and communication technology (ICT) has the<br />

potential to significantly increase citizen participation within<br />

democratic community processes [6, 9]. Such technology has also<br />

been credited with establishing new forms of social interaction<br />

among citizens and governmental agencies. Web 2.0 technologies<br />

are also providing new mechanisms for civic engagement,<br />

political expression and public discussion [19], while others have<br />

found that these technologies are important for facilitating and<br />

augmenting the dynamics of political and civic engagement [9,<br />

12]. The use of ICT can be used to as a mechanism to reverse the<br />

decline of social capital in community groups. Putnam [13]<br />

describes the steady decline of group membership in the United<br />

States, which has led to a complimentary decrease in community<br />

involvement. Though he attributes some of this decline to the<br />

isolation effect of internet communication, paradoxically online<br />

communication can also be used to foster civic engagement and<br />

political expression, particularly when it is used to acquire and<br />

share information within community groups. [8, 9].<br />

Previous research has focused on exploring the effect of ICT on<br />

civic engagement, modeling its effects at the ‘individual level’<br />

and ‘group level’ respectively. This study applies a multilevel<br />

model to analyze the community group impact on civic<br />

engagement, in an effort to reconcile their effects. Therefore, the<br />

main research question is; Does the use of ICT affect the nature of<br />

civic engagement for citizens affiliated with community groups?<br />

Additionally, this study also examines; What effects do different<br />

types of community group affiliations, group ICT use (email,<br />

listserv, online discussion boards and websites, including blogs)<br />

have on the civic engagement of individual citizens? To study and<br />

discuss these questions in more detail, this paper is divided into<br />

four sections. First, this paper explores previous studies about the<br />

relationship between ICTs and online civic engagement in<br />

general. Next, we provide an overview of our research methods,<br />

with an emphasis on our explaining our hierarchical linear<br />

models. Then, the preliminary findings are presented before we<br />

discuss the implications of these findings.<br />

2. CONCEPTURAL BACKGROUND<br />

2.1 Civic Engagement in the Digital Age<br />

This study focuses on the civic engagement through the use of<br />

Information and Communication Technology (ICT). When we<br />

discuss the relationship between ICT and civic engagement, there<br />

are three different perspectives we use to explore this relationship:


two polarized (optimistic or utopian and negative or pessimistic)<br />

views and a skeptical standpoint [1, 7]. Optimists insist that<br />

interactive ICT improve connections between citizens and public<br />

bureaucrats, improve public policy-making processes and grow<br />

trust by promoting government transparency and accountability.<br />

With the adoption of interactive technology, improvements to<br />

public deliberation and participatory democracy can be realized [2,<br />

17]. Therefore, ICT is viewed as a means for invigorating<br />

democracy. Conversely, pessimists argue that such mechanisms<br />

for discourse are less likely to mobilize citizens and more likely to<br />

reinforce the power and status of political elites [4, 12]. The<br />

promise of true participatory democracy online is thus undercut<br />

by the problem of demographic representativeness; those who use<br />

it are significantly younger, wealthier and more educated than the<br />

average person [4].<br />

Finally, scholars representing the skeptical standpoint argue that<br />

the ICT neither improves nor reduces civic engagement [1, 14].<br />

Margolis and Resnick suggest that ICT is taking on the features of<br />

ordinary life [11], and Putnam [14] insists that such measures are<br />

likely to displace personal engagement and thus may fail to<br />

generate social capital. Furthermore, some argue there is little<br />

evidence to support a significant relationship between the<br />

evolution of ICT use and levels of civic engagement [1]. As<br />

suggested by the dispute among the polarized perspectives and the<br />

skeptical view, the nature and extent of the impacts of the ICT on<br />

civic engagement are not yet fully understood. Each point of view<br />

has shortcomings. Nevertheless, it can serve a useful<br />

supplementary function. The ICT had not yet profoundly<br />

impacted social trends, but felt it would play an important part of<br />

explaining the contemporary context of a person’s overall civic<br />

and political life. Subsequent developments such as Facebook,<br />

iPods, instant messaging, and text messaging have shown that<br />

citizens, particularly younger generations, are particularly<br />

“plugged in.”<br />

2.2 Bridging Individual and Group Levels of<br />

Analysis: A Logistic Multilevel Model<br />

Past studies have investigated the relationship between ICT use<br />

and civic engagement by modeling behavior at the individual<br />

level, while also considering effects at the group (contextual)<br />

level. By examining both levels through the same level of<br />

analysis, the results were potentially insignificant or<br />

underestimation of variability across levels. According to Katz<br />

and Rice’s panel study of national survey data in the United States<br />

(1995, 1996, 1997, and 2000), internet users were significantly<br />

more likely to belong to at least one local group than non-internet<br />

users. At the same time, on an individual level, the internet has<br />

provided a platform for a significant number of additional forms<br />

of political activity [7].<br />

This paper focuses on detecting the group effects on individual<br />

citizens’ level of civic behavior. In other words, how much their<br />

community group (aggregate) level of ICT use and political<br />

interests affect an individual’s level of civic engagement, while<br />

controlling for their demographic characteristics. Explaining this<br />

effect requires a statistical model that addresses a hierarchically<br />

structured data problem. For example, a multistage sample must<br />

be used to model the effects of the group: first, we aggregate data<br />

at higher levels of organization (e.g., community groups), and<br />

next we sample the sub-units from the available units (e.g.,<br />

individual members from each community group). In such the<br />

35<br />

individual observations are clustered, thus are not truly<br />

independent. To accurately assess their effects, there is a need to<br />

differentiate fixed group effects from the random effects of<br />

individuals. Citizens within the same community group tend to<br />

share similar traits. Because of selection processes (e.g., groups<br />

aggregate those with similar socioeconomic status or interest) and<br />

because of common history, many citizens share the same<br />

affiliation. As a result, the average correlation (the so-called<br />

intraclass correlation) between variables shared by individual<br />

members of the same group will be higher than the average<br />

correlation between variables shared by those from different<br />

groups. Standard statistical tests lean heavily on the assumption<br />

of the independence of the observation. If this assumption is<br />

violated (and in multilevel data this is almost always the case), the<br />

estimates of the standard errors of conventional statistical tests are<br />

much too small, resulting in many spuriously significant results.<br />

Hierarchical linear model estimation accounts for nonindependent<br />

observation at the group level [15]. In this study, a<br />

logistic multilevel model is used, then this study estimates<br />

the effects of group level characteristics on an individuals’<br />

level of volunteerism, after controlling for other demographic<br />

variables 1 . Level two consists of group variables and level one<br />

consists of individual variables. The equations estimated for the<br />

base model of this study are:<br />

Level 1:<br />

π ij =logistic ( β 0 j + β1<br />

j poleff ij + β 2 jrtrust<br />

ij + β 3 jedu<br />

ij + β 4 jage<br />

)<br />

ij<br />

Level 2:<br />

β0 j = γ 00 +γ 01grpictuj + u0 j<br />

β 1 j = γ 10 + u 1<br />

β 2 j = γ 20 + u 2<br />

β 3 j = γ 30 + u 3<br />

β 4 j = γ 40 + u 4<br />

3. METHODS<br />

In order to achieve a more in depth investigation of citizens<br />

affiliated with community groups, this paper uses a logistic<br />

multilevel analysis (a two level model) with a single binomial<br />

dependent variable, volunteer. The outcome individual averages<br />

that are used as 1group level variables are often interpreted as<br />

‘direct and contextual effects.’ To facilitate contributions to the<br />

reconciliation between these levels of analysis, the following<br />

hypothesis is examined:<br />

o Hypothesis: Individual civic engagement (volunteer work)<br />

would be greater in local groups with higher group ICT<br />

(email, listserv, online discussion boards, and websites,<br />

including blogs) use, taking into account individual<br />

citizens’ psychological characteristics (the level of political<br />

efficacy and the extent of social trust) and socioeconomic<br />

variables (age and education).<br />

1 To develop a parsimonious model, we included variables which focused on<br />

our research question. However, we also tested control variables which<br />

were revealed significant effects in prior studies such as education, income<br />

and age. We then excluded statistically insignificant controlling variables.


3.1 Dependent Variable<br />

Civic Engagement: (Variable name: volunteer 2 ): “whether you<br />

(individual citizens) are doing volunteer works or not” (Scale:<br />

0=no, 1=yes).<br />

3.2 Independent Variables<br />

3.2.1 Individual Level Variables<br />

Political Efficacy (Variable name: poleff): the extent to<br />

agreement that “sometimes local politics and government seem so<br />

complicated that person like me can’t truly understand what’s<br />

going on (Scale: 1- 4) (1=strongly agree, 2=somewhat agree,<br />

3=somewhat disagree, 4=strongly disagree)<br />

Social Trust (Variable name: rtrust): the likelihood of answering<br />

to “what extent do you think most people in the local area can be<br />

trusted” (Scale: 1-4) (1=not at all, 2=not very much, 3=somewhat,<br />

4=very much)<br />

Control variables (education and age): the answer of “what is the<br />

highest level of formal education you have completed” (converted<br />

scale: years) and the answer of “in what year were you born”<br />

(converted scale: years)<br />

3.2.2 Group Level Variables<br />

Group ICT Use: (Variable name: grpictu) within your local<br />

group, group use of ICT for communication (email/listserv, online<br />

discussion boards, and websites including blogs) (scale: 0=never<br />

used all three items at any groups - 9=used all items at all three<br />

groups)<br />

3.3 Data and Measures<br />

This study is based on household telephone survey data from the<br />

town of Blacksburg, Virginia and surrounding areas in 2005<br />

(spring 2005; N=717; 40% response rate). As part of larger<br />

research project (National Science Foundation IIS-0429274),<br />

survey questions cover current ICTs use and practice among local<br />

citizens, local community groups and government representatives.<br />

In particular, the author is interested differences among individual<br />

citizens affiliated with local groups and their ICT use for civic<br />

engagement.<br />

4. FINDINGS<br />

This study examined a logistic multilevel model for detecting the<br />

local group effects on civic engagement, with respect to the<br />

individual citizens’ likelihood of doing volunteer work. To<br />

understand the effect of ICT use of community groups, the model<br />

takes into account individual citizens’ political efficacy, level of<br />

trust on other local people, the level of education and age in the<br />

lower individual level. Group Internet use constitutes the group<br />

level variable. The following shows the results of logistic<br />

multilevel model without two.<br />

x<br />

Applying the logistic transformation e<br />

g(<br />

x)<br />

=<br />

to these estimates<br />

x<br />

1+<br />

e<br />

1.<br />

5107<br />

produces an estimated volunteer rate of 81.9% ( e<br />

= ) based on<br />

1.<br />

5107<br />

1+ e<br />

all individual citizens (typical probability). The result shows that<br />

2 In this study, we used the volunteerism as a measure of civic engagement.<br />

36<br />

there is statically significant intraclass correlation (random effect:<br />

p


through aggregating, shaping, and cultivating collective public<br />

interest, will, and competence via ICT in the digital ages. The<br />

results suggest a positive association between citizens’<br />

involvement in community groups of their civic engagement with<br />

group ICT use. Although there are several limitations such as<br />

small sample size and limited group level data, this paper presents<br />

ways to adapt and to present the potential use of multilevel<br />

analysis to examine civic engagement through logistic multilevel<br />

models. This study seeks to contribute to the understanding of<br />

growing evidence that ICT can be used as a useful mechanism for<br />

increasing the civic engagement of citizens affiliated with<br />

community groups.<br />

6. REFENCES<br />

[1] Bimber, B., Information and American Democracy:<br />

Technology in the Evolution of Political Power. New York:<br />

Cambridge University Press, New York, 2003.<br />

[2] Browning, G., Electronic Democracy: Using the Internet to<br />

Transform American Politics, 2nd ed. Medford, NJ: Cyber<br />

Age Books, Medford, NJ, 2002.<br />

[3] Castells, M. The Rise of the Network Society. The<br />

Information Age: Economy, Society and Culture, 1,<br />

Blackwell, Oxford, 1996.<br />

[4] Davis, R., Politics Online: Blogs, Chartrooms, and<br />

Discussion Groups in American Democracy. Routledge, New<br />

York, NY, 2005.<br />

[5] Gallant, L. M., Boone, G. M., and Heap, A. Five heuristics<br />

for designing and evaluating web-based communities. First<br />

Monday: Peer-Reviewed Journal on the Internet, 12, 3, 2007,<br />

1-15.<br />

[6] Galston, W.A. Civic education and potlical participation.<br />

American Political Science Assocaition, College Park, MD,<br />

2004.<br />

[7] Katz, J. E., and Rice, R.E., Social Consequences of Internet<br />

Use: Access, Involvement, and Interaction. Cambridge, MA:<br />

MIT Press, Cambridge, MA, 2002.<br />

[8] Kavanaugh, A., Zin, T.T., Rosson, M. B., Carroll, J. M.,<br />

Schmitz, J., and Kim, B. J., Local groups online: Political<br />

learning and participation. Journal of Computer Supported<br />

Cooperative Work (Published Nov. 16). 2006. Available<br />

online at:<br />

http://www.springerlink.com/content/tk770mu72w4v6483/fu<br />

lltext.pdf.<br />

[9] Kim, B. J, Kavanaugh, A, and Hult, K. Local Community<br />

Groups and Internet Use: Examining Contents of Local<br />

Community Groups’ Websites. The International Journal of<br />

Technology, Knowledge and Society, 2, 7, 2007, 207-221.<br />

[10] Lukensmeyer C. J. and Torres, L. H. Public Deliberation: A<br />

Manager’s Guide to Citizen Engagement. IBM Center for the<br />

Business of Government, 2006.<br />

[11] Margolis, Michael., and David Resnick, D., 2000. Politics As<br />

Usual: The Cyberspace. Sage Publications, Thousand Oaks,<br />

CA: Sage Publications,. 2000.<br />

37<br />

[12] Norris, P., Digital divide: Civic engagement, information<br />

poverty and the Internet. Cambridge University Press, New<br />

York, 2001.<br />

[13] Putnam, R. D. Bowling Alone: America’s Declining Social<br />

Capital. Journal of Democracy, 6, 1995, 65-87.<br />

[14] Putnam, R.D. Bowling Alone: The collapse and revival of<br />

American community. Simon and Schuster, New York, NY,<br />

2000.<br />

[15] Raudenbush, S., Bryk, A., and Congon, R. HLM:<br />

Hierarchical linear and nonlinear modeling. Sage, Newbury<br />

Park, CA, 1998.<br />

[16] Raudenbush, S., and Bryk, A. Hierarchical Liner Models:<br />

Application and Data Analysis Methods (2 nd ed.) Sage,<br />

Thousand Oak, CA, 2004.<br />

[17] Rheingold, H., The Virtual Community. Addison-Wesley<br />

Publishing, 1993.<br />

[18] Schlozman, K. L., Verba, S., and Brady, H. E. 2010. Weapon<br />

of the strong? Participatory inequality and the internet.<br />

Perspectives on Politics, 8(2), 487-509.<br />

[19] Shah, D. V., Cho, J., Everland, W. P., and Kwak, N.<br />

Information and Expression in a Digital Age: Modeling<br />

Internet Effects on Civic Engagement. Communication<br />

Research, 32, 5 (Oct. 2005), 531-565.


Designing Online Deliberation Using Web 2.0<br />

Technologies: Drafting a Bill of Law on Internet Regulation<br />

in Brazil<br />

ABSTRACT<br />

In this paper, we describe the formatting guidelines for the role of<br />

institutions and political practitioners in designing online<br />

consultation projects. As a case study we evaluate the Brazilian<br />

government-run initiative known as Marco Civil Regulatório that<br />

used web 2.0 tools to draft a bill of law on Internet legislation<br />

with the aid of citizen’s participation. Findings presented in this<br />

article are based on a set of interviews held with policy makers<br />

responsible for designing and promoting the aforementioned<br />

project.<br />

This article contributes to the debates on how deliberative rules<br />

and technology overlap in early stages of policy design. Our case<br />

study supports the argument that Internet has potential to provide<br />

a democratic space, but public consultations need to be<br />

established, funded, promoted and regulated; tasks that are<br />

performed by institutions (not by technology or citizens alone).<br />

For that reason, institutions are key to understand how web 2.0<br />

technologies can be useful for citizens and governments in<br />

designing tools for consultation, deliberation and decision-making<br />

Categories and Subject Descriptors<br />

K.4.1 [Computers and society]: Public Policy Issues<br />

General Terms<br />

Management, Design, Theory, Legal Aspects<br />

Keywords<br />

Online consultation; E-democracy; web 2.0<br />

1. INTRODUCTION<br />

Previous research on the use of web 2.0 tools for online<br />

consultations has argued that design matters. As Wright and Street<br />

claim, “political choices are made both about the format and<br />

operation of the online discussion … we should view deliberation<br />

as dependent on design and choice, rather than a predetermined<br />

product of the technology” [12]. At the same time, authors have<br />

argued that institutions matter to a great extent. As Fischer argues<br />

“not that institutions cause political action; rather, it is their<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Fabro Steibel<br />

LAMIDE/PPGCOM/ UFF (Brazil)<br />

CTS/FGV/RJ (Brazil)<br />

ofabro@ofabro.com<br />

38<br />

discursive practices that shape the behaviors of actors who do …<br />

structural relationships give shape to both social and political<br />

expectations and the possibility of realizing them” [4].<br />

Inspired by both arguments, this article explores the conceptual<br />

gap between focusing either on design or on institutions and<br />

presents an analysis of the role played by institutions in designing<br />

deliberative tools. Our evidence is based on interviews held with<br />

political practitioners who participated in the design of the Marco<br />

Civil Regulatório case (hereafter noted as MCR). The MCR was a<br />

government-run initiative that during 90 days of online<br />

consultation received more than two thousand contributions from<br />

the general public, which were later “translated” by interviewees<br />

into a Bill of Law sent to Congress. This article focuses on policy<br />

decisions political practitioners concerning the design of web 2.0<br />

tools for online deliberation, and we explore how institutional<br />

characteristics affects the role of technology used for online<br />

consultations.<br />

This article is divided in three sections: the first section presents<br />

our theoretical framework on the role of design and institutions in<br />

online consultations, our methodological framework and presents<br />

the case study here addressed. The second section discussed the<br />

influence of institutions and institutional context in the design of<br />

online consultation portals. The last section presents the emerged<br />

conceptual framework to analyze similar cases and some lessons<br />

learned.<br />

We expect this article to contribute to the debate about the role of<br />

institutions in using technology for development and democracy.<br />

Our evidence shows that institutions sponsoring the MCR<br />

initiative were key to understand how web 2.0 technologies were<br />

made useful for citizens and governments to collaborate,<br />

deliberate, take decisions and – hopefully – to connect.<br />

1.1 Methodology<br />

Findings presented in this article are based on a set of interviews<br />

held with policy makers responsible for designing and promoting<br />

the MCR project. The three main objectives of this research are:<br />

(a) formulating hypotheses on what contextual elements favored<br />

the launch of the MCR project; (b) evaluating how deliberative<br />

rules and technology overlapped in early stages of policy design;<br />

and (c) mapping good practices regarding the mix of different web<br />

2.0 technologies on designing online deliberation experiences for<br />

drafting legislation purposes. The source of data used in this<br />

project comes from eight in-depth interviews conducted with six<br />

public servants, academics and web designers responsible for<br />

planning and executing the MCR project, selected based on a tworound<br />

sampling procedure. All interviews were semi-structured


in-depth expert interviews, and were analyzed based on a mixedmethod<br />

approach to qualitative data analysis [10].<br />

1.2 About the Case Study<br />

Generally speaking, the Marco Civil Regulatório project (MCR) is<br />

seen as enormously successful. Defining what “success” means in<br />

terms of deliberative practices requires defining normative<br />

standards by which democracy is being evaluated, which is far<br />

from being a settled matter [3, 5, 6, 8]. Nonetheless, considering<br />

that the MCR project is the first of its kind in Brazil, that during<br />

the consultation project their webpage received around two<br />

thousand contributions from the general public, that later projects<br />

refer to it as a keystone reference, and most importantly, that the<br />

project succeeded in translating the concerns received online into<br />

a draft legislation to be sent to Congress, we can argue that the<br />

MCR project was indeed enormously successful.<br />

The government’s decision to run public consultations projects to<br />

make informed decisions is far from a novelty in public<br />

administration. In Brazil, for example, they are even regulated in<br />

specific legislation (D4176/2000). However, what makes the<br />

MCR project new is not the government’s decision to run a public<br />

consultation on how to regulate the Internet, but rather the<br />

decision to run it with the aid of Internet itself. Expanding the<br />

locus of debate from physical spaces (such as the hearing rooms<br />

located in the capital city of Brasilia) to an open and public URL,<br />

capable of hosting a policy debate online, is something<br />

interviewees perceive to have never been before. Interviewees<br />

recall some isolated cases where online technology has been used<br />

by government to “consult” experts or common citizens, and they<br />

remember cases of the government considering running public<br />

consultations online, but the MCR project is perceived as the<br />

pioneer of its kind, something so important that interviewees<br />

describe it as an event that “upgraded” how public consultations<br />

are run in the country.<br />

The MCR project is a joint initiative of the Ministry of Justice (the<br />

project's initiator) and the Centre for Technology and Society<br />

(CTS, hosted at the think thank foundation Getúlio Vargas, in Rio<br />

de Janeiro). Apart from these two organizations, the project also<br />

received direct support from the Ministry of Culture, and indirect<br />

assistance from other governmental bodies (i.e., the Ministry of<br />

International Relations), and ad hoc contributions from civil<br />

society organizations and several Internet activists. As such, the<br />

MCR project was a government initiative, which, with the aid of<br />

an important think thank, and of civil society, established itself as<br />

a one-of-a-kind online policy debate forum.<br />

The general objective of the MCR project was to draft an Internet<br />

Law to be submitted to Congressional vote. The bill was designed<br />

to suggest a set of legal principles and rights to guide future<br />

Internet legislation in the country, and the whole consultation<br />

experience was designed to be based on online collaborative<br />

practices. The project ran from October 2009 to May 2010, and it<br />

resulted in an online forum where politicians, academics, artists,<br />

NGOs, companies, individuals and other stakeholders with an<br />

interest in the topic could post, blog, debate and comment on the<br />

possible design of the future Internet legislation.<br />

1.3 The Use of Technology for Deliberation<br />

The MCR project made use of several web 2.0 tools (mainly<br />

Wordpress platform, Twitter, rss feeds, and blog) and it was<br />

39<br />

divided in two rounds of discussion: during the former people<br />

were invited to comment on a “white paper” with a set of general<br />

ideas that broadly oriented the future draft; during the latter<br />

people were invited to comment on the draft legislation as<br />

formatted to be sent to Congress. As interviewees describe the<br />

process, the first round of debate tested a set of normative<br />

standards, pre-defined by those sponsoring the initiative, that were<br />

considered important to be included in future legislation; while<br />

the second round focused on receiving feedback on the draft law<br />

itself.<br />

What is important to notice is that during both periods of<br />

consultations users could comment only on pre-defined topics,<br />

said by interviewees to focus on three axes of discussions:<br />

individual and collective rights (i.e., privacy, freedom of speech,<br />

and access to rights), principles related to intermediaries (i.e., net<br />

neutrality and civil liability), and governmental directives (i.e.,<br />

openness, infrastructure, and capacity building). Therefore,<br />

although the online consultation project was a collaborative<br />

practice, one initiative open for the general public to engage and<br />

share their opinions, citizens were invited mostly to offer<br />

suggestions, but not to decide on what topics were open for<br />

debate, nor on what writing the final draft would have.<br />

According to interviewees, the MCR project started in<br />

September/2009, when public servants from the Ministry of<br />

Justice invited policy experts from the Centre of Technology and<br />

Society to design the online platform. Two months later, the<br />

website was launched and the consultation period started<br />

(remaining open until mid 2010, when the final draft of the law<br />

draft was concluded). During the two periods of consultation over<br />

2,000 contributions from individual users, governmental and nongovernmental<br />

entities were received. Policy makers were<br />

responsible for gathering comments and writing the final draft<br />

bill, which, as concluded, includes 25 articles divided into 5<br />

chapters concerning users’ rights and general principles for the<br />

regulation of the Internet.<br />

Analyzing the interviews we can argue that the MCR project was<br />

based on three main tenets: first, it aimed to design legislation<br />

based on solid judicial grounds, a legal piece of work ready to be<br />

sent for Congressional hearings; two, it aimed to create policies<br />

capable of securing existing and future individual rights over the<br />

web; third, it intended from the start to be based on collaborative<br />

practices and public debate constructed with aid of web 2.0 tools.<br />

Interviewees constantly refer to the union of these three tenets<br />

(judicial grounds, oriented to secure individual rights and based<br />

on a collaborative online debate) as key motivations behind the<br />

MCR project and as the keystones of their online consultation<br />

initiative.<br />

2. INSTITUTIONAL CONTEXT<br />

Analyzing data referring to this topic, we identify four contextual<br />

elements that need to be taken into consideration, namely: the<br />

engagement of cyber activists around the social movement known<br />

as “Mega não”; the think tank activities of CTS in opposing the<br />

Lei Azeredo’s legal principles; the political agenda of the new<br />

executive branch who welcomed defining Internet as a social<br />

right; a shared understanding amongst policy makers that<br />

regulating a collaborative environment such as the Internet<br />

required the use of collaborative practices such as the ones found<br />

in the online world.


2.1 The Lei Azeredo<br />

If we analyze the main reasons mentioned by interviewees to<br />

justify why the MCR initiative emerged, most of events and<br />

contexts mentioned by interviewees make direct reference to the<br />

Lei Azeredo. The Lei Azeredo was a Bill of Law sent to the<br />

Lower chamber in 1999 (PL 84/99), and to the Senate in 2003<br />

(PLS 89/03). The Bill focused on regulating crimes over the<br />

Internet, framing Internet policy mainly from a Criminal Law<br />

perspective rather than from a Civil Law framework. The Lei<br />

Azeredo was heavily criticized by cyber activists, think thank<br />

organizations and particularly by Luiz Inácio Lula da Silva’s<br />

(Lula) government (2002-2010) for trying to regulate crimes over<br />

the Internet in a context where civic rights over the web were still<br />

not defined. In fact, as interviewees claim, the projects name<br />

“Marco Civil” (“Civil Regulatory Framework” in English) was<br />

chosen precisely to make clear their opposition to discussing<br />

criminal codes of conduct prior to securing civil rights and<br />

obligations related to Internet use.<br />

2.2 Cyber Activism<br />

The Lei Azeredo attracted, from the start, fierce criticism inside<br />

and outside online forums of debate, but it was mostly after 2009,<br />

with the launch of a blog know as “Mega não”, by the cyber<br />

activist João Caribé, that social opposition to the Lei Azeredo<br />

gained a coherent voice. The “Mega não” movement fuelled an<br />

intense activism in blogs, twitter and other social media that not<br />

only attracted even more online activists to the cause, but also<br />

received media coverage from niche national media and also<br />

motivated protest marches in a number of cities, having also<br />

themed important Internet-related events of the year [9].<br />

Interviewees argue that the existence of the “Mega não” social<br />

movement played a key role in the overall success of the MCR<br />

project. It is argued that those who were closely engaged with the<br />

“Mega não” movement were also those who pioneered the<br />

comment section of the project’s website; not only, activists<br />

linked to the “Mega não” movement were also said to be the ones<br />

who helped to publicize the MCR initiative by using their own<br />

twitter hashtags and blog networks to comment on the initiative.<br />

Interviewees mention that, at first, cyber activists were suspicious<br />

that their “bottom up” movement would be overlooked by the “top<br />

down” initiative they were being invited to join; nonetheless,<br />

interviewees say that gradually most “Mega não” supporters<br />

started to trust the MCR initiative as a real opportunity to push<br />

forward their own policy interests what, in return, attracted even<br />

more contributors and publicity to the MCR website.<br />

2.3 Policy Activism<br />

Another key element mentioned by interviewees refers to the<br />

policy activism of CTS. CTS was already known nationally and<br />

internationally for its policy agenda in favor of open source<br />

software, creative commons license, and other topics related to<br />

technology, law and society. Specifically in relation to the Lei<br />

Azeredo’s debate, CTS was also known for their two reports<br />

criticizing the draft bill proposal, which is perceived by<br />

interviewees to have increased their influence on government<br />

bodies, academics, and cyber activist networks.<br />

As interviewees from the Ministry of Justice claim, CTS’s public<br />

policy views were amongst the top reasons why they were called<br />

to co-author the MCR project. The Ministry of Justice was said to<br />

welcome CTS not only due to their opposition to the Lei Azeredo,<br />

40<br />

but also based on their shared ideas of designing online<br />

collaborative venues for policy making. And as interviewees from<br />

CTS argue, they welcomed the Ministry of Justice’s invitation<br />

because they perceived the initiative as an opportunity to push<br />

forward their own policy agenda, as much as a promising<br />

opportunity to influence politicians to support in the future policy<br />

debates based on collaborative online practices.<br />

2.4 Government’s Support<br />

The third element mentioned by interviewees as decisive in<br />

launching the MCR project was the executive government’s<br />

support. President Lula’s speech at the 2009 FILS international<br />

open-source conference is mentioned as the starting event for the<br />

entire initiative. During his speech, the president explicitly<br />

opposed to the Lei Azeredo’s proposal calling instead for an<br />

alternative bill securing Internet civic rights. Lula’s speech<br />

however was far from an isolated event; it simply illustrated a<br />

broad agenda pushed forward by the incumbent government to<br />

understand Internet as a challenging way of thinking civic social<br />

relations and governance. Experiences using Internet for policy<br />

making precede Lula’s government, backing to 1999 when IRC<br />

chat technology and blogs have been pilot for policy making<br />

inside government. Interviewees nonetheless stress that it was<br />

after Lula’s presidency start in 2002 that uses of Internet for<br />

policy development expanded. The role of the Ministry of Culture<br />

is mentioned as illustrative of this point, two projects in particular.<br />

The first, known as “Pontos de cultura”, linked government’s<br />

financial support to local cultural centers to the provision of<br />

Internet access to local community. The second, know as<br />

CulturaDigital.br, invited citizens to create and share their blogs<br />

and digital identities in a public and open-source Wordpress-based<br />

platform in order to foment policy deliberation online.<br />

2.5 Collaborative Policy Making Framework<br />

The last contextual element mentioned by interviewees refers to<br />

the emergence of new ways of combining law, society and<br />

technology. Due to the emergence of collaborative and networkbased<br />

technology, interviewees needed to re-conceptualize how<br />

their institutions understood knowledge production. CTS, the<br />

Ministry of Justice and the Ministry of Culture had pioneered in<br />

previous years several experiments investigating alternative<br />

governance models based on technology. CTS, for example, had<br />

been influential in supporting the use of the Creative Commons<br />

License; the Ministry of Justice and the Ministry of Culture<br />

piloted the portal Culturadigital.br, inviting cyber activists and<br />

hackers to share their opinions online. It is within this panorama<br />

that interviewees said to have welcomed the MCR project: as an<br />

opportunity to try out alternatives to the traditional governmentcentered,<br />

closed-doors process of policy making. As one<br />

interviewee phrases it, the MCR initiative was a “symbiotic<br />

movement between the way you define policy making, and the<br />

object of policy regulation … and it is within this ‘happy<br />

marriage’ between these two elements that we define what we<br />

aimed to achieve”.<br />

3. DESIGNING TECHNOLOGY FOR<br />

DELIBERATION<br />

One way to understand how policy forums are affected by web 2.0<br />

tools is evaluating, when public consultations are over, what<br />

answers citizens provided to government and what uses


government made of citizens’ contributions. These questions refer<br />

to the analysis of later stages of policy making, and do not reflect<br />

the analysis provided here. From a different starting point, this<br />

section focuses on earlier stages of deliberative processes,<br />

specifically evaluating how policy makers decided before the<br />

public was invited to contribute online what policy questions were<br />

open or closed for deliberation, and what technologies would be<br />

used to mediate such debate.<br />

In the case of the MCR project, understanding what policy issues<br />

were open or closed was straightforward – the MCR website<br />

reserved one page to list all topics open for discussion (i.e., civil<br />

responsibility of Internet users, right of expression, privacy and<br />

net neutrality) and another to list all topics closed for debate (i.e.,<br />

copyright, data protection and child pornography). The list of<br />

issues mentioned in the webpage was included in the interview’s<br />

questionnaire, and interviewees confirmed that in general terms<br />

these topics were the ones actually open and closed for<br />

deliberation.<br />

Nonetheless, beyond defining what issues are open or closed for<br />

discussion in policy debates (i.e., beyond defining on what people<br />

deliberate over), designing rules for policy debates requires also<br />

identifying and selecting tools to aid people and institutions to<br />

share their opinions with each other (i.e.., deciding on how people<br />

deliberate). In “offline” policy forums, such as the ones regularly<br />

run by the Congress with the aid of public meetings rooms, policy<br />

makers have to decide how large meeting venues have to be, what<br />

time and date meetings will take place and how present speakers<br />

can effectively share their opinions. In policy forums held online,<br />

similar decisions need to be made, addressing other issues such<br />

as: how people will have access to the forum’s website, what<br />

coding language will the webpage be written in, how comments<br />

will be visualized online, and how people will post their opinions.<br />

3.1 Designing Rules for Technology Use<br />

Due to the pioneer nature of online projects like the MCR<br />

initiative, we notice that designing rules to decide what people can<br />

debate over is a much simpler task than deciding on how<br />

technology is used for deliberation. As interviewees argue, they<br />

made decisions on what issues to deliberate over based on several<br />

background research tools they had at hand: they identified policy<br />

topics already under discussion in other spheres of government,<br />

planned to select topics that would increase chances of receiving<br />

support inside Congress, and favored topics that were likely to<br />

increase their project’s audience. Based on such analyses (which,<br />

by the way, are very similar to those available in “offline” policy<br />

consultations), policy makers had plenty of sources of input to<br />

strategically decide on what mix of policy issues was likely to<br />

increase the overall success of the project.<br />

The same does not apply when we analyze policy makers’<br />

decisions about how technology should be used for deliberation.<br />

As interviewees repeatedly point, the MCR project was a very<br />

experimental and challenging initiative. Interviewees report none -<br />

or at the most very few - previous projects to serve as models,<br />

relying mostly on their own private experience or ad hoc<br />

inspiration. Above all, interviewees say to have mainly decided on<br />

what technology to use based on a trial-and-error basis, reason<br />

why the most important source of input information mentioned in<br />

this regard is feedback provided by users reflecting decisions they<br />

had already taken.<br />

41<br />

Interviewees say for example to have chosen to use Wordpress<br />

based on the open-source nature of this technology; moreover,<br />

they also say they took this decision based on their personal<br />

expertise in running blogs of their own, as well as based on their<br />

awareness of the initiative Culturadigital.br run by the Ministry of<br />

Culture (that was later used to host the project website). The<br />

decision to create a comment section based on a “paragraph-byparagraph”<br />

lay-out, for example, was also generally inspired on<br />

some previous knowledge they had of the “The public index”<br />

project [11], which required, nonetheless, several improvements<br />

before it met their needs. Even decisions on what technology<br />

decisions to continue or discontinue were made based on ad hoc<br />

information: the overall lay-out of the comment section for<br />

example received positive feedback, which resulted in an<br />

improved lay-out implemented for the second phase of<br />

consultation; the use of a “thumbs up/down” voting system<br />

however was removed shortly after implementation due to bad<br />

feedback received.<br />

3.2 Emerged Conceptual Framework<br />

Based on the interviews’ analyses, designing online consultation<br />

with the aid of web 2.0 is a very innovative task. However, we can<br />

find at least three common themes around the uses of Internet for<br />

policy making that have been largely documented before [7],<br />

namely: (a) the will to use of the Internet as a platform for<br />

political discourse, (b) the collective intelligence emergent from<br />

political Web use, and (c) perpetual experimentalism in the public<br />

domain. The former two themes describe quite well interviewees’<br />

expectation during the early stages of the MCR project. For<br />

example: selecting the CulturaDigital.br portal to host the<br />

project’s webpage is justified based on the will to foster new<br />

Internet forums of political debate; inviting citizens to deliberate<br />

online is justified based on the will to follow CTS’s goal of<br />

designing new collaborative ways of knowledge production.<br />

It is however the last theme (i.e., the perpetual experimentalism)<br />

that we most highlight in describing the MCR initiative. To some<br />

extent, online consultations resemble designing a complete new<br />

environment for policy making. For example: policy makers were<br />

required to understand the essence of tools such as Twitter and<br />

email and decide if they were good or not for online<br />

consultation’s use. Based on their previous experience with<br />

offline policy forums, interviewees were willing to avoid the oneto-few<br />

communication flow in favor of a many-to-many flow.<br />

Hence their decision (reached after a try-and-error period) of<br />

using Twitter (but blocking the use of email) to interact with the<br />

general public. In other words, the MCR project is clearly a case<br />

study where experimenting new forms of communications is a<br />

mandatory task that political practitioners have to deal with during<br />

theirs daily routine.<br />

After the end of their project, interviewees perceive to have left<br />

two challenges unanswered. The first refers to the bridging the<br />

online world barrier. Publicizing the MCR’s initiative beyond<br />

those who already had an interest in the topic is described as a<br />

very difficult (but still mandatory) task. Interviewees say to have<br />

attended as many offline conferences and events as possible, and<br />

to also have targeted media venues to increase their reach and<br />

visibility. Even so, considering the geographic and social<br />

characteristics of the country, the overall understanding is that the<br />

online barrier has been only merely scratched. The second<br />

challenge refers to controlling political outcomes of the


experience once the consultation is over. Draft legislation have no<br />

power of law, and more than one year has passed and it has not<br />

being voted in Congress. As interviewees perceive, online<br />

consultations increase the visibility of the drafted legislation, its<br />

speeds the process of preparing draft legislation for a vote, and it<br />

reduces the chances of politicians suggesting U-turn amendments.<br />

Nonetheless, at the end, the result of the deliberative experience<br />

will only be translates as legislation when and if the Congress<br />

votes on it.<br />

3.3 Lessons Learned<br />

As we can conclude when we compare how “offline” and “online”<br />

policy forums, decisions taken during early stages of designing<br />

policy forums about what to deliberate over are much similar<br />

between online and offline experiences than the same comparison<br />

between how technology is used for deliberation in offline and<br />

online experiences. The experimental and rapidly changing nature<br />

of initiatives such as the MCR project does not mean that policy<br />

decisions taken by policy makers are randomly taken; at the same<br />

time, they do challenge the understanding of how well-established<br />

policy making practices (such as mapping competing policy<br />

agendas before deciding on what policy agenda to adopt) interact<br />

with experimental practices of policy making with the aid of web<br />

2.0 tools.<br />

As the third section of this article discussed, we need to<br />

understand first how institutions, technology and people interact<br />

to create a successful and stimulating online policy forum. The<br />

section suggested as hypotheses four contextual elements needed<br />

to start an online consultation project, namely (a) a governmentbased<br />

institution with a real interest in direct public participation,<br />

(b) an active online community with a strong interest in the topic<br />

under discussion, (c) an active think thank institution willing to<br />

bring its own expertise and influence to the project, and (d) a web<br />

2.0 interface capable of engaging policymakers and citizens in a<br />

coherent narrative structure for deliberation.<br />

The fourth section continued the debate around the importance of<br />

institutions, evaluating how technology and deliberative norms<br />

interact in online consultation projects. The section focused on<br />

how policy makers decided on what issues to deliberate over, and<br />

how technology would be used to mediate deliberation; It also<br />

compared challenges faced by political practitioners in designing<br />

online and offline policy forums, focusing on four key decisions<br />

policy makers have to make during early stages of online<br />

consultation initiatives, namely: (a) what policy issues should be<br />

open or closed for people to deliberate over; (b) what technologies<br />

to use to mediate the debate; (c) how and when to moderate<br />

contributions; and (d) how to translate contributions into a<br />

properly formatted legal policy document.<br />

3.4 Conclusion<br />

The main argument pushed forward in this article is that<br />

understanding the role of web 2.0 tools in designing online<br />

consultation forums requires understanding the role of institutions<br />

sponsoring the use of such technology for policy making<br />

purposes.<br />

Without direct support of government-based institutions (in this<br />

case, the Ministry of Justice and the Ministry of Culture), as well<br />

as the support given by sponsoring think tank institutions (in this<br />

case, the Centro de Tecnologia e Sociedade, FGV/RJ),<br />

42<br />

contributions of the general public shared with the aid of web 2.0<br />

would be unable to result in policy change. In fact, in a<br />

comparative analysis of the MCR project with a governmentsponsored<br />

similar initiative in Uruguay [1], we argued that<br />

achieving (or not) support of government-based institutions,<br />

particularly in the case of Latin American experiences, is a vital<br />

criterion to evaluate the overall project success.<br />

The MCR project is not a case of success due the role of<br />

technology itself; instead, the findings presented here show that<br />

the project succeeded mainly due to the participation, expertise<br />

and engagement of institutions sponsoring the initiative. In other<br />

words, although technology is a key element to understand the<br />

uniqueness of the MCR project, web 2.0 tools mattered because of<br />

the institutions that moderated the use of technology for policymaking<br />

objectives in the first place. We thus support the<br />

arguments of Blumler and Coleman who say that “for democratic<br />

participation to have a meaningful impact upon political outcomes<br />

there is a need for inclusive and accountable institutions that can<br />

provide a space for consequential interaction between citizens and<br />

their elected representatives” [2] (p. 3).<br />

4. ACKNOWLEDGMENTS<br />

This project is funded by the Fundación Comunica (Project<br />

Impacto 2.0) and by the Singapore Internet Research Centre<br />

(Project SIRCA II). The International Development Research<br />

Centre (IDRC), Canada, sponsored both projects.<br />

Version Note: This paper received constructive feedback<br />

from the ICEGOV reviewing process. Due to the nature of the<br />

project, improvements were still on course by the submission<br />

deadline of 6th Aug 2012. An extended version of the paper<br />

including new material on theoretical framework, future research<br />

recommendations, and methodology design will be available at<br />

the http://ofabro.com website by 10th Oct 2012.<br />

5. REFERENCES<br />

[1] Beltramelli, F. et al. 2012. La web 2.0 y la consulta de<br />

políiticas púublicas en Améerica Latina: el caso del<br />

Marco Civil en Brasil y el caso uruguayo sobre TV<br />

Digital en una perspectiva comparada. Alaic. (2012).<br />

[2] Coleman, S. and Blumler, J.G. 2009. The Internet and<br />

democratic citizenship : theory, practice and policy.<br />

Cambridge University Press.<br />

[3] Coleman, S. and Gøtze, J. 2001. Bowling Together :<br />

Online public engagement in policy deliberation.<br />

Retrieved January. Hansard Society.<br />

[4] Fischer, F. 2003. Reframing public policy : discursive<br />

politics and deliberative practices. Oxford University<br />

Press.<br />

[5] Gomes, W. 2007. Transformações da política na era da<br />

comunicação de massa. Paulus.<br />

[6] Habermas, J. et al. 2004. After Habermas : new<br />

perspectives on the public sphere. Blackwell Pub. :<br />

Sociological Review.<br />

[7] O’Reilly, T. 2005. What Is Web 2.0? Design Patterns and<br />

Business Models for the Next Generation of Software.<br />

Author’s webpage.


[8] Putman, R.D. 1994. Making Democracy Work: Civic<br />

Traditions in Modern Italy [Paperback]. Princeton<br />

University Press.<br />

[9] Santarem, P.R. da S. 2010. O direito achado na rede: a<br />

emergência do acesso à Internet como direito<br />

fundamental no Brasil. UNB.<br />

[10] Steibel, F. and Coleman, S. 2011. The problem of<br />

negative advertising: content-based regulation of political<br />

43<br />

advertising in Brazil and in the US. Institute of<br />

Communications Studies. University of Leeds.<br />

[11] The Public Index: 2012. http://thepublicindex.org/about.<br />

Accessed: 2012-01-13.<br />

[12] Wright, S. and Street, J. 2007. Democracy, deliberation<br />

and design: the case of online discussion forums. New<br />

Media & Society. 9, 5 (Oct. 2007), 849-869.


E-Participation in the Era of Web 2.0: Factors Affecting<br />

Citizens’ Active E-Participation in Local Governance<br />

Jooho Lee<br />

University of Nebraska at Omaha<br />

6001 Dodge Street<br />

Omaha, Nebraska 68182<br />

1-402-554-2756<br />

jooholee@unomaha.edu<br />

ABSTRACT<br />

The study develops a model of active e-participation and tests it in<br />

the context of local governance. By building on and extending the<br />

existing literature on citizen participation, technology acceptance<br />

model and social networks, the study asserts that citizens’<br />

perceptions of the intrinsic and instrumental value of participation,<br />

and the strength of their social networks are associated with their<br />

active e-participation. Using the 2009 E-Participation Survey data<br />

collected from Seoul Metropolitan Government, we found that eparticipants<br />

actively use e-participation when they perceive a<br />

greater intrinsic value of e-participation. By further analyzing<br />

Male and Female models separately, we also found that male eparticipants<br />

who perceive greater instrumental value of eparticipation<br />

are likely to use e-participation actively. The<br />

findings, however, indicate that women who perceived a greater<br />

intrinsic value of e-participation and are embedded in weaker<br />

offline social networks are likely to actively use e-participation.<br />

Categories and Subject Descriptors<br />

H.4.3<br />

General Terms<br />

Management, Human Factors<br />

Keywords:<br />

E-Participation, TAM, Intrinsic and Instrumental Motivation,<br />

Social Networks<br />

1. INTRODUCTION<br />

Recently, government embraces Web 2.0 – various networked<br />

applications as a platform for user-generated information and<br />

collaboration on the Web [1] – to facilitate various forms of<br />

electronic participation (e-participation) such as online policy<br />

forums. E-participation is broadly defined as web-based<br />

applications enabling government to provide information and<br />

support “top-down” engagement, and/or to foster “ground-up”<br />

efforts to empower citizens in order to gain their support [2]. In<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that<br />

copies bear this notice and the full citation on the first page. Copyrights<br />

for components of this work owned by others than ACM must be<br />

honored. Abstracting with credit is permitted. To copy otherwise, to<br />

republish, to post on servers or to redistribute to lists, requires prior<br />

specific permission and/or a fee.<br />

ICEGOV '12, October 22 -­‐ 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-­‐1-­‐4503-­‐1200-­‐4/12/10…$15.00.<br />

44<br />

Soonhee Kim<br />

Syracuse University<br />

306 Eggers Hall<br />

Syracuse, New York 13244<br />

1-315-443-1282<br />

soonheekim@maxwell.syr.edu<br />

this research, we focus on a “ground-up” approach to eparticipation.<br />

A growing body of literature has touted eparticipation<br />

as a means of facilitating greater citizen participation<br />

in the policy making process. The literature, however, has left<br />

significant gaps in our understanding of the motivational and<br />

social factors affecting citizens’ active use of new technology in<br />

the context of citizen participation. Considering that eparticipation<br />

using Web 2.0 is primarily driven by citizens, not<br />

government, the potential of e-participation is problematic when it<br />

is not actively used by citizens. To fill some of these gaps, this<br />

study explores how citizens’ active use of e-participation is<br />

facilitated by their perceptions of intrinsic and instrumental values<br />

of e-participation and strength of social networks where citizens<br />

are embedded in an offline setting.<br />

To test research hypotheses, the study uses the 2009 E-<br />

Participation Survey data collected from the members of Cheon<br />

Man Sang Sang Oasis (hereafter Oasis), which is an eparticipation<br />

program run by Seoul Metropolitan Government<br />

(SMG) in South Korea since 2006. As a form of online policy<br />

forum, the Oasis has served as an e-participation tool for citizens<br />

to participate in policy making, especially the policy agenda<br />

setting process [3]. Using Oasis, citizens view, submit and share<br />

their ideas and suggestions on SMG policies associated with<br />

community and governance issues. Specifically, the Oasis is<br />

equipped with Web 2.0 functions to offer well-organized and<br />

systematic services including participants-led creation of their<br />

policy inputs on proposed SMG policies and collaboration with<br />

other participants to share their policy inputs and feedback.<br />

2. MODEL AND HYPOTHESES<br />

From the citizens’ perspective, this study focuses on two types of<br />

citizen participation values. The intrinsic value of citizen<br />

participation has been supported because it is an essential means<br />

of building and sustaining democratic systems by enabling<br />

citizens to be more educated, developed, and informed [4].<br />

Advocates of the instrumental value have highlighted that citizen<br />

participation serves as a means of affecting and monitoring<br />

government bureaucracy, which enhances citizens’ control over<br />

administrative process and, in turn, promotes a sense of ownership<br />

and empowerment [4, 5].<br />

The second stream of research reviewed for the development of<br />

study model is the technology acceptance model (TAM). The<br />

essence of TAM is that individuals adopt IT applications when<br />

they perceive usefulness and ease of use of the IT applications [6].<br />

TAM has been widely extended by embracing new constructs<br />

such as trust (see Venkatesh et al [7] for review) in diverse<br />

research context [8].


The third stream of studies reviewed is social network theory.<br />

Social network literature has considered social networks as<br />

resources in which people can access information, gain social<br />

support and receive recognition through their social networks [9].<br />

Advocates of strong social networks argue that people embedded<br />

in strong social networks enjoy benefits in terms of accessing<br />

information, exchanging social support and receiving recognition<br />

easily and promptly [10]. Proponents of weak social networks<br />

emphasize that people embedded in weak social networks can be<br />

provided a better opportunity to access diverse groups of people<br />

and, in turn, to gain nonredundant and new information, to enjoy<br />

autonomy, and to manage them with a lower cost [11].<br />

By building on and extending the existing literature on citizen<br />

participation, TAM, and social networks, this research asserts that<br />

citizens’ use of e-participation is affected by their perception of<br />

intrinsic and instrumental values of e-participation, and the<br />

strength of their offline social networks.<br />

2.1 Intrinsic Value of e-Participation<br />

The intrinsic value of e-participation refers to citizens’ perception<br />

of developmental, educative, and informative effects of their eparticipation<br />

in the policy decision making process [5, 6]. The<br />

underlying theory of the intrinsic value relies on intrinsic<br />

motivation in that motivation for active participation mainly stems<br />

from inside an individual rather than from any external rewards<br />

such as political gains.<br />

Proponents of the intrinsic value of citizen participation have<br />

highlighted that citizen participation serves as a leverage to<br />

promote self-esteem and self-fulfillment and develop the attitudes<br />

and skills of citizenship [12]. Also, citizen participation provides<br />

an opportunity to be better informed of their community issues<br />

[13]. Through the experience of citizen participation, citizens gain<br />

a sense of belonging in their community, which facilitates their<br />

willingness to learn more about community issues [4, 13].<br />

Moreover, citizen participation allows citizens to learn the art of<br />

deliberation and compromise, foster an active and public-spirited<br />

moral character and, in turn, realize their potential contribute to<br />

the community [4]. Thus, it is likely that citizens are motivated to<br />

actively use e-participation when they perceive greater intrinsic<br />

value created in the process of e-participation.<br />

H1: E-participants who perceive greater intrinsic value of eparticipation<br />

are more likely to actively use e-participation.<br />

2.2 Instrumental Value of e-Participation<br />

This study also asserts that citizens’ active use of e-participation is<br />

extrinsically motivated. Extrinsic motivation theory emphasizes<br />

that individuals perform a behavior to achieve instrumental values<br />

such as economic and political rewards [14]. In TAM, the<br />

perceived usefulness construct has been used to capture the role of<br />

individuals’ extrinsic motivation in adopting new technology [15].<br />

In the context of e-participation, instrumental value indicates eparticipants’<br />

perceptions of influence on governmental decision<br />

making. Gaining political rewards such as greater influence on<br />

government may serve as a motivation to actively use eparticipation.<br />

Also, as e-participation is based on Web 2.0, social<br />

rewards such as recognition are available to e-participants in that<br />

e-participants and government bureaucrats observe and interact<br />

one another by posting and replying to citizens’ ideas or<br />

comments. It is likely that e-participants are aware of an<br />

opportunity to receive social rewards from peer e-participants and<br />

45<br />

government by using e-participation. Thus, political and social<br />

rewards serve as incentives for e-participants to actively use eparticipation.<br />

H2: E-participants who perceive greater instrumental value of eparticipation<br />

are more likely to actively use e-participation.<br />

2.3 Strength of Social Networks<br />

Strength of social networks refers to the extent to which<br />

individuals intensively interact with others [11]. This study argues<br />

that e-participants embedded in strong offline social networks are<br />

likely to actively use e-participation. Due to the nature of online<br />

interaction (e.g. chat with anonymous friends), people tend to be<br />

connected to one another through weak social networks [16]. Thus,<br />

online social networks can serve as a complementary means for<br />

mobilizing resources such as new information at a lower cost.<br />

Also, e-participants who already have strong offline networks are<br />

likely to have greater ability in using e-participation. Citizens’ eparticipation<br />

can be considered as less active if they simply search<br />

for information and observe the postings of others. The lack of<br />

active e-participation barely creates an opportunity for eparticipants<br />

to build online social networks. Thus, to build online<br />

social networks through e-participation program, e-participants<br />

must initiate interactions by being exposed to peer e-participants<br />

such as through posting their suggestions or replying to others’<br />

postings in the e-participation programs. It is likely that people<br />

embedded in strong offline social networks are equipped with<br />

knowledge about how to initiate, build, and sustain social<br />

networks, which enhances their capability to use e-participation<br />

actively.<br />

H3: E-participants embedded in strong offline social networks are<br />

likely to actively use e-participation.<br />

3. RESEARCH METHOD<br />

To test research hypotheses, we used the 2009 E-participation<br />

Survey data collected from a web-based survey. The sample frame<br />

was 10,136 citizen members of Oasis who have posted at least one<br />

suggestion over the last three years. 1,076 participants responded<br />

to the survey (response rate of 10.6 percent).<br />

For the test of the hypotheses, this research used one survey item<br />

(i.e. the number of suggestions posted by individual users on the<br />

Oasis program) to measure active e-participation. The survey<br />

participants were asked to indicate the extent to which they posted<br />

their suggestions on Oasis using a 6-point scale ranging from<br />

“Never” (1) to “More than 10 suggestions” (6).<br />

We used four survey items to measure e-participants’ perception<br />

of the intrinsic value of e-participation. By modifying Davis’s [8]<br />

perceived usefulness scale, we used four items to capture<br />

perceived instrumental value. The participants were asked to<br />

indicate the extent to which they agreed with the those items using<br />

a 5-point Likert scale ranging from strongly disagree (1) to<br />

strongly agree (5). To measure e-participants’ strength of social<br />

networks, this study used five items regarding the frequency of<br />

going out with different social groups. Five items were designed<br />

with a 7-point Likert-type scale ranging from “Every Day” (1) to<br />

“Once a Year” (7). Correlation among the items was slightly<br />

lower than threshold (Cronbach Alpha=.67). The average scores<br />

of the five items were used in the analysis.<br />

As control variables, we included perceived ease of use, social<br />

altruism, political participation, trust in government and e-


participation experience. As one of core construct of TAM,<br />

perceived ease of use was included as a control variable. To<br />

measure perceived ease of use, this study used the average scores<br />

of four survey items with 5-point Likert scale (Cronbach<br />

Alpha=.83). To measure social altruism, we used a single item as<br />

to respondents’ volunteer experience. This item was rated on a 7point<br />

Likert scale ranging from “Never” (1) to “Every Day” (7).<br />

To capture the degree of political participation, we measured<br />

voting participation. We used an index of dummy variables that<br />

include the 2008 Presidential Election, 2008 National General<br />

Election, 2006 Seoul City Mayor Election and 2006 Seoul<br />

Council Member Election. To control for the effect of trust in an<br />

IT service provider, this study used a measure of trust in the<br />

government who provides the e-participation programs. Trust in<br />

government is measured by a single item: Do you trust that SMG<br />

works in your best interests? The item was rated on a 5-point<br />

Likert scale ranging from strongly disagree (1) to strongly agree<br />

(5). E-participation experience captures the ability of eparticipants<br />

with regard to the use of Web 2.0 technologies. This<br />

study includes it as a control variable in order to control the effect<br />

of the difference between experienced and inexperienced<br />

participants on the degree of e-participation activities. The<br />

respondents were asked to indicate the length of membership in<br />

Oasis. This question was scaled from 4 years (1) to less than 1<br />

year (4). To capture the effects of respondents’ socio-economic<br />

status on active e-participation, we included gender, age,<br />

education, and income as control variables.<br />

4. RESULTS AND IMPLICATIONS<br />

Table 3 shows the results of OLS regression analysis of two<br />

models. Model 1 is a baseline model with only control variables<br />

while Model 2 includes three independent variables plus control<br />

variables. Consistent with H1, Model 2 demonstrates a positive<br />

and significant relation between perceived intrinsic value of eparticipation<br />

and active e-participation, which confirms prior<br />

empirical studies on the effect of intrinsic motivation on new<br />

technology adoption [17]. However, H2 and H3 are not supported<br />

by the data.<br />

Model 1 Model 2<br />

Beta (S.E) Beta (S.E)<br />

Perceived Intrinsic Value .20** (.09)<br />

Perceived Instrumental Value .10 (.09)<br />

Strength of Social Networks -.07 (.05)<br />

Perceived Ease of Use .04 (.07) -.07 (.08)<br />

Social Altruism .11*** (.03) .12*** (.03)<br />

Voting Participation .02 (.04) .03 (.04)<br />

Trust in Government .26 *** (.05) .19*** (.06)<br />

E-participation Experience .16 *** (.04) .17*** (.05)<br />

Male .23 ** (.11) .28** (.11)<br />

Age .03 *** (.00) .03** (.00)<br />

Age 2 -.00 *** (.00) -.00*** (.00)<br />

Education .04 (.04) .05 (.04)<br />

Income .01 (.03) .02 (.03)<br />

N 874 816<br />

Adjusted R .14 .15<br />

F 14.93 *** 12.35***<br />

Note: For two-tail tests; * p < .10; ** p < .05; *** p < .01<br />

Table 3 OLS Regression Results: Aggregated Model<br />

46<br />

The results also show that male e-participants reported posting a<br />

greater number of suggestions than female e-participants. This<br />

finding is inconsistent with recent empirical studies on the role of<br />

gender in Web 2.0 such as social media use [17]. To better<br />

understand the role of gender in active e-participation, we further<br />

analyze the data by disaggregating the sample into two groups:<br />

male and female samples. The results of Chow test allowed us to<br />

test two groups separately using male and female data sets<br />

(F=4.60, p < .001). Table 4 shows the results of a separate OLS<br />

analysis of male and female data sets.<br />

Male Model Female Model<br />

Beta (S.E) Beta (S.E)<br />

Perceived Intrinsic Value .12 (.11) .35** (.16)<br />

Perceived Instrumental Value .18* (.11) -.12 (.16)<br />

Strength of Social Networks -.02 (.06) -.19** (.09)<br />

Perceived Ease of Use -.09 (.09) -.05 (.12)<br />

Social Altruism .16*** (.04) .06 (.05)<br />

Voting Participation .10* (.05) -.06 (.06)<br />

Trust in Government .18** (.07) .13 (.11)<br />

E-participation Experience .14** (.05) .26*** (.08)<br />

Age .03*** (.01) .02*** (.01)<br />

Age 2 -.00*** (.00) -.00 (.00)<br />

Education .03 (.05) .10 (.08)<br />

Income .03 (.04) .00 (.05)<br />

N 619 196<br />

Adjusted R .14 .14<br />

F 9.78*** 3.74***<br />

Note: For two-tail tests; * p < .10; ** p < .05; *** p < .01<br />

Table 4 OLS Regression Results: Male and Female Models<br />

Table 4 shows that only perceived instrumental value is<br />

significant in the Male model, while perceived intrinsic value and<br />

strength of social networks are significant in the Female model.<br />

The findings imply that male e-participants are more likely to put<br />

a greater number of postings in the e-participation program<br />

because they might perceive e-participation as a means of<br />

acquiring a sense of ownership, influence, and/or empowerment<br />

[18]. Meanwhile, female citizens’ active use of e-participation is<br />

influenced by their perceptions of greater intrinsic value. Female<br />

e-participants are more likely to use e-participation actively<br />

because they might perceive e-participation as a means of being<br />

informed, educated and developed [19].<br />

In addition, the results exhibit that there are gender differences in<br />

the effects of social networks on active e-participation. The Male<br />

model shows that there is no significant relationship between the<br />

strength of social networks and active e-participation. However,<br />

Female model depicts the negative and significant effects of the<br />

strength of social networks on active e-participation. That is,<br />

female respondents reported that they actively use e-participation<br />

when they are embedded in weaker offline social networks. In an<br />

offline setting, underrepresented groups of people are often<br />

embedded in low-density networks or take peripheral positions<br />

[20]. In weak social networks, women are likely to face structural<br />

constraints in order to express their interests, to access<br />

information, and to receive recognition in a timely manner. These<br />

constraints may serve as motivating factors for women to seek<br />

active e-participation as a supplementary tool for expressing their


interests, gaining access to information, sharing information with<br />

others, and receiving recognition.<br />

5. CONCLUSION<br />

This exploratory study contributes to e-participation literature by<br />

uncovering both motivational and social factors affecting citizens’<br />

active e-participation. The study findings imply that local<br />

governments may need to pay more attention to how to design and<br />

evaluate e-participation programs to enhance the extrinsic value of<br />

e-participation to facilitate male e-participants’ active eparticipation.<br />

In order to better understand female participants’<br />

use of e-participation, further attention should also be paid to how<br />

to design e-participation programs to improve their intrinsic value<br />

and understand the structure of offline social networks where<br />

female participants are embedded. At least, three limitations<br />

should be noted: external validity, cross-sectional research design<br />

and online social networks. The results of this study could be<br />

outcomes of unique citizen engagement evolution that are affected<br />

by South Korea’s historical, political, and cultural contexts.<br />

Accordingly, more in-depth case studies in various regions and<br />

countries are needed to advance active e-participation models in<br />

local governance. Also, we suggest longitudinal research in order<br />

to better understand the factors affecting the sustainability of<br />

active e-participation. Since this study analyzed the role of offline<br />

social networks on active e-participation, it is limited to<br />

understanding how online social networks affect e-participation<br />

behavior. Therefore, future studies are needed to extend the study<br />

model by incorporating the role of online social networks.<br />

6. ACKNOWLEDGMENTS<br />

The authors would like to thank Seoul Metropolitan Government<br />

for supporting this research project.<br />

7. REFERENCES<br />

[1] Wikipedia. Web 2.0. Accessed July 25 th , 2012,<br />

http://en.wikipedia.org/wiki/Web_2.0<br />

[2] Macintosh, A., and Whyte, A. Towards an evaluation<br />

framework for eParticipation. Transforming government: People,<br />

Process & Policy, 2, 1 (2008), 16-30.<br />

[3] Tambouris, E., Liotas, N., and Tarabanis, K. A framework for<br />

assessing e-participation projects and tools. Proceedings of the 40 th<br />

Hawaii International Conference on Systems Sciences. 2007.<br />

[4] Roberts, N. Public deliberation in an age of direct citizen<br />

participation. American Review of Public Administration. 34, 4<br />

(2004), 315-353.<br />

[5] Box, R., Citizen Governance: Leading American Communities<br />

into the 21st Century. Sage Publication, Thousand Oaks, CA, 2007.<br />

[6] Davis, F., Perceived usefulness, perceived ease of use, and<br />

user acceptance of information technology, MIS Quarterly, 13, 3<br />

(1989), 319-339.<br />

47<br />

[7] Venkatesh, V., Morris, M., Davis, G., and Davis, F. User<br />

acceptance of information technology: Toward a unified view.<br />

MIS Quarterly, 27, 3 (2003), 425-478.<br />

[8] Schaupp, L. C., Carter, L., and Hobbs, J. E-file adoption: A<br />

study of U.S. taxpayers' intentions. Computers in Human<br />

Behavior. 26, 4 (2010), 636-644.<br />

[9] Ibarra, H., Kilduff, M., and Tsai, W. Zooming in and out: Connecting<br />

individuals and collectives at the frontiers of organizational network<br />

research. Organizational Science, 16 (2005), 359-371.<br />

[10] Lee, J., and Kim, S. Exploring the role of social networks in<br />

affective organizational commitment: Network centrality, strength<br />

of ties, and structural holes. American Review of Public<br />

Administration, 41 (2011), 205-223.<br />

[11] Granovetter, M. The strength of weak ties. American<br />

Journal of Sociology, 78 (1973), 1360-1380.<br />

[12] King, C., and Stivers, C. Government is US: Public<br />

Administration in an Anti-Government Era. Sage Publications,<br />

Thousand Oaks, CA, 1998.<br />

[13] Patterman, C. Participation and Democratic Theory,<br />

Cambridge University Press, New York, 1975.<br />

[14] Deci, L. Intrinsic Motivation. New York, Plenum Press, 1975.<br />

[15] Venkatesh, V., and Davis, D. 2000. A theoretical extension<br />

of the technology acceptance model: Four longitudinal field<br />

studies. Management Science. 46 (2000), 186–204.<br />

[16] Easley, D., and Kleinberg, J. Strong and weak ties. In<br />

Networks, Crowds, and Markets: Reasoning about a Highly<br />

Connected World. Cambridge University Press, NY. 2010, 47-84.<br />

[17] Hampton, K., Goulet, L., Rainie, L., and Purcell, K. Social<br />

Networking Sites and Our Lives. Pew Research Center’s Internet<br />

& American Life Project, Washington D.C.<br />

[18] Prentice, D. A., and Carlsmith, K. M. Opinions and<br />

personality: On the psychological functions of attitudes and other<br />

valued possessions. In Why we evaluate functions of<br />

attitudes. Lawrence Erlbaum, Mahwah, NJ, 2000, 223-248.<br />

[19] Bozionelos, N., and Bozionelos, G. Instrumental and expressive<br />

traits: Their relationship and their association with biological sex.<br />

Social Behavior and Personality. 31 (2003), 423-430.<br />

[20] Burt, R. Structural holes: The social structure of competition.<br />

Harvard Business Press, Cambridge, M.A. 1992.


Genres of Communication in Activist eParticipation:<br />

A Comparison of New and Old Media<br />

ABSTRACT<br />

In this paper, we examine the genres of communication in an<br />

activist case in a Norwegian municipality. As genres evolve over<br />

time, and the emergence of new genre properties is a sign of a<br />

mature technology, we compare the genres used in traditional<br />

paper-based media with the genres used in social media, to<br />

examine the maturity of social media as a medium for activist<br />

eParticipation. We also discuss the usage patterns of traditional<br />

vs. social media, and their relation to the public sphere. Our<br />

findings indicate that so far, the genres used for activism in social<br />

media are very similar to their offline counterparts, with some<br />

new genres and genre characteristics emerging. Social media is<br />

moving towards maturity, but still has a way to go.<br />

Categories and Subject Descriptors<br />

K.4. [Computers and Society]<br />

General Terms<br />

Measurement, Documentation, Human Factors, Theory<br />

Keywords<br />

eParticipation, Social Media, Genre Theory, Public Sphere<br />

1. INTRODUCTION<br />

Our media and communication habits are increasingly moving<br />

towards the digital domain and to social media. While political<br />

communication has been lagging behind, this area is also<br />

increasingly becoming digitized [1, 2], and as such is forced to<br />

change in order to adapt to the logic of two-way communication<br />

media [3]. This move towards new media has been hastened by<br />

what is perceived as a lessening of civic engagement in traditional<br />

channels. Voter turnout is in decline [4], there are fewer members<br />

of political parties, and less interest for political participation and<br />

debate [5]. These perceived threats to democracy have led<br />

government towards a number of projects where digital media is<br />

used in an attempt to boost participation and civic engagement [2,<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Marius Rohde Johannessen<br />

University of Agder, dept. of Information Systems<br />

Service box 422, NO-4604 Kristiansand, Norway<br />

+47 38 14 17 14<br />

marius.johannessen@uia.no<br />

48<br />

6, 7].<br />

The public sphere, said to have disappeared in the age of mass<br />

media, has re-emerged online [8, 9]. But how new is the online<br />

public sphere? How much has political communication online<br />

been adapted to the two-way, inclusive logic of “new” media?<br />

To answer this question, we look towards genre theory. Genre<br />

theory tells us that communicative acts recurring over time, with<br />

similar form and function, can be analyzed and categorized into a<br />

set of communication genres [10]. Genres used within an<br />

organization or a given context can further be categorized into a<br />

repertoire of suitable genres for a given context [11].<br />

When moving from “old” to “new” media, genres from the old<br />

medium will typically be copied as-is and used for some time in<br />

the new. After some time, new genres emerge, and old ones are<br />

adapted to fit the new medium. The maturity of a medium can to<br />

some degree be measured by examining the genres of the new and<br />

old medium [12]. Maturity is in this case understood as the degree<br />

to which the actors involved in using the medium agree on the<br />

conventions and rules for the medium, as well as the emergence of<br />

new genres, or old genres which are adapted to the functionality<br />

of the new medium.<br />

In this paper, we identify the genre systems used for political<br />

activist communication in new and old media, through a case<br />

study of an urban development project in a mid-sized Norwegian<br />

city. The actors involved in the case have used both traditional<br />

print media, social media and the Internet in their communication,<br />

and this allows us to categorize the same message as different<br />

genres in different media.<br />

In addition, we discuss these findings against the ideals of the<br />

public sphere [13]. Are the new media mature enough to cater for<br />

a public sphere, or are we still in transition between the “old” and<br />

“new”? And if there is an online public sphere in this case, what<br />

kind of public sphere is it? Finally, we discuss how social capital<br />

impacts participation and the public sphere.<br />

The rest of the paper is structured as follows: Section two presents<br />

our theoretical foundation, consisting of the public sphere, genre<br />

theory and social capital. Sections three and four outline the<br />

research method we have applied, and presents a thick case<br />

description. In section five we present our findings, which are<br />

separated into the genre analysis of the new and old media, and an<br />

analysis of the extent to which these genre systems support a<br />

public sphere. Finally, we present our conclusions, limitations and<br />

some possibilities for future research.


2. THEORETICAL FOUNDATION<br />

2.1 The Public Sphere<br />

The Public Sphere is defined as “that domain of our social life in<br />

which such a thing as public opinion can be formed”. An<br />

autonomous “place” where citizens can debate government policy<br />

and act as an informal correction when governments step out of<br />

bounds [14], separated from the state and economic interests [14,<br />

15]. The public sphere can be understood as a mediating layer<br />

between government and citizen, where citizens discuss and agree<br />

on issues of public interest, as It is “the interaction between<br />

citizens, civil society, and the state, communicating through the<br />

public sphere, that ensures that the balance between stability and<br />

social change is maintained.” [16]<br />

The existence of a public, which is aware of itself and able to<br />

form an opinion, is essential for the Public Sphere. When the<br />

bourgeoisie class began to challenge the power of the church and<br />

state during the formation of the European nation states in the 19 th<br />

century, we saw the first modern example of the public forming<br />

an opinion. Before, in the feudal age, the church and kings of<br />

Europe had no use for a public in the modern sense of the word,<br />

as the kings and nobility had no electorate to hold them<br />

accountable for their decisions [17]. In modern representative<br />

democracy this has changed. After the initial formation of the<br />

European nations followed two devastating world wars, several<br />

nations falling back from democracy to dictatorship, and back to<br />

democracy, and all of this has contributed to a strengthening of<br />

the western world’s belief in democracy and governments’<br />

accountability to the public [17].<br />

Public opinion can be understood as the shared understanding of<br />

an issue, reached through debate by rational citizens [18] , and is<br />

considered a necessary function in a modern democracy: “The<br />

public sphere is an essential component of sociopolitical<br />

organization because it is the space where people come together<br />

as citizens and articulate their autonomous views to influence the<br />

political institutions of society” [16].<br />

Some claim the Public Sphere no longer exists, due to the spread<br />

of mass media and commoditization of information, along with<br />

the disappearance of the old “salons” and other physical spaces<br />

where the bourgeoisie assembled and debated. When everyone are<br />

allowed to participate, the public sphere holds no value [19]. This<br />

view is controversial, and has been criticised for being overtly<br />

elitist and for not taking into consideration the changing times we<br />

live in (Hartley, 1996). Rather than longing for the salons of old, a<br />

number of researchers have pointed to the Internet as the medium<br />

for modern day Public Sphere [8, 9, 20, 21]. Studies of political<br />

participation indicate that Internet use has led to an increase in the<br />

public’s political interest [22], and it is claimed that the Public<br />

Sphere of today is no longer a physical place. Rather, it is found<br />

in the media and in networks and acts as the<br />

“cultural/informational repository of the ideas and projects that<br />

feed public debate.” [16].<br />

There is, however, a problem with the online Public Sphere.<br />

Online activities, even more so than their offline counterparts,<br />

tend to be focused around people’s interests, at least in the<br />

Norwegian context. It is a lot easier to pick and choose only that<br />

which we are interested in when we move around on the Internet<br />

[23]. Interest-based communities and segregation can easily<br />

become a democratic problem. When people socialize only with<br />

others who have the same interests, points of view and likes and<br />

49<br />

dislikes, we lose that space in society where people of diverse<br />

backgrounds can assemble, debate, and shape public opinion [24].<br />

And while the Internet is promising, not everyone agrees that we<br />

currently have a functioning Public Sphere. A lack of attention to<br />

issues of public interest, our habits as online consumers as well as<br />

general political disinterest can explain why the internet has not<br />

revitalized the public sphere to the extent some scholars have<br />

expected [25].<br />

Habermas, who has been criticized for being elitist, redefines the<br />

public sphere to better suit the current media environment. He<br />

concludes that two things are needed for a networked and mediabased<br />

Public Sphere: “mediated political communication in the<br />

public sphere can facilitate deliberative legitimation processes in<br />

complex societies only if a self-regulating media system gains<br />

independence from its social environments and if anonymous<br />

audiences grant a feedback between an informed elite discourse<br />

and a responsive civil society.”[26].<br />

Several scholars have operationalized the requirements for a<br />

Public Sphere. Dahlberg [13] has identified six requirements: A<br />

public sphere must be Autonomous from state and economic<br />

power. It should be based on a rational-critical discourse, where<br />

participants are engaged in reciprocal critique of normative<br />

positions that are criticisable rather than dogmatic claims.<br />

Participants must be reflective, and critically examine their<br />

cultural values, assumptions, and interests, as well as the larger<br />

social context. Participants must attempt to understand the<br />

argument from the other's perspective. Each participant must<br />

make an effort to make known all information relevant to the<br />

particular problem under consideration, and everyone is equally<br />

entitled to introduce and question ideas and issues.<br />

Trenz & Eder [27] presents four ideal-types of the Public Sphere,<br />

thereby extending the requirements made by Dahlberg. A Public<br />

Sphere can be discourse-based, based on political protest, on<br />

political campaigning, or simply on consensus. Another issue that<br />

can be measured, especially in cases of online activism, is the<br />

extent to which the online activity is linked with the mainstream<br />

media, and through that to the wider public sphere.<br />

2.2 Social Capital<br />

While the public sphere is the ideal public debate should be<br />

striving for, the concept of social capital can be used to explain<br />

who participates [28]. Social capital refers to<br />

“connections among individuals – social networks and<br />

the norms of reciprocity and trustworthiness that arise<br />

from them … ‘social capital’ calls attention to the fact<br />

that civic virtue is most powerful when embedded in a<br />

sense network of reciprocal social relations. A society of<br />

many virtuous but isolated individuals is not necessarily<br />

rich in social capital.” [29]<br />

Some claim that a high level of social capital is an important<br />

factor in explaining the Scandinavian welfare societies. despite<br />

high taxes, big government and a relatively flat income structure,<br />

the Scandinavian countries are among the richest countries in the<br />

world [30]. The high amount of social capital in Scandinavia acts<br />

as “grease” for transactions, lowering the cost of doing business,<br />

as there is less need for formalized contracts and expensive legal<br />

agreements (ibid.).


Social capital is often measured in terms of individual and<br />

institutional trust and reciprocity, and divided into bonding and<br />

bridging social capital. Trusting individuals lowers barriers to<br />

participation and simplifies transactions, as there is less need for<br />

written contracts and other control measures. Institutional trust<br />

indicates that government institutions such as police, judicial<br />

system and administration are functioning well. Reciprocity, the<br />

degree in which people are willing to give something back when<br />

they receive something, is another measure of social capital [31,<br />

32].<br />

There are several types of social capital. Bonding social capital is<br />

the connections between individuals in a group, such as the<br />

traditional village or a local community. Bridging social capital is<br />

the connection between different groups, where individuals in a<br />

group have ties to individuals in other groups [29]. A third type of<br />

social capital is “maintained social capital”, the ability to keep<br />

one’s connections also when one is physically separated from<br />

them [33].<br />

In Information Systems, social capital have been used to measure<br />

both how technology affects social capital, and how social capital<br />

affects development of technology [32]. Other studies have shown<br />

that the characteristics and user population of social networking<br />

services is important for the level of social capital and for the<br />

outcome of political debate on such sites [34]. And that spending<br />

time in front of screens can increase social capital, depending on<br />

the activities we are conducting [35].<br />

2.3 Genres of Communication<br />

Genre theory has been applied to study communication patterns in<br />

a number of eParticipation studies [36-39]. Genres can act as a<br />

tool for studying the role of communication in social processes<br />

[10]. Genres develop over time, in the interaction between<br />

predefined rules for communication and the people that are<br />

communicating. Genres are useful when studying social media<br />

use in eParticipation, as the introduction of new media over time<br />

often leads to new communication practices which genre theory<br />

allows us to map and analyze [38]. By studying communication<br />

genres instead of the technology used to communicate, we can<br />

discover how communication changes and evolves over time [11].<br />

Genres can be defined using the 5w1h-method By asking where,<br />

why, when, who, what and how, we can uncover the purpose,<br />

contents, placement in time, location, participants, structure and<br />

medium for communication [40, 41]:<br />

o Where tells us where the communication takes place, the<br />

medium being used, or the physical location.<br />

o Why explains the purpose of the genre, as understood by<br />

those using it.<br />

o When refers to the time where communication takes place.<br />

For example, the “job application” genre is enacted when<br />

applying for a job, and needs to be in by a set date.<br />

o Who defines the actors involved in communication, the<br />

sender and receiver of the genre.<br />

o What is the content of the genre, and defines what is being<br />

communicated, and any relations to other genres.<br />

o Finally, How describes the technical needs for delivery of the<br />

genre, for example which medium is being used, or any other<br />

technical necessities.<br />

50<br />

Genres are further identified by having a common content (themes<br />

and topics of the conversation) and form (physical and linguistic<br />

features), as well as technological functionality in genres enacted<br />

through electronic media [12]. A common mistake is to confuse<br />

genre and medium, especially when including functionality in the<br />

analysis. E-mail is a medium, while the job application sent via email<br />

is the genre [10].<br />

It is possible to go beyond single genres, and look at the genre<br />

system. Genre systems are collections of genres that belong<br />

together [41]. For example, the previously mentioned job<br />

application is part of a system where the job listing comes first,<br />

followed by the job application and some kind of feedback on the<br />

application. When examining an entire genre system, we can<br />

analyse communicative practices over time, and how new genres<br />

emerge and influence the ways we communicate [11].<br />

By analysing the genre system of different media, we can see if<br />

there are differences between how the genres are enacted, and<br />

identify the genres that are most used by participants in an<br />

eParticipation project (ibid.). By applying genre theory in the<br />

study of new media forms, we get a more comprehensive analysis<br />

than what we would get from only looking at the functionality of<br />

the technology behind the new medium [11].<br />

3. RESEARCH METHOD<br />

The research was framed as a qualitative case study, of which this<br />

paper is one in a series of planned publications. The objective of<br />

qualitative research is “understanding…by investigating the<br />

perspectives and behavior of the people in these situations and the<br />

context within which they act” [42], and qualitative methods are<br />

appropriate for exploratory studies and for examining how<br />

something happens [42, 43]. The case study examines the<br />

phenomenon in its “natural setting”, collects data from multiple<br />

sources, and the researcher may have limited knowledge about the<br />

outcome of the research [44]. Case studies are particularly suited<br />

for research on new phenomena where the actors’ experiences and<br />

interpretations and the wider context are important factors [45].<br />

Our initial objective for the project as a whole was to explore and<br />

understand how social media was being used by activist groups in<br />

a Norwegian municipality. As part of that objective, the research<br />

question for this paper is how are the genre systems of old and<br />

new media used for activist communication, and how do these<br />

genre systems fit with the public sphere ideal?<br />

The urban planning case was chosen for the following reasons:<br />

The process has a long history, dating back almost 30 years. This<br />

provides rich insights into the process, and especially into how the<br />

introduction of social media has changed the way the actors<br />

communicate. The number of people involved also made access to<br />

interview subjects easy. Further, the first author has followed the<br />

case as a citizen over several years before engaging in it from a<br />

research perspective, which leads to a thorough understanding of<br />

the case context. There is a risk of bias, but we have attempted to<br />

minimize this risk through a constant analysis and questioning of<br />

our findings.<br />

The data used in this case was collected between February and<br />

November 2011. We made 12 semi-structured interviews with<br />

representatives related to the case: Members of the city council<br />

(4), officials from the city administration responsible for<br />

developing the plans (2), the private investor’s representative (1),<br />

local media (1 + informal meetings and e-mail with 2 others),


epresentatives from the three main activist groups (3), and one<br />

representative from the regional governments heritage<br />

department. The interviews were recorded and transcribed. The<br />

interviewer gave a brief introduction to the research project, and<br />

asked the respondents to talk freely within the context of the case.<br />

Interviews should be supplemented by other forms of data [46].<br />

For the findings reported in this paper, this mainly consists of<br />

postings from Facebook groups and letters to the editor. These are<br />

the basis for the genre analysis.<br />

In addition, we attended one workshop meeting and two city<br />

council meetings, where field notes were made and written out.<br />

All documents relevant to the case between 2007 and 2011 that<br />

were made available by the city council were collected and<br />

analyzed. This includes minutes from council meetings,<br />

consultancy reports, architectural plans, formal hearing documents<br />

and the results of two surveys made in relation to the development<br />

project. These data sources are not used explicitly in this paper,<br />

but nonetheless influence our conclusions and as such should be<br />

mentioned.<br />

The data was analyzed using genre theory and the 5W1H<br />

framework [41] to identify the genre systems of old and new<br />

media. Old media is represented by the print edition of the local<br />

newspaper, while new media is represented by several Facebook<br />

groups related to the case. The analysis was inspired by a genre<br />

analysis of a municipal online discussion board [36].<br />

Finally, we wanted to examine how the genre systems of old and<br />

new media were related to the public sphere. This examination<br />

was used following the framework of [28], where several<br />

constructs of a public sphere are measured, including the amount<br />

of social capital among the participants.<br />

4. CASE DESCRIPTION<br />

The case is about a cove of 5 acres, located about 1 km from the<br />

city center of a Norwegian mid-sized city (40.000 inhabitants).<br />

There are two land owners: a private investor and the local<br />

municipality own about 50% each.<br />

Over the past 30 years, there have been a number of plans for<br />

development of the cove. In the 1980’s, the city council decided<br />

to build a new harbor in the area, but the development was halted<br />

and the only structure built was the local hub of a national freight<br />

company, resulting in the cove becoming a no-man’s land of car<br />

parks and freight trucks. The area is very attractive for<br />

development, as it is by the sea and also the last open area close to<br />

the city center in a city where the topography makes development<br />

difficult.<br />

There is strong agreement in the population that something should<br />

be done about the cove. No one is pleased with the current<br />

situation. Between 2001 and 2006 a number of plans were<br />

presented. In 2007, the city council agreed on an area<br />

development plan, and in 2008, the municipality invited several<br />

architect firms to draw new plans for the area based on this<br />

development plan. Plans were presented for a mainly residential<br />

project consisting of six five-story apartment buildings, with the<br />

ground floor reserved for business purposes. The idea behind the<br />

plans was to create a new urban district, with shops, restaurants<br />

and apartments. This was to be an extension of the current city<br />

center.<br />

51<br />

When these plans were presented, local opposition began to arise.<br />

The local residents’ association started campaigning against the<br />

development by talking directly to politicians, writing to the local<br />

newspaper, and setting up stands and organizing protest concerts.<br />

Their main argument was that this was the last area close to the<br />

city center which could be developed into a green recreational<br />

park. They also organized a campaign to have politicians<br />

sympathetic to their cause voted in to the city council in the 2007<br />

municipal election, and succeeded so well that the plans were<br />

downcast by the new city council in 2008.<br />

One year later, new plans were presented. This time the plans<br />

were only for the parts of the area owned by the private investor,<br />

and consisted of three high-rise residential buildings. The idea<br />

behind these plans was that with these high-rise buildings, the city<br />

would have room for a recreational park on the remaining 2.5<br />

acres owned by the municipality.<br />

Once again the residents’ association protested, and this time new<br />

activist groups were formed and joined the opposition. The new<br />

groups consisted of creative professionals, local historians and<br />

heritage people. They still argued for a recreational park in the<br />

entire 5 acre area, but also introduced arguments for retaining the<br />

area’s historical heritage by preserving the view from the sea to<br />

the old wooden houses in the surrounding hills. Once again the<br />

activist groups were able to stop the proposed plans.<br />

In 2010, the municipality restarted the process, and decided to<br />

come up with a new area development plan. After being criticized<br />

for not listening to the citizens when the past plans were laid out,<br />

the municipality decided to run this as an inclusive process.<br />

In 2011, they arranged three workshops prior to the plans being<br />

developed by the city administrators. One of them was open to the<br />

public. The other two were for invited groups only, but included<br />

all three new activist groups, as well as public and private<br />

organizations with a stake in the area. In total, 30 different groups<br />

and organizations were invited to these workshops. Workshop<br />

participants got four different alternatives to work with: The entire<br />

area as a recreational park, 25%, 50% and 75% development. One<br />

plan for each of these alternatives were presented and discussed in<br />

the final workshop.<br />

The workshop participants were somewhat skewed towards<br />

activists and others who opposed housing and industrial<br />

development. The private investor did not attend the workshops,<br />

nor did other stakeholders who had an interest in development.<br />

This would later be used as an argument for development.<br />

In addition to the workshops, an online survey was distributed to<br />

the general public and presented at the final workshop. The survey<br />

was based on the same alternatives as the workshops, and<br />

respondents were also asked a number of questions about which<br />

activities they wanted in the area, where buildings should be<br />

erected etc. 55,7% of the respondents (N=688) reported they<br />

wanted at least half the area for a recreational park.<br />

The local newspaper distributed another survey two months after,<br />

with similar results. Around half the respondents wanted a mix of<br />

recreational park and urban development in the area. Respondents<br />

were also asked how important they considered this case to be,<br />

and 40% reported it to be important or very important.


Both surveys were open to interpretation, which lead developers<br />

and activists to argue a great deal about what was the true public<br />

opinion in the matter.<br />

Several respondents, both activists and government officials, have<br />

called this a sham process, and claimed that politicians had no<br />

intention other than to soothe the opposition. When faced with<br />

these charges, politicians have denied them in the interviews,<br />

claiming they created the workshops and surveys in an honest<br />

attempt to be more inclusive.<br />

The municipal administration used the input from the workshops<br />

and survey, and came up with 9 alternatives for the new area<br />

development plan. At this stage only the building footprint, how<br />

much of the cove to set aside for buildings, was discussed. The<br />

argument for this was that previous debates had tried to cover too<br />

much, which lead to no decision on the overall plan. The<br />

administration supported an alternative which meant 75% of the<br />

area was to be developed, and the city council voted in support of<br />

this in a council meeting held late March 2011, with 21 votes<br />

against 18.<br />

In august 2011 the city council assembled again, to vote on<br />

building heights and the contract for development with the private<br />

investor and his partners. After long debate, which included a vote<br />

on a change to the area plan passed in the last meeting, the council<br />

again voted in the support of development, with 24 votes against<br />

14.<br />

Both meetings had a large audience consisting mainly of activists<br />

aged between 40 and 70. There were few, if any, people under the<br />

age of 35 present, in spite of activist claims that youth were very<br />

engaged in the case and were big supporters of a recreational park.<br />

In both meetings, activists created a lot of disturbance, causing the<br />

mayor to threaten to close off the meeting to the public. After the<br />

August meeting, activists were furious, claiming the politicians<br />

had failed to listen to the public.<br />

In the autumn of 2011 there was a new municipal election. Once<br />

again the activists created a pamphlet showing how people could<br />

vote if they wanted “park-friendly” politicians in the new city<br />

council, who could re-open the case. The lists were distributed<br />

online, through a web site, were promoted on Facebook and also<br />

spread through physical means and word of mouth.<br />

Although not a complete success, the activists were once again<br />

able to influence who got elected to the city council. About 400<br />

people seemed to follow the activists’ advice.<br />

At the time data collection ended (November 2011), the previous<br />

city council’s decision had not been up for discussion in the new<br />

city council, and the new mayor has told the media that it is not<br />

likely the case will be reopened.<br />

However, the activists have vowed to keep on fighting, and at the<br />

time of writing have complained to regional authorities about<br />

procedural errors in the existing resolution. The complaints will<br />

most likely not be heard, at least not lead to changes in the<br />

development plans.<br />

Even though it seems as if the activists have lost their fight, there<br />

is no doubt that citizen initiated participation has had considerable<br />

influence in this case. The activists have, through their targeted<br />

efforts, managed to influence the composition of two city<br />

councils, have made the city council swing against development<br />

several times, and through this they have delayed development for<br />

52<br />

almost 5 years, and forced the city to concessions such as the<br />

workshops and survey, as well as the creation of several reports<br />

on noise, pollution and other issues.<br />

5. FINDINGS<br />

In this section the findings from the genre systems of print media<br />

(letters to the editor) and social media (Facebook groups) are<br />

presented, followed by an analysis of how the two systems rate in<br />

terms of contributing to the public sphere.<br />

5.1 Genre Systems<br />

The individual genres were identified through applying the<br />

5W1H-method to letters to the editor in the printed edition of the<br />

local newspaper, and postings on Facebook groups created to<br />

discuss the case. In order to examine the genre system, additional<br />

columns for the system were added, as well as a column showing<br />

the relation between genres. These additional columns were<br />

inspired by [36].<br />

Earlier research conducted by the author has shown that there are<br />

three objectives for why politicians choose to communicate in<br />

digital media. These are dialogue with citizens, contributions from<br />

citizens, and involvement in party activities [39]. Effective<br />

political communication should thus address these.<br />

These objectives can be interpreted and as genres in their own<br />

right. Table 1 shows the three objectives as genres.<br />

The genres identified in the discussion spaces we are observing<br />

can be analyzed as to which of these “genre objectives” they<br />

support (table 2), and this knowledge can be applied by site<br />

administrators and politicians in such a way as to facilitate the use<br />

of genres which are most likely to lead to the desired objective.<br />

Table 1: Political objectives as genres<br />

Dialogue Contribution Involvement<br />

Why Involve citizens in<br />

public debate<br />

Knowledge<br />

about citizen<br />

concerns<br />

Raise funds.<br />

Get people to<br />

volunteer<br />

When Continuous Election time Election time<br />

What Conversation<br />

between citizens<br />

and<br />

politicians/citizens<br />

and citizens<br />

Who Politicians, party<br />

members, citizens<br />

Q&A. Voter<br />

stories<br />

Politicians,<br />

party<br />

members,<br />

voters<br />

Competitions,<br />

membership<br />

forms,<br />

information<br />

Voters,<br />

sympathizers<br />

Where SNS, web site SNS, web site SNS, web site<br />

How Encourage<br />

dialogue.<br />

Open and personal<br />

language. Citizengenerated<br />

content.<br />

Encourage<br />

contributions<br />

and questions<br />

from voters<br />

Competitions,<br />

theme sites,<br />

crosspublication


While letters to the editor could be said to be a genre in itself,<br />

there are some significant differences in style and form. As could<br />

be expected from a mature medium, there are a limited number of<br />

genres to be found. Except for the “poem” genre, the main<br />

difference between the genres in the letters to the editor section<br />

lies in the level of formality and how the arguments are presented.<br />

Some letters are kept in a formal tone and based on facts, while<br />

others are more personal, some bordering on libelous. In the<br />

beginning there were several voices represented, but as the case<br />

progresses the activists, who were against development, produced<br />

the vast majority of letters. Letters tend to become more<br />

aggressive over time, with a somewhat increased focus on<br />

individuals and less on formal, fact-based debate. As it is mainly<br />

those opposing development who write to the paper, there is little<br />

direct debate.<br />

However, a number of the writers address politicians by name,<br />

citing things the politician(s) said in council meetings or other<br />

places.<br />

All in all, the genre system of the editorial column functions well<br />

for disseminating ones ideas, somewhat well for debate (although<br />

the slow speed of print means you have to pay close attention if<br />

you want to catch who is addressing whom), and the majority of<br />

letters are at least somewhat fact-based and formal. The genres in<br />

this system are presented in table 2. The first two rows describe<br />

the purpose and actors of the genre system (letters to the editor),<br />

while the rest of the table is a 5W1H analysis of the individual<br />

genres identified within the genre system.<br />

System:<br />

why<br />

System:<br />

whose<br />

Table 2: Genre system in newspaper editorial section<br />

Promote and conduct debate about local issues<br />

Owned and edited by the local newspaper. Open to<br />

everyone, but editors decide who gets printed<br />

Genre Opinion, formal Opinion, informal<br />

Where Newspaper Newspaper<br />

Why<br />

When<br />

Who<br />

What<br />

How<br />

Convince others<br />

through presenting<br />

facts<br />

Continuously, more<br />

when case is<br />

processed in city<br />

council or during<br />

election time<br />

Activist to<br />

citizen/politicians<br />

Developer to<br />

citizen/politicians<br />

Presents a view,<br />

followed by<br />

supporting facts and<br />

arguments<br />

Letters are sent to<br />

the editor and<br />

Convince others through<br />

appeals to emotions<br />

Continuously, more when case<br />

is processed in city council or<br />

during election time<br />

Activist to citizen/politicians<br />

Presents a view, supported by<br />

emotional statements or<br />

unsupported views<br />

Letters are sent to the editor<br />

and published.<br />

53<br />

Relation<br />

to table1<br />

published.<br />

Dialogue,<br />

contribution<br />

Dialogue<br />

Genre Poem Personal attacks<br />

Where Newspaper Newspaper<br />

Why<br />

When<br />

Who<br />

What<br />

How<br />

Relation<br />

to table1<br />

Gain attention<br />

through an unusual<br />

genre<br />

Infrequently, no set<br />

pattern<br />

Activist/citizen to<br />

citizens<br />

Short rhymes,<br />

aimed at touching<br />

people’s emotions<br />

Letters are sent to<br />

the editor and<br />

published<br />

Vent own feelings, discredit<br />

the one being attacked<br />

Continuously, more when case<br />

is processed in city council or<br />

during election time, or when<br />

newspaper editorial have<br />

written positively about<br />

development<br />

Activist to<br />

politicians/developer/news<br />

editor<br />

None None<br />

Points to previous letter or<br />

quote and argues against it.<br />

Some simply claim the person<br />

being attacked is less gifted<br />

because s/he means what s/he<br />

means<br />

Letters are sent to the editor<br />

and published.<br />

All the Facebook groups we found were run by activists, and most<br />

of the participants in the groups were either activists or citizens<br />

supporting the activists’ opposition to development. There were<br />

also a lot of passive members who did not contribute in the<br />

discussions on the wall, whereof some were representatives of the<br />

city council or the media that joined in order to follow what the<br />

activists were saying and planning.<br />

There are some noteworthy differences between the two genre<br />

systems. In social media we see many of the same genres, but also<br />

some new ones where functionality of the medium plays an<br />

important role. The links genre makes use of the networked nature<br />

of the Internet to provide fast access to information stored<br />

elsewhere, and link targets often contain multimedia content.<br />

Multimedia also helps to enrich some of the other genres. The<br />

formal and informal opinion genres are present in both the “old”<br />

and “new” media, but are enacted somewhat differently in new<br />

media. In the Facebook groups we see a lot of images and also<br />

some videos made by the activists to show how the planned<br />

development will impact the surroundings. These provide<br />

valuable extra information that can be difficult to present in a<br />

printed medium with limited space.<br />

On the other hand, the postings on Facebook tend to be shorter,<br />

and there is less fact-based discussion and postings seem to be<br />

more improvised, which provides less information than the longer<br />

and more thought-out letters to the editor.<br />

Another difference is the spontaneous “greetings/cheers” genre,<br />

where people will congratulate each other, or citizens will write a<br />

short post to show their support for the activists’ case. This kind


of informal communication is not likely to be printed, as it does<br />

not contribute to the debate, but nonetheless acts as important<br />

feedback and perhaps a moral boost to the activists.<br />

System:<br />

why<br />

System:<br />

whose<br />

Table 3: Genre system in social media<br />

Activist groups fighting against the planned<br />

development<br />

Owned by activist groups or individuals, open to<br />

everyone but mostly participants are opposed to<br />

development<br />

Genre Opinion, formal Opinion, informal<br />

Where Facebook group wall Facebook group wall<br />

Why<br />

Convince others<br />

through presenting<br />

facts<br />

When Ongoing Ongoing<br />

Who<br />

What<br />

How<br />

Relation<br />

to table1<br />

Activist to<br />

activist/citizen<br />

Presents a view,<br />

followed by supporting<br />

facts and arguments.<br />

Often with links,<br />

pictures, video<br />

Group members post<br />

messages on wall<br />

Present short opinion on<br />

something<br />

Activist to activist/citizen<br />

Presents a view,<br />

supported by emotional<br />

statements or<br />

unsupported views.<br />

Sometimes with links,<br />

pictures, video<br />

Dialogue, contribution Dialogue<br />

Group members post<br />

messages on wall<br />

Genre Call to action Personal attacks<br />

Where Facebook group wall Facebook group wall<br />

Why<br />

When<br />

Get people to act on<br />

something<br />

Before city council<br />

meetings or other<br />

events where there is a<br />

need to do something<br />

Who Activist to activist<br />

What<br />

How<br />

Relation<br />

to table1<br />

Invites people to<br />

participate in<br />

demonstrations, contact<br />

politicians or cast their<br />

vote in a certain way<br />

Group members post<br />

messages on wall<br />

Discredit opponents<br />

Ongoing<br />

Involvement None<br />

Activist to developer,<br />

politicians<br />

Often unprovoked short<br />

comments claiming a<br />

named person or group<br />

are in the wrong<br />

Group members post<br />

messages on wall<br />

Genre Links Greetings/cheers<br />

Where Facebook group wall Facebook group wall<br />

Why<br />

When Ongoing<br />

Who<br />

Inform others about<br />

content posted<br />

elsewhere<br />

Activist to<br />

activist/citizen<br />

Congratulate each other<br />

after victories, raise<br />

morale<br />

When the city council<br />

vote in favor of activists<br />

Activist/citizen to<br />

activists<br />

54<br />

What<br />

How<br />

Relation<br />

to table1<br />

Links to other online<br />

spaces, often<br />

multimedia content<br />

Group members post<br />

messages on wall, often<br />

with a short comment<br />

Dialogue None<br />

Positive comments about<br />

a recent event, or about<br />

the activists’’ work<br />

Group members post<br />

messages on wall<br />

5.2 Public Sphere and Social Capital<br />

The second part of the research question was how these genre<br />

systems contribute to the public sphere. To measure this the<br />

framework of [28] is applied. The framework analyses the public<br />

sphere using Dahlberg’s criteria for a public sphere (see section<br />

2.1), as well as looking for network effects to help spread the<br />

content of the discussion to more people, the type of community<br />

being supported, and the type of public sphere being supported.<br />

As social capital is said to influence who participates in a public<br />

sphere, social capital is also measured using the constructs<br />

mentioned in section 2.2. Together, these constructs helps us to<br />

understand how the communication spaces we are examining<br />

supports a public sphere, and thus how valuable they are in<br />

maintaining democratic ideals.<br />

Table 4: Public sphere characteristics of "old" media<br />

Theory Concept Case observations<br />

Public<br />

sphere<br />

Social<br />

Capital<br />

Dahlberg’s<br />

criteria<br />

Partially present, but participants<br />

are not attempting to understand the<br />

others’ perspective. Debate is fairly<br />

rational and reflective<br />

Network effects Letters are read and distributed to<br />

others, and often answered or<br />

followed up in new letters.<br />

community Readers and writers all belong to<br />

the same local community, some<br />

have regular contact outside of<br />

editorial columns<br />

Type of PS Discourse-based (after some time<br />

more towards political protest)<br />

Bridging Letters are read by both those who<br />

agree with and those who oppose<br />

the author’s position<br />

Bonding Shows others of the same opinion<br />

that they are not alone, helps bring<br />

the community closer together (for<br />

activists. The developer is more on<br />

his own).<br />

Trust &<br />

reciprocity<br />

Maintained<br />

social capital<br />

Is less of an issue in old media, as<br />

there is an editorial middleman who<br />

decides what is printed and not.<br />

Writers address each other by name,<br />

even though they may not meet in


person.<br />

Table 5: Public sphere characteristics of social media<br />

Theory Concept Case observations<br />

Public<br />

sphere<br />

Social<br />

Capital<br />

Dahlberg’s<br />

criteria<br />

Network<br />

effects<br />

Discourse is more one-way and<br />

less argument-based than in the old<br />

media, as there are mainly activists<br />

taking part in these groups.<br />

Postings can be re-posted on the<br />

walls of group members, helping to<br />

spread the ideas presented to a<br />

larger audience.<br />

Community There is a sense of shared<br />

objectives and common interest in<br />

the groups, which help create a<br />

sense of community.<br />

Type of PS Political protest. There are very<br />

few posts disagreeing with the<br />

activists.<br />

Bridging There is little evidence of bridging<br />

social capital. Content seems to<br />

stay within the group. However, it<br />

was not possible to measure the<br />

extent to which content was<br />

reposted on individual’s walls.<br />

Bonding Greetings/cheers genre as well as<br />

the general sense of agreement<br />

contributes to bonding social<br />

capital.<br />

Trust &<br />

reciprocity<br />

Maintained<br />

social capital<br />

Participants in the groups trust<br />

each other, which is natural as long<br />

as there is a common goal<br />

Not easy to measure, but there is<br />

certainly contact and discussion<br />

between the members in the group.<br />

While there are differences between the two genre systems, they<br />

each contribute to the public sphere in their own way. The genre<br />

system of traditional media is perhaps better suited to support a<br />

traditional Habermasian public sphere, where people of different<br />

opinions come together to discuss and debate. Letters printed in<br />

the newspaper are more reflective and argumentative than posts in<br />

social media, and reach a bigger audience than just those who<br />

already agree with the author of the letter or post. However, the<br />

editorial column is only as good as the people writing to it, and<br />

over time the activists view is almost the only one present, making<br />

it less a space for debate and more of a one-way communication<br />

channel.<br />

The genres in social media are less in line with Habermas’<br />

traditional public sphere ideals, but works great to support a<br />

political protest public sphere. Activists and their supporters have<br />

55<br />

a place to meet, where they can discuss, support each other, share<br />

information and maybe recruit new members. And there is also<br />

the added value that some journalists do use social media in their<br />

work, to discover new issues and find new sources. Sometimes<br />

social media gives them ideas for stories they would otherwise not<br />

have written. An informal e-mail survey sent to the journalists in<br />

the local newspaper confirms that this happens.<br />

Also, the network and bridging effects of social media are<br />

potentially a lot stronger. We do not see these effects very<br />

strongly in this particular case, perhaps because the case is<br />

localized to a small geographical area, and mainly concerns the<br />

inhabitants of that area. The users of social media already belong<br />

to the same physical community, which means there is less need<br />

for virtual networking.<br />

6. CONCLUSION AND LIMITATIONS<br />

This paper has examined the genre systems of the letters to the<br />

editor column in traditional print media and in social media, with<br />

the purpose of uncovering differences and similarities between the<br />

two systems, and to measure if social media is beginning to<br />

produce media-specific genres for eParticipation, and what this<br />

means for the public sphere.<br />

The findings indicate that we are beginning to see new genres in<br />

social media, as well as old genres being reinvented to better suit<br />

the functionality of new media. The addition of multimedia<br />

content to existing genres is one example of this. While we cannot<br />

say that social media has matured, we can conclude by saying that<br />

social media is moving ever more towards maturity.<br />

New media has room for a bigger variety of genres than<br />

traditional print media, and their instant feedback allows for a<br />

faster dialogue and more participants. This does however come at<br />

a price. Contributions in social media are often less well thought<br />

through, and not backed up by facts and rational arguments in the<br />

same way as we see in the traditional media. In that sense, the<br />

strength of the new is also its weakness.<br />

In terms of contributing to the public sphere, both genre systems<br />

do that, each in their own way. Traditional media better supports<br />

the Habermasian ideal of rational discourse, while social media is<br />

a good supporter of the political protest public sphere. As the<br />

examined social media groups are so homogenous, there is little<br />

debate going on. Social media does have a place in the wider<br />

“general public sphere”, as a source of information for news<br />

journalists. As tables one through three show, some genres are<br />

better suited than others for those who want to contribute to the<br />

political debate and to gain the attention of politicians. Genres that<br />

accommodate one of the three political objectives could perhaps<br />

be seen to contribute more to the public sphere than genres that do<br />

not address these objectives.<br />

There are some limitations to the findings in this paper. As they<br />

are based on one single case, it is not possible to generalize the<br />

findings outside of the case context. Other cases in different<br />

contexts would perhaps provide very different results. Future<br />

research efforts could include examining how the different genres<br />

should be enacted to support the objectives in table 1, and through<br />

them the public sphere. Also, more research is needed on how the<br />

added functionality of new media can contribute to eParticipation,<br />

if certain media are better suited than others for a given genre, and<br />

what combination of genres and media would be likely to provide


good results for the concrete objectives of various activist<br />

campaigns.<br />

7. REFERENCES<br />

[1] Macintosh, A., A. McKay-Hubbard, and D. Shell, Using<br />

Weblogs to Support Local Democracy, in E-Government:<br />

Towards Electronic Democracy2005. p. 1-12.<br />

[2] Tambouris, E., N. Liotas, and K. Tarabanis, A Framework<br />

for Assessing eParticipation Projects and Tools, in Hawaii<br />

International Conference on System Sciences2007: Hawaii.<br />

[3] Jackson, N.A. and D.G. Lilleker, Building an Architecture of<br />

Participation? Political Parties and Web 2.0 in Britain.<br />

Journal of Information Technology and Politics, 2009. 6(3):<br />

p. 232-250.<br />

[4] Gray, M. and M. Caul, Declining Voter Turnout in Advanced<br />

Industrial Democracies, 1950 to 1997. Comparative Political<br />

Studies, 2000. 33(9): p. 1091-1122.<br />

[5] Østerud, Ø., F. Engelstad, and P. Selle, Makten og<br />

demokratiet. En sluttbok fra makt- og<br />

demokratiutredningen2003, Oslo: Gyldendal akademisk.<br />

344.<br />

[6] Sæbø, Ø., J. Rose, and L. Skiftenes Flak, The shape of<br />

eParticipation: Characterizing an emerging research area.<br />

Government Information Quarterly, 2008. 25(3): p. 400-428.<br />

[7] Brandtzæg, P.B. and M. Lüders, eCitizen 2.0: The Ordinary<br />

Citizen as a Supplier of Public Sector Information, 2008,<br />

Ministry for Government and Administration Reform: Oslo.<br />

[8] Papacharissi, Z., The Virtual Sphere: The Internet as Public<br />

Sphere. New Media and Society, 2002. 4(1): p. 9-27.<br />

[9] Gimmler, A., Deliberative Democracy, the Public Sphere and<br />

the Internet. Philosophy & Social Criticism, 2001. 27(4): p.<br />

21-39.<br />

[10] Yates, J. and W.J. Orlikowski, Genres of Organizational<br />

Communication: A Structurational Approach to Studying<br />

Communication and Media. The Academy of Management<br />

Review, 1992. 17(2): p. 299-326.<br />

[11] Orlikowski, W.J. and J. Yates, Genre Repetoire: The<br />

Structuring of Communicative Practices in Organizations.<br />

Administrative Science Quarterly, 1994. 39(4): p. 541-74.<br />

[12] Shepherd, M. and C. Watters. The evolution of cybergenres.<br />

in System Sciences, 1998., Proceedings of the Thirty-First<br />

Hawaii International Conference on. 1998.<br />

[13] Dahlberg, L., The Internet and Democratic Discourse:<br />

Exploring The Prospects of Online Deliberative Forums<br />

Extending the Public Sphere. Information, Communication &<br />

Society, 2001. 4(4): p. 615 - 633.<br />

[14] Habermas, J., The Public Sphere, in Jürgen Habermas on<br />

Society and Politics: A reader, S. Seidman, Editor 1989,<br />

Beacon Press: Boston.<br />

[15] Frazer, E., The Problem of Communitarian Politics. Unity<br />

and Conflict1999, Oxford: Oxford University Press.<br />

[16] Castells, M., The New Public Sphere: Global Civil Society,<br />

Communication Networks, and Global Governance. The<br />

56<br />

Annals of the American Academy of Political and Social<br />

Science, 2008. 616(1): p. 78-93.<br />

[17] Merriman, J., A history of modern Europe: From the French<br />

Revolution to the Present. Vol. 2. 1996, New York: W.W<br />

Norton & Company.<br />

[18] Habermas, J., The Structural Transformation of the Public<br />

Sphere: An inquiry into a category of bourgeoise<br />

society1991, Cambridge, Mass: MIT Press.<br />

[19] Webster, F., Information Management and Manipulation:<br />

Jürgen Habermas and the Decline of the Public Sphere, in<br />

Theories of the Information Society1995, Routledge:<br />

London.<br />

[20] Dahlgren, P., The Internet, Public Spheres, and Political<br />

Communication: Dispersion and Deliberation. Political<br />

Communication, 2005. 22: p. 147-162.<br />

[21] Poster, M., Cyberdemocracy: The Internet and the Public<br />

Sphere, in Internet Culture, D. Porter, Editor 1997,<br />

Routledge: New York/London.<br />

[22] Gibson, R.K., W. Lusoli, and S. Ward, Online Participation<br />

in the UK: Testing a ‘Contextualised’ Model of Internet<br />

Effects1. The British Journal of Politics & International<br />

Relations, 2005. 7(4): p. 561-583.<br />

[23] Tewksbury, D., The Seeds of Audience Fragmentation:<br />

Specialization in the Use of Online News Sites. Journal of<br />

Broadcasting & Electronic Media, 2005. 49(3): p. 332-348.<br />

[24] Calhoun, C., Community without Propinquity Revisited:<br />

Communications Technology and the Transformation of the<br />

Urban Public Sphere. Sociological Inquiry, 1998. 68(3): p.<br />

373-397.<br />

[25] Muhlberger, P., Human Agency and the Revitalization of the<br />

Public Sphere. Political Communication, 2005. 22(2): p. 163-<br />

178.<br />

[26] Habermas, J., Political Communication in Media Society:<br />

Does Democracy Still Enjoy an Epistemic Dimension? The<br />

Impact of Normative Theory on Empirical Research1.<br />

Communication Theory, 2006. 16(4): p. 411-426.<br />

[27] Trenz, H. and K. Eder, The Democratizing Dynamics of a<br />

European Public Sphere. European Journal of Social Theory,<br />

2004. 7(1): p. 5-25.<br />

[28] Johannessen, M.R., Social Capital and the Networked Public<br />

Sphere: Implications for Political Social Media sites, in The<br />

Hawaii International Conference on System Sciences<br />

(HICSS-45)2012: Maui, Hawaii, USA.<br />

[29] Putnam, R.D., Bowling Alone: The Collapse and Revival of<br />

American Community2000, New York: Simon & Schuster.<br />

[30] Svendsen, G.T. and G.L.H. Svendsen, Social Kapital - en<br />

introduktion2006, København: Hans Reitzels Forlag.<br />

[31] Ahuja, S., M.A. Pèrez-Quiñones, and A. Kavanaugh, Local<br />

conversations 2.0, in Proceedings of the 10th Annual<br />

International Conference on Digital Government Research:<br />

Social Networks: Making Connections between Citizens,<br />

Data and Government2009, Digital Government Society of<br />

North America.


[32] Yang, S., H. Lee, and S. Kurnia, Social Capital in<br />

Information and Communications Technology Research:<br />

Past, Present and Future. Communications of the Association<br />

for Information Systems, 2009. 25: p. 183-221.<br />

[33] Ellison, N.B., C. Steinfield, and C. Lampe, The Benefits of<br />

Facebook “Friends:” Social Capital and College Students’<br />

Use of Online Social Network Sites. Journal of Computer-<br />

Mediated Communication, 2007. 12(4): p. 1143-1168.<br />

[34] Pasek, J., E. More, and D. Romer, Realizing the Social<br />

Internet? Online Social Networking meets Offline Civic<br />

Engagement. Journal of Information Technology & Politics,<br />

2009. 6(3&4): p. 197-215.<br />

[35] Turnšek, M., “The Digital Youth Revolt?” Young People and<br />

eParticipation, in Understanding eParticipation:<br />

Contemporary PhD eParticipation research in Europe, A.<br />

Avdic, et al., Editors. 2008, Örebro University Library:<br />

Örebro.<br />

[36] Päivärinta, T. and Ø. Sæbø, The Genre System Lens on E-<br />

Democracy. Scandinavian Journal of Information Systems,<br />

2008. 20(2).<br />

[37] Sæbø, Ø., Understanding Twitter Use among Parliament<br />

Representatives: A Genre Analysis, in Electronic<br />

Participation, E. Tambouris, A. Macintosh, and H. de Bruijn,<br />

Editors. 2011, Springer Berlin / Heidelberg. p. 1-12.<br />

[38] Sæbø, Ø. and T. Päivârinta, Autopoietic cybergenres for e-<br />

Democracy? Genre analysis of a web-based discussion<br />

board, in Hawaii International Conference on System<br />

Sciences2005.<br />

57<br />

[39] Johannessen, M., Genres of Participation in Social<br />

Networking Systems: A Study of the 2009 Norwegian<br />

Parliamentary Election, in Electronic Participation, E.<br />

Tambouris, A. Macintosh, and O. Glassey, Editors. 2010,<br />

Springer Berlin / Heidelberg. p. 104-114.<br />

[40] Yoshioka, T., et al., Genre taxonomy: A knowledge<br />

repository of communicative actions. ACM Trans. Inf. Syst.,<br />

2001. 19(4): p. 431-456.<br />

[41] Yates, J. and W. Orlikowski, Genre Systems: Structuring<br />

Interaction through Communicative Norms. Journal of<br />

Business Communication, 2002. 39(1): p. 13-35.<br />

[42] Kaplan, B. and J. Maxwell, Evaluating the Organizational<br />

Impact of Healthcare Information Systems, in Qualitative<br />

Research Methods for Evaluating Computer Information<br />

Systems, J. Anderson and C. Aydin, Editors. 2005, Springer<br />

New York. p. 30-55.<br />

[43] Marshall, C. and G. Rossman, Designing Qualitative<br />

Researh: 3rd Edition1999, Thousand Oaks, CA: Sage.<br />

[44] Benbasat, I., D.K. Goldstein, and M. Mead, The Case<br />

Research Strategy in Studies of Information Systems. MIS<br />

Quarterly, 1987. 11(3): p. 369-386.<br />

[45] Cresswell, J.W., Research Design: Qualitative, Quantitative,<br />

and Mixed Methods approach2009, Los Angeles: Sage.<br />

[46] Walsham, G., Doing interpretive research. European Journal<br />

of Information Systems, 2006. 15(3): p. 320-330.


Internet voting: fatally torn between conflicting goals?<br />

Marco Prandini<br />

Università di Bologna<br />

Viale del Risorgimento, 2<br />

40136 Bologna, Italy<br />

Tel. +39 05120 93867<br />

marco.prandini@unibo.it<br />

ABSTRACT<br />

More than a decade after the first enthusiastic attempts at<br />

deploying Internet voting, there is still only a single case of<br />

continued adoption for the election of a political body. In this<br />

paper we illustrate the motivations behind the apparent failure of a<br />

process that, at a first sight, looks desirable for many reasons. We<br />

analyze the most relevant efforts in the field, which can be<br />

grouped in two main lines: those grounded on a strong formal<br />

foundation, and those designed to achieve maximum participation.<br />

From the analysis, we derive a set of desirable features, classify<br />

the systems according to their ability to achieve them, and<br />

conclude that no system is currently able to strike a convincingly<br />

positive balance between them.<br />

Categories and Subject Descriptors<br />

C.2.0 [Computer-communication networks]: General-security<br />

and protection; H.5.4 [Information interfaces and<br />

presentation]: Hypertext/Hypermedia-user issues; K.4.1<br />

[Computers and society]: Public Policy Issues-regulation; K.6.5<br />

[Management of computing and information systems]:<br />

Security and Protection-invasive software<br />

General Terms<br />

Security, Verification.<br />

Keywords<br />

Internet voting, security, privacy e-democracy.<br />

1. INTRODUCTION<br />

From the first appearance of democracies, there has been a<br />

constant evolution of the voting processes, to cope with the<br />

growth of the voting base without sacrificing its characteristics of<br />

accuracy, privacy and accessibility. While in the beginning it was<br />

deemed appropriate to openly express one's own will by raising a<br />

hand, nowadays complex devices have appeared to ensure fair and<br />

efficient collection of large numbers of ballots, possibly<br />

containing votes about many different topics, and their tallying<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

58<br />

Marco Ramilli<br />

Università di Bologna<br />

Via Venezia, 52<br />

47521 Cesena, Italy<br />

Tel. +39 05120 93867<br />

marco.ramilli@unibo.it<br />

according to various kinds of algorithms. Quite obviously, the<br />

latest steps of this evolutionary process involve the usage of<br />

computers and of the Internet.<br />

Electronic voting machines and automatic tallying workstations<br />

took over manual/mechanical casting and tallying procedures,<br />

with the main goal of speeding up the whole voting process and<br />

making it less error-prone. The results were mixed. Twenty years<br />

ago the determination of an election result would take up to a few<br />

days, and the procedures for the verification of contested results<br />

were even slower (and arguably reliable). Nowadays computerbased<br />

systems make it possible to compute the results almost in<br />

real time. Reliability did not see the same improvement, because<br />

there is an intrinsic disadvantage of computer-based systems when<br />

compared to traditional ones: computers inevitably process ballots<br />

in a way that cannot be kept under the voter's control.<br />

Consequently, the voter is forced to surrender a significant part of<br />

his trust in the voting system to the organizational apparatus that<br />

runs the election (the electoral body hereinafter).<br />

In order to face this responsibility, the electoral bodies started to<br />

develop technical and organizational standards for the verification<br />

of standalone computerized voting machines. They had not<br />

finished settling on truly comprehensive procedures, when one<br />

more paradigm shift was proposed towards the building of an<br />

Internet-based voting system. Internet voting is supposed to<br />

exhibit many advantages, especially in terms of accessibility, but<br />

it pushes the control over the correct behavior of the process<br />

farther away from the voter, and from the bodies that run the<br />

election as well.<br />

In this paper, we start by summarizing the foundational works<br />

about Internet voting and then proceed to quickly illustrate three<br />

Internet voting systems, which serve as valid representatives for<br />

different conceptual approaches to the subject. We discuss their<br />

relative merits and issues, before drawing conclusions.<br />

2. AN OUTLINE OF INTERNET VOTING<br />

At the very beginning of the past decade, Internet voting was<br />

beginning to draw interest as a platform for binding, large scale<br />

elections. The first structured analysis of the characteristics of<br />

Internet voting is presented in the final report [5] of the California<br />

Internet Voting Task Force (IVTF), which was convened by the<br />

Secretary of State to study the feasibility of using the Internet to<br />

conduct elections in California, and included more than two dozen<br />

experts in the field of data security, elections and voter<br />

participation.


In March 2000, just a couple of months after the release of the<br />

IVTF report, the presidential preference primary of the Arizona<br />

Democratic party provided a real test case, as the first legally<br />

binding political election to offer voters the possibility to cast<br />

their ballots from the location of their choice. The experience is<br />

well documented in a “pro vs. con”' face-to-face paper where Joe<br />

Mohen and Julia Glidden [16] described the most significant<br />

advantages of voting over the Internet, experienced firsthand as<br />

they actually ran the election on election.com, whereas Deborah<br />

M. Phillips and Hans A. von Spakovsky [19] played the<br />

counterpoint by outlining the few but deeply worrying issues that<br />

arose, mainly due to the insecurity of computer-based systems.<br />

2.1 The Pros<br />

“Universal Access” plays the main role in the list of the Internet<br />

voting advantages. In its simplest acception, universal access is<br />

the possibility to vote from every connected place, during an<br />

extended period, but it has more important aspects than freedom<br />

from lines at the polling station. It makes possible for people with<br />

disabilities to have specific tools tailored to their needs and<br />

enabling them to cast their votes. It allows people living far from<br />

city centers, without cars or any public transport, to reach the<br />

ballot box in a few clicks. These enfranchisement opportunities<br />

are also seen as a way to stimulate participation in countries<br />

where the voters turnout is low.<br />

Economic advantages appear to be obvious with the adoption<br />

Internet voting systems. Indeed Internet voting could eliminate the<br />

need to set up many polling places, to print paper ballots in the<br />

millions, or to organize committees spread all over the country to<br />

direct and to monitor the elections. Internet voting is much<br />

cheaper, quicker and easier to protect from traditional threats such<br />

as physical security of the polling places and of the ballots.<br />

Multi-cultural countries would enjoy the possibility of easily<br />

designing multilingual ballots, so that voters not familiar with the<br />

official language could vote using on their native language. Voters<br />

who cannot read could exploit text-to-speech libraries and be<br />

guided to the expression of their vote by a voice. Finally, Internet<br />

voting systems are especially convenient for the first and foremost<br />

group of citizen which they were originally thought for: overseas<br />

residents, such as military or diplomats who must be outside their<br />

country for job reasons [9].<br />

2.2 The Cons<br />

The issues with Internet voting are both of technical and of social<br />

nature. On the technical side, when compared to electronic voting<br />

solutions based on polling stations, there are three aspects that<br />

make security problems of Internet voting stand out. First, there is<br />

no real possibility of assessing the integrity of voters' terminals.<br />

Injected malware could manipulate the voter's ballot without<br />

being detected. Second, some of the control exercised over the<br />

voting process is shifted to the central processing facilities that<br />

collect votes and count them. The opportunity to curb illicit<br />

manipulation is pushed farther away from the voters and their<br />

representatives, traditionally monitoring the polling places. The<br />

network that connects these two ends is itself subject to attacks.<br />

While cryptography can protect the integrity and privacy of the<br />

transmitted ballots, there is not much that can be done against<br />

denial-of-service attacks, which flood the network preventing the<br />

system to work at all.<br />

59<br />

Also on the social side, at least three issues arise. The first derives<br />

from the disappearing physical protection provided by the polling<br />

place. It is very difficult to prevent voters casting ballots on their<br />

personal computers from getting (or be forced to get) proofs of<br />

what/who they voted for. This could exacerbate phenomena such<br />

as vote selling, “family votes”, and coerced voting. The second<br />

issue regards universal access. While at a first glance the Internet<br />

would appear as an equalizing medium, in reality the most<br />

disadvantaged parts of the population would probably be less<br />

capable of using an advanced system than they are of<br />

understanding traditional ballots, provided they can access a<br />

computer and a network connection at all. Third, some<br />

experiences lead to think that voter's turnout is not increased by<br />

the convenience of the system. In certain cases it was even<br />

lowered, possibly by the feeling that the election was nothing<br />

more than another Internet gadget instead of an important<br />

occasion to meet, discuss, and form a political opinion.<br />

2.3 Three Approaches to Internet Voting<br />

We are interested in comparing projects which have very different<br />

origins, and correspondingly different approaches to security.<br />

Remotegrity [6] was born in the academia to integrate formal<br />

security proof of ballot handling correctness. It is an absentee<br />

voting system implemented at the George Washington University,<br />

which allows to choose among multiple voting methods. Used<br />

during the 2011 election in Takoma Park, Maryland, Remotegrity<br />

gave the citizen the ability to independently verify that their votes<br />

had been correctly recorded without revealing how they voted.<br />

This property is referred to as “end to end (E2E) verifiability”,<br />

and it is built on the Scantegrity [7] system.<br />

Helios [1] was developed by the initiative of a no-profit<br />

organization (http://heliosvoting.org/) focused on the voters right<br />

to control their votes. It has been used in many elections; the<br />

website claims more than 25,000 votes cast at the time we are<br />

writing. Helios defines a stronger concept of verifiability than<br />

Remotegrity does: it gives the ability to verify if a vote has been<br />

correctly counted for in the election results, not simply correctly<br />

recorded. Helios calls this property “true verifiability”.<br />

The Estonian voting system [10] was “built to work” by the<br />

government. Estonia is not the only country having evaluated<br />

Internet voting for politically relevant elections, yet it can<br />

certainly represent the whole category of government-sponsored<br />

Internet voting systems, having the longest history of<br />

development and usage of such systems. Moreover, comparative<br />

analyses show many similarities with other nations' alternatives<br />

[23, 11, 21]. The Estonian Internet voting system is meant to<br />

supplement the traditional methods of voting. Voters can vote on<br />

their computer/smart-card-based systems or mobile phones, but<br />

also override the votes cast on these systems by voting at the<br />

polling station.<br />

2.4 Evaluation of the Existing Systems<br />

The discussion in sections 2.1 and 2.2 allows to list a set of<br />

positive features and advantages that Internet voting systems<br />

should exhibit, and a set of problems and drawbacks that Internet<br />

voting systems should avoid to introduce. We measure how well<br />

the aforementioned systems perform with respect to these sets in<br />

Table 1.


Expected pros<br />

Possible cons<br />

Location- and timeindependent<br />

Multimedia /<br />

multilanguage<br />

Economy<br />

Technological<br />

discrimination<br />

Security issues -<br />

client side infections<br />

Security issues -<br />

server side<br />

manipulation<br />

Security issues -<br />

denial of service<br />

Privacy - vote<br />

selling<br />

Privacy - coercion<br />

Table 1. Internet voting measured against the desired advantages and possible disadvantages<br />

3. DISCUSSION<br />

More than a decade ago, a few but significant security problems<br />

related to the infrastructure backed the criticism of Internet voting.<br />

Now, the same problems have been all but solved in a convincing<br />

way. Motivated attackers can disenfranchise voters by means of<br />

DDoS campaigns. Viruses infecting the I/O interface of voters'<br />

computers enable large-scale alterations or privacy breaches no<br />

matter how sophisticated the voting protocol is. From a<br />

conceptual viewpoint, most of these issues can be addressed and<br />

solved as technology advances, but the experience teaches us that<br />

even in strictly controlled environments there is a significant<br />

margin for errors in design and implementation. The road towards<br />

effective conformance testing of voting machines installed in<br />

polling places has been long. It went through deep review of<br />

systems initially adopted without a transparent process<br />

guaranteeing their security [12, 4, 17]. It led to ample public<br />

discussions in the U.S.A [24, 3] as well as in the European Union<br />

[15] that were incorporated in the track for defining public<br />

standards [22, 8]. Still, there is ample margin for enhancements<br />

[13, 18, 20]. Thinking that the same level of security can be<br />

attained in uncontrolled user computers is unrealistic.<br />

There are examples of formally-designed systems, like Helios and<br />

Remotegrity, that allow voters to detect manipulations. They<br />

neutralize the effect of successful attacks against any component<br />

of the chain leading from the voter's intention to the tallied ballot.<br />

They failed, until now, to achieve widespread acceptance,<br />

possibly because their principles are too complex, or because<br />

there is no authoritative political body pushing for their adoption.<br />

The Estonian case is the exact opposite. The unquestionable<br />

success of the parliament elections appears to be strongly tied not<br />

to the solution of the mentioned issues, but rather to the social<br />

context. Estonians are (rightly) proud of the technological<br />

advances that enable such a small nation to achieve self-<br />

Remotegrity Helios Estonian<br />

Almost completely<br />

(paper-based credentials)<br />

Almost (constrained by the<br />

paper alternative)<br />

Costly (web + mail + polling<br />

places)<br />

No (browser based +<br />

traditional alternatives)<br />

Manipulation can be<br />

detected<br />

Manipulation can be<br />

detected<br />

Possible, especially serious<br />

in the verification phase<br />

Possible but very hard<br />

Possible (subtraction of<br />

authentication pack)<br />

60<br />

Completely<br />

(browser based)<br />

Completely<br />

Optimal (web<br />

only)<br />

Somewhat, no<br />

alternatives to the<br />

Internet<br />

Malware can<br />

sniff votes<br />

Manipulation can<br />

be detected<br />

Possible<br />

Malware can<br />

sniff votes<br />

Possible (in<br />

presence)<br />

sustainability 1 . They gladly accept the word of their government<br />

as regards the security of the voting process, rather than asking for<br />

a process that would enable them to verify the correctness of the<br />

election themselves. The government reinforced this orientation<br />

by designing a system that can be more or less understood by a<br />

large part of the population. In this scenario, proposing<br />

enhancements that make the system slightly harder to understand<br />

but much more secure could have a counter-intuitive effect of<br />

lowering trust. So, trust is where apparently there are less reasons<br />

for it to be; however, the fact that the whole Estonian egovernment<br />

infrastructure was held captive under a DDoS [14]<br />

should be a clear reminder that even the most proactive and<br />

involved player cannot always defeat its opponents.<br />

Moreover, Internet voting is affected by some fundamental issues<br />

that technology cannot completely address. Often, trust in the<br />

system would require the simultaneous satisfaction of<br />

contradicting requirements. Systematic coercion perpetrated<br />

through infected computers can be mitigated by allowing<br />

overwriting of votes, but maintaining both Internet- and paperbased<br />

systems in parallel operation causes confusion and defeats<br />

the economic purpose of Internet voting. Vote selling is enabled,<br />

albeit with different severity, by the same receipts that allow<br />

verifiability and are needed to secure the process end-to-end.<br />

Innovative technological components like the Trusted Platform<br />

Module could greatly increase the robustness of voting clients, but<br />

at the same time introduce new system requirements that limit the<br />

concept of universal access. Solutions at the state of the art could<br />

further aggravate the discrimination of the weakest groups of<br />

citizens, who already suffer digital divide for real,<br />

notwithstanding the false perception that as new generations enter<br />

1 In the words of their president:<br />

http://valits.us/icegov2011keynote<br />

Almost completely (tied to<br />

ID card or GSM coverage)<br />

Almost (constrained by the<br />

paper alternative)<br />

Costly (web + phone +<br />

polling places)<br />

Traditional alternatives, but<br />

special devices needed for<br />

remote voting<br />

Malware can hijack GUI<br />

Valid votes can be<br />

discarderd, fake votes added<br />

Possible<br />

Very hard (votes can be<br />

overwritten later)<br />

Possible (in presence or<br />

through hijacked GUI)


society the gap will close [2]. The most intractable issue however<br />

is the lack of privacy and protection the polling place gives to<br />

voters. Some Norwegian politicians have referred to “family<br />

voting” as a reason to abandon Internet voting altogether [11].<br />

In conclusion, it is our opinion that after a decade of<br />

experimentation Internet voting is not ready for large scale<br />

deployment yet. The different experiences presented in this paper<br />

prove the strong desire to devise solutions to the main problems.<br />

End-to-end verifiable ballots represent a key step towards<br />

independence from “absolute” security of every component of the<br />

voting chain. Significant real-world use cases like Estonian<br />

elections help bridging the gap between technology and citizens.<br />

Whether the combination of these two driving forces will be<br />

successful in producing really trustworthy systems, and in<br />

advancing awareness enough for people to properly use them, it is<br />

still very hard to foresee.<br />

4. REFERENCES<br />

[1] B. Adida. Helios: web-based open-audit voting. In SS'08:<br />

Proceedings of the 17th conference on Security symposium,<br />

pages 335-348, Berkeley, CA, USA, 2008. USENIX<br />

Association.<br />

[2] F. Belanger and L. Carter. The digital divide and internet<br />

voting acceptance. In Digital Society, 2010. ICDS '10. Fourth<br />

International Conference on, pages 307-310, Feb. 2010.<br />

[3] H. S. Berger. Testimony concerning the TGDC 2007 draft<br />

revision of the voluntary voting system guidelines. Mar. 17,<br />

2008.<br />

[4] Bishop, M., Blaze, M., Vigna, G., et al.,. University of<br />

California red team reports on voting systems, 2007.<br />

http://www.sos.ca.gov/elections/elections vsr.htm.<br />

[5] California Internet Voting Task Force (California Secretary of<br />

State). A report on the feasibility of internet voting, Jan 2000.<br />

http://www.ss.ca.gov/executive/ivote.<br />

[6] R. Carback, D. Chaum, J. Clark, J. Conway, A. Essex, P. S.<br />

Herrnson, T. Mayberry, S. Popoveniuc, R. L. Rivest, E. Shen,<br />

A. T. Sherman, and P. L. Vora. Scantegrity II municipal<br />

election at Takoma Park: The first e2e binding governmental<br />

election with ballot privacy. In USENIX Security Symposium,<br />

pages 291-306. USENIX Association, 2010.<br />

[7] D. Chaum, A. Essex, R. Carback, J. Clark, S. Popoveniuc, A.<br />

Sherman, and P. Vora. Scantegrity: End-to-end voter-verifiable<br />

optical-scan voting. Security & Privacy, IEEE, 6(3):40-46,<br />

May-June 2008.<br />

[8] Council of Europe. Recommendation Rec (2004) 11. Council of<br />

Europe, 2004.<br />

[9] Federal Voting Assistance Program. The uniformed and<br />

overseas citizens absentee voting act overview.<br />

http://www.fvap.gov/reference/laws/uocava.html.<br />

[10] S. Heiberg, P. Laud, and J. Willemson. The application of ivoting<br />

for Estonian parliamentary elections of 2011. In<br />

Proceedings of the Third VOTE-ID International Conference,<br />

Sep. 2011.<br />

61<br />

[11] K. Hole and L. Nestas. Building and maintaining trust in<br />

internet voting. Computer, PP(99):1, 2012.<br />

[12] D. Jefferson, A. D. Rubin, B. Simons, and D. Wagner.<br />

Security Analysis of the Secure Electronic Registration and<br />

Voting Experiment (SERVE). Aug. 2004.<br />

[13] R. Krimmer, S. Triessnig, and M. Volkamer. The<br />

development of remote e-voting around the world: a review<br />

of roads and directions. In Proceedings of the 1 st<br />

International Conference on E-voting and Identity, VOTE-<br />

ID'07, pages 1-15, Berlin, Heidelberg, 2007. Springer-<br />

Verlag.<br />

[14] M. Lesk. The new front line: Estonia under cyberassault.<br />

Security & Privacy, IEEE, 5(4):76-79, July-Aug. 2007.<br />

[15] M. McGaley and J. P. Gibson. A critical analysis of the<br />

Council of Europe recommendations on e-voting. In<br />

Proceedings of the 2006 USENIX/Accurate Electronic Voting<br />

Technology Workshop, 2006.<br />

[16] J. Mohen and J. Glidden. The case for internet voting.<br />

Commun. ACM, 44(1):72-85, Jan. 2001.<br />

[17] H. Pardue, A. Yasinsac, and J. Landry. Towards internet<br />

voting security: A threat tree for risk assessment. In Risks<br />

and Security of Internet and Systems (CRiSIS), 2010 Fifth<br />

International Conference on, pages 1-7, Oct. 2010.<br />

[18] S. Peisert, M. Bishop, and A. Yasinsac. Vote selling, voter<br />

anonymity, and forensic logging of electronic voting<br />

machines. In HICSS, pages 1-10. IEEE Computer Society,<br />

2009.<br />

[19] D. M. Phillips and H. A. von Spakovsky. Gauging the risks<br />

of internet elections. Commun. ACM, 44(1):73-85, Jan. 2001.<br />

[20] M. Prandini and M. Ramilli. Taking the best of both worlds:<br />

A comparison and integration of the U.S. and EU approaches<br />

to e-voting systems evaluation. In HICSS, pages 1-10. IEEE<br />

Computer Society, 2011.<br />

[21] G. Schryen and E. Rich. Security in large-scale internet<br />

elections: A retrospective analysis of elections in Estonia,<br />

The Netherlands, and Switzerland. Information Forensics<br />

and Security, IEEE Transactions on, 4(4):729-744, Dec.<br />

2009.<br />

[22] Technical Guidelines Development Committee, editor.<br />

Voluntary Voting System Guidelines Recommendations to the<br />

Election Assistance Commission. U.S. Election Assistance<br />

Commission, Aug. 2007.<br />

[23] M. Volkamer, O. Spycher, and E. Dubuis. Measures to<br />

establish trust in internet voting. In Proceedings of the 5 th<br />

International Conference on Theory and Practice of<br />

Electronic Governance, ICEGOV '11, pages 1-10, New York,<br />

NY, USA, 2011. ACM.<br />

[24] D. Wagner. Joint hearing of the house committee on science<br />

and the committee on house administration. Testimony on<br />

voting system standards. July 19, 2006.


Session 3<br />

Policies 1


A New Roadmap for Next-Generation Policy-Making<br />

Francesco Mureddu<br />

Tech4i2 Ltd, UK<br />

43B Mill Road, Leicester, UK<br />

francesco.mureddu@tech4i2.com<br />

Gianluca Misuraca<br />

European Commission, JRC IPTS<br />

C/ Inca Garcilaso, 3 - Seville, Spain<br />

gianluca.misuraca@ec.europa.eu<br />

ABSTRACT<br />

In the last thirty years the role of the government has moved<br />

consistently away from services provision to regulation. Society<br />

and economy has become more interconnected, unstable and<br />

unpredictable than ever, and citizens are keener to engage in<br />

complex policy making. Within this context, traditional tools for<br />

policy making, based upon the perfectly rational representative<br />

agent maximizing its own utility in a general equilibrium<br />

framework, have been demonstrated to be unable to predict and<br />

cope with some of today’s most pressing challenges, such as the<br />

financial crisis and climate change. Despite the explosion of data<br />

availability, the possibility to analyse them through<br />

crowdsourcing and large scale collaboration, the advance in<br />

modelling and simulation tools for assessing non-linear impact of<br />

policy options, the full potential offered by the new instruments<br />

for policy making has yet to be achieved. Therefore policy makers<br />

have not yet at their disposal a set of instruments able to cope with<br />

the needs stemming from their decision making activities.<br />

In order to meet those needs the project CROSSOVER “Bridging<br />

Communities for Next Generation Policy-Making” is elaborating<br />

a demand/driven “International Research Roadmap on ICT tools<br />

for Governance and Policy Modelling”, which links the needs and<br />

the activities of policy-making with current and future research<br />

challenges.<br />

Categories and Subject Descriptors<br />

I.6.0 Simulation and Modeling - General<br />

General Terms<br />

Management, Measurement, Performance, Economics<br />

Keywords<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

62<br />

David Osimo<br />

Tech4i2 Ltd, UK<br />

43B Mill Road, Leicester, UK<br />

david.osimo@tech4i2.com<br />

Stefano Armenia<br />

Sapienza University of Rome CATTID<br />

P.le Aldo Moro, 5 - 00185 Rome, Italy<br />

armenia@cattid.uniroma1.it<br />

Governance Analysis and Evaluation, Policy Making 2.0,<br />

Modelling and Simulation, System Dynamics, ICT Tools,<br />

Stakeholders’ Engagement<br />

INTRODUCTION<br />

The role of the government in the last century has not decreased<br />

as the common wisdom would suggest. In fact it has increased<br />

until the end of the ‘70s, and remained stable for the following 30<br />

years. However, the collapse of the Bretton Woods system<br />

together with its associated Keynesian policies marked the switch<br />

from a service provision role of the government towards a<br />

regulatory one, often in novel areas such as environment,<br />

telecommunications and technology [20]. As we will see, as<br />

governments are much more involved in “steering” than in<br />

“rowing”, today more than ever the role of the policy maker has<br />

become difficult due to new challenges. Nowadays, society and<br />

economy are more interconnected, unstable and unpredictable<br />

than they have ever been. As pointed out by [25], we live in the<br />

age of “Extremistan”, a world of “tipping points” [23], “cascades”<br />

and “power laws” [4], where extreme events are “the new normal”<br />

[12].<br />

The policy issues of our age can be addressed only through the<br />

collaboration of all the components of the society, including the<br />

private sector and individual citizens [11]. In fact only changes in<br />

the daily behaviour of citizens can help to tackle challenges such<br />

as climate change, consumable resources and sustainability of the<br />

health system. As clarified by the UK Prime Minister, David<br />

Cameron, "the success of the Big Society will depend on the daily<br />

decisions of millions of people" 1 .<br />

In addition citizens are more than ever willing to engage in<br />

complex policy decision making according to the emergence of<br />

the "Gov 2.0 paradigm" offering new opportunities to enter into<br />

data production, analysis and decision-making. On the other hand<br />

this participation is often fruitless as it is limited to conversations<br />

on social networks, blogs and twitter and a real impact has been<br />

achieved only in specific, highly advertised cases that led to a<br />

massive mobilisation. Moreover the participation seems to be<br />

limited to individuals highly interested and motivated in policy<br />

issues. Finally, seldom the human nature is able to take into<br />

account the long-term impact of our choices, as short-term<br />

impacts are more predictable and visible [16]. However, in an<br />

1 See http://www.bbc.co.uk/news/uk-politics-12443396


interconnected, unstable and unpredictable world the long-term<br />

impact of the policy choices might have unintended<br />

consequences.<br />

In this view, traditional policy-making tools are flawed as they<br />

assume an abstract and unrealistic human being: perfectly rational<br />

(utility maximizing), consistent (not heterogeneous), atomised<br />

(not connected through networks), wise (thinking long-term) and<br />

politically committed. In fact most of the current policy modelling<br />

and simulation practices are rooted on traditional mathematical<br />

models, linear econometric tools or dynamic stochastic general<br />

equilibrium models, based upon the perfectly rational<br />

representative agent maximizing its own utility in a general<br />

equilibrium framework. As shown by [18], all these tools may not<br />

be consistent when applied in the public policy context.<br />

At any rate, today we see the possibility of an ICT-enabled policymaking<br />

model taking full account of the complexity of human<br />

nature. There is a number of social modelling and simulation tools<br />

already available, buy they are built for ad-hoc purposes and<br />

suffer a lack of scalability. In fact there is a tendency to reinvent<br />

and develop “own” models and simulation tools so that adoption<br />

of a policy modelling approach still demands a lot of resources<br />

preventing returns to scale to be fully enjoyed [5][6].<br />

Nevertheless there are several main trends impacting the current<br />

and future policy making: the explosion of data availability given<br />

by the open government data movement and the data provided by<br />

sensors and citizens, the growth of research dedicated to analyzing<br />

those data through crowdsourcing and large scale collaboration,<br />

the improvement of modeling and simulation tools assessing the<br />

possible non-linear impact of policy options. These trends clarify<br />

the need for the next generation of policy making models.<br />

To this end, the CROSSOVER “Bridging Communities for Next-<br />

Generation Policy-Making”, which is a Coordination and Support<br />

Action (FP7-ICT-2011-7, No. 288828) financed by the European<br />

Commission under the objective ICT-7-5.6 – “ICT Solutions for<br />

governance and policy modeling” aims to:<br />

o Bring together and reinforce the links between the different<br />

global communities of researchers and experts by animating<br />

knowledge exchange across communities of practice.<br />

o Reach out and raise the awareness of non-experts and<br />

potential users, with special regard to high-level policymakers.<br />

o Establish the scientific and political basis for long-lasting<br />

interest and commitment to next generation policy-making,<br />

by focusing on a demand-driven approach, involving policymakers<br />

and defining a collaborative stakeholders’<br />

sustainability plan.<br />

More in particular the CROSSOVER project is elaborating a new<br />

International Research Roadmap on ICT Tools for Governance<br />

and Policy Modelling, which aims to provide a clear outline of<br />

what technologies are available now for policy-makers to improve<br />

their work, and what could become available tomorrow. The<br />

roadmap has a demand-driven approach: rather than focusing on<br />

the technology, it starts from the needs and the activities of<br />

policy-making and then links to the current and future research<br />

challenges.<br />

63<br />

The project builds on the CROSSROAD 2 model 3 and roadmap 4<br />

with the aim to reach a stronger focus on policy modelling. More<br />

precisely CROSSOVER focuses on two Grand Challenges (GC),<br />

already part of the CROSSROAD roadmap, which are more in<br />

line with the current workprogramme priorities: GC1 - Policy<br />

Modelling and GC2 – Data-powered Collaborative Governance.<br />

Each Grand Challenge embeds a number of research challenges in<br />

governance and policy modelling.<br />

The aim of this paper is therefore to present the new research<br />

roadmap on ICT Tools for Governance and Policy Modelling<br />

aimed at providing an outline of what technologies are and will be<br />

available to meet the needs of policy-makers. The structure of the<br />

paper continues as follows. Section 2 identifies the methodology<br />

applied for this research. Section 3 describes the research<br />

roadmap. Finally section 4 offers some conclusions and future<br />

research directions.<br />

METHODOLOGY<br />

The roadmap is being developed by the means of desk-based<br />

review (e.g. literature review and meta analysis), discussion and<br />

interviews with experts, and crowdsourcing 5 . More in particular<br />

we define a technology roadmapping exercise, which is a strategic<br />

planning approach to identify the actions and funding decisions<br />

needed to boost technological development and innovation. The<br />

term “roadmap” refers to the main purpose of this approach, i.e. to<br />

chart an overall direction for technology development or usage<br />

[7].<br />

On the one hand the roadmap constitutes a shared vision, able to<br />

inspire collaborative and interdisciplinary research, and between<br />

academia, business, civil society and government. On the other<br />

hand it is a useful tool, able to provide support and orientation to<br />

policy-modelling also after the end of the project. The potential of<br />

roadmapping is significant in the domain of ICT for governance<br />

and policy modelling as it can constitute an important input in the<br />

selection of future research priorities by highlighting the emerging<br />

themes and key technological applications (ICT tools) likely to<br />

impact on policy in the coming years. Furthermore roadmapping<br />

is one of the “recommended best practices” for the selection of<br />

priorities in R&D programmes since it does not only identify the<br />

bottlenecks that need to be addressed within a realistic time frame,<br />

but it can also lead to a high degree of consensus if potential<br />

beneficiaries are involved in the agenda-setting process [17].<br />

THE RESEARCH ROADMAP<br />

As mentioned above, the new International Research Roadmap on<br />

ICT Tools for Governance and Policy Modelling builds on the<br />

previous CROSSROADS roadmap. However the new exercise<br />

represents an improvement in many respects. First, the roadmap is<br />

built following a demand-driven approach: rather than focusing<br />

exclusively on technology, the present roadmap starts from the<br />

2 CROSSROAD - A Participative Roadmap for ICT research on<br />

Electronic Governance and Policy Modelling www.crossroad-eu.net<br />

3 For a presentation of the CROSSROAD model of ICT for governance<br />

and policy modelling please refer to Osimo et al. (2010)<br />

4 For the CROSSROAD white paper and research roadmap please refer to:<br />

http://crossroad.epu.ntua.gr/files/2010/02/CROSSROAD-<br />

State_of_the_Art_Analysis-White_Paperv1.00.pdf<br />

5 The roadmap in commentable format has been published in the project<br />

website and has been disseminated through the http://www.crossoverproject.eu/UserSurvey.aspx


needs and the activities of policy-making and then links to the<br />

research challenges. In fact on the one hand each research<br />

challenge has a direct correspondence to a benefit stemming from<br />

policy making 2.0 tools (i.e. what need does the methodology and<br />

ICT tool address), such as:<br />

o Detect and understand problems before they become<br />

unsolvable<br />

o Generate high involvement of citizens in policy-making<br />

o Identify “good ideas” and innovative solutions<br />

o Reduce uncertainty on the possible impacts of policies<br />

o Encourage behavioural change and uptake<br />

o Detect non-compliance and mis-spending<br />

o Understand the impact of policies<br />

On the other hand each research challenge is explicitly linked to a<br />

traditional activity of policy-making, based on the conventional<br />

policy-making cycle:<br />

o Agenda setting: basic analysis on the nature and size of<br />

problems at stakes are addressed, including the causal<br />

relationships between the different factors<br />

o Policy design: development of the possible solutions, the<br />

analysis of the potential impact of these solutions, the<br />

development and revision of a policy proposal<br />

o Adoption: this is the most delicate and sensitive area, where<br />

accountability and representativeness are needed. It is also<br />

the area most covered by existing research on e-democracy<br />

o Implementation: often considered the most challenging<br />

phase, as it needs to translate the policy objectives in<br />

concrete activities, that have to deal with the complexity of<br />

the real world. It includes ensuring a broader understanding,<br />

the change of behaviour and the active collaboration of all<br />

stakeholders.<br />

o Monitoring and evaluation: make use of implementation<br />

data to assess whether the policy is being implemented as<br />

planned, and is achieving the expected objectives.<br />

Second, in CROSSOVER, more emphasis is put on cases and<br />

applications: each research challenged is enriched with inspiring<br />

cases bearing a global perspective. Furthermore the new roadmap<br />

bears a stronger focus on ICT for Governance and Policy-<br />

Modelling, by dropping more peripheral grand challenges of<br />

Government Service Utility and Scientific Base for ICT-enabled<br />

Governance 6 . Finally, the project is elaborating a “living”<br />

roadmap, accompanied by an online repository of tools, people<br />

and applications.<br />

Let us now describe the two Grand Challenges composing the<br />

roadmap.<br />

The GC1 - Policy Modelling concerns the development of tools<br />

and methodologies able to design an efficient and effective<br />

decision making process, capable of detecting emergencies,<br />

anticipate future events and evaluate the impact of different policy<br />

choices. Furthermore GC1 fosters the engagement of the<br />

stakeholders in models building and in the evaluation and<br />

simulation of policy making.<br />

The GC2 – Data Powered Collaborative Governance is related<br />

6 On this see CROSSROAD, 2012.<br />

64<br />

to the fact that the current citizen participation scene is<br />

characterised by an engagement of highly committed people only,<br />

and by an involvement that rarely stimulates genuine action.<br />

However there are several complementary research areas in ICT<br />

for governance and policy modelling that have the opportunity to<br />

address the need for collaboration and behavioural change<br />

throughout different technological layers: enhanced data<br />

availability through public linked data and participatory sensing,<br />

analytical capability through opinion mining and visual analytics,<br />

and action-oriented tools such as simulation and serious gaming.<br />

These trends mutually reinforce each other to offer a new<br />

opportunity for future ICT for governance and policy modelling.<br />

For each Grand Challenge the roadmap describes a number of<br />

research challenges highlighting their definition, the potential<br />

opportunities for governance, the state of the art of market and<br />

research, the existing challenges/gaps, the recommended research<br />

themes and most importantly the inspiring application cases.<br />

GC1 encompasses the following research endeavors:<br />

o Systems of Atomized Models<br />

o Collaborative modelling<br />

o Easy access to information and knowledge creation<br />

o Model validation<br />

o Interactive simulation<br />

o Output analysis and knowledge synthesis<br />

On the other hand GC2 encompasses the following research<br />

challenges:<br />

o Big Data<br />

o Opinion Mining and Sentiment Analysis<br />

o Visual Analytics<br />

o Serious Gaming for Behavioural Change<br />

o Open Government Data<br />

o Collaborative Governance<br />

o Participatory Sensing<br />

o Identity Management<br />

CONCLUSIONS: CLOSING THE LOOP OF<br />

POLICY-MAKING<br />

The last 30 years witnessed a change in the government role, from<br />

services provider to mere regulator. At the same time the role of<br />

the policy makers became increasingly difficult. This because, as<br />

[25] points out, we live in the age of "Extremistan", a world in<br />

which society and economy are more than ever interconnected,<br />

unstable and unpredictable. This extreme instability takes place<br />

not only in negative forms such as the financial crisis and the<br />

global warming but also in positive development, such as the<br />

continuous emergence of new players and business models on the<br />

market. Unfortunately the current tools available for policy<br />

design, implementation and evaluation are not suitable for<br />

capturing this complex and interconnected nature. The cause of<br />

this may be found in the fact that current tools are rooted on<br />

traditional mathematical models (rational expectations), linear<br />

econometric tools or dynamic stochastic general equilibrium<br />

models.<br />

Alternative tools, based on complexity science and enabled by the<br />

explosion of data availability, are yet to be widely adopted. To<br />

support policy makers in meeting the challenges of implementing<br />

more appropriate tools for policy-making, the CROSSOVER


project is elaborating an updated version of the “International<br />

Research Roadmap on ICT tools for Governance and Policy<br />

Modelling”, initially designed as part of the CROSSROAD's<br />

project in 2010.<br />

As for the partial results of our exercise, on the one hand we<br />

designed the research challenges in relation to specific needs of<br />

the policy makers. For instance: systems of atomized models and<br />

model validation are related to early detection and understanding<br />

of problems; collaborative modelling and visual analytics are<br />

related to generating high involvement of citizens; immersive<br />

simulation is related to reducing the uncertainty on the possible<br />

impacts of policies; opinion mining is related to the need of<br />

identify “good ideas” and innovative solutions; and finally open<br />

data is related to the need of detecting non-compliance and misspending,<br />

as well as to understanding the impact of policies.<br />

On the other hand we were able to connect the research challenges<br />

to specific phases of the policy cycle:<br />

o Agenda setting: in this phase take place the identification and<br />

analysis of problem. Within this scope, visualization and<br />

opinion mining can help to identify the problems at an early<br />

stage, while advanced modelling techniques are used to<br />

disentangle the casual relationships behind the problem as<br />

well as to understand the causal roots that need to be<br />

addressed by policy<br />

o Policy design: on one side immersive simulations support<br />

decision-makers by taking into account unexpected impacts<br />

and relationships, in order to facilitate the choice of the most<br />

effective option. On the other side collaborative governance<br />

enables then to develop further and fine-tune the most<br />

effective option, for example through commentable<br />

documents<br />

o Policy implementation: social network analysis,<br />

crowdsourcing and serious gaming ensure awareness, buy-in<br />

and collaboration from the widest range of stakeholders<br />

o Monitoring and evaluation: Open data and sentiment<br />

analysis, alongside advanced visualization techniques, allow<br />

stakeholders and decision makers to better monitor execution<br />

and can be used to evaluate the impact of the policy<br />

As for future research, the roadmap is being published and<br />

disseminated in commentable format in order to seek input and<br />

validation from stakeholders (on the importance of the proposed<br />

research challenges), researchers (on the actual research carried<br />

out on the proposed challenges), and finally policy makers (on the<br />

actual adoption of the proposed tools). Furthermore it is ongoing<br />

an online survey of ICT needs and challenges of policy makers<br />

which will inform the last version of the roadmap.<br />

ACKNOWLEDGMENT AND DISCLAIMER<br />

The research activity leading to this paper has been funded by the<br />

European Commission under the activity ICT-7-5.6 – “ICT<br />

Solutions for governance and policy modeling” within the<br />

Coordination and Support Action (FP7-ICT-2011-7, No. 288828)<br />

CROSSOVER project “Bridging Communities for Next<br />

Generation Policy-Making”.<br />

The views expressed in this paper are purely those of the authors<br />

and may not in any circumstances be regarded as stating an<br />

official position of the European Commission.<br />

65<br />

REFERENCES<br />

[1] Bowman, B., Debray, S. K., and Peterson, L. L. Reasoning about<br />

naming systems. ACM Trans. Program. Lang. Syst., 15, 5 (Nov.<br />

1993), 795-825.<br />

[2] Alexopoulos, C., and Kim, S. (2002). Output Data Analysis for<br />

Simulations. Proceedings of the 2002 Winter Simulation Conference.<br />

San Diego (CA), 8-11 December 2002.<br />

[3] Alexopoulos, C., and Seila, A. (1998). Output Data Analysis. In J.<br />

Banks, Handbook of Simulation: Principles, Methodology,<br />

Advances, Applications and Practice. New York: John Wiley.<br />

[4] Barabasi, A. L., 2003. Linked: How Everything is Connected to<br />

Everything Else and What it Means for Business and Everyday Life,<br />

Plume Books.<br />

[5] CROSSROAD (2010), White Paper on State of the Art in ICT for<br />

Governance and Policy Modelling, Lampathaki, F., Koussouris, S.,<br />

Charalabidis, Y., Askounis, D., Mouzakitis, S., Passas, S., Tsavdaris,<br />

H., Osimo, D., De Luca, A., Armenia, S., Bicking, M., Wimmer, M.,<br />

Misuraca, G..<br />

[6] CROSSROAD, (2012) Paving the Way for Future Research in ICT<br />

for Governance and Policy Modelling, Charalabidis, Lampathaki,<br />

Askounis (Eds), Bookstars Publishing, available at:<br />

http://crossroad.epu.ntua.gr/files/2010/02/CROSSROAD_Book-vfallinon.pdf<br />

[7] De Laat, B., 2004. Conditions for effectiveness in Roadmapping: a<br />

cross-sectional analysis of 80 different exercises. EU-US Scientific<br />

Seminar on New Technology Foresight, Forecasting & Assessment<br />

Methods<br />

[8] Goldsman, D. (2010). Simulation Output Analysis. Speech at School<br />

of ISyE. Georgia Tech, Atlanta (GE), 26 May 2010.<br />

[9] Goldsman, D., and Nelson, B. (1998). Comparing systems via<br />

simulation. In J. Banks, Handbook of Simulation: Principles,<br />

Methodology, Advances, Application and Practice. New York: John<br />

Wiley.<br />

[10] Goldsman, D., and Tokol, G. (2000). Output analysis procedures for<br />

computer simulations. Proceedings of the 2000 Winter Simulation<br />

Conference. Orlando (FL).<br />

[11] Goldsmith, S. and Eggers, W.D., 2004. Governing by Network: The<br />

New Shape of the Public Sector, Brookings Institution. Available at:<br />

http://www.amazon.co.uk/Governing-­‐‑Network-­‐‑Shape-­‐‑Public-­‐‑Sector/<br />

dp/0815731299.<br />

[12] Hinssen, P. (2010). The New Normal. MachMedia NV<br />

[13] Kelton, W. (1997). Statistical Analysis of Simulation Input.<br />

Proceedings of the 1997 Winter Simulation Conference. Atlanta<br />

(GA)<br />

[14] Law, A. (2006). Simulation Modelling and Analysis. New York:<br />

McGraw-Hill.<br />

[15] Lessig, L. (2009). Against transparency. The New Republic.<br />

Retrieved from http://www.tnr.com/article/books-and-arts/againsttransparency<br />

[16] Misuraca, G., (2012). eGovernance 2.0: implications of social<br />

computing on public services, in Public Services, Governance and<br />

Web2.0 Technologies: Future Trends in Social Media, a Book edited<br />

by Ed Downey and Matthew Jones, January 2012 - http://www.igiglobal.com/book/public-service-governance-webtechnologies/56009<br />

[17] Misuraca, G., Broster, D. and Centeno, C. (2011). Digital Europe<br />

2030: Designing scenarios for ICT in future governance and policy<br />

making, in Government Information Quarterly, Special Issue<br />

10/2011, Elsevier Publishing


[18] Moss, S., (2010). Policy Modelling, Open Collaboration and The<br />

Future of eGovernance. Crossroad Call for Papers<br />

[19] Nakayama, M. (2002). Simulation Output Analysis. Proceedings of<br />

the 2002 Winter Simulation Conference. San Diego (CA)<br />

[20] OECD. (2005). Modernising government: the way forward. Paris,<br />

France, OECD.<br />

[21] Osimo, D. et al., 2010. The CROSSROAD Roadmap on ICT for<br />

Governance and Policy Modeling.<br />

66<br />

[22] Sargent, R. (2009). Verification and Validation of Simulation<br />

Models. Proceedings of the 2009 Winter Simulation Conference.<br />

Austin (TX), 13-16 December 2009.<br />

[23] Schelling, T.C., (1969). Models of segregation. The American<br />

Economic Review, 59(2), pp. 488-493. Available at:<br />

http://www.jstor.org/stable/1823701.<br />

[24] Schlesinger, M. (1979). Terminology for model credibility.<br />

Simulation, 32(3), 103-104.<br />

[25] Taleb, N. (2008). The Black Swan: The Impact of the Highly<br />

Improbable. Penguin.


Best International Practices for Access, Ownership and<br />

Use of Information and Communication Technologies for<br />

People with Sensory Disabilities<br />

Marco Peres<br />

Universidad Externado de Colombia<br />

Calle 28 # 13 A- 24 apartment 1304<br />

Bogotá, D.C.- Colombia<br />

+571 4612653<br />

marco.peres@uexternado.edu.co<br />

ABSTRACT<br />

This paper aims to describe the results shown by the consultancy<br />

report requested by the Ministry of Information Technologies and<br />

Communications of Colombia, which highlights the programs and<br />

projects for national and international access, ownership and use<br />

of information technologies and communications for people with<br />

sensory limitations in countries like Colombia, Mexico, Spain,<br />

United States, Canada and Brazil. The dimensions underlying the<br />

research are related to the appropriation of ICTs in education, in<br />

access to employment and social integration, the use of electronic<br />

means for political participation and access to the range of cultural<br />

activities and recreation in this community.<br />

Categories and Subject Descriptors<br />

K.4. [Computers and Society]: Public Policy Issues<br />

General Terms<br />

Documentation<br />

Keywords<br />

Sensory impairment, digital inclusion, digital literacy<br />

1. INTRODUCTION<br />

According to Article nine of the UN Convention on the Rights of<br />

Persons with Disabilities, it is the obligation of States: "... so that<br />

people with disabilities to live independently and participate fully<br />

in all aspects of life, take appropriate measures to ensure access<br />

for people with disabilities on an equal basis with others, the<br />

physical environment, transportation, information and<br />

communications, including computer systems and information<br />

technologies and communications, and other facilities open to the<br />

public or public use, both in urban and rural areas .. 1 "as well as,<br />

implementing programs that facilitate the use and ownership of<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

1 http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1964930<br />

67<br />

Paula Suárez<br />

Universidad Externado de Colombia<br />

Carrera 64 # 24-47 apartment 503,<br />

Bogota, Salitre, Colombia<br />

+57 313 8306908<br />

paucasuarez@gmail.com<br />

the means necessary to include this population in the dynamics of<br />

socioeconomic and political development that generate on their<br />

own information technology and communications. Means and<br />

measures taken by States must have in mind then, the existence of<br />

gaps in digital literacy, access to education and electronic media,<br />

faced by people with disabilities, so it has to generate public<br />

policies and focus on the needs of this group, differentiating by<br />

type of limitation, age and educational level.<br />

Thus, our research shows that those experiences that we can deem<br />

successful are those in which States have taken the characteristics<br />

of the group in different contexts and settings, created inclusion,<br />

access to public education, health, government and employment<br />

into account, with all possible means of interaction to eradicate<br />

drawbacks to people with disabilities.<br />

2. CONTEXT<br />

The world report on disability made by the World Health<br />

Organization (WHO) in association with the World Bank Group,<br />

estimates that ... more than one billion people worldwide live with<br />

some form of disability, of whom nearly 200 million experience<br />

considerable difficulties in its operation 2 , hence governments are<br />

concerned in creating enabling factors for this population with<br />

regard to access to essential services for normal daily activities,<br />

since the number of people with limitations grows and their<br />

situation is exacerbated by poverty and exclusion.<br />

The need for digital literacy in the population with disabilities is a<br />

reality and a priority on the agendas of governments. At the latest<br />

World Summit on the Society of Information, UNESCO and<br />

CEPAL agreed that ICTs are a useful tool for achieving<br />

development and equity. 3 The provision of information<br />

technology, and digital literacy, defined as the ease of access and<br />

use of information technology and communications 4 , turns out to<br />

be of the essence to create a favorable scenario. These policies<br />

targeted at people with sensory disabilities, (defined as those who<br />

suffer from hearing impairments, visual or both) are necessary,<br />

since the benefits related to literacy, range from the ease in the<br />

normal course of daily activities to the full exercise of citizenship.<br />

2 http://www.who.int/disabilities/world_report/2011/accessible<br />

_es.pdf<br />

3 http://bvs.sld.cu/revistas/aci/vol13_1_05/aci04105.htm<br />

4 Ramírez Leyva. Elsa Margarita. La lectura, Alfabetización en<br />

Información y Cultura de la Información.2007.


2.1. National digital inclusion experience for<br />

people with sensory disabilities<br />

According to the National Bureau of Statistics (DANE), in 2005<br />

6.4% of Colombia's population suffers from some form of<br />

permanent disability 5 . This finding, based on the general<br />

population census, shows alarming statistics in this field; as a<br />

result, digital inclusion has become a priority in Colombia. The<br />

Ministry of ICT through its "Communication Technologies for<br />

Disabled People" and their project "New Technologies for<br />

Information Access of the Blind", "Connecting Senses" for deaf<br />

blind people and the "Relay Center" for deaf people, have been<br />

trying to start the process of including people with sensory<br />

limitations by accessing and using information technologies.<br />

Communication Technologies for Population with Disabilities<br />

Program: This program focuses on providing a range of<br />

technology solutions to people with sensory disabilities, to<br />

generate the active participation of these individuals in the<br />

different spheres of social interaction, including the democratic<br />

process. The Ministry of ICT in Colombia, has carried out various<br />

activities for inclusion, such as the Respite Center Project for the<br />

Deaf, which tries to break the communication barriers that this<br />

population suffers. This program has generated a number of<br />

public telephone centers for the deaf, along with the National<br />

Federation of the Deaf of Colombia (FENASCOL) and the<br />

Telephone Company of Bogotá (ETB), which implements text<br />

phones to enable communication between a deaf and a hearing<br />

person. The implementation of closed captioning (subtitles for the<br />

deaf) on television is another initiative that the Ministry has<br />

promoted for the deaf to interpret mass media such as television. 6<br />

New Technologies Project for Information Access for the<br />

Blind: The Ministry of Information Technologies and<br />

Communications, with the help of the National Institute for the<br />

Blind (INCI), has built public libraries for visually impaired<br />

people who can use ICTs and benefit from them, through devices<br />

like: digital book readers and printers to convert braille<br />

documents.<br />

Connecting Senses Program: This program targets people with<br />

deaf blindness conditions, led by the Ministry of Information<br />

Technology and the Colombian Association of the Deaf Blind<br />

(SURCOE). It is responsible for facilitating technology for<br />

classroom use and appropriation of information and<br />

communications technologies in the process of socialization for<br />

this population that has its own characteristics. Connecting Senses<br />

has sought ways to respond to the demands of deaf blind people<br />

holistically, as it has generated an implementation scheme that<br />

takes into account not only the adaptation of ICT for people with<br />

this sensory disability, but also makes special efforts to train<br />

people interested in the topic, as the role of companions for people<br />

with deaf blindness is crucial in the dynamics of socialization.<br />

3. BEST INTERNATIONAL ICT METHODS<br />

TO EMPOWER PEOPLE WITH SENSORY<br />

DISABILITIES<br />

5 http://www.dane.gov.co/index.php?option=com_content&view<br />

=article&id=307&Itemid=124<br />

6 http://201.234.78.217/mincom/faces/index.jsp?id=2334<br />

68<br />

In order to identify the best ICT practices at the international level<br />

aimed at people with sensory disabilities, the following factors<br />

were taken into account: the number of people with sensory<br />

disabilities within each territory, the structure and contribution to<br />

inclusion, the potential for adaptation in the provision of public<br />

services, education, employment, political participation and access<br />

to cultural activities or entertainment.<br />

3.1. Methodology for selecting successful<br />

international practices<br />

The international review of best practices was obtained from the<br />

collection of information from public, private or mixed source<br />

inclusion programs for people with sensory disabilities, which<br />

were selected according to parameters relevant to the digital<br />

inclusion of people with sensory disabilities, this is why there are<br />

three criteria for selection of successful international practices<br />

relating to: 1) the level of practice approach that has the problem<br />

of exclusion of people with sensory, 2) coverage and provide the<br />

inclusion of people with limitations and 3) the potential for<br />

adaptation to cover several dimensions of inclusion (i.e.<br />

education, employment, political participation, etc.).<br />

3.1.1 Criteria approach to the problem of exclusion of<br />

people with sensory disabilities<br />

This criterion is defined as the initiative or practice that is<br />

responsible for solving the problem of exclusion experienced by<br />

people with sensory disabilities. Depending on the conceptual<br />

characteristics of each approach, different alternative solutions<br />

emerge with dramatically different impacts on the lives of people<br />

with visual and auditory disabilities. In this regard there are four<br />

main approaches to address the problem of exclusion.<br />

Exclusion as a personal and individual limitation: This approach<br />

involves recognizing a situation of vulnerability and disadvantage<br />

people with sensory disabilities, which prevents it from interacting<br />

with the rest of society safely and fairly. This approach generates<br />

responses (programs) to direct attention to the individual such as<br />

educational centers or community support.<br />

As a population characteristic: This perspective does not<br />

portray people with sensory disabilities as a vulnerable group, but<br />

as a population group with characteristics that make it different<br />

from the rest of society, as would be the ethnic, religious or<br />

cultural. This approach generates projects including direct and<br />

indirect: direct projects that seek alternative solutions such as<br />

access to specialized education for the visually impaired, to<br />

promote job training and recruitment of this population and<br />

indirect projects which allow them to create partnerships aimed at<br />

achieving a political representation to ensure that this population<br />

is taken into account as a group with characteristics distinct from<br />

the majority society, and therefore must be treated and cared for<br />

differently.<br />

As a matter of physical environment: This approach assumes<br />

that people with disabilities encounter significant difficulties when<br />

interacting with their environment, and therefore, if it is modified<br />

taking into account the sensory abilities of people with sensory<br />

disabilities, to improve their living conditions visibly. This<br />

approach integrates accessibility projects to public buildings,<br />

private buildings regulations to the public and promotes<br />

alternatives to the existing infrastructure which meets the needs of<br />

people with sensory disabilities.


As a matter of human environment: the latter approach to the<br />

problem of exclusion of people with limitations, aims to get<br />

people who have contact with individuals with sensory disabilities<br />

to be able to interact with them, that is, that the responsibility for<br />

social integration lies not only in the individuals with disabilities,<br />

but extends to individuals in regular conditions of perception. this<br />

type of approach promotes alternatives such as indirect inclusion:<br />

raising awareness, training for family members, teachers and<br />

chaperones.<br />

3.1.2. Coverage and contribution to the inclusion<br />

This criterion refers to the ability to serve people with sensory<br />

disabilities, while a positive influence to avoid isolation and<br />

segregation of the population. Similarly, coverage, rather than as a<br />

quantitative index can be understood as the flow direction or<br />

orientation of the actions needed to access or benefit from a<br />

particular program. Here there are: 1) individual care programs, 2)<br />

direct government actions and 3) indirect government actions:<br />

Individual care programs: Tend to only one person or individual<br />

with sensory disabilities, may be of a private or public source.<br />

The objective of such programs is to achieve human development<br />

and social reintegration of the person with limited sensory abilities<br />

Direct government action: Are those actions that are national,<br />

state or local, as appropriate, whose aim is to benefit all people<br />

with sensory disabilities in a particular jurisdiction, such as a law.<br />

These actions differ from individual public actions in the sense<br />

that citizens with sensory disabilities do not have to search for<br />

programs to access them because the initiative includes the<br />

general population with sensory disabilities<br />

Indirect public actions: The indirect actions of public coverage<br />

are those that, like direct public coverage, cover a jurisdiction, but<br />

in this case, do not direct impact on individuals with disabilities,<br />

but rather, their environment<br />

3.1.3. Potential for adaptation to cover several<br />

dimensions of inclusion<br />

Adaptation refers to the possible extension of the use of a program<br />

into other dimensions of impact (employment, education, political<br />

participation, personal autonomy, etc). This approach which seeks<br />

to identify those practices that generate coverage, operation and<br />

ownership by people with sensory disabilities, can be applied<br />

across several dimensions of impact simultaneously or<br />

independently in a potential program or policy of digital inclusion<br />

for people with sensory disabilities<br />

3.2. Programs for digital inclusion of the<br />

visually impaired population<br />

As part of the generation of programs for inclusion in the access,<br />

use and appropriation of ICTs for people with visual, people need<br />

to define what can be described within this group, according to the<br />

World Health Organization, are part of the community with visual<br />

impairment, those who suffer from total blindness in one or both<br />

eyes or those with profound visual impairment (partial blindness<br />

or profound amblyopia amblyopic itself) with respect to visual<br />

acuity at such a level that affects the normal execution of daily<br />

activities, according to the ONCE (National Organization of<br />

69<br />

Spanish Blind) are blind persons whose visual field is reduced to<br />

10 ° or less 7 .<br />

One of the data provided research initiatives around access, use<br />

and appropriation of ICTs, internationally, is related to the<br />

interaction of participants of different natures, since those who run<br />

programs for assisting communities with sensory are not only<br />

public but also private.<br />

There are several initiatives for us to highlight that grant access to<br />

ICTs for people with visual impairments, such as the one<br />

promoted by the Brazilian Ministry of Education and Culture,<br />

which provides the blind with free Mecdaisy software for the<br />

conversion of digital textbooks , this in order to provide tools for<br />

academic and intellectual development of visually impaired<br />

users 8 . In the United States, for example, a legislative initiative<br />

called Americans with Disabilities Act, established the obligation<br />

of both public and private institutions to provide people with<br />

disabilities technologies and devices which are required for access<br />

to information and public services, while in Spain, the scientific<br />

community is most interested in developing specialized<br />

technologies, as it has released a device to see with their<br />

hands, thus facilitating the mobility of blind people through a<br />

technology that converts images into tactile signals.<br />

The adaptation of existing technologies to the needs of the blind,<br />

is the strategy that Mexico is betting on, and that initiatives such<br />

as the Library for the Blind National Autonomous University of<br />

Mexico, show the Mexican government's willingness to attend<br />

and include people with disabilities in education.<br />

3.3. Digital inclusion initiatives for hearing<br />

impaired<br />

The inclusion of deaf people, access to and use of information<br />

technology differs from the dynamics meant for the blind. Even<br />

though both are limitations of a sensory type, the characteristics of<br />

a deaf person call for other programs that cater to different needs<br />

that are unique to this population. According to the World Health<br />

Organization, ninety-three percent of deaf people have no access<br />

to sign language interpretation service 9 , hence it is essential for<br />

communication, use and access to information and<br />

communications technologies.<br />

In Mexico, for example, CONFETER a government sponsored<br />

initiative since 2005 has compelled telecommunication providers<br />

to furnish the necessary technology (such as telephones that<br />

eliminate sound systems interference, vibrating phones, lit alert<br />

indicators and amplified speakers) that facilitates communication<br />

access to the hearing impaired.<br />

Additionally, the Canadian private sector has answered the<br />

hearing impaired communications challenge with organizations<br />

such as The Canadian Society of the Deaf. This is Canada´s main<br />

purveyor of services, products and information that eliminate the<br />

stumbling blocks that limit the communication of the hearing<br />

impaired.<br />

3.3. Best methods for deaf-blind people<br />

This population, which suffers from two limitations (auditory and<br />

visual) depending on each individual case, may or may not benefit<br />

from projects designed for the deaf or blind. However, there are<br />

7<br />

http://www.juntadeandalucia.es/averroes/caidv/interedvisual/<br />

ftp_p_/def_bajavision_ceguera.pdf.<br />

8<br />

http://www.ufpel.edu.br/cic/2009/cd/pdf/CH/CH_00288.pdf<br />

9<br />

http://www.who.int/disabilities/world_report/2011/summary<br />

_es.pdf


advanced initiatives specifically designed to assist this population.<br />

For example, the Department of Rehabilitation Services of<br />

Mississippi, United States, provides the deaf-blind population<br />

with technological, pedagogical and psychological devices (such<br />

as hand magnifiers to read, high-intensity lamps, small telescopes<br />

to read from a distance and small circuit television or computers<br />

that magnify printed material) this with the idea of satisfying the<br />

needs and overcoming the barriers this population faces in relation<br />

to such common activities as learning and communication.<br />

However, the characteristics of the condition of deaf-blindness,<br />

also calls for specialized care programs for access to ICT, a highly<br />

trained companion that can help these people. Nevertheless,<br />

despite the fact that this population possesses less communication<br />

capabilities, it has not been given higher priority within<br />

international programs for the deaf-blind community.<br />

3.3. People with sensory disabilities in the<br />

countries analyzed<br />

Table 3: Number of people with sensory disabilities<br />

Country Census of<br />

the country<br />

(million)<br />

Blind<br />

Population<br />

Deaf<br />

Population<br />

Populatio<br />

n with<br />

deaf<br />

Blindness<br />

Colombia 46,51,645 2.4% 0.98% _<br />

Mexico 112,336,538 1.15% 3.6% _<br />

Spain 45,283,259 0.13% 2.3% 0.013%<br />

UU.EE. 305,000,000 8.2% 3.2% _<br />

Canada 34,030,589 0.52% 0.91% 0.04%<br />

Brazil 203,429,773 0.73% 0.083% _<br />

As evidenced by the table above, the most populous country with<br />

sensory disabilities is United States of America where 11.4% of<br />

the population is visually and hearing impaired , excluding people<br />

with both limitations, followed by Colombia where 3, 4% of the<br />

total population presented some sensory limitation (blind or deaf),<br />

then Spain with 2.43% of people with sensory limitations, fifth<br />

place belongs to Canada with 1.44% of the population with<br />

sensory disabilities and Mexico with 1.15% of visually impaired<br />

people.<br />

4. CONCLUSIONS<br />

To build successful programs in the care of people with sensory<br />

disabilities, we must recognize that this is a population group with<br />

its own characteristics in need of specialized care. International<br />

trends in terms of programs for this population, as presented in<br />

this study, have shown that it is necessary to adapt the physical<br />

space for real digital inclusion of people with sensory disabilities.<br />

It is also of the essence to grant them institutional recognition, as<br />

has been the case with successful programs for people with<br />

limitations in the U.S., Canada, Spain, Mexico and Brazil. These<br />

programs empower groups of people with disabilities by making<br />

policy decisions for the access, use and appropriation of ICTs.<br />

Additionally, international experience shows that spread is also<br />

necessary for the production of digital information in the areas of<br />

education and entertainment, since in most countries and<br />

especially in the United States, this initiative is driven by the State<br />

in their quest to achieve greater competitiveness and human<br />

development of people with sensory impairments, so that there are<br />

two scenarios for people with sensory limitations, a first positive<br />

scenario in which that population can access a variety of digital<br />

content of the same quality as those in normal sensory conditions,<br />

thus reducing the information gap and capacity, and a second<br />

70<br />

scenario less favorable in this population remains excluded from<br />

the flow of ideas and information because they lack the means or<br />

knowledge accessing digital information.Finally, the inclusion of<br />

people with sensory disabilities is the only possibility of<br />

generating a real and effective exercise of the right to information<br />

of every citizen. Thus, governments have an obligation to<br />

implement public policies to help facilitate the use of ICTs<br />

independently to exercise their rights as independent persons with<br />

a real capacity to make their own decisions, thereby affecting<br />

collective decisions that allow them competition and active<br />

participation in democracy. However, the benefits of ICTs for<br />

people with sensory disabilities is not limited to purely civic and<br />

democratic roles, as technologies make everyday tasks easier for<br />

these individuals, which is achieved by a dynamic of inclusion<br />

that goes beyond the merely digital and reaches beyond the<br />

academic, social and family life of each person.<br />

5. REFERENCES<br />

[1] Brian D. Loader and Leigh Keeble, Challenging the digital<br />

divide? : A literature review of community informatics initiatives,<br />

JosephRowntree Foundation, Teesside University, 2004<br />

[2] Bueno Manuel. Definiciones y clasificaciones en torno a la<br />

discapacidad visual. La baja visión y la ceguera,2012.<br />

[3] Canadian Association of the Deaf. Statistics on Deaf<br />

Canadians, 2012.<br />

[5] DANE. Censo General, 2005<br />

[6] Gulati. Archana, Universal Service Obligation Fund´s Pilot<br />

Project Scheme For Access to ICTs And ICT Enabled Services for<br />

Persons with Disabilities in Rural India, 2011<br />

[7] INEGI. Censo de Población y Vivienda, 2010.<br />

[8] MengEe Wong and Libby Cohen. School, Family and other<br />

influences on assistive technology use: Access and challenges for<br />

students with visual impairment in Singapore, 2011.<br />

[9] Microsoft Corporation. Conducted by Forrester Research Inc.<br />

in 2003, The Wide Range of Abilities and Its Impact on Computer<br />

Technology, 2003<br />

[10] Observatorio de Sociedad, Gobierno y Tecnologías de<br />

Información. Revisión y análisis de los avances en alfabetización<br />

digital y apropiación TIC para población con discapacidad<br />

sensorial. 2011<br />

[11] OMS. Resumen Informe Mundial sobre la discapacidad.2011<br />

[12] MINTICS. Tecnologías de Comunicación para la población con<br />

discapacidad, 2009.<br />

[13] Pereira. Selau. Mecdaisy: Um Novo Espaço Virtual Para Os<br />

Deficientes Visuais No Brasil,2009<br />

[14] Silvera. Claudia. La alfabetización digital: una herramienta<br />

para alcanzar el desarrollo y la equidad en los países de América<br />

latina y el Caribe.2005.<br />

[15] Ramírez Leyva. Elsa Margarita. La lectura, Alfabetización en<br />

Información y Cultura de la Información,2007.<br />

[16] World Economic Forum. ISNEAD.The Global Information<br />

Technology Report 2010, 2011.Transformations 2.0. 2011.


E-Government Education at the Public Administration Departments<br />

in Turkey<br />

Cenay BABAOGLU<br />

Hacettepe University<br />

Department of Political Science and<br />

Public Administration<br />

Beytepe, Çankaya, Ankara-TURKEY<br />

+90 312 2978725<br />

cenaybabaoglu@hacettepe.edu.tr<br />

ABSTRACT<br />

This paper presents the main findings of an extensive investigation<br />

of the current status of undergraduate level e-government<br />

education at public administration departments in Turkey. In the<br />

study, online program curriculums were searched to determine the<br />

state of the e-government and ICT courses. Primary data were<br />

collected from lecturers via semi-structured interviews and a<br />

questionnaire which was applied to undergraduate public administration<br />

students who have attended e-government courses during<br />

the fall semester of 2011. Syllabi of the courses were also analyzed<br />

to determine the contents of the courses. In the light of these<br />

data, the current status, risks, future prospects, and diffusion of egovernment<br />

education at public administration departments were<br />

discussed within the limits of the presentation.<br />

Categories and Subject Descriptors<br />

K.3.2 [Computer and Information Science Education]: Curriculum,<br />

Information Science Education<br />

General Terms<br />

Human Factors.<br />

Keywords<br />

E-Government Education, Curriculum, Turkey, PA Departments,<br />

Public Administration.<br />

1. INTRODUCTION<br />

Governments spend considerable amount of resources in egovernment<br />

projects. The cost of these investments may be justified<br />

if one considers the benefits such as reduction of costs, increasing<br />

transparency, easier communication between the state<br />

and the citizens, improving effectiveness, or faster service delivery<br />

[7]. But, e-government projects entail risks as well as its advantages.<br />

Project failures and low user rates may hinder costly egovernment<br />

initiatives. Heeks’ [7] study which investigates the<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

H. Serkan AKILLI<br />

Nevsehir University<br />

Department of Public Administration<br />

Faculty of Economics and Administrative<br />

Sciences, Nevsehir, Turkey<br />

+90 384 2281000 (1534)<br />

h.serkanakilli@nevsehir.edu.tr<br />

71<br />

Mehmet Akif DEMIRCIOGLU<br />

Indiana University<br />

School of Public & Environmental Affairs<br />

1315 East Tenth Street, Bloomington,<br />

IN USA<br />

+1 812 8552457<br />

mdemirci@indiana.edu<br />

success levels of e-government projects in developing countries<br />

shows that only 15% of projects can be labeled successful while<br />

35% of the projects totally failed and other projects (50%) was<br />

just partially successful. The same failure scenarios and low citizen<br />

usage of e-government services are experienced in developed<br />

countries such as Australia, New Zealand, Netherlands or the UK,<br />

as well [8][12][21].<br />

The failures of e-government projects may stem from many intertwined<br />

reasons such as system design, inadequate infrastructure,<br />

social and organizational issues, public/private relationships or<br />

political factors. However, the focus of this study is on egovernment<br />

education, since lack of human capital is one of the<br />

most critical factors, which may bring success or failure in egovernment<br />

projects. Successful implication of e-government<br />

projects requires educational and training activities on a wide<br />

array of levels and dimensions. As a component of e-government<br />

education research agenda, this paper presents the main findings<br />

of an extensive investigation of the current status of undergraduate<br />

level e-government education at public administration departments<br />

in Turkey. In the following sections, an overview of egovernment<br />

in Turkey and e-government education is shortly<br />

discussed, the methodology of the study is explained, and the<br />

main findings are presented.<br />

2. LITERATURE REVIEW<br />

Turkey, as a candidate to the European Union (EU), and as a<br />

partner involved in e-government agenda of the union, has been<br />

eager to invest in e-government projects since the 1990s under E-<br />

Turkey, and E-Transformation Turkey programs. A single point<br />

access to e-government services was achieved in 2008 with the<br />

opening of the e-government gate (www.turkiye.gov.tr) and as of<br />

2010, 246 services were provided on-line by different government<br />

agencies. In 2010, the availability of 20 e-government services<br />

determined by the European Council was above the average of EU<br />

member and candidate states. Although the supply side of egovernment<br />

services is enough, there is urgent need to increase<br />

the level of use of these services by the citizens and a general<br />

need to develop e-readiness level of the society as a whole.<br />

Parallel to e-government investments, e-government researches in<br />

Turkey have been initiated by several government agencies with<br />

the support of a number of NGOs since the late 1990s. The first<br />

people working on e-government research were computer scientists<br />

and faculty from public administration departments were


involved later [22]. Several institutions are involved in egovernment<br />

research on organizational and technical level [14].<br />

“E-Government Research and Applications Center (EDMER)” in<br />

Middle East Technical University (METU) was opened in 2007<br />

and “Center on E-Government” (eDEM) in the Public Administration<br />

Institute for Turkey and Middle East (TODAIE), (a governmental<br />

institution to train bureaucrats and scholars in the field of<br />

public administration) was opened in 1999. More recently, several<br />

NGOs have also initiated studies about e-government and information<br />

society [14] [22].<br />

To sum up, although it is clear that e-government is a mature field<br />

of research, there is still need for wide-spread e-government training<br />

and education in Turkey since the efforts of the above mentioned<br />

institutions remain restricted in the face of mounting “demand<br />

side”. While lack of investment on educational and training<br />

activities about e-government may bring about disappointment in<br />

e-government projects, there seems to be a substantial gap in this<br />

field, both abroad and in Turkey. A number of reasons lie behind<br />

this withdrawal from such activities: service providers may see<br />

education and training services as extra costs that should be<br />

avoided, due to the complex and multidimensional nature of egovernment<br />

topics, difficulties arise when designing teaching<br />

programs, training programs for public employees may have<br />

limited time and reach a limited number of staff, or governments<br />

may be unwilling to pay for educational costs of large populations<br />

[6]. However as Janowski argues, especially the political leaders,<br />

government leaders, project managers, management staff, technical<br />

staff, service staff, businesses, citizens should have some<br />

training on e-government [9]. Thus, the role of higher education<br />

institutions as well as offering courses to the public becomes more<br />

important, since they have an opportunity to reach various types<br />

of recipients. Moreover, public administration graduates need to<br />

prepare today’s challenges and uncertainty which globalization<br />

and information technology trigger [18]. Since public administration<br />

systems are largely affected from surrounding technologic<br />

environment and e-government initiatives on both organizational<br />

and political levels, it would be appropriate to suggest that public<br />

administration departments should have a leading role in developing<br />

information technology and e-government curricula or update<br />

existing programs according to the needs and requirements of<br />

public organizations and the societies at large [3] [4] [11] [17].<br />

Thus, even before the emergence of the internet revolution, the<br />

importance of updating public administration programs to follow<br />

technological developments was emphasized by various writers,<br />

and the inadequacies in this field still remain problematic [10]<br />

[13] [15] [17]. Parallel to the diffusion of information technologies<br />

into the societies and the institutions, universities have initiated<br />

technology or e-government education programs on different<br />

levels that target students, public/private sector employees, social<br />

groups and specific topics and specialization areas [1][2].<br />

3. METHODOLOGY<br />

In this study, online program curriculums were searched to determine<br />

the state of the e-government and ICT courses in Turkey.<br />

Primary data were collected from lecturers via semi-structured<br />

interviews and a questionnaire which was applied to undergraduate<br />

public administration students who have attended egovernment<br />

courses during the fall semester of 2011. Syllabi of<br />

the courses were also analyzed to determine the contents of the<br />

courses. In the light of these data, the current status, risks, future<br />

prospects, and diffusion of e-government education at public<br />

72<br />

administration departments were discussed within the limits of the<br />

presentation.<br />

There are 68 public administration department in Turkey in 2012.<br />

Although all departments offer courses which aim to develop<br />

basic computer skills, such as office programs or web page design,<br />

only 14 department offer course which are directly about egovernment.<br />

Faculty members teaching relevant courses in these<br />

departments were determined, and semi-structured in-depth interviews<br />

were conducted with them. In these interviews, introduction<br />

process of relevant courses into the curricula was examined, and<br />

related factors were investigated. In addition, questions about the<br />

content of the courses were addressed. The development of egovernment<br />

studies and e-government courses have been asked to<br />

the faculty and their recommendations and predictions were compiled<br />

with the interviews. Syllabi of the courses were collected as<br />

secondary data. It was not possible to reach enough syllabi to use<br />

for content analysis, so 4 syllabi were used as subsidiary sources.<br />

In order to investigate the opinions of students about egovernment<br />

courses, a survey was conducted among undergraduate<br />

students of four PA departments offered e-government courses<br />

in Fall 2011. 266 students followed these courses during the stated<br />

period and 193 of 266 answered the questions. 59.7% (111) of<br />

these students were female, and 40.3% (75) were male. In total,<br />

186 (70% of the students) student questionnaires were used for<br />

analysis. The questionnaire included ten expressions about the<br />

reasons for choosing the course, course satisfaction, perceived<br />

advantage of taking this course, and opinions about the status of<br />

the course. They were asked to choose from one of five options<br />

about the expressions (From absolutely disagree to totally agree).<br />

The students were also asked to assign an importance rating (one<br />

being least important and seven being most important) to 22 student-familiar<br />

e-government topics, which reflect technical, theoretical,<br />

legal, organizational, and political aspects,<br />

4. FINDINGS<br />

In this section, the main findings of the study are presented with<br />

two sub-headings. The first sub-section gives information about<br />

the current status of e-government courses at PA departments, and<br />

discusses the inclusion of e-government courses into the curricula.<br />

The second sub-section deals with the education methods, course<br />

syllabi and the opinions of undergraduate students about egovernment<br />

courses. The findings of the study are discussed in the<br />

last section.<br />

4.1 E-Government Courses at PA Departments in<br />

Turkey<br />

As mentioned before, the interest in e-government investment and<br />

research does not seem to correspond to a similar interest in egovernment<br />

education at the public administration programs in<br />

Turkey. Since the number of PA departments which offer egovernment<br />

courses is low, understanding the way in which these<br />

courses diffuse into the curricula becomes important for future<br />

tracks. In a recent study Yildiz et al. have found that receiving<br />

graduate education or spending sabbatical studies in abroad are<br />

the most important factor to include public policy courses in the<br />

curriculum. Additionally, student exchange programs (particularly<br />

with the European countries) and second generation lecturers who<br />

have taken these courses in Turkey are also affecting the decision<br />

to add these courses in the curriculum.


A similar pattern can be observed about e-government courses.<br />

First reason of spread of e-government courses is about faculties’<br />

academic interests. Our research shows that e-government courses<br />

were included to the curricula mainly because of at least one<br />

faculty’s demand. If a faculty were interested in e-government or<br />

information and communication technologies, he/she demand to<br />

add these courses to curricula. Faculties, who received their MA<br />

or Ph.D. degrees in European or American universities, become<br />

another transfer agent for the e-government courses. Most of these<br />

received similar courses during their studies, and after the graduation<br />

they transferred the courses to Turkish universities. Faculty,<br />

who took these lessons, would be a new instrument for a secondary<br />

transfer, and it is the third reason for the spread of egovernment<br />

course, which could be seen above in Figure 1.<br />

Figure 1<br />

33%<br />

25%<br />

42%<br />

Academic Interest<br />

Transfer by Abroad<br />

Studied Faculty<br />

Secondary Transfer<br />

Although current lecturers of e-government courses are optimistic<br />

that these courses will be developed and core courses in the near<br />

future, we do not expect it due to existing traditions in PA Departments<br />

and lack of interest of academic staff. In terms of Rogers’<br />

diffusion of innovations, it could be claimed that inclusion of<br />

e-government courses are generally optional and personal choice<br />

[19]. The decision rests mostly on the interested lecturer or department<br />

chair that is responsible for updating the curricula. Some<br />

of the “early adapters” find it difficult to open or sustain the<br />

course which is included in the curriculum because of lack of<br />

academic staff or because this course was not really meant to be<br />

opened at all. In this case, the curriculum looks right, but the<br />

courses, in fact, only nominally exist. Thus, the course becomes a<br />

product of isomorphism rather than innovation.<br />

4.2 Content of the Courses and Students’ Opinions<br />

about E-Government Courses<br />

Looking at the contents of the course, e-government issues can be<br />

categorized, which are derived from interviews and syllabi. According<br />

to this data, Turkish e-government education includes<br />

these titles: Basic e-government literature, e-government theories,<br />

e-government applications, e-government policies, e-governance,<br />

e-participation, e-democracy, e-municipality and problems of egovernment.<br />

These titles are used in almost every university.<br />

Three of ten faculties, named the topics; cyber crimes and esignature<br />

as basic, and two others named as subtopic. An advising<br />

report of UNESCO, which is prepared for the African countries,<br />

includes almost the same topics. [20] E-government courses<br />

generally begin with theoretical backgrounds and basic concepts.<br />

Towards the middle of the term, they turned to e-government<br />

applications.<br />

If we look to the students’ opinions about the courses, some of<br />

would be outshining. The ranking means and the standard deviations<br />

of the ratings are presented in Table 1. Test results show that<br />

there is a significant difference among the departments with respect<br />

to the importance rating of e-signature, theories of egovernment,<br />

properties of the information society, system design,<br />

e-democracy, e-trade/e-business, e-government experiences in<br />

Turkey, success/failure factors and internet penal law.<br />

73<br />

Table 1: Stated Importance Ratings of E-Government Topics<br />

(Students, N: 186)<br />

TOPIC MEAN STD.DEV.<br />

Information Security 6,102 1,4576<br />

Right to Internet Access 6,003 1,2884<br />

Right to Information 5,944 1,3210<br />

E-Government and Public Adm. 5,795 1,5052<br />

E-Signature 5,706 1,6790<br />

Theories of E-Government 5,116 1,5277<br />

Public/Private Partnership 5,050 1,5007<br />

Technological Dependency 4,596 1,8363<br />

Significant difference among the departments could be explained<br />

by the interests of the lecturers and could be considered as natural.<br />

However this may also carry the risk of “speci-centrism” as Yildiz<br />

et al. have defined in their own study [23].<br />

It could be argued that the answers of the students are promising<br />

about the sustainability of the e-government courses. When the<br />

options “Totally Agree” ve “Agree” are combined, it is found that<br />

79,6% of the students asserts positive opinions about interest in<br />

the topics of the course. On the other hand, 61,3% percent of the<br />

students think that the e-government course has provided advantages<br />

for their careers. Perceived advantage of taking egovernment<br />

courses would be another factor in development of egovernment<br />

courses in Turkey. There is a high level of satisfaction<br />

(81,1%) about the courses and 79% of the respondents says<br />

they would recommend this course to other students. When the<br />

responses for the above mentioned expressions are considered<br />

together, it could be argued that e-government courses would<br />

attract enough students if they were included in the curriculums of<br />

the departments which have not opened a course about egovernment.<br />

5. DISCUSSION AND CONCLUSION<br />

The findings present a mixed case. E-government is developing<br />

fast in Turkey, and research on e-government draws significant<br />

attention. But, currently, the number of public administration<br />

departments which offer courses about e-government may not be<br />

considered as adequate. The opinions of lecturers and students are<br />

promising about the e-government courses in the future, yet lack<br />

of interest on academics’ side may hinder the development of<br />

these courses. Proliferation of e-government courses in Turkey is<br />

needed, but this is not without risks. These courses have been<br />

spreading among PA departments in the last five years. Although<br />

the courses which aim to improve basic computer skills could be<br />

traced to 1990s, first e-government courses in Turkey date back to<br />

2006. Currently, 22% of the departments have e-government<br />

courses in their curricula. At this point the problem of institutional<br />

isomorphism becomes critical [5]. As Park and Park acknowledge,<br />

the curricula of leading universities in South Korea were followed<br />

by other institutions and that there is possibility of normative<br />

isomorphism [16]. In a similar vein, latest developments in the<br />

field of higher education in Turkey, especially Bologna process,<br />

have created coercive and imitative institutionalization among PA<br />

departments. This isomorphic trend may end up in curricula which<br />

reflects “the politically right” but which do not correspond to the<br />

real resources of the departments that are required to sustain IT<br />

and e-government related courses. As a conclusion, it is important<br />

to emphasize the need to build necessary resources and skills


among lecturers and students parallel to (better before) diffusion<br />

of e-government courses into core PA curricula in Turkey.<br />

In this study we have focused on on e-government education at<br />

the undergraduate departments of public administration in Turkey.<br />

Our researches, however, have found that other departments and<br />

schools do not offer e-government courses, but similar courses<br />

such as information technology. Future studies may focus on<br />

graduate programs teaching e-government courses at the public<br />

administration department. In addition, since e-government studies<br />

also include practical sides, other scholars may focus on practical<br />

aspects of e-government research and education. As authors,<br />

we consider that it will be very useful if both theoretical and practical<br />

sides of e-government would be examined and compared.<br />

6. ACKNOWLEDGEMENTS<br />

We would like to thank Haydar EFE, Veysel EREN, M. Kemal<br />

ÖKTEM, Özgür ÖNDER, Mustafa ÖZTÜRK, Naci SEVKAL,<br />

Nur ŞAT, and Ali ŞAHİN for their valuable helps. And also special<br />

thanks to ICEGOV 2012 organization committee, two anonymous<br />

reviewers and Mete YILDIZ, for their valuable comments<br />

and suggestions.<br />

7. REFERENCES<br />

[1] Augustinaitis, A.and Petrauskas, R. Master Studies on e-<br />

Governance Administration: The First Experience in Lithuania.<br />

In R. Traunmüller, (Ed.), EGOV 2004, Springer<br />

LNCS#3183, Heidelberg, 2004, 438-445.<br />

[2] Biasiotti, M.A. and Nannucci, R. Teaching e-Government in<br />

Italy. In R. Traunmüller, (Ed.), EGOV 2004, Springer<br />

LNCS#3183, Heidelberg, 2004, 460-463.<br />

[3] Chiu, S. Understanding the Adoption and Diffusion of Information<br />

Technology Related Curricula: Multiple Theoretical<br />

Perspectives. Ph.D. Thesis, Indiana University, 2007.<br />

[4] Dawes, S. Training the IT-Savvy Public Manager: Priorities<br />

and Strategies for Public Management Education. Journal of<br />

Public Affairs Education, 10, 1 (Jan., 2004), 5-17.<br />

[5] Di Maggio, P. J., and Powell, W. W. Iron cage revisited:<br />

Institutional isomorphism and collective rationality in organizational<br />

fields, American Sociological Review, 48 (1983).<br />

147-160.<br />

[6] Garson, D. Public Information Technology and E-<br />

Governance: Managing the Virtual State. Jones and Bartlett<br />

Pub, NC, 2006.<br />

[7] Heeks, R. Most eGovernment-for-Development Projects<br />

Fail: How Can Risks Be Reduced?. iGovernment Working<br />

Papers , paper no.14. Institute for Development Policy and<br />

Management, University of Manchester, 2003.<br />

[8] Gauld, R., Goldfinch, S., and Horsburgh, S. Do They Want<br />

It? Do They Use It? The “Demand-Side” of e-Government in<br />

Australia and New Zealand. Government Information Quarterly,<br />

27, 2 (March, 2010), 177-186.<br />

[9] Janowski, T. Conceptualizing Electronic Governance Education.<br />

45th Hawaii International Conference on System Sciences,(2012)<br />

2269-2278<br />

[10] Kiel, D. Information Systems Education in Master Programs<br />

in Public Affairs and Administration. Public Administration<br />

74<br />

Review, 46, Special Issue: Public Management Information<br />

Systems (Nov., 1986), 590-594.<br />

[11] Kim S. and Layne K. Making the Connection: E-Government<br />

and Public Administration Education. Journal of Public Affairs<br />

Education, Vol.4, No.4 (Oct., 2001), 229-240.<br />

[12] Kolsaker, A. and Kelley, L. Citizens’ Attitudes towards e-<br />

Government and e-Governance: a UK Study. International<br />

Journal of Public Sector Management, 21, 7 (2008), 723-<br />

738.<br />

[13] Kraemer, K.L. and Northrop, A. Curriculum Recommendations<br />

for Public Management Education in Computing: An<br />

Update. Public Administration Review, 49, 5 (Sep.-Oct.,<br />

1989), 447-453.<br />

[14] Medeni, T., Mustafa S., Tunc, M., Asim B., and Merih T.<br />

Developing an E-Government Education Programme Curriculum<br />

Based on Knowledge Management Paradigms to Support<br />

Institutional Transformation. International Journal of<br />

eBusiness and e-Government Studies. 2009. 1(2): 35-47<br />

ISSN: 2146-0744 (Online)<br />

[15] Northrop, A. Challenge of Teaching Information Technology<br />

in Public Administration Graduate Programs. In D. Garson<br />

(ed.), Information Technology and Computer Applications in<br />

Public Administration. IGI Publishing, PA, 1999, 7-22.<br />

[16] Park, H. M. and Park. H. Diffusing Information Technology<br />

Education in Korean Undergraduate Public Affairs and Administration<br />

Programs: Driving Forces and Challenging Issues,<br />

Journal of Public Affairs Education, 2006, 12(4): 537-<br />

555.<br />

[17] Pavlichev, A. The E-Government Challenge for Public Administration<br />

Education. In A. Pavlichev, D. Garson (eds.),<br />

Digital Government: Principles and Best Practices, IGI, PA,<br />

2004, 276-289.<br />

[18] Perry, James L. A Symposium on Transformations in Public<br />

Affairs Education: Challenges, Progress, and Strategies.<br />

Journal of Public Affairs Education, 2001, 7(4): 209-211.<br />

[19] Rogers, E. Diffusion of Innovations. Free Press, NY, 2003.<br />

[20] UNESCO, Curriculum Guide on E-governance for African<br />

Government Institution, Available from:<br />

http://portal.unesco.org/ci/en/files/25720/11980630809curri<br />

culum_guide.pdf/curriculum%2Bguide.pdf, accessed<br />

16.03.2012<br />

[21] Van Deursen, A., van Dijk, J., and Ebbers, W. Why E-<br />

Government Usage Lags Behind: Explaining the Gap Between<br />

Potential and Actual Usage of Electronic Public Services<br />

in the Netherlands. Lecture Notes in Computer Science,<br />

4084 (2006), 269-280.<br />

[22] Yazici, Ali. Teaching and Research on E-Government. International<br />

Conference on eGovernment and eGovernance. 11-<br />

12 March 2010. Antalya, Turkey.<br />

[23] Yildiz, M., Demircioglu, M.A., and Babaoglu, C. Teaching<br />

Public Policy to Undergraduate Students: Issues, Experiences,<br />

and Lessons in Turkey. Journal of Public Affairs Education,<br />

17, 3, 2011, 343-365


e-Government in Latin American Countries. Are they<br />

Building National Policies with a Regional Perspective?<br />

ABSTRACT<br />

Are the Latin American countries building their national e-<br />

Government policies with a regional perspective? The hypothesis<br />

of this paper is that international organizations are shaping, at<br />

least in some extent, the ideas, priorities, and initiatives<br />

implemented by the governments of this emergent region.<br />

Institutional theory suggests that policy transfer implies a process<br />

of institutionalization in the national public sector and public<br />

policies of specific logics of action, values, routines, rules, etc., in<br />

general, defined by international organizations, through diverse<br />

policy instruments. This paper presents a documentary analysis of<br />

policy reports from this type of organizations (i.e. Inter-American<br />

Development Bank…) devoted to foster e-Government in Latin<br />

America. Also it descriptively analyses statistical data about e-<br />

Government in the region. Thus, this paper studies the most<br />

important ideas, priorities, and values that these international key<br />

drivers use to disseminate e-Government policies in the region.<br />

Finally, this work debates their implications using institutional<br />

theory, and gives ideas for future research.<br />

Categories and Subject Descriptors<br />

K.4.1 [Public Policy Issues]: Transborder Data Flow<br />

General Terms<br />

Management, Measurement, Design, Human Factors, Theory<br />

Keywords<br />

Electronic Government, International Organizations, Policy<br />

Transfer, Latin America, Interoperability<br />

1. INTRODUCTION<br />

The diffusion of Information and Communication Technologies<br />

(ICTs) in public administration represents a relatively recent<br />

phenomenon in Latin American (LatAm) countries. This paper is<br />

determined to shed light on the following question: Are the Latin<br />

American countries building their national e-Government policies<br />

with a regional perspective? This general question is based on the<br />

importance that during the last years have gained the ideas,<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

J. Ignacio Criado<br />

Department of Political Science<br />

Universidad Autónoma de Madrid<br />

ignacio.criado@uam.es<br />

75<br />

values, priorities, and projects mostly sponsored by international,<br />

inter-governmental, or transnational organizations acting as key<br />

drivers of e-Government developments within the LatAm region<br />

[1,4]. This paper assumes the existence of a policy transfer<br />

process of these ideas, values, priorities, and projects across the<br />

LatAm governments.<br />

This study is rooted in institutional theory literature. Institutional<br />

theory has tackle with the interplay of ICTs and public<br />

administration, and it has been of growing interest for e-<br />

Government scholars during the last decade [6,7,8]. Institutional<br />

theory suggest that policy transfer within a region of the World<br />

implies a process of institutionalization in the national public<br />

sector and public policies of specific logics of action, values,<br />

routines, rules, etc., in general, defined by international,<br />

intergovernmental, or transnational organizations, through diverse<br />

instruments [5]. However, this is not the same to convergence,<br />

harmonization, or political integration; since there is a difference<br />

between a process and its consequences. The next pages put more<br />

emphasis on mechanisms of policy transfer in the field of e-<br />

Government, and how these mechanisms work (processes), than<br />

on final outputs, or qualitative differences across national public<br />

policies and administrations (results).<br />

Methodologically, this paper presents a documentary analysis of<br />

policy reports from international, intergovernmental, and<br />

transnational organizations (i.e. Organization of American States,<br />

Inter-American Development Bank…) dedicated to foster e-<br />

Government in LatAm during the last ten years. It also analyses<br />

statistical data about e-Government developments in the region.<br />

Thus, this paper assembles qualitative and quantitative methods to<br />

focus on the study of the most salient ideas, priorities, and values<br />

of key drivers in the enhancement of e-Government policies.<br />

The following section presents the development of e-Government<br />

readiness from a comparative perspective. This overview needs to<br />

be brought forward by giving an approximation to the drivers of<br />

the e-Government agenda in the LatAm region, notably intergovernmental,<br />

international, and transnational organizations<br />

devoted to formulate, design, fund, and implement projects,<br />

initiatives, or regulations within this field. Finally, the conclusion<br />

section debates the contents of the paper, research implications<br />

and limitations. At the same time, it discusses the institutional<br />

implications of the policy transfer process related to e-<br />

Government that it is supposed to be occurring within this<br />

emergent and vibrant region.


2. COMPARATIVE E-GOVERNMENT IN<br />

LATIN AMERICA<br />

Comparative data about the evolution of e-Government in LatAm<br />

is available from different sources. This section pinpoints some<br />

dimensions of the deployment of ICTs and the Internet within the<br />

countries of the region (e-Government demand-side). Also, it<br />

offers data about the United Nations e-Government readiness<br />

report (e-Government supply-side). Overall, the picture of the e-<br />

Government (potential) demand-side in LatAm resembles<br />

disparities if one look at in a country-by-country basis (see Table<br />

1). For example, there exist important differences among the<br />

societies of the region regarding to the access to the Internet. On<br />

the one hand, a group of experienced countries lead the Internet<br />

access in the region with more than 50% of users each. This group<br />

concentrates almost 30% of the Internet demand of the region. In<br />

second place, a group of six countries has not yet reached the<br />

barrier of 50% of the population connected (with 30% at least).<br />

Here, Mexico and Brazil are the most populated countries in the<br />

region, and they accumulate more than 50% of the Internet users.<br />

Finally, a group of less experienced societies shows the lowest<br />

rates of Internet access in the region (less than 30% of Internet<br />

users). This last group still exhibits a significant lack in terms of<br />

basic accessibility to the Internet, exemplifying the most negative<br />

side of the digital divide.<br />

Table 1. e-Government (potential) demand-side in Latin<br />

American countries<br />

Internet users<br />

(latest data,<br />

2011) (*)<br />

Penetration<br />

(%<br />

population)<br />

Broadband<br />

subscribers<br />

(2010) (**)<br />

Household<br />

use of<br />

computers<br />

(%) (***)<br />

Mobile<br />

phone<br />

subscriptions<br />

(per 100<br />

inhabitants)<br />

(2010)<br />

Argentina 27.568.000 66.0 9.56 21.9 141.79<br />

Bolivia 1.225.000 12.1 0.97 17.1 72.30<br />

Brazil 75.982.000 37.4 7.23 30.9 104.10<br />

Chile 9.254.423 54.8 10.45 33.1 116.00<br />

Colombia 22.538.000 50.4 5.66 22.8 93.76<br />

Costa Rica 2.000.000 43.7 6.19 33.9 65.14<br />

Cuba 1.605.000 14.5 0.03 2.1 8.91<br />

Dominican 4.116.870 41.3 3.64 13.0 89.58<br />

Republic<br />

Ecuador 3.352.000 22.3 1.36 22.8 102.18<br />

El Salvador 1.035.940 17.1 2.83 10.9 124.34<br />

Guatemala 2.280.000 16.5 1.80 10.7 125.57<br />

Honduras 958.500 11.8 1.00 10.1 125.06<br />

Mexico 34.900.000 30.7 9.98 25.7 80.55<br />

Nicaragua 600.000 10.6 0.82 6.3 65.14<br />

Panama 959.900 27.7 7.84 16.9 184.72<br />

Paraguay 1.104.700 17.1 0.61 14.9 91.64<br />

Peru 9.157.800 31.3 3.14 16.2 100.13<br />

Uruguay 1.855.000 56.1 11.37 38.8 131.71<br />

Venezuela 10.421.557 37.7 5.37 14.6 96.20<br />

Total/Mean 212.401.030 36.7<br />

Sources: (*) Internet World Stats (2011). Available:<br />

http://www.internetworldstats.com/stats.htm. Access data: September 1st 2011. (**)<br />

ITU. Available: http://www.itu.int/ITU-D/icteye/Indicators/Indicators.aspx#. Access<br />

data: September 1st 2011. (***) CEPAL. Estimations are based on household surveys<br />

for each country between 2006 and 2008 (Argentine is an estimation of 2001, last year<br />

with household survey information). Available: http://www.eclac.cl/cgibin/getprod.asp?xml=/socinfo/noticias/paginas/6/34246/P34246.xml&xsl=/socinfo/tpl/p<br />

18f.xsl&base=/socinfo/tpl/top-bottom.xsl. Access data: September 1st 2011.<br />

This picture of the e-Government (potential) demand-side requires<br />

attention to other data (see Table 1). The use of personal<br />

computing is an indicator of the extension of the traditional device<br />

to measure technological literacy, and to access the Internet. In<br />

general, data offer low rates in all the countries studied, ranging<br />

from almost 40% in Uruguay to 6.3% and 2.1% in Nicaragua and<br />

76<br />

Cuba. These data contrast with the access to mobile telephones in<br />

the region, which is remarkably higher in most of the cases. Here,<br />

governments may see an opportunity to facilitate the access to the<br />

e-Government services through mobile devices, regarding to their<br />

growing level of acceptance, including those cases with more<br />

limited Internet social penetration. Besides, broadband<br />

connections facilitate the access to the most sophisticated services<br />

available in the Internet, including electronic commerce, live<br />

video and music streaming, or transactional interactions with<br />

governmental agencies. Nonetheless the diffusion is very limited<br />

in all the countries of the region, with only two cases (Uruguay<br />

and Chile) with more than 10% of broadband subscribers.<br />

On the other hand, it is also important the study of the e-<br />

Government supply-side in the region (see Table 2). The most<br />

interesting conclusion of this comparative analysis of the UN e-<br />

Government readiness index is that in LatAm countries the online<br />

service delivery index is more developed than the general e-<br />

Government readiness index. In other words, the supply-side of e-<br />

Government (on-line service delivery) has been more expanded<br />

than the demand-side (equipment and digital education) in the<br />

countries of the region. This seems to be clearly the case of<br />

Colombia or Chile, and it is the same situation in other less<br />

developed including El Salvador or Dominican Republic.<br />

Table 2. United Nations e-Government readiness index and<br />

on-line service delivery in Latin America<br />

On-line service delivery e-Government readiness<br />

Ranking Index Ranking Index<br />

position 2012 2012 position 2012 2012<br />

Argentina 61 0.5294 56 0.6228<br />

Bolivia 97 0.4118 106 0.4678<br />

Brazil 32 0.6732 59 0.6167<br />

Chile 24 0.7516 39 0.6769<br />

Colombia 16 0.8341 43 0.6572<br />

Costa Rica 69 0.4967 77 0.5397<br />

Cuba 129 0.3072 110 0.4488<br />

Dominican Republic 57 0.5359 89 0.5130<br />

Ecuador 84 0.4575 102 0.4869<br />

El Salvador 32 0.6732 74 0.5513<br />

Guatemala 81 0.4641 112 0.4390<br />

Honduras 100 0.3791 117 0.4341<br />

Mexico 28 0.7320 55 0.6240<br />

Nicaragua 125 0.3137 130 0.3621<br />

Panama 82 0.4641 66 0.5733<br />

Paraguay 85 0.4575 104 0.4802<br />

Peru 63 0.5163 82 0.5230<br />

Uruguay 53 0.5490 50 0.6315<br />

Venezuela 76 0.4837 71 0.5585<br />

Source: United Nations. Available:<br />

http://www.unpan.org/egovkb/global_reports/08report.htm. Access data: Sep. 5th 2011.<br />

The analysis offers conclusions from a comparative point of view.<br />

One of them is that the region experiences the digital divide<br />

phenomenon, due to the marginal access to the technologies<br />

across important groups of citizens, still out of the demand side.<br />

At the same time, it seems to be that governments of the region<br />

have invested their resources in the supply-side of e-Government,<br />

while less efforts have been devoted to improve the citizens<br />

access and literacy (demand-side). In order to understand why this<br />

policy frame has been so successful, one may suggest that this is a<br />

consequence of political decisions at national level. Conversely,<br />

one may support that some type of policy transfer process has<br />

been activated within this region. This second assumption is<br />

studied in the next section.


3. REGIONAL DRIVERS OF THE E-<br />

GOVERNMENT AGENDA<br />

This section pinpoints the common efforts to develop e-<br />

Government from a regional perspective, notably coming from<br />

international, intergovernmental, or transnational organizations<br />

devoted to formulate, design, fund, and implement projects,<br />

initiatives, or regulations in this field. In doing so, we look at the<br />

priorities, areas, and the type of projects enhanced by these<br />

regional actors and organizations during the last years. This<br />

analysis facilitates the understanding of how the e-Government<br />

development within a region with very different administrative<br />

realities has tended to share some common policy frames. In this<br />

endeavor, some institutions like the CEPAL (United Nations<br />

Economic Commission for Latin America), CLAD (Latin<br />

American Center for Developing Administration), IDB (Inter-<br />

American Development Bank), OAS (Organization of American<br />

States), among others, have played a prominent role in fulfilling<br />

regional approaches to build up e-Government.<br />

One of the first regional definitions of e-Government derived<br />

from the Ibero-American Chart for Electronic Government (Carta<br />

Iberoamericana de Gobierno Electrónico) (ICEG) [3]. The<br />

definition of e-Government refers to the ‘use of ICTs in public<br />

administration to enhance the information and services offered to<br />

the citizens, to support public management efficacy and efficiency,<br />

and to improve the transparency of public sector and the<br />

participation of the citizens’ [3:7]. This is important while<br />

different country definitions and approaches to e-Government<br />

have been rooted in similar principles. Other recent efforts have<br />

emerged from the CLAD group of countries, i.e., the Ibero-<br />

American Interoperability Framework, the Ibero-American Model<br />

of Pubic Software for e-Government, or the Ibero-American<br />

Framework for Social Electronic Identification. Undoubtedly,<br />

these official documents have been cited and used in national<br />

strategies and blueprints, and they still provide shared guidelines<br />

fostering e-Government in the region.<br />

Other sources of regional influence and vision for the<br />

development of e-Government in LatAm have derived from the<br />

eLAC strategies. eLAC is a regional strategy for the development<br />

of Information Society (IS) from a harmonized perspective, with<br />

the support of CEPAL, using ICTs as instruments for economic<br />

development and social inclusion. Initially, it was endorsed in<br />

2005 in Rio de Janeiro (Brazil) as a long-term vision (until 2015)<br />

with short terms milestones (eLac 2007 and eLac 2010), in line<br />

with the Millenimum Development goals and those of the IS<br />

World Summit, which adopted concrete qualitative and<br />

quantitative goals to be achieved, also in the field of e-<br />

Government [1]. In general, the e-Government section of eLAC<br />

2015 fosters the diffusion of governmental agencies on the web<br />

and the sophistication of electronic services on-line [2]. This set<br />

of goals gives a sense of common ideas, values, and priorities<br />

within the diversity of the region. Another key aspect is the eLAC<br />

2015 focus on integration, interoperability, common standards,<br />

and collaborative work in the region.<br />

An archetype instrument derived from eLAC 2015 is the creation<br />

of the Network of e-Government Leaders of Latin America and<br />

the Caribbean (REDGEALC). REDGEALC has promoted the<br />

collaboration of LatAm governments from a technical point of<br />

view. This network of national experts acts as a forum to boost e-<br />

Government in the region, but also as an institutional mechanism<br />

to enforce, even informally, the policy transfer process in the<br />

77<br />

field. REDGEALC actions, meetings, and projects are funded by<br />

international organizations like the IDB or OAS, and it is intended<br />

to deepen the technical collaboration among the units devoted to<br />

manage national e-Government policies and strategies within the<br />

countries of the region. At the same, REDGEALC has expanded a<br />

network of key players, less political and more administrative,<br />

putting together a pool of middle-level managers involved in<br />

fostering e-Government in the region. One of the most remarkable<br />

projects of REDGEALC is eGobex, a common tool for sharing e-<br />

Government knowledge and applications at national, regional, and<br />

local layers (see: http://www.egobex.net/home/en/). This platform<br />

of solutions is based on different topics, among others, electronic<br />

citizen services, document management, e-justice, m-government,<br />

human resources management, e-procurement, or e-health.<br />

eGobex also facilitates other tools by facilitating the exchange of<br />

experiences among the public administrations of the region,<br />

providing a pool of experts in different aspects of e-Government,<br />

or offering virtual training for practitioners. Also, news and<br />

comments about developments of e-Government in the LatAm<br />

region are also provided by this shared digital platform.<br />

In sum, eLAC 2015 guidelines, REDGEALC network, as well as<br />

CEPAL, and other abovementioned international and<br />

intergovernmental institutions (CLAD, OAS, etc.), and the<br />

instruments behind them, play the role of framing this policy field,<br />

targeting the type of e-Government actions that need to be<br />

enhanced, adopted, funded, and implemented by national public<br />

administrations of the region. This group of instruments operates<br />

as policy carriers, or policy transfer instruments. In some cases<br />

they proceed as coercive mechanisms, while they can impose<br />

views about what type of projects will be funded. In other cases,<br />

they frame with ideas and rationales behind the strategies to foster<br />

e-Government nationally. Whatever the case, it is clear that this<br />

process has been, and it is, promoted within the LatAm region.<br />

4. DISCUSSION AND CONCLUSION<br />

This paper has explored the most salient aspects of the e-<br />

Government policy transfer process within the countries of<br />

LatAm. The question motivating this study is whether or not Latin<br />

American countries are building their national e-Government<br />

policies with a regional perspective. The preliminary assumption<br />

of this paper is that some international, intergovernmental, and<br />

transnational organizations are shaping, at least in some extent,<br />

the ideas, priorities, and initiatives implemented by the<br />

governments of this region of the World. The analysis of previous<br />

sections suggests the verification of this hypothesis.<br />

Consequently, one may support the idea that e-Government in<br />

LatAm may exemplify a policy transfer process.<br />

Overall, one may say that e-Government policy ideas and frames<br />

in LatAm countries derive from the abovementioned international,<br />

inter-governmental, and transnational organizations. These actors<br />

have played a growing role within an emergent policy field (e-<br />

Government), in which a number of developing countries have put<br />

their expectations to modernize their public sectors. What is more,<br />

in developing countries e-Government projects are funded by<br />

these organizations. This facilitates defining priorities, objectives,<br />

and even in some cases, applications, platforms, and vendors<br />

involved in the design, and implementation processes at national<br />

level. Nonetheless, further investigation will be needed in the<br />

future to identify in detail how the regional diffusion of ideas is<br />

implemented in specific countries, and to what extent


governments can innovate or be disconnected from the general<br />

ideas and priorities coming from this group of regional key<br />

drivers.<br />

In the LatAm region, different mechanisms have been oriented to<br />

enhance the supply-side of e-Government. This process has<br />

resulted in policy-makers focused on developing sophisticated<br />

Internet portals and e-services, more than the provision of training<br />

and digital literacy among the citizens. This conclusion is derived<br />

from the importance of supply-side elements within national e-<br />

Government policies, as well as from the analysis of data<br />

provided in previous sections. Besides, it is worth noting the most<br />

important areas of e-Government enhanced, i.e. e-procurement<br />

portals, tax and social security agencies on-line, and more recently<br />

electronic mechanisms for identification, interoperability<br />

schemes, or social media tools for public sector organizations [4].<br />

All of them are inextricably linked with these common beliefs,<br />

mostly a consequence of a techno-centric, e-commerce oriented,<br />

and new public management style of e-Government development.<br />

This study is rooted on institutional theory and policy transfer<br />

literature. Regarding to the previous analysis, this study shows<br />

that international, intergovernmental, and transnational<br />

organizations do not exert adaptive pressure in national states<br />

(‘hard’ mechanisms); and that therefore framing or ‘soft’<br />

mechanisms of policy transfer have characterized e-Government<br />

[5]. In other words, they have promoted e-Government in the<br />

nations of the region through non-coercive processes based on the<br />

will of the participants (i.e. eLAC 2015 goals, CLAD conferences,<br />

REDGEALC groups, etc.) to agree, by way of collective<br />

deliberation, on procedural norms, modes of regulation and<br />

common political objectives and, at the same time, to preserve the<br />

diversity of national and even local experiences.<br />

This type of policy transfer process has created convergence<br />

around paradigms, or a policy frame. This occurs when national<br />

jurisdictions accept new practices, actions and routines inspired<br />

by the international, intergovernmental, and transnational<br />

organizations involved, within an incremental adjustment<br />

process of current domestic institutions. In other words, the<br />

cognitive dimension within this type of intergovernmental<br />

coordination process operates through knowledge-sharing [7,8],<br />

mutual learning or exchange of best practices. In the case of e-<br />

Government policy, the main purpose of the instruments<br />

described throughout the previous section has been to encourage<br />

a comparison of situations across all countries, seeking to share<br />

some mutual representations, opening the road to common<br />

perceptions of political priorities and goals, and enlarging the<br />

variety of candidate alternatives, as a result of the exchange of<br />

good practice (i.e. REDGEALC).<br />

On the other hand, the organizations involved in the policy<br />

transfer process also delivered legitimacy and, less commonly,<br />

solutions to national authorities responsible for e-Government<br />

policies. By the mid of the previous decade, the majority of<br />

LatAm governments perceived this area as a new policy field,<br />

and recognized the extreme importance of the Internet, web sites<br />

and interaction with citizens using digital means. In this context,<br />

eLAC strategy, the CLAD policy formulations, or OAS<br />

initiatives emerged as a source of legitimacy for national<br />

78<br />

governments, as a consequence of the uncertainty about the<br />

future of e-Government. In some cases, they provided solutions<br />

for emergent challenges, altering the cognitive perceptions of<br />

problems in national policy arenas. The logic behind this is<br />

based on the conclusion that national administrations that do so<br />

increase their legitimacy, and their acceptance in society,<br />

independently of the immediate efficacy of practices and<br />

procedures.<br />

Further research will be required to conclude that a process of<br />

policy transfer has operated successfully during the following<br />

years promoting e-Government implementation in LatAm<br />

countries. The next steps of this study will be oriented (a) to<br />

deepen the extent of this process of policy transfer within the<br />

different countries of the region; (b) to understand the<br />

motivations behind the different levels of acceptance of this<br />

process of policy transferability; and (c) to identify the nations<br />

more prone to develop successfully their own e-Government<br />

agendas within the region. This paper aims at providing the<br />

basis for the future consolidation of this ambitious research<br />

agenda.<br />

5. ACKNOWLEDGMENTS<br />

This study has been funded by the Spanish Ministry of Economy<br />

and Competitiveness (project CSO2009-09169).<br />

6. REFERENCES<br />

[1] CEPAL. (2010a). Monitoring of the Plan of Action eLAC<br />

2010: Advances and Challenges of the Information Society in<br />

Latin America and the Caribbean. Lima, November 21-23th.<br />

[2] CEPAL. (2010b). Plan of Action for the Information and<br />

Knowledge Society in Latin American and the Caribbean<br />

(eLAC 2015). Lima, November 21-23th.<br />

[3] CLAD. (2007). Carta Iberoamericana de Gobierno<br />

Electrónico. Caracas: Centro Latinoamericano de<br />

Administración para el Desarrollo.<br />

[4] Criado, J. I., et al. (2011). ‘Interoperabilidad de Gobierno<br />

electrónico en Iberoamérica’. Reforma y Democracia 50:75-<br />

114.<br />

[5] Criado, J. I. (2009). ‘Europeanization of e-Government<br />

Policy. Institutional Mechanisms and Implications for Public<br />

Sector Innovation’. Information Polity 14: 299-314.<br />

[6] Gil-García, J. R. (2012). Enacting Electronic Government<br />

Success. New York: Springer.<br />

[7] March J. G. & J. P. Olsen, Rediscovering Institutions: the<br />

Organizational Basis of Politics, New York: Free Press,<br />

1989.<br />

[8] Scott W. R. & J. W. Meyer, The Organization of Societal<br />

Sectors, in The New Institutionalism in Organizational<br />

Analysis, W. W. Powell & P. J. DiMaggio (eds.), Chicago:<br />

University of Chicago Press, 1991, pp. 108-140.


Lyudmila Bershadskaya<br />

e-Gov Center, Analytic<br />

V.O., Birzhevaya line, 14, office 270<br />

199034, St.Petersburg, Russia<br />

+7812-457-1796<br />

analytics@egov-center.ru<br />

e-Government in Russia: Is or Seems?<br />

ABSTRACT<br />

Electronic governance has received much interest worldwide and<br />

a significant amount of attention and money is being put into<br />

making e-governance a reality. Proper assessment of egovernance<br />

projects gives us crucial information on the kinds of<br />

changes needed in order to make them successful.<br />

International ratings are extremely important in relation to<br />

comparing the achievements of different countries, analysing their<br />

experiences and making decisions about further development. On<br />

the other hand, a country’s ranking position forms or adjusts the<br />

world’s attitude toward this country.<br />

This article discusses the possible problem when a high position<br />

in such ranking becomes an aim in itself and determines the<br />

misdirection of e-Governance development – in this, the case we<br />

have chosen to study is Russia.<br />

Categories and Subject Descriptors<br />

K.4 COMPUTERS AND SOCIETY; K.4.1 Public Policy Issues;<br />

K.4.3 Organizational Impacts; K.5.2 Governmental Issues; K.6.1<br />

Project and People Management - Strategic information systems<br />

planning<br />

General Terms<br />

Management, Measurement<br />

Keywords<br />

E-Government, Public Policy, Goals, Ranking<br />

1. INTRODUCTION<br />

The assessment of e-government development held by the<br />

Department of Economic and Social Affairs of the United Nations<br />

in 2012 [1] showed that the Russian Federation (hereinafter RF or<br />

Russia) has achieved outstanding success and raised its rating<br />

from 59th position in 2010 to 27th place in 2011.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Andrei Chugunov<br />

e-Gov Center, Director, PhD<br />

V.O., Birzhevaya line, 14, office 270<br />

199034, St.Petersburg, Russia<br />

+7812-457-1796<br />

chugunov@egov-center.ru<br />

79<br />

Dmitrii Trutnev<br />

e-Gov Center, Deputy Director, CISA<br />

V.O., Birzhevaya line, 14, office 270<br />

199034, St.Petersburg, Russia<br />

+7812-457-1796<br />

trutnev@egov-center.ru<br />

At the same time, other ratings do not show the same success in<br />

other areas of Russia’s economic and political life. This<br />

discrepancy can be clearly seen in Figure 1.<br />

Figure 1. Russian Federation Rankings<br />

For comparison, the status and trends of other indicators of the RF<br />

were used as follows: GCI Global Competitiveness Index<br />

rankings [2], IMD Global Competitiveness Index rankings [3],<br />

World Bank Government Effectiveness Index [4], World Bank<br />

Knowledge Index & Knowledge Economy Index [5], Legatum<br />

Prosperity Index [6], Human Development Index [7], Doing<br />

Business 2011 [8] and Corruption Perceptions Index [9]. The<br />

question that the authors raise is as follows: is the formation of e-<br />

Government development plans influenced by world rankings?<br />

Research methods proposed:<br />

- Analysis of the motives of decision-makers in government<br />

and their reflections on the adopted legislative acts that define<br />

e-Government development plans in Russia.<br />

- Analysis of e-Government objectives stated in the adopted<br />

legislative acts and their relationship with the common e-<br />

Government goals and the indicators used in some rankings.


2. E-GOVERNMENT AS IS<br />

2.1. E-Government Globally<br />

E-government and e-governance are intrinsically related,<br />

however, practice shows that successful e-government and egovernance<br />

are not synonymous, but complementary [10]. This<br />

article will use both terms as they are used in the referenced<br />

documents.<br />

E-government has many definitions:<br />

o A new form of organizing public services based on extensive<br />

use of ICT that offers citizens and businesses the new and<br />

higher levels of efficiency and comfort in the delivery of<br />

public services, and in obtaining information on the<br />

performance of governmental agencies [11]<br />

o “E-government” refers to the use by government agencies of<br />

information technologies (such as Wide Area Networks, the<br />

Internet and mobile computing) that have the ability to<br />

transform relations with citizens, businesses and other arms of<br />

government. These technologies can serve a variety of<br />

different ends: better delivery of government services to<br />

citizens, improved interactions with business and industry,<br />

citizen empowerment through access to information, or more<br />

efficient government management. The resulting benefits can<br />

be less corruption, increased transparency, greater<br />

convenience, revenue growth and/or cost reductions. [12]<br />

o E-government is the use of information technology to support<br />

government operations, engage citizens and provide<br />

government services. [13]<br />

o The term “e-government” focuses on the use of new<br />

information and communication technologies (ICTs) by<br />

governments as applied to the full range of government<br />

functions. In particular, the networking potential offered by<br />

the Internet and related technologies has the potential to<br />

transform the structures and operation of government. [14]<br />

Summing up all these definitions and the world’s best practice, we<br />

can say that e-government and information technology serve as a<br />

tool to achieve such national goals as better governance (and<br />

common prosperity as a consequence) due to better (more<br />

effective and efficient) governmental functions, services and<br />

communications as shown in Figure 2.<br />

Figure 2. E-government as a Tool<br />

2.2. E-Government in the Russian Federation<br />

The development of e-government in Russia began with the<br />

adoption of the Federal target programme “Electronic Russia<br />

(2002-2010)” in 2002. The main objectives of that programme<br />

80<br />

have been announced as “the creation of conditions for the<br />

development of democracy, improving the functioning of the<br />

economy, public administration and local self-government<br />

through the introduction of ICT and mass distribution, and the<br />

rights to freely seek, receive, transfer, production and<br />

dissemination of information” [15]. Along with “Electronic<br />

Russia”, other Federal target programmes “Budget Reform” and<br />

“Administrative Reform” where carried out. After 2010 the<br />

Programme “Information Society 2011-2020” became the<br />

successor to “Electronic Russia”. The stated goals of all these<br />

Federal target programmes were consistent with the global trend –<br />

improving the quality of life through the use of ICT.<br />

Over 2002-2011 there was much public investment in nationwide<br />

projects aimed at e-government development in Russia. The<br />

intensity of the legislative activity in the area of e-government<br />

reflects the intensity of the government’s efforts and is illustrated<br />

in Figure 3.<br />

Figure 3. Quantity of E-Government Legislation Acts Adopted<br />

It is logical to expect rapid positive changes in economy and<br />

society in response to such vigorous state activity and investment<br />

growth in the use of ICT in government, but this has not happened<br />

as we have already seen in Figure 1.<br />

3. THE ANALYSIS<br />

3.1. Analysis of the motives of decision-makers<br />

To understand the reasons for this weak link between the growing<br />

use of ICT in government and any positive changes in other areas<br />

of national development, we must understand the motivation of all<br />

stakeholders, including the legislature, supreme executive power<br />

(Ministry), the regional authorities and municipal government<br />

agencies, companies and citizens.<br />

Established in the last decade, the administrative system of the<br />

Russian Federation is characterized by rigid top-down control<br />

(“vertical power”). In such a system all orders comes from the top<br />

down with, as a rule, lack of feedback, horizontal coordination<br />

and local initiatives. In this system, until recently, the opinion of<br />

citizens and businesses (except for the giant and state-owned<br />

corporations) did not play any significant role, for example, no<br />

large-scale studies of the requirements of citizens and businesses<br />

on the quality of public services have been carried out. These<br />

(citizen and business) stakeholders have no significant channels<br />

by which to influence the authorities.<br />

For the main implementers of e-government (regional authorities<br />

and municipal government agencies), Federal Law and<br />

Government Decrees are the only motive for the creation and<br />

implementation of e-government (“system motivation –<br />

administrative control and compulsion” [16]).


Observations over recent years show that the vast majority of<br />

major legislation in the field of e-government was developed and<br />

submitted for approval to the legislature by the executive<br />

authorities – responsible ministries (Ministries of Economic<br />

Development and of Telecommunications). These ministries are<br />

under the direct authority of the Prime Minister (and, indirectly,<br />

under the President) whose orders define the vector of the state in<br />

general and e-government development in particular.<br />

In 2000 at the G8 Summit the President of the Russian Federation<br />

together with the other G8 leaders signed Okinawa’s Charter on<br />

“Global Information Society” in which e-government was listed<br />

as one of the components of the information society. Since that<br />

time the implementation of commitments made under the<br />

Okinawa Charter and improving Russia’s position in international<br />

rankings have become among the highest priorities of the<br />

President and Prime Minister of Russia (especially in the practical<br />

absence of pressure from citizens and businesses as was<br />

mentioned above). This desire to improve Russia’s position in<br />

international rankings is frequently mentioned in the policy<br />

speeches of the leaders of the state and has even been used as the<br />

Key Performance Indicator in the text of the Concept of<br />

Administrative Reform in the Russian Federation in 2006 – 2008<br />

[17]. In particular, this document only elucidated upon the need to<br />

improve Russia’s position in the United Nations E-Government<br />

Survey’s ranking, GRICS, Doing Business and other rankings.<br />

Tracing this chain of motivations, we can conclude that one of the<br />

important factors determining the direction and results of egovernment<br />

development in Russia is the international rankings<br />

and the United Nations E-Government Survey among them.<br />

Logically we can assume that if one of the important goals is the<br />

position in a rating and the other motivators are not very strong,<br />

then there is a natural desire to improve precisely those<br />

characteristics that are evaluated during the surveys.<br />

3.2. Analysis of E-Gov Objectives and<br />

Indicators<br />

The authors have carefully examined the key normative<br />

documents that regulate the direction of e-government<br />

development in Russia ([18], [19], [20], [21]).<br />

These documents contain the requirements for naming and dating<br />

the transfer of governmental service into electronic form, and<br />

establishing the mandatory presence of governmental web-portals<br />

and electronic interagency interaction. At the same time, they do<br />

not contain any requirements for quality characteristics or the<br />

expected results and impact of these innovations on the main and<br />

common e-government goals. The same remark applies to all laws<br />

and regulations adopted in this period.<br />

E-government systems and applications created under these<br />

conditions cannot contribute to goals of e-government such as<br />

effectiveness, cost reduction, quality, anticorruption, etc. and<br />

cannot be useful to citizens and businesses. The absence of these<br />

effects of e-government projects in Russia has been shown here<br />

above in Figure 1.<br />

Indeed, in Russia in full accordance with those legislative acts, the<br />

main efforts were aimed at creating a national central web-portal,<br />

e-services portals, websites of all ministries and administrations,<br />

and establishing a system of interagency interaction.<br />

The United Nations E-Government Survey methodology says: “to<br />

arrive at a set of online service index values, the researchers<br />

assessed each country’s national website, including the national<br />

81<br />

central portal, e-services portal and e-participation portal, as well<br />

as the websites of the related ministries of education, labour,<br />

social services, health, finance and environment as applicable. In<br />

addition to being assessed for content and features, the national<br />

sites were tested for a minimal level of web content accessibility<br />

as described in the Web Content Accessibility Guidelines of the<br />

World Wide Web Consortium” [22].<br />

The generalized relationship between the main objectives of egovernment<br />

(taken from its several definitions), United Nations E-<br />

Government Survey indicators and the targets established by the<br />

laws of the Russian Federation are shown in Table 1.<br />

Table 1. Relationship between E-Gov Objectives, UN E-Gov<br />

Survey Indicators and Targets Established by the RF’s Laws<br />

E-Government Objectives<br />

UN E-Gov Survey<br />

Indicators<br />

Targets Established<br />

by the RF’s Laws<br />

Gov. processes improvement X X<br />

Effectiveness of government X X<br />

Cost reduction X X<br />

Quality of service delivery X X<br />

Availability of Information � �<br />

G2G relations improvement X �<br />

G2B relations improvement � �<br />

G2C relations improvement � �<br />

Less corruption X X<br />

Transparency improvement � �<br />

From Table 1 we can see that in the Russian Federation has been<br />

successfully (according to the UN rating) created that kind of egovernment,<br />

which does not lead to the achievement of such goals<br />

as prosperity due to good governance, better functions, services<br />

and communications, simply because the government did not state<br />

such objectives initially. Instead of e-government as a tool to<br />

achieve these vital goals, Russia saw e-government as a goal in<br />

itself, which takes resources away from other vital goals which<br />

were almost forgotten and not supported (Figure 4).<br />

Figure 3. E-Government as the Goal<br />

Such logic can explain why in recent years Russia actively created<br />

a web interface (front office) that assessors see well (“the national<br />

government portal … looks very solid and representative” [1])<br />

while the processes of public and municipal service delivery (back<br />

office) still continue to run in the manual and paper-based mode,<br />

under the old rules with the same low rate and high (if not higher)<br />

cost. This inner being of the “electronic government” was<br />

concealed from the assessors and cannot be evaluated from abroad<br />

with the methodology used.<br />

4. CONCLUSION<br />

If seen in the light of the Russian case, a negative effect of


ankings on the formation of national e-government development<br />

plans exists, therefore, it may also exist in other countries.<br />

Other authors have found that the raised problem is very complex<br />

and includes a spectrum of related problems:<br />

o The success of the e-governance survey and ranking has been<br />

limited so far [23]. Such a respected ranking as the United<br />

Nations E-Government Survey in some cases could give<br />

results which do not reflect the essence of the phenomena<br />

occurring.<br />

o It is possible to expect an immediate and strong impact of egovernment<br />

evaluation studies on countries’ e-government<br />

policies [24].<br />

o Lack of attention to stakeholders’ interests can make the<br />

results of the ranking meaningless [25].<br />

These problems can and should be solved by joint efforts of<br />

ranking organisations and appraised countries. In any case, all<br />

participants of ranking processes should be aware of the existence<br />

of such problems, understand their causes and take them into<br />

consideration in order to prevent negative impacts.<br />

The authors understand that the problem raised in this publication<br />

has not been adequately studied yet and requires further research.<br />

5. REFERENCES<br />

[1] United Nations e-Government Surveys. [E-source]:<br />

http://www.unpan.org/Home/tabid/1243/language/Library/Maj<br />

orPublications/UNEGovernmentSurvey/tabid/646/language/en<br />

-US/Default.aspx<br />

[2] The World Economic Forum, GCI Global competitiveness<br />

index rankings. [E-source]: http://www.weforum.org/<br />

[3] IMD Global competitiveness index rankings.<br />

[E-source]: http://www.imd.ch/<br />

[4] World Bank Government Effectiveness Index. [E-source]:<br />

http://info.worldbank.org/governance/wgi/sc_chart.asp<br />

[5] World Bank Knowledge Index & Knowledge Economy Index.<br />

[E-source]:<br />

http://info.worldbank.org/etools/kam2/KAM_page5.asp<br />

[6] Legatum Institute, Legatum Prosperity Index.<br />

[E-source]: http://www.prosperity.com/rankings.aspx<br />

[7] UNDP’s Human development index. [E-source]:<br />

http://hdr.undp.org/en/reports/global/hdr2007-2008/<br />

[8] International Finance Foundation & The World Bank’s<br />

Measuring Business Regulation Report “Doing Business<br />

2012”. [E-source]: http://www.doingbusiness.org/rankings<br />

[9] Transparency International's Corruption Perceptions Index<br />

(CPI). [E-source]: http://www.transparency.org/<br />

policy_research/surveys_indices/cpi<br />

[10] Haiyan Qian, Citizen-Centric E-Strategies Toward More<br />

Successful E-Governance, Journal of E-Governance, Volume<br />

34 Issue 3, August 2011, Pages 119-129, IOS Press<br />

Amsterdam, The Netherlands.<br />

[11] Russian Federation, Concept of E-Government Formation till<br />

the Year 2010. [E-source]: http://www.transparency.org/<br />

policy_research/surveys_indices/cpi<br />

[12] The World Bank, [E-source]: http://web.worldbank.org/<br />

wbsite/external/topics/extinformationandcommunicationandte<br />

chnologies/extegovernment/0,,contentMDK:20507153~menu<br />

PK:702592~pagePK:148956~piPK:216618~theSitePK:70258<br />

6,00.html<br />

82<br />

[13] University at Albany, Center for Technology in Government<br />

[E-source]: http://www.ctg.albany.edu/publications/reports/<br />

future_of_egov?chapter=2<br />

[14] OECD, Glossary of Statistical Terms<br />

[E-source]: http://stats.oecd.org/glossary/detail.asp?ID=4752<br />

[15] RF Government Order of 28.01.2002 N 65. On the Federal<br />

Target Program "Electronic RUSSIA (2002 – 2010)”<br />

[E-source]: http://www.internet-law.ru/intlaw/laws/e-rus.htm<br />

[16] Rustem Nureev, Political Economy of Russian “Vertical-of<br />

Power”, Proceedings of the Second World Congress of the<br />

Public Choice Societies, 8-11 March 2012, [E-source]:<br />

http://www.pubchoicesoc.org/papers_2012/Nureev_Shulgin.p<br />

df.<br />

[17] RF Government Order dated October 25, 2005 N 1789-R On<br />

the approval of the Concept of Administrative Reform in the<br />

Russian Federation in 2006 - 2008 and action plan for<br />

administrative reform in Russia in 2006 - 2010 (as amended)<br />

[E-source]: http://base.garant.ru/188767/<br />

[18] RF Government Order of 17.10.2009 N 1555-R "Transition<br />

plan for federal executive bodies public services and execution<br />

of public functions conversion into electronic form".<br />

[E-source]:<br />

http://government.consultant.ru/page.aspx?8411;1030853<br />

[19] RF Government Order of 17.12.2009 N 1993-R<br />

"Consolidated list of priority of state and municipal services<br />

provided by executive bodies of subjects of the Russian<br />

Federation and local authorities in electronic form".<br />

[E-source]:<br />

http://government.consultant.ru/page.aspx?1041050<br />

[20] RF Federal Law of 27.07.2010 N 210 “On the organisation<br />

of public and municipal services”<br />

[E-source]: http://www.rg.ru/ 2010/07/30/gosusl-dok.html.<br />

[21] RF Government Decree of 2.09.2010 N 1433 “Plan of action<br />

needed to implement the Federal Law “On the organisation of<br />

public and municipal services”<br />

[E-source]: http://www.rg.ru/ 2010/12/21/plan-site-dok.html<br />

[22] United Nations Global E-government survey 2012<br />

[E-source]: http://unpan1.un.org/intradoc/groups/public/<br />

documents/un/unpan048065.pdf<br />

[23] Ojo, A., Janowski, T,. Estevez, E., Building theoretical<br />

foundations for electronic governance benchmarking,<br />

Proceedings of the 10th IFIP WG 8.5 international conference<br />

on Electronic government, Springer-Verlag Berlin, Heidelberg<br />

©2011<br />

[24] Janssen, D., Rotthier, S., Snijkers, K., If you measure it they<br />

will score: An assessment of international eGovernment<br />

benchmarking. Information Polity Journal (Volume 9 Issue<br />

3,4, December 2004)<br />

[25] Rahul De', E-Government systems in developing countries:<br />

stakeholders and conflict. EGOV'05 .Proceedings of the 4th<br />

international conference on Electronic Government. Springer-<br />

Verlag Berlin, Heidelberg ©2005


Session 4<br />

Egov Adoption & Usage


Framework for Useful Transparency Websites for Citizens<br />

ABSTRACT<br />

In this paper, I describe the need to elaborate a theoretical<br />

framework that could help governments to improve their<br />

transparency and access to information websites beyond standard<br />

transparency obligations. If developed properly, these websites<br />

could offer information that is actually useful for ordinary<br />

citizens. In addition, I review literature of e-transparency web site<br />

evaluations in Mexico, as well as some examples of initiatives that<br />

have aimed to provide the ordinary citizen with useful<br />

information. Finally, this paper proposes a research agenda that<br />

could help to develop this framework. This is a work in progress.<br />

Josune Arcelus<br />

Categories and Subject Descriptors<br />

J.1.4 [Computer Applications]: Administrative Data Processing -<br />

Government<br />

General Terms<br />

Management, Human Factors<br />

Keywords<br />

Transparency Websites, Access to Information, e-Transparency,<br />

e-Government, Open Government<br />

1. INTRODUCTION<br />

During the last decade, the topic of transparency has taken a great<br />

deal of importance in Mexico. In 2000 Vicente Fox, the<br />

presidential candidate of National Action Party (PAN), defeated<br />

the long lasting ruling party, the Institutionalized Revolutionary<br />

Party (PRI) under the political banner that government<br />

transparency will empower citizens to demand a more democratic<br />

government. Twelve years after this promise, one of the few<br />

tangible achievements of the new democratic government has<br />

been the growing importance of transparency and access to public<br />

information. In 2002, the Federal Transparency and Access to<br />

Public Information Law (Ley Federal de Transparencia y Acceso<br />

a la Información Pública -- LFTAIP) was approved by Congress.<br />

In addition, a special institute (Instituto Federal para Acceso a la<br />

Informacion-- IFAI) was created to supervise compliance of this<br />

law. Gradually, each state and the Federal District (Mexico City)<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Blvd Jose Maria Morelos 1506<br />

Leon, Guanajuato, CP 24263<br />

+52(477)781 0347<br />

josune.arcelus@gmail.com<br />

83<br />

published their own laws to guide their obligations at the local<br />

level.<br />

The LFTAIP describes in its 7 th article the mandatory information<br />

that must be published electronically, and states in its 9 th article<br />

[1] that information must be available via electronic media.<br />

Over the last ten years state and local governments and their<br />

agencies have created their own transparency websites to comply<br />

with their respective laws.<br />

Different academic and civil society organizations like CIDE<br />

(Centro de Investigación y Docencia Económica) and Article XIX<br />

have been evaluating federal and state governments to assess their<br />

websites as well as their overall transparency initiatives. These<br />

evaluations are widely publicized in the media. Therefore,<br />

governments are trying continually to improve in order to obtain<br />

better evaluations.<br />

Based on the assumption that better informed citizens make better<br />

citizens, this law and transparency websites would contribute to a<br />

more democratic society. Transparency websites would open<br />

mechanisms to supervise the government, and harness a new<br />

desired relationship between citizens and governments. However,<br />

there is the perception that the information requested through<br />

websites is not being used directly by citizens, but by media,<br />

political opposition, and other enemies of the groups in power.<br />

This assumption is hard to evaluate with government produced<br />

data because the petition online system (Sistema de Solicitud de<br />

Información -- SISI) allows for anonymity. Therefore, making it<br />

hard to elaborate a precise analysis of who is requesting<br />

information. However, there is evidence that suggests that citizens<br />

are not making transparency and access to information part of<br />

their lives. According to a survey conducted by Parametría in<br />

2011 [2], only 19% of the persons interviewed were able to<br />

identify the IFAI, 14% knew how to make a petition to the<br />

government, and about 60% thought that information about<br />

government expenses and public servants salaries is “obscure” or<br />

difficult to reach.<br />

Interestingly, the transparency websites users and the petition<br />

system (SISI) users do not consider that transparency and access<br />

to information has been achieved after they interacted with them.<br />

In a survey/focus group published in the Mexican Journal<br />

Derecho Comparado de la Información [3], it is pointed out that<br />

while the test subjects find that the websites comply with what is<br />

required by law to be published, the website does not promote<br />

transparency in itself or the right to know. All interviewed<br />

subjects had access to the federal transparency web site, or used<br />

the SISI.


Several governments are aware of these deficiencies, yet because<br />

they are mostly evaluated and rewarded for complying with the<br />

law, they focus mostly on the latter.<br />

Additionally, evaluators have not found an impartial set of criteria<br />

regarding contents, from where to measure usefulness of<br />

information. There is agreement that evaluations currently lack a<br />

framework to measure content, apart from the mandatory list<br />

provided by the law<br />

In 2011 the Mexican Federal Government launched an initiative [4]<br />

of Focused Transparency (Transparencia Focalizada), intended to<br />

push information that may not be required by law but that is<br />

considered useful to the government. In addition, Mexico City´s<br />

government has published several transparency websites that<br />

evolve around topics of interest to the ordinary citizen, for<br />

instance, transportation, environment and procedures (tramites y<br />

servicios).<br />

However, there is not yet a neutral standard list of elements that<br />

could be considered when designing a website, and performing<br />

evaluation studies.<br />

The purpose of this article is to set the stage for a theoretical<br />

framework and guidelines that would allow for a more<br />

comprehensive evaluation of transparency and access to<br />

information web portals, and that would include compliance of a<br />

minimum set of useful content, apart from what is currently<br />

required by law.<br />

2. LITERATURE REVIEW AND MAJOR<br />

ISSUES<br />

2.1 Transparency and Access to Information<br />

as Part of Accountability<br />

Elaboration of a framework for transparency and access to<br />

information web portals requires defining both transparency and<br />

access to information in the right context.<br />

Literature does not equate transparency to access to information<br />

[5], although both concepts can be included within the concept of<br />

accountability. Lopez-Ayllon and Arellano explain that<br />

accountability has a dimension of answerability, which<br />

comprehends two components: information and justification. The<br />

information component implies an authority that is obliged to<br />

provide information and a citizen that has the right to access that<br />

information. The justification component of answerability is more<br />

complex and harder to achieve, since it implies the justification of<br />

actions by governments to citizens and a dialogue between them.<br />

The authors mention that these two components, information and<br />

justification, imply the possibility of the citizens to sanction, and<br />

that having all these components of information, justification and<br />

sanction allow for a complete accountability.<br />

In addition, Lopez-Ayllon and Arellano develop a diagram that<br />

depicts an incremental relationship among access to information,<br />

transparency, accountability, and democratic governance. Access<br />

to information is the most basic component, as shown below:<br />

Access to Information < Transparency < Accountability <<br />

Democratic Governance<br />

The implications of this concept have a relevant application for<br />

government websites, since it draws possible evolutionary stages<br />

for a complete transparency and access to information website.<br />

84<br />

This is actually explained in a recent study of transparency and<br />

access to information websites of Mexico [6]. In this work, the<br />

author Sepulveda cites the stages of an e-Transparency web<br />

portal, as defined by the University of Manchester [7]:<br />

publication, transaction, reporting, openness and accountability.<br />

The framework proposed in this paper should aim to the more<br />

advanced stages, since it aims to provide guidelines for websites<br />

that harness interaction between the government and the citizens.<br />

2.2 Access to Information as a Human Right<br />

Access to information can be understood under the notion of a<br />

liberal state, where a state is constrained by a set of fundamental<br />

rights of citizens [8].<br />

In addition, access to information is seen as the key that enables<br />

other rights. Article 19 of the Universal Declaration of Human<br />

Rights, declares freedom of speech for which the right to know is<br />

explicitly required. Within this context, the access to information<br />

is seen as a component of other rights (e.g., free expression). In<br />

other words, access of information protects other rights, helps in<br />

the compliance of other rights, and prevents possible violations of<br />

other human rights [9]. According to this perspective, the more<br />

information citizens have, the more citizens’ rights will be<br />

fulfilled [10].<br />

Consideration of access to information as an enabler and protector<br />

of other human rights should be incorporated as part of the<br />

framework, since it complements the other visions that have been<br />

applied to transparency websites.<br />

The cited contextualization of transparency and accountability<br />

take into account that the government must implement a policy<br />

that actively engages the citizens in the evaluation of all policies<br />

[5]. This paper by López-Ayllón and Arellano sets the extent and<br />

reach of the website regarding the achievement of democracyoriented<br />

goals; however, it does not help to define the basic<br />

contents of a website that enables transparency and access to<br />

information.<br />

A website framework that considers human rights germane<br />

provides the advantage of universality and simplicity as to what<br />

information must be included in any attempt to promote<br />

transparency and access to information.<br />

2.3 Websites Evaluations and Compliance of<br />

the Law<br />

Several efforts have been made to measure the compliance of the<br />

LFTAIP and the different state laws. The metrics developed by<br />

CIDE are the ones that are more widely recognized by the media<br />

and the government. CIDE’s metrics indicators provide a final<br />

grade. The four main aspects evaluated by CIDE include<br />

evaluation of web sites, normative quality, mystery shopper based<br />

on information requests, and institutional quality [5][11].<br />

The evaluation of the website mostly consists of checking the<br />

existence of all mandatory information (used as variables) as<br />

required by law, for example budget, outcomes of investigations,<br />

salaries, public servant directories, goals, programs, expenses,<br />

procurement, procedures, and services. Out of the 15 variables<br />

used as information proxies, only one is assigned to everything<br />

that has to do with the usability and design of the website.<br />

The limit of this evaluation approach is that governments that get<br />

a good grade in the evaluation of the website might think that they


are doing a good job overall in regards to their websites, while<br />

they are mostly doing a good job only in including the legally<br />

required information. As noted above users might acknowledge<br />

that the website provides the information required by law, and yet<br />

not feel their transparency and right-to-know needs are being<br />

fulfilled.<br />

The study conducted by Sepúlveda [6] suggests that quality of the<br />

law (i.e., how advanced the law is in terms of access to<br />

information and democratization) is not related to her<br />

transparency website index, in which she includes more<br />

technology related aspects. In other words, she shows that there is<br />

no relationship between how good the transparency law is and the<br />

quality of its transparency website.<br />

Lastly, the minimal information demanded by the LFTAIP, falls<br />

short within what a government is expected by its citizens to<br />

publish in order to be regarded as transparent. The emphasis<br />

placed in content targeted to fight corruption resulted in a tight<br />

and unattractive set of information for ordinary citizens as can be<br />

observed both in Parametría [2] and the Comparative Law Journal<br />

[3] surveys.<br />

The framework that shall be developed when this work is<br />

completed will emphatically seek to raise the bar of what is<br />

considered the minimum mandatory information that a<br />

government should share with the citizens.<br />

2.4 Usability and Other Types of Friendliness<br />

It is important for any website that the users remain in their<br />

websites for more than 10 seconds before they click-away. This<br />

concept of usability, as defined by Nielsen [12], parts from the<br />

assumption that the Internet user has thousands of options to<br />

choose from when browsing.<br />

Governments allocate a lot of money and other resources to<br />

organize, sort and publish information on their websites just to<br />

discover that they are not used because the information is not<br />

displayed in an attractive way.<br />

The topic of usability is noted in Sepulveda´s [6] study and in the<br />

yearly ranking [13] published by the magazine Política Digital<br />

issued in Mexico. Both studies develop an index to evaluate<br />

exclusively Transparency websites, and suggest specifications of a<br />

good web site, which include usability and accessibility.<br />

The issue of an easy-to-understand language is mentioned in<br />

Sepulveda´s study, but it is specified that it cannot be evaluated.<br />

The study refers to the Mexican Federal Government initiative of<br />

citizen´s language (lenguaje ciudadano), which calls all the<br />

agencies for action to provide information in a simpler and lessbureaucratic<br />

manner.<br />

The trustworthiness of the information provided in the website is<br />

mentioned in both studies, yet no repeatable and neutral<br />

measurement is provided to evaluate it. According to the studies,<br />

trustworthiness always depends on the evaluator´s perception.<br />

The framework will incorporate the usability and accessibility<br />

aspects of previous studies.<br />

2.5 Current Examples of Focused<br />

Transparency<br />

In 2011, the Mexican Federal Government launched an initiative<br />

called Focus on Socially Useful Information [4][14], through<br />

85<br />

which it encourages its agencies to publish more information than<br />

that required by law. The information provided should include<br />

information that citizens might find useful in their every-day lives.<br />

This initiative defines Focused or Socially Useful Transparency as<br />

“providing valuable information to the citizen so that she can<br />

make better informed decisions about procedures and services, or<br />

in aspects that affect her every day life, to prevent public risks or<br />

solve problems from the social sphere.”<br />

The Secretary of Public Administration (Secretaría de la Función<br />

Pública) has already elaborated guidelines with criteria that all<br />

agencies must incorporate when updating information in their<br />

respective websites and transparency sections. A special call is<br />

made to include information beyond what is required by law, as<br />

well as to rephrase, summarize and reorganize the information<br />

that is produced within a bureaucratic environment to<br />

communicate it in a simpler way.<br />

Another attempt to provide more valuable information to citizen´s<br />

has been that of Mexico City´s government of Focused<br />

Transparency [15]. The approach in this case has been to define a<br />

set of thematic websites that publish all the information related to<br />

that topic, arranged and displayed in a question-and-answer<br />

fashion. For example, what is environmental policy…? What is<br />

the impact of CO2 emissions in my life…? How can I become<br />

part of the solution to environmental problems…? [16]<br />

Another initiative was presented by Mexico City´s Governement<br />

where the strategy was described as groups of information<br />

packages:<br />

Table 1. Information Packages<br />

Procurement Environment<br />

Transportation<br />

traffic<br />

and Health<br />

Procedures and Employment and<br />

Services<br />

Education<br />

Social Programs Tourism<br />

Budget Citizen´s requests and<br />

legal petitions<br />

Civil Protection Culture<br />

Public Works Business<br />

So far, the environment, transportation and procedures and<br />

services focused transparency websites have been created.<br />

3. METHODOLOGY AND RESEARCH<br />

The framework suggested in this paper will be a compilation of<br />

findings from the different issues analyzed throughout the<br />

literature, mainly:<br />

o The need to have an accountability approach that goes<br />

beyond the mere provision of mandatory information and<br />

incorporates the justification component;<br />

o The need to provide a content skeleton that can be widely<br />

accepted, because it adjusts to the essence and raison-de-etre<br />

of government, as well as to the nature of human beings as<br />

human beings and not just citizen; and<br />

o The need to incorporate usability and other websites<br />

friendliness criteria as an important element.


Qualitative analysis of websites and surveys will provide a<br />

guideline-like framework that governments may be able to use to<br />

organize their transparency and access to information web sites.<br />

Hopefully, this suggested framework would help supervise the<br />

government and provide evaluators with more tools to measure<br />

transparency beyond the compliance of law.<br />

3.1 Accountability Approach<br />

The ten best ranked access to information and transparency (or<br />

similar) websites in the world as presented in the literature<br />

previously reviewed will be analyzed to gather best practices that<br />

show high evolution in terms of e-Transparency. Already existing<br />

practices of accountability will be identified and incorporated into<br />

a framework.<br />

3.2 Universal Content Skeleton<br />

One of the main gaps observed in the literature reviewed is the<br />

lack of a content skeleton for those websites that goes beyond the<br />

standard list set up by the law. In order to be able to convince<br />

government and academia to accept the contents proposed by such<br />

a skeleton, there needs to be some sort of philosophical theory that<br />

is universal (within a democratic context) and that cannot be<br />

contested. The Universal Declaration of Human Rights offers a<br />

perfect platform for this purpose, because of its universality, its<br />

world-wide acceptance, and its depth.<br />

The list of the human rights contained in the Universal<br />

Declaration of Human Rights will be compared to the mandatory<br />

contents that the LFTAIP demands, and possible gaps will be<br />

identified. Additionally, human-rights oriented information<br />

architecture will be proposed.<br />

In order to incorporate the citizen´s point of view in regards to<br />

what a government should be mainly accountable for, a survey<br />

will be conducted, where citizens will be required to list top-ofmind<br />

information that they would expect the government to<br />

publish. They will also be asked to rank from a list of information<br />

that governments publish which ones do they think are more<br />

important, and explain, how many times in that year they have had<br />

to use that information; finally, citizens will be proposed to list the<br />

names of three activities that they perform weekly in which they<br />

think the government is involved. The outcomes of this survey<br />

will also be considered in the elaboration of a content skeleton.<br />

3.3 Usability and Website Friendliness<br />

A detailed compilation of usability, accessibility and friendliness<br />

criteria will be listed, based on the studies cited. Also, a list of<br />

information pushed by the agencies as useful will be analyzed,<br />

and interviews will be held with the people responsible of both<br />

initiatives in order to assess their success and challenges.<br />

The resultant framework will constitute a list of elements to be<br />

incorporated within future evaluations, but will not provide<br />

specific or new metrics for those evaluations.<br />

86<br />

4. REFERENCES<br />

[1] Cámara de Diputados, Ley Federal de Transparencia y<br />

Acceso a la Información Pública, Diario Oficial de la<br />

Federación, 11 de junio del 2002, 3-5<br />

[2] Parametría, Los mexicanos y su interés por la transparencia.<br />

http://www.parametria.com.mx/DetalleEstudio.php?E=4320,<br />

2011.<br />

[3] Contreras Padilla, S, E-Government y acceso a la<br />

información en México, Derecho Comparado de la<br />

Información, núm. 11, Enero-Junio 2008<br />

[4] Secretaria de la Funcion Publica, Procedimiento 6.4:<br />

Información Socialmente Util o Focalizada, MAAGT,<br />

agosto 2011<br />

[5] Lopez-Ayllon, S. and Arrellano-Gault, D., Estudio en<br />

material de transparencia de otros sujetos obligados por la<br />

Ley Federal de Transparencia y Acceso a la Información<br />

Pública Gubernamental, CIDE-IFAI-UNAM, 2008<br />

[6] Sepúlveda K., P., Transparencia Electrónica en México: Un<br />

Analisis de las Estrategias de los Gobiernos Estatales en<br />

Internet, Tesis ITAM, 2008<br />

[7] Institute for Development Policy and Management (IDPM),<br />

University of Manchester, United Kingdom, 2004:<br />

www.egov4dev.org/transpdefn.htm<br />

[8] Rodríguez Zepeda, Jesús. Estado y transparencia: un paseo<br />

por la filosofía política, Cuadernillos del IFAI, 2006<br />

[9] Jagwanth, S. “The Right to Information as a Leverage Right”<br />

in The Right to Know, The Right to Live: Access to<br />

Information and Socio-Economic Justice, Calland, Richard<br />

and Allison Tilley, ed. Open Democracy Advice Centre,<br />

2002, p.7.<br />

[10] Ramirez Salazar, Los Derechos Humanos desde la<br />

Perspectiva del Derecho de Acceso a la Información, Article<br />

XIX-InfoDF, CDHDF, 2009, p. 53-59<br />

[11] COMAIP and CIDE presentations about Metrica de la<br />

Transparencia www.metricadetransparencia.cide.edu<br />

[12] Nielsen, J., Top Ten Mistakes in Web Design,<br />

www.usability.org<br />

[13] Sandoval, R., Ranking de Portales de Transparencia, Política<br />

Digital, http://www.politicadigital.com.mx<br />

[14] Secretaria de la Funcion Publica, Guia para la Identificacion<br />

y Difusion de la Informacion Socialmente Util o Focalizada,<br />

2010<br />

[15] CGMA, Paquetes de Información, Portal de Transparencia<br />

Focalizada del Gobierno del Distrito Federal, 2009<br />

[16] http://www.transparenciamedioambiente.df.gob.mx


The Circular Continuum of Agencies, Libraries, and Users:<br />

A Model of E-Government in Practice<br />

Natalie Greene Taylor<br />

Information Policy & Access Center,<br />

University of Maryland-College Park<br />

ngreenetaylor@gmail.com<br />

Paul T. Jaeger<br />

Information Policy & Access Center,<br />

University of Maryland-College Park<br />

pjaeger@umd.edu<br />

ABSTRACT<br />

When e-government first became a viable solution to the<br />

dissemination of government information, experts believed that<br />

the rise of direct government-to-citizen (G2C) services would<br />

improve government transparency and foster civic engagement. It<br />

soon became clear, however, that not all users were not getting the<br />

type of information or instruction that they needed from this<br />

arrangement, and that there was a need for an intermediary in this<br />

continuum of services. Increasingly, libraries fulfill this role.<br />

Instead of direct government-to-user interaction, information<br />

channels flow from agency to librarian to user, from user back up<br />

to agency, and from agency to user to librarian. This paper<br />

expands on the idea of these multiple pathways of information<br />

through research conducted in collaboration with libraries,<br />

government agencies, state library agencies, and a national library<br />

association in the United States with aims to create an egovernment<br />

web resource to assist librarians engaging in egovernment<br />

services. The different pathways of information both<br />

informed the creation of the web resource and offered a practical<br />

model of e-government, important for other projects dealing with<br />

similar information.<br />

Categories and Subject Descriptors<br />

A.1 INTRODUCTORY AND SURVEY<br />

General Terms<br />

Documentation, Human Factors, Theory<br />

Keywords<br />

Digital Government, Electronic Government, Models<br />

1. INTRODUCTION<br />

In the early stages of e-government, expectations ranged from<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Ursula Gorham<br />

Information Policy & Access Center,<br />

University of Maryland-College Park<br />

ugorhos@yahoo.com<br />

John Carlo Bertot<br />

Information Policy & Access Center,<br />

University of Maryland-College Park<br />

jbertot@umd.edu<br />

87<br />

Ruth Lincoln<br />

Information Policy & Access Center,<br />

University of Maryland-College Park<br />

rlincoln21@gmail.com<br />

Elizabeth Larson<br />

Information Policy & Access Center,<br />

University of Maryland-College Park<br />

elclarson@gmail.com<br />

cautious optimism to the belief that e-government would promote<br />

unprecedented waves of citizen interaction with the government.<br />

These government-to-citizen (G2C) services were expected to cut<br />

out information middle-men and let users interact directly with<br />

their government. 1 It soon became clear, however, that users were<br />

not getting the type of instruction or information they needed from<br />

this arrangement. Government agencies were not soliciting user<br />

input in developing services, feedback was not a priority,<br />

evaluation data was almost non-existent, and users identified a<br />

variety of access issues that kept them from fully engaging with<br />

the services [9]. Increasingly, public librarians found that they<br />

were serving as the intermediary for the government in this<br />

continuum of services. In addition, users were communicating<br />

their frustrations, concerns, and suggestions about government<br />

information to these librarians, instead of the government directly.<br />

Rather than the government speaking directly to users, it became<br />

the librarian’s job to disseminate information, assist patrons with<br />

form completion, or engage in other aspects of e-government,<br />

often without the guidance of the government agencies from<br />

which it originated . Because of the existence of multiple<br />

participants in the flow of government information, a<br />

straightforward pathway of e-government does not exist. This<br />

paper focuses on two main research questions: 1) what are the<br />

pathways of e-government information and 2) what implications<br />

do these pathways have on e-government services and systems?<br />

Based on a multi-method approach using informal interviews, site<br />

visits, and survey data, the researchers propose a model<br />

representing a circular flow of information with e-government<br />

information traveling from agency to librarian to user, from user<br />

back up to agency, and from agency to user to librarian. This<br />

model has implications for the design of e-government services<br />

and the dissemination of information. Findings made in<br />

connection with the development of this model also serve to<br />

inform the development of a Web resource to assist librarians<br />

1 It is important to note that the term “Government-to-Citizen” is<br />

one historically used in e-government research. In this paper,<br />

outside of direct references to prior research, we have used the<br />

term “user” instead, acknowledging the individuals in need of egovernment<br />

information who may not have citizen status. The<br />

term “user” thus refers to individuals who are either actively<br />

accessing e-government information or are attempting to do so.


serving as intermediaries for e-government services and resources.<br />

The Web resource, funded by the Institute of Museum and Library<br />

Services, is being developed by the authors in conjunction with<br />

the American Library Association, as well as various library and<br />

government agency partners, and aims to create an e-government<br />

web resource for librarians dealing with tax and immigration<br />

issues.<br />

2. LITERATURE REVIEW<br />

2.1 E-Government: A history<br />

Since the advent of the World Wide Web in the mid-1990s, there<br />

has been a surge in the use of e-government by federal, state, and<br />

local governments to deliver information, communication, and<br />

services to users, with much of this content and services now<br />

available only online. As e-government has matured into a<br />

dynamic socio-technical system encompassing issues of<br />

governance, societal trends, technological change, information<br />

management, interaction, and human factors [15], G2C, or<br />

government-to-citizen service, has become one of the central uses<br />

of e-government. Democratic governance relies on access to the<br />

government by citizens [34], resulting in G2C information,<br />

communication, and services holding significant potential not<br />

only for facilitating interactions, but also for promoting<br />

democracy.<br />

For the average user, e-government access now stands as the<br />

primary means of getting government information and interacting<br />

with the government [11]. G2C e-government services are used as<br />

a means to address a wide range of user needs – unemployment<br />

benefits, voter registration, license application and renewal, tax<br />

payments, enrollment of children in school, immigration and<br />

citizenship, and many similarly important functions [13], [18],<br />

[20]. Just from this broad overview of e-government topics, it is<br />

clear that this information intersects with almost every facet of<br />

everyday life. As such, e-government information does not always<br />

flow directly from the source to the user. As shown in Figure 1<br />

(below), other stakeholders have key roles and responsibilities in<br />

the e-government process.<br />

Figure 1. Stakeholders in E-Government Dissemination –<br />

Roles and Responsibilities<br />

Government<br />

Entities<br />

Non-<br />

Governmental<br />

Organizations<br />

Libraries<br />

Businesses<br />

- Create content<br />

- Mandate use (e.g. Electronic Data<br />

Procurement processes)<br />

- Disseminate information via electronic<br />

media (e.g. websites, social media, etc)<br />

- Disseminate information<br />

- Analyze information and re-release for<br />

community needs<br />

- Fund programs that tailor e-government<br />

content to needs of users<br />

- Provide information for community<br />

- Offer personalized help to patrons<br />

- Provide access to technology<br />

- Possess knowledge of patrons that can be<br />

used to provide feedback to content creators<br />

- Provide knowledge of user base (based on<br />

consumer information)<br />

- Provide funding and other resources for<br />

projects that can benefit the community<br />

- Provide feedback to content creators about<br />

88<br />

Users effectiveness of dissemination<br />

- Possess the needs that determine strategies<br />

of content developers and providers<br />

This paper largely focuses on three of these stakeholders – the<br />

government agencies that produce e-government information,<br />

libraries that act as intermediaries, and users. That said, NGOs<br />

and businesses often directly impact the type of services libraries<br />

can offer, the way the information gets disseminated to users, and<br />

the opportunities users have for resources to help them decipher<br />

the government information. The extent of these impacts is an<br />

issue worth exploring through future research.<br />

The growing involvement of intermediaries in G2C government<br />

coincides with users’ increased need for e-government access. In<br />

2003, a CRS report identified G2C government as “initiatives<br />

[that] are designed to facilitate citizen interaction with<br />

government,” [34, pp. 8]. Many agencies now view e-government<br />

as their primary method for interacting with members of the<br />

public [4], [5], [16], [37]. The recent explosion of usage of social<br />

media platforms – such as Facebook, Twitter, and Tumblr - has<br />

led many government agencies to view social media as a core<br />

aspect of G2C services [6], [10], [29]. Not surprisingly, G2C<br />

services are central to both of the primary reasons typically<br />

presented in favor of continuing to expand e-government: 1)<br />

engaging citizenry in government in a user-centered manner, and<br />

2) developing quality government services and delivery systems<br />

that are efficient and effective [4].<br />

G2C services, however, are not always designed to make life<br />

simple for the users. In fact, from the agency perspective, the<br />

focus has often been on making the interactions easier for the<br />

agency, not the user [26]. A clear example of this situation was<br />

demonstrated by the Medicare Part D enrollment program in<br />

2006, which required senior citizens – a group with large gaps in<br />

usage of the Internet – to examine the different plans and sign up<br />

for one online [24].<br />

One marker of early G2C literature was that accessing<br />

government information online was deemed voluntary: “citizen<br />

use of a Web-based state government service is an individual<br />

choice and is not likely to be mandated” [14, pp. 3]. This soon<br />

became an outdated assumption, as more government forms and<br />

services became available exclusively online. The need to use egovernment<br />

presents challenges for many members of the public<br />

because they lack the technical skills to use the online functions,<br />

lack sufficient Internet access, or are uncomfortable engaging in<br />

online interactions without guidance [7], [8]. Many of these users<br />

must find an outlet to engage e-government to accomplish<br />

necessary educational, economic, social, and political functions.<br />

The focus on agency savings over access is illuminated by the<br />

emphasis on e-government when so many users still lack Internet<br />

access or sufficient Internet access to interact with e-government.<br />

In many locations in the United States, a lack of available<br />

computers, low levels of Internet access, and low levels of basic<br />

telecommunications infrastructure, are barriers to access. Many<br />

households lack Internet access and many with Internet access<br />

lack broadband speed access, which is necessary for most online<br />

activities, including certain types of social media. Nearly 40% of<br />

homes lack Internet access and many of those families have no<br />

interest in or ability to get Internet access [21]. Among homes<br />

with Internet access, 45% lack broadband access, while 10%


continue to rely on dial-up Internet service [22]. In rural areas,<br />

only 38% of homes have broadband access [22].<br />

Lack of access to technology is not the only barrier to G2C egovernment.<br />

Even if the technological infrastructure is in place, egovernment<br />

services are often limited by difficulties in searching<br />

for and locating the desired information, a general lack of<br />

familiarity with the structure of government, lack of education<br />

about the value of e-government, language barriers, and attitudes<br />

toward technology and government among many users [32], [33].<br />

While many members of the public still struggle with G2C<br />

information and services, government agencies have come to<br />

focus on it as a means of cost savings rather than increasing<br />

access for members of the public [26], [28]. Government agencies<br />

have shifted responsibility to the users for innumerable functions<br />

that the agencies had to handle before e-government– registering<br />

students in school, paying fees and taxes, scheduling<br />

appointments, taking driver’s education programs, applying for<br />

permits, finding court <strong>proceedings</strong>, submitting local zoning board<br />

information, requesting planning permits, searching property and<br />

assessor databases, and completing numerous other federal, state,<br />

and local government functions online.<br />

2.2 The Role of Libraries in E-Government<br />

Paralleling the rise of the Web and e-government, public libraries<br />

quickly became providers of free public access to the Internet,<br />

with virtually every public library already offering public access<br />

by the year 2002 [2], [28].Throughout the intervening years, the<br />

public library has served as the primary – or only available –<br />

access point for G2C access, training, and assistance in<br />

communities across the country [1]. In some sense, serving as<br />

guarantor of G2C access and training is a natural extension of the<br />

established social roles of the public library. “The public library is<br />

one place that is culturally ingrained as a trusted source of free<br />

and open information access and exchange” [30, pp. 487]. Given<br />

the complexities of many G2C services, “even if Americans had<br />

all the hardware they needed to access every bit of government<br />

information they required, many would still need the help of<br />

skilled librarians whose job it is to be familiar with multiple<br />

systems of access to government systems” [19, pp. 124].<br />

Several years ago, it became commonplace for government<br />

agencies to direct users with questions about their websites to the<br />

local public library [8], [7], [13]. Now, many federal, state, and<br />

local government agencies continue to rely upon public libraries<br />

to provide residents with access to and guidance in using G2C egovernment,<br />

including the completion of applications and forms<br />

[8], [7], [25], [27]. For example, the Florida Department of<br />

Children and Families reduced the number of case workers and<br />

assistance providers by over 3,000 positions due to its<br />

implementation of the AccessFlorida online application system,<br />

resulting in near complete lack of available agency staff from<br />

which users can seek assistance [18].<br />

Another example of this shift in information responsibility from<br />

the agency to intermediaries is information provision during the<br />

2005 Atlantic hurricane season. According to Jaeger et al,<br />

librarians reported unprecedented numbers of patrons during the<br />

emergencies. One librarian said, “We have a large number of<br />

displaced people who are coming to rely upon the library in ways<br />

many of them never expected. I’ve had so many people tell me<br />

that they had never been to a library before they had to find<br />

89<br />

someplace to file a FEMA application or insurance claim. Many<br />

of these people knew nothing about computers and would have<br />

been totally lost without the staff’s help.…” [31, pp. 205]. What<br />

would ordinarily have been the job of government-sponsored<br />

disaster relief agencies became the province of the intermediary.<br />

These examples show that librarians operate as an important<br />

stakeholder in the delivery of e-government services. According<br />

to the 2011-2012, Public Libraries Funding & Technology Access<br />

Study (PLFTAS), 96.6 percent of public library outlets reported<br />

that library staff members assist library patrons in applying for egovernment<br />

services. Moreover, 91.8 percent reported that staff<br />

members assist patrons in understanding how to access and use egovernment<br />

websites. The following figure illustrates additional<br />

roles that public libraries serve in connecting patrons with egovernment<br />

services [3]. 2<br />

Figure 2: E-Government Roles & Services of Public Libraries<br />

E-Government Role or Service Percentage<br />

Staff provide assistance to patrons applying for<br />

or accessing e-government services<br />

Staff provide as needed assistance to patrons for<br />

understanding how to access and use egovernment<br />

Websites<br />

Staff provide assistance to patrons for<br />

understanding government programs and services<br />

Staff provide assistance to patrons for completing<br />

government forms<br />

The library developed guides, tip sheets, or other<br />

tools to help patrons use e-government Websites<br />

and services<br />

The library offers training classes regarding the<br />

use of government Websites, understanding<br />

government programs, and completing electronic<br />

forms<br />

The library offered translation services for forms<br />

and services in other languages<br />

The library partnered with government agencies,<br />

non-profit organizations, and others to provide egovernment<br />

services<br />

The library worked with government agencies<br />

(local, state, or federal) to help agencies improve<br />

their Websites and/or e-government services<br />

The library has at least one staff member with<br />

significant knowledge and skills in provision of<br />

e- government services<br />

96.6%<br />

(n=12,607)<br />

91.8%<br />

(n=11,976)<br />

50.0%<br />

(n=6,528)<br />

70.7%<br />

(n=9,230)<br />

20.6%<br />

(n=2,686)<br />

11.2%<br />

(n=1,457)<br />

7.8%<br />

(n=1,020)<br />

30.9%<br />

(n=4,017)<br />

11.0%<br />

(n=1,438)<br />

23.6%<br />

2 Throughout this paper, the term “patron” is used when users are<br />

either in the library, using library resources, or are the target of<br />

library programs.


(n=3,078)<br />

In summary, the various criticisms of G2C services, centered<br />

mainly on the access issues described above have prompted<br />

librarians to function as intermediaries in the G2C information<br />

space.<br />

Notwithstanding public librarians’ acceptance of greater<br />

responsibility along this information continuum, there are obvious<br />

problems with this developing intermediary role. While<br />

government agencies indicate that relying on libraries for G2C egovernment<br />

access and assistance allows the agencies to focus on<br />

other issues [7],[8], [17], the provision of G2C access assistance<br />

by public libraries creates a range of service, funding, technology,<br />

and political challenges for the libraries [12], [28].<br />

One problem is the fact that librarians are largely unrecognized in<br />

any official capacity by the government agencies that encourage<br />

their participation. Underlying this lack of recognition is the way<br />

in which public libraries in the United States are funded.<br />

Historically, 90% of public libraries are independent departments<br />

within their local governments [36]. Accordingly, although<br />

libraries receive state funding, as well as federal money through<br />

the Library Services and Technology Act and the<br />

Telecommunications Act of 1996, the majority of their funding<br />

comes from local government agencies. This trend has become<br />

more pronounced in recent years due to the ongoing economic<br />

downturn, as local governments have struggled to fill the gap<br />

between shrinking state budgets and increased demand for library<br />

services [3] The end result is that funding for public libraries<br />

comes principally from sources other than those federal and/or<br />

state agencies that are shifting much of their service role to<br />

libraries, raising the question of whether libraries have been<br />

burdened with an unfunded mandate [7]<br />

In addition, the expectation that librarians will understand the egovernment<br />

systems and services is often unfounded. While<br />

librarians are certainly capable of figuring out complicated<br />

information, time restraints, concerns over legal liability, and the<br />

constantly changing nature of government information makes the<br />

intermediary role difficult. The lack of advance notice for many<br />

new government information initiatives is one of several reasons<br />

why librarians often feel as though they are left out of the<br />

information loop. For example, a historical instance of this is the<br />

closure of a Virginia unemployment office. In this particular<br />

instance, a mere sign was placed on the door overnight informing<br />

users of the office’s closure. Employees were notified at the same<br />

time, leaving users with no information about the closure. Local<br />

librarians, who were equally surprised by this sudden<br />

development, had no choice but to manage an influx of<br />

unemployed individuals, confused about this loss in services.<br />

Librarians were forced into an unenviable position, in which they<br />

had to provide assistance, despite having no prior knowledge of<br />

the event that precipitated this influx. This is but one example of<br />

an agency decision having unintended consequences on other<br />

stakeholders in the information continuum.<br />

These problems have only grown in importance with the increase<br />

in the number of services being shifted from agency to librarian.<br />

While the E-government Act of 2002 included language on the<br />

need for federal government assessment of the impacts of the law<br />

on public libraries and other social institutions, such studies were<br />

never funded or conducted. Thus, the need for a reassessment of<br />

90<br />

the pathways of e-government information is particularly<br />

important as further policy and funding decisions are made.<br />

3. METHODOLOGY<br />

The findings presented in this paper are based upon three<br />

interrelated data collection efforts that informed the creation of an<br />

e-government Web resource (LibEGov), initially focused on the<br />

areas of immigration and taxation. The 2011-2012 Public Library<br />

Funding & Technology Access Survey, funded by the American<br />

Library Association and the Bill & Melinda Gates Foundation, is<br />

the 14 th in a series of public library Internet access surveys<br />

conducted since 1994. The Web-based survey was conducted<br />

between September 2011 and November 2011, yielding 7,260<br />

responses, a response rate of 83.1%. The survey drew a<br />

proportionate-to-size stratified random sample that considered the<br />

metropolitan status of the library (i.e., urban, suburban, and rural).<br />

More specific methodology issues regarding the survey are<br />

available at http://www.plinternetusrvey.org.<br />

Data were also collected through site visits to seven public<br />

libraries in five states (Connecticut, Florida, Georgia, Maryland,<br />

and Texas). The site visits included informal interviews with state<br />

library staff, government officials, and community organization<br />

leaders, all of which occurred between April 2011 and October<br />

2011. For this component of the study, the authors sought to<br />

include geographically dispersed public libraries that serve a<br />

diverse set of communities (e.g., rural, suburban, and urban; high<br />

immigrant concentrations; underserved populations; high<br />

poverty). Library characteristics, such as size, number of staff,<br />

and known e-government partnerships, also factored into the<br />

selection process. In advance of the site visits, research was<br />

undertaken to identify existing e-government collaborative<br />

approaches, leading to a preliminary assessment of “best<br />

practices” that guided the development of LibEGov.<br />

The aggregate and generalizable data regarding public library egovernment<br />

service provision and challenges generated from the<br />

survey, together with the on-the-ground assessments of library<br />

and government collaborative efforts offered by the site visits and<br />

interviews, provide rich insight into the context in which libraries<br />

are currently providing e-government services. Through this<br />

multi-method data collection strategy, the authors were able to<br />

explore the pathways of e-government information. By<br />

determining what e-government service roles public libraries<br />

provide to their communities, what partnerships libraries have<br />

formed with government agencies in the provision of egovernment<br />

services, what the success factors and/or barriers are<br />

to forming these partnerships, and what challenges libraries face<br />

by serving as e-government providers, we explore the<br />

implications these information pathways have on e-government<br />

services and systems.<br />

In addressing each of these questions, the authors identified key<br />

elements to be included in LibEGov, including: 1) detailed<br />

guidance on how to conduct a community needs assessment; 2) a<br />

tool to help librarians better understand complex immigration<br />

processes; 3) strategies for identifying and reaching out to<br />

potential partners; and 4) a community forum that encourages<br />

users to share their e-government experiences with one another.<br />

After conclusion of the data collection efforts in October 2011,<br />

attention shifted to the development of the Web resource’s site<br />

design and content. Usability testing began in April 2012 and, at


this time the authors continue to work on refining both the design<br />

and content of LibEGov. In anticipation of a wide release of the<br />

resource during the summer of 2013, the next phase of the project<br />

will include field testing of LibEGov through workshops at which<br />

additional feedback regarding content and design will be solicited.<br />

4. FINDINGS<br />

Through the survey data, interviews, and site visits that informed<br />

the development of LibEGov, researchers found multiple<br />

pathways of information. This flow could be understood as a<br />

circular continuum of information, with knowledge flowing from<br />

all stakeholders in the stream. Rather than e-government delivery<br />

operating from one central source (the government) and traveling<br />

directly to the user, it became clear that government agencies,<br />

intermediaries (in this case, libraries), and users all source<br />

information and thus are all responsible for the diffusion of<br />

information to each point in the continuum. Below, we outline<br />

each of the six directionalities in which information is<br />

disseminated, including examples from the surveys, interviews,<br />

and site visits to provide more concrete evidence of this<br />

multiplicity of information pathways. Though this discussion<br />

largely focuses on the source of the e-government information, it<br />

should be inferred that the needs of the information targets<br />

directly influence the sources, emphasizing the reciprocal nature<br />

of the information flow.<br />

4.1 Government to Intermediary to User<br />

Several government-library partnerships were discovered through<br />

site visits and interviews. Many of these partnerships are building<br />

on the idea that agencies have begun to recognize the intermediary<br />

as a powerful ally in e-government information dissemination. For<br />

example, the U.S. Citizenship and Immigration Services (USCIS)<br />

has partnered with The American Place at Hartford Public Library<br />

in Connecticut to provide citizenship services directly at the<br />

library, including a swearing in ceremony for new citizens. The<br />

library provides links to government resources on its website as a<br />

companion to its services on English language learning,<br />

citizenship facts, and information for immigrants new to the area.<br />

USCIS’s effective use of the library’s extensive in-house<br />

resources and capabilities aptly demonstrates how information can<br />

flow from government to intermediary to user.<br />

4.2 User to Intermediary to Government<br />

Often the user needs an intermediary for practical reasons;<br />

without the computers and broadband access provided by a<br />

library, for example, the user would have no means to get to the<br />

information provided on government websites. Given that the<br />

public library is often the only access point for free and reliable<br />

Internet access, an intermediary is necessary to find the<br />

information needed. According to the 2011-2012 PLFTAS data,<br />

62.1 percent of public library outlets were the only provider of<br />

free public Internet and free public computer access in their<br />

communities. More dramatically, 70.3 percent of rural libraries<br />

outlets reported to be the only free provider in their communities<br />

[3].<br />

Even for users who do have Internet access available at home,<br />

government information is often confusing and/or intimidating.<br />

Thus users come to the library for assistance; studies have found<br />

that the library "is a trusted community-based entity to which<br />

individuals turn for help in their online activities—even if they<br />

91<br />

have computers and Internet access at home or elsewhere” [8].<br />

Librarians cite helping patrons with e-government issues as one of<br />

their most oft requested tasks, with 96.6 percent of public library<br />

outlets reporting assisting patrons with applying for or accessing<br />

e-government services. This represents an increase of 11.5 percent<br />

from 2010-2011 [3].<br />

4.3 Intermediary to Government to User<br />

Often the intermediary wishes to inform the government of<br />

missing information or with access problems a user is having with<br />

a government site. For example, in interviews, librarians often<br />

remarked that they anticipated problems based on a lack of<br />

information provided by the government, such as in the case of<br />

the change from paper tax forms to online forms. Librarians<br />

expected an influx of patrons confused about this switch and<br />

sought to inform the government of the potential ramifications of<br />

this decision. This particular information pathway is often<br />

interrupted by the lack of available communication with the<br />

government agency directly, a problem that disrupts the<br />

effectiveness of this communication continuum.<br />

4.4 User to Government to Intermediary<br />

Effective August 1, 2011, Florida law now requires<br />

unemployment claims to be filed over the Internet. During an<br />

interview that took place shortly after this change occurred,<br />

officials from the Florida Department of State, Division of Library<br />

and Information Services indicated that the state workforce<br />

agency was specifically instructing individuals with no access to a<br />

computer or the Internet to go to the public library to complete<br />

their applications. In this situation, users seeking, receiving, or<br />

applying for continued unemployment benefits needed to: 1) take<br />

an aptitude test to determine skills and appropriate employment<br />

skills; 2) reapply for unemployment benefits; and 3) demonstrate<br />

employment seeking efforts. As such, the user had to report to the<br />

state workforce agency a variety of information, which then<br />

flowed to libraries to support a range of employment-related<br />

information.<br />

4.5 Intermediary to User to Government<br />

In this information flow, the intermediary packages information in<br />

way that makes it more accessible to users, therefore enabling<br />

them to engage in more effective interactions with the<br />

government. E-government websites that are developed and<br />

maintained by libraries are one way to facilitate this flow. The<br />

Cobb County Public Library, for example, has recently launched<br />

an e-government website that presents a wide range of resources,<br />

organized by topics focused on common e-government<br />

information needs (e.g., employment, legal information and vital<br />

records). Although much of the information presented through<br />

this site originates from government agencies, the library is the<br />

entity disseminating this information so that users can use it in<br />

their direct interactions with the government.<br />

4.6 Government to User to Intermediary<br />

This particular information flow was seen during the site visits in<br />

connection with a presentation given by a USCIS officer at a<br />

public library branch. As part of a semi-structured presentation<br />

directed to patrons of the library, the representative offered<br />

multiple opportunities for questions from the attendees. Queries<br />

ranged from the mundane (can I apply for citizenship) to


complicated (stories of relatives with criminal backgrounds who<br />

wanted to become citizens), but all were particularly well-suited<br />

for the USCIS representative to answer. A public librarian<br />

attended the Q&A, gathering materials from the representative in<br />

order to have additional resources on hand for patrons who could<br />

not come to the session. The intermediary (i.e., the librarian) was<br />

able to gather information from not only the government<br />

representative, but also the patrons, in order to improve services.<br />

5. DISCUSSION<br />

These findings have important implications on the design of egovernment<br />

policies and systems. Departing from the traditional<br />

view of e-government as a direct government-to-citizen<br />

communication model and incorporating the multiple means of<br />

knowledge transfer between users, the government, and<br />

information intermediaries, such as librarians, necessitates a shift<br />

in the way that government agencies produce and disseminate<br />

information. There are five main areas in which government<br />

agencies need to reexamine their services:<br />

1) Involvement of intermediaries in conversations regarding<br />

the roll-out and implementation of new e-government<br />

services;<br />

2) Government notification of releases and changes in<br />

service through relevant information channels with time<br />

for the intermediaries to prepare proper assistance;<br />

3) Provision of funding for public libraries and other<br />

intermediaries to assist in the proper flow of egovernment<br />

information;<br />

4) Response to feedback from users in terms of egovernment<br />

services; and<br />

5) Clarity for intermediaries of their roles and<br />

responsibilities, whether they are liable for mistakes, and<br />

when professionals should be recommended<br />

The first two points are relatively straightforward. In the<br />

interviews and site visits, a concept that kept coming up was the<br />

fact that librarians often felt blind-sided by agency decisions on<br />

information dissemination and changes in policy. One example of<br />

note that came to light during the interviews was the delayed<br />

dissemination of IRS forms during the 2011 tax season. Although<br />

the IRS did not create the delay, it contributed to a difficult<br />

situation by failing to communicate this development to the<br />

libraries. The end result was that librarians resorted to using<br />

handwritten signs and notes to inform patrons. Another example<br />

raised during the site visits regards affordable housing. Each year,<br />

there is a window for applying for housing vouchers (known as<br />

Section 8 vouchers provided by the Housing and Urban<br />

Development). These windows are administered by the local<br />

public housing agencies, which often do not communicate with<br />

libraries about the upcoming window. Section 8 housing requires<br />

the completion of a range of forms, as well as a process for<br />

determining eligibility. Those seeking housing vouchers often end<br />

up in the library seeking assistance locating and completing the<br />

forms, as well as determining eligibility and information<br />

regarding application submission.<br />

The third point is also fairly intuitive. Libraries have begun to<br />

fulfill the role of customer service operators for government<br />

agencies. With this increased responsibility should come<br />

increased funding. According to the 2011-2012 PLFTAS data,<br />

92<br />

adequate staffing was the most common challenge cited in helping<br />

patrons meet their e-government needs with 44.9 percent of public<br />

library outlets reporting this challenge to be important or most<br />

important [3].<br />

Government agencies also need to provide opportunities for users<br />

to give feedback on e-government services. As early as 2002,<br />

researchers were recognizing that agencies were not adequately<br />

providing opportunities for user input; according to one 2004<br />

study, 90% of local government agencies answered no to the<br />

question “Has your local government conducted a citizen survey<br />

to determine what online services residents and businesses want?”<br />

[23]. Nearly ten years later, the evaluation standards are not much<br />

improved. Agencies would be well served to offer not only direct<br />

online communication opportunities for user feedback (and the<br />

accompanying staff to answer such communication), but also<br />

formal methods of evaluation to ensure that user needs are being<br />

met. The distinction between information as an entity and the<br />

service of information provision is not as clear cut as one might<br />

think. The way the information is developed matters to the way<br />

the public can use it.<br />

The fifth improvement, clarity for intermediaries on their role, is a<br />

task both agencies and library supervisors must address. Though<br />

librarians are taking on the intermediary role in high percentages,<br />

they also remark that they are often unsure of where their roles<br />

should begin and end. In terms of tax services, for example, most<br />

are uncomfortable with any level of service beyond providing<br />

access to forms, for fear of legal liability or intrusion on patrons’<br />

privacies. Agencies should support library supervisors by<br />

determining guidelines for librarians, as well as by assisting<br />

librarians with information queries directly.<br />

The findings from this study have also informed the LibeGov web<br />

resource, a project that hopes to address many of the<br />

improvements listed above. Through the identification of the<br />

multiplicity of information channels in the flow of e-government<br />

information, researchers and developers on the project have<br />

observed the necessity of gaining input from all participants in<br />

providing a source for government resources. There are several<br />

ways that the developers have taken stakeholders and these<br />

possible improvements of service into account. These include:<br />

1) Adding a forum to the site that encourages participation<br />

from both librarians (intermediaries) and government<br />

agency representatives;<br />

2) Soliciting stakeholder input at all levels of web resource<br />

development, achieved by researcher-led meetings with<br />

agencies and public libraries at the beginning of the<br />

project and continued meetings with stakeholders as the<br />

project continues;<br />

3) Conducting usability testing with public library partners<br />

that will shape the second and future iterations of the<br />

web resource; and<br />

4) Providing ample opportunities for feedback in all stages<br />

of development through a contact form provided through<br />

the web resource as well as ongoing communications<br />

among a network of interested parties through a listserv<br />

developed by members of the project team.<br />

By acknowledging the pathways of e-government information<br />

transfer, the model of a circular continuum of service has been<br />

applied to a practical e-government system. In a similar vein,


government agencies should consider all potential information<br />

points when designing websites and other e-government<br />

resources.<br />

6. CONCLUSION<br />

The findings from this study offer an overview of the continuum<br />

of information between users, libraries (intermediaries), and the<br />

government. The major outcomes of the study show that there are<br />

improvements that agencies can make to their current strategies of<br />

information dissemination, as well as ways that libraries and their<br />

patrons can better navigate the often confusing waters of egovernment<br />

information.<br />

Finally, the model provides a conceptual framework to guide the<br />

web resource currently under development by the authors and<br />

their partners, the primary purpose of which is to help libraries<br />

and agencies better support one another in this continuum. The<br />

model also provides direction for other stakeholders interested in<br />

building better information systems.<br />

There are several directions in which this research could go in<br />

continuing to clarify the e-government landscape. While it is<br />

obvious that there are multiple ways that information flows from<br />

stakeholder to stakeholder, the optimum way that this information<br />

should travel is an interesting problem that has still not been<br />

conclusively studied. Does the fact that the information flow is<br />

top-down, bottom-up, and circular in nature have consequences<br />

for the current method of e-government technical information<br />

transmission?<br />

In addition, although government agencies have begun to consider<br />

issues of access, these multiple pathways of information make the<br />

need to keep in mind the access points for users all the more<br />

important. For example, public libraries provide a bevy of<br />

technology training classes, and the PLFTAS data shows that the<br />

more general technology classes are the most prevalent.<br />

According to the latest data, 87.0 percent of public library outlets<br />

offer general computer skills training classes (e.g., how to use a<br />

mouse, keyboard, printer), and 86.5 percent offer general Internet<br />

use classes (e.g. set up e-mail, Web browsing) [3]. How the<br />

different pathways of information flow affects and is affected by<br />

these prerequisites for e-government information retrieval is<br />

necessary for building an information flow that gets to all users.<br />

Future research should ensure that all stakeholders are addressed<br />

and that the multiple ways that information is directed from user<br />

to intermediary to agency are considered.<br />

7. REFERENCES<br />

[1] Bertot, J. C. Public access technologies in public libraries:<br />

Impacts and implications. Information Technology &<br />

Libraries, 28, 2 (2009), 84-95.<br />

[2] Bertot, J. C. Public libraries and the Internet: A retrospective,<br />

challenges, and issues moving forward. In J. C. Bertot, P. T.<br />

Jaeger, & C. R. McClure (Eds.), Public libraries and the<br />

Internet: Roles, perspectives, and implications. Libraries<br />

Unlimited, Westport, CT, 2011, 15-35.<br />

[3] Bertot, et al. Public Libraries and the Internet 2012: Study<br />

Results and Findings. Information Policy & Access Center,<br />

University of Maryland, College of Information Studies,<br />

2012, forthcoming.<br />

93<br />

[4] Bertot, J. C., & Jaeger, P. T. The e-government paradox:<br />

Better customer service doesn’t necessarily cost less.<br />

Government Information Quarterly, 25 (2008), 149-154.<br />

[5] Bertot, J. C., & Jaeger, P. T. User-centered e-government:<br />

Challenges and benefits for government Web sites.<br />

Government Information Quarterly, 23 (2006), 163-168.<br />

[6] Bertot, J. C., Jaeger, P. T., & Hansen, D. The impact of<br />

polices on government social media usage: Issues,<br />

challenges, and recommendations. Government Information<br />

Quarterly, 29 (2012), 30-40.<br />

[7] Bertot, J. C., Jaeger, P. T., Langa, L. A., & McClure, C. R.<br />

Drafted: I want you to deliver e-government. Library<br />

Journal, 131, 13 (2006), 34-39.<br />

[8] Bertot, J. C., Jaeger, P. T., Langa, L. A., & McClure, C. R.<br />

Public access computing and Internet access in public<br />

libraries: The role of public libraries in e-government and<br />

emergency situations. First Monday, 11, 9 (2006).<br />

[9] Bertot, J.C., Jaeger, P.T., & McClure, C.R. Citizen-centered<br />

e-government services: Benefits, costs, and research needs.<br />

In The Proceedings of the 9th Annual International Digital<br />

Government Research Conference (Montreal, Canada, May<br />

18-21, 2008). ACM Press, New York, NY, 2008, 137-142.<br />

[10] Bertot, J. C., Jaeger, P. T., Munson, S., & Glaisyer, T.<br />

Engaging the public in open government: The policy and<br />

government application of social media technology for<br />

government transparency. IEEE Computer, 43, 11 (2010),<br />

53-59.<br />

[11] Bertot, J. C., Jaeger, P. T., Shuler, J. A., Simmons, S. N., &<br />

Grimes, J. M. Reconciling government documents and egovernment:<br />

Government information in policy,<br />

librarianship, and education. Government Information<br />

Quarterly, 26 (2009), 433-436.<br />

[12] Bertot, J. C., & McClure, C. R. Assessing sufficiency and<br />

quality of bandwidth for public libraries. Information<br />

Technology and Libraries, 26, 1 (2007), 14-22.<br />

[13] Bertot, J. C., McClure, C. R., & Jaeger, P. T. The impacts of<br />

free public Internet access on public library patrons and<br />

communities. Library Quarterly, 78 (2008), 285-301.<br />

[14] Carter, L. & Belanger, F. Citizen adoption of electronic<br />

government initiatives. Proceedings of the 37th Hawaii<br />

International Conference on System Sciences (HICSS ’04)<br />

(Big Island, Hawaii, January 5-8, 2004). IEEE Computer<br />

Society, Washington, DC, 2004.<br />

[15] Dawes, S. S. Governance in the digital age: A research and<br />

action framework for an uncertain future. Government<br />

Information Quarterly, 26 (2009), 257-264.<br />

[16] Ebbers, W. E., Pieterson, W. J., & Noordman, H. N.<br />

Electronic government: Rethinking channel management<br />

strategies. Government Information Quarterly, 25 (2008),<br />

181-201.<br />

[17] Fisher, K. E., Becker, S., & Crandall, M. E-government<br />

service use and impact through public libraries: Preliminary<br />

findings from a national study of public access computing in<br />

public libraries. Proceedings of the 43rd Hawaii<br />

International Conference on System Sciences (HICSS ’10)


(Poipu, Kauai, Hawaii , January 5-8, 2010). IEEE Computer<br />

Society, Washington, DC, 2010, 1-10.<br />

[18] Gibson, A. N., Bertot, J. C., & McClure, C. R. (2009).<br />

Emerging roles of public libraries as e-government providers.<br />

Proceedings of the 42 nd Hawaii International Conference on<br />

Systems Sciences (HICSS ’09) (Waikoloa, Big Island,<br />

Hawaii, January 5-8, 2009). IEEE Computer Society,<br />

Washington, DC, 2009.<br />

[19] Heanue, A. (2001). In support of democracy: The library role<br />

in public access to government information. In Kranich, N.<br />

(Ed.), Libraries & Democracy: The Cornerstones of Liberty.<br />

American Library Association, Chicago, IL, 2001, 121-128.<br />

[20] Holt, L. E., & Holt, G. E. Public library services for the<br />

poor: Doing all we can. ALA Editions, Chicago, IL, 2010.<br />

[21] Horrigan, J. B. Obama’s online opportunities II: If you build<br />

it, will they log on? Pew Internet and American Life Project.<br />

Washington, D.C., 2009.<br />

[22] Horrigan, J. B. Home broadband adoption 2008: Adoption<br />

stalls for low-income Americans even as many broadband<br />

users opt for premium services that give them more speed.<br />

Pew Internet and American Life Project, Washington, D.C.,<br />

2008.<br />

[23] International City/County Management Association.<br />

Electronic government 2004: Survey methodology. 2004.<br />

Available:<br />

http://icma.org/en/results/surveying/survey_research/survey_<br />

results<br />

[24] Jaeger, P. T. Building e-government into the Library &<br />

Information Science curriculum: The future of government<br />

information and services. Journal of Education for Library<br />

and Information Science, 49 (2008), 167-179.<br />

[25] Jaeger, P. T. Public libraries and local e-government. In C.<br />

G. Reddick (Ed.), Handbook on research on strategies for<br />

local e-government adoption and implementation:<br />

Comparative studies. IGI Global, Hershey, PA, 2009, 647-<br />

660.<br />

[26] Jaeger, P. T., & Bertot, J. C. Designing, implementing, and<br />

evaluating user-centered and citizen-centered e-government.<br />

International Journal of Electronic Government Research, 6,<br />

2 (2010) 1-17.<br />

[27] Jaeger, P. T., & Bertot, J. C. E-government education in<br />

public libraries: New service roles and expanding social<br />

94<br />

responsibilities. Journal of Education for Library and<br />

Information Science, 50 (2009), 40-50.<br />

[28] Jaeger, P. T., & Bertot, J. C. Responsibility rolls down:<br />

Public libraries and the social and policy obligations of<br />

ensuring access to e-government and government<br />

information. Public Library Quarterly, 30 (2011), 1-25.<br />

[29] Jaeger, P. T., Bertot, J. C., & Shilton, K. Information policy<br />

and social media: Framing government-citizen Web 2.0<br />

interactions. In C. G. Reddick & S. K. Aikins (Eds.), Web 2.0<br />

Technologies and Democratic Governance: Political, Policy<br />

and Management Implications. Springer, London, England,<br />

in press.<br />

[30] Jaeger, P. T., & Burnett, G. Information access and exchange<br />

among small worlds in a democratic society: The role of<br />

policy in redefining information behavior in the post-9/11<br />

United States. Library Quarterly, 75, 4 (2005), 464-495.<br />

[31] Jaeger, P.T., Langa, L.A., McClure, C.R., & Bertot, J.C. The<br />

2004 and 2005 gulf coast hurricanes: Evolving roles and<br />

lessons learned for public libraries in disaster preparedness<br />

and community services. Public Library Quarterly, 25, 3/4<br />

(2006), 199-214.<br />

[32] Jaeger, P. T., & Thompson, K. M. E-government around the<br />

world: Lessons, challenges, and new directions. Government<br />

Information Quarterly, 20, 4) (2003), 389-394.<br />

[33] Jaeger, P. T., & Thompson, K. M. Social information<br />

behavior and the democratic process: Information poverty,<br />

normative behavior, and electronic government in the United<br />

States. Library & Information Science Research, 26, 1<br />

(2004), 94-107.<br />

[34] Schudson, M. Why conversation is not the soul of<br />

democracy. Critical Studies in Mass Communication, 14<br />

(1997), 297-309.<br />

[35] Seifert, J.W. A primer on e-government: Sectors, stages,<br />

opportunities, and challenges of online governance. CRS<br />

Report for Congress, 2003. Available:<br />

http://www.fas.org/sgp/crs/RL31057.pdf<br />

[36] Shavit, D. (1986). The politics of public librarianship. New<br />

York : Greenwood<br />

[37] Streib, G., & Navarro, I. Citizen demand for interactive egovernment:<br />

The case of Georgia consumer services.<br />

American Review of Public Administration, 36 (2006), 288-<br />

300.


The critical success factors for websites for Chinese<br />

migrant farmer workers: a multi-case study<br />

Fang Wang<br />

Business School of Nankai University<br />

No. 94 Weijin Road, Nankai District<br />

Tianjin, China, 300071<br />

(86)22-23502800<br />

wangfangnk@nankai.edu.cn<br />

ABSTRACT<br />

This paper is to explore the critical success factors for the<br />

websites for Chinese migrant farmer workers. A theoretical<br />

framework was put forward according to the theories of<br />

usability, information architecture, webometrics and business<br />

model. A multi-case study on 10 websites was conducted for<br />

testifying 7 hypotheses. Business model and a few technical<br />

properties were found to be the critical factors that influence<br />

the effect and sustainable development of these websites. The<br />

originality of this paper is that it adopted a managerialtechnical<br />

perspective to explore the critical success factors of<br />

the MFW websites.<br />

Categories and Subject Descriptors<br />

H.3.5 [Online Information Services]: Web-based services<br />

General Terms<br />

Management, Measurement, Performance, Economics, Theory<br />

Keywords<br />

Special website, Website effect, Vulnerable groups, Chinese<br />

farmer workers, Multi-case study, Managerial-technical<br />

Perspective<br />

1. INTRODUCTION<br />

From the late 1980s, along with China’s industrialization and<br />

urbanization process, migrant farmer workers (MFWs, farmers<br />

who leave their home in rural areas and come to cities to hunt for<br />

jobs in various industries without hukou, a registered permanent<br />

residence, in cities where they work, and some of them have to<br />

migrate to different cities frequently as their jobs change) have<br />

become a new workforce who are playing critical roles in Chinese<br />

economic and social development [1]. According to the National<br />

Statistics Bureau, the number of Chinese farmer workers was<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

95<br />

Lihong Gu<br />

Business School of Nankai University<br />

No. 94 Weijin Road, Nankai District<br />

Tianjin, China, 300071<br />

(86)22-23502800<br />

gulihong1217@163.com<br />

229.78 million in 2009, and 145.33 million of them were away<br />

from their hometown villages, occupying 83% of the total Chinese<br />

floating population. Among the farmer workers who migrated<br />

from hometown villages to cities, 128 million had no Hukous in<br />

cities where they worked [2]. However, the 28th Statistics Report<br />

on China Internet Network Development shows that by June 2011<br />

the number of Chinese netizens had reached 485 million which<br />

occupied 34.3% of the total population, 390 million of them<br />

connected to Internet by family broad-band and 318 million by<br />

mobile phone, 33.6% (131 million) of the total netizens were rural<br />

residents [3], while the proportion of MFWs was only 3.5% by<br />

December 2010 [4]. Abovementioned data indicate that there<br />

exists a big digital divide between MFWs and other social groups<br />

although the total number of netizens in China continued to<br />

increase every year. Because of their fluidity and the restriction of<br />

Hukou, MFWs could neither equally share urban information<br />

infrastructure and resources with native citizens nor enjoy policies<br />

and projects of the "new socialist countryside" for rural residents.<br />

This plight makes them fall into a state of information welfare<br />

“loss” or “deprivation”, and in some way become a marginal<br />

group in information society.<br />

“Information welfare is an important part of social welfares” [5].<br />

The inferior positions in which MFWs have to stay concerning<br />

labor price, social security, public good enjoyment, cultural and<br />

recreation consumption are related with their weak information<br />

capabilities [ 6 ]. Their awkward positions in the process of<br />

informatization will lead them to a greater poverty in economic,<br />

political, social and cultural rights and interests according to<br />

Maslow's Hierarchy of Needs [7]. Under the impacts of present<br />

social structure, economic development and other factors, it's<br />

difficult for them to get necessary information [8]. In order to<br />

diminish the digital divide between MFWs and other social<br />

groups, “it is necessary to integrate and make full use of the<br />

information resources owned by the departments of police,<br />

statistics, population and family planning, to promote the<br />

construction of information networks among MFWs, and to<br />

realize information sharing between relevant departments in order<br />

to provide accurate and timely information for MFW management<br />

and services” [9].<br />

Informatization is essential to the realization of the orderly flow of<br />

MFWs [ 10 ]. Information service is especially promising in<br />

improving MFWs’ employment [11]; [12]. On the one hand,<br />

information services for MFWs can strengthen the communication<br />

between the government and the public [13]. On the other hand,<br />

solutions to MFWs’ information marginalization will help to build


an exit mechanism for them and promote labor transfer by<br />

improving their information capabilities and employability, and<br />

thus to diminish the gap between urban citizens and them and<br />

promote their social integration [ 14 ]. As a seminal work,<br />

Construct an Integrated Information Service System for Migrant<br />

Farmer Workers [15], the report of the National Informatization<br />

Expert Committee in 2005 put forward that China should establish<br />

an integrated information service system for MFWs.<br />

Websites are indispensable parts of an integrated information<br />

service system for MFWs. With the implication of “Village<br />

Connection” policy, the number of agriculture-related websites<br />

had reached nearly 20,000 by the end of 2010 in China [16].<br />

Current studies on these websites mainly include website<br />

construction [17]; [18], webmetrics [19], roles of websites played<br />

in rural informatization [20], existing problems e.g. duplicated<br />

and outdated information [21], limited functions and unguaranteed<br />

information authenticity [22], and low browse rate and inadequate<br />

brand building [23]. However, only several websites special for<br />

MFWs have emerged in recent few years. Among 20,000<br />

agriculture-related websites, they occupy only a minimal<br />

proportion but have great significance for MFWs. Moreover, we<br />

had not found any researches on the websites for Chinese MFWs<br />

by June 2011. How do these websites operate? What factors<br />

influence their survival and development? What difficulties are<br />

they faced with? In order to answer these questions, a holistic<br />

exploration is necessary and a multi-case study will be adopted to<br />

realize it.<br />

2. THEORETICAL FRAMEWORK<br />

There are a quantity of theories and methods for website study,<br />

such as usability [24], information architecture (IA), technology<br />

acceptance model (TAM) [25 ], webometrics, social network<br />

analysis (SNA), etc. Studies on usability in LIS and IS fields have<br />

increased dramatically in recent years and a variety of measure<br />

scales have been developed. Shackel advanced four dimensions of<br />

usability, effectiveness, learnability, flexibility and attitude [26].<br />

IA is thought as both a kind of art and a kind of technology on<br />

website building [27] and provides a set of technical aids to make<br />

a website more usable. Webometrics studies the quantitative<br />

aspects of the construction and use of information resources,<br />

structures and technologies on the Web drawing on bibliometric<br />

and informetric approaches [ 28 ]. Abovementioned theories<br />

examine websites from technical, managerial or social<br />

perspectives. Our study will focus on disclosing the effects of the<br />

MFW websites and the influences of some internal and external<br />

factors. This is a comprehensive problem related to managerial,<br />

technical and social issues. It is not enough to employ any single<br />

theory to guide a holistic exploration. Therefore, we select<br />

relevant constructs from present theories and combine them into a<br />

new theoretical framework under a managerial-technical<br />

perspective.<br />

Literatures show that some successful studies focus on complex<br />

aspects of a website rather than a single one. Welch and Pandey<br />

[29] compared different measures for the effect of government<br />

websites and found that except technology, political pressure,<br />

centralization, formalization, goal ambiguity, organizational<br />

culture, communication effect, red tape, complexity and size are<br />

all possible determinants of website effects. To avoid the<br />

shortcomings of a single perspective, Eschenfelder and Miller [30]<br />

established a socio-technical toolkit to measure the openness and<br />

accessibility of government information. Lee and Kozer [31]<br />

96<br />

constructed a model consisting of four major website quality<br />

factors, information quality, service quality, systems quality, and<br />

vendor-specific quality, to measure the effect of e-business<br />

website quality. These studies combined online characteristics of<br />

websites with offline factors and obtained satisfying results. In<br />

terms of this study, research problems could be given a more<br />

detailed examination under a holistic theoretical framework than<br />

under a single theoretical perspective. Out of this consideration, 5<br />

qualitative and quantitative constructs and 7 theoretical<br />

hypotheses are put forward as follows:<br />

2.1 Website Effect<br />

The main goal of the studied websites is to deliver information to<br />

MFWs. An effective website will attract more potential users to<br />

click and satisfy actual users’ information needs better. In this<br />

paper, website effect is taken as the dependent variable. Many<br />

constructs could be extracted to describe or measure website<br />

effect in usability researches. Nilsen [32] used ten usability<br />

heuristics related with user’s satisfaction for user interface design.<br />

Preece [33] adopted the user’s attitude as one of the factors in<br />

defining website usability. Success of information delivery to<br />

intended users or not determines a website’s final effect. Thus<br />

website effect could be defined with two variables, awareness and<br />

users’ satisfaction. High awareness means that a large number of<br />

people have known or experienced the website. In search engine<br />

optimization (SEO) average daily IP clicks and page view (PV)<br />

within a month are used to estimate website awareness. Many<br />

methods are used to evaluate overall user’s satisfaction towards a<br />

website in literatures. In this study, we choose both qualitative and<br />

quantitative indicators to evaluate user’s satisfaction. The former<br />

is used to indicate users’ satisfaction degree by qualitative content<br />

analyses on users’ feedback messages and media comments. The<br />

latter include two quantitative indicators, Google Page Rank<br />

Value (a numeric value that represents how important a page is on<br />

the web) and an overall assessment scored with 5-point Likert<br />

scale by researchers after in-depth investigations of each website<br />

and interviews with its webmaster. These indicators for the<br />

concept of website effect are shown in table 1.<br />

Table 1: Indicators for the concept of website effect<br />

Conceptual<br />

indicator<br />

website<br />

awareness<br />

User<br />

satisfaction<br />

Operational indicator Data Source<br />

Average daily IP clicks,<br />

Page view estimates<br />

within one month<br />

Degree of MFWs’<br />

satisfaction<br />

Websites of ALEXA,<br />

SEO and GOOGLE<br />

Users’ feedback<br />

messages on websites<br />

and comments from<br />

other mass media<br />

Overall assessment Google Page Rank<br />

Value, overall website<br />

analyses and interviews<br />

with webmasters<br />

2.2 Business Model of the Websites<br />

Business model is a concept frequently used in e-business, IS,<br />

computer science, strategy or management [34]. “At its heart, a<br />

business model performs two important functions: value creation<br />

and value capture” [35]. A conceptual business model should


include customers and competitors, the offering, activities and<br />

organization, resources and factor market interactions [36]. “We<br />

must consider which concepts and relationships allow a simplified<br />

description and representation of what value is provided to<br />

customers, how this is done and with which financial<br />

consequences” [37]. As for websites, business model is mainly<br />

determined by their capital sources and profit models, which is<br />

more often used in businesses than government agencies or nonprofit<br />

organizations. Our pilot interviews show that current MFW<br />

websites have four types of investment entities, governments,<br />

non-profit organizations, individuals and enterprises, and their<br />

profit models can be categorized as government websites, nonprofit<br />

websites and enterprise websites. In general, non-profit and<br />

individual invested websites try to represent or pursuit benefits of<br />

MFWs, government invested ones intend to help to improve social<br />

management of MFWs while enterprise invested ones are used to<br />

make money as a e-business platform. Accordingly, their business<br />

models can be classified as “pure public operation”, “supported by<br />

government procurement” and “market operation”. Relationships<br />

between investment entities, profit models and business models of<br />

MFW websites are shown in figure 1.<br />

Government<br />

investment<br />

Non-profit<br />

organization<br />

investment<br />

Individual<br />

investment<br />

Enterprise<br />

investment<br />

Government<br />

websites<br />

Public<br />

welfare<br />

websites<br />

Enterprise<br />

website<br />

Pure public<br />

operation<br />

Supported<br />

by<br />

government<br />

procurement<br />

Market<br />

operation<br />

Figure 1:Relationships between investment entities,<br />

profit models and business models of MFW websites<br />

Different business models mean different incentive mechanisms<br />

and may result in different website effects. Therefore, we propose<br />

hypothesis 1:<br />

H1: Business model affects the effect of MFW websites.<br />

2.3 Website Construction<br />

Website construction refers to technical features or perceived<br />

technical features of a website in this study. Usability and IA<br />

provide valuable explanations for website construction from<br />

different angles. Usability theory examines perceived interface<br />

attributes such as availability, accessibility, readability,<br />

understandability, etc.. Wang and Senecal [38] developed a scale<br />

for website usability including three dimensions: ease of<br />

navigation, speed and interactivity. Al-badi & Mayhew [39]<br />

demonstrated the value of target culture, navigation, layout,<br />

interaction, graphics and color in designing localized business<br />

websites. Karlsson [40] found that graphic design, content and<br />

perceived usability contribute to the perceived expression and<br />

emotional responses of the websites. In these studies, content,<br />

97<br />

accessibility, interactivity navigation, open speed, graphic and<br />

color design are important factors that affect website effect.<br />

IA theory provides some objective guidelines to improve website<br />

usability. Its core idea is “user-centered and to make information<br />

more understandable”. Davenport defined Information<br />

architecture simply a set of aids that match user needs with<br />

information resources [41]. Gullikson [42] examined the impact<br />

of information architecture on the usability of an academic<br />

website and recommended key ingredients: information design,<br />

access tools, and navigational aids. Comparing IA with website<br />

usability theory, we define website construction with two<br />

dimensions, information architecture and technical performance.<br />

Technical performance affects website usability and comprises<br />

complex components. In order to get data more easily, we adopt<br />

open speed to measure it. Content, information organization,<br />

navigation and page presentation are selected to indicate website<br />

information architecture. In the process of investigation, we found<br />

that there are no obvious differences in page presentation between<br />

websites, so it is abandoned for lack of good discrimination.<br />

According to usability and IA theory, website construction<br />

influences its website effect. Four research hypotheses are put<br />

forward as follows:<br />

H2: Information content affects the effect of MFW websites.<br />

H3: Information organization affects the effect of MFW websites.<br />

H4: Website navigation affects the effect of MFW websites.<br />

H5: Open speed affects the effect of MFW websites.<br />

2.4 Social Networking Service<br />

As one of the sociological characteristics of a website, social<br />

networking services help to expand MFWs' social network and<br />

interpersonal communication. Our previous research shows that<br />

interpersonal influence is one of the most important factors for<br />

MFWs to access to the Internet for the first time and interpersonal<br />

network is an important source for them to acquire information<br />

[43]. Previous literatures show that interactivity is an important<br />

indicator of website usability [44]. Therefore, interaction and<br />

community functions of a website could be used to indicate social<br />

networking service. The communication function can help website<br />

users to share information or views and includes BBS, blog,<br />

online groups, etc., while the interaction function helps users to<br />

communicate with the webmaster or manager and mainly involves<br />

the feedback channels on websites. To explore the influence of<br />

social networking services on website effect, hypothesis 6 is put<br />

forward as follows:<br />

H6: Functions for Social Networking service affect the service<br />

effect of MFW websites.<br />

2.5 Website Promotion<br />

From the perspective of network marketing, only when a website<br />

is known by most of the targeted users, could it make full impacts.<br />

In past ten years, e-commerce webmasters have developed various<br />

indicators to measure and adopted many strategies to improve the<br />

awareness of their websites. Our pilot investigation shows that<br />

except that local government websites can be easily found on first<br />

page of Baidu’s search results after 2010, websites of small<br />

government departments and non-profit organizations without<br />

promotions can’t be found easily because Baidu ranks its search<br />

results by bid. The practice of e-business has proved that website


promotion involves a variety of tactics and has obvious impacts<br />

on website effect. Some webometric indicators, such as web links,<br />

search engine optimization, are used to disclose website<br />

marketing [45]. Present webometrics studies involve four areas:<br />

(1) Page content analysis; (2) Link analysis; (3) Site usage<br />

analysis; (4) Web technology analysis (including search engine<br />

performance) [46].To testify the influence of website promotion<br />

on its effect, we adopt SEO (Search Engine Optimization) value,<br />

the number of back-links and the number of times reported by<br />

other media to evaluate website promotion. Hypothesis 7 is put<br />

followed as follows:<br />

H7: Website promotion is positively correlated with the effect of<br />

MFW websites.<br />

All the hypotheses form a theoretical framework of this study, as<br />

shown in figure 3.<br />

3. RESEARCH METHODS<br />

Case study is adopted in some website researches, such as<br />

Weischedel & Huizingh [47], Fang [48], etc.. Yin [49] states that<br />

case studies could be used to describe, explore or explain<br />

phenomena. Bonoma [50] (1985) suggests that multiple cases<br />

could play a role in both hypothesis generation and hypothesis<br />

testing. “Multiple-case designs allow for cross-case analysis and<br />

the extension of theory, and yield more general research results<br />

than single-case study.”[51]. Multi-case studies are often used to<br />

explore influential factors in many management fields. Akhavan<br />

et al [ 52 ] derived critical success factors for design and<br />

implementing knowledge management (KM) system in a multicase<br />

study research with an integrated approach. Our study is to<br />

explore success factors for MFW websites beyond a single<br />

perspective of technology. Multi-case approach is thought suitable<br />

for this holistic exploration.<br />

According to the analytical framework, independent variables are<br />

business model, website construction, social networking services,<br />

website promotion, and the dependent variable is website effect.<br />

Their indicators are concluded in table 2.<br />

Table 2: Indicators for Key Variables<br />

Variables Dimensions Indicators<br />

Website effect<br />

Business<br />

model<br />

Website<br />

construction<br />

Website<br />

awareness<br />

Users’ satisfaction<br />

Overall website<br />

effect<br />

(1)Daily average IP traffic<br />

within a month;<br />

(2) Daily average page<br />

view estimates<br />

Qualitative analysis of<br />

feedback messages and<br />

content of website forums<br />

(1) Google Page Rank<br />

Value;(2)qualitative<br />

assessment of overall<br />

effect;(3) Analysis of<br />

problems and difficulties<br />

Fund sources Amount and persistence<br />

of funds or investment<br />

Website property See in figure 1<br />

Information<br />

architecture<br />

(1) Information contents<br />

(quality, richness,<br />

relevance, renewal and<br />

98<br />

Social<br />

networking<br />

services<br />

Website<br />

promotion<br />

Technical support Open speed<br />

Interaction<br />

function<br />

community<br />

function<br />

SEO (Search<br />

Engine<br />

Optimization)<br />

Number of backlinks<br />

Number of times<br />

reported by<br />

traditional media<br />

accuracy)<br />

(2) Information<br />

organization<br />

(classification, structure)<br />

(3)Navigation (sign<br />

design, number of internal<br />

and external links, search)<br />

Interaction channels (<br />

feedback columns, Online<br />

chat, etc.)<br />

Virtual community (blog,<br />

BBS, QQ group etc)<br />

Number of pages included<br />

in search engines on<br />

ALEXA (google, baidu,<br />

yahoo, netease, soso and<br />

sogou)<br />

Number of back-links<br />

recorded in search engines<br />

on ALEXA (google,<br />

baidu, yahoo, netease,<br />

soso and sogou)<br />

Qualitative analysis of<br />

relevant reports on<br />

important traditional<br />

media<br />

4. CASES AND DATA<br />

4.1 Case Description<br />

Existing MFW websites mainly provide information related to<br />

MFWS’ employment, legal right protection, children’s education,<br />

medical treatment and e-business. Using search engines like<br />

google, baidu, soso, et.al and any possible link tracks, we<br />

searched case websites from November 2010 to 14 June 2011 and<br />

finally found 11 relevant objects in total, including 9 websites (not<br />

involving their sub-websites) and 2 special pages. These MFW<br />

websites occupied a minimal percentage of more than 20,000<br />

agriculture-related websites and could nearly be neglected<br />

compared with more than 70,000 government websites in China at<br />

the end of 2010. The earliest MFW website opened on 10 May<br />

2003, a personal forum established by Changsheng Guo who<br />

hoped to protect MFWs’ legal rights by displaying their living and<br />

working situation. In 2004, “Minggong Net” (Websites for<br />

MFWS), a website supported by the Office of Migrant Workers<br />

and Poverty Alleviation Office of State Council, was opened<br />

online. It mainly provides employment information services, and<br />

often holds public activities for MFWs. After 2007, a few<br />

websites for MFWs emerge, such as “Chinese Young Migrant<br />

Workers”, “Zhong Lao Wang” (Websites of Chinese Labor) and<br />

“Legal Rights Protection of MFWs”, ect.. Besides, some large<br />

portal websites (e.g. Phoenix and Sohu) and large government<br />

websites (e.g. China.net and Labor Union of China) own special<br />

columns for MFWs. These websites, columns and pages play<br />

different roles and gradually form an Internet information service<br />

system for MFWs with specialization and diversity, which can be<br />

shown as figure 2.


Websites or columns for MFWs<br />

In this study, we didn’t involve the special columns for MFWs of<br />

large business portals such as Phoenix.com and Sohu.com,<br />

because contents of these columns only occupy a very small<br />

proportion of the whole portals. All the 11 special websites and<br />

columns related to MFWs are introduced in table 3. Taking into<br />

account that each case should be effective, we abandoned the No.<br />

9 case because it is only a static page of China.com and hasn’t<br />

been updated since 2005.<br />

1. Website name,<br />

setup date and<br />

address<br />

Website for<br />

Chinese Young<br />

Migrant Workers<br />

July,2010,www.y<br />

oungmigrants.org<br />

2.Legal Right<br />

Protection for<br />

China Migrant<br />

Workers Jan.<br />

2006,<br />

www.zgnmg.org/<br />

Non-profit<br />

Websites<br />

For-profit<br />

websites<br />

Government<br />

websites or<br />

columns<br />

Special columns<br />

of large business<br />

portals<br />

Individual<br />

forums<br />

Table 3 Case Description<br />

Sponsor<br />

Agencies or<br />

main investor<br />

Institute of<br />

Population<br />

and Labor<br />

Economics of<br />

Chinese<br />

Academy of<br />

Social<br />

Sciences, ILO<br />

UN<br />

Population<br />

Fund<br />

Beijing<br />

Zhicheng Law<br />

Firm, Beijing<br />

Youth Legal<br />

Aid and<br />

Research<br />

Center<br />

Legal right<br />

protection<br />

Academic<br />

research<br />

Employment<br />

Employment<br />

Sub-websites<br />

Special columns<br />

Small local<br />

websites<br />

Phoenix,<br />

Sohu, etc.<br />

Entertainmen<br />

t<br />

Figure 2 Online information service systems for Chinese<br />

MFWs<br />

Websi<br />

te<br />

proper<br />

ty<br />

Nonprofit,<br />

UN<br />

Millen<br />

nium<br />

Devel<br />

opmen<br />

t<br />

Goals<br />

Fund<br />

Nonprofit<br />

Intended<br />

users<br />

Academic<br />

and policy<br />

researcher<br />

s, migrant<br />

workers<br />

Migrant<br />

workers,<br />

layers, &<br />

governme<br />

nt legal<br />

agencies<br />

99<br />

3.Jobs for<br />

Technical and<br />

Skilled Workers,<br />

2007,<br />

www.nmgjggz.co<br />

m/<br />

4.Website for<br />

Migrant workers,<br />

2007<br />

www.mingong123<br />

.com/<br />

5.China Labor,<br />

Aug. 2008<br />

www.chinalao.co<br />

m/<br />

6. Migrant<br />

Workers Help,<br />

2009<br />

www.zhich.com/<br />

7.Chinese Migrant<br />

Workers(subsite<br />

of Zhongnong<br />

Xingye), April,<br />

2009,<br />

www.nmgw.org.c<br />

n<br />

8.Column for<br />

Migrant Workers<br />

of Chinese Trade<br />

Unions website,<br />

2009<br />

nmg.workercn.cn/<br />

9.Special page for<br />

migrant workers<br />

of China.com,<br />

2005<br />

www.china.com.c<br />

n/chinese/zhuanti/<br />

nmg/507760.htm<br />

10.China Migrant<br />

Workers (Party<br />

Building)Jan,<br />

2011,<br />

www.zgnmgw.co<br />

m/<br />

11.Chinese<br />

Migrant workers,<br />

May, 2003,<br />

http://mg.arkoo.co<br />

m/<br />

Individual<br />

Partners<br />

Beijing<br />

Qingda<br />

Yanyuan<br />

Network<br />

Technology<br />

Co., LTD.<br />

Entrepreneur<br />

Wenghua<br />

Zhou and VC<br />

Individual<br />

partners<br />

Information<br />

Center of<br />

Industrial<br />

projects in<br />

rural China<br />

ACFTU<br />

China Foreign<br />

Languages<br />

Publishing<br />

and<br />

Distribution<br />

Agency<br />

Voluntary<br />

investment by<br />

MFWs in<br />

Beijing from<br />

Gushi county<br />

of Henan<br />

Province.<br />

A migrant<br />

farmer worker<br />

Changping<br />

Guo<br />

Nonprofit<br />

Enterp<br />

rise<br />

Enterp<br />

rise<br />

Enterp<br />

rise<br />

Enterp<br />

rise<br />

Invest<br />

ed by<br />

gover<br />

nment<br />

Gover<br />

nment<br />

websit<br />

e<br />

Gover<br />

nment<br />

News<br />

websit<br />

e<br />

Nonprofit<br />

Person<br />

al<br />

forum<br />

Workers,<br />

employers<br />

recruitme<br />

nt and<br />

training<br />

agencies<br />

Same with<br />

No.3<br />

Same with<br />

NO.3<br />

Same with<br />

NO.3<br />

Same with<br />

NO.3<br />

Migrant<br />

workers<br />

and other<br />

people<br />

People<br />

from all<br />

walks<br />

Migrant<br />

workers<br />

Migrant<br />

workers<br />

4.2 Data Collection<br />

The approaches for data collection include website content<br />

investigation, half-structured interview with webmasters, analysis<br />

of related reports on mass media and some webometrics tools.<br />

Data were collected in three steps:


(1)Firstly, all the existing MFW websites were investigated<br />

comprehensively. The content, structure and information<br />

presentation of each website were repeatedly browsed, tried and<br />

analyzed, and the navigation signs, search engine and links were<br />

tested. A deep content analysis was specially conducted on the<br />

site aim, webmaster`s statements, users’ messages and BBS posts.<br />

And then we collected and qualitatively analyzed relevant online<br />

reports on other media. To ensure the reliability of the data, 2<br />

researchers collected all the data respectively at first, and then<br />

compared the results with each other, discussed the difference,<br />

and unify them by repeat investigation. At last, qualitative data for<br />

IA, social networking services, open speed of part websites,<br />

business model and website promotion of each website were<br />

sorted out. After in-depth analyses of these data, an assessment on<br />

the overall effect of each website is given with Likert 5-point<br />

scale.<br />

(2) Secondly, we conducted half-structured interviews with<br />

webmasters by means of telephone, email and QQ (a timely<br />

online communication tool). Interview questions include: “How is<br />

your website going?”, “Who invested on your website?”, “What is<br />

the main purpose of your website?”, “How does your website<br />

make money?”, “What difficulties does your website face at<br />

present?”, “What do you plan to do for next step?”, etc. Interview<br />

contents were recorded for qualitative analysis. Meantime,<br />

supplements and corrections were made for the data got in last<br />

stage.<br />

(3) Thirdly, we collected quantitative data with webometrics tools<br />

such as ALEXA, SEO and Google (site command), including<br />

average daily IP and PV value, number of the pages included by<br />

search engines, number of back-links, Google PR value, number<br />

of website pages, number of internal and external links, open<br />

speed of some websites, etc. All the quantitative data covered<br />

recent 1 month and were collected from 8 a.m. to 12 a.m. o 'clock<br />

on June 14, 2011. The time for data collection is selected<br />

randomly so as to keep the validity of the data.<br />

For the word limit of this paper, the data table is omitted here.<br />

5. FINDINGS AND IMPLICATIONS<br />

5.1 Hypothesis Test<br />

As a compound variable, website effect is measured by both<br />

quantitative indicators such as GOOGLE PR value, daily average<br />

IP traffic within 1 month and daily average page view estimates,<br />

and qualitative indicators such as overall effect, problems and<br />

difficulties faced by the websites and users’ satisfaction. After a<br />

comprehensive qualitative analysis and repeated quantitative<br />

comparisons, results of hypothesis testing are shown in Figure 3.<br />

H1: is supported. Business model has significant influence on the<br />

effect of MFW websites.<br />

The values of PR, IP and PV of commercial websites far exceed<br />

that of other kinds of websites. Among all the websites,<br />

commercial ones occupy the biggest proportion and operate better<br />

than others. They focus on providing jobs for MFWs and bluecollar<br />

workers, including Website for Migrant Workers<br />

(www.mingong123.com/), China Labor (www.chinalao.com/) and<br />

Migrant Workers Help (www.zhich.com/). These websites charge<br />

the employers and training agencies who issue information and<br />

promise to keep the authenticity and reliability of issued<br />

information, but don't charge farmer workers who issue messages<br />

100<br />

for job looking or charge them little. Some of the commercial<br />

websites try to get supports from governments and positive<br />

comments from media by advertising themselves as “platforms<br />

providing public free information for MFWs”. The Website of<br />

Chinese Migrant Workers(a sub-site of the government website<br />

Zhongnong Xingye, www.nmgw.org.cn) is trying to transform<br />

itself into a commercial one and thus to get more vitality.<br />

Business model of websites<br />

Website construction<br />

Website IA<br />

Technology support<br />

Capability of SNS<br />

Website promotion<br />

Content<br />

construction<br />

Info. organization<br />

Navigation system<br />

H6-<br />

H1+<br />

H2+<br />

H3-<br />

H4+p<br />

H5+<br />

H7+<br />

Figure 3:Theoretical framework of this study<br />

Effects of MFW websites<br />

Clear profit model, persistent investment, rich information sources<br />

and strict information checking system are four main<br />

characteristics of commercial websites. China Xin NongMen (new<br />

gate of the villages) Website was set up in august 2005 and got 2<br />

million dollars of venture capital in 2006, but went to bankrupt in<br />

2008 because of bad business model [53]. It made great efforts to<br />

build close relatiohships with governments, which was proved to<br />

be a wrong strategy. The website of Jobs for Technical and<br />

Skilled Workers (www.nmgjggz.com/) seeks a public welfare<br />

model. It doesn't charge on information issue but also don’t<br />

promise to assure information quality. For lack of a clear profit<br />

model and enough investment, it performs mediocre.<br />

Among non-profit websites, the website of Legal Right Protection<br />

for China Migrant Workers has highest IP and PV value. It was<br />

established by Beijing Zhicheng Law Firm and Beijing Youth<br />

Legal Aid and Research Center as a non-profit platform for<br />

providing free legal advice and practical aid services for MFWs.<br />

Supported by government procurement, it operates well. This<br />

kind of business model solves the problems of inefficiency and<br />

unsustainability when judiciary bodies provide free legal aids for<br />

vulnerable groups directly.<br />

Another kind of non-profit websites are academic ones which are<br />

hosted by research institutes or subsidized by NPO. The Website<br />

for Chinese Young Migrant Workers (www.youngmigrants.org),<br />

funded by the project of UN Millennium Development Goals,<br />

perform quite well. Its targeted users are scholars who are<br />

interested in problems of MFWs instead of farmer workers<br />

themselves. It releases information on policies, laws, regulations,<br />

and new research fruits for academic purpose, which is also<br />

helpful to MFWs. The problem is that if the grant project<br />

terminates, its sustainability will face a great challenge.


According to our investigation, there have been no pure<br />

government websites special for MFWs except columns for<br />

MFWs on two large government websites with outdated<br />

information by June 2011. In some way, they are more news<br />

media than service platforms.<br />

Small-sized personal BBSs or forums attract few clicks. The<br />

earliest BBS is very simple with little information, few visitors<br />

and slow speed, and has to change its domain name frequently for<br />

lack of money to rent a permanent server.<br />

Generally speaking, five kinds of websites for or on MFWs adopt<br />

different business models. Commercial websites and non-profit<br />

ones with sufficient funds and clear mission perform better than<br />

others. All kinds of websites hope to set up good relationships<br />

with governments and manage to get their supports in investment,<br />

procurement, or policies. But in terms of commercial websites, a<br />

good profit model is critical for their survival.<br />

H2: is supported. Information contents have significant influence<br />

on website effect.<br />

Websites with higher specialty, richer and more accurate<br />

information and faster updating have better effect than others,<br />

because they are more competitive in meeting the information<br />

needs of farmer workers. Content don’t only influence website<br />

effect directly but also indirectly by the mediation of business<br />

model. For various missions of their host institutions, websites<br />

adopt different business models to provide information with<br />

different utilities. Information on employment is mainly provided<br />

by commercial websites maybe because of its market scarcity,<br />

high cost, time-sensitivity and value-added capability. Legal<br />

information is more likely provided on non-profit websites and<br />

supported by government procurement completely or partly,<br />

maybe because most of their target users are social vulnerable<br />

groups with low incomes and purchasing power. By the mediation<br />

of business model, information contents correlate with website<br />

effect.<br />

H3: is not supported. We can’t get enough evidences to prove or<br />

deny hypothesis 3.<br />

Information classification of a website determines its accessibility<br />

and understandability. Data show that the information<br />

classification of commercial and academic websites is slightly<br />

better than that of other websites. However, this kind of difference<br />

is not significant. Color style and flash design may have impacts<br />

on customers’ preference and loyalty in some way. But most of<br />

the websites have not developed impressive distinctive styles<br />

except the website for China Migrant Workers (Party Building<br />

), which has a symbolic red style. In general, differences in<br />

information classification and page layout are not significant<br />

among MFW websites. The possible reason is that present website<br />

building technology is mature and cheap enough so that all kinds<br />

of websites can afford and adopt it. This doesn’t prove that<br />

information organization has no influences on the effect of MFW<br />

websites, but means that we have not enough evidences to support<br />

or deny this hypothesis.<br />

H4: is partly supported. Navigation systems correlate with website<br />

effect.<br />

According to data analysis, websites with more powerful search<br />

engine and more external links have better effect. Number of links<br />

correlates with website effect, but not as significant as that<br />

101<br />

between information content and website effect. The possible<br />

reason is that there are not enough alternative websites for MFWs<br />

to choose at present so that they have to choose websites by<br />

content at first to satisfy their basic information needs. Besides,<br />

commercial and academic websites do better in information<br />

navigation and external links than others.<br />

H5: is supported. Technical supports are significantly related with<br />

website effect.<br />

Open speed is adopted to indicate technical supports and has<br />

significant correlation with website effect. Data analysis shows<br />

that except personal BBSs or forums, other websites which are<br />

supported by formal organizations and have independent domain<br />

names can be opened quickly, because they are hosted by bigger<br />

sized and more formal institutions that can provide better<br />

information services.<br />

H6: is not supported. The function of social networking services<br />

of the websites have no significant correlation with their effect,<br />

but have significant correlation with their business models.<br />

The function of social networking service is mainly indicated with<br />

interaction and community functions of websites. Data show that<br />

commercial websites have very strong interaction functions and<br />

offer various channels to communicate timely with users, but they<br />

have few communities to allow users to communicate with each<br />

other. The possible reason is that interaction is attractive for<br />

commercial webmasters because they could know more about the<br />

information needs of customers through it and thus to sell their<br />

services more successfully, while community function is often<br />

welcomed by website users because it can help them to expand<br />

social network and get more useful information. On the contrary,<br />

academic websites provide better community construction but pay<br />

less attention to interaction functions. The possible reason is that<br />

free information sharing among users will damage the interests of<br />

commercial websites, which are mostly deprived from<br />

information asymmetry between information suppliers and users.<br />

Whereas, academic websites have a mission to disseminate public<br />

knowledge but can’t burden additional labor cost for limited<br />

funds, are inclined to provide weaker feedback but strong<br />

community functions. As for government websites, the case in<br />

this study is in a “dormancy” state and prepares to transform into<br />

a commercial website. Government websites pay little attention to<br />

both the feedback and community functions for lack of<br />

motivations to seek profits and incentives to disseminate<br />

knowledge.<br />

H7: is supported. Website promotion is significantly correlated<br />

with both website effect and business model.<br />

Three indicators, search engine’s collection, number of back-links<br />

and number of times reported by other media are selected to<br />

evaluate website promotion. Data show that commercial websites<br />

do far better than others in promotion because they have stronger<br />

motivations and take more measures to increase their awareness.<br />

Non-profit websites funded by NPOs or supported by government<br />

procurement also have incentives to promote themselves. Pure<br />

government websites and small personal websites hardly take any<br />

promoting measures. In general, government websites keep<br />

conservative attitude at commercial promotion strategies while<br />

personal websites own low capabilities to promote themselves. By<br />

the mediation of business model, website promotion influences its<br />

effect.


5.2 Other Findings<br />

Business model is a strong predictor for not only website effect,<br />

but also other variables, such as website construction, social<br />

networking services, website promotion, etc. Two commercial<br />

websites, the Website for Migrant workers and the Website for<br />

China Labor, are better than other websites in all aspects,<br />

especially in information updating and examination of<br />

information accuracy. Websites with worst performances are<br />

those commercial websites which are short of funds, those<br />

government websites which are in transformation to commercial<br />

ones and those personal BBSs.<br />

Lack of funds is reported by several small webmasters as the key<br />

factor that influences website effect. The master of the Website of<br />

Jobs for Migrant and Technical Workers, a commercial website<br />

that was set up by a few individual MFW partners with their<br />

meager wages, said: “limitation of funding is the bottleneck of<br />

development and makes the website very difficult.” Another<br />

website, China Migrant Worker (Party Building), was also<br />

established by individual MFW partners and can’t operate well for<br />

lack of money. Lack of talents is another problem related with<br />

shortage of funds. Workers from a few websites which perform<br />

better said that it is difficult for MFW websites to attract better<br />

professionals because they can’t offer higher salaries.<br />

5.3 Practical implications<br />

Previous studies didn’t pay much attention to MFW websites for<br />

many reasons. This study finds that MFW websites are neither<br />

parts of government websites, nor just a group of agriculture<br />

related websites, but are important information platforms<br />

concerning legal right protection, employment and development<br />

of Chinese MFWs with independent business models. The results<br />

of this study have some practical implications for both<br />

webmasters and governments.<br />

5.3.1 Proper business model is critical for the<br />

survival and development of Chinese MFW<br />

websites<br />

Previous researches advocate that government should make<br />

efforts to provide free information services for MFWs because<br />

some of them live in worse information environment and have<br />

lower information capabilities than others, but few empirical<br />

examinations have been conducted to explore specific service<br />

patterns. This study shows that pure government website is not an<br />

effective and efficient model for the delivery of information with<br />

commercial characters. It also finds that information services<br />

related with legal right protection of MFWs could be supported by<br />

governments by means of service procurement, tax cuts, project<br />

leading, etc.. Therefore, MFW websites need to manage to seek<br />

appropriate business models, broaden funding channels, and strive<br />

for supports from governments.<br />

5.3.2 Construction of website features other than<br />

contents will become more important in the<br />

future<br />

This study shows that some website features such as information<br />

organization, number of links and SNS functions have not<br />

significant influences on website effect. But as more and more<br />

MFW websites emerge and the competition among them<br />

intensifies, strengthening the construction of website features<br />

other than contents will become more necessary and urgent.<br />

102<br />

5.3.3 Governments should provide more supports for<br />

commercial and non-profit MFW websites<br />

rather than establish new ones by themselves<br />

This study shows that commercial websites and non-profit<br />

websites supported by government procurement are more<br />

successful than government websites and personal BBSs. This<br />

means that although public information services are very<br />

important for the survival and development of MFWs, it is not a<br />

smart choice for government agencies to establish and manage<br />

websites for MFWs by themselves. Instead, government should<br />

support non-profit or commercial websites by means of<br />

government procurement, tax cutting and policy concessions.<br />

6. CONCLUSION AND DISCUSSION<br />

6.1 Conclusions<br />

This study explored the factors that influence service effect MFW<br />

websites. An analytical framework comprising four independent<br />

variables, including business model, website construction, social<br />

networking services, website promotion, and one dependent<br />

variable, website effect, was advanced under a managerialtechnical<br />

perspective. These variables were borrowed from<br />

theories of usability, information architecture and webometrics.<br />

Both quantitative and qualitative indicators were used for the<br />

measurement of these variables, and a multi-case study was<br />

conducted for a holistic exploration. It was found that factors that<br />

significantly influence the effect and sustainable development of<br />

MFW websites are business model, information content and<br />

website promotion. Among them, business model also make<br />

impacts as a mediating variable. Different kinds of information<br />

intend to be provided by websites with different business models.<br />

Government procurement and NPO funding are efficient<br />

arrangements for websites on the legal right protection of MFWs.<br />

The “commerce plus non-profit” mode by charging employers and<br />

training agencies who issue information on websites but don’t<br />

charge MFWs who issue or acquire information is common for<br />

employment websites. Lack of money was reported as a prevalent<br />

problem that faces with all kinds of MFW websites.<br />

6.2 Limitations<br />

Firstly, trying to combine both managerial and technical, and even<br />

social perspectives into a holistic study is risky in being accepted<br />

by readers who are accustomed to one discipline paradigm. We<br />

employed and unified theories from LIS, IS, webmetrics and<br />

management science and formulated an analytical framework for<br />

this qualitative study. We hope that this attempt will be proved a<br />

cross-discipline innovation instead of a blunder. Secondly, a<br />

multi-case study may have to lose some detailed information in<br />

order to improve the generality of the research findings, although<br />

we had collected a large amount of first and second-hand data by<br />

means of interview, website examinations and literature reviews.<br />

Thirdly, the validity of four independent variables and 1<br />

dependent variable were not testified powerfully in this qualitative<br />

study because we failed to find similar studies and appropriate<br />

methods. Fourthly, we focused on websites and neglected<br />

information needs and information seeking behaviors of migrant<br />

farmer workers, which will be studied in further step.<br />

7. ACKNOWLEDGEMENTS<br />

Our thanks to 3 projects that support this study, the project<br />

“Information Access of Chinese Migrant Farmer Workers and the


Construction of Inter-regional Public Information Service System<br />

for Them” (Grant No. 71173121) supported by the National<br />

Natural Science Foundation of China , the project “Holistic<br />

Evaluation Research on E-government Based on Multistakeholder<br />

Value-focused Approach” (Grant No. 10YJA870021)<br />

supported by the Foundation for Humanities and Social Sciences<br />

Program of Ministry of Education , and the project “Theory<br />

Construction and Evaluation on Social Information Welfare”<br />

supported by the Special Funds for fundamental Research of<br />

Central Universities.<br />

8. REFERENCES<br />

[1] The State Council. The Opinion about Solving the Problems<br />

of Rural Migrant Farmer Workers. The central government<br />

website of the People 's Republic of China,2006. [view:<br />

2011-05-18] http://www.gov.cn/jrzg/2006-<br />

03/27/content_237644.htm.<br />

[2] The National Statistical Bureau. Migrant Farmer Workers<br />

Monitoring Report, 2009. [View: 2011-11-19]<br />

http://www.stats.gov.cn/tjfx/fxbg/t20100319 402628281.htm.<br />

[3] CNNIC. The 28th China Internet network development<br />

statistics report, 2011. [view: 2011-12-<br />

14].http://www.piaoshi.org/2011-cnnic-28th-china-internetdevelopment-statistics-report-download/.<br />

[4] CNNIC. The 27th China Internet Network Development<br />

Statistics Report, 2011. [view:2011-03-11],<br />

http://www.cnnic.net.cn/dtygg/dtgg/201101/t20110118<br />

20250.html.<br />

[5] Wang, F. Social information welfare and its realization.<br />

Library and Information Service, No.18 (2009), 30-34.<br />

[6] Zheng, Y. Exploring the weak information capability of<br />

China’s labor force from rural area. Economist, No.5 (2005),<br />

52-59.<br />

[7] Wen, J. & Yu, G. Information division and the poverty of<br />

right of information underprivileged group. Journal of<br />

Dehong Teachers College, No. 1 (2008), 21-24.<br />

[8] Xie, Q., Shi, D. & Zhu, L. On information behavior and<br />

assistance for information underprivileged group in<br />

information society. The Library Journal of Henan, No.5<br />

(2008), 54-56.<br />

[9] The State Council. The Opinion about Solving the Problems<br />

of Rural Migrant Farmer Workers. The central government<br />

website of the People 's Republic of China,2006. [view:<br />

2011-05-18] http://www.gov.cn/jrzg/2006-<br />

03/27/content_237644.htm.<br />

[10] Zhou, Y. Informatization promotes orderly flow of migrant<br />

farmer workers. Leadership Science, No. 4, (2007), 40-41.<br />

[11] Li, G. Informatization is promising to promote the<br />

employment of peasant worker. Economic Daily No. 4<br />

(2009).<br />

[12] Yang, F. & Li, J. Information Asymmetry and Employment<br />

of Peasant-workers. Market Modernization, No.34 (2007),<br />

523.<br />

103<br />

[13] Jin, J. Building the information service system for migrant<br />

workers. Economic Vision, No. 4 (2007), 49-50.<br />

[14] Huang, L. & Wang, C. Exploring information<br />

marginalization of migrant workers. Consume Guide, No.19<br />

(2009), 18-19.<br />

[15] Zhou, H. Constructing the integrated information service<br />

system for migrant farmer workers. Information System<br />

Engineering, No.9 (2005), 20-21.<br />

[16] Xing, T. The electric business of agricultural products is<br />

promising with 20000 national agriculture websites. [View:<br />

2011-05-26], Communication and Information Report<br />

(Fuzhou), (2011),<br />

http://tech.163.com/11/0526/01/74UNDOLH000915BF.html.<br />

[17] Wu, D. & Wu, Y. Research on the construction of<br />

agricultural science-learning website based on Internet<br />

independent study. Mechanical & Electrical Engineering<br />

Technology, No.7 (2008), 47-48.<br />

[18] Li, K & Sun Y. Research on application of personalized<br />

recommendation system in agriculture websites: Sichuan<br />

agricultural economy Website as an example. Market Forum<br />

,No.2 (2009), 70-72.<br />

[19] Zhao, L. & Zhu, X. Research on the construction of<br />

agricultural websites in China based on web link Analysis.<br />

Sci-Tech Information Development & Economy, No.11<br />

(2011), 110-112.<br />

[20] Yang, X. &Jia, D. Agriculture websites in the application of<br />

rural informatization-take the case of Jiangsu Jurong City as<br />

an example. Journal of Beijing University of Posts and<br />

Telecommunications (Social Sciences Edition), No.5 (2009),<br />

28-32.<br />

[21] Guo, X. & He, M. Exploring the problems of agriculture<br />

website construction. Press Outpost, No.12 (2009), 81-82.<br />

[22] Yang, Y. & Jia, B. Research on the construction of<br />

agricultural websites in China. Rural Economy and Science-<br />

Technology, No.6 (2007), 20-21.<br />

[23] Zhang, T. & Wu, H. The problems and solutions in the<br />

development of agricultural information websites. Journal of<br />

Beijing University of Posts and Telecommunications (Social<br />

Sciences Edition), No.3 (2010), 9-14.<br />

[24] Benbunan-Fich, R.. Using protocol analysis to evaluate the<br />

usability of a commercial website. Information and<br />

Management, Vol. 39, No.2 (2001), 151-163.<br />

[25] Davis, F. D., Perceived usefulness, perceived ease of use,<br />

and user acceptance of information technology. MIS<br />

Quarterly, 13(3) (1989): 319–340.<br />

[26] Shackel, B. (1991). Usability--context, framework,<br />

definition, design and evaluation. Shackel, B. and<br />

Richardson, S., Ed. Human Factors for Informatics<br />

Usability. pp. 21-37. Cambridge, UK, Cambridge University<br />

Press.<br />

[27] Morville, P. Information architecture on the World Wide<br />

Web,1998. [View: 2011-10-19], http://repo.zenk-


security.com/Others/Information%20Architecture%20For%2<br />

0The%20World%20Wide%20Web.pdf.<br />

[28] Björneborn, L. & Ingwersen, P. Toward a basic framework<br />

for webometrics. Journal of the American Society for<br />

Information Society for Information Science and Technology,<br />

Vol. 55 No. 14 (2004),1216–1227.<br />

[29] Welch, E.W. & Sanjay, P. S. Multiple measures of website<br />

effect and their association with service quality in health and<br />

human service agencies. Proceedings of the 40th Hawaii<br />

International Conference on System Sciences, 2007.<br />

[30] Eschenfelder, K.R., and Miller, C. The openness of<br />

government websites: toward a socio-technical government<br />

website evaluation toolkit. MacArthur Foundation Internet<br />

Credibility and the User Symposium, Seattle Washington,<br />

2005.<br />

[31] Lee Y. & Kozar, K. A. Investigating the effect of website<br />

quality on e-business success: An analytic hierarchy process<br />

(AHP) approach. Decision Support Systems, No. 42 (2006),<br />

1383–1401.<br />

[32] Nilsen, J. Usability Engineering. Academic Press, 1994.<br />

[33] Peerce, J., Rogers, Y., Sharp, H., Benyon, D., Holland, S &<br />

Carey, T. Human-computer interaction. Workingham,<br />

England, Addison-Wesley, 1994.<br />

[34] Pateli, A. & Giaglis, G.. A Framework For Understanding<br />

and Analysing e-Business Models. Proceedings of the Bled<br />

Electronic Commerce Conference, 2003.<br />

[35] Chesbrough, H. Business model innovation: it’s not just<br />

about technology anymore. Strategy & Leadership, Vol. 35<br />

No. 6 (2007), 12-17.<br />

[36] Hedman, J. & Kalling, T.The business model concept:<br />

theoretical underpinnings and empirical illustrations.<br />

European Journal of Information Systems, No. 12 (2003),<br />

49–59.<br />

[37] Ostenwalder, A.; Pigneur, Y. and Tucci C.L. Clarifying<br />

Business Models: Origins, Present, and Future of the<br />

Concept. Communications of AIS, Volume 15 (2005) .<br />

[38] Wang, J. & Senecal, S. Measuring perceived website<br />

usability. Journal of Internet Commerce, Vol. 6, No.4<br />

(2007), 97-112.<br />

[39] Al-Badi A. H. & Mayhew, P. J. A Framework for Designing<br />

Usable Localized Business Websites. Communications of the<br />

IBIMA, Vol. 2010, 1-24.<br />

[40] Karlsson, M. Expressions, emotions and website design. Co<br />

Design, Vol3, supplement 1 (2007), 75-89.<br />

[41] Davenport, T.H. Information ecology: mastering the<br />

Information and Knowledge Environment. New York:<br />

Oxford University Press, 1997.<br />

[42] Gullikson, S., Blades, R., Bragdon, M., McKibbon, S.,<br />

Sparling, M. & Toms, E. G. The impact of information<br />

architecture on academic website usability. The Electronic<br />

Library, Vol. 17, No. 5 (1999), 293-304.<br />

104<br />

[43] Wang, F. & Chen, Y. Wang, F & Chen, Y. From potential<br />

users to actual users: Use of E-Government Service by<br />

Chinese Migrant Farmer Workers. Government Information<br />

quarterly, Vol. 29 (January 2012), pp. S98-S111.<br />

[44] Al-Badi A. H. & Mayhew, P. J. A Framework for Designing<br />

Usable Localized Business Websites. Communications of the<br />

IBIMA, Vol. 2010, 1-24.<br />

[45] Chen, B. The application of the external Web links in the<br />

promotion of large enterprise's Website. Sci-Tech<br />

Information Development & Economy, Vol. 17 No. 29<br />

(2007), 246.<br />

[46] Björneborn, L. & Ingwersen, P. Toward a basic framework<br />

for webometrics. Journal of the American Society for<br />

Information Society for Information Science and Technology,<br />

Vol. 55 No. 14 (2004), 1216–1227.<br />

[47] Weischedel, B. & Huizingh, E. K. R. E.. Website<br />

optimization with web metrics: a case study. Proceedings of<br />

the 8th international conference on Electronic commercet,<br />

2006, Fredericton New Brunswick, Canada, August 13-16.<br />

[48] Fang, W. Using Google Analytics for Improving Library<br />

Website Content and Design: A Case Study. Library<br />

Philosophy and Practice, Special Issue on Libraries and<br />

Google (June, 2007),.<br />

[49] Yin, R.K.). Case Study Research, Design and Methods.<br />

California: Sage Publications, Beverly Hills, 1984.<br />

[50] Bonoma, T. V. Case research in marketing: Opportunities<br />

problems, and a process. Journal of Marketing Research,<br />

Vol. 22 No. 2 (1986), 199-208.<br />

[51] Benbasat, I., Goldstein, D. K. & Mead, M. The Case<br />

Research Strategy in Studies of Information Systems. MIS<br />

Quarterly, September, Vol.11, No.3, (1987), 369-386.<br />

[52] Akhavan, P.; Jafari,M. & M Fathian, M. Critical success<br />

factors of knowledge management systems: a multi-case<br />

analysis. European Business Review, 18(2), (2006), 97-113.<br />

[53] China Xin NongMen Website, “Comments”, 2008. [View:<br />

2011-05-18]<br />

http://wopingit.com/company.aspx?companyid=c569211eaae3-48ae-a6e3-e92af310217f.


The Development of Public Smart Phone Apps in Korea:<br />

Empirical Approach<br />

Eom, Seok-Jin<br />

Seoul National University<br />

1 Gwanak-ro, Gwanak-gu,<br />

Seoul, Korea, 151-742<br />

(82) 010-8147-5352<br />

sjum21@snu.ac.kr<br />

ABSTRACT<br />

With widespread proliferation of smart phones, public apps, the<br />

smart phone applications provided by government organizations<br />

and public agencies, have been emerging as a new channel of<br />

public information services in the era of mobile government (mgovernment).<br />

Despite the increasing necessity of research on the<br />

public apps, however, few studies have dealt with the public apps.<br />

Under these circumstances, this study has been in progress with<br />

following purposes: (1) to build a ‘public apps development<br />

model’ for describing the level of services of public apps; (2) to<br />

measure the overall level of public apps in Korea adopting the<br />

development model; and (3) to analyze the factors which<br />

determine the difference in the level of public apps services. Until<br />

now, a 6-stage public apps development model whose criteria are<br />

citizen-centricity and technological complexity of the public apps<br />

was built. In addition, the levels of 148 public apps provided by<br />

Korean central government were measured. As results, it is found<br />

that all kinds of public organizations including central government<br />

are actively providing various public apps and the overall level of<br />

public apps provided by central government is in a midpoint of<br />

the second and third stage. The authors plan to complement the<br />

public apps development model in order to enhance validity, and<br />

to measure a level of the public apps not only of central<br />

government but also of local governments and public agencies<br />

accordingly.<br />

Categories and Subject Descriptors<br />

J.1 [Computer Applications]: Administrative Data Processing –<br />

government.<br />

General Terms<br />

Measurement, Theory<br />

Keywords<br />

m-government, application (app), smart phone, e-government,<br />

public apps development model<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Lee, Mi Yeon<br />

Seoul National University<br />

1 Gwanak-ro, Gwanak-gu,<br />

Seoul, Korea, 151-742<br />

(82) 010-7490-3777<br />

dldus33@snu.ac.kr<br />

105<br />

Kim, Jun Houng<br />

Seoul National University<br />

1 Gwanak-ro, Gwanak-gu,<br />

Seoul, Korea, 151-742<br />

(82) 010-9602-5007<br />

jh5451@snu.ac.kr<br />

1. INTRODUCTION<br />

With widespread proliferation of smart phones, public apps have<br />

been produced and provided by government organizations and<br />

public agencies in order to deliver public information services in<br />

recent years. In addition to the wired Internet in the era of egovernment,<br />

these public apps are emerging as a new service<br />

channel in the era of m-government [3][4]. Despite widespread<br />

proliferation of smart phones and the importance of public apps as<br />

a new service channel, however, few studies in the field of egovernment<br />

and information policy have dealt with the public<br />

apps that function in smart phones. Under these circumstances,<br />

this research is in progress for the following purposes: (1) to build<br />

the ‘public apps development model’ for describing the level of<br />

services of public apps; (2) to measure the overall level of public<br />

apps in Korea adopting the development model; and (3) to analyze<br />

the factors which determine the difference in the level of public<br />

apps services.<br />

In this paper, the authors review the literature on e-government<br />

stage models in order to capture the criteria for dividing each<br />

stage of the public apps development model. As a result, the 6stage<br />

public apps development model, which is based on citizencentricity<br />

and technological complexity, is illustrated. Adopting<br />

this model, the authors measure the level of each public app<br />

provided by Korean central government and demonstrate the<br />

result of measurement according to each stage. In the future, the<br />

authors not only plan to measure the level of each public app<br />

provided by local governments and public agencies in Korea, but<br />

also plan to analyze the factors that determine the difference in the<br />

level of each public app through regression analysis.<br />

This study is expected to make a theoretical contribution to<br />

widening understandings on the current status of public apps and<br />

the characteristics of m-government. From the perspective of<br />

practice, this study is expected to provide the guidelines and<br />

toolkits for making better public apps to public agencies and<br />

public officials.<br />

The organization of the paper is as follows. In section 2, the<br />

authors provide theoretical background regarding m-government,<br />

public apps, and development models. In section 3, the public<br />

apps development model is illustrated. Finally, the findings from<br />

the empirical analysis of the public apps adopting the<br />

development model are presented with tentative conclusion and<br />

future research plans.


2. THEORETICAL BACKGROUND<br />

2.1 Mobile Government<br />

With rapid advance in wireless technologies, there have been<br />

several studies on the next generation of e-government adopting<br />

wireless technologies in the public sector, which is called mgovernment.<br />

More specifically, m-government is defined as “the<br />

strategy and its implementation involving the utilization of all<br />

kinds of wireless and mobile technology, services, applications,<br />

and devices for improving benefits to the parties involved in egovernment<br />

including citizens, businesses, and all government<br />

units” [6]. With regard to the emergence of m-government, the<br />

early literatures tend to regard m-government as the subset or<br />

complement of e-government [5][6]. That is, m-government<br />

cannot function apart from the existing e-government in that most<br />

of the public services equipped with wireless technologies are<br />

nothing more than replications of e-government services on the<br />

mobile platforms. On the other hand, the recent literatures<br />

emphasize the uniqueness of m-government [2]. More<br />

specifically, m-government upgrades the level of public services<br />

by providing the infrastructure and contents, which could not be<br />

realized in the era of the wired e-government, by means of<br />

mobility and hand-held devices.<br />

Regardless of a perspective on m-government, however, there is a<br />

tendency that most of the m-government literatures not only put<br />

too much emphasis on conceptual discussion, but also regard mgovernment<br />

as the phenomenon taking place in the distant future.<br />

In order to deviate from such a tendency and approach mgovernment<br />

empirically, the authors analyze the public apps, the<br />

mobile applications provided by public organizations for<br />

improving benefits to the public and private sector, in this study<br />

[3][6]. With rapid increase in sales of mobile devices and huge<br />

success of mobile application markets, such as Apple’s App Store,<br />

citizens’ demand to receive public services via public apps has<br />

been increasing sharply in Korea [4]. It implies that the study of<br />

the relationship between m-government and public apps is<br />

significant in order to understand the substance of m-government<br />

and contribute to enlarging the research field of m-government.<br />

2.2 Development Models of IT/IS<br />

Since Nolan paved the way for the study of the use of IS<br />

(Information Systems) in business organizations through the<br />

growth stage model of computer use, there have been various<br />

discussions to understand and analyze the development process of<br />

e-commerce and e-business through a development or stage model<br />

[7]. Likewise, the stage models that deal with the development<br />

process of e-government, such as Gartner’s 4-stage model, UN’s<br />

5-stage model, and Layne and Lee’s 5-stage model, have been<br />

illustrated in order to analyze the use of IT (Information<br />

Technology) in government organizations [1]. In their metasynthesis<br />

approach, Siau and Long integrate five stage models<br />

into a synthesized one on the basis of a systematic comparison of<br />

stages between different models. They illustrate a comprehensive<br />

e-government model whose stages are web presence, interaction,<br />

transaction, transformation, and e-democracy [9].<br />

However, some scholars criticize validity and usefulness of the<br />

stage models. While these stage models are predicated on the<br />

premise that the development process of technology and its<br />

adoption in organizations are an evolutionary phenomenon,<br />

Andersen and Henriksen argue that “not all researchers agree on<br />

106<br />

the suitability of “evolutionistic” development models as a means<br />

for measuring IT capabilities in organizations” and “the individual<br />

phases occur simultaneously and part of different elements of egovernment.”<br />

[1] That is, a development model could regard<br />

development process as discrete and individual stages even<br />

though it is a complex and continuous process in reality.<br />

Despite the weakness of these development models, the authors<br />

claim that the development models have contributed to identifying<br />

the current status of the recent IT or IS phenomenon, enlarging<br />

conceptual discussion about the development process which is<br />

seemingly chaotic, monitoring whether an organization’s use of<br />

IT is on the right track in practice, and planning for future<br />

applications. In particular, a development model helps provide a<br />

systematic approach with regard to characteristics of newly<br />

emerging fields of IT and IS. Given that few studies have dealt<br />

with public apps and to a larger extent the substance of mgovernment,<br />

it is expected that building the public apps<br />

development model helps understand and analyze the result of<br />

empirical approach on public apps systematically.<br />

3. PUBLIC APPS DEVELOPMENT MODEL<br />

The crucial principles applied to building the public apps<br />

development model are citizen-centricity and technological<br />

complexity. First, the more the functions of each public app are<br />

interactive with citizens, the higher its stage is. Jaeger states that<br />

not only do leading e-government strategies emphasize a citizen<br />

centered version of public administration, but e-government<br />

technologies that allow government to determine the identity of<br />

users in order to provide more personalized and responsive<br />

service become every more important [2]. In a broader sense, the<br />

concept of Web 2.0 is also in accord with citizen-centricity. Web<br />

2.0, inspired by Tim O’reilly, refers to the user-centric Internet<br />

environment that is underpinned by the spirit of participation,<br />

sharing, and openness, which emphasizes the utility of Internet<br />

users, rather than that of Internet contents suppliers [8]. Second,<br />

the more the technology of each public app is complex, the higher<br />

the stage of the development model is. According to Siau and<br />

Long, e-government system complexity and integration increase<br />

with the advancement of the e-government stages, which also<br />

implies that the technological advance in the functions of public<br />

apps deserves to be regarded as the higher level of services [9].<br />

More importantly, the authors put more significance on citizencentricity<br />

than technological complexity because the studies<br />

dealing with e-government stage models also suggest that it is<br />

crucial to emphasize the function that facilitates interaction<br />

between public organizations and citizens [2]. Therefore, the<br />

public apps which provide a high level of citizen-centric service<br />

with high level of mobile technology reaches the higher stage than<br />

those which provide a high level of mobile technology with a low<br />

level of citizen-centric service.<br />

In summary, the public app which provides a high level of citizencentric<br />

services with a high level of mobile technology reaches the<br />

highest stage, while the public app which provides unilateral<br />

services with a low level of mobile technology stays at the lowest<br />

stage. Combining these criteria, the authors demonstrate a 6-stage<br />

development model for public apps. More specific description<br />

about each stage of this model is illustrated in Table 1.<br />

Table 1. The public apps development model


Stage Description<br />

1 st stage<br />

(Simple<br />

Demonstration)<br />

2 nd stage<br />

(Complex<br />

Demonstration)<br />

3 rd stage<br />

(Simple<br />

Interaction)<br />

4 th stage<br />

(Complex<br />

Interaction)<br />

5 th stage<br />

(Transaction)<br />

6 th stage<br />

(Transformation)<br />

Public information services, which were provided<br />

through the wired Internet previously, are provided<br />

through a public app. Since it is the beginning<br />

phase of public apps production, service producers<br />

mainly focus on delivery of simple services and<br />

information, such as text, pictures, and video clips.<br />

The functions that increase citizens’ convenience<br />

are not provided at this stage.<br />

The functions that increase citizens’ convenience<br />

by means of mobile technology, such as QR<br />

(Quick Response) code, are provided. For<br />

example, citizens can search for the nearest<br />

facilities from the place where they are located via<br />

LBS (Location Based Service), such as augmented<br />

reality and Google Maps. Government agencies<br />

provide such services in unilateral way.<br />

Government agencies provide the function that<br />

interacts with citizens. For example, public apps<br />

provide Q & A, counseling, and chatting billboard<br />

in order to provide citizens with the opportunity to<br />

ask a question or express an opinion about public<br />

affairs. Also, citizens can report the emergency<br />

situation with short descriptions about situation or<br />

pictures on the spot.<br />

The function that enhances interaction is provided.<br />

That is, interaction between government agencies<br />

and citizens transcends the simple level and<br />

researches the extent that not only citizens but<br />

government agencies are also proactive in citizencentric<br />

services. For example, mutual<br />

communication occurs through SNS (Social<br />

Network Services), such as Facebook and Twitter.<br />

At this stage, public apps provide the two-way<br />

communication service which is possible only<br />

when technological security and trust between<br />

citizens and government agencies are assured. For<br />

instance, citizens can make payment of taxes,<br />

fines, and public merchandise. Also, they can<br />

request package delivery with regard to civil affair<br />

documents via public apps.<br />

Citizens enjoy one-stop service via one public app.<br />

Because public apps are interconnected in terms of<br />

service delivery, any service or information that<br />

citizens want to receive are provided even though<br />

they get access to other public apps. For example,<br />

a public app which is a platform for all of the<br />

mobile public information services plays a role as a<br />

portal for providing one-stop services.<br />

4. EMPIRICAL ANALYSIS<br />

4.1 Methods<br />

In order to identify current status of Korean public apps which can<br />

be downloaded through Apple’s App Store and Google’s Android<br />

Market, the authors examined the entire population of public apps<br />

as of January 31, 2012. Based on the data collected from the<br />

survey, the list of public apps according to the title, app producers,<br />

and mobile platforms were made. Then, not only were the public<br />

apps provided by central government downloaded, but the<br />

characteristics and functions were closely examined in order to<br />

measure the level of each public app.<br />

More specific procedure is as follows. First, two of the authors,<br />

the one who had an Apple iPhone and the other who had an<br />

Android phone, individually observed the contents of mobile<br />

107<br />

services of the public apps that were produced by central<br />

government agencies and that were provided through both App<br />

Store and Android Market. Second, they cross-checked each<br />

other’s findings in terms of the functions and characteristics each<br />

public app was equipped with. Third, the author who had an<br />

iPhone examined the level of central government’s public apps in<br />

the Apple’s App Store and the one who had an Android phone<br />

examined the level of central government’s public apps in the<br />

Android Market.<br />

4.2 Descriptive Survey Results<br />

Some major findings on the public apps from the survey are<br />

illustrated in Table 2 and Table 3. According to Table 2, a total of<br />

701 public apps are provided by central government, local<br />

governments, and public agencies in Korea. The public apps<br />

provided by local governments account for 40.4%, which means<br />

that local governments are the most active providers of public<br />

apps among the three types of public organizations. In addition,<br />

the public apps provided by public agencies including public<br />

enterprises and quasi-governmental organizations (QUAGOs)<br />

account for 36.7%. On the other hand, the public apps provided by<br />

central government agencies account for 22.9%, which suggests<br />

that central government agencies fall behind the rest of public<br />

organizations in terms of provision of public apps.<br />

Table 2. The number of public apps<br />

Central<br />

Government<br />

Local<br />

Governments<br />

Public<br />

Agencies<br />

Total<br />

Frequency 161 283 257 701<br />

Portion (%) 22.9 40.4 36.7 100.0<br />

By contrast, Table 3 illustrates that central government agencies<br />

are the most active providers of public apps in terms of the ratio<br />

of the number of the agencies that produce public apps to the total<br />

number of agencies. That is, 67.3% of the entire central<br />

government agencies provide public apps, while only 43.8% and<br />

39.1% of the entire local governments and public agencies<br />

provide public apps, respectively. Also, Table 3 suggests that<br />

local governments provide more public apps than central<br />

government agencies and public agencies because the number of<br />

local governments is more than that of central government<br />

agencies and public agencies, not because every local government<br />

is active in provision of public apps.<br />

Table 3. Public apps providers<br />

Central<br />

Government<br />

Local<br />

Governments<br />

Public<br />

Agencies<br />

Total<br />

Total 49 224 284 557<br />

Providers 33 98 111 242<br />

Portion (%) 67.3 43.8 39.1 43.4


4.3 Measurement of a Level of Public Apps<br />

In order to measure the level of public apps of Korean central<br />

government, the authors made a check-list on whether each of 161<br />

public apps was satisfied with the specific criteria of each stage of<br />

the model. And then, the level of each public app was determined<br />

as the highest stage where each public app reached. Of 161 public<br />

apps, 13 public apps were excluded because of the unexpected<br />

problems. For example, the authors could not get access to the<br />

public app named “National Tax Service for Businessmen”,<br />

because it was necessary to have a registered business number in<br />

order to log in to this public app. Then, based on 148 public apps,<br />

the authors measured a level of each public app.<br />

Table 4. Measurement of a level of public apps<br />

1 st<br />

stage<br />

2 nd<br />

stage<br />

3 rd<br />

stage<br />

4 th<br />

stage<br />

5 th<br />

stage<br />

6 th<br />

stage<br />

Total<br />

Frequency 24 80 13 24 7 0 148<br />

Portion<br />

(%)<br />

16.2 54.1 8.8 16.2 4.7 0.0 100.0<br />

As shown in Table 4, 54.1% of the public apps provided by<br />

central government agencies satisfy the criteria of the second<br />

stage of the model. That is, more than half of the public apps<br />

provided by central government agencies provide the functions<br />

that increase citizens’ convenience by means of mobile<br />

technology, such as LBS and QR code. In term of interaction<br />

pattern, 70.3% of public apps provide one-way communication<br />

services, while 29.7% of public apps provide two-way<br />

communication service. Also, it is notable that 25% of the entire<br />

public apps provide the functions that satisfy the third and fourth<br />

stage, while only 4.7% of the entire public apps reach the fifth<br />

stage. When it comes to the portion of the public apps that provide<br />

two-way communication service, the authors interpret in the<br />

following ways. First, given that the public apps that satisfy the<br />

third and fourth stage account for 25% of the entire public apps, it<br />

seems that central government agencies try to provide the<br />

functions for promoting interactions with their citizens by<br />

accommodating their questions or opinions through public apps.<br />

Second, it can be said that public apps which provide two-way<br />

communications are at the initial stage. Only 4.7% of the entire<br />

public apps of Korean central government provide the functions<br />

that satisfy the fifth stage, such as mobile payment and mobile<br />

order of package delivery. Diverse possible causes for this<br />

phenomenon can be considered. On the supply side, the weak<br />

leadership for developing higher level of public apps or the low<br />

level of technology which government agencies have could be<br />

major obstacles against providing the fifth and sixth level of<br />

public apps. On the demand side, it is possible to argue that the<br />

demand from citizens on such kinds of public apps is still weak.<br />

5. TENTATIVE CONCLUSION<br />

In this paper, the authors reviewed the literature on m-government<br />

and claimed the necessity to approach m-government empirically.<br />

Regarding public apps as the significant substance of mgovernment,<br />

the authors built the public apps development model<br />

in order to analyze the public apps systematically, and examined<br />

the entire population of public apps. Until now, it is found that the<br />

total number of the public apps provided by central government,<br />

local governments, and public agencies in Korea was 701. Also,<br />

108<br />

local governments were the most active providers of public apps<br />

among the three types of public organizations. In addition, overall<br />

level of public apps of central government is approximately in a<br />

midpoint of the second and third stage.<br />

These tentative results can be interpreted that government<br />

organizations and public agencies in Korea are actively adopting<br />

mobile technologies for delivering public information services in<br />

the era of m-government. On the other hand, Korean public<br />

organizations still have long way to go because the overall level<br />

of public apps are not so high that it cannot be enough to fully<br />

satisfy the citizens’ expectations and future demands for the<br />

transaction and integrative services through public apps.<br />

The authors plan to do as follows in the future. First, the public<br />

apps development model should be complemented reflecting<br />

results of the public app survey. Second, the current status of<br />

public apps should be analyzed more deeply applying various<br />

criteria. Third, the measurement of levels of public apps of local<br />

governments and public agencies will be conducted and the<br />

overall level of the entire public apps in Korea will be examined.<br />

Finally, causal factors for determining the levels of public apps<br />

will be analyzed through statistical inferential analysis.<br />

6. REFERENCES<br />

[1] Andersen, K. and Henriksen, H. E-government maturity<br />

models: extension of the Layne and Lee model. Government<br />

Information Quarterly, 23 (2006), 236-248.<br />

[2] Campbell, J. and Im, T. Beyond ubiquity: mobile<br />

government, theory and practice. In Proceedings of the<br />

KAPA international conference (Seoul, Korea, 2012).<br />

[3] Kim, H., Hong, S., and Joo, S. Performance analysis of<br />

mobile application, in Proceedings of the Korean computer<br />

synthesis conference (Seoul, Korea, 2011).<br />

[4] Kim, H., Lee, H., and Choi, S. An exploratory study on the<br />

determinants of mobile application purchase. Journal of<br />

Society for E-business Studies, 16, 4 (2011), 173-195.<br />

[5] Kumar, M. and Sinha, O. M-government: mobile technology<br />

for e-government. In Proceedings of the fifth international<br />

conference on e-governance (Hyderabad, India, 2007).<br />

[6] Kushchu, I. and Kuscu, M. From e-government to mgovernment:<br />

facing the inevitable. In Proceedings of the<br />

third European conference on e-government (Dublin, Ireland,<br />

2003).<br />

[7] Nolan, R. Managing the computer resource: a stage<br />

hypothesis. Communications of the ACM, 16, 7 (1973), 399-<br />

405.<br />

[8] Ra, J. et al. A study on the strategies of electronic<br />

government services based on Web 2.0. Korea IT Service<br />

Society, 7, 1 (2008), 237-254.<br />

[9] Siau, K. and Long, Y. Synthesizing e-government stage<br />

models: a meta-synthesis based on meta-ethnography<br />

approach. Industrial Management & Data Systems, 105, 4<br />

(2005), 443-458


Understanding Citizens’ Perceptions of E-Government<br />

Services in Mexico<br />

Juan M. Gomez Reynoso<br />

Universidad Autonoma de<br />

Aguascalientes, Mexico<br />

jmgr@correo.uaa.mx<br />

ABASTRACT<br />

Mexico has made significant progress in expanding the<br />

capabilities of e-government services available for citizens.<br />

According to the 2012 UN e-government report, Mexico ranks<br />

28 th among the 179 UN member states, and 3 rd in Latin America<br />

in terms of overall development of online services. However, to<br />

date, little is known about the demand side of online services.<br />

This paper investigates the factors that influence the adoption of<br />

online services in Mexico. Kumar et al. model is used to support<br />

the hypotheses proposed in this paper. An online survey was used<br />

to collect data on citizens’ perceptions about e-government. The<br />

results will be analyzed using multiple regression analysis.<br />

Categories and Subject Descriptors<br />

K.5.2 [Computers and Society]: Governmental Issues –<br />

Regulation, Taxation<br />

General Terms<br />

Measurement, Documentation, Performance, Reliability, Human<br />

Factors, Standardization, Theory, Verification<br />

Keywords<br />

E-Government Services, e-Government Initiatives, Digital<br />

Government, Mexico, Online Services, Adoption, Perceptions<br />

1. INTRODUCTION<br />

Information and communication technologies have transformed<br />

government service delivery over the past twenty years. With the<br />

emergence of the Internet governments have improved their<br />

internal operations and integrated processes and systems across<br />

multiple government agencies. The impact has also been profound<br />

in the provision of services to citizens, who have traditionally<br />

relied on methods such as over the counter service, ordinary mail,<br />

telephone, and fax to interact with the government. Electronic (e-)<br />

government technologies allow citizens to access a full range of<br />

services in a reliable, secure and convenient manner through<br />

different delivery channels (e.g. web sites, portals, cell phones and<br />

electronic kiosks). To date, government services available online<br />

provide at least the necessary information and materials to initiate<br />

a request for services. Sophisticated applications of technology<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Celene Navarrete<br />

California State University<br />

Dominguez Hills<br />

cnavarrete@csudh.edu<br />

109<br />

Rodrigo Sandoval Almazan<br />

Universidad Autonoma del<br />

Estado de Mexico, Mexico<br />

rsandovala@uaemex.mx<br />

provide services with transactional and collaboration capabilities<br />

(e.g. income taxes declaration, car registration, political<br />

participation, electronic voting).<br />

Mexico has made important progress in implementing e-<br />

Government services. According to the 2012 UN e-government<br />

survey, Mexico ranks 28 th among the 179 UN member states, and<br />

3 rd in Latin America behind Colombia and Chile in terms of<br />

overall development of e-government services. Mexico provides<br />

64% of all the assessed services over the Internet, from which<br />

69% show some interactive presence (e.g. downloadable<br />

databases or pdf files), 62% offer transactional capabilities, and<br />

57% include networked presence including e-participation<br />

capabilities. The UN report assessed each country’s national<br />

portal, e-services portal and the websites of the ministries of<br />

education, labor, social services, health, finance and environment.<br />

The success of e-government initiatives depends on the citizens’<br />

willingness to use online services [1]. Previous studies have<br />

analyzed the adoption of e-government initiatives [2, 3].<br />

However, a few studies provide evidence of what drives adoption<br />

of online public services in Mexico. Research suggests that<br />

quality of services, poor informational and transactional<br />

capabilities in government Web sites, preference for payments in<br />

cash over credit card use, and trust in the Internet to carry out<br />

transactions can be central for the utilization of e-government [4,<br />

5]. The purpose of this study is to identify the perception-based<br />

factors that influence citizens’ perceptions of e-government<br />

services in Mexico. This study analyzes e-government adoption<br />

across four types of services: vital records (birth, death and<br />

marriage certificates), vehicle and property tax payments<br />

(ownership tax), and fine payment (traffic, parking, civil fines).<br />

All these services are provided at the state level.<br />

Mexico presents an interesting case of study for understanding egovernment<br />

perceptions. This is a risk-averse culture that tends to<br />

distrust technological innovation [6]. In addition, Mexico has a<br />

large digital and educational divides [7]. According to the 2010<br />

Census, in terms of computer and Internet access, 29% of the<br />

Mexican population has a computer at home, 21% has Internet<br />

access, 43% has a telephone line at home and 65% owns a cellular<br />

phone [7]. Almost half of Internet users utilize the Internet at<br />

home (48%) and 52% at some other location. The largest<br />

percentage of Internet users reside in medium-low households<br />

(46%) compared to 16% the high income bracket, 31% in the<br />

medium-high and 37% in the low levels. A small percentage of<br />

Internet users earned a bachelor’s degree (26%) and 2% owns a<br />

graduate degree. 42% of Internet users completed 6 th to 9 th grade<br />

of elementary education and 29% completed high school.


This paper is organized as follows: First, we provide an overview<br />

of e-government implementation in Mexico. Second, we describe<br />

the model that we will use to analyze perceptions about egovernment<br />

services. Finally, we describe the methodology that<br />

will guide the collection and analysis of data.<br />

2. OVERVIEW OF E-GOVERNMENT IN<br />

MEXICO<br />

Mexico is divided into 32 states, which are made up of 2,454<br />

municipalities. Mexico’s government is divided in three levels:<br />

Federal, State and Municipal (local). All levels of government<br />

have implemented e-Government initiatives. At the Federal level,<br />

a relevant achievement in terms of service delivery is the redesign<br />

of the “Citizen Portal” (Portal Ciudadano, http://www.gob.mx).<br />

This portal provides a search engine that acts as a single point of<br />

entry for information and services of the three levels of<br />

government. For example, a citizen considering applying for<br />

public health coverage can conduct one search to find information<br />

on the national public health care system, whether provided by a<br />

federal, state, or local government source. Simplicity and usability<br />

are the main aspects of the Portal's design.<br />

Figure 1. Citizen’s Portal (http://www.gob.mx).<br />

At the state level, a recent study evaluated the 32 State portals<br />

according to five different components: information, interaction,<br />

transactions, integration, and participation. A team of egovernment<br />

experts used a form including 143 questions to<br />

evaluate the portals. They found that Jalisco is in 1st place moving<br />

up from 5th, Aguascalientes is 2nd moving up 15 positions, Baja<br />

California moves into 3rd place from 7th last year respectively.<br />

On the other hand, Puebla, Durango y Coahuila, move down 15,<br />

12 and 9 positions, respectively [11]<br />

At the municipal level, previous research suggests that many local<br />

governments in Mexico do not have the basic infrastructure for<br />

developing a digital government strategy [8] . According to Gil-<br />

Garcia et al., 360 Mexican municipalities (out of 2,454) are<br />

considered moderately or highly technologically prepared. A<br />

more recent study that analyzed 518 local e-government websites<br />

shows that municipalities are making poor use of IT government<br />

openness, web design and Web 2.0 tools. On the demand side,<br />

services offered are not really meeting the needs of citizens [9].<br />

This might be due to the fact that “IT departments have limited<br />

influence on the main government strategies and they do not have<br />

the appropriate organizational structure, trained staff, or budget to<br />

manage a digital government strategy” (p. 2) [10].<br />

In sum, e-Government implementations at the three levels of<br />

government are evolving; not enough to understand the citizens’<br />

110<br />

needs yet, but sufficiently to promote new government services<br />

online. Studies focus mostly on the functionality characteristics<br />

of Web portals [11-13] and the public policy aspects of<br />

implementations rather than service provision [12]. There have<br />

been a few efforts to analyze the impact of e-Government and its<br />

interaction with citizens. Trust in the government and perceptions<br />

about the reliability and security of the online service delivery<br />

medium are two important drivers of service utilization in Mexico<br />

[5].<br />

3. THEORETICAL BACKGROUND<br />

Adoption of e-government refers to the citizens’ intention to use<br />

public services online, which encompasses the intentions to<br />

receive information, to provide information, and to request<br />

services electronically [14].<br />

This study uses Kumar’s model of E-government adoption [15] to<br />

explain the way citizens are embracing e-government services in<br />

Mexico. According to Kumar et. al., user characteristics, website<br />

design, service quality and satisfaction impact e-government<br />

adoption. User characteristics consist of a) perceived risk, and b)<br />

perceived control. Perceived risk refers to citizens’ concerns<br />

related to the privacy and security of transactions. Previous<br />

research suggests that Mexicans tend to prefer traditional service<br />

delivery methods when the transaction involves disclosure of<br />

personal and financial information [5]. People in Mexico distrust<br />

the Internet to conduct transactions. They also fear their<br />

information could be misused by public servants or other parties.<br />

Thus, we can expect that perceived risk will influence the<br />

behavior of the adoption. Therefore:<br />

H1) Perceived risk about online transactions will influence the<br />

adoption of e-Government services.<br />

Perceived control is defined as user’s perception of being in<br />

charge of the interaction with e-government technologies. If<br />

citizens have more control over the site navigation, the pace or<br />

rhythm of the interaction, and the content being accessed, it can<br />

increase their trust and give them a feeling of more control [15]<br />

ultimately impacting adoption [16]. Therefore:<br />

H.2) Perceived control will influence the adoption of egovernment<br />

services.<br />

Citizen traits that are of interest in understanding adoption include<br />

demographic factors such as age and education. Higher educated<br />

individuals are more comfortable using the Internet to access<br />

information and to shop [17]. Research has shown that individuals<br />

who attain a certain level of familiarity with online purchases tend<br />

to be more confident about their skills to access services online<br />

[18]. Age also influences adoption. Younger adults, especially<br />

those under age 25, are more interested in using new technologies<br />

to access information and services [17].Thus,<br />

H.3) Demographic factors (age and education) will influence the<br />

adoption of e-government services.<br />

Perceptions related to the design elements of a Web site can also<br />

have a direct impact in e-government adoption. According to<br />

Kumar et al. [15], the design of e-government Web sites can be<br />

evaluated based on their usefulness and ease of use. Perceived<br />

usefulness is considered as an extrinsic motivation. It is defined as<br />

the degree that a person assigns to the value of using a particular<br />

information system to improve its work [19, 20]. End-users could<br />

adopt e-Government services when such services deliver a better


performance compared to those provided by traditional means<br />

[21]. Use of a technological innovation can be predicted by its<br />

associated perceived usefulness [19]. Therefore,<br />

H4) Perceived usefulness will influence the adoption of e-<br />

Government<br />

Ease of use is the degree to which the user expects that the target<br />

information system to be free of efforts [19]. An e-Government<br />

service that is perceived to facilitate the interaction process while<br />

being easy to operate is likely to increase citizen’s intentions to<br />

use it [22]. Therefore,<br />

H5) Perceived ease of use will influence the adoption of e-<br />

Government services<br />

Service quality refers to citizens’ perceptions about the<br />

government’s ability to efficiently provide reliable and convenient<br />

online services [23-25]. Reichheld et al. [26] state that service<br />

quality impacts user satisfaction and, ultimately, adoption. Palmer<br />

(2002) identifies quality as a factor that builds trust towards e-<br />

Government utilization. e-Government implementations have the<br />

ability for improving significantly the quality of services provided<br />

to citizens and businesses while attaining greater efficiency for all<br />

participants (Kumar et al., 2007). Thus, understand what citizens<br />

expect from an e-Government service is crucial for governments.<br />

Therefore,<br />

H.6) Perceptions about service quality will indirectly influence<br />

adoption of e-Government services.<br />

Satisfaction is the perception of pleasure which is obtained upon<br />

receipt of a service with quality [15]. Thus, it is very important<br />

that services provided via the Internet not only to be relevant and<br />

efficient, but also they involve the goal of making the user feel<br />

well for using them and not perceived as an imposition by upper<br />

management. Therefore, we believe that:<br />

H.7) Service encounter satisfaction will influence the adoption of<br />

e-Government.<br />

Figure 2 summarizes the constructs discussed above.<br />

User Characteristics<br />

• Perceived risk<br />

• E-Government interaction<br />

• Perceived control over<br />

personal information<br />

• Demographics<br />

Website Design<br />

• Perceived usefulness<br />

• Perceived ease of use<br />

Perceived Service Quality<br />

4. METHODOLOGY<br />

Figure2. Studied Model<br />

eGovernment<br />

Adoption<br />

Users’ Satisfaction<br />

3.1 Sample<br />

We used an online survey to collect perceptions on e-government<br />

in Mexico. The survey aimed to capture information on the<br />

participants’ demographics and e-government perceptions. It<br />

included a total of 38 questions with a 7 point Likert scale ranging<br />

from completely disagree (1) to completely agree (7). An<br />

invitation to participate in the study was sent to public<br />

111<br />

organizations including the National Association of Universities<br />

and Higher Education Institutions (ANUIES in Spanish), National<br />

Institute of Statistics and Geography (INEGI) and a private<br />

financial organization with offices across Mexico. We used<br />

convenience-purposive sampling for data collection [27].<br />

Purposive sampling was appropriate for our study because we<br />

needed participants that already attained some sort of level of<br />

exposure to e-government. Participants with such profile can be<br />

especially useful to understand service utilization. We obtained a<br />

total of 217 responses; all of them were usable. Data were<br />

collected from September to December in 2011.<br />

3.2 Initial Descriptive Analysis<br />

This is a research in progress. Table 1 presents the demographic<br />

profile of participants. We are in the process of analyzing the data<br />

using multiple regression analysis. Additional results will be<br />

presented in the conference.<br />

Table 1. Demographic data<br />

Demographics Values Percentage<br />

Gender<br />

Male<br />

Female<br />

42%<br />

58%<br />

No attended 7%<br />

Finished 6<br />

Education<br />

th grade 17%<br />

Finished 9 th grade 6%<br />

High school<br />

Two-year college<br />

8%<br />

9%<br />

Bachelor 24%<br />

Master 13%<br />

PhD 16%<br />

17 years or less 13%<br />

18 to 24 years 21%<br />

Age<br />

25 - 34 years 26%<br />

35 – 44 years 18%<br />

45+ years 22%<br />

Respondents were asked which types of transactions made<br />

through electronic services; 49% paid vehicle taxes, 55% property<br />

taxes, while 44% different types of fines. Also, 56% made<br />

procedures related to vital records, and 44% responded that he<br />

made use of other services not listed previously.<br />

5. REFERENCES<br />

[1] Carter, L. E-government Diffusion: A Comparison of Adoption<br />

Constructs. AMCIS, 2007.<br />

[2] Carter, L. and Belanger, F. The Utilization of e-Government<br />

Services: Citizen trust, Innovation and acceptance factors. Info<br />

Systems, 15, 1 2005), 5-25.<br />

[3] Bélanger, F. and Carter, L. Trust and risk in e-government<br />

adoption. The Journal of Strategic Information Systems, 17, 2<br />

2008), 165-176.<br />

[4] Navarrete, C. Utilization of Electronic Government Services in<br />

México: A Matter of Trust. The Journal of Community<br />

Informatics: Special Issue: E-Governance and Community<br />

Informatics., 4, 2 2008).<br />

[5] Navarrete, C., Gil-Garcia, J. R., Mellouli, S., Pardo, T. A. and<br />

Scholl, J. Multinational E-Government Collaboration,<br />

Information Sharing, and Interoperability: An Integrative<br />

Model. IEEE, 2010.


[6] Hofstede, G. and Hofstede, G. J. Cultures and Organizations:<br />

Software of the mind, New York, USA McGraw-Hill, 2005.<br />

[7] INEGI. Censo de población y vivienda 2010. INEGI,<br />

Aguascalientes, Mexico, 2010.<br />

[8] Luna-Reyes, L. F., Gil-Garcia, J. R. and Mansi, C. Hacia un<br />

Modelo de Gobierno Electrónico a Nivel Municipal para<br />

México: Reporte de Resultados de Talleres con Directores de<br />

Informática Municipales. Universidad de las Américas<br />

Puebla-INFOTEC, Puebla, México, 2010.<br />

[9] Sandoval-Almazán, R. and Colin, J. M. Gobierno electrónico<br />

en México: una exploración Municipal 2010. Association for<br />

Information Systems, 2011.<br />

[10] Luna-Reyes, L. F., Gil-García, J. R. and Ramírez-Hernández,<br />

F. A Resource-Based View of Local Digital Government: Core<br />

Capabilities for Success from the Case of Mexico. 2011.<br />

[11] Luna-Reyes, L., J., Gil-García, R. and Rojas-Bandera, J. S.<br />

An Exploratory Study of Electronic Government and State<br />

Portals in Mexico. Idea Group Inc, 2007.<br />

[12] Sandoval Almazán, R. Explorando la Brecha Digital en<br />

México. Diagnóstico del Proyecto E-México en el Estado de<br />

México. 2006.<br />

[13] Sandoval-Almazan, R. and Gil-Garcia, J. R. The Role of the<br />

CIO in a Local Government IT Strategy: The case of Merida,<br />

Yucatán Mexico. Electronic Journal of e-Government, 9, 1<br />

2011), 1-14.<br />

[14] Al-Omari, H. and Al-Omari, A. Building an e-Government e-<br />

Trust Infrastructure. American Journal of Applied Sciences, 3,<br />

11 2006), 2122-2130.<br />

[15] Kumar, V., Mukerjil, B., Butt, I. and Persaud, A. Factors for<br />

Successful e-Government Adoption: a Conceptual<br />

Framework. The Electronic Journal of e-Government, 5, 1<br />

2007), 63-76.<br />

[16] Wu, G. Conceptualizing and Measuring the Perceived<br />

Interactivity of Websites. Journal of Current Issues and<br />

Research in Advertising, 28, 1 2006), 87-104.<br />

112<br />

[17] Pew Research Center Internet Use and Home Broadband<br />

Connections Jul 24, 2012.<br />

[18] Carter, L. and Weerakkoddy, V. E-government Adoption: A<br />

Cultural Comparison. Information Systems Frontiers, 10, 4<br />

2008), 473-482.<br />

[19] Davis, F. D. Perceived usefulness, perceived ease of use, and<br />

user acceptance of information technology. Mis Quarterly,<br />

13,31989), 319-340.<br />

[20] Lederer, A. L., Maupin, D. J., Sena, M. P. and Zhuang, Y.<br />

The technology acceptance model and the world wide web.<br />

Decision Support Systems, 29:32000), 269-282.<br />

[21] Plana, C., Cerpa, N. and Bro, P. B. Bases para la creación de<br />

una metodología de adopción de comercio electrónico para las<br />

Pymes chilenas. Universidad Tarapacá, facultad de<br />

ingeniería, volúmen 142006), 49-63.<br />

[22] Warkentin, M., Gefen, D., Pavlou, P. A. and Rose, G. M.<br />

Encouraging Citizen Adoption of e-Government by Building<br />

Trust. Electronic Markets, 12, 3 2002), 157-162.<br />

[23] Carter, L. and Belanger, F. The Utilization of e-government<br />

Services: Citizen trust, Innovation and Acceptance Factors.<br />

Information Systems Journal, 152005), 5-25.<br />

[24] Reddick, C. G. Citizen Interaction with E-Government: From<br />

the Streets to Servers? Government Information Quarterly,<br />

222005), 38-57.<br />

[25] Welch, E. W., Hinnant, C. C. and Moon, J. M. Linking<br />

Citizen Satisfaction with E-Government and Trust in<br />

Government. Journal of Public Administration Research and<br />

Theory, 15, 3 2004), 371-391.<br />

[26] Reichheld, F. F., Markey, R. G. and Hopton, C. E-customer<br />

loyalty – applying the traditional rules of business for online<br />

success. European Business Journal, 12, 4 2000), 173-179.<br />

[27] Neuman, W. L. Social Research Methods (5th Edition).<br />

Allyn and Bacon, Boston, 2000.


Session 5<br />

Information Sharing, Models &<br />

Platforms


Factors Influencing Exchange Activities in Transnational<br />

Knowledge Networks: The Case of the Hajj-MDSS<br />

Mohammed Gharawi<br />

The Institute of Public Administration<br />

P.O. Box 205<br />

Riyadh, 11141, Saudi Arabia<br />

+1 966 476 8888<br />

gharawima@yahoo.com<br />

ABSTRACT<br />

This paper presents selected results from a study of technical,<br />

information, and knowledge exchange in Transnational Public<br />

Sector Knowledge Networks (TPSKNs). The study contributes to<br />

the growing base of theory relating to TPSKNs presented by<br />

Dawes, Gharawi, and Burke [7]. It explores the TPSKN formed<br />

between the United States Center for Disease Control and the<br />

Saudi Arabian Ministry of Health ahead of the 2009 Hajj, one of<br />

the largest mass gathering events in the world. Data collected<br />

from semi-structured interviews with key participants and a<br />

variety of secondary data that were analyzed with an inductive<br />

approach to identify and address the impact of the influential<br />

factors on attaining the stated goals of the collaboration. The<br />

study extends the current knowledge-base regarding TPSKNs into<br />

a new transnational context, and a new policy domain, public<br />

health. It expands upon the considered contexts to include<br />

technological context, central when exchange centers on<br />

implementing a new system or adopting an existing system. The<br />

study also expands understanding of the influential factors<br />

deriving from knowledge and information; organizational; and<br />

national layers of context.<br />

Categories and Subject Descriptors<br />

K.4 COMPUTERS AND SOCIETY, K.4.1 Public Policy Issues,<br />

Transborder Data Flows<br />

General Terms<br />

Theory, Management<br />

Keywords<br />

Transnational Public Sector Knowledge Networks, Knowledge<br />

Sharing, Information Sharing, Cross-Cultural Collaboration, the<br />

Hajj, Saudi Ministry of Health, Center for Disease Control<br />

1. INTRODUCTION<br />

In the era of globalization, governments around the world are<br />

increasingly engaging in Transnational Public Sector Knowledge<br />

Networks (TPSKNs) as appropriate mechanisms for dealing with<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

113<br />

Theresa Pardo<br />

Center for Technology in Government<br />

SUNY Albany<br />

187 Wolf Rd., Suite 301, Albany, NY 12205<br />

+1 518 442 3892<br />

tpardo@ctg.albany.edu<br />

a host of global problems that no one nation or single government<br />

is well-positioned to address individually. Environmental quality,<br />

public health, international trade, and relief efforts relating to<br />

natural disasters are just a few areas where technology,<br />

information, and knowledge need to cross national and cultural<br />

boundaries through channels and mechanisms that are more agile<br />

and less controlled than the formal interactions among sovereign<br />

states [1].<br />

While these networks represent a novel approach to addressing<br />

critical global issues and concerns, they also provide opportunities<br />

for governments to build and diversify their capacities in various<br />

areas and domains. These networks are a key feature of world<br />

order in the twenty-first century, allowing government officials<br />

and organizations to work outside of the formality of sovereign<br />

states to exchange information and coordinate activities to address<br />

problems on a global scale [2].<br />

Several authors have discussed these networks conceptually, and<br />

have described the possibility of empowering them to build<br />

governance capacity around the world [2-5]. There has been little<br />

research conducted, however, which empirically investigates the<br />

complexities surrounding the main function of these networks: the<br />

exchange of different types of content. The dearth of rigorous<br />

study into this phenomenon represents a gap in the pertinent<br />

literature, and a gap in the knowledge available to those<br />

government practitioners who are most likely to engage in these<br />

relationships.<br />

The dearth for theoretical foundations in this area magnifies the<br />

practice gap related to TPSKNs. There have been many binational<br />

memoranda of understanding signed during the past few<br />

years to promote the exchange of technology, knowledge,<br />

information, and practices between governmental agencies; only a<br />

few such documents, however, have been written to guide<br />

practitioners in establishing strategies to manage and guide such<br />

networks. As a result, practitioners engaging in these networks<br />

often lack a clear understanding of the intended nature and<br />

function of a given TPSKN, and further, of the factors which<br />

might promote or hinder its success.<br />

The Center for Technology in Government (CTG) at the State<br />

University of New York at Albany (SUNY) has recently studied<br />

the topic of Transnational Public Sector Knowledge Networks<br />

(TPSKNs) through a National Science Foundation-sponsored<br />

project titled, “Understanding Transnational Public Sector<br />

Knowledge Networks”. The focus of the CTG project centered on<br />

international collaborative efforts to monitor air quality and<br />

reporting initiatives involving the United States and Mexico, and<br />

the United States and China. The project explored the issues


arising as a result of these two bi-lateral collaborations and<br />

analyzed the actual experiences of government and partner<br />

organizations. The resultant conclusions lay the foundation for<br />

future work that goes beyond description, to build a more robust<br />

theory of transnational knowledge- and information-sharing to<br />

better address global problems [6, 7].<br />

This study extends current knowledge about TPSKNs into a new<br />

transnational context involving US and SA and a new policy<br />

domain; public health. It expands context to include technological<br />

context when exchange is centered on implementing a new system<br />

or adopting an existing system. The study also expands<br />

understanding of the influential factors deriving from knowledge<br />

and information; organizational; and national layers of context.<br />

This paper presents selected results from the study that addresses<br />

the following research questions:<br />

o What were the critical factors influencing sharing and<br />

exchange activities during the adoption of the Hajj Mobile<br />

Disease Surveillance System (Hajj-MDSS)?<br />

o What is the impact of the identified factors on attaining the<br />

stated goals of the collaboration?<br />

2. LITERATURE REVIEW<br />

The study is guided by the Dynamic Model of Transnational<br />

Knowledge Networks (DMTKN) developed recently by group of<br />

researchers at the Center for Technology in Government (CTG) at<br />

the University at Albany [6, 7]. The model depicts the contextual<br />

complexity surrounding sharing activities in TPSKNs (Figure 1).<br />

It identifies the contextual elements that characterize the external<br />

and internal environments of the individual organizations that<br />

participate in such networks. These contextual factors are<br />

presented in the model as three layers of complexity: information<br />

and knowledge content; organizational context; and national<br />

context.<br />

Figure 1. Dynamic Model of Transnational Knowledge<br />

Networks [7]<br />

The content layer represents the characteristics of the knowledge<br />

and information being exchanged. Content layer captures the<br />

influence of the existing characteristics of information, and<br />

knowledge being exchanged. Many factors can influence sharing<br />

activities at content layer. While some of these factors are relevant<br />

regardless of the type of content that is exchanged, others become<br />

important only for specific types of content. Thus, the first factor<br />

114<br />

to examine at content layer is the type of content [8]. Following<br />

that, value and sensitivity are to be explored, as they represent two<br />

additional, important factors to be considered when any type of<br />

content is exchanged [9-11] . In the case of information exchange,<br />

the degree of standardization and the existence—or lack thereof—<br />

of metadata describing the information represent additional<br />

factors that has to be considered [9]. Finally, knowledge exchange<br />

is influenced by the degree of embeddedness and articulability of<br />

the exchanged knowledge [13, 14]. Table [1] lists and defines all<br />

such factors which might influence exchange activities at the<br />

content layer of complexity as proposed by the DMTKN.<br />

Table 1. Factors related to technical, information, and<br />

knowledge content<br />

Factor Definition<br />

Type Refers to the type of content being<br />

exchanged (technology, information, or<br />

Value<br />

Sensitivity<br />

knowledge).<br />

Refers to the extent to which the content<br />

being exchanged is perceived as an<br />

organizational, social, or governmental<br />

asset.<br />

Refers to the qualities which make the<br />

exchanged content vulnerable to misuse<br />

or misunderstanding.<br />

Data standards Refers to the extent to which there are<br />

and definitions standard data formats and definitions.<br />

Embeddedness Refers to the degree to which knowledge<br />

is situated in or generated by ongoing<br />

practice and learning by doing.<br />

Articulability Refers to the extent to which knowledge<br />

can be expressed in language, number,<br />

formal procedures, and explicit<br />

techniques.<br />

The organizational context embodies the structures, capabilities,<br />

and constraints of the governmental units involved in the<br />

exchange [6]. The DMTKNs identifies many organizational-level<br />

factors that may influence the effectiveness of TPSKNs. These<br />

factors include the goals and interests of participating<br />

organizations, trust, executive support and organizational<br />

commitment, risks, costs, benefits, authority and hierarchical<br />

structures, organizational culture, leadership, organizational rules<br />

procedures, and regulations, resources, and absorptive capacity [9,<br />

15-18]. Table [2] presents definitions for all such factors.<br />

The national context layer corresponds to the cultures and<br />

political systems surrounding the interaction [1]. Characteristics<br />

of the external environment are likely to influence the sharing in<br />

TPSKNs as indicated by previous research. A review of the<br />

factors which might impede sharing activities at the national level<br />

points to five main factors: national culture [16, 19, 20], laws and<br />

policies [9, 12, 18], political support and interests [15], language<br />

differences [21, 22], and geographic location [14, 22]. Table [3]<br />

presents definitions for the stated factors.<br />

The layers of context, surrounding each participating<br />

organization, represent one of several components of the DMTKN<br />

that emphasize the importance of context in two specific ways.<br />

First, the model depicts the influence of the three layers being<br />

discussed. Second, the layers of context and domestic


elationships among network actors in each country contributes to<br />

a set of contextual distances which represent the differences, in<br />

kind or degree, between the international actors on a set of<br />

influential dimensions: culture, politics, goals and intentions,<br />

organizational factors, ability to form relationships, types and<br />

extent of knowledge, types and extent of resources, physical<br />

location, and available technologies [6, 7]. Variations on these<br />

dimensions form the contextual differences in each country<br />

which, in turn, influence the nature and performance of exchange<br />

processes and interactions and, consequently, products and<br />

performance of TPSKNs [6, 7].<br />

Table 2. Factors related to organizational context<br />

Factor Definition<br />

Goals and<br />

Interests<br />

Trust<br />

Refers to the extent to which participants’<br />

goals and interests are consistent with one<br />

another.<br />

Refers to the degree of confidence or faith in<br />

the intentions and behavior of others (or the<br />

lack of such confidence or faith).<br />

Executive Refers to the extent to which executives and<br />

support and top-level managers from participating<br />

organizational organizations are involved and willing to<br />

commitment commit resources, provide incentives, and<br />

offer direction.<br />

Risks Refers to the extent to which participants<br />

believe their environment, actions, or<br />

relationships threaten something of current<br />

or potential value to their organizations.<br />

Costs Refers to the kind or amount of current or<br />

expected resources and other investments<br />

required of participating organizations.<br />

Benefits Refers to positive results or returns, which<br />

can be financial, societal, political, or<br />

associated with mission performance.<br />

Authority and<br />

hierarchical<br />

structures<br />

Organizational<br />

culture<br />

Leadership<br />

Organizational<br />

rules,<br />

procedures,<br />

and regulation<br />

Resources<br />

Absorptive<br />

Capacity<br />

Refers to formal legal powers, legitimacy,<br />

differences in hierarchical structures, and<br />

formal control over actors and activities.<br />

Refers to commonly accepted and shared<br />

beliefs, values, and practices within the<br />

organization.<br />

Refers to participants’ behavior, such as<br />

taking personal responsibility for actions and<br />

outcomes, providing guidance or direction,<br />

exerting influence, and giving rewards or<br />

punishment.<br />

Refers to the routine, formal policies<br />

defining the ways in which organizations<br />

accomplish their work.<br />

Refers to the extent to which expertise,<br />

funding, infrastructure, staff, technology, or<br />

other suitable organizational assets are made<br />

available.<br />

Refers to the organization’s ability to<br />

identify, assimilate, and exploit knowledge<br />

from the environment.<br />

115<br />

Table 3. Factors related to national context<br />

Factor Definition<br />

Culture<br />

Laws and<br />

policies<br />

Refers to commonly accepted and widely<br />

shared beliefs, values, and practices within a<br />

country.<br />

Refers to formally adopted requirements,<br />

limitations, or obligations which shape and<br />

Political<br />

constrain work practices.<br />

Refers to the support of elected officials and<br />

support<br />

government leaders.<br />

Language Refers to the languages of the participants.<br />

Geographic<br />

location<br />

Refers to geographic or geo-political<br />

locations of the countries involved in the<br />

collaboration.<br />

This study relied on case study methods to identify the factors that<br />

influenced technical, knowledge, and information exchange<br />

during the collaboration between the United States (US) Centers<br />

for Disease Control and Prevention (CDC) and the Kingdom of<br />

Saudi Arabia (KSA) Ministry of Health (MoH) that led to the<br />

adoption of the Hajj Mobile Disease Surveillance System (Hajj-<br />

MDSS) in 2009. In the following two sections, A brief discussion<br />

of the Hajj-MDSS case is provided followed by an overview of<br />

the methods.<br />

3. THE HAJJ-MDSS<br />

The Hajj-MDSS initiative is led by the KSA MoH and US CDC.<br />

It allows rapid detection of infectious diseases among Hajj<br />

pilgrims and enhances prevention and control measures through<br />

real-time surveillance information for public health decisionmaking.<br />

The initiative was launched during the period when swine<br />

flu (Pandemic Influenza A, H1N1) had been declared a global<br />

pandemic. The conditions of the Hajj magnified the risks<br />

associated with H1N1. The Hajj is one of the largest, most<br />

culturally and geographically diverse mass gathering events in the<br />

world, attracting more than 2.5 million people of different<br />

nationalities, languages, races, and genders in Makkah. The<br />

guiding vision was to ensure the well-being of Hajj pilgrims and<br />

therefore maintain global public health security. When H1N1 was<br />

declared a global pandemic in June 2009, the Saudi MoH<br />

organized an international workshop of leading global public<br />

health organizations including the World Health Organization<br />

(WHO), the US CDC, and similar institutions in Europe,<br />

Australia, and China. The goals were to pool public health<br />

knowledge about mass gatherings and review the KSA<br />

preparedness plans, focusing on prevention and control of H1N1<br />

[23]. One recommendation was to implement a Mobile Disease<br />

Surveillance System to monitor the epidemiology of swine flu<br />

among Hajj pilgrims.<br />

Immediately following the workshop, the Saudi MoH officially<br />

requested a proposal from the CDC as it has prior experience<br />

using and adopting such technology in many places around the<br />

world. The Request for Proposal (RfP) was followed by extensive<br />

knowledge- and information-exchange through four main phases.<br />

First was the preparation phase, in which participants worked<br />

toward creating a shared understanding and identifying the<br />

responsibilities of each side. In the second phase, a group of<br />

epidemiologists from the US CDC assisted their counterparts at<br />

the Saudi MoH in developing and customizing the electronic


forms for the system. At the same time, the CDC and the MoH<br />

were coordinating their efforts to obtain the necessary technical<br />

resources. During the third phase, participants conducted several<br />

training sessions to train Saudi public health practitioners on how<br />

to use the system and operate the advanced mobile devices used<br />

with it. They also pilot-tested the system during Umrah—an<br />

Islamic ritual performed at Makkah anytime of year. In the final<br />

phase, participants deployed the system and formed one team to<br />

ensure the effective functioning of the MDSS via timely and<br />

accurate data analysis, and reported the results to top-level<br />

management during the days of the Hajj.<br />

During the four phases of the Hajj-MDSS implementation,<br />

participants exchanged a variety of content. Table [4] lists the<br />

content exchanged among participants, and specifies the content<br />

type. Content type is identified based on the extent to which<br />

content was expressed in written form, the extent to which it<br />

adhered to formal procedures, and the extent to which it<br />

conformed to explicitly stated techniques.<br />

Table 4. Content exchanged during Hajj-MDSS adoption<br />

Phase Content (Type)<br />

Preparation<br />

Technical resource<br />

acquisition and forms<br />

development<br />

Training and pilot<br />

testing<br />

Execution<br />

Information about the context of<br />

the Hajj (Explicit.)<br />

Proposal (Explicit &Tacit)<br />

Forms Design (Tacit)<br />

Systems Requirements<br />

(Explicit)<br />

Training materials (Explicit & Tacit)<br />

Installations (Tacit)<br />

System implementation and<br />

troubleshooting (Tacit)<br />

System’s data (Explicit)<br />

After five months of technical exchange, professional visits, and<br />

joint work, the Hajj-MDSS made its official debut during the<br />

2009 Hajj. The system provided public health officials in KSA<br />

with access to timely and accurate information. They were also<br />

able to monitor nine distinct infectious diseases, and make timely<br />

decisions in responding to unexpected situations. By the end of<br />

the 2009 Hajj, only 73 cases of pilgrims with confirmed pandemic<br />

influenza A (H1N1) were reported, and the Hajj was declared a<br />

success [24].<br />

4. RESEARCH METHODS<br />

This research explores exchange activities in TPSKNs and<br />

identifies the factors which might influence the achievement of<br />

participants’ goals and objectives in TPSKNs. The goal of the<br />

study is to extends the current knowledge-base regarding TPSKNs<br />

into a new transnational context, and a new policy domain, public<br />

health. This is achieved by relying on case study methods to<br />

identify the factors influenced the collaboration between the US<br />

CDC and SA’s MoH leading to the adoption of the Hajj-MDSS in<br />

2009. Given the goal of this research and the Hajj-MDSS case<br />

being introduced, the case study approach is most appropriate, as<br />

its main strength lies in its attempts to efficiently reconcile<br />

complexity, detail, and context [25].<br />

Qualitative data has been collected from in-depth, semi-structured<br />

interviews conducted in person, as well as various secondary data<br />

116<br />

sources, including: government documents, participants’ official<br />

websites, training materials, system manuals, news articles, and<br />

related publications. Nine government officials working for the<br />

Saudi MoH, along with three government officials working for the<br />

US CDC, participated in this study. All participants played critical<br />

roles in the project, and most were involved in all phases of the<br />

project’s implementation. Participants also represent different<br />

management levels, and organizational departments and units. A<br />

purposive sampling using a snowball method was used to identify<br />

individuals for interviews, starting with a single manager at the<br />

Saudi MoH.<br />

Two CDC participants preferred to respond in writing; interview<br />

questions were sent to them, and they responded in writing to the<br />

interview questions. Each in-person interview lasted from 1 to 2<br />

hours. Several participants were contacted later, by phone, to<br />

obtain additional information and for the purposes of clarification.<br />

As all Saudi-side participants being interviewed are native Arabic<br />

speakers, all such interviews were thus conducted in Arabic, as<br />

was the interview conducted with one participant from the CDC<br />

who is native Arabic speaker. The two CDC experts who<br />

preferred to respond in writing received an English version of the<br />

research questions and responded in English.<br />

The unit of analysis of the study is the collaboration aimed at<br />

ensuring the successful implementation of the Hajj-MDSS. The<br />

unit of observation of the study is the individual organizations<br />

who participated in this collaborative effort. The interview data<br />

was transcribed and analyzed in Arabic, and the data collected<br />

from the written response of CDC participants, along with the<br />

aforementioned secondary data sources, were analyzed in English.<br />

All collected data was coded and analyzed with an inductive<br />

approach.<br />

In the course of conducting data analysis, the qualitative software<br />

tool (Atlas-ti) has been used to support coding and analysis<br />

activities. Coding was conducted following two separate<br />

approaches proposed by Strauss and Corbin [26], open coding and<br />

axial coding. Open coding refers to the process of reducing the<br />

data to a small set of themes which appear to describe the<br />

phenomenon being studied. In the context of this research, codes<br />

were added to the coding book when data pointed to any new<br />

concept that could refer to an actor, a product, a process, or a<br />

factor influencing the sharing activities in TPSKNs. The outcome<br />

of this step was a series of different concepts representing the<br />

meaning of the data. After completing the open coding, an axial<br />

coding approach was applied. This process involves putting data<br />

together in new ways by making connections between the already<br />

identified concepts. This was achieved by organizing the initial<br />

codes into different categories which reflected the questions of<br />

interest to this research.<br />

5. FACTORS INFLUENCING TPSKNS<br />

Within the case study, a number of factors influenced technical,<br />

knowledge, and information exchange during the collaboration<br />

toward the adoption of the Hajj-MDSS were identified. This<br />

section discusses these factors in four broad contexts:<br />

technological; knowledge and information; organizational; and<br />

national contexts.<br />

5.1 Technological Context<br />

The collaboration toward adopting the Hajj-MDSS was influenced<br />

by several technical factors as the collaboration involves transfer<br />

of a system to suit a new context. Ease of use, the ability to meet


technical requirements, system features, compatibility, and ICT<br />

infrastructure were identified as main technical factors which<br />

influenced the effectiveness of technical exchange between the<br />

Saudi MoH and CDC.<br />

5.1.1 Ease of Use<br />

The system as implemented is perceived as being easy to use as<br />

revealed by the case study. Participants representing the Saudi<br />

team said: “The system, as a system, was not so complicated.”,<br />

“The system is very user friendly from the perspective of the end<br />

user.” The ease of use of the implemented system minimized the<br />

time and energy required to learn how to use it, and increased the<br />

likelihood of successful adoption within the available time frame<br />

as pointed out by one participant: “Understanding the system and<br />

how it works did not represent an issue for us at all, and we were<br />

able to learn it in a short period of time.”<br />

5.1.2 The Ability to Meet Technical Requirements<br />

The ready availability of the required hardware smoothed the<br />

acquisition of the required resources, which in turn accelerated the<br />

implementation process for the Hajj-MDSS. Participants were<br />

able to avoid challenges stemming from a lack of the required<br />

technical resources, as discussed by participants: “There were no<br />

challenges associated with obtaining the required hardware<br />

devices. The purchasing process was handled smoothly, and was<br />

completed in about one day. The servers, too, were readily<br />

available and inexpensive.”<br />

5.1.3 System Features<br />

The study points to the importance of considering national and<br />

organizational contexts during the selection process of any system<br />

to be adapted to suit a new context. In this instance, the selected<br />

software lacks important features such as the support for Arabic<br />

and the Hijri Calender (HC), which is the official calendar in<br />

Saudi Arabia. Top level management at the Saudi MoH adjusted<br />

to these limitations, and agreed to move forward using the<br />

Gregorian calendar and English language. These limitations did,<br />

however, place an undue burden on those Saudi public health<br />

practitioners who worked with the system, as top level<br />

management at the MoH decided to maintain the existing paperbased<br />

system while integrating the new one.<br />

5.1.4 Compatibility<br />

The selected software relies on Extensible Markup Language<br />

(XML) to facilitate the sharing of structured data across the<br />

different components of the MDSS. While XML is becoming the<br />

standard for electronic data exchange and serves the needs of the<br />

implemented system well, it also carries with it some particular<br />

disadvantages which negatively influenced the potential<br />

effectiveness of the system. In this instance, there was other<br />

required software which was incompatible with XML files. Most<br />

importantly, the XML data format is not compatible with the<br />

InstantAtlas software used to display data for decision makers. To<br />

display the data using InstantAtlas, participants had to translate<br />

the XML data file to a discrete data file manually, which was a<br />

time consuming process. The process influenced the quality of<br />

displayed data to some extent.<br />

5.1.5 ICT Infrastructure<br />

The implemented system is dependent on two telecommunication<br />

modalities: the Internet and a cellular network. The use of these<br />

communication modalities peaked during the Hajj, and resulted in<br />

congested communication traffic, which in turn negatively<br />

117<br />

influenced the functionality of the system during the 2009 Hajj, as<br />

discussed by multiple participants: e.g. “The system relies on a<br />

communication network to facilitate the transfer of data from the<br />

field and public health facilities to the server, using the mobile<br />

phones' SIM cards and the Internet. Network traffic peaked during<br />

the days of the Hajj, leading to critical technical challenges, but<br />

there was no way to discover these challenges prior to the onset of<br />

the implementation process.”<br />

5.2 Knowledge and Information Context<br />

The case study identified codifiability, perception of the content’s<br />

value, sensitivity, and confidentiality as additional factors that<br />

influenced the effectiveness of knowledge and information<br />

exchange during the collaboration toward adopting the Hajj-<br />

MDSS.<br />

5.2.1 Codifiability<br />

A portion of the content exchanged was explicit and easily<br />

expressed in written form [Table 4]. The case study found that this<br />

type of content is easy to share among TPSKN participants. The<br />

ready and frequent exchange of such content allowed participants<br />

to speed up the implementation process, in turn allowing more<br />

time for the exchange of the type of tacit content which required<br />

direct interaction. One clear example of this type of content is the<br />

system requirements that CDC experts sent to their counterparts in<br />

the MoH in written form. Saudi IT specialists commented that the<br />

system’s requirements were clear, and they did not encounter any<br />

difficulties in interpreting them: “The CDC gave us the database<br />

design and the technical specifications of the needed resources.<br />

We studied these specifications on our own and obtained the<br />

required smart phones, servers, and other technical resources.”<br />

5.2.2 Value<br />

All interviewees noted the high degree of transparency, and<br />

stressed that content was freely exchanged between both sides.<br />

One Saudi participant commented: “Any time we were set to<br />

conduct an activity which required the exchange of specific<br />

expertise, we found [the CDC] here and willing to assist.”<br />

Similarly, one CDC participant noted, “We were able to access all<br />

of the information we needed to conduct our work.”<br />

The study focused on data stored within the system. This data<br />

consists of both important information about reported cases and<br />

confidential patient information. Participants answered questions<br />

related to their perception of the value, sensitivity, and<br />

confidentiality of this data. The case study revealed that the value<br />

of this data was limited to decision making during the Hajj, and<br />

for subsequent research purposes. The Saudi MoH presented no<br />

obstacles or objections to sharing this data with researchers. As<br />

the CDC experts were there to assist in decision-making, this<br />

attitude facilitated the exchange of system data amongst and<br />

between all participants as revealed in the case study.<br />

5.2.3 Sensitivity<br />

In this case, while participants from the Saudi side discussed the<br />

insistence of the Saudi MoH on having control over the data<br />

stored within the system as they consider such data as being<br />

sensitive, the preference for having full control over the data did<br />

not influence the intention to share that data with the CDC, as the<br />

study has shown. This would not have been the case, however, if<br />

the intention of the CDC had been to secure full access, retain full<br />

control over the data, or connect the system to other existing<br />

systems. Providing evidence for the latter statement requires


further investigation of the relationship between the “intention to<br />

have control” and “the intention to share”, presenting one avenue<br />

for further research.<br />

5.2.4 Confidentiality<br />

The system’s data was considered to be confidential by<br />

participants representing the Saudi MoH as it contains patients’<br />

information. Such confidentiality did not prevent the CDC team<br />

from accessing the data required to conduct their work effectively<br />

and efficiently, although it did restrict the means of access, as<br />

explained in following quote: “Data were all secured, and located<br />

in the server, so that no individual could gain access to it without<br />

prior permission. The specialists from the CDC were able to<br />

access some data independently, and we provided them with the<br />

aggregated data as needed, so that they could assist us in the<br />

analysis. As a result, they were able to access the aggregated data,<br />

and there was no pressure exerted on their part regarding full data<br />

access.”<br />

5.3 Organizational Context<br />

A number of organizational-level factors were identified in the<br />

course of the case study. These factors include: goals and<br />

interests, values, trust and past relationships, executive support,<br />

authority and hierarchical structures, leadership, resources, skills,<br />

capabilities, commitment, organizational culture, and perceived<br />

risk.<br />

5.3.1 Goals and Interests<br />

The goals and interests of participating organizations played<br />

significant roles in bridging the intention distance, and thus in<br />

promoting and sustaining the collaboration. This can be attributed<br />

to three distinct factors: the alignment between the goals of<br />

collaboration and the respective missions and visions of both the<br />

Saudi MoH and the CDC; the consistency of the goals of<br />

collaboration amongst the various participants; and, mutual<br />

interest.<br />

For the Saudi MoH, the Hajj-MDSS discussed in this case study<br />

represents one element of a larger set of tools and strategies which<br />

were implemented to address the challenges imposed by the<br />

H1N1 pandemic during the 2009 Hajj. Accordingly, the goals of<br />

implementing this system were linked to other, larger, goals. One<br />

manager at the Saudi MoH pointed out that, “The ultimate goal of<br />

this collaboration was to protect the well-being of Hajj pilgrims.”<br />

In a similar vein, the goals of the collaborative effort were closely<br />

aligned with the CDC's vision and stated mission. Historically, the<br />

CDC has used its scientific expertise to assist other countries in<br />

improving their public health capacities and conditions for more<br />

than 60 years. It follows that assisting the Saudi MoH in<br />

implementing a system for monitoring H1N1, and controlling the<br />

spread of a major global pandemic, was aligned with that part of<br />

the CDC mission which focuses on “collaborating to create the<br />

expertise, information, and tools that people and communities<br />

need to protect their health (HHS, 2012).” One participant at the<br />

CDC responded to a question asking about the primary goals of<br />

the CDC by saying: “The main purposes of all CDC international<br />

activities are two-fold: sharing experiences, and building local<br />

capacity.”<br />

Second, the consistency of the goals of collaboration amongst<br />

participants played significant role in the success of the<br />

collaboration. As revealed in the case, participants were clearly<br />

and consistently working toward achieving the same goals.<br />

118<br />

Accordingly, they were able to avoid conflicts, and focus<br />

exclusively on achieving their mutual goals. Also, working<br />

towards the same goals enhanced the productivity of participants<br />

from both sides, and led to an open environment where<br />

participants were better able to freely exchange their expertise.<br />

Finally, it is evident that the Saudi MoH was in need of assistance<br />

in implementing the Hajj-MDSS in a period covering less than<br />

five months. As such, there was a real and acute need to<br />

collaborate with the CDC, which possessed the experience and<br />

expertise required to ensure successful implementation. Regarding<br />

the CDC, participants on the Saudi side believe that the access the<br />

CDC obtained to the Hajj through this collaboration added to the<br />

accumulated experiences, and thus to the potential effectiveness,<br />

of the CDC and its researchers.<br />

5.3.2 Values<br />

Participants pointed to organizational values as one of those<br />

organizational characteristics which motivated the Saudi MoH to<br />

collaborate with the CDC. While one participant said: “The CDC<br />

is an organization that has values, and that is why the management<br />

at the MoH was so welcoming towards the idea of a collaborative<br />

effort. When the CDC’s experts come to you, they come to do the<br />

work and give you the knowledge and expertise you need. Also,<br />

they don’t flatter you, or tell you everything is OK. They get<br />

directly to the point and propose clear solutions.”, another one<br />

commented, “I recommend government organizations avoid<br />

collaboration with counterparts that look for profit, and which<br />

lack collaborative values.”<br />

5.3.3 Trust and Past Relationships<br />

Trust played a significant role in establishing, developing, and<br />

maintaining inter-organizational relationships. This was evident<br />

throughout the duration of the collaboration between the Saudi<br />

MoH and the CDC. One participant commented: “Mutual trust is<br />

the most important factor in any transnational collaboration.” The<br />

high level of trust was a product of the historical relationships that<br />

bridged relational distance. The existing relationship also helped<br />

to bridge organizational and knowledge distances, and allowed<br />

both organizations to get to know each other still further, as<br />

commented on by one of the participants: “Previous collaborative<br />

efforts contributed to the success of the system we implemented<br />

during the Hajj. We did not start from scratch, as they already had<br />

prior experiences with our program, and they were familiar with<br />

its strengths. At the same time, we knew what they had to offer,<br />

their capabilities and their skills.”<br />

5.3.4 Executive Support<br />

The case study found that the support of top executives played a<br />

critical role in promoting the collaborative process by dedicating<br />

additional resources as needed. Participants at the management<br />

level discussed the effect of executive support and involvement,<br />

and said: “The minister and the Deputy Minister of the AAPM<br />

provided unlimited support, and gave us unlimited authority to<br />

acquire all of the resources needed to ensure the successful<br />

implementation of the system.”, “The support we received from<br />

the minister played a major role in the eventual success of our<br />

collaboration with the CDC. I believe the access to our minister<br />

was very easy, and this made our entire mission easier. Without<br />

that access, and his presence and follow-ups, our work would<br />

have been much more difficult.”


5.3.5 Authority and Hierarchical Structures<br />

In this case, the main agency involved in the collaboration from<br />

the Saudi side possessed the authority to collaborate with any<br />

international agency, to address any public health issue or<br />

concern. This authority to collaborate played a significant role in<br />

initiating the transnational relationship as discussed by one top<br />

level manager at the Saudi MoH. The data also revealed that there<br />

was delegation of authority to various team members working on<br />

the project. The delegation of authority allowed participants to<br />

speed up the implementation and resource acquisition processes,<br />

as revealed in the case study. Besides, the hierarchical structures<br />

facilitated the acquisition process of all needed resources as the<br />

primary leader on the Saudi side was the Assistant Deputy<br />

Minister of Health for Preventive Medicine and at the same time<br />

the Chairman of the Supervisory Committee for Preventive<br />

Medicine during the Hajj. Through him, the team was connected<br />

directly to the Minister in all matters related to the needs of the<br />

project. On the other hand, the hierarchical structure of the CDC<br />

allowed those CDC participants who were also representing the<br />

Center for Global Health to readily acquire the needed knowledge<br />

and information resources. One participant representing the CDC<br />

team said: “The CDC’s organizational structure is more horizontal<br />

at a higher level, and that allows the CGH to get support from any<br />

subject matter expert inside the CDC, in any office.”<br />

5.3.6 Leadership<br />

Leadership was revealed as one of the critical factors positively<br />

influenced the coordination and management of all aspects of the<br />

collaboration. The formal authority of the primary leader of this<br />

collaboration on the Saudi side was used mainly to facilitate the<br />

acquisition of needed resources, as has been discussed. This<br />

formal authority to command was not evident, however, in the<br />

interaction with those participants who were assigned to work on<br />

the project from the Saudi side. In fact, the power gained through<br />

formal authority was used to guide cooperation, rather than to<br />

direct actions, as discussed by participants. In his effort to further<br />

guide cooperation, than main leader from the Saudi’s side acted as<br />

a focal point between all participants, at all levels. He explicitly<br />

stated that the most critical task in collaboration such as this is to<br />

maintain open channels of communication between all<br />

participants at all levels.<br />

5.3.7 Resources<br />

The ready availability of needed resources contributed<br />

significantly to the sustainability of the collaboration during the<br />

2009 Hajj, and to the overall success of the project. One manager<br />

commented, “The slogan of the government during the Hajj is<br />

‘take whatever resources to accomplish the work.’” He added,<br />

“All resources were in place for this project.” The case study<br />

revealed three types of resources that participants brought to bear,<br />

and which were critical for the eventual success of the<br />

collaboration: financial resources, human resources, and<br />

knowledge and information resources. The availability of funding<br />

resources was critical to the success of the collaboration in<br />

general, and central to the speed with which the proposal was<br />

agreed upon in particular. Little time had to be spent in searching<br />

for funding sources, or on negotiating funding responsibilities.<br />

Participants discussed the ways in which financial resources<br />

facilitated the acquisition of technical resources, eased logistical<br />

concerns, and facilitated the face-to-face meetings which were<br />

critical in bridging the physical distance and enhancing the ease of<br />

119<br />

communication amongst participants toward exchanging tacit<br />

content.<br />

As with regard to human resources, the Saudi MoH and the CDC<br />

each nominated highly skilled professionals to carry out the<br />

implementation. Additionally, all human resources at the Saudi<br />

MoH were made available to the project as needed. For example,<br />

the adoption of the system required trained health care<br />

practitioners to work on mobile surveillance during the Hajj.<br />

Those personnel were made available, and assigned to obtain the<br />

training required to work on the system ahead of time.<br />

Finally, both countries brought considerable surveillance expertise<br />

to the project. While the American team members were more<br />

advanced in using mobile technology in disease surveillance,<br />

Saudi participants brought to bear a greater knowledge of the<br />

unique conditions associated with the Hajj. These different forms<br />

of knowledge were needed in equal amounts to ensure a smooth<br />

and successful adoption of the system as discussed by multiple<br />

participants.<br />

5.3.8 Skills<br />

The case study revealed two skills, both of which clearly and<br />

positively influenced the eventual outcome of the collaboration<br />

between the Saudi MoH and the CDC. These skills are described<br />

as: project management skills, and team working skills. One<br />

participant pointed to the project management skills brought to the<br />

collaboration on the part of the CDC team as one of the factors<br />

that led to a successful completion within the time frame available<br />

to participants while another Saudi participant discussed team<br />

management skills, how they were able to learn those skills, and<br />

how those skills in turn played a significant role in the eventual<br />

success of the collaboration. He said: “One of the most important<br />

things was the team management skills that we were able to<br />

practice during our work with the CDC experts on this project.”<br />

5.3.9 Capabilities<br />

In addition to the enumerated skills, the case study also revealed<br />

certain capabilities that positively influenced interaction among<br />

the participants. These capabilities include the ability to work<br />

across different cultures, the ability to work across various areas<br />

and domains, and absorptive capacity. The CDC specifically<br />

recruited participants who were able to work across different<br />

cultures. Most participants from the CDC had a long history of<br />

doing so; some such prior experiences shared the Islamic cultural<br />

dimensions, as well. In addition, two CDC participants were<br />

fluent in Arabic. On the other hand, all participants recruited by<br />

the Saudi MoH were fluent in English. These characteristics<br />

facilitated communication and better understanding among all<br />

participants, as revealed by the case study. Additionally, both the<br />

CDC and the MoH assembled teams that were able to work across<br />

multiple involved areas. The ability of participants to work across<br />

involved areas bridged the knowledge distance and increased the<br />

likelihood of the project’s success. Finally, the ability of the Saudi<br />

participants to identify, assimilate, and exploit knowledge from<br />

their CDC counterparts played a significant role in achieving the<br />

CDC's goals, which were focused on building the capacity of the<br />

Saudi MoH in using mobile technology to assist in disease<br />

surveillance. One participant from the Saudi side commented:<br />

“The CDC’s experts did not express any kind of difficulty in<br />

working with us. The areas in which we work are the same areas<br />

in which they work, so there were no barriers at all.”


5.3.10 Commitment<br />

Both personal and organizational commitments were evident<br />

throughout all phases of the project and critical to both the success<br />

and the sustainability of the collaboration. The CDC provided an<br />

ideal example of organizational commitment when it continued to<br />

provide technical assistance over the following two years. At the<br />

personal level, participants from both sides were highly<br />

committed. Their commitment was most clearly demonstrated<br />

during the days of the Hajj, as they were routinely working in<br />

excess of 12 hours a day. In addition, the case study revealed that<br />

Saudi participants carried out tasks beyond their defined roles and<br />

responsibilities.<br />

5.3.11 Organizational Culture<br />

The orientation of the Saudi MoH toward transparency and<br />

openness was revealed to be an important factor throughout the<br />

course of this collaboration, and one which influenced the<br />

attitudes of participants towards sharing knowledge and<br />

information. Participants from the Saudi side discussed that<br />

orientation, and how it helped promote the eventual success of the<br />

collaboration: “It would be unreasonable to bring experts in and<br />

then withhold information from them. That simply means you will<br />

not realize the full benefits of cooperation.”<br />

The case study also found that organizational culture could<br />

impose a negative influence. This occurs when collaboration<br />

involves requirements that are not consistent with said<br />

organizational culture. For example, the system proposed by the<br />

CDC allows access to the server through the Internet. That fact<br />

was not considered by the Saudi MoH when they obtained the<br />

SIM cards however, as those purchased allowed access only to the<br />

internal network of the MoH. In this instance, the behavior of the<br />

Saudi MoH emphasized the influence of that part of the Saudi<br />

MoH's organizational culture which values security over<br />

flexibility, and control over cost-effectiveness. These differences<br />

resulted in some challenges during the preparation of the demo lab<br />

for the trainees to practice what they had learned. The challenges<br />

were resolved by participants during the training phase.<br />

5.3.12 Perceived Risk<br />

Perception of risk was identified as a critical factor that influenced<br />

the potential outcomes of the collaboration. One participant said,<br />

“The main risk was that the system would not work.”<br />

Accordingly, the top level management decided to continue<br />

operating the routine surveillance system already in place while<br />

implementing and testing the new Hajj-MDSS. While the two<br />

systems worked fine alongside one another, they resulted in high<br />

overhead costs and placed an undue burden on those health care<br />

practitioners who were reporting the cases.<br />

5.4 National Context<br />

The case study revealed five distinct factors relating to the<br />

national context. Three such factors are identified as enablers—<br />

political support, political relations, and national events—while<br />

the remaining two—national law and national language—are best<br />

described as barriers.<br />

5.4.1 Political Support<br />

Political support was evident throughout all phases of the project.<br />

The speed with which the Saudi government approved the<br />

collaboration with the CDC to implement the Hajj-MDSS, and the<br />

funds it provided, demonstrated the role that political support<br />

plays in initiating, sustaining, and shaping the outcomes of<br />

120<br />

collaboration with the CDC. Top level managers at the Saudi<br />

MoH discussed the positive effects of political support in detail:<br />

e.g. “The AAPM received unlimited support from the government<br />

and the minister. That support opened plenty of doors for us, and<br />

without it we wouldn’t have been able to accomplish anything.”<br />

5.4.2 Political Relations<br />

In this case, the strong relations between the KSA and the US<br />

bridged political distance and led to a stable collaborative<br />

environment, which facilitated the joint activities of participants<br />

and improved the outcome of the entire collaborative endeavor.<br />

Top level management from the Saudi side discussed the roles<br />

that strong political relations had played in facilitating the<br />

logistical issues such as entry visas. Also, they believed that prior<br />

collaboration at the political level had helped to promote<br />

collaboration with the CDC, and served to enhance the eventual<br />

outcomes. Leaders at the CDC shared a similar outlook, and<br />

pointed to the relationship between the US and the KSA as a<br />

facilitator for achieving better public health outcomes. One CDC<br />

participant did state, however, that the CDC’s intention to<br />

collaborate with any country that needs assistance is never<br />

influenced by how that country relates to the US at the political<br />

level.<br />

5.4.3 National Events<br />

Participants pointed to the Hajj and its importance as one of the<br />

main success factors. They discussed different aspects of the<br />

project that were promoted by the fact that the project was<br />

implemented to serve the Hajj and ensure the well-being of<br />

pilgrims. One example of what they said: “If this collaboration<br />

was initiated for a purpose other than the Hajj, or under different<br />

conditions, there would be many more barriers relating to existing<br />

rules and procedures. During the Hajj, all restricting procedures<br />

and bureaucracy diminish, and that contributed to the success of<br />

the project.”<br />

5.4.4 National Laws<br />

The existing laws of the KSA prevent non-Muslims from gaining<br />

entry to the holy cities of Makkah and Al-Madinah. Accordingly,<br />

the core CDC trainers were not able to conduct the last session of<br />

the first phase of training, which was planned to be held in<br />

Makkah. In addition, non-Muslim experts were unable to<br />

accompany the team to Makkah during the execution phase. Thus,<br />

the law added restrictions on the selection process of participants<br />

who provided direct assistance during the Hajj.<br />

5.4.5 National Language<br />

While language did not represent a challenge at the level of the<br />

individual participants, as all participants from the Saudi side<br />

were fluent in English, the influence of national language was<br />

evident on other aspects of the project. One was the lack of<br />

Arabic-language support in the software used, which placed<br />

burdens on participants, as discussed previously. The national<br />

language also increased the amount of effort and energy that<br />

participants from both sides were asked to contribute, to ensure<br />

the successful completion of the training phase. While one<br />

participant took the time to translate the CDC’s training materials<br />

to Arabic, other participants who were fluent in both Arabic and<br />

English were able to act as translators for those health care<br />

practitioners who were not fluent in English during the training<br />

sessions conducted by the main CDC trainers.


6. DISCUSSION<br />

This study expands the concepts and understanding of the factors<br />

related to the three predefined layers of contexts, knowledge and<br />

information content, organizational, and national contexts.<br />

Related to the knowledge and information layer of context, the<br />

case study revealed four factors: codifiability; perceptions of the<br />

content’s value; sensitivity; and, confidentiality. The study<br />

pointed to new ways in which the perceptions of a specific<br />

content’s sensitivity and confidentiality might influence exchange<br />

activities in TPSKNs. As revealed in the case study, the<br />

perception by Saudi participants of the system’s data as being<br />

sensitive did not influence their intention to exchange that data<br />

with their CDC counterparts, although said perception did<br />

influence their intention and desire to have full control over that<br />

data. The same phenomenon can be seen with regards to<br />

confidentiality, in that Saudi perceptions of confidential data—or<br />

data which should be seen as being confidential—did not prevent<br />

the CDC team from accessing the data required to conduct their<br />

work, although it did restrict their means of access to that data.<br />

The case study expands the concepts and understanding of the<br />

factors related to the organizational layer of context as well. These<br />

factors include: goals and interests; trust and past relationships;<br />

executive support; authority and hierarchical structures;<br />

leadership; resources; skills; capabilities; commitment;<br />

organizational culture; and, perceived risk. This research<br />

identified the perceptions of partner’s values as one of those<br />

additional organizational level factors which motivated<br />

collaboration in TPSKNs. Also, the case study discusses the ways<br />

in which the identified factors influenced exchange activities<br />

during the collaboration toward adopting the Hajj-MDSS.<br />

As with regard to the national layer of context, the study discussed<br />

five factors. These factors include: political support; political<br />

relations; national events; national law; and, national language.<br />

The case provided empirical evidence for the influence of these<br />

identified factors and expanded the understanding on the ways in<br />

which they may influence the effectiveness of TPSKNs. For<br />

instance, the case study found that the intention to collaborate<br />

with another country that needs assistance toward addressing<br />

global issues and concerns may not be influenced by relation at<br />

political level while the strong relations at political level still<br />

proved to be significant for ensuring better outcomes. Also, the<br />

influence of national language found to be evident even when all<br />

participants from both sides are fluent and able to speak the same<br />

language.<br />

As the case study was centered on adopting an existing system to<br />

suit a new context, It expands upon the considered contexts to<br />

include a technological context, central when collaboration<br />

centers on implementing a new system or adopting an existing<br />

system. Five distinct factors related to the technological context<br />

were evident in this case. Ease of use, compatibility with other<br />

systems, ICT infrastructures, the ability to meet technical<br />

requirements, and the additional system features, such as culturalrelated<br />

dimensions—e.g. software capable of supporting different<br />

languages and calendars— were identified as additional factors<br />

influencing exchange activities in TPSKNs. Figure 2 depicts the<br />

factors influencing exchange activities in TPSKNs, discussed<br />

above and informed by the collaboration between the MoH and<br />

CDC aimed at implementing the Hajj-MDSS during the 2009<br />

Hajj.<br />

121<br />

Figure 2. Factors Influenced Sharing and Exchange<br />

Activities during the Adoption of the Hajj-MDSS<br />

7. LIMITATIONS AND FUTURE WORK<br />

The research design and methods used by this study have<br />

employed several measures meant to ensure the reliability and<br />

validity of the research and its conclusions. As with any research<br />

endeavor, however, this study is limited in certain respects. One<br />

of the main limitations stems from the low matching level<br />

between those participants representing the Saudi MoH and those<br />

representing the US CDC available to be interviewed as part of<br />

this research. The study faced specific challenges in this regard, as<br />

some CDC participants were unavailable to be interviewed due to<br />

their responsibilities in other countries. Furthermore, Saudi<br />

participants were representative of multiple organizational levels,<br />

from the technical level up to the ministerial level. Such was not<br />

the case, however, with the three CDC participants available and<br />

amenable to being interviewed. Participants from the CDC were,<br />

in fact, representative of essentially the same organizational level,<br />

despite the fact that one such participant had acted as a team<br />

leader throughout the collaborative process. The collected data<br />

would certainly be richer had participants from CDC representing<br />

different organizational levels. Finally, since data collection relied<br />

mainly on semi-structured, face-to-face interviews, bias may have<br />

occurred due to the time lag between the timing of data collection<br />

and the end of the project, the differences between the stated and<br />

actual behavior of the participants, the sensitivity of the questions,<br />

and incomplete or inaccurate recall on the part of interviewees.<br />

Future publications will present the remaining findings of the<br />

study and discuss the extended version of the Dynamic Model of<br />

Transnational Knowledge Networks (DMTKNs) that has been<br />

developed based on the presented findings.<br />

8. REFERENCES<br />

[1] Gharawi, M. and Dawes, S. Conceptualizing knowledge and<br />

information sharing in transnational knowledge networks. In<br />

4th International Conference on Theory and Practice of<br />

Electronic Governance. 2010. Beijing, China.<br />

[2] Slaughter, A. A New World Order. Princeton University<br />

Press, Princeton: New Jersey, 2004.<br />

[3] Betsill, M., and Bulkeley, H. Transnational networks and<br />

global environmental governance: The cities for climate<br />

protection program. International Studies Quarterly.,<br />

48(2004), 417- 493.<br />

[4] Raustiala, K. The architecture of international cooperation:<br />

Transgovernmental networks and the future of international


law. Virginia Journal of International Law. 43, 1(2002). 1 -<br />

92.<br />

[5] Setzer, J. Sub-national and transnational climate change<br />

governance: Evidence from the state and city of Sao Paulo,<br />

Brazil. Fifth Urban Research Symposium. Marseille, France,<br />

2009.<br />

[6] Dawes, S., Gharawi, M., Burke, B. Knowledge and<br />

Information Sharing in Transnational Knowledge Networks:<br />

A Contextual Perspective. In 44th Hawaii International<br />

Conference on System Sciences (HICSS-44). Kauai, Hawaii.<br />

2011.<br />

[7] Dawes, S., Gharawi, M., Burke, B. Transnational public<br />

sector knowledge networks: Knowledge and information<br />

sharing in a multidimensional context. Government<br />

Information Quarterly, 29(1): p. S112–S120. 2012.<br />

[8] Nonaka, I. A dynamic theory of organizational knowledge<br />

creation. Organization Science., 5, 1 (1994),14–37.<br />

[9] Dawes, S. S. Interagency Information Sharing: Expected<br />

Benefits, Manageable Risks. Journal of Policy Analysis and<br />

Management., 15,3 (1996), 377-394.<br />

[10] Kogut B., and Zander U., What firms do?: Coordination,<br />

identity , and learning. Organization Science., 7, 5 (1996),<br />

502–518.<br />

[11] Pardo, T. A., Cresswell, A. M., Dawes, S. S., and Burke, G.<br />

B. Modeling the social & technical processes of interorganizational<br />

information integration. Proceedings of 37th<br />

Hawaii International Conference on System Sciences<br />

(HICSS- 37)., Big Island, Hawaii, 2004.<br />

[12] Landsbergen, D. J., and Wolken Jr., G. Realizing the<br />

promise: Government information systems and the fourth<br />

generation of information technology. Public Administration<br />

Review, 61, 2 (2001), 206–220.<br />

[13] Bresman, H., Birkinshaw, J., and Nobel, R. Knowledge<br />

transfer in international acquisitions. Journal of International<br />

Business Studies., 30, 3 (1999), 439–462.<br />

[14] Cummings, J, L., and Teng, B. S. Transferring R&D<br />

knowledge: the key factors affecting knowledge transfer<br />

success. Journal of Engineer, Technological Management.,<br />

20, (2003), 39-68.<br />

122<br />

[15] Eglene, O., Dawes, S. S., and Schneider, C. A. Authority and<br />

leadership patterns in public sector knowledge networks. The<br />

American Review of Public Administration., 37, 1 (2007), 91-<br />

113.<br />

[16] Lucas, L. The role of culture on knowledge transfer: the case<br />

of multinational corporation. The Learning Organizations,<br />

13, 3 (2006). 257-275.<br />

[17] Gil-García, J. R., Schneider, C. A., Pardo, T. A., and<br />

Cresswell, A. M. Interorganizational information integration<br />

in the criminal justice enterprise: Preliminary lessons from<br />

state and county initiatives. In Proceedings of 38th Hawaii<br />

International Conference on System Sciences (HICSS ’38)<br />

(Waikoloa, Hawaii), January 2005.<br />

[18] Pardo, T. A., and Tayi, G. K. Interorganizational information<br />

integration: A key enabler for digital government.<br />

Government Information Quarterly, 24, 4 (2007), 691-715.<br />

[19] Bhagat, R., Kedia, B., Harveston, P., and Triandis, H.<br />

Cultural variations in the cross-border transfer of<br />

organizational knowledge: An integrative framework.<br />

Academy of Management Review, 27, 2 (2002), 204-221.<br />

[20] Narteh, B. Knowledge transfer in developed-developing<br />

country interfirm collaborations: a conceptual framework.<br />

Journal of Knowledge Management. 12 ,1 (2008), 78-91.<br />

[21] Duan,Y., Xu, X., and Fu, Z. (2006), Understanding<br />

transnational knowledge transfer, In Proceedings of the 7th<br />

European Conference on Knowledge Management<br />

(Budapest, Hungary, September 2006). 126-135.<br />

[22] Kerndlmaier, R. Transnational exchange and transfer of<br />

knowledge. In A guidebook for riverside regeneration.<br />

Springer, Berlin: Heidelberg, 2006. 50-61.<br />

[23] Memish, Z., The Hajj: communicable and noncommunicable<br />

health hazards and current guidance for<br />

pilgrims. Euro Surveillance, 15,39 ,(2010), 1-4.<br />

[24] Gulfnews, Five succumb to H1N1 virus during Haj. 2009.<br />

[25] Mangen, S., Qualitative research methods in cross-national<br />

settings. Journal of Social Research Methodology, 2, 2,<br />

(1999), 109-124.<br />

[26] Strauss, A.L., and Corbin, J. M. Basics of Qualitative<br />

Research: Techniques and Procedures for Developing<br />

Grounded Theory. Sage.,Thousand Oaks, CA, 1998.


Information Sharing and Financial Market Regulation:<br />

Understanding the Capability Gap<br />

Djoko Sigit Sayogo<br />

Center for Technology in Government<br />

187 Wolf road, Suite 301<br />

Albany, New York<br />

dsayogo@ctg.albany.edu<br />

ABSTRACT<br />

In testimony on April of 2012 before the House Financial Services<br />

Committee, U.S. Securities and Exchange Commission (SEC)<br />

Chairman, Mary Schapiro, stated that effective information<br />

sharing between financial market actors and their regulatory<br />

bodies is critical to fulfilling the regulatory obligations of the<br />

SEC. The 2008 financial crisis is recognized as a show case for<br />

the risks to the stability of the markets that ineffective information<br />

sharing among supervisory authorities represents. This paper<br />

constitutes a preliminary exploration of the challenges facing<br />

financial regulators building on prior research in the computing<br />

and information science community (CIS). Current literature as<br />

well as data from a recent study of financial market regulation is<br />

used to identify key actors in financial market regulation<br />

information sharing relationships and to begin to outline the<br />

challenges faced in this unique context and the resulting risk if<br />

those challenges go unaddressed. A recently developed theoretical<br />

framework for cross-boundary information sharing (Garcia et al<br />

2007) is used to present insights about challenges and risks from<br />

the literature and the field.<br />

Categories and Subject Descriptors<br />

K.4.1 [Public Policy Issues]: Information Sharing for Regulators<br />

General Terms<br />

Management, Human Factors, Theory<br />

Keywords<br />

Financial Market Regulators, Systematic Information Sharing,<br />

Challenges and Risks Assessment<br />

1. INTRODUCTION<br />

Non-systematic and ad-hoc information sharing practices among<br />

financial market regulatory agencies are regarded as key<br />

contributors to the 2008 financial crisis. The economic crisis of<br />

2008 is a case in point for how ineffective information sharing has<br />

hindered supervisory authorities from detecting vulnerabilities in<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Theresa A. Pardo<br />

Center for Technology in Government<br />

187 Wolf road, Suite 301<br />

Albany, New York<br />

tpardo@ctg.albany.edu<br />

123<br />

Peter Bloniarz<br />

College of Computing & Information<br />

University at Albany<br />

Albany, New York<br />

pbloniarz@albany.edu<br />

global financial markets [24]. Unfortunately, the impact of<br />

constrained and ineffective information sharing on market<br />

regulation was well-known long before 2008. In a 2004 report the<br />

U.S. Government Accountability Office (GAO) called for the<br />

creation of routine and systematic fashion of information sharing<br />

across financial regulators [16] citing the vulnerabilities<br />

introduced as a consequence of gaps in these areas. Challenges at<br />

that time were recognized to include lack of authority, multiple<br />

overlapping jurisdictions, security and sensitivity of information,<br />

and protection of turf [16, 17, 30]. Since then researchers and<br />

practitioners alike have worked to understand and mitigate the<br />

challenges to routine and systematic information sharing in<br />

financial market regulation.<br />

The criticality of effective information sharing to the monitoring<br />

of financial markets and the consequences of gaps in capability<br />

for effective information sharing is increasingly recognized by a<br />

range of national and international organizations. Each of these<br />

organizations is calling for specific and significant investments in<br />

the capability necessary to close the gaps in information available<br />

to and held by regulatory agencies. A statement from The<br />

Financial Stability Board to G-20 Finance Ministers and Central<br />

Bank Governors specifically addressed the need for a future focus<br />

on “information exchange standards in the financial regulatory<br />

and supervisory area” [15]. Testimony from the International<br />

Monetary Fund (IMF) in 2009 indicated the need for more<br />

information disclosure at a high level of granularity to cover the<br />

gap of information among supervisory regulators [24]. Crossborder<br />

cooperation and information sharing was among the ten<br />

recommendations of cross-border bank resolution of the Basel<br />

Committee on Banking Supervision reported by the Bank for<br />

International Settlements [1]. In her testimony on the Lehman<br />

Brothers Examiner’s Report before House Financial Services<br />

Committee in April 2010, Chairman of the US Securities and<br />

Exchange Commission, Mary Schapiro called particular attention<br />

to the critical role of information sharing in meeting public<br />

expectations, “Effective information sharing by regulators is<br />

critical to fulfilling our regulatory obligations, and it is something<br />

that the American public has every right to expect. Cooperation<br />

and coordination with other financial institution regulators is<br />

essential [38]” Information exchange standards, more sharing of<br />

more detailed data, cross-border cooperation and information<br />

sharing are clearly recognized as necessary to ensure financial<br />

regulators meet public expectations.<br />

Previous studies, such as Pardo et al [30] identify various<br />

challenges for financial market regulation. On the other hand, they<br />

did not specify the impact of the challenges to the different actors<br />

of financial market regulation. Davenport and Prusak [5] define<br />

information sharing as “the voluntary act of making information


available to others” [5]. Information sharing involves an exchange<br />

between an information holder and requester in the initial stage<br />

and information sender and receiver in the transfer stage. As a<br />

consequence of the above assertion, to understand information<br />

sharing, we need to identify those involved the sharing<br />

relationship, their role in the sharing process, and the challenges<br />

and risks faced by each actor.<br />

This paper will draw on current literature on information sharing<br />

and integration as well as data about information sharing collected<br />

in interviws with inidividuals with a role in financial market<br />

regulation. Using this literature and data we identify a set of<br />

challenges facing systematic information sharing in financial<br />

market regulation. We map current actors in financial market<br />

regulation, specify their relationships to each other, and identify<br />

challenges and risks for each actor in financial market regulation<br />

information and knowledge sharing. Finally this paper lays out a<br />

foundation for future research in this area.<br />

The paper begins by briefly describing inter-agency information<br />

integration and sharing and introducing the framework proposed<br />

by Gil-Garcia et al [20] as a lens to focus the discussion of the<br />

challenges. Section three describes the method used in this paper<br />

Followed by an introducing to the primary actors in financial<br />

market regulation information sharing. Section four focuses on the<br />

challenges facing financial market regulators in their efforts to<br />

share information. The paper concludes in section five a with<br />

discussion on financial market regulation challenges, actors and<br />

risks and epitomes a set of future directions for research on<br />

information sharing in FMR.<br />

2. INFORMATION SHARING AND<br />

INTEGRATION<br />

This paper uses the framework proposed by Gil-Garcia et al [20]<br />

to examine information sharing in FMR. This interagency<br />

information integration framework is useful for characterizing<br />

sharing activities and for focusing discussions of challenges to<br />

that sharing. Building from a close examination of interagency<br />

information sharing Gil-Garcia et al [20] conceptualize an<br />

integrative framework for constituting interorganizational<br />

information integration [20]. They argue for four components of<br />

interorganizational information sharing, namely: a) interoperable<br />

technical infrastructure, b) integrated data, c) shared information,<br />

and d) trusted social network.<br />

Interoperability, as the first component, is regarded as the most<br />

critical element for systematic sharing or integration of<br />

information across different agencies [33]. Gil-Garcia et al [20]<br />

identified the importance of technical aspects of interoperability<br />

for both hardware and software. They argue that despite the<br />

technical difficulties in developing interoperability, an<br />

interoperable system will make sharing information easier and<br />

provide accurate, protected, and usable information [20].<br />

124<br />

Figure 1. Four Components Interagency Information<br />

Integration<br />

Trusted<br />

Network<br />

Source: Gil-Garcia et al, 2010<br />

Integrated Data Shared Information<br />

Interoperable infrastructure<br />

As the second component, integrated data is critical for sharing<br />

information with multiple organizations particularly when it is<br />

required sharing of information in multiple formats [20]. Common<br />

data elements will significantly improve sharing and integrating of<br />

information across organizational boundaries [20].<br />

The third component, shared information, is recognized as<br />

essential to supporting effective information sharing. Information<br />

sharing systems should be designed around an understanding of<br />

the shared information needed [20]. Sharing of information is<br />

regarded as an initial step toward integrated data [20]. The fourth<br />

component of interorganizational information integration is<br />

trusted social networks. Trust among sharing partners is<br />

considered a prerequisite to successful sharing [33]. A network of<br />

trusted actors significantly influences the effectiveness of<br />

communication and reduces resistance to sharing information<br />

[20]. The level of trust is important to reducing turf barriers and<br />

concern over information misuse.<br />

3. APPROACH<br />

The mapping of the literature on information sharing and<br />

integration draws on three sources; 1) Literature in interagency<br />

information sharing and integration 2).Professional reports on<br />

information sharing challenges in financial markets and 3) Article<br />

on the challenges facing 21 st century financial market regulators<br />

detailing the result of interviews with a set of financial market<br />

regulation professionals published in E-Gov conference [30].<br />

4. ACTORS AND CHALLENGES<br />

4.1 Key Actors in Financial Market<br />

Regulation<br />

Financial market regulation in the U.S. is fragmented with<br />

multiple actors responsible for regulating various segments of the<br />

financial industry [28, 30]. In some cases regulatory responsibility<br />

is overlapping resulting in a web of interconnections and intricate<br />

relationships which is then further complicated by informal and<br />

ad-hoc information sharing practices [28]. To begin to understand<br />

this actors and unpack the unique and overlapping regulatory<br />

responsibilities it is necessary to identify the key actors in the<br />

financial market regulation environment. We identify five actors,<br />

each with different roles and responsibilities and each is with<br />

important and unique relationships with other key actors and other<br />

stakeholders. These five key actors identified are federal agencies,<br />

state governments, SROs (self-regulatory organizations), financial<br />

industry entities (firms, investors, rating agencies), and the public.<br />

Federal and state government agencies share responsibility for<br />

setting regulatory policy, enforcing compliance, supervising, and<br />

monitoring specific sectors of financial market activity. Federal<br />

agencies act as primary regulating agencies for most financial


products (securities, commodities, futures, and others) except<br />

insurance. State governments act as the supplementary regulating<br />

actor for the previously mentioned financial products. The State<br />

governments acts as the primary regulators for insurance [28] with<br />

each state have different regulations for insurance.<br />

The US financial market regulation system is based on a<br />

combination of mandatory regulation sanctioned by government<br />

agencies and voluntary regulation, which in the case of financial<br />

markets, is sanctioned by the SROs (Self-Regulatory Agencies).<br />

SROs are self-regulating agencies that exercise some degree of<br />

regulatory authority over the financial market industry and<br />

professionals One example of an SRO in the U.S. is FINRA<br />

(Financial Industry Regulatory Authority). FINRA is an<br />

independent regulator for securities firms listed and doing<br />

business in the U.S with the mission to protect America’s<br />

investors [13]. To a certain extent, SROs are allowed to generate<br />

supplementary rules and policies [22]. For instance, FINRA is<br />

allowed to generate policies and rules for broker-dealer and<br />

trading markets. SROs serve to supplement the government<br />

regulation or fill the vacuum of an absence of government<br />

oversight and regulation.<br />

Financial industry actors in this paper are those organizations<br />

conducting transactions in the financial market such as firms,<br />

investors, and rating agencies, among others. The interest of<br />

financial industry actors lies in the requirement for compliance<br />

with the regulatory framework. These organization need to<br />

comply and trade within the regulation imposed by the Federal,<br />

State and to certain extent the SROs. The public refers to the<br />

general public who have interest on the conduct of financial<br />

market regulations.<br />

4.2 Challenges to FMR Information Sharing<br />

The need for information sharing capability is not unique to the<br />

context of financial market regulation. Public health, human<br />

services, and public safety are just three of the many policy<br />

domains that require effective information sharing across<br />

boundaries of organizations and jurisdictions and across levels of<br />

government. And in each of these areas various communities of<br />

practitioners and academics work to more fully understand<br />

information sharing and the challenges facing those communities<br />

as they seek to effectively share information in the interest of<br />

program execution and policy development. Creating capability<br />

for routine and systematic information sharing has long been a<br />

priority for the U.S. Justice community, in particular. One of the<br />

most recent products of this focus is the National Information<br />

Exchange Model (NIEM), a national program supported by the<br />

federal government. NIEM represents an ongoing collaborative<br />

partnership of agencies and organizations across all levels of<br />

government (federal, state, tribal, and local) and with private<br />

industry for the purpose of effectively and efficiently sharing<br />

information at key decision points [26]. In recent years, NIEM has<br />

expanded to include other federal and state agencies such as the<br />

Office of the Director of National Intelligence, Federal Bureau of<br />

Investigation, Texas, Florida, New York, Pennsylvania, and others<br />

[26]. In addition to such nationally led efforts, many efforts at the<br />

state level are resulting in the creation of multi-agency, multijurisdictional<br />

information sharing capability. For example, in<br />

2003 a New York State Criminal Justice Information Technology<br />

Group representing 13 different Justice agencies was tasked with<br />

developing a framework for a new approach to state-wide<br />

125<br />

information sharing among criminal justice agencies [20].<br />

Insights from these efforts and others are increasingly available in<br />

both the practitioner and academic literature as resources to<br />

inform and guide information sharing efforts in other domains.<br />

Likewise, this section identifies and integrates challenges from<br />

financial market regulation and interagency information sharing<br />

literature.<br />

4.2.1 Interoperability As the Key<br />

The application and implementation of any information<br />

technology is nested within a particular organizational,<br />

sociological, ideological and political context [7]. Successful<br />

cross-boundary information sharing requires understanding of the<br />

different and diverse business processes and practices within the<br />

actors’ organizations and in the broader context within which they<br />

operate [7]. As argued by Pardo et al [35] interoperability not only<br />

depends on the ability of systems to communicate with one<br />

another, employing shared terminology and definitions, but also<br />

requires management and policy interoperability. An examination<br />

of information sharing in the criminal justice arena indicated that<br />

differences in agency culture is a significant barrier to interagency<br />

information sharing [33], and requires the identification,<br />

understanding and accommodation of existing organizational<br />

cultures within each agency [to enable successful sharing. In this<br />

context, interoperable management and policy is seen as<br />

necessary for each agency to reduce resistance to sharing<br />

information. An understanding of the critical role of<br />

interoperability in cross-boundary information sharing highlights<br />

the need to understand the social processes required to develop a<br />

shared understanding of terms, concepts and information used and<br />

available within each agency [7], particularly considering that<br />

information is not objective, neutral or readily available within<br />

each agency [36].<br />

For organizations to work together to build interoperable systems<br />

to share information, organization leaders must first understand<br />

the information sharing capability found in each sharing partner.<br />

Information sharing capabilities are dynamic, varied,<br />

complementary and multi-dimensional in nature. Leaders must<br />

assess the capabilities held collectively by the network to ensure<br />

the relevancy and appropriateness of capability to become<br />

interoperable [29]. Within a broader view, these dimensions of<br />

capability can be classified into two closely related but distinct<br />

components [29, 34], namely capability to create effective<br />

collaboration and capability to develop new systems and<br />

procedures.<br />

Capability to create effective collaboration includes five<br />

dimensions, namely: business model and architecture readiness,<br />

strategic planning, collaborative readiness, organization<br />

compatibility, and project management. Building capability along<br />

these dimensions is necessary to develop mutual understanding<br />

and to reduce resistance in information sharing and integration.<br />

Strategic planning is important for clarifying roles and<br />

responsibility among participants [32] and to alleviate resistance<br />

to change and incompatibility of technology [11]. Assessment of<br />

business models is necessary to describe service and operational<br />

components of the organization, their interrelationship, and the<br />

technology used for implementation [25]. Assessment of strategic<br />

planning, business model, and collaborative readiness will<br />

generate information to inform understanding of the extent to<br />

which potential sharing partners are incompatible. It also will<br />

inform and ideally, alleviate resistance and interorganizational


conflict around information sharing. Each organization must<br />

understand each other’s missions, strategic planning and needs.<br />

To have this level of understanding, the agencies often engage in<br />

several types of collaborative activities, such as coordinated<br />

planning and training [34].<br />

Capability to develop new systems and procedure is comprised of<br />

six dimensions, including: data assets and requirements,<br />

information policies, resource and project management, and<br />

technology readiness. Data assets and requirements and<br />

information policies assessment refers to assessments of the<br />

ability to provide and encourage sharing through wide-ranging,<br />

clear, and precise information policies and management [31]. This<br />

requirement includes data governance and policies; developing<br />

policies for data stewardship and use [8, 10]. This capability also<br />

relates to the management of resources owned by different<br />

agencies. Appropriate resource allocation and procurement<br />

strategies to support the interoperable system. The technology<br />

readiness consists of three elements, namely: technology<br />

acceptance, knowledge and compatibility. Technology acceptance<br />

refers to the attitudes of actors toward changes bring forth by<br />

technology, reflecting the comfort of actors in accepting a new<br />

technology or initiative, the degree of trust in the new technology,<br />

and the beliefs on the usability and success of technology or<br />

initiative [31]. Technology compatibility refers to the presence of<br />

agreed-upon standards, interconnectivity among those seeking to<br />

share information, and experience of staff with sharing activities<br />

[4].<br />

4.2.2 Integrated Data<br />

Two interrelated issues in the development of integrated data,<br />

namely: developing linked data and ensuring data integrity and<br />

quality, were identified through the literature review and field<br />

study.<br />

a) Ensuring Data Quality and Integrity<br />

Data has a central role in financial markets. Regulators as well as<br />

firms need data for a variety of reasons; not the least of which is<br />

to protect consumers. Consumer protection, like other uses<br />

regulators and firms make of the data available to them, requires<br />

data to be of high quality and integrity.<br />

The process of ensuring that data from trading, surveillance and<br />

compliance activities is of sufficient quality for the specific or<br />

intended use can be a daunting task. Financial market data come<br />

from many organizations; broker-dealers, banks, and other<br />

sources, with many different data management cultures. Ensuring<br />

a high quality, integrated data infrastructure, including<br />

sophisticated data management strategies, represents a significant<br />

cost [30]. Monitoring the markets in the new environment of<br />

trading; with ever increasing transaction speeds and the<br />

production of vast amounts of data requires whole new classes of<br />

technology and a new approach to data management.<br />

b) Developing Linked Data<br />

Developing shared terminology and common definitions is one<br />

element of creating an interoperable system [27]. Daniel Tarullo’s<br />

statement [40] in front of US Senate points at two important<br />

issues for better oversight mechanism in financial market 1)<br />

access to high-quality and timely data that are organized and<br />

standardized for supervisory agencies, and 2) the availability of<br />

data in appropriate usable form to other government agencies. His<br />

126<br />

assertion implies data sharing will occur through standardization<br />

and linked data [40]. The November 2009 NRC (National<br />

Research Council) workshop describes the need for standard<br />

language development to enable data aggregation, interpretation,<br />

and analysis to support for controlling systematic risks [12].<br />

Technically, the development of common language and schema<br />

through ontology will enable a linkage of different systems which<br />

would support more systematic and routine sharing. The ontology<br />

will enables the creation of “shared and common understanding of<br />

a domain that can be communicated between people and<br />

application systems [6]”, and served as a language to support data<br />

translation and queries from different system design [23]. The<br />

development of common language facilitates automatic reasoning<br />

about financial systems and proposed regulations, sharing a<br />

common understanding of financial structures, and facilitating the<br />

analysis of interrelationship in financial domains. Effort toward<br />

developing linked data for financial market is already being<br />

invested in. For instance, O’Riain et al [27] proposing a linked<br />

data driven information systems for integrating financial data<br />

from multiple web sources. They further outline the challenges<br />

and issues in addressing data integration in financial market<br />

regulation, namely: a) an increase in data inter-dependencies, b)<br />

data quality and c) three different types of mismatch: text/data,<br />

schema, and abstraction level mismatch [27]. Despite growing<br />

research on ontologies for the financial domain, there is still a<br />

great need for a stronger and more focused connection between<br />

regulatory and systematic risk.<br />

4.2.3 Challenges to Sharing Information<br />

As argued by Gil-Garcia et al [20], sophisticated systems do not<br />

necessarily provide effective platforms for information sharing.<br />

Integrating and sharing information across different agencies is a<br />

difficult endeavor to undertake. For example, Agencies sometimes<br />

act defensively in protecting what they see as their own “turf”;<br />

which in this case is their data [21]. The challenges confronting<br />

agencies as they work to share their information with other<br />

entities range from political and managerial to technical. This<br />

section introduces some of these importance challenges.<br />

a) Collaborative Governance Structure and Sharing Strategies<br />

Agency resistance to sharing information is typically driven by a<br />

variety of reasons, such as to avoid additional costs related to<br />

changes, to control risks, to protect autonomy and adversarial<br />

position [21], and to shun “reputation risk”, that is a risk of being<br />

relevant to the market and losing power over the market [30]. As a<br />

result, agencies need to enact strategies to reduce the risks of<br />

information sharing.<br />

One of the strategies proposed by Pardo, Gil-Garcia and Burke<br />

[33] is through the development of an effective collaborative<br />

governance structure organized around the expectation that<br />

agencies will be sharing information. They further outline six<br />

determinants of an effective collaborative governance structure: 1)<br />

knowledge of information needs, 2) knowledge of the<br />

environment, 3) willingness to accommodate to the diversity of<br />

participating organizations and their goals, 4) knowledge about<br />

participating organizations, 5) existing legislation, and 6)<br />

executive involvement [33].<br />

Developing information sharing and integration capability also<br />

requires leadership and legislative support [21]. To achieve<br />

interoperability across the boundaries of agencies, levels of<br />

government, and even across national boundaries, requires


leadership and authority from the most top levels of<br />

government. Because only the highest level of authority will<br />

enable the formation of secure strategic partnership, build<br />

comprehensive planning, secure necessary resources, and handle<br />

conflicting interests across different agencies to sustain the<br />

governance of multi-agencies network [34].<br />

b) Lack of Authority<br />

Lack of legal authority to access information was a challenge<br />

faced by many state insurance regulators [16]. For instance, state<br />

insurance regulators do not have the authority to access the FBI’s<br />

nationwide criminal history record. As a consequence, state<br />

insurance regulators have limited ability to prevent individuals<br />

with serious criminal records from entering the insurance business<br />

in their states. Inter-state migrations complicate the issue when<br />

individuals with serious criminal histories move around [16].<br />

The lack of authority for access is magnified by fragmented<br />

regulatory structures which often overlap. Financial industry<br />

actors and insurance companies find themselves regulated by<br />

different institutions with different approaches to regulation. The<br />

fragmented structure creates two prominent challenges, a)<br />

duplication and overlap of regulation and b) competition among<br />

regulators to be the first to protect consumers and to appeal to the<br />

public [30, 37]. The overlap and competitiveness leads to<br />

redundancy and causes higher costs for firms and regulatory<br />

agencies. It also creates confusion for firms as they must choose<br />

which regulators to comply with. This situation also challenges<br />

regulators themselves as they work to understand how firms are<br />

operating within the multiple fragmented and overlapping systems<br />

of regulation [30, 37].<br />

A proliferation of complex hybrid financial products increases<br />

complexity of authority questions and hinders the ability of<br />

regulators and consumers alike to identify and mitigate potential<br />

risks. The multiple jurisdictions governing the markets is<br />

recognized as not only obstructing the oversight of hybrid<br />

financial products, but also confusing consumers [16]. For<br />

instance, consumers might lodge a complaint about a hybrid<br />

product with wrong regulator and as a consequences the<br />

complaint is not properly resolved by the appropriate regulator.<br />

To complicate the matter, the lack of a central body facilitating<br />

information sharing or negotiating agreements about what<br />

information could and should be shared means that the<br />

appropriate regulator is often left in the dark [19]. The result is<br />

that regulators are left with limited views of issues in the financial<br />

market that impede their ability to deduce potential problems in<br />

the market.<br />

c) Lack of Enforcement Action from the Current Sharing<br />

Mechanism<br />

The Memorandum of Understanding (MOU) is the primary<br />

mechanism used to establish information sharing agreements.<br />

However, the MOU has been criticized for a lack of enforceable<br />

actions which challenges the extent of sharing. The MOU was<br />

criticized for a high reliance on the “soft power of persuasion”<br />

and willingness to cooperate, instead of taking a coercive<br />

approach [3]. The effectiveness of an MOU largely depends on<br />

the “goodwill” of the counterparties signing the MOU. In<br />

addition, compliance with an MOU also depends on the<br />

underlying legal authority and jurisdictions of each party [14]. In<br />

a similar manner, multilateral arrangements across nations, as a<br />

form of MOU, were also criticized for the high information<br />

127<br />

asymmetries resulting from differences in legal systems,<br />

supervisory arrangements, social and moral habit, and competition<br />

among financial centers for securities transactions [3, 14].<br />

d) Legacy information systems impede the access<br />

Different regulators maintain different and separate information<br />

systems and these different systems can significantly complicate<br />

routine information sharing. The integration of different legacy<br />

systems or the creation of interoperable system out of existing<br />

legacy systems becomes a major hurdle [30]. Different legacy<br />

systems result in systems that “don’t talk to each other” and create<br />

various “gold copies” of data [30]. Gold copies refer to the<br />

different data captured at different levels, organizations, and<br />

formats. These gold copies pose challenges to data accuracy due<br />

to the different formats and metadata and affect the level of<br />

understanding about the data [30]. Considering that information is<br />

constructed from data, the problem with data accuracy could<br />

distort the resulting information and create major barriers for<br />

routine information sharing.<br />

e) Protection of sensitive data and information<br />

Financial regulators expressed their concern over the protection of<br />

sensitive data and information In particular, they expressed<br />

concerns about the need to balance inclinations to share and the<br />

need to protect different types of regulatory information with<br />

varying degree of sensitivity [16]. The legal structure previously<br />

installed to protect financial market consumers, such as the Bank<br />

Secrecy Acts, sometime prohibit the disclosure of certain<br />

information [19].<br />

This concern is not a unique problem to financial market.<br />

Information security and protection are still major concerns in<br />

information sharing across different federal agencies. Looking at<br />

the case of sharing terrorism related information, shows a variety<br />

of weaknesses in the control of information security in federal<br />

agencies [17]. Based on the 2008 GAO report1, almost all 24<br />

major federal agencies continue to have problems with access<br />

control and security management and about 20 federal agencies<br />

have issues with configuration management for information<br />

protection [17, 18]. Pardo et al [30] also pointed at the challenge<br />

of data protection in the financial market. To share information<br />

with various different agencies necessitate sufficient data<br />

protection. With much information that flows around, regulators<br />

need to ensure adequate protection of privacy and proprietary<br />

information. Systems to protect the data and information against<br />

intrusions exist but the problem lies on the protection of data and<br />

information privacy [30].<br />

The development of information policies for information sharing<br />

and integration can be challenged by two factors, 1) the<br />

conflicting interest of multiple agencies and 2) the tension among<br />

security, privacy and sharing needs [30]. Each financial regulator<br />

governs particular financial segments based on their mission;<br />

these regulators intend to protect their autonomy and adversarial<br />

position that can sometimes conflict with other regulators. As<br />

previously discussed, information sharing requirements are<br />

sometimes hindered by the need to protect sensitive data and<br />

privacy rights. There is a conflicting issue between the need to use<br />

shared information with the need to protect the same information<br />

for being misused [9]. Dawes [9, 10] provides a useful framework<br />

1 http://www.gao.gov/new.items/d09546.pdf


for understanding information policies supporting informationbased<br />

transparency initiative. Dawes proposed a balancing of two<br />

complimentary requirements in the framework, namely:<br />

information stewardship and information usefulness [8, 10].<br />

Stewardship “conveys the idea that all public officials and<br />

government organizations are responsible for handling<br />

information with care and integrity, regardless of its original<br />

purpose or source [9, 380]”. Using this lens, regulators must<br />

handle any information with care regardless of who the initiator or<br />

owner of the information is. This principle requires agencies to<br />

forgo their differences and could alleviate the concern of misuse.<br />

Information usefulness, on the other hand, refers to the principle<br />

that the information is beneficial. Making the information more<br />

accessible provides a wide variety of public and private uses [8,<br />

10]. This framework of stewardship and usefulness provides<br />

useful guidance for financial regulators in developing policy<br />

management to support inter-regulators information sharing and<br />

integration. Policy management refers to the “way to express,<br />

analyze, and realize desired sharing system behavior [39].<br />

4.2.4 Trusted Social Network<br />

Systematic inter-organizational information sharing requires the<br />

creation of networks consisting of various different agencies and<br />

at different levels. A network might consist of organizations with<br />

overlapping business processes and non-standardized but similar<br />

information [35]. It might be populated by officials from various<br />

different agencies, each having different cultures, practices and<br />

rules to follows. The diversity of actors in this network could<br />

generate a range of potential conflicts of interest. Pardo et al [30]<br />

argued that managing conflict of interests among different<br />

regulatory agencies might be regarded at one of the primary<br />

challenges for 21st century financial market regulators.<br />

There exists high competitiveness among different regulatory<br />

agencies, each strives to become or maintain their functional<br />

relevance to the market [30, 37]. Considering the high potential<br />

for conflict and power negotiation among different agencies<br />

involved in regulating financial markets, enacting trusted<br />

relationships becomes key element to ensuring systematic sharing.<br />

Trust within the network could change the way people work,<br />

communicate and share information hence trust becomes the<br />

“catalyst for information sharing [20]”. Regardless, it seems, of<br />

the sophistication of system, communications and sharing still<br />

benefit from strong interpersonal capabilities.<br />

5. CONNECTING FINANCIAL ACTORS,<br />

CHALLENGES, AND RISKS<br />

Drawing on the analysis in the previous sections, we identify eight<br />

challenges to information sharing in financial market regulation<br />

resulting from fragmented regulatory structures in US financial<br />

markets (table 1). These include: 1) lack of authority for crossjurisdictional<br />

products, 2) conflicting organizational cultures, 3)<br />

challenges due to data interdependency and legacy systems, and<br />

4) the need for collaborative governance. In addition, four other<br />

challenges emerge as side effects of institutional responses to this<br />

fragmented structure, namely, a need 5) to develop linked data<br />

and a common language, 6) to protect sensitive data and<br />

information, 7) to develop necessary capabilities for existing<br />

information sharing and 8) to create more robust sharing<br />

mechanisms and policies.<br />

128<br />

The financial market regulatory structure in the U.S. is<br />

fragmented with different actors regulating different products.<br />

Considering the diversity of financial market stakeholders and<br />

their role and interest in the market, the identified challenges will<br />

affect different actors in the financial market differently. For each<br />

of these actors, the different impacts of these challenges represent<br />

the risks that need to be addressed by them. In this section, we<br />

correlate the identified challenges with the primary actors in<br />

financial market regulation and identify the risks associated with<br />

the challenges for each actor (table 1).<br />

The risks that government (federal and state) and SROs face are<br />

comparable and include 1) having a limited ability to see built-up<br />

vulnerabilities in the market [21], 2) having resistance to change<br />

in order to maintain “turf” [16, 35], 3) hindering interoperability<br />

due to differences in metadata and data formats [25], and 4)<br />

competitiveness and conflicting interests among regulators [30].<br />

The regulators might also need to invest in ensuring data quality,<br />

developing linked data, and assessing gaps in capabilities.<br />

Although the risks faced by Federal and State regulators and the<br />

SROs are comparable, the magnitude of impact is oftentimes<br />

different. For instance, having limited ability to see built-up<br />

vulnerabilities could create a larger impact for Federal agencies<br />

compared to the SROs. The resulting risks could also affect the<br />

effectiveness of relationships among these regulators, especially<br />

considering that the sharing practices among most federal and<br />

state agencies are primarily informal and ad hoc [28]. For<br />

instance, federal agencies and state government could share<br />

trading information and be involved in joint enforcement<br />

coordination.<br />

The risk of resistance to change in order to maintain turf and the<br />

risk of competing and conflicting interests could undermine their<br />

joint efforts to share. As example, the report by the GAO<br />

indicated how sharing between state and federal agencies, as<br />

illustrated by the case of state insurance regulators and the FBI,<br />

are sometimes not fruitful due to the lack of authority and<br />

jurisdictions. The state insurance regulators could not access the<br />

criminal record of an insurer in the FBI database and were thus<br />

unable to assess and prevent potential fraud [16].<br />

For the actors in the financial market industry (trading firms,<br />

broker-dealer, rating agencies, investors, etc), these challenges<br />

also induce risks. The authority barriers and inadequate sharing<br />

mechanisms could create confusion for market actors in filing<br />

complaints or in identifying relevant information. The report by<br />

the GAO illustrates how difficult it is for consumers to lodge<br />

complaints on hybrid products due to the level of complexities<br />

and the intersectional and multilayered nature of financial markets<br />

[16]. The lack of coercive power on the current sharing<br />

mechanism among the regulatory agencies could also create an<br />

opportunity for irresponsible actors to gain advantage by<br />

manipulating the system [14].<br />

As the previous GAO report indicates [16], an insurer who has a<br />

criminal record could manipulate the system by moving to other<br />

states and create a similar fraud because the state insurance<br />

agencies could not access the criminal record in the FBI<br />

databases. The barrier due to lack of authority and legacy systems<br />

could complicate the effort by the public to identify and access<br />

relevant information.


The relationship between regulators and the public is maintained<br />

through two primary activities: 1) public access to information,<br />

and 2) requests for comments on new regulatory proposals [2].<br />

Legacy systems and differing jurisdictions could result in the risk<br />

of multiple points of access [16], because the public has various<br />

points to access information. On the one hand, multiple points of<br />

access provide a wider range of information for the public to<br />

compare and contrast. On the other hand, multiple points of access<br />

could create confusion as to which information is most relevant<br />

for them. As result, despite the notable transparency effort by<br />

regulators to open up access to information and enhance the<br />

public consultative process, this condition will make the<br />

public, especially individual investors, more vulnerable to fraud<br />

and more exposed to losses. Their inability to identify relevant<br />

information could distort decisions that ordinary investors make<br />

regarding their investment.<br />

Table 1. Actors, Challenges and Risks<br />

Challenges Government SROs Fin. Industry Actors Public<br />

Mitigating authority<br />

barriers - Lack of authority<br />

and cross jurisdictions<br />

Accommodating different<br />

organizational cultures<br />

Legacy systems and data<br />

interdependency impede<br />

access<br />

Developing collaborative<br />

governance culture –<br />

involvement of high-level<br />

officials and political<br />

leaders<br />

Developing linked data<br />

and a common language -<br />

Ensuring data quality and<br />

integrity<br />

Protection of sensitive data<br />

and information, balancing<br />

usefulness and stewardship<br />

Lack of enforceable action<br />

for the current information<br />

sharing mechanism<br />

Developing capabilities for<br />

collaboration and<br />

developing new<br />

procedures<br />

Limited ability to<br />

identify built-up<br />

vulnerabilities [24]<br />

Resistance to change<br />

brought forth by new<br />

systems [9, 35]<br />

Different metadata and<br />

formats inhibit<br />

integration and<br />

interoperability. [27]<br />

Conflicting interests<br />

among regulatory<br />

agencies – the<br />

competitiveness and risks<br />

of being relevant to the<br />

market [30]<br />

Investment to ensure data<br />

quality in large datasets<br />

[30]<br />

Liabilities of privacy and<br />

proprietary data and<br />

information [30]<br />

Dependence on the<br />

“goodwill” of<br />

counterparties [3, 14]<br />

Gaps in capabilities that<br />

hamper collaboration<br />

[34, 35]<br />

*) Intersection of challenges and actors represents the risk<br />

Limited ability to<br />

identify built-up<br />

vulnerabilities [24]<br />

Resistance to change<br />

brought forth by new<br />

systems [9, 35]<br />

Different metadata and<br />

formats inhibit<br />

integration and<br />

interoperability [27]<br />

Conflicting interests<br />

among regulatory<br />

agencies – the<br />

competitiveness and<br />

risks of being relevant<br />

to the market [30]<br />

Investment to ensure<br />

data quality in large<br />

datasets [30]<br />

Liabilities of privacy<br />

and proprietary data and<br />

information [30]<br />

Dependence on the<br />

“goodwill” of<br />

counterparties [3, 14]<br />

Gaps in capabilities that<br />

hamper collaboration<br />

[34, 35]<br />

129<br />

Confusion in filing<br />

complaints<br />

Different reporting<br />

formats increase cost<br />

[30]<br />

Investment to ensure<br />

data quality for<br />

compliance [30]<br />

Liabilities of privacy<br />

and proprietary data and<br />

information [30]<br />

Opportunities to<br />

manipulate the system<br />

Confusion in<br />

identifying relevant<br />

information [18]<br />

Multiple points of<br />

access [16]<br />

Distortion due to low<br />

quality data.<br />

Security of personal<br />

data<br />

Higher vulnerability<br />

to fraud and<br />

exposures<br />

The challenge of protecting sensitive data and ensuring data<br />

quality and integrity also creates significant risks for the financial<br />

industry and the public. The challenges of protecting sensitive<br />

data significantly correlate with the firm’s investment in ensuring<br />

data quality, compliance and privacy protection. This condition<br />

creates a risk of protecting the security of the personal data and<br />

information for the general public. For public, this challenge<br />

correlates with the risk of breach in personal data and security of<br />

personal data. For financial industry, the challenge correlates to<br />

the risk of liabilities related to privacy and proprietary data. The<br />

financial industry might have to invest heavily to reduce the risk<br />

of liabilities due to personal data breach.<br />

6. FUTURE DIRECTIONS<br />

Through the review on literature in the interagency information<br />

sharing and integration, this paper provides an initial framework<br />

for understanding the challenges relating to inter-agency<br />

information sharing for financial market regulators, focusing


primarily on the information flows between the different agents<br />

playing significant roles in the regulation of financial markets.<br />

There are a number of other areas in which computer and<br />

information science research can help support this information<br />

and knowledge sharing, through analyses of the types of<br />

information and knowledge that should be shared between the<br />

actors. For example, better analytic tools could build on a formal<br />

specification of trading data and financial actors’ behavior. High<br />

level languages for identifying patterns of interest (e.g., fraud<br />

signatures) in financial data streams should enable highly<br />

scalable, real-time analysis of data streams to support decision<br />

making. As another example, data mining approaches will be<br />

essential to detect patterns of activity that produce anomalous<br />

market behavior, such as the May 2010 “flash crash,” or identify<br />

the possibility of manipulative or fraudulent practice that warrants<br />

further investigation. Predictive data mining could be useful for<br />

identifying impending market destabilization or manipulation and<br />

developing better “circuit breakers.” Social network analysis<br />

could be used in combination with structured data to provide<br />

evidence of individuals or organizations engaged in inappropriate<br />

activities. Financial market professionals can get the information<br />

they need to support their high-stakes decision making. The<br />

ensuing research should lead to new models of computing, system<br />

design, and data analysis that can improve practices in this<br />

important and challenging domain.<br />

7. REFERENCES<br />

[1] BIS 2010. Good Practice Principles on Supervisory<br />

Colleges: Basel Committee on Banking Supervision.<br />

[2] Bradley, C.M. 2011. Transparency Is the New Opacity:<br />

Constructing Financial Regulation After the Crisis.<br />

American University Business Law Review. 1, (2011), 7.<br />

[3] Brummer, C. 2010. Post-American Securities Regulation.<br />

California Law Review. 98, (2010), 327–383.<br />

[4] Cresswell, A. et al. 2008. A Multi-dimensional Approach to<br />

Digital Government Capability Assessment.<br />

[5] Davenport, T.H. and Prusak, L. 1997. Information ecology:<br />

Mastering the information and knowledge environment.<br />

Oxford University Press, USA.<br />

[6] Davies, J. et al. 2003. Towards the Semantic Web: Ontologydriven<br />

Knowledge Management. Wiley Online Library.<br />

[7] Dawes, S.S. et al. 2009. From “Need to Know” to “Need to<br />

Share”: Tangled Problems, Information Boundaries, and the<br />

Building of Public Sector Knowledge Networks. Public<br />

Administration Review. 69, 3 (May. 2009), 392–402.<br />

[8] Dawes, S.S. 2010. Information policy meta-principles:<br />

stewardship and usefulness. (2010), 1–10.<br />

[9] Dawes, S.S. 1996. Interagency information sharing:<br />

Expected benefits, manageable risks. Journal of Policy<br />

Analysis and Management. 15, 3 (1996), 377–394.<br />

[10] Dawes, S.S. 2010. Stewardship and usefulness: Policy<br />

principles for information-based transparency. Government<br />

Information Quarterly. 27, 4 (2010), 377–383.<br />

[11] Ding, W.W. et al. 2010. The impact of information<br />

technology on academic scientists’ productivity and<br />

130<br />

collaboration patterns. Management Science. 56, 9 (2010),<br />

1439.<br />

[12] Engle, R.F. and Weidman, S.T. 2010. Technical Capabilities<br />

Necessary for Systemic Risk Regulation:Summary of a<br />

Workshop. The National Academies Press.<br />

[13] FINRA - About FINRA: http://www.finra.org/AboutFINRA/.<br />

[14] Friedman, F.B. et al. 2003. Taking stock of information<br />

sharing in securities matters. Journal of financial crime. 10,<br />

1 (2003), 37–53.<br />

[15] FSB 2011. Global Adherence to Regulatory and Supervisory<br />

Standards on International Cooperation and Information<br />

Exchange.<br />

[16] GAO 2004. Better Information Sharing Among Financial<br />

Services Regulators Could Improve Protections for<br />

Consumers. Technical Report #GAO-04-882R. Government<br />

Accountability Office (GAO).<br />

[17] GAO 2009. Information Security: Agencies Continue to<br />

Report Progress, but Need to Mitigate Persistent<br />

Weaknesses. Technical Report #GAO-09-546. Government<br />

Accountability Office (GAO).<br />

[18] GAO 2012. Information Security: Weaknesses Continue<br />

Amid New Federal Efforts to Implement Requirements.<br />

Technical Report #GAO-12-137. Government<br />

Accountability Office (GAO).<br />

[19] GAO 1992. Securities and Futures Markets: Cross-Border<br />

Information Sharing Is Improving, but Obstacles Remain.<br />

Technical Report #GGD-92-110. Government<br />

Accountability Office (GAO).<br />

[20] Gil-Garcia, J. et al. 2010. Conceptualizing Information<br />

Integration in Government. E-Government: Information,<br />

Technology, and Transformation. H.. Scholl, ed. M.E.<br />

Sharpe.<br />

[21] Gil-Garcia, J. et al. 2005. Interorganizational Information<br />

Integration in the Criminal Justice Enterprise: Preliminary<br />

Lessons from State and County Initiatives. (Jan. 2005),<br />

118c– 118c.<br />

[22] Jasanoff, S. 2006. Transparency in Public Science: Purposes,<br />

Reasons, Limits. Law and Contemporary Problems. 69,<br />

(2006), 21–45.<br />

[23] Lumsden, J. et al. 2011. Ontology Definition and<br />

Construction, and Epistemological Adequacy for Systems<br />

Interoperability: A Practitioner Analysis. Journal of<br />

Information Science. 37, 3 (Jun. 2011), 246–253.<br />

[24] Manual on Fiscal Transparency, 2007 Revised Edition:<br />

http://www.imf.org/external/np/fad/trans/manual.htm.<br />

Accessed: 2012-04-22.<br />

[25] Mayer, R.C. et al. 1995. An integrative model of<br />

organizational trust. Academy of management review.<br />

(1995), 709–734.<br />

[26] National Information Exchange Model (NIEM):<br />

https://www.niem.gov/Pages/default.aspx.<br />

[27] O’Riain, S. et al. 2012. Linked Data Driven Information<br />

Systems as an Enabler for Integrating Financial Data.


Information Systems for Global Financial Markets:<br />

Emerging Developments and Effects. A.Y. Yap, ed. IGI<br />

Global. 239–269.<br />

[28] Pan, E.J. 2009. Structural Reform of Financial Regulation.<br />

[29] Pardo, T. et al. 2008. Collaborative governance and crossboundary<br />

information sharing: Envisioning a networked and<br />

IT-enabled public administration. (2008), 5–7.<br />

[30] Pardo, T. et al. 2011. Computing and information technology<br />

challenges for 21st century financial market regulators.<br />

(Delft, Netherland, 2011), 198–209.<br />

[31] Pardo, T. et al. 2012. E-Government Interoperability<br />

Interaction of Policy, Management, and Technology<br />

Dimensions. Social Science Computer Review. 30, 1 (Feb.<br />

2012), 7–23.<br />

[32] Pardo, T. et al. 2004. Modelling the Social and Technical<br />

Processes of Interorganizational Information Integration.<br />

(Hawaii, 2004), 10.<br />

[33] Pardo, T. et al. 2008. Sustainable Cross-Boundary<br />

Information Sharing. Digital Government: E-Government<br />

Research, Case Studies, and Implementation. H. Chen et al.,<br />

eds. SpringerLink. 421–438.<br />

131<br />

[34] Pardo, T. and Burke, B. 2008. Government Worth Having: A<br />

Briefing on Interoperability for Government Leaders.<br />

[35] Pardo, T. and Burke, B. 2008. Improving Government<br />

Interoperability: A Capability Framework for Government<br />

Managers.<br />

[36] Radin, B. 2006. Challenging the performance movement:<br />

Accountability, complexity, and democratic values.<br />

Georgetown Univ Press.<br />

[37] Sayogo, D.S. et al. 2011. Understanding the impact of<br />

computing and information technology on critical challenges<br />

facing 21st century financial market regulators. (Maryland,<br />

2011), 345–346.<br />

[38] Schapiro, M.L. 2010. Testimony Concerning the Lehman<br />

Brothers Examiner’s Report Before the House Financial<br />

Services Committee.<br />

[39] Smith, K. et al. 2008. Everybody share: The challenge of<br />

data-sharing systems. Computer. 41, 9 (2008), 54–61.<br />

[40] Tarullo, D.K. 2010. Equipping financial regulators with the<br />

tools necessary to monitor systemic risk.


On Public Service Provision Informative Phase: A<br />

dialogue-based Model and Platform<br />

Efthimios Tambouris<br />

1 University of Macedonia<br />

156 Egnatia Str., 54006, Thessaloniki,<br />

Greece, +30 2310 891 588<br />

2 CERTH/ITI<br />

6 th km Charilaou-Thermi Rd.<br />

57001, Thessaloniki<br />

tambouris@uom.gr<br />

ABSTRACT<br />

Online provision of public services (such as passport issuance and<br />

establishing a new business) is a priority of eGovernment<br />

worldwide for over a decade. Public service provision consists of<br />

two phases: informative and performative. During the informative<br />

phase, citizens or businesses obtain information before actually<br />

invoking a public service. This information includes required<br />

documents to be submitted, cost, responsible authority etc. The<br />

informative phase, although significant, has been overlooked at<br />

eGovernment literature. In this paper we present a notation for<br />

modeling the informative phase of public services as well as a set<br />

of indicators for measuring quantitative and qualitative<br />

characteristics of public services. We further present a prototype<br />

platform than enables modeling the informative phase of public<br />

services and automatically creating online dialogues to be used by<br />

citizens for obtaining personalized information on public services.<br />

We finally demonstrate the use of the platform by using the<br />

passport issuance public service.<br />

Categories and Subject Descriptors<br />

K.6.1 [MANAGEMENT OF COMPUTING AND<br />

INFORMATION SYSTEMS]: Project and People Management<br />

- Systems Aanalysis and Design, Systems Development<br />

General Terms<br />

Management<br />

Keywords<br />

eGovernment, Public Service Provision, Informative Stage<br />

1. INTRODUCTION<br />

eGovernment is a political priority worldwide with tremendous<br />

amounts of funds being invested, which are estimated to be over $<br />

490 billion worldwide [3]. One of the key eGovernment activities<br />

is online Public Service Provision (PSP) with relevant progress<br />

being regularly monitored [2][13]. A number of stage models<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Vasiliki Outsetari<br />

University of Macedonia<br />

156 Egnatia Str.<br />

54006, Thessaloniki, Greece<br />

+30 2310 891 589<br />

mis0924@uom.gr<br />

132<br />

Konstantinos Tarabanis<br />

1 University of Macedonia<br />

156 Egnatia Str., 54006, Thessaloniki,<br />

Greece, +30 2310 891 578<br />

2 CERTH/ITI<br />

6 th km Charilaou-Thermi Rd.<br />

57001, Thessaloniki<br />

kat@uom.gr<br />

have been proposed for evaluating sophistication and maturity of<br />

eGovernment solutions [4][5][10]. For example, according to<br />

European Union there are five stages of online sophistication for<br />

public services: information, one-way interaction, two-way<br />

interaction, transaction, and targetization [2].<br />

Academic work to better understand PSP suggests it consists of<br />

two distinct but complementary phases: the informative phase and<br />

the performative phase [9]. During the informative phase the<br />

citizen/business obtains information about the service while<br />

during the performative phase the citizen/business invokes and<br />

eventually consumes the public service.<br />

The informative stage is often considered as straightforward to<br />

fully automate. This is reflected in various stage models that<br />

suggest providing information is the first stage of sophistication<br />

and can be fully accomplished simply by “providing information<br />

online”. Targetization, which is considered as the ultimate stage,<br />

is often related to providing personalization during the<br />

performative phase, i.e. during service execution.<br />

We follow a different path suggesting the informative phase of<br />

PSP is very important and should be also carefully automated.<br />

During the informative phase, citizens/businesses have to obtain<br />

all necessary information with regards to the specific version of<br />

the public service relevant to their circumstances. As many public<br />

services have hundreds or even thousands of different versions<br />

[7], providing personalized information in an efficient and<br />

effective manner is not straightforward. We therefore consider<br />

that targetization is also relevant to the informative phase in<br />

addition to performative.<br />

In this paper we present a model and prototype platform that can<br />

be used for modeling PSP informative stage and, subsequently,<br />

for providing personalized information to citizens and businesses<br />

using online dialogues.<br />

We believe this work contributes to obtaining a better<br />

understanding of PSP informative stage. It reviews relevant work<br />

in the area to propose a notation that enables domain experts to<br />

model the information stage. It further proposes a number of<br />

indicators that can be used to understand the complexity of PSP<br />

informative phase. Finally, it presents a platform that can be used<br />

by domain experts to graphically design the informative phase of<br />

PSP and by citizens and businesses to obtain information based on<br />

an online dialogue that is automatically created from the model.


The rest of this paper is organized as follows. In section 2 we<br />

present related work in automating the informative phase of PSP.<br />

In Section 3 we present our proposed modeling notation as well as<br />

a number of indicators to better understand the produced public<br />

service models. In Section 4 we present a platform prototype we<br />

have developed for modeling the informative phase of PSP which<br />

enables automatic development of online dialogues to be used by<br />

citizens and businesses. In Section 5 we present a case from using<br />

the platform. Finally, in Section 6 we present the main<br />

conclusions of this work along with future work.<br />

2. PSP INFORMATIVE PHASE (PSP IP)<br />

RELATED WORK<br />

The informative phase is the informative part of the interaction<br />

between a citizen and a public authority providing a public<br />

service. During this phase, the citizen asks questions like Why?<br />

What? Who? Where? When? How? about a public service. When<br />

the answers to these questions have been provided, we can<br />

consider this phase of service provision as complete and the<br />

citizen may proceed to the performative phase i.e. service<br />

invocation.<br />

The informative phase is essential for optimal service utilization<br />

and public administration efficiency however it is often<br />

overlooked by governments. In order to effectively use a public<br />

service, citizens must identify which public services address their<br />

needs and find answers to their questions regarding these services,<br />

e.g. “am I eligible for this service?”, “what documents should I<br />

provide?”, “what is the relevant cost?” etc. [9].<br />

This is particular important as studies suggest public services<br />

often have numerous versions depending on a number of factors<br />

[1] [7]. For example, issuing a passport has many versions<br />

depending on age, whether the application is for a new passport or<br />

renewing a passport or replacing a stolen passport etc. In each<br />

version, the input documents that should be provided are different<br />

whereas the cost may differ as well.<br />

Despite the existence of sophisticated eGovernment PSP systems<br />

for the performative phase, citizens and businesses spend valuable<br />

resources (time and sometimes money) in order to collect the<br />

information required (e.g. about needed documents, cost demands<br />

etc.) in the informative stage i.e. before invoking a service.<br />

In the rest of this section we present three different ways used for<br />

PSP informative stage (PSP IP). We call them unstructured<br />

websites, structured websites and dialogue-based systems.<br />

133<br />

Figure 1. Example of website providing unstructured PS<br />

information<br />

2.1 Unstructured Websites<br />

This category includes websites containing plain information<br />

about public service(s). The information may be excessive<br />

nevertheless there is no structure in the content other than the<br />

menu of the website. Sometimes specific websites have been<br />

developed for single public services such as www.passport.gov.gr<br />

developed for providing information on passport issuance (fig. 1).<br />

2.2 Structured Websites<br />

This category also includes websites containing plain information<br />

about public service(s). This time however information is<br />

provided according to a template that is common for all public<br />

services. It is common that one-stop government portals provide<br />

structured information on public services e.g. www.help.gv.ac<br />

(fig. 2).<br />

Figure 2. Example of website providing structured PS<br />

information<br />

2.3 Dialogue-based Platforms<br />

These platforms guide the visitor through a number of online<br />

questions. By answering, the visitor is provided with personalized<br />

information, commonly on whether he is eligible for the service,<br />

required documents, costs, responsible authority etc.<br />

These platforms are all similar with regards to what the visitor<br />

experiences. However, they are substantially different on how that<br />

information is produced. We will outline three such applications,<br />

namely OneStopGov platform, Rural-Inclusion platform and<br />

Oracle Policy Automation (OPA) platform.<br />

2.3.1 OneStopGov Platform<br />

OneStopGov platform has been developed within the European<br />

Union co-funded project OneStopGov (http://islab.uom.gr/<br />

onestopgov). The platform provides a complete system for online<br />

one-stop government hence covers both the informative and<br />

performative phases of PSP [12]. The public servant (who should<br />

actually be a domain expert) with the assistance of a technical<br />

expert models the public service using a proprietary process<br />

management tool employing BPMN and web services (fig. 3).<br />

The dialogue is automatically created from this model. The enduser<br />

visits the relevant website in order to get informed about the<br />

public service through an online dialogue. OneStopGov platform


employs workflow management technologies for modeling public<br />

services.<br />

Figure 3. Developing a model for PSP IP using OneStopGov<br />

platform<br />

2.3.2 Rural-Inclusion Platform<br />

Rural-Inclusion (RI) platform has been developed within the<br />

European Union co-funded project Rural Inclusion<br />

(http://www.rural-inclusion.eu). RI uses exactly the same<br />

principles as OneStopGov platform. However, the underlying<br />

technologies are different. More specifically, the Semantic Public<br />

Service Portal (S-PSP) developed to support the informative phase<br />

of the public services is based on ontologies technology [6]. As a<br />

result, the domain expert needs to be supported by IT experts in<br />

order to model the public service as an ontology. Recently, the<br />

project has developed a front-end which enables domain experts<br />

to provide all information needed for the online dialogue through<br />

an easy-to-use interface which automatically creates the ontology<br />

(owl file) consumed by the project website visited by end-users.<br />

Rural Inclusion platform employs semantic technologies for<br />

modeling public services.<br />

Figure 4. Developing a model for PSP IP using Rural<br />

Inclusion platform<br />

2.3.3 Oracle Policy Automation Solution for Social<br />

Services (OPA)<br />

The Oracle Policy Automation (OPA) platform was initially<br />

developed from the Australian firm RuleBurst Holdings in order<br />

134<br />

to translate laws and official documents into business rules.<br />

Today, OPA is a tool that serves the modeling and automation of<br />

the business rules’ application (www.oracle.com/technetwork/<br />

apps-tech/policy-automation/). Thus, although it was initially<br />

designed to serve public sector’s needs, it is currently applied in<br />

other sectors as well (e.g. the insurance sector).<br />

OPA consist of two separate applications. The first is Oracle<br />

Policy Modeling, an environment that facilitates authoring of<br />

public services’ rules. The second is Oracle Policy Automation,<br />

which is used to automate public services’ processes. Oracle<br />

Policy Modeling is a windows application that can be employed<br />

by the user (normally a domain expert) in order to author a set of<br />

natural language rules that govern the public service. The tool is<br />

compatible with Microsoft Office automation applications (such<br />

as Word and Excel) hence enables using text properly structured<br />

and annotated in order to describe public services’ rules (fig. 5).<br />

Using these rules, an interview (online dialogue) is automatically<br />

created and deployed. The interested citizens can thereafter visit<br />

the relevant website and initiate this interview in order to be<br />

informed whether they are eligible for the service or not. OPA<br />

platform employs rules management technologies and expert<br />

systems for modeling public services.<br />

Figure 5. Developing a model for PSP IP using OPA<br />

2.3.4 Evaluation of Existing Approaches<br />

Existing solutions for PSP information phase range from simple<br />

websites to sophisticated solutions.<br />

An analysis of advanced solutions suggests they follow an<br />

architecture similar to the one presented in fig. 6.


Expert<br />

1. Expert<br />

describes service<br />

3. Dialogue<br />

launched<br />

«subsystem»<br />

Service Representation<br />

Tool<br />

2. Service model<br />

transferred<br />

«subsystem»<br />

Dialogues Presentation<br />

Website<br />

4. Citizen executes<br />

dialogue<br />

End-­‐user<br />

Figure 6. Main Architecture of dialogue-based platforms<br />

More specifically, the platform consists of two sub-systems: a<br />

Service Representation Tool and a Dialogues Presentation<br />

Website.<br />

The platform is used in a 4-step manner. In the first step, an expert<br />

uses the Service Representation Tool in order to describe<br />

(verbally or using a model) the public service. In the second step,<br />

a file describing the service is transferred from the Service<br />

Representation Tool to the Dialogues Presentation Website. In the<br />

third step, the dialogue is automatically created and launched.<br />

Finally, in the last step the end-user (normally citizen or business)<br />

visits the Dialogues Presentation Website, executes the dialogue<br />

and obtains the required information.<br />

By examining the different approaches for the Service<br />

Representation Tool we decided to endorse modeling of public<br />

services since we believe it is more straightforward and widely<br />

used as it can also be based on open standards for process<br />

modeling. RI platform employs ontologies which we believe is<br />

less straightforward than provess modeling. On the other hand,<br />

OneStopGov platform is based on proprietary software and<br />

handles both informative and performative phases thus is more<br />

complicated than needed for our objectives.<br />

Using a diagram for PSP has significant advantages [11]. In our<br />

case, it enables (a) easy representation of PSP IP by domain<br />

experts (usually public servants) without any programming effort,<br />

(b) analysis and better understanding of PSP IP complexity using<br />

a number of indicators, (c) easy management of PSP IP by reusing<br />

and changing diagrams, (d) easy validation of diagrams, (e)<br />

eventually development of better quality public services, (f)<br />

citizens and businesses to obtain personalized information about<br />

public service simply by answering online questions instead of<br />

face-to-face interactions, using a call center etc.<br />

It should be noted here that extensive research has been conducted<br />

in the area of personalized PSP mainly using ontologies and rules,<br />

e.g. [1]. In this paper however we focus on more visual and easyto-use<br />

technologies for the reasons stated above. In addition, the<br />

descriptions of public services in relevant legal documents are<br />

usually detailed hence can easily result in deterministic models<br />

that can be easily verified.<br />

3. NOTATION AND INDICATORS<br />

An important element for the production of personalized<br />

information is the development of a model that will represent the<br />

public service’s dialogue.<br />

In order to model the informative phase of PSP, we developed a<br />

simple modeling notation that allows for the visual representation<br />

135<br />

of the dialogue. We also present the rules that need to be followed<br />

for the resulting model to be valid.<br />

Having represented a public service using a model enables us to<br />

obtain interesting information about the service. In this respect,<br />

we propose a number of indicators to better understand the<br />

modeled public services.<br />

3.1 PSP IP Dialogue Model<br />

The main idea is to model the PSP informative phase (PSP IP) as<br />

a dialogue (or interview) between the public authority and the<br />

visitor (citizen or business). The model thus mainly contains<br />

questions and possible answers. For example, when modeling<br />

public service “issuing a marriage permit”, a possible question is<br />

“what is your marital status?” with possible answers “single”,<br />

“divorced” etc. The model also contains information on input<br />

documents that should be submitted by the citizen for invoking<br />

the public service as well as information on cost or subsidy<br />

depending on the nature of the service.<br />

Using this dialogue model one can quickly and without any<br />

ambiguity determine whether he is eligible for a service or not.<br />

Eligible visitors can further obtain personalized information such<br />

as required documents to be submitted for service invocation and<br />

costs.<br />

3.2 PSP IP Modeling Notation<br />

In Table 1 we present a simple notation proposed for modeling<br />

PSP informative phase. This notation is influenced by BPMN<br />

(http://www.bpmn.org/), graph theory, academic public service<br />

models (e.g. GEA [9]), templates used for describing public<br />

services (e.g. in national portals) as well as templates proposed in<br />

national eGovernment Interoperability Frameworks. The only<br />

reason for proposing a new notation instead of adopting an<br />

existing such as BPMN is simplicity. We aim at a notation with<br />

only a few symbols since our experience suggests simplicity is of<br />

paramount importance if the tool is to be used by public servants.<br />

The diagrams produced using this notation represent the dialogue<br />

between the system and the user. From a technical point of view<br />

each diagram is actually a directed acyclic graph.<br />

The notation is briefly explained now (the term visitor here<br />

represents anyone executing a dialogue).<br />

o Start node. Represents the start of the diagram.<br />

o End node. Represents the completion of a dialogue in the<br />

diagram. It can be one of the following:<br />

-­‐ Eligible. It suggests the visitor is eligible for the<br />

service.<br />

-­‐ Not Eligible. It suggests the visitor is not eligible for<br />

the service.<br />

o Question. Represents a question posed to the visitor e.g.<br />

“Which is your current marital status?”<br />

o Answer. Represents a possible answer to an expressed<br />

Question e.g. “Married”.<br />

o Input Document. Represents a document the visitor should<br />

provide based on a previous answer. For example, a<br />

“Married” answer to a question might lead to a need for<br />

submitting a “marriage certificate” as a required document<br />

for invoking the public service.


o Information. Represents any information the visitor should<br />

know e.g. “the execution of the service should be completed<br />

within ten working days”.<br />

o Value. Represents an amount the visitor should pay to<br />

invoke the service or receive after the service’s completion<br />

(e.g. in case of a social benefit service). There are three cases<br />

for a Value object:<br />

-­‐ Registration. Represents the amount that the visitor<br />

should pay as a lump sum (e.g. a 20 € fee).<br />

-­‐ Annual Subscription. Represents the amount that<br />

the visitor should pay annually (e.g. an annual<br />

subscription to a chamber of commerce).<br />

-­‐ Subsidy. Represents the amount that the visitor is<br />

entitled from the execution of a service (e.g.<br />

housing benefit).<br />

Value is a subcase of Information but we include it as<br />

separate object due to its particular importance to citizens<br />

and public authorities as well as its semantics (e.g. Values<br />

can be added).<br />

We call Question, Input Document, Information and Value<br />

internal nodes of the graph (diagram).<br />

Table 1. Notation for PSP IP Dialogue Diagrams<br />

Element and Description Symbol<br />

Start:<br />

� Portrays the beginning of the diagram.<br />

Question:<br />

� Is used to represent a question posed to<br />

citizens/businesses.<br />

Answer:<br />

� Is used to represent a possible answer to a<br />

question.<br />

Input Document:<br />

� Is used to represent a document required for<br />

invoking a public service.<br />

Information:<br />

� Is used to represent any additional information<br />

a citizen/business should know.<br />

Value:<br />

� Is used to represent any monetary amount (it is<br />

a special case of Information).<br />

Not Eligible:<br />

� Is used to stop all control flows (thus it<br />

represents an end node)<br />

� It suggests the citizen/business is not eligible<br />

for the service.<br />

Eligible:<br />

� Is used to stop all control flows (thus it<br />

represents an end node)<br />

� It suggests the citizen/business is eligible for<br />

the service.<br />

We should note that the arrow besides representing a Question is<br />

also used to link the Start node to the first Question (hence<br />

representing control flow without any question). We understand a<br />

136<br />

new symbol should have been introduced for that however for<br />

simplicity we decided to use the arrow.<br />

In developing PSP IP diagrams there are certain rules that need to<br />

be respected for the resulting diagram to be valid. These rules are<br />

derived from graph theory and the fact that the graph should be a<br />

directed acyclic one. The most important are presented in Table 2.<br />

Table 2. Rules of PSP IP Dialogue Diagrams<br />

1. There is only one Start node that contains only one<br />

outgoing arrow leading to the first Question.<br />

2. There are one or more End nodes. An End node has one<br />

or more incoming Arrows but no outgoing Arrow.<br />

3. All paths (representing potential dialogues) should end in<br />

an End node.<br />

4. An Arrow always connects two nodes which should be<br />

different.<br />

5. Arrows indicate the control flow of the dialogue.<br />

6. An Answer may lead to only one Question, Information,<br />

Input Document or End Node.<br />

7. Question nodes should have at least two outgoing Arrows.<br />

All other internal nodes should only have one outgoing<br />

Arrow.<br />

8. No node should be “orphan”, i.e. all nodes should have at<br />

least one incoming and one outgoing arrow (subject to<br />

other rules).<br />

9. The resulting graph should be acyclic, thus no cycling<br />

paths should exist.<br />

3.3 Public service indicators<br />

The current effort aims to facilitate, apart from citizens, public<br />

service providers in designing dialogues but also in managing PSP<br />

IP. For this purpose, we introduce a number of indicators. Using<br />

these indicators the domain expert who designs the diagram<br />

obtains interesting information on various aspects of the service.<br />

The indicators measure the behavior of the main objects (i.e.<br />

Question, Document, and Value) and the diagram in general. To<br />

derive these indicators, graph theory was reviewed in the context<br />

of public service provision according to the authors’ relevant<br />

experience. In the rest of this section, we present the proposed<br />

indicators.<br />

3.3.1 Number of Dialogues<br />

This indicator provides the number of different dialogues in a<br />

diagram, i.e. the number of unique paths in the graph. This is an<br />

indication of the service’s complexity, since an increased number<br />

of dialogues suggests an increased number of service’s versions.<br />

3.3.2 Number of Dialogues that Results in a not<br />

Eligible Node<br />

This indicator provides the number of different dialogues that<br />

result in a not eligible node i.e. in cases where the citizen does not<br />

meet the requirements for invoking the public service. This is an<br />

indicator of the number of preconditions that must be fulfilled for


someone to be non-eligible for the service. When this indicator is<br />

equal to zero then everyone is eligible for invoking the service.<br />

3.3.3 Maximum/Minimum/Average Number of<br />

Questions<br />

These indicators provide the maximum, minimum and average<br />

number of questions that are asked to the citizen during the<br />

dialogue. The indicators count only questions that result in an<br />

eligible end node and, thus, show the number of questions<br />

required for the successful completion of the dialogue. An<br />

increased number of questions indicate more complex services.<br />

3.3.4 Maximum/Minimum/Average Total Cost<br />

These indicators provide the maximum, minimum and average<br />

cost of the service. Obviously, they count only the cost coming<br />

from dialogue paths that result in an eligible end node. The<br />

service provider can use these indicators to measure the range of<br />

the service’s cost for the citizen. As a result, they can also<br />

measure the expected income from the execution of the public<br />

service provided details on the number of citizens that will<br />

consume the service are also known.<br />

3.3.5 Maximum/Minimum/Average Total Subsidy<br />

These indicators provide the maximum, minimum and average<br />

expected citizen’s benefit after the execution of the public service.<br />

It can be used by public authorities to compute the range of the<br />

total subsidy as well as its average provided details on the number<br />

of beneficiaries are known.<br />

3.3.6 Maximum/Minimum/Average Number of Input<br />

Documents<br />

These indicators provide the maximum, minimum, and average<br />

number of documents that different citizens’ categories need to<br />

provide for invoking the service. They also count the number(s) of<br />

documents coming from not eligible dialogues, if applicable.<br />

These indicators could be used to examine the level of<br />

bureaucracy as an increased number of required input documents<br />

usually indicates an increased level of red tape.<br />

3.3.7 Indicators for Set of Services<br />

Apart from the indicators that refer to each specific service<br />

diagram, we also propose a number of indicators that apply to a<br />

set of services diagrams. These indicators are helpful to public<br />

administrations responsible for the design and management of<br />

many public services. The indicators include:<br />

o Involvement of Other Public Authorities. This dictates the<br />

number of other public authorities that are involved in<br />

providing a particular public service. It is measured through<br />

the required input documents of each service and the public<br />

authorities that are issuing them.<br />

o Number of Services per public Authority. This dictates the<br />

number of services provided by each public authority. This<br />

information can be useful for planning, including human<br />

resources management.<br />

o Document’s Importance. A large number of input<br />

documents are actually produced by public authorities. This<br />

indicator depicts the number of services using a particular<br />

document. This is useful in planning e.g. to estimate how<br />

many services will be affected if an input document is<br />

abolished or replaced.<br />

137<br />

It should be noted that as all service descriptions can be stored in<br />

a database, additional information may be extracted depending on<br />

specific needs.<br />

4. PSP IP PLATFORM<br />

In order to demonstrate the use of the proposed notation we<br />

developed a prototype platform presented in this section.<br />

4.1 Architecture and Functionality<br />

The architecture of the developed prototype platform is shown in<br />

fig. 7 using UML deployment diagram while its main<br />

functionality is shown in fig. 8 using UML use case diagram.<br />

Figure 7. Platform architecture<br />

As presented in the use case diagram there are three main actors:<br />

domain expert, content manager and citizen/business (visitor or<br />

end-user). It is worth explaining the content manager. This role is<br />

responsible for central activities including managing all public<br />

documents, describing public services, deciding which PSP IP<br />

diagrams to launch in the Dialogue website etc.<br />

Figure 8. Platform main functionality<br />

4.2 Main Usage Scenario<br />

There are many different usage scenarios for this platform. Here<br />

we present one such usage scenario.<br />

Step 1. Input Documents are Described<br />

The Content manager is using the Service Admin Tool in order to<br />

create descriptions of input documents that will be needed when<br />

modeling PSP IP (fig. 9). Ideally, there should be one such


common documents repository at the national level. This list is<br />

stored in an xml file.<br />

Step 2. Domain Expert Models the PSP IP Dialogue<br />

The Domain expert is using the Service Modeling Tool in order to<br />

create the PSP IP diagram for a public service (fig. 10). While<br />

preparing the diagram, the Domain expert is also able to observe<br />

the values of various indicators. He is capable, in that way, to<br />

study the different versions of the service.<br />

Figure 9. Management of public documents<br />

Figure 10. Platform screenshot<br />

It should be noted that the Service Modeling Tool fully supports<br />

the proposed notation including rules as well as indicators<br />

presented in the previous section. In this respect, the Domain<br />

expert can choose to “validate” the diagram which results in<br />

checking that no rule is violated (see fig. 11 and 12).<br />

138<br />

Figure 11. Example of a detected violation<br />

Figure 12. Example of an error message<br />

Finally, the Domain expert can save a dialogue’s graph into an<br />

xml file, which can be retrieved in the future to complete the<br />

design or send it to the Content manager of the system. The<br />

Domain expert can also choose to model a part of the diagram and<br />

send the relevant file to another Domain expert to finalize it. This<br />

is particularly useful for modeling services provided by more than<br />

one public authority or for complex services where many Domain<br />

experts need to collaborate during the design of the diagram.<br />

Step 3. Content Manager Stores the Dialogue to the<br />

Database<br />

For each public service modeled, the Content manager adds some<br />

information such as title, description, responsible authority etc.<br />

Then he can use this information along with the xml file in order<br />

to publish the service in the Dialogues Presentation Website. For<br />

this purpose, he stores the graph in the Services Database that is<br />

accessible by the Dialogues Presentation Website.<br />

Moreover, in case of termination or modification of a service, the<br />

Content manager can delete the service from the database, thus<br />

making it unavailable for the public. Finally, the Content manager<br />

can produce public services’ aggregate statistics using data<br />

extracted from the database.<br />

Step 4. Citizen Launches the Dialogue<br />

The citizen/business visits the Dialogues Presentation Website<br />

and launches the dialogue for a specific service. The dialogue is<br />

automatically created on the fly by accessing the Services<br />

Database (fig. 11). In case the citizen is eligible for the service,<br />

the system also informs him about the required documents that he<br />

should adduce in order to proceed to the execution of the service.


Figure 13. Citizens website<br />

4.3 Technologies<br />

The Service Modeling Tool and Service Admin Tool were<br />

developed in this prototype under a common desktop application<br />

supporting different roles based on credentials. This application<br />

was implemented in Java. The Dialogues Presentation Website<br />

was implemented using PHP programming language. The services<br />

database was implemented using MySQL.<br />

A basic feature of the Service Modeling Tool is the graphic design<br />

and representation of dialogues as graphs. Jgraphx library allows<br />

the visual design, graphical representation and interaction with the<br />

dialogue’s graph.<br />

In the frame of the Service Modeling Tool there was a need for<br />

xml files processing. To this end, the XOM library was employed.<br />

The calculation of indicators was performed using depth-first<br />

search (DFS) graph theory algorithms.<br />

The validation of the graph in terms of identifying cycles was<br />

performed using the topolorder algorithm [8].<br />

5. CASE STUDY<br />

In this section we present a case study to demonstrate the<br />

proposed approach, model and platform. We use the public<br />

service passport issuance (in Greece). In order to model the<br />

service’s informative phase, we gathered and studied all relevant<br />

laws and rules governing the specific public service. Main source<br />

of information was also the official website passport.gov.gr.<br />

In the rest of this section, we present the four main steps that were<br />

followed in the process.<br />

Step 1. Input Documents are Described<br />

In this step the content manager is using the Service Admin Tool<br />

in order to describe all input documents needed for invoking<br />

Passport Issuance service, if these are not already in the database.<br />

In this case, there are 9 different input documents including ID,<br />

application, birth certificate etc. It should be noted that most of<br />

them are provided by other public authorities as the outcome of<br />

other public services.<br />

Step 2. Domain Expert Models the PSP IP Dialogue<br />

In this step the domain expert has to produce the PSP IP diagram.<br />

For this purpose, all service versions need to be documented in<br />

terms of different questions and answers, required documents and<br />

relevant costs.<br />

Next, the domain expert uses the Service Modeling Tool in order<br />

to model the service as a graph. The expert starts using the Start<br />

Node and proceeds with the first Question. This is done by<br />

139<br />

dragging and dropping the symbols from the Symbols area to the<br />

Design area just like in any other drawing tool (see fig. 14).<br />

The questions have to be formulated so that every Answer leads to<br />

a different version or satisfies a service precondition. A basic aim<br />

is to develop a graph that contains the minimum number of<br />

questions. Each question has to be short in length, easy to<br />

understand and focus on one only rule. For example, the question<br />

“Are you an adult Greek?” includes two rules (age and<br />

nationality) and thus should be divided in two questions.<br />

Obviously, there should also be no overlap between questions e.g.<br />

“What is your age?” and “Are you an adult?”<br />

Each Answer is followed by another Question or Required Input<br />

Documents that are needed to verify the answer.<br />

As a good practice, we recommend that the model starts with the<br />

eligibility questions i.e. those that determine whether someone is<br />

eligible and then proceeds with the versioning questions i.e. those<br />

determining the service version along with the needed input<br />

documents and costs.<br />

Figure 14. Modeling Passport Issuance service<br />

The following figure presents the full diagram for the Passport<br />

Issuance service. The diagram is not readable but provides an idea<br />

of the complexity of the dialogue.


Figure 15. Full model of Passport Issuance service<br />

From a technical point of view, it should be noted that the<br />

dialogue graph is stored as an xml file.<br />

An interesting feature of the platform is its ability to calculate and<br />

present a number of indicators for the modeled public service. By<br />

pressing “calculate” in the Service Modeling Tool (tab:<br />

Indicators) we obtain the results presented in fig. 16.<br />

These suggest there are 219 different paths (dialogues) in this<br />

service with 26 leading to a Non-Eligible end node. Hence, the<br />

public service contains 193 service versions.<br />

They further suggest a dialogue has a minimum of 3 and a<br />

maximum of 10 questions for the citizen. The citizen has to<br />

provide between 4 and 9 different input documents (based on his<br />

circumstances) to invoke the public service.<br />

Finally, the costs of the service is between 68.8 € and 84.4 € with<br />

an average cost of 80.11 €.<br />

Figure 16. Indicators for Passport Issuance<br />

140<br />

Step 3. Content Manager Stores the Dialogue to the<br />

Database<br />

In this step the content manager inserts some basic information on<br />

the service (see fig. 17) and stores it to the Service database hence<br />

making it available for launch by citizens.<br />

Figure 17. Inserting basic information about the service<br />

Step 4. Citizen Launches the Dialogue<br />

In this final step, the citizen visits the Dialogues Presentation<br />

website, selects the Passport Issuance service, views the basic<br />

information about it and launches the dialogue. After that, the<br />

questions are asked one by one (fig. 18).<br />

Figure 18. Screenshot presenting one question with possible<br />

answers<br />

Based on the answers, the citizen is informed whether he is<br />

eligible and in this case what are the required documents and the<br />

cost of the service (fig. 19).


Figure 19. Information provided after the dialogue completion<br />

6. CONCLUSIONS AND FUTURE WORK<br />

In this paper, we present a notation and platform that facilitates<br />

the informative phase of public service provision (PSP IP). This<br />

model capitalizes on previous work suggesting public services are<br />

represented (usually in models) and subsequently online dialogues<br />

are automatically developed for citizens to obtain personalized<br />

information.<br />

More specifically, we first present a modeling notation for PSP IP.<br />

The notation is influenced by BPMN and graph theory and<br />

suggests PSP informative phase is modeled as a directed acyclic<br />

graph that consists of one start node, one or more eligible and<br />

non-eligible end nodes, questions, answers, information, value<br />

and input documents. Furthermore, we introduce a number of<br />

indicators of graph models such as number of dialogues, max and<br />

min questions in the diagram; max and min required documents;<br />

max and min cost (or subsidy).<br />

We further present a prototype platform that can be used by<br />

domain experts to model PSP IP and by citizens to execute<br />

corresponding dialogues that have been automatically created<br />

from the models. The platform also performs a number of validity<br />

tests on the graph and automatically calculates the values of<br />

indicators thanks to the use of graph theory algorithms. This<br />

platform provides some clear advantage over other approaches<br />

(presented in section 2) as shown at the beginning of section 3.<br />

Future work includes revisiting the proposed modeling notation to<br />

become theoretically solid and robust without losing its<br />

simplicity. It also includes further enriching the modeling<br />

notation. For example, in its current form, the model cannot<br />

handle complex situations such as when Document A or<br />

Document B can be used as required documents to validate an<br />

answer.<br />

Future work also includes a thorough investigation of indicators.<br />

In this work, we introduced a small number of indicators and<br />

implemented a subset of them. However, deeper theoretical work<br />

is needed including validation by experts.<br />

The platform itself is only a proof-of-concept prototype hence<br />

there is substantial room for improvement both in terms of<br />

functionality but also user friendliness, robustness etc.<br />

For example, we would like to enhance the platform to be able to<br />

handle more complex situations, e.g. enabling domain experts<br />

141<br />

from different public authorities to collaborate in order to model a<br />

set of public services required to fulfill a life event. For this<br />

purpose, our intention is to move towards a web-based platform<br />

for service modeling.<br />

Finally, as a next step for our case study, once the above<br />

mentioned work is done, we aim to contact the official authorities<br />

and suggest integrating the Dialogues Presentation Website in the<br />

official Passport Issuance website (www.passport.gov.gr).<br />

7. ACKNOWLEDGMENTS<br />

Part of this work was conducted within the eGovPoliNet project<br />

which is co-funded by the European Commission.<br />

8. REFERENCES<br />

[1] Chun S., Atluri V., and Adam N. Dynamic Composition of<br />

Workflows for Customized eGovernment Service Delivery.<br />

In: Proceedings of dg.o 2002, (2002), ACM Press, 383-389.<br />

[2] European Commission. Digitizing Public Services in Europe:<br />

Putting ambition into action, 9th Benchmark Measurement,<br />

2010.<br />

[3] Gartner. Forecast: IT services 20082015, 2Q11 Update,<br />

2011.<br />

[4] Klievink, B., Janssen, M. Realizing joined-up government -<br />

Dynamic capabilities and stage models for transformation.<br />

Government Information Quarterly, 26, 2 (2009), 275-284<br />

[5] Layne K. and Lee J. Developing fully functional egovernment:<br />

A four stage model. Government Information<br />

Quarterly, 18, 2 (2001), 122-136.<br />

[6] Loutas N., Lee D., Maali F. Peristeras V., Tarabanis K. The<br />

Semantic Public Service Portal (S-PSP). In: Proceedings of<br />

8th Extended Semantic Web Conference (ESWC 2011),<br />

(Heraklion, Greece, 2011), 227-242.<br />

[7] Momotko M., Izdebski W., Tambouris E., Tarabanis K. and<br />

Vintar M. An Architecture of Active Life Event Portals:<br />

Generic Workflow Approach. Electronic Government, LNCS<br />

# 4656, Springer Verlag, (2007), 104-115.<br />

[8] Paparrizos K. Algorithms, Zygos, Greece, 2002.<br />

[9] Peristeras, V. The Governance Enterprise Architecture-GEAfor<br />

Reengineering Public Administration. PhD Thesis,<br />

University of Macedonia, Greece, 2006.<br />

[10] Siau, K., Long, Y. Synthesizing e-government stage models<br />

– a meta-synthesis based on meta-ethnography approach.<br />

Industrial Management & Data Systems, 105, 4, (2005) 443-<br />

458.<br />

[11] Tambouris E. Introducing the need for a Domain Model in<br />

Public Service Provision (PSP) eGovernment Systems. In:<br />

Proceedings of ICDIM 2008, IEEE Press, 794-799.<br />

[12] Tambouris E., Tarabanis K., A dialogue-based, life-event<br />

oriented, active portal for online one-stop government: the<br />

OneStopGov platform. In: Proceedings of dg.o 2008, (2008),<br />

ACM Press, 405-406.<br />

[13] United Nations. Global E-Government Survey 2012, 2012


142


The Complexity of Cross-Boundary Information Sharing:<br />

An Organizational Perspective on Taiwan E-Government<br />

Tung-Mou Yang<br />

Department of Library and Information Science, National Taiwan University<br />

ABSTRACT<br />

Cross-boundary Information sharing has long been considered an<br />

important approach for increasing organizational efficiency and<br />

performance. However, achieving cross-boundary information<br />

sharing is a complex task not only in the private sector but also in<br />

the public sector. This research explores the complexity of crossboundary<br />

information sharing by employing a case study in<br />

Taiwan e-Government. Data are collected through semi-structured<br />

interviews and analyzed by using grounded theory techniques.<br />

While a variety of influential factors can come from different<br />

perspectives such as technology, organization, legislation, policy,<br />

and surrounding environment, this paper takes a deeper look to<br />

focus on the influential organizational factors. The findings of this<br />

exploratory research is also able to contribute to the current<br />

information-sharing literature from an international perspective.<br />

Categories and Subject Descriptors<br />

H.4.2 [Information Systems Applications]: Type of systems – egovernment<br />

applications<br />

General Terms<br />

Management, Performance, Human Factors, Theory<br />

Keywords<br />

Information Sharing, Electronic Government, Taiwan<br />

1. INTRODUCTION<br />

With the development of information and communication<br />

technologies, e-Government has become an important strategy for<br />

attaining the effectiveness and efficiency in government<br />

operations and public services. Several stage-models of e-<br />

Government developments are proposed by researchers, and the<br />

critical role of cross-boundary information sharing in e-<br />

Government is identified [1]. Although many government<br />

agencies have integrated services within their own agencies,<br />

citizens and businesses still need to interact with various different<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

No. 1, Sec. 4, Roosevelt Rd., Taipei, 10617 Taiwan (R.O.C.)<br />

886.2.3366.2970<br />

tmyang@ntu.edu.tw<br />

143<br />

government agencies to acquire desired services. There is an<br />

urgent cross-boundary information-sharing need among<br />

government agencies of different levels and functionalities.<br />

2. THE COMPLEXITY OF CROSS-<br />

BOUNDARY INFORMATION SHARING<br />

Nevertheless, cross-boundary information sharing in the public<br />

sector is a complex task and usually happens in a diversified<br />

environment with participants having different values, goals, and<br />

cultures. In order to facilitate information-sharing initiatives,<br />

identifying influential factors is critical, and a variety of<br />

perspectives such as technological, organizational, sociological,<br />

ideological, and political contexts should be considered [2].<br />

In the technological perspective, information sharing activities can<br />

be considered as IT projects when there are usually information<br />

system construction and business process reengineering involved<br />

[3]. It is a challenge to integrate heterogeneous information<br />

systems having different platforms, data standards, schemas and<br />

qualities [3]. In addition, technological capability among the<br />

participating organizations is also critical to the success of crossboundary<br />

information sharing [4].<br />

In the organizational perspective, interagency information sharing<br />

involves complex interactions among involving organizations [3,<br />

5]. Organizations have different values and cultures and may<br />

spread in different geographic areas to make communication<br />

difficult and inefficient. The creation and maintenance of interorganizational<br />

relationship also rely heavily on trust building<br />

among involved organizations [5, 6]. However, trust in<br />

information sharing collaboration can decreases due to concerns<br />

of losing autonomy and information misusing by others to incur<br />

liabilities [7, 8]. In addition to trust, leadership can be utilized as<br />

an authority force to promote cross-boundary coordination [9].<br />

The lack of resource such as staff shortage is another challenge.<br />

An agency may focus on urgent issues within its own organization<br />

if the immediate benefits of sharing information cannot be<br />

foreseen by the agency [10, 11].<br />

In the political and policy perspective, legal and policy regulations<br />

can shape relationship building, risk reduction, and trust<br />

development in inter-organizational information sharing when<br />

specific guidance is mandated [3, 4, 12, 13]. Without support from<br />

legislators and policy mandate, cross-boundary information<br />

sharing in the public sector can lose its priority and necessary<br />

resources to make the project sustainable [7]. Nevertheless, crossboundary<br />

information sharing may also be hindered due to related


policies to prevent government agencies from sharing sensitive<br />

and regulated information [3, 7, 12]. Therefore, an explicit<br />

statutory authority should clearly define the circumstances that<br />

information collected in one agency can be shared to other<br />

agencies [4, 10].<br />

3. THE SELECTED CASE STUDY<br />

In the past decade Taiwan government has focused its effort on<br />

developing initiatives of interagency information sharing and<br />

integration. Current focus has been on cross-agency service<br />

integration and the promotion of integrated e-services.” Therefore,<br />

the context of Taiwan e-Government and its past and ongoing<br />

development in cross-agency shared services make a good case<br />

for this study to explore the complexity of interagency<br />

information sharing. Specifically, this research focuses on the<br />

organizational perspective to examine the following two<br />

questions:<br />

1. What are the critical organizational factors that influence<br />

the initiatives of cross-boundary information sharing in<br />

Taiwan e-Government?<br />

2. What is the nature of the impact of the factors on the<br />

initiatives of cross-boundary information sharing in Taiwan<br />

e-Government?<br />

4. RESEARCH DESIGN AND METHOD<br />

This study employs a case study methodology, and the selected<br />

case comes from the context of Taiwan e-Government. In<br />

particular, a case study of the e-Networking Project of<br />

Government Online Service in Taiwan is developed and then<br />

applied in the research.<br />

A purposive sampling using snowball sampling methodology is<br />

undertaken to identify the relevant candidates to conduct<br />

interviews. In-depth and semi-structured interviews were used to<br />

collect data. There were in total twenty-eight participants<br />

interviewed in the study. The data analysis process followed an<br />

inductive approach by using grounded theory techniques. During<br />

data analysis, a qualitative software, Atlas-ti, was utilized to<br />

support coding and analysis activities.<br />

5. FINDINGS<br />

In this exploratory research, established organizational structures<br />

and instilled organizational cultures of government agencies are<br />

identified to influence initiatives of cross-boundary information<br />

sharing. In addition, other influential organizational factors are<br />

listed and discussed according to the roles of information provider<br />

and information receiver. Lastly, some organizational factors that<br />

can bring positive impact on the related initiatives are also<br />

addressed.<br />

5.1 Bureaucratic Organizational Structures<br />

Cross-boundary information sharing in e-Government is not just<br />

related to technological issues but is in a complex context<br />

involving different government agencies separated by the<br />

bureaucratic organizational structures. Boundaries of information<br />

sharing are formed by the bureaucracy from both the vertical and<br />

horizontal dimensions. With different operational procedures and<br />

work flows, resources and budgets, government agencies have<br />

respective missions and operations. Different government<br />

agencies can bring up different levels of information quality, and<br />

their approaches and strategies to share information across<br />

organizational boundaries also vary from each other. It is also<br />

144<br />

observed that government agencies within the same Ministry can<br />

encounter fewer obstacles to share information when fewer<br />

organizational boundaries are formed among them.<br />

5.2 Organizational Cultures and Values<br />

Having different missions and operations, government agencies<br />

foster their respective organizational cultures and values. In the<br />

case study, some government agencies such as the Department of<br />

Household Registration are already defined to act as information<br />

providers in their organizational missions. The government<br />

agencies can be more willing to share information to other<br />

agencies. On the contrary, some agencies such as police agencies<br />

and taxation agencies act more conservative to share their<br />

information to others. The negotiation and communication among<br />

government agencies with different cultures and values usually<br />

takes time and cost.<br />

5.3 Influential Factors to Information<br />

Providers<br />

For government agencies acting as information providers, several<br />

factors that influence their intentions to share information are<br />

discussed in the following subsections.<br />

5.3.1 Extra Effort under Limited Resource<br />

The major effort of information sharing usually falls on the<br />

process of information preparation and the following maintenance<br />

and service. The process of information preparation can be a very<br />

time-consuming task especially when a government agency has to<br />

go over some of its information systems or even modify them to<br />

produce the required information. In addition, an information<br />

provider also has to assign necessary personnel to maintain the<br />

hardware equipment and the information systems implemented for<br />

cross-boundary information sharing which require extra time,<br />

labor, and effort. Under limited budget and resource, government<br />

agencies tend to focus on their own businesses first and put the<br />

information-sharing requests from other agencies in the lower<br />

priority.<br />

5.3.2 Concern of Information Quality<br />

The intention of a government agency to share information across<br />

boundaries can also be influenced by the quality of information it<br />

currently possesses. A government agency can be less willing to<br />

share information when its information is in low completeness<br />

and accuracy. A government agency has concerns in incurring<br />

potential scrutiny and does not want to be liable for providing<br />

incomplete and inaccurate information to other government<br />

agencies.<br />

5.3.3 Concern of Information Misuse<br />

Another information provider’s concern is information misuse by<br />

other agencies to incur liability. After information is shared across<br />

boundaries, information providers have little control over the<br />

shared information and encounter difficulty in knowing how the<br />

shared information is utilized by other agencies. Whether the<br />

information is protected in a secured information environment,<br />

whether the information is solely applied to the proposed purpose,<br />

and whether the information is used for other unknown purposes?<br />

The uncertainty regarding how other government agencies may<br />

treat, use, and protect the shared information incur the liability<br />

concern of government agencies to act as information providers to<br />

share information across boundaries.


5.3.4 Limited Incentive and Reward<br />

In the case study, for government agencies acting as information<br />

providers, they have very few and limited incentive and reward to<br />

share information. The limited incentive and reward available is<br />

not encouraging enough for government agencies and their<br />

employees to contribute effort to interagency information sharing.<br />

In most of the cases, major credits are usually taken by<br />

information receivers which acquire information sharing from<br />

other government agencies to provide integrated or innovative<br />

services. Information providers actually care more about the<br />

liability rather than the limited incentive or reward.<br />

5.4 Influential Factors to Information<br />

Receivers<br />

For government agencies acting as information receivers, several<br />

observed factors that influence initiatives of cross-boundary<br />

information sharing are discussed in the following subsections.<br />

5.4.1 Over-Estimated Capability of Information<br />

Provider<br />

Some information requestors may request information that does<br />

not exist in the databases of information providers. The situation<br />

can happen when an information requestor does not really<br />

understand an information provider’s limitation of information<br />

possession. A cognition divide regarding cross-boundary<br />

information sharing exists between some information providers<br />

and information receivers so that related initiatives cannot be<br />

implemented properly.<br />

5.4.2 The Willingness and Trust to Use Shared<br />

Information<br />

It is also observed that some government agencies put little trust<br />

on the shared information from other agencies. Even though the<br />

information is actively shared across boundaries based on<br />

legitimate policy, some conservative agencies still prefer<br />

following their traditional operational procedures without<br />

applying the shared information to their work. They are unwilling<br />

to utilize the information when the shared information can indeed<br />

improve the efficiency and accuracy of their operations and<br />

increase the effectiveness of public services. Hence, the concept<br />

to trust and to utilize shared information is critical to the success<br />

of interagency information sharing.<br />

5.5 Influential Factors to Both Information<br />

Providers and Receivers<br />

The following subsections talk about influential factors that can<br />

be applied to both information providers and information<br />

requestors.<br />

5.5.1 The Long-Been-Ignored Information Unit<br />

The role of IT professionals and information units is critical to the<br />

success of cross-boundary information sharing. The dedicated<br />

time and effort from IT professionals and information units is<br />

required to setup the infrastructure, to prepare and to receive<br />

information. However, in the case study, compared with the<br />

administrative units, the information units generally do not<br />

receive similar support from the leadership. The information units<br />

are mainly defined as the supporting units to facilitate business<br />

operations. In addition, many information units are just temporary<br />

units and are composed of contract employees without suitable<br />

information-related training.<br />

145<br />

5.5.2 Leadership Interactions<br />

The personalities, management styles, and interpersonal<br />

relationships of agency leaders matter, especially for the<br />

horizontal interagency information sharing where the involved<br />

agencies are parallel organizations. Social networks and good<br />

relationships among agency leaders can benefit information<br />

sharing initiatives. When the interactions among agency leaders<br />

are not in harmony, interagency information sharing can even<br />

result in failure.<br />

5.6 Some Suggested Success Factors<br />

The participants of the case study also suggested some factors that<br />

can lead to the success of cross-boundary information sharing.<br />

5.6.1 The Fostering of Reciprocity Concept<br />

In the case study, it is indicated that the existing reciprocal<br />

relationship can increase the success in cross-boundary<br />

information sharing. The participants asserted that cross-boundary<br />

information sharing can be more easily achieved between two<br />

government agencies when they both have information needs to<br />

their respectively possessed information. The incentive to crossboundary<br />

information sharing can be created and enhanced by the<br />

reciprocal information sharing between the two government<br />

agencies.<br />

5.6.2 The Involvement of Higher-Level Authority<br />

The interviewees also mentioned the importance of authoritative<br />

support to push the initiatives of cross-boundary information<br />

sharing. The authoritative support can come from two aspects.<br />

One is the authoritative support from participating government<br />

agencies. The participation and support from high-level authority<br />

can affirm the importance and the priority of related initiatives.<br />

Another aspect of authoritative support comes from the level<br />

involved in the information sharing effort. The involvement of<br />

higher-level government agencies can be the championship to<br />

initiate and direct the process of cross-boundary information<br />

sharing.<br />

6. DISCUSSIONS<br />

In the research, various factors influencing interagency<br />

information sharing are discussed from an organizational<br />

perspective. While some factors mainly have influences solely on<br />

information providers and some on information receivers only,<br />

others have impacts on both providers and receivers (see Figure<br />

1).<br />

- Extra Labor and Effort under Limited Resource<br />

- Concern of Information Quality to Incur Liability<br />

- Concern of Information Misuse to Incur Liability<br />

- Limited Incentive and Reward<br />

Information Provider<br />

Information Retriever<br />

- Over-Estimated An Information Provider’s Capability<br />

- The Willingness and Trust to utilize Shared Information<br />

- The Fostering of Reciprocal Concept<br />

- The Involvement of the Higher-Level Leadership<br />

- Organizational Structures of Bureaucracy<br />

- Organizational Cultures and Values<br />

- The Long-Been-Ignored Information Unit<br />

- Leadership Interaction of Government Agencies<br />

Figure 1. The organizational factors to influence cross-boundary<br />

information sharing<br />

The result of the case study reveals that government agencies<br />

behaving as information providers show less concern of losing<br />

valuable assets and competitive advantages to other agencies,


ecause the majority of the shared information in the case study is<br />

data-oriented information and is subject to being updated daily.<br />

Even though some information receivers may retain the acquired<br />

information, the information still soon becomes obsolete and<br />

inaccurate.<br />

The interviewees agree that when two government agencies are<br />

co-located, their information sharing initiative may benefit from<br />

the better and closer social and personal network among them.<br />

However, the interviewees do not consider the geographic<br />

locations of government agencies an important factor in the case<br />

study. The interviewees point out that, with the advancement of<br />

information technologies, cross-boundary information sharing is<br />

no longer obstructed by geographic limitations. The interviewees<br />

also state that Taiwan is small so that geographic location is not<br />

the major concern.<br />

Overall, from an organizational perspective, the paper takes a<br />

deeper look at the complexity of inter-agency information sharing.<br />

The observed influential factors provide insights to researchers<br />

and also practitioners. The paper also contributes to the current<br />

information-sharing literature from an international perspective.<br />

In addition, while open data has become an important<br />

governmental movement in recent years, open data can be viewed<br />

as one type of cross-boundary information sharing among<br />

government agencies and the public including individuals and<br />

businesses. Some of the identified factors in the paper can be<br />

applied to explain the behaviors of government agencies<br />

participating in open data initiatives. Future research can focus<br />

more on other perspectives including technology, legislation and<br />

policy, and surrounding environment to provide a more complete<br />

and integrated discussion to understand the complexity of crossboundary<br />

information sharing among government agencies.<br />

7. ACKNOWLEDGMENTS<br />

The author wants to thank Dr. Yu-Hsieh Sung, the Minister of the<br />

Research, Development and Evaluation Commission and other<br />

government officials of the Taiwan government for their<br />

important help during the interviewee recruitment of the research.<br />

The author is also thankful for all the interviewees participating in<br />

the research for their time, patience, and valuable information and<br />

suggestions.<br />

8. REFERENCES<br />

[1] Klievink, B. and M. Janssen, Realizing joined-up<br />

government -- Dynamic capabilities and stage models for<br />

transformation. Government Information Quarterly, 2009.<br />

26(2): p. 275-284.<br />

[2] Dawes, S.S., A.M. Cresswell, and T.A. Pardo, From "need to<br />

know" to "need to share": Tangled problems, information<br />

boundaries, and the building of public sector knowledge<br />

146<br />

networks. Public Administration Review, 2009. 69: p. 392-<br />

402.<br />

[3] Gil-Garcia, J.R., I. Chengalur-Smith, and P. Duchessi,<br />

Collaborative e-Government: impediments and benefits of<br />

information-sharing projects in the public sector. European<br />

Journal of Information Systems, 2007. 16(2): p. 121-133.<br />

[4] Lam, W., Barriers to e-government integration. Journal of<br />

Enterprise Information Management, 2005. 18(5/6): p. 511-<br />

530.<br />

[5] Pardo, T.A. and G.K. Tayi, Interorganizational information<br />

integration: A key enabler for digital government.<br />

Government Information Quarterly, 2007. 24(4): p. 691-715.<br />

[6] Zaheer, A. and B. McEvily, Does trust matter? Exploring the<br />

effects of interorganizational and interpersonal trust on<br />

performance. Organization Science, 1998. 9: p. 141-158.<br />

[7] Zhang, J., S.S. Dawes, and J. Sarkis, Exploring stakeholders'<br />

expectations of the benefits and barriers of e-Government<br />

knowledge sharing. The Journal of Enterprise Information<br />

Management, 2005. 18(5): p. 548-567.<br />

[8] Faerman, S.R., D.P. McCaffrey, and D.M. Van Slyke,<br />

Understanding interorganizational cooperation: Publicprivate<br />

collaboration in regulating financial market<br />

innovation. Organization Science, 2001. 12(3): p. 372-388.<br />

[9] Willem, A. and M. Buelens, Knowledge sharing in public<br />

sector organizations: The effect of organizational<br />

characteristics on interdepartmental knowledge sharing.<br />

Journal of Public Administration Research and Theory, 2007.<br />

17(4): p. 581-606.<br />

[10] Landsbergen, D.J. and G.J. Wolken, Realizing the promise:<br />

Government information systems and the fourth generation<br />

of information technology. Public Administration Review,<br />

2001. 61(2): p. 206-220.<br />

[11] Zhang, J. and S.S. Dawes, Expectations and perceptions of<br />

benefits, barriers, and success in public sector knowledge<br />

networks. Public Performance & Management Review, 2006.<br />

29(4): p. 433-466.<br />

[12] Gil-Garcia, J.R. and T.A. Pardo, E-Government success<br />

factors: Mapping practical tools to theoretical foundations.<br />

Government Information Quarterly, 2005. 22(2): p. 187-216.<br />

[13] Otjacques, B., P. Hitzelberger, and F. Feltz, Interoperability<br />

of e-Government information systems: Issues of<br />

identification and data sharing. Journal of Management<br />

Information Systems, 2007. 23(4): p. 29-51.


Session 6<br />

Digital Records & Information<br />

Management


A Patent System Ontology for Facilitating Retrieval of<br />

Patent Related Information<br />

Siddharth Taduri, Gloria T. Lau, Kincho H. Law<br />

Engineering Informatics Group<br />

Stanford University, Stanford, CA, USA<br />

{staduri, glau, law}@stanford.edu<br />

ABSTRACT<br />

The recent years have seen a tremendous growth in research and<br />

developments in science and technology, and an emphasis in<br />

obtaining Intellectual Property (IP) protection for one’s<br />

innovations. Information pertaining to IP for science and<br />

technology is siloed into many diverse sources and consists of<br />

laws, regulations, patents, court litigations, scientific publications,<br />

and more. Although a great deal of legal and scientific<br />

information is now available online, the scattered distribution of<br />

the information, combined with the enormous sizes and<br />

complexities, makes any attempt to gather relevant IP-related<br />

information on a specific technology a daunting task. This paper<br />

describes a knowledge-based software framework to facilitate<br />

retrieval of patents and related information across multiple diverse<br />

and uncoordinated information sources in the US patent system.<br />

The document corpus covers issued US patents, court litigations,<br />

scientific publications, and patent file wrappers in the biomedical<br />

technology domain.<br />

Categories and Subject Descriptors<br />

H.3.3 [Information Storage and Retrieval]: Information Search<br />

and Retrieval – Retrieval Models, J.1 [Administrative Data<br />

Processing]: Law<br />

General Terms<br />

Algorithms, Design, Economics, Experimentation<br />

Keywords<br />

Ontology, Patent, Information Retrieval, Knowledgebase<br />

1. INTRODUCTION<br />

The recent years have seen a tremendous growth in research and<br />

developments in science and technology, and an emphasis in<br />

obtaining Intellectual Property (IP) protection for one’s<br />

innovations. IPs are important assets of any organization. During<br />

the lifetime of a patent, from its initial filing, patent issuance to<br />

disputes and litigations, the patent system will constantly be<br />

searched for information. However, information pertaining to IP<br />

and the patent system for science and technology is siloed into<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that<br />

copies bear this notice and the full citation on the first page. Copyrights<br />

for components of this work owned by others than ACM must be<br />

honored. Abstracting with credit is permitted. To copy otherwise, to<br />

republish, to post on servers or to redistribute to lists, requires prior<br />

specific permission and/or a fee.<br />

ICEGOV '12, October 22 -­‐ 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-­‐1-­‐4503-­‐1200-­‐4/12/10...$15.00<br />

147<br />

Jay P. Kesan<br />

College of Law<br />

University of Illinois, Urbana-Champaign, IL, USA<br />

kesan@illinois.edu<br />

many diverse sources and consists of laws, regulations, patents,<br />

court litigations, and more. Although a great deal of legal and<br />

government information is now available online, the scattered<br />

distribution of the information, combined with the enormous sizes<br />

and complexities, makes any attempt to gather relevant IP-related<br />

information, even on a specific technology, a daunting task.<br />

Currently, the task of gathering IP-related information is<br />

performed manually and is both laborious and expensive. This<br />

falls disproportionally on smaller firms, start-ups, and individual<br />

inventors who have very limited resources. This paper describes<br />

the development of a patent system ontology to facilitate retrieval<br />

of patents and related information across multiple diverse and<br />

uncoordinated information sources in the US patent system.<br />

This paper is organized as follows: Section 2 discusses the<br />

background and motivation for this research. Section 3 briefly<br />

describes our use case and document corpus. Section 4 introduces<br />

the patent system ontology and its structure. Section 5 briefly<br />

describes the Information Retrieval (IR) framework. Illustrative<br />

examples are provided in Section 6. Section 7 concludes this<br />

paper by summarizing the current status.<br />

2. BACKGROUND AND MOTIVATION<br />

The following scenarios illustrate some of the issues faced with<br />

the current patent system:<br />

o A company looking to patent its technology on medical<br />

imaging devices, for example, is required to perform an<br />

initial patentability search and establish the usefulness,<br />

novelty, and non-obviousness of the technology [1]. The<br />

patentability search involves a thorough study of prior art<br />

including scientific literature and patent databases,<br />

competitor analysis, existing litigations to similar<br />

o<br />

technologies, and regulations issued by government agencies<br />

such as the Federal Drug Agency (or any agency enforcing<br />

laws with respect to medical imaging devices and related<br />

technologies).<br />

Similar to the patent applicant, a patent examiner performs<br />

patentability search when examining an application. As of<br />

2009, the United States Patent and Trademark Office<br />

(USPTO) employs about 6,242 patent examiners and<br />

received over 456,106 utility patent applications [28]. 1<br />

Roughly, this translates to around 73 patents per examiner<br />

annually and approximately 1.5 patents per examiner per<br />

1 The USPTO’s annual statistics can be accessed at<br />

http://www.uspto.gov/web/offices/ac/ido/oeip/taf/reports.htm<br />

(Accessed on 03/01/2012)


o<br />

week. Although a patent examiner is generally well-versed<br />

with the technological domain of the patent application, the<br />

situation imposes a serious time constraint during the review<br />

process. Hence, each application receives lesser time and<br />

leads to insufficient examination, and possibly infringement<br />

or invalidation at a later stage.<br />

To protect IPs, companies may perform an infringement<br />

analysis to ensure that a particular patent’s right is not being<br />

infringed. The consequences of an infringement can be<br />

severe and result in heavy losses. Infringement analysis<br />

involves a thorough search in the issued patents database,<br />

patent application database, prior court litigations,<br />

regulations, and any form of documented evidence to help<br />

assert the infringement or invalidate an infringing patent’s<br />

claim as a defensive measure.<br />

Irrespective of the scenario, whether a company intends to patent<br />

its technology or to perform an infringement analysis, or a patent<br />

examiner intends to perform a patentability search, several<br />

questions arise:<br />

o What are the issued patents in related technologies?<br />

o What is the legal scope of similar patents?<br />

o Who are the competitors?<br />

o Have any similar patents been challenged in court?<br />

o How can one work around existing body of knowledge?<br />

o Are there any scientific literatures, or regulations which can<br />

potentially be used to challenge and to invalidate a patent’s<br />

claims?<br />

Many existing methods attempt to improve IR within a single<br />

information source [9][12][14][16][26][27][30][31]. However,<br />

these questions cannot be answered from any single information<br />

source. An integration framework is needed to enable the retrieval<br />

of relevant information from diverse sources. This research<br />

explores a knowledge-based approach to address two fundamental<br />

information integration issues – (a) the lack of interoperability<br />

among the information sources in the current patent system; and<br />

(b) the varying information needs by the users of the patent<br />

system.<br />

Interoperability between information sources is essential in order<br />

to perform multi-source IR [29]. E-government initiatives in the<br />

US and Europe are increasingly adopting interoperability<br />

frameworks [11]. An important step in achieving interoperability<br />

is to allow the information sources to communicate with one<br />

another. To achieve this, we propose a Patent System Ontology<br />

(PSO) to standardize the representation of the information sources<br />

and achieve interoperability. While the documents are vastly<br />

diverse, the information is implicitly cross-referenced. For<br />

example, a court document which involves a particular patent<br />

document reveals a high relevancy between the two documents.<br />

Such relevancy is central to our method for multi-source IR and is<br />

captured by the PSO.<br />

Terminological variations such as synonymy and polysemy are a<br />

common source of problems which often hinder the effectiveness<br />

of traditional term based IR methods. We develop a knowledgebased<br />

method that uses external knowledge sources such as<br />

domain ontologies to provide the required semantics to resolve<br />

terminological inconsistencies and improve semantic<br />

interoperability between information sources. The IR framework<br />

148<br />

then integrates the patent system ontology and the domain<br />

ontologies to retrieve a set of related documents across multiple<br />

sources.<br />

3. USE CASE AND DOCUMENT CORPUS<br />

We demonstrate our methodology through a use case in the<br />

biomedical domain – erythropoietin, a hormone responsible for<br />

the production of red blood cells. The synthetic production of<br />

erythropoietin has enabled the treatment of chronic diseases such<br />

as anemia. Epogen - the production brand of synthetic<br />

erythropoietin manufactured by the pharmaceutical giant Amgen<br />

Inc. is protected by five core patents namely – US 5,547,933, US<br />

5,618,698, US 5,621,080, US 5,756,349, and US 5,955,422. These<br />

patents have been central to many related court cases involving<br />

other pharmaceutical companies such as Hoescht Marion Roussel<br />

and Transkaryotic Therapies, and heavily cite scientific literature<br />

from top journals. Our corpus includes a total of 1150 patent<br />

documents downloaded from the USPTO database related to<br />

erythropoietin [28]. We identified 135 relevant patents amongst<br />

the 1150 patents by following forward and backward citations<br />

from the five core patents that will serve as the ground truth.<br />

Several court litigations, involving these five patents and some<br />

others, date back to the late 1980's. Around 30 U.S. patent<br />

litigation documents are collected which are closely related to the<br />

use case from Public Access to Court Electronic Records<br />

(PACER), an electronic system to access the databases of the 94<br />

District Courts and 13 Courts of Appeals (CAFC) [22]. The<br />

repository includes file wrappers for the core patents. The<br />

repository also contains the 2007 Text Retrieval Conference<br />

(TREC) Genomics data set, which consists of over 162,000<br />

scientific publications from 49 prominent biomedical journals<br />

[32]. All in all, the repository contains a diverse set of information<br />

from different domains.<br />

4. PATENT SYSTEM ONTOLOGY<br />

In this section, we describe a patent system ontology which<br />

provides standardized representation and a shared vocabulary of<br />

the information sources to facilitate interoperability. The ontology<br />

will also provide the required declarative syntax to express multisource<br />

queries, rules, and relevancy metrics.<br />

Many ontology development methodologies have been proposed<br />

and implemented over the years [6][8][10][18]. In general, the<br />

development of ontologies consists of several steps starting from<br />

the conceptualization of the domain, defining the properties interrelating<br />

the defined classes, instantiating the classes with physical<br />

objects and the verification of the constructed ontology. The<br />

development process is iterative as the ontology evolves to satisfy<br />

the requirements of the application it is being designed for [18].<br />

The resulting ontology is instantiated with actual physical<br />

documents from the document repository.<br />

Another practical aspect of ontology development is the<br />

specification language in which the ontology will be coded.<br />

Several specification languages have evolved over the years<br />

including frame based languages such as F-Logic and OIL, and<br />

descriptive logic based languages such as DARPA Agent Markup<br />

Language and Ontology Inference Layer (DAML+OIL), Resource<br />

Description Framework (RDF) and Web Ontology Language<br />

(OWL) [21,24]. The factors for choosing a specification language<br />

include expressivity, reasoning capabilities, availability of tools,<br />

re-use and personal preference. RDF is a widely used language to<br />

conceptualize domains. OWL is a W3C recommendation which is


uilt on top of the semantics of RDF to provide higher<br />

expressivity levels. These higher expression levels allow us to<br />

define disjoint classes, ‘sameAs’ or ‘differentFrom’ axioms<br />

among others [21]. Several tools have also been developed for the<br />

construction and modeling of ontologies such as Protégé and<br />

Chimaera [7][23]. Protégé supports both OWL and RDF, and<br />

provides useful features and plugins allowing us to query and<br />

visualize the ontology. Taking into account the above mentioned<br />

considerations, we choose OWL as the specification language and<br />

Protégé-3.4 as our development tool for the patent system<br />

ontology. However, it should be noted that not all OWL axioms<br />

are highly scalable; hence, to the extent possible we make<br />

maximum use of the RDF subset of the OWL axioms.<br />

4.1 Scope<br />

Ontologies are typically developed with specific applications as<br />

targets. Gruninger and Fox suggested that a set of competency<br />

questions be developed; these are questions that the ontology is<br />

expected to answer [10]. Developing these questions not only<br />

helps define the scope of our ontology but also allows us to verify<br />

the usefulness of the ontology both throughout and after the<br />

development phase [18]. In the patent system domain, the target<br />

applications may include patent claim invalidation, and patent<br />

infringement analysis. The following are selected examples of<br />

competency questions.<br />

Patent Domain:<br />

o Return all patent documents which contain the phrase<br />

‘recombinant erythropoietin receptor’ in the claims<br />

o Return all the patent documents which contain the phrase<br />

‘recombinant erythropoietin receptor’, at least 3 claims,<br />

issued before 02-02-1999 and assigned to Genetics Inc.<br />

Court Case Domain:<br />

o Return all court cases which contain the term –<br />

‘erythropoietin’<br />

o Return all court cases which involve the company Amgen<br />

Inc. either as the plaintiff or defendant, and from the District<br />

Court of Massachusetts<br />

Multi-domain:<br />

o Return all patents which contain the term – ‘erythropoietin’<br />

in their claims, which are involved in at least one court<br />

litigation.<br />

o Return all court cases with the term ‘erythropoietin’. From<br />

these court cases, return the patents involved. From these<br />

patents, follow the backward and forward citations to<br />

identify more important patents.<br />

Note that the questions can get more complex depending on the<br />

requirement of the user. The results of one query can be further<br />

re-filtered with additional constraints. In each of the listed<br />

questions, the main terms (or objects) are underlined. First, these<br />

terms are grouped together into concepts or classes such that they<br />

represent a collection of items corresponding to that term. Second,<br />

relations are drawn between classes such that the competency<br />

questions can be sufficiently expressed as a query using those<br />

classes and relationships. The competency questions shown in no<br />

way limit the use of the ontology to these applications alone,<br />

rather they are examples of questions the ontology must be<br />

capable of answering at the minimum. Furthermore, the list of<br />

149<br />

competency questions presented is not meant to be an exhaustive<br />

list, but to illustrate how the metadata and text fields parsed from<br />

the documents.<br />

Relations in OWL are binary relations, i.e. they can be used to<br />

relate exactly two classes, two individuals or an individual to a<br />

value. These can be represented in triple form as {subject,<br />

predicate, object}. The values that the subject and object take on<br />

can be restricted by defining the domain and the range of the<br />

relation; where domain refers to the subject end of the relation and<br />

range refers to the object end of the relationship [13]. OWL<br />

additionally allows us to define logical characteristics such as<br />

transitivity and symmetry on these binary relations which enhance<br />

the meaning of this relation. For example, if the ‘=>’ relation is<br />

defined as a transitive relation, then {A => B} can be used to infer<br />

{B => A}. Hence, if properly defined, new knowledge can be<br />

derived from existing knowledge. Additionally, we can define<br />

necessary and sufficient conditions on classes which can be used<br />

to logically classify instances into classes [13].<br />

4.2 Conceptualization<br />

Figures 1 and 2 show a conceptual view of the patent and court<br />

case documents respectively. The relations between two entities<br />

(shown as a black line) are directional from patents and court<br />

cases out to other classes, e.g. {Patent, hasTitle, Title}. The<br />

relations are not symmetric and hence the inverse {Title, hasTitle,<br />

Patent} does not hold true. As shown in the figures, the remaining<br />

classes can be grouped under either metadata or textual<br />

information. This form of classification helps to address all the<br />

metadata at once, instead of individually calling out to each one.<br />

For example, if an application requested for all metadata of a<br />

patent, using the ontology we can return all metadata entities such<br />

as Title, Date, Classification, etc.. We can further group metadata<br />

and textual information into a single parent node Information.<br />

When the patent and court case hierarchies are combined, classes<br />

which are common to both documents will refer to the same<br />

concept and not two different concepts.<br />

This form of abstraction is not only possible for classes, but also<br />

for relations, made possible by the rdfs:subPropertyOf construct.<br />

Court cases and Patents are related to each of the classes shown in<br />

Figures 1 and 2. These relations, such as ‘hasTitle’, ‘hasAbstract’,<br />

and ‘hasPlaintiff’, etc., can also be abstracted into a common<br />

parent relation ‘hasInformation’. This relation has a domain of<br />

either Patent or Court Case and Information as a range.<br />

File wrappers are not documents themselves, but in fact a<br />

collection of documents. This makes modeling file wrappers<br />

trickier than the other documents such as patents and court cases.<br />

Firstly, a vocabulary of all kinds of documents contained within<br />

the file wrapper must be defined. Since each of these documents<br />

refers to a particular event of communication between the<br />

applicant and patent office, we will call it Event instead of<br />

document to avoid confusion between the class Document and a<br />

file wrapper event. The events of importance to us are shown in<br />

Figure 3. We group application events and office actions<br />

separately to allow representation of queries such as – “Return all<br />

office actions for file wrapper A”. Each file wrapper event must<br />

be individually modeled keeping in mind the information it<br />

contains. For example, each examiner Rejection contains critical<br />

information such as – the allowed claims, the rejected claims, and<br />

the withdrawn claims (see Figure 4). Similarly, other events such


as Interference, Restriction, and Amendments can be modeled<br />

using the patent system ontology.<br />

The Patent, Court Case, and File Wrapper classes shown in<br />

Figures 1-3 are different types of documents available from<br />

different information sources. The patent system comprises many<br />

such information sources and many such documents. In the top<br />

level ontology for the patent system (shown in Figure 5), all types<br />

of documents are abstracted into a single parent class (Document).<br />

The Document class can be sub-classed any number of times to<br />

include other forms of documents such as regulations and laws<br />

which are currently not in the scope of our study. The classes<br />

Document, Information, and Event correspond to the three root<br />

nodes of the patent system ontology. Additionally, the classes<br />

Figure 1. Conceptual View of Patent Documents<br />

Figure 2. Conceptual View of Court Case<br />

150<br />

Inventor, Examiner, Author, and Judge, etc., can be abstracted<br />

into a common parent node such as Person.<br />

As mentioned earlier, information sources in the patent system<br />

implicitly cross-reference one another (see Figure 6). These<br />

implicit cross-references show relevancy for comparing<br />

documents from different information sources. When manually<br />

comparing two documents, these cross-references are rather<br />

obvious to the human eye. For example, a human could easily<br />

spot a reference to a patent document in the court case. These<br />

references can very quickly help identify relevant documents to a<br />

user query. The power of the patent system ontology lies in the<br />

ability to integrate information across multiple information<br />

sources by explicitly expressing such cross-references.<br />

Applications built around the patent system ontology can


dynamically derive relevancy based on these pre-defined crossreferences.<br />

4.3 Populating the Ontology<br />

The ontology is populated with information from actual physical<br />

documents from the document repository. The instantiation is<br />

done automatically using the standard Jena and Protégé Java<br />

libraries [23]. Once the instantiation is complete, a standard OWL<br />

reasoner such as Pellet is triggered to check for consistency and<br />

make inferences [33]. For example, an entity in the class Patent<br />

will be additionally classified as a Document, since Patent is a<br />

subclass of Document. The current version of the knowledge-base<br />

is populated with the actual documents from our corpus described<br />

in Section 3. Other documents which may have been found in<br />

Figure 3. Events Contained in a File Wrapper<br />

court cases or through patent citations, but not in the corpus are<br />

instantiated but contain no information about the patent since the<br />

original document itself is unavailable. A file wrapper has also<br />

been partially (including the first amendment, rejection,<br />

interference and the original application) incorporated into the<br />

knowledge-base.<br />

RDF Triple stores are specialized databases to manage large<br />

amount of information written in RDF [5][17][20]. Due to the size<br />

of the ontology, we create a local instance of a triple store<br />

(Virtuoso) and store all the triples in it. Using a triple store will<br />

allow us to scale our ontology to millions of instances<br />

(documents). Moreover, ontology editors such as Protégé require<br />

Figure 4. Excerpt from the Patent System Ontology: Rejection class<br />

151


Figure 5. Top Level Ontology for the Patent System<br />

Table 1. Expressing Competency Questions in SPARQL<br />

Competency Questions SPARQL Query<br />

Return all court cases which involve the company<br />

Amgen Inc. as the plaintiff and from the District Court<br />

of Massachusetts<br />

Return all patents which contain the phrase<br />

‘recombinant erythropoietin receptor’ in the claims<br />

and IPC class “A61K”<br />

152<br />

SELECT ?case WHERE {<br />

?case type CourtCase .<br />

?case hasPlaintiff “Amgen Inc.” .<br />

?case hasCourt “District Court…”<br />

}<br />

SELECT ?pat WHERE {<br />

?pat type Patent .<br />

?pat hasClaim ?clm .<br />

?clm hasTerm “recombinant …” .<br />

?pat hasIPCClass “A61K” .<br />

}


Figure 6. Cross-­‐Reference between Documents in the Patent System<br />

loading the ontology each time the application is executed. The<br />

triple stores provide a persistent store for the triples and<br />

significantly lower the loading time. The ontology can be queried<br />

using SPARQL through both Protégé and Virtuoso interfaces<br />

[20][23].<br />

Table 1 shows examples of how we can represent any natural<br />

language question in SPARQL to query the ontology, as long as<br />

the classes and relations required to express the query are defined<br />

in the ontology. The queries do not always have to return<br />

documents, but can return other classes like Inventors or<br />

Examiners as well. These SPARQL queries will generally be<br />

handled at the application level and will be abstracted from users.<br />

Applications can request any information they want from the<br />

ontology. In fact, even the applications do not have to fully know<br />

the details of the ontology. The ontology can be queried for all its<br />

relations for a particular class or between two classes. For<br />

example, the query:<br />

SELECT ?rel WHERE {<br />

}<br />

?pat type Patent .<br />

?pat ?rel Information<br />

will return all relations (variable ?rel) which have the class Patent<br />

as the domain. In other words, all relations defined on patents<br />

such as hasTitle, hasAbstract, hasIPCClass, etc., will be returned.<br />

Hence, updating the underlying ontology with new information<br />

will automatically update the application using it as well.<br />

153<br />

5. INFORMATION RETRIEVAL<br />

FRAMEWORK<br />

In information retrieval, the information desired is seldom<br />

achieved with a single query. Queries are typically reformulated<br />

several times based on intermediate search results until the<br />

information need is satisfied [25]. This reformulation could<br />

include the addition of synonyms, new search terms, and other<br />

constraints. When performing multi-source search, information<br />

obtained from searching one domain is applied to another. The<br />

patent system ontology provides the backbone for automating this<br />

process by standardizing representation of the information<br />

sources. In this section, we present an IR framework which builds<br />

on top of the semantics of the patent system ontology in multiple<br />

stages to enhance multi-source IR (see Figure 7):<br />

Step–I Expand Query: In this stage, the user’s initial query is<br />

expanded using external knowledge such as dictionaries, thesauri,<br />

or domain ontologies. While the patent system ontology provides<br />

a framework for the structural interoperability between the<br />

information sources, domain ontologies provide semantic<br />

interoperability within a specific technical domain. The term<br />

expansion is based on several properties of domain ontologies<br />

such as abstraction, synonymy, and term mapping, etc.<br />

Step–II Search Information Sources: Information sources are<br />

independently searched using the expanded query from Step–I.<br />

The required vocabulary and syntax for searching the information<br />

sources is contained in the patent system ontology. For example,<br />

the patent system ontology provides the syntax for searching the<br />

titles of documents – hasTitle:‘erythropoietin’. The information


sources are searched independently in this stage to retrieve highly<br />

relevant documents from each source.<br />

Step–III Cross-Reference Information: The cross-referenced<br />

information is highly important for multi-domain retrieval. The<br />

cross-references explicitly defined in the patent system ontology<br />

are used as relevancy measures to correlate search results between<br />

information sources. For example, a relation defined in the patent<br />

system ontology – {caseA, patentsInvolved, patentA} will help<br />

the framework to extract patent numbers from the court case.<br />

These patent numbers can be used to repeat or enhance the search<br />

for the patent domain. Similarly, text from one document can be<br />

used to search an entirely different information silo. For example,<br />

Figure 7. Information Retrieval Framework<br />

Figure 8. System Implementation<br />

the abstract of a patent document can be used as a query to search<br />

for relevant scientific publications. In fact, the extracted text can<br />

be directly fed back into Steps 1 and 2.<br />

Step–IV User Feedback: Besides the diverse information and<br />

knowledge sources, the users in the patent system domain area<br />

also come from a diverse background – scientific/technical, legal,<br />

154<br />

business, and more. The intention of the user must be captured<br />

through the search process in order to ensure that the results<br />

retrieved are indeed relevant to the user. User-relevancy feedback<br />

has been an important part of IR research [4][15]. However, the<br />

user relevancy feedback stage is out of this paper’s scope and will<br />

not be discussed.<br />

5.1 Implementation Details<br />

In this section, we provide a brief overview of the implementation<br />

of the IR framework and its basic features (see Figure 8). The IR<br />

framework is implemented entirely in Java with abstractions of<br />

several modules that are critical for the system. The actual<br />

documents are parsed in order to populate the patent system<br />

ontology and perform reasoning using standard Jena libraries. A<br />

persistent storage such as Virtuoso or Mulgara is used to store the<br />

RDF triples [17][20]. Apache Lucene is a widely used text mining<br />

library [2]. In order to provide text-based search, a simple user<br />

interface is developed which interacts with the lucene text index.<br />

A summary of the implementation is provided below:<br />

o Jena libraries and triple store integration for modifying the<br />

patent system ontology through new constructs, crossreferences,<br />

or rules.<br />

o Solr and Lucene libraries to create, update, and query the text<br />

indexes [3].<br />

o Generic API for integration with sources of domain<br />

knowledge such as BioPortal [19]<br />

o Automatic query generation, abstracting the syntactic details<br />

from the user.<br />

6. ILLUSTRATIVE EXAMPLES<br />

As explained in Sections 1 and 2, during the lifetime of a patent,<br />

the patent system will constantly be searched for information.<br />

Examples include prior art searches, patent claim invalidations,<br />

and infringement analysis, etc.. In this section, we demonstrate<br />

how the patent system ontology enables queries across multiple<br />

sources in order to retrieve related information. Specifically, we<br />

focus on Step-III of the framework, i.e., the cross-referencing<br />

capabilities of the patent system ontology. We develop a<br />

SPARQL query to search for information related to US patent<br />

5,955,422 (see Figure 9). The individual clauses in the query are<br />

grouped into three categories each meant to retrieve related case<br />

documents, patents, and scientific publications respectively.<br />

Category I: Court cases provide important information regarding<br />

the major competitors, and successful patents, etc.. A patent<br />

which has been challenged in court several times is considered<br />

very important in its respective technology class. Clauses 1-3<br />

attempt to retrieve related documents by following the crossreferences<br />

between court cases and patent documents. Court cases<br />

related to US patent 5,955,422 are identified by querying the<br />

ontology for all court cases that involve the patent. This search<br />

retrieves around 20 patent litigations from our corpus. In addition,<br />

other patents involved in the court case are also extracted as<br />

relevant documents using clause 3.


Category II: After identifying some relevant patents, some of the<br />

possible next steps could be to retrieve patents by following the<br />

forward and backward citations etc. (clause 4), to get more<br />

relevant results. The information extracted from the ontology can<br />

also include names of inventors (clause 5), assignees (clause 6),<br />

and technology classifications (clause 7) that appear in the patent<br />

documents, which can in turn be used to search the documents.<br />

The extracted information from the documents is summarized in<br />

Table 2.<br />

Category III: In addition to metadata such as inventors and<br />

assignees, the text of the patent documents can also be used to<br />

search for related documents. For example, clauses 9-12 show<br />

how the claims of a patent can be used to search for related<br />

scientific publications.<br />

The query discussed in this section shows how the semantics<br />

provided by the patent system ontology can be used to integrate<br />

information across multiple domains, with a potential to improve<br />

search. Similar to the above example, in practical applications,<br />

SPARQL queries can be formulated to express extremely complex<br />

information needs. Figure 10 shows the actual documents<br />

retrieved from this query.<br />

Precision, a common metric used to evaluate the quality of IR<br />

methodologies, is measured as the ratio of the number of relevant<br />

documents retrieved to the total number of documents retrieved.<br />

In addition to the query in Figure 9, we retrieve patent documents<br />

related to the top inventors, assignees, and technology classes<br />

from Table 2. We calculate the precision of the retrieved patent<br />

documents with respect to the ground truth discussed in Section 3.<br />

Table 3 summarizes these results.<br />

Plaintiffs/Defendants Patents Involved in<br />

Cases<br />

Table 2. Summary of Extracted Information<br />

SELECT ?pat1 ?pat2 ?case ?pub ?inv ?assg<br />

?class<br />

WHERE {<br />

Category I:<br />

Clause 1: ?case a CourtCase .<br />

Clause 2: ?case patentsInvolved<br />

US5955422. Clause 3: ?case<br />

patentsInvolved ?pat1<br />

Category II:<br />

{Clause 4: ?pat1 hasCitation ?pat2 .}<br />

{Clause 5: ?pat1 hasInventor ?inv .}<br />

{Clause 6: ?pat1 hasAssignee ?assg .}<br />

{Clause 7: ?pat1 hasUSClass ?class .}<br />

Category III:<br />

Clause 9: ?pat hasClaim ?claim .<br />

Clause 10: ?pub a Publication .<br />

Clause 11: ?pub hasBody ?body .<br />

Clause 12: FILTER REGEX (?body,<br />

?claim, “i”)<br />

US Class Inventor Assignee<br />

Amgen Inc. 5,955,422 514/8 Lin, Fu-Kuen Kirin-Amgen, Inc.<br />

Chugai Pharmaceuticals 5,547,933 530/350 Hewick, Rodney, M. Amgen, Inc.<br />

Hoescht Marion Roussel 5,621,080 536/23.51 Seehra, Jasbir, S. Kiren-Amgen, Inc.<br />

Genetics Inc. 5,618,698 435/325 Seenra, Jasbir, S. Genetics Institute, Inc.<br />

155<br />

}<br />

Figure 9. SPARQL Query to Retrieve<br />

Information Related to U.S. Patent<br />

5,955,422


Figure 10. Actual Documents Retrieved by Querying Patent System Ontology<br />

Table 3. Precision of Retrieved Patent Documents<br />

Related to a Set of Inventors, Assignees or US Class<br />

Query Precision<br />

Top 5 Technology Classes 0.183<br />

Inventors 0.8<br />

Assignees 0.256<br />

Combined 0.186<br />

7. CONCLUSION<br />

Intellectual Property (IP) related information for science and<br />

technology is distributed across several heterogeneous<br />

information silos. The scattered distribution of information,<br />

combined with the enormous sizes and complexities, make any<br />

attempt to collect IP-related information for a particular<br />

technology a daunting task. Hence, there is a need for a software<br />

framework which facilitates semantic and structural<br />

interoperability between the diverse and un-coordinated<br />

information sources in the patent system. In this paper, we present<br />

a knowledge-based software framework to facilitate retrieval of<br />

patents and related information across multiple diverse and<br />

uncoordinated information sources in the US patent system.<br />

Specifically, we discuss the patent system ontology which<br />

provides standardized representation and a shared vocabulary of<br />

the information sources to facilitate interoperability.<br />

Through an illustrative example in Section 6, we showed how the<br />

patent system ontology can be used to integrate information and<br />

query multiple information sources to retrieve related information.<br />

156<br />

The patent system ontology provides the necessary semantics to<br />

allow users to develop complex declarative queries. The<br />

methodology presented will benefit many end users ranging from<br />

lawyers, start-up companies, to large corporations.<br />

8. ACKNOWLEDGEMENTS<br />

This research is partially supported by NSF Grant Number<br />

0811975 awarded to the University of Illinois at Urbana-<br />

Champaign and NSF Grant Number 0811460 to Stanford<br />

University. Any opinions and findings are those of the authors,<br />

and do not necessarily reflect the views of the National Science<br />

Foundation.<br />

9. REFERENCES<br />

[1] 35 U.S.C. Sec. 103 (United States Code). “Conditions for<br />

Patentability; Non-Obvious Subject Matter,” 2010.<br />

[2] Apache Lucene. http://lucene.apache.org/<br />

[3] Apache Solr. http://lucene.apache.org/solr/<br />

[4] Baeza-Yates, R. and Ribeiro-Neto. B., Modern Information<br />

Retrieval, ACM Press, 1999.<br />

[5] Broekstra, J., Kampman, A. and Harmelen, F., V., “Sesame:<br />

A Generic Architecture for Storing and Querying RDF and<br />

RDF Schema”, The Semantic Web – ISWC 2002, Lecture<br />

Notes in Computer Science, 2342:54-68, 2002.<br />

[6] Bruijn, J., D. et al. State-of-the-art Survey on Ontology<br />

Merging and Aligning. V1. SEKT-project report D4.2.1<br />

(WP4), IST-2003-506826, 2003.<br />

[7] Chimaera Website.<br />

http://www.ksl.stanford.edu/software/chimaera (Accessed on<br />

03/01/2012).


[8] De Nicola, A., Missikoff, M. and Navigli, R., "A Software<br />

Engineering Approach to Ontology Building,” Information<br />

Systems, 34(2):258-275, 2009.<br />

[9] Fujii, A. Enhancing Patent Retrieval by Citation Analysis.<br />

Annual ACM Conference on Research and Development in<br />

Information Retrieval, Proceedings of the 30th annual<br />

International ACM SIGIR, Amsterdam, The Netherlands,<br />

2007.<br />

[10] Gruninger, M., and Fox, M., S. Methodology for the Design<br />

and Evaluation of Ontologies. In: Proceedings of the<br />

Workshop on Basic Ontological Issues in Knowledge<br />

Sharing, IJCAI-95, Montreal, 1995.<br />

[11] Guijarro, L. Interoperability Frameworks and Enterprise<br />

Architectures in e-Government Initiatives in Europe and the<br />

United States. Government Information Quarterly, 24, 1,<br />

January 2007, 89-101.<br />

[12] Higuchi, S., Fukui, M., Fujii, A., Ishikawa, T., Iwayama, M.,<br />

Fujii, A., Kando, N. An Empirical Study on Retrieval Models<br />

for Different Document Genres: Patents and Newspaper<br />

Articles. Information Retrieval, 2003, 251-258.<br />

[13] Horridge, M. A Practical Guide To Building OWL<br />

Ontologies Using Protégé 4 and CO-ODE Tools. The<br />

University of Manchester, March 2011.<br />

[14] Li, Y., Taylor, J., S. Advanced Learning Algorithms for<br />

Cross-Language Patent Retrieval and Classification.<br />

Information Processing and Management, Elsevier, 2007.<br />

[15] Manning, C., D., Raghavan, P. and Schutze, H. An<br />

Introduction to Information Retrieval. Cambridge University<br />

Press, 2009.<br />

[16] Mase, H., Matsubayashi, T., Ogawa, Y., Iwayama, M., and<br />

Oshio, T. Proposal of Two-Stage Patent Retrieval Method<br />

Considering the Claim Structure. ACM Transactions on<br />

Asian Language Information Processing (TALIP) Archive, 4,<br />

2, June 2005, 190 – 206.<br />

[17] Mulgara triplestore. Available online:<br />

http://www.mulgara.org/ (Accessed on 03/01/2012).<br />

[18] Noy, N., F., and McGuinness, D. Ontology Development<br />

101: A Guide to Creating your First Ontology. Stanford<br />

Knowledge Systems Laboratory Technical Report KSL-01-<br />

05 and Stanford Medical Informatics Technical Report SMI-<br />

2001-0880, March 2001.<br />

[19] Noy, N., F., Shah, N., H., Whetzel, P., L., Dai, B., Dorf, M.,<br />

Griffith, N., Jonquet, C., Rubin, D., L., Storey, M., A.,<br />

Chute, C., G. and Musen, M., A., “BioPortal: Ontologies and<br />

Integrated Data Resources at the Click of a Mouse,” Nucl.<br />

Acids Res., 37(2):W170-W173, 2009.<br />

[20] OpenLink Virtuoso. http://virtuoso.openlinksw.com/<br />

(Accessed on 03/01/2012).<br />

[21] Dean, M. and Schreiber, G. (Eds.). OWL Web Ontology<br />

Language Reference. W3C Recommendation, 10 February<br />

2004.<br />

157<br />

[22] PACER. http://www.pacer.gov/ (Accessed on 03/01/2012).<br />

[23] Protégé Website. http://protege.stanford.edu/ (Accessed on<br />

03/01/2012).<br />

[24] Resource Description Framework (RDF) Model and Syntax,<br />

W3C Recommendation, 22 February 1999.<br />

[25] Spink, A. A User-Centered Approach to Evaluating Human<br />

Interaction with Web Search Engines: An Exploratory Study.<br />

Information Processing and Management, 38, 3, May 2002,<br />

401-426.<br />

[26] Takaki, T. Associative Document Retrieval by Query<br />

Subtopic Analysis and its Application to Invalidity Patent<br />

Search. Conference on Information and Knowledge<br />

Management. Proceedings of the Thirteenth ACM<br />

International Conference on Information and Knowledge<br />

Management, Washington, D.C., USA, 2004, 399 - 405.<br />

[27] Tseng, H., Lin, C., J., Lin, Y., I. Text Mining Techniques for<br />

Patent Analysis. Information Processing & Management,<br />

2007, Elsevier.<br />

[28] USPTO. http://www.uspto.gov/ (Accessed on 03/01/2012).<br />

[29] Wache, H., Vogele, T., Visser, U., Stuckenschmidt, H.,<br />

Schuster, G., Neumann H., and Hubner, S. Ontology-Based<br />

Integration of Information - A Survey of Existing<br />

Approaches. In Proceedings of IJCAI-01 Workshop:<br />

Ontologies and Information Sharing, Seattle, WA, , 2001,<br />

108-117.<br />

[30] Wanner, L., Baeza-Yates, R., Brugmann, S., Codina, J.,<br />

Diallo, B., Escorsa, E., Giereth, M., Kompatsiaris, Y.,<br />

Papadopoulos, S., Pianta, E., Piella, G., Puhlmann, I., Rao,<br />

G., Rotard, M., Schoester, P., Serafini, L., and Zervaki, V.<br />

Towards Content-Oriented Patent Document Processing.<br />

World Patent Information, 30, 1, March 2008, 21-23.<br />

[31] Xue, X., Croft, W., B. Automatic Query Generation for<br />

Patent Search. Conference on Information and Knowledge<br />

Management, Proceeding of the 18th ACM Conference on<br />

Information and Knowledge Management, Hong Kong,<br />

China, 2009.<br />

[32] Hersh, W. and Voorhees, E. TREC Genomics Special Issue<br />

Overview. Information Retrieval, Special Issue on TREC<br />

Genomics Track: Guest Editor: Ellen Voorhees, 12, 1, 2009,<br />

1-15.<br />

[33] Sirin, E., Parsia, B., Grau, B., C., Kalyanpur, A., and Katz,<br />

Y. Pellet: A Practical OWL-DL Reasoner. Web Semantics:<br />

Science, Services and Agents on the World Wide Web, 5, 2,<br />

June 2007, 51-53.<br />

[34] Gruber, R., T. Toward Principles for the Design of<br />

Ontologies used for Knowledge Sharing. Int. J. Hum-<br />

Comput. Stud, 43, 5-6, November 1995, 907–928.<br />

[35] Damiani, E., Fugazza, C. Toward Semantics-Aware<br />

Management of Intellectual Property Rights. Online<br />

Information Review, 31, 1, 2007, 59 – 72.


Digitisation of Electoral Rolls: Analysis of a Multi-Agency<br />

E-Government Project in Pakistan<br />

Hasnain Bokhari<br />

Faculty of Humanities<br />

University of Erfurt<br />

Postfach 90 02 21. D-99105 Erfurt<br />

+491632359046<br />

hasnain.bokhari@yahoo.com<br />

ABSTRACT<br />

Mobile governments are seen as an ancillary extension of egovernment<br />

practices. The low cost of mobile equipment, its<br />

mobility factor and a personalised device may however, herald<br />

them as the predominant means of e-government in developing<br />

countries. Inclusive participation to mobilise and engage the<br />

poorer, excluded and lesser-informed citizens has been the bane of<br />

e-government yet, but it may change by including m-government<br />

as an emphasis factor in the national e-government plans. This<br />

paper considers the case study of the Election Commission of<br />

Pakistan, which initiated a SMS-based voter verification system<br />

with the central database authority in order to inform over 85<br />

million voters of their electoral registration in March 2012. This<br />

unique service is among the first public mobile based initiatives in<br />

Pakistan which builds upon an inter-agency collaboration drawing<br />

on the success of a digitized and central database.<br />

Categories and Subject Descriptors<br />

K.6.1 [Management of Computing and Information Systems]:<br />

Project and People Management - Strategic information systems<br />

planning; J.1 [Computer Applications]: Administrative Data<br />

Processing – Government; H.1.2 [Information Systems]:<br />

User/Machine Systems - Human information processing<br />

General Terms<br />

Management, Documentation, Human Factors, Verification.<br />

Keywords<br />

E-government, Developing Countries, Interagency collaboration,<br />

M-government, Alternative public service delivery<br />

1. INTRODUCTION<br />

Rapidly declining costs of Information and Communication<br />

Technologies (ICTs) and mobile phone equipment are paving new<br />

ways for a digitally connected society through a variety of<br />

communications spectra. e-government initiatives are now taking<br />

a crucial turn in the domain of public service delivery. A number<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

158<br />

Mustafa Khan<br />

Willy Brandt School of Public Policy<br />

University of Erfurt<br />

Postfach 90 02 21. D-99105 Erfurt<br />

+4917671704089<br />

mmmkhan@gmail.com<br />

of countries are emphasizing horizontal and vertical integration of<br />

governmental agencies to ensure the one-stop-shop promise of egovernment.<br />

Thus, multiple governmental agencies cooperate<br />

with one another and more importantly with private partners in<br />

order to develop innovative eServices. Similarly, countries<br />

especially in the developing world are increasingly moving<br />

towards the concept of electronic public service delivery over<br />

multiple channels digital communication other than the internet.<br />

To connect with and inform citizens, governments around the<br />

world are now considering mobile phones as an alternative service<br />

delivery channel for government data. In the context of<br />

developing countries, mobile phones offer a feasible opportunity<br />

for governments to expand their digital focus to the disconnected<br />

areas. The entire ‘e’ lexicon of e-government is now focusing<br />

towards ‘m’ making a plausible case for m-government. Mgovernment,<br />

in a nutshell is not hugely different from its<br />

predecessor. Rather it offers a strategy for providing information<br />

and services through mobile or wireless technology [21]. As the<br />

definition relies on e-government practices, the basic theory and<br />

implications of m-government are going to work as<br />

complementary to e-government.<br />

What sets m-government apart and makes it a new focus area are<br />

its strengths of “mobility” and being “wireless” [33]. Freeing the<br />

user from desktop-bound and wired internet access, it allows<br />

information access on the move, increased functionality, low<br />

opportunity cost for access and more pervasive reach into<br />

‘unwired’ or physically unsupported areas. This latter property<br />

makes it the ideal infrastructure choice in developing or underdeveloped<br />

countries, where internet access is expensive or not<br />

available and requires more technical literacy. It must, however,<br />

be noted that m-government does not need to eliminate the online<br />

and offline modalities of service-delivery but it aims at harnessing<br />

the powerful and transformational capacity of the mobile platform<br />

to enhance public service [16].<br />

Since the beginning of new millennium, there has been a<br />

phenomenal growth in mobile subscription around the world. In<br />

2011, International Telecommunication Union (ITU) estimated<br />

5.9 billion mobile subscriptions, with a global penetration rate at<br />

an astounding 87%-79% in developing countries against a global<br />

internet penetration rate of 35% [17]. What matters here the most<br />

is the social construction of mobile technology, which qualifies<br />

the mobile platform as a preferred means of communication due<br />

to the oral communication culture it espouses. Given its spatial<br />

mobility and flexibility to manage contextual mobility with an


oral option, it also allows for a much wider usability within<br />

digitally challenged or ageing populations.<br />

The prevalent oral communication culture that is inherent with<br />

mobile phones has found a strong audience in rural and<br />

geographically-isolated communities of developing and under<br />

developed countries that have shown considerable acceptance<br />

towards mobile technologies. Such a communal reliance has led a<br />

number of local and state level agencies to provide emergency,<br />

health, agriculture and education related information through<br />

mobile phones [23] [25]. The location-based targeting system of<br />

m-government is becoming increasingly popular way to<br />

communicate with only certain geographically proximate<br />

communities, which can prove to be a vital mobilisation tool in<br />

the case of natural disasters, epidemics or accidents.<br />

Figure 1: Mobile and Internet subscribers per 100<br />

inhabitants in Pakistan<br />

The urban-rural divide and the digital imbalance more<br />

synonymous with the developing world has so far not let Layne &<br />

Lee widely debated model of e-government provide a functional<br />

solution for developing countries. The Layne & Lee model based<br />

on catalogue stage, transaction stage and vertical and horizontal<br />

integration stage gets seriously challenged by the cost of<br />

infrastructure, limited government budgets and the lack of<br />

information in local and regional languages [14]. A number of<br />

developing countries are now moving beyond the informational<br />

web portal (which is a catalogue stage in Layne & Lee model) and<br />

are concentrating on multiple channels of public service delivery,<br />

either through kiosk machines, telecentres, over-the-counter<br />

approaches and now mobile phones to digitally facilitate their<br />

public. In India for example, a free SMS service, launched in<br />

February 2007, enables farmers in rural areas to ask agricultural<br />

or animal husbandry related queries to experts. Similarly in<br />

Pakistan, an SMS service was launched by the Pakistan Telecom<br />

Authority (PTA) to facilitate citizens for SIM verification against<br />

their unique national identity cards [18].<br />

159<br />

Hereinafter, this paper discusses the case of multiagency<br />

collaboration for an m-government application for voters’<br />

registration and verification in Pakistan. Taking into consideration<br />

all the above-mentioned limitations and opportunities, this paper<br />

analyzes Pakistan as an aberrant transitive democracy to see if and<br />

how a m-government initiative led by the Election Commission of<br />

Pakistan (ECP) in collaboration with National Database and<br />

Registration Authority (NADRA) could facilitate voting for the<br />

general elections planned in 2013. The paper touches upon a brief<br />

chronological progress of e-government evolution in Pakistan<br />

with the formation of NADRA, which eventually guided ECP in<br />

its m-government application.<br />

2. E-GOVERNMENT AND<br />

PARTICIPATORY FACTOR OF<br />

DEMOCRACY<br />

The driving force behind the phenomenon of e-government was to<br />

make governments rely on digital gadgetry in order to provide<br />

services that are more responsive and effective. This in turn could<br />

bring more transparency to administrative processes, thereby<br />

triggering a democratic culture which is supported by new<br />

communication media. For a more responsive government, it is<br />

inevitably necessary for governments to assure access and the<br />

right to information. It is perhaps the similar motivation held by<br />

Layne & Lee model of e-government whose first phase, the<br />

catalogue model, focuses on the availability of government<br />

information via web portals. However, such a model has<br />

repeatedly been rebuffed academically and contested for its<br />

viability in developing countries where there still is a huge digital<br />

gap and illiteracy. This brings the participatory promise of egovernment<br />

in a questionable position where governments on one<br />

hand try to offer multi-channel public services but on the other<br />

hand are unavailable to deliver the basic promise i.e. the<br />

availability of government information – the first requirement in<br />

almost every possible e-government model. In order to ensure the<br />

participatory nature of democracy, would it not be just to assure<br />

the access to the portal or at least an alternative way to provide<br />

government information [1]. With his empirical findings Donald<br />

Norris has challenged these early hyperbolic claims [27] that<br />

provisions for better governance through digital means does not<br />

essentially translate into enhanced or increased public<br />

participation in governments. Also, in case of developing<br />

countries, most are delineated by fledgling democracy that are yet<br />

to take root in relatively younger states staggering on to postconflict<br />

and transitional stages where the need for stability often<br />

trumps egalitarian inclusion into governments and elections. The<br />

case of e-government in Pakistan suffers from the similar<br />

developing country syndrome of digital divide where the<br />

government has not been able to reach out to its public via its web<br />

portal. There are, however, a number of multi-channel electronic<br />

public services that continues to facilitate the citizens. With the<br />

inception of the m-government application in February 2012, the<br />

Government of Pakistan introduced probably for the first time, a<br />

digital service via a short message (or SMS) that enable citizens to<br />

verify and confirm them as registered voters for the general<br />

elections in 2013. For a transitional democracy such as Pakistan,<br />

an eService of such sort can have a considerable impact on voter<br />

turnout. However, can it be claimed if an eService of this calibre<br />

delineates the participatory element for Pakistani voters? To<br />

answer, one probably needs to revisit the most celebrated and<br />

equally contested theorist of democracy, Robert Dahl, whose<br />

general set of criteria for evaluating democratic process includes


effective participation, voting equality, enlightened understanding,<br />

and control of the policy agenda [7]. If the democratic and<br />

participatory element of the ECP’s SMS application is gauged<br />

with Dahl’s criteria, this application does seem to qualify at least<br />

for one of Dahl’s five criteria. However, before dwelling upon the<br />

details of this application, it seems necessary to give a brief<br />

chronology of events that has eventually led ECP to undertake a<br />

rather sensitive and careful task of voter registration and<br />

verification via the m-government application.<br />

3. E-GOVERNMENT SCENARIO IN<br />

PAKISTAN<br />

The Government of Pakistan started its chapter of e-government<br />

in 2002 by forming a separate organisation under the Ministry of<br />

Information Technology named Electronic Government<br />

Directorate (EGD). EGD’s major tasks included to plan, prepare<br />

and implement e-government projects in Pakistan and to provide<br />

technical guidelines on the implementation of these projects at the<br />

federal, provincial and district levels. Since 2005 EGD has also<br />

put an e-government strategy and action plan for years 2005-2010,<br />

which so far has not been revised, at least publicly. At the<br />

beginning of millennium, offering a web portal remained the first<br />

task for national governments and Pakistan’s one-stop-shop<br />

solution was to initiate web portal of government ministries,<br />

divisions, and its sub organisations accessible via Internet at<br />

www.pakistan.gov.pk. The portal provided information about the<br />

ministries and explained their functioning albeit in English – a<br />

language which is only spoken and understood by a small<br />

minority of a population of 185 million people. The portal, which<br />

was revamped in 2008, does not yet offer or indicate any<br />

interactive G2C service in order to qualify for the second stage<br />

(transaction) of e-government model (by Layne & Lee) [18].<br />

While the EGD together with Government of Pakistan was trying<br />

to delve into e-government, a number of parallel initiatives started<br />

in the G2C scenario in Pakistan. Due to deregulation in the<br />

telecommunications sector, various telecom operators started their<br />

services in Pakistan. Over the course of 10 years the low rates of<br />

the mobile telecom sector found a strong audience all over the<br />

country. The figures mentioned by the International<br />

Telecommunication Union (ITU) clearly indicate that Pakistani<br />

citizens prefer mobile phones to the internet. According to the<br />

ITU statistics, mobile users in Pakistan increased from 0.21 users<br />

in 2000 to 57.14 users per 100 inhabitants in 2010 [17]. As of<br />

May 2012, the PTA puts the cellular mobile teledensity at 68.6%<br />

making it the most highly penetrated South Asian country in this<br />

regard.<br />

The increased reliance on mobile phones made a number of<br />

telecom operators in Pakistan realise the potential of mobile<br />

penetration and they started offering G2C services by acting as a<br />

middle agency. Currently, Norwegian telecom operator Telenor’s<br />

easy Paisa service for the payment of utility bills and money<br />

transfer is considered the most frequently used service, which has<br />

triggered a new era of branchless banking in Pakistan. However, a<br />

major development in e-government scenario that took place in<br />

Pakistan is the formation of National Database Registration<br />

Authority (NADRA). In order to digitise the population data, the<br />

Ministry of Interior initiated a technical wing named as the<br />

NADRA to develop Computerised National Identity Cards<br />

(CNICs), which eventually became one of the first G2C electronic<br />

public services. Over a number of years NADRA has initiated<br />

other G2C projects as well. These projects include the<br />

160<br />

development of the electronic passport, driver’s license, birth<br />

registration certificate and/or the vehicle identification and<br />

tracking system. Pakistan moved beyond the web portal when in<br />

2005 NADRA started a kiosk machine service in order to pay<br />

utility bills. The idea behind kiosk machine was the lack of<br />

internet penetration and possibility of mCommerce application on<br />

official web portal. The kiosk machine service is now being<br />

franchised and exists as a part of the eSahulat project, which<br />

allows people to transfer money without involving any bank<br />

transaction for the recipient and sender. It would not be wrong to<br />

mention that in Pakistan NADRA has now assumed the role of a<br />

master agency as it possesses the major citizen database and<br />

collaborates in a number of intergovernmental projects such as the<br />

World Bank supported cash transfer programme called Income<br />

Support Programme and the Watan Card for flood afectees.<br />

NADRA has also collaborated with the PTA by sharing its<br />

database with telecom operators in order for people to verify their<br />

SIM cards against their CNICs. This paper considers NADRA’s<br />

most recent collaboration with another governmental agency- the<br />

Election Commission of Pakistan (ECP). The next section<br />

describes the role of the ECP and its collaboration with the<br />

NADRA to develop the digitised electoral rolls.<br />

4. ELECTION COMMISSION OF<br />

PAKISTAN<br />

The Election Commission of Pakistan presides over the voting<br />

<strong>proceedings</strong> of the State and National assemblies and the Senate.<br />

Its Chief Election Commissioner (CEC) is appointed by the<br />

President of Pakistan and with amendments made in the<br />

constitution during 2012; it has been made an autonomous and<br />

independent organisation with separate funds and appointment<br />

powers for interim government, which will be responsible for<br />

organising fresh national elections [32].<br />

The ECP adopted a five-year strategic plan in May 2010, taking<br />

various stakeholders such as political parties, Civil Society<br />

Oraganizations (CSOs), female councillors, minorities, lawyers<br />

and the International Foundation for Electoral Systems (IFES) on<br />

board. The strategic plan was aimed at overhauling various<br />

technical, organizational and legal functions of the ECP.<br />

Alongside, the ECP also came up with strategic deliverables to<br />

foster digitization of the electoral rolls, building a new website,<br />

translation of content in regional languages, a better Content<br />

Management System (CMS), adoption of Electronic Voting<br />

Machines (EVM), a mobile version of the website and online<br />

availability of all ECP information, results and notifications as<br />

and when announced [11]. The following section details the<br />

collaborative model that the ECP adopted in order to verify and<br />

collate the digitization of electoral rolls with the help of NADRA.<br />

4.1 Multiagency Collaboration at Work:<br />

Preparation of the Computerised<br />

Electoral Rolls System (CERS II)<br />

In June 2011, ECP and NADRA signed a formal contract for the<br />

revision of electoral rolls and the updating of the 2006<br />

Computerised Electoral Rolls System (CERS I). NADRA<br />

extended its support by sharing the citizen database and by<br />

appending and adding supplementary information from their<br />

unique CNIC system against every voter. The CNIC carries<br />

unique identification card with multiple biometric features,<br />

photograph and includes details of residence, contact information<br />

and family status. This inter-sectoral and inter-organisational


mapping of citizens would ensure unique identity within the<br />

system and prepare clear transparent rolls which would be now<br />

called as CERS II.<br />

The ECP established a project management unit comprising ECP<br />

and IFES officials to steer and monitor this enormous task. The<br />

ECP handed over the existing electoral rolls data to NADRA in<br />

February 2011 for verification, updating and augmentation of<br />

electoral rolls 2006-07 on the basis of CNIC database.<br />

Simultaneously, the Population Census Organization (PCO)<br />

which conducts census every five years was instructed in its April<br />

2011 census to collect the information of the head of family’s data<br />

on a specially designed form for preparing preliminary electoral<br />

rolls on the basis of new census blocks as prescribed by the<br />

Census Organisation previously and now adopted by the ECP as<br />

revised electoral areas. These data were handed over to NADRA<br />

offices at district level. NADRA used the data for assignment of<br />

new census block codes after verification and augmentation of<br />

existing electoral rolls with its CNIC data. In effect, NADRA<br />

created a new database for the ECP from a data image of its CNIC<br />

database but customised it along the lines of the newly defined<br />

electoral areas. This meant further clarity and precision of voter<br />

distribution [11].<br />

NADRA prepared preliminary electoral rolls on the basis of new<br />

census blocks, using CNIC as unique identifier of voters. The<br />

ECP then conducted a country-wide door-to-door verification of<br />

these rolls in August-October 2011. A pilot project was completed<br />

in 60 selected electoral areas in four districts through door-to-door<br />

verification which helped in identifying issues during field<br />

exercise which were taken care of while rolling out the national<br />

level verification project.<br />

Figure 2: Digitisation flowchart of electoral rolls by the<br />

Election Commission of Pakistan<br />

.<br />

161<br />

NADRA then entered the data changes on the basis of voters’ data<br />

forms collected during door-to-door verification in light of<br />

guidelines/business rules, using double-blind data entry<br />

mechanism. Thereafter, the preliminary electoral rolls were<br />

printed by NADRA and delivered to the ECP’s field offices on 23<br />

February 2012. The ECP released the draft electoral rolls at<br />

52,166 display centres across Pakistan for public display for<br />

inviting claims and objections for corrections on the prescribed<br />

forms as per existing legal framework. On 29 February, both the<br />

paper-based electoral rolls and a unique SMS facility (explained<br />

in the next section) to verify citizens’ voting details were launched<br />

[8]. After incorporating the decisions of the revising authorities,<br />

the final electoral rolls were displayed successfully in May 2012.<br />

Thus, from 2012 onwards, the revised CERS-II can be updated<br />

annually as originally envisaged in the constitution of Pakistan.<br />

NADRA and the ECP plan to extend its cooperation to the next<br />

level by updating the voter data simultaneously in the ECP<br />

database when voters visit the NADRA offices for renewing or<br />

changing the personal details of their CNIC.<br />

4.2 SMS Voter Verification Application<br />

After an extensive multi-agency collaboration in collecting the<br />

voters’ data the ECP planned to not only announce the paperbased<br />

results of the voters but it also launched a unique SMS voter<br />

verification application on 29 February 2012. A widespread print<br />

and electronic media campaign was organised and the<br />

announcement of the electoral roll received prime coverage on all<br />

leading television channels, given the loaded political atmosphere<br />

with the impending 2013 elections. With regard to geographically<br />

isolated and rural areas, these campaigns were chiselled with the<br />

ECP conducting radio spots in six local languages to advertise the<br />

publication of the electoral rolls and the SMS verification<br />

application.<br />

Figure 3: Sample of return SMS with voter registration<br />

details<br />

.<br />

The SMS application requires a voter to text her/his unique CNIC<br />

number to a short code ‘8300’. Irrespective of the mobile network<br />

operator, the voter is charged, Rs. 2 (USD 0.02) and a reply SMS<br />

in the national language Urdu is received, showing the CNIC<br />

number, electoral area name, block code, tehsil/district and serial


number [10]. Keeping in view that multiple voters may use one<br />

mobile phone in a household to verify their vote and to protect the<br />

privacy of the voter, the name, parentage and home address which<br />

are attributes of CNIC are not included in the return SMS.<br />

The block code is the assigned block or colony number allotted<br />

after the new housing census of 2011 as mentioned before. The<br />

serial number replaces the old manual slip system that was issued<br />

to every voter with the serial number and name upon registration.<br />

The idea of digitally replacing the paper slip system intends to<br />

save cost and paper waste and also reduces the chances of<br />

misplaced slips. Another important issue it helps address is a<br />

voting malpractice, which was often reported in rural areas with<br />

illiterate or inexperienced voters. It is observed during elections in<br />

Pakistan that political party agents canvassing outside polling<br />

station would try to influence the voter in the guise of providing<br />

support to inexperienced voters [20]. With a new digitised version<br />

of electoral rolls, voters only need to carry their CNIC and newly<br />

issued serial number via digital electoral rolls to polling stations<br />

and cast their ballot. It shall , however, be noted that physical<br />

display of electoral rolls will continue side by side in order to<br />

ensure that no voter is denied this right. The electoral roll<br />

verification drive ended on March 20, 2012.<br />

5. ECP-NADRA SMS APPLICATION<br />

ANALYSIS<br />

It is perhaps the first time in Pakistan that a number of<br />

governmental agencies namely, the ECP, NADRA and the<br />

Population Census Organisation have cooperated with one another<br />

in order to make a digital electoral roll. The Pakistani voters’<br />

uptake on this service was considerable in both rural and urban<br />

sectors. With mobiles, virtual display centres for a small price<br />

could be created anywhere at the convenience of the voter.<br />

Indicative of the demand shift in the new service delivery, voters<br />

opted to use the SMS service and the display centres were not<br />

crowded, making it easier and speedier to deal with modification<br />

complaints of effected voters. Within 17 days of the launch of the<br />

application, 4.6 million people had used it to verify their electoral<br />

details [28]. By end of March 2012, the number of verified voters<br />

exceeded the 7 million that used this facility.<br />

The SMS service serves as an auxiliary provision that enabled the<br />

8.4% registered voters in Pakistan. However, this level of<br />

collaboration will be able to open new areas of interagency<br />

collaborations, which actually could be considered as the third and<br />

fourth phase of horizontal and vertical integration, if compared<br />

with the Layne & Lee model of e-government. Similarly, the SMS<br />

service has landed the ECP in the Guinness Book of World<br />

Records for having the World’s largest voter verification SMS<br />

service with a voter density of 83.28 million [31]. Introducing this<br />

application on an even bigger network of almost 111 million<br />

mobile users in one go, relying on indigenous technology and<br />

skills without physical external assistance bodes well for<br />

developing countries and their m-government plans. As of 2012,<br />

the ECP plans to launch the same SMS service to announce and<br />

inform voters of their allocated polling stations before the national<br />

elections are conducted.<br />

An instance of this provision was observed in July 2012, after the<br />

dismissal of the then Prime Minister Gillani by the Supreme Court<br />

of Pakistan. His seat in the Pakistan National Assembly eventually<br />

fell vacant and bye-election had to be held. Here the ECP<br />

provided information to over 138,000 voters in that constituency<br />

162<br />

using location based targeting and its new CERS II rolls to SMS<br />

voters their block codes, polling station names and numbers and<br />

serial numbers.<br />

The architecture behind the SMS application is a G2C<br />

informational exchange initiated by texting a short code- a C2G<br />

pull communication. On the front end, it is a text-based<br />

communication on the GSM cellular network in a local language<br />

and numbers. The middleware is a NADRA SMS Gateway. All<br />

the Mobile Network Operators (MNO) have reserved short code<br />

8300 for the ECP. Once a network operator receives an SMS, it<br />

passes the message to the NADRA SMS gate way. In return, if the<br />

message is appropriate (i.e. if it contains 13 digits of CNIC) the<br />

voters’ information is returned.<br />

If this application is analysed against the Task-Technology Fit<br />

model [13], it can be argued that the ECP-NADRA’s application<br />

is a useful one in a way that a huge chunk of the target audience is<br />

available on the employed platform, the task (here informational)<br />

can be viably transmitted. Given the text-based informational<br />

request in a mobile and geographically diverse target area, with a<br />

varied skill set and technical abilities and round the clock access<br />

to ensure all voters could verify their status within the 20-day<br />

period- this match serves a useful proposition for the SMS<br />

verification system. Had the ECP launched a website version of<br />

this application then, , the application would not have even<br />

achieved the 8.3% of audience due to limited internet penetration<br />

in Pakistan as compared to the mobile phone subscription as<br />

indicated in Figure 1. Building up on the location-based facility in<br />

m-government, the future plan to inform voters of their designated<br />

polling stations through a similar SMS based application may also<br />

be successful, which was test run in the bye-elections of<br />

constituency Multan-IV as pointed before.<br />

Incorporation of an external facilitator or technology provider in a<br />

highly sensitive national affair such as the national election is not<br />

desirable [19] especially with regard to credibility and neutrality<br />

of an election body. By hiring an indigenous public firm on a<br />

formal contract to implement both the software and hardware ends<br />

of a project, while keeping check and balance on the tailored<br />

solution, ensured control with the contractee. The digitisation of<br />

voters’ registration roll brought together not only the government<br />

officials but also IT experts to ensure that the design phase does<br />

not suffer from the absence of experts from both ends. Brewer<br />

et.al. [5] have argued that the combination of bureaucracy and<br />

technology experts would minimise the pitfalls in an egovernment<br />

application. The ECP relied on NADRA’s<br />

accumulated experience of over 10 years in the automation and<br />

biometric business. A unique factor was that NADRA customized<br />

a data image of its CNIC and appended the CERS I with it to<br />

create CERS II. Such a multiagency cooperation for interagency<br />

information sharing can be extended and scaled to further future<br />

projects [35].<br />

Ideally, there should not have been any costs involved for an<br />

SMS, but to avoid jamming of the SMS service by miscreants the<br />

ECP decided to keep a minimal cost. Despite the lower cost of<br />

SMS, it may still prevent the marginally poor people from<br />

availing it. However, the government did not abandon the paper<br />

display of electoral rolls to ensure no citizen is missed out.<br />

Security and trust though remain tangible issues to be addressed<br />

as with all e-government initiatives- establishing an identity<br />

versus the anonymity of a citizen have confounded electronic<br />

notions of governance and elections [19].


Here the authors wish to extend the analysis of the ECP project by<br />

gauging against the success factor model proposed by Sandy and<br />

Macmillian [29] to evaluate the internal effects on the government<br />

based on six points:<br />

Cost: Governments need to find cost effective solutions to ensure<br />

funding and look into options for joint operations. In this case,<br />

even buying services from MNO in the long-term or in a bulk<br />

package lasting only during the verification drive, might have<br />

further lessened or eliminated the charge of the service on the<br />

public, perhaps making it more inclusive. Who might pay for the<br />

novelty of receiving an SMS for a service viewed as too<br />

expensive? After all e-government services tend to have an elastic<br />

demand [24] and do not stand the test of the cost distribution well.<br />

Similarly, attracting and keeping staff with “requisite agility” will<br />

make for a self-conscious government that can adequately handle<br />

and deal with citizen demand [5].<br />

Business Reengineering: A central authority and political support<br />

in the form of a coordinated and bench-marked national egovernment<br />

plan with specific m-government services recognized<br />

with clearly defined deliverables would ensure a better and<br />

cohesive strategy. This would mean that dependency on legacy<br />

systems be reduced and government should try to keep or<br />

maintain central databases or platforms that can be used to test,<br />

pilot-run and launch e-government or m-government initiatives,<br />

which will prove to be launching pads and resource centres for all<br />

departments and sectors.<br />

Education: Better access and training programs to ensure adoption<br />

of m-government initiatives so as to have stronger back office<br />

work. Identifying and maintaining open source international<br />

standards that would make it easier for both employees and public<br />

to remain at the top of the infrastructural game and the everchanging<br />

technology blitz.<br />

Acceptance: There should be ownership of the projects to ensure<br />

that the increased participation of the public is handled well or it<br />

would have a reverse effect on inclusive nature of m-government.<br />

Here, the popularity of the e-Sahulat programme over the Kiosk<br />

system may explain the local populace’s preference for human<br />

interaction rather than machine-human interfaces [3]. For this<br />

purpose, incorporating government officials in the design and<br />

feedback of such initiatives will create interest. Supporting<br />

employees with technically sound and well-fitted offices with<br />

clearly defined job descriptions will ensure accountability.<br />

Security: Data loss in terms of device theft can be limited by<br />

ensuring that mobile phone SIMs are registered against CNICs.<br />

Similarly providing access to an online temporary identification<br />

should also be accepted in case of ID theft. Data protocols on<br />

office machinery should be defined and stripped down for work<br />

purposes only and IT administrators should have strict policies<br />

against external data storage devices in workplaces. These<br />

policies currently prevail in NADRA offices.<br />

Access: Providing key infrastructure to all actors, both within and<br />

without the government. Presence of content in local language,<br />

regular and audited updating of CMS system and providing<br />

similar opportunities for people with physical disability and<br />

special needs will ensure equal access for all.<br />

163<br />

5.1 Litmus Test- Requisite Agility of the<br />

CERS II and SMS application<br />

Coming to the last factor- has the governance module succeeded<br />

with this initiative? Coupling this system with the aforementioned<br />

electoral bill, the CNIC numbers have essentially become unique<br />

identifying factors in elections. The ECP’s initiative has the<br />

potential to promote transparency and would help in removal of<br />

defunct or fraudulent votes from the vote bank - hence the<br />

strengthening of related factors of openness, accountability and<br />

participation. Here, one recent incident that was reported during<br />

the verification procedure serves as a litmus test of this initiative’s<br />

working. After the display of electoral rolls, a member of national<br />

and another of provincial assembly observed abnormal increase in<br />

the electorate records of their respective constituencies and<br />

reported it to the ECP. The ECP gave NADRA and its provincial<br />

election commission office a forty-eight hour deadline to explain<br />

the cause behind this anomaly. Not only was the mistake traced<br />

and rectified, but NADRA investigated that five people had tried<br />

to manually fill thousands of vote-transfer forms and migrated<br />

voters in these districts. As they had submitted these forms with<br />

some identification, NADRA used the biometric assets of the<br />

CNIC and traced the culprits. Similar patterns were also traced out<br />

in two other constituencies and rectified [9] [26].<br />

6. CONCLUSION<br />

Encouraging as the result of this debilitation may be, it is<br />

however, difficult to say as to what extent governance will be<br />

fostered by this initiative in the long run despite its wide usage<br />

and demonstrated benefits. But the ECP-NADRA app surely is a<br />

unique experiment in strengthening the democratic culture in<br />

Pakistan. Apart from NADRA’s kiosk machine project and an<br />

eSahulat programme, the ECP SMS app can be considered as<br />

another contribution in the category of alternative channel of<br />

electronic public service delivery which excludes the web portal<br />

as a main communication medium. This app has tried to exploit<br />

the most frequently used gadget, i.e., a mobile phone which does<br />

not even have to be a smart phone to use this app. For a young<br />

democracy like Pakistan the ECP-NADRA collaboration seems to<br />

have contributed to a larger extent in assuring the effective<br />

participation and/or voting equality in Dahl’s sense of effective<br />

democracy. The way multiple governmental agency have<br />

collaborated in the preparation of electoral rolls, the ECP and<br />

NADRA have set up a decent example for other developing<br />

countries how vertical boundaries can be overcome in such inter<br />

agency collaborations. M-government presents a substantive case<br />

in enfranchising the participatory nature and equal rights to<br />

information sharing for all citizens. Once this information divide<br />

is plugged, participation may seep into the public policy<br />

formulation sphere. However, the external implication of mgovernment<br />

on public is not the only factor in their success.<br />

The internal implications that m-government will have in making<br />

the government effective and efficient in its function is also<br />

important. There is diverse literature from organisational<br />

behaviour studies that shows that lack of ownership for projects<br />

from within governments can kill the most promising innovations.<br />

The public and governments are generally seen as complacent in<br />

their business models and more so when accountability and<br />

checks and balances are absent or hindered by fledging,<br />

discontinuous democracies. This is also the political case of<br />

Pakistan, where change in governments leads to entire and sudden<br />

shifts in policy which means squandering the already deficit


public money. As most of the e-government initiatives in<br />

developing countries are based on legacy systems, there is little<br />

scope for backward compatibility for newer front-end<br />

applications. Additional training cost, quality of manpower and<br />

organizational rigidities are hindrances [33] [34], which ideally<br />

the private sector has always adapted better to. Thus, Public<br />

Private Partnerships (PPP) maybe the way forward as public<br />

sector brings in money, employees and better business models,<br />

while the government ensures that the role of governance and<br />

common public good are not lost in capital building.<br />

7. RECOMMENDATIONS<br />

With regards to the case study, certain recommendations that<br />

could facilitate newer m-government initiatives and thus make<br />

room for innovative and useful e-government initiatives which are<br />

user-centric are listed below:<br />

1. Establish a Mobile Service Gateway Delivery system, which<br />

could be an incubation cell for all or any government initiatives<br />

into m-government. It would maintain a technical infrastructure<br />

and staff to help formulate, devise, test-run and then deploy<br />

various m-government initiatives. It would be ideal to have one<br />

central Mobile Gateway with networked centres in all provinces<br />

to keep a balanced and federal linearity in equal funding but will<br />

allow them flexibility to identify preferred areas for action thus<br />

promoting a bottom-up approach.<br />

2. Ensure that the format of the CNIC database is the groundwork<br />

database for all new initiatives for e-government and mgovernment.<br />

This would allow mapping of citizens across<br />

different organizations building up a single unified repository on<br />

user-id with unique biometric features. These would prevent<br />

identity theft or misuse of data, as biometric checks are embedded<br />

within these systems.<br />

3. Establish a market for m-government applications not only for<br />

smartphones but normal cellular phones that can exploit the<br />

location-based context of the mobile phone to provide crucial<br />

information. The Government should provide incentives to mobile<br />

application programmers to compete and design comprehensive<br />

application that can be used to facilitate agricultural, medical and<br />

educational initiatives over the mobile channel.<br />

4. Initiating a standard for mobile applications and incorporating it<br />

within the National e-government plan. The EGD of Pakistan has<br />

to revise and update its e-government strategy plan and design a<br />

separate model for m-government that can be used to benchmark<br />

and help future initiatives on this platform across the public<br />

sector.<br />

5. Pre-designated short codes should be reserved for future mgovernment<br />

initiatives. Reserving short codes on a national level<br />

and then using them for deploying essential services comes in<br />

handy for the recalling abilities of these short codes. Similarly, a<br />

long number should be reserved which would be the touch point<br />

of all m-government initiatives. It would feature a menu-based<br />

Interactive Voice Response (IVR) menu that would serve to be a<br />

repository for accessing, using and interacting with all mgovernment<br />

initiatives through oral occupation thus involving<br />

illiterate or technically challenged citizens.<br />

6. Developing mobile websites for all government websites which<br />

would have the same URL but would divert the user to the mobile<br />

website after it has been established that it is being accessed<br />

through mobile. Mobile websites need to be text-rich and without<br />

164<br />

too many graphics, and they should be available in the national as<br />

well as regional languages.<br />

8. ACKNOWLEDGEMENTS<br />

The authors are indebted to the technical wing of National<br />

Database Registration Authority (NADRA) for their assistance in<br />

providing information about the case study.<br />

9. REFERENCES<br />

[1] Baums, C. H., & Maio, A. D. Gartner's Four phases of<br />

EGovernment Model. Retrieved March 12, 2012, from<br />

GARTNER: www.gartner.com, 2000<br />

[2] Bokhari, H. Paradigm shift in service delivery channels for<br />

G2C services–Service Oriented Architecture an option for<br />

the success of eGovernment in Pakistan? In International<br />

Conference on Information and Communication<br />

Technologies, University of Science and Technology, Bannu,<br />

Pakistan, 2008.<br />

[3] Bokhari, H. Multi-channel Electronic Public Service<br />

Delivery Mechanisms in Developing Countries- A Case<br />

Study of the Esahulat Programme in Pakistan. In Janowski,<br />

T. and Davies, J. (Ed). 4th International Conference on<br />

Theory and Practice of Electronic Governance.ACM: New<br />

York, 2010.<br />

[4] Bokhari, H. Realising hybrid model of eGovernment for<br />

citizen-centric eServices in developing countries. Analysis of<br />

eSahulat programme in Pakistan. In IEEE 13th International<br />

Multitopic Conference, UET Taxila and MAJU Islamabad,<br />

2009.<br />

[5] Brewer, G. A., Neubauer, B. J., & Geiselhart, a. K.<br />

Designing and Implementing E-Government Systems :<br />

Critical Implications for Public Administration and<br />

Democracy. Administration and Society (July, 2006), p. 472-<br />

500.<br />

[6] Castells, M. The rise of the network society: volume i: the<br />

information age: economy, society, and culture. Willey-<br />

Blackwell, 2009.<br />

[7] Dahl, R. A. Democracy and its critics. New Haven CT: Yale<br />

University Press, 1989.<br />

[8] Dawn. ECP starts Rolls display, SMS service for voters<br />

verification. Retrieved March 25, 2012, from Dawn:<br />

http://www.dawn.com/2012/02/29/ecp-starts-rolls-displaysms-service-for-voters-verification.html<br />

[9] ECP. Press Release. Retrieved March 25, 2012, from<br />

Election Commission of Pakistan:<br />

http://www.ecp.gov.pk/ViewPressReleaseNotific.aspx?ID=1<br />

538&TypeID=0<br />

[10] ECP. Press Release: ECP inaugurates SMS facility<br />

tomorrow. Retrieved March 25, 2012, from Election<br />

Commission of Pakistan:<br />

http://www.ecp.gov.pk/ViewPressReleaseNotific.aspx?ID=1<br />

503<br />

[11] ECP. Progress Report on Implementation of the Five Year<br />

Strategic Plan. Retrieved March 24, 2012, from Election<br />

Commission of Pakistan:


http://www.ecp.gov.pk/Reports/SPStrategicPlanProgress.pdf,<br />

January, 2012.<br />

[12] El-Kiki, T., & Lawrence, E. Emerging Mobile Government<br />

Services: Strategies for Success. 20th Bled eConference.<br />

Bled, Slovenia, 2007.<br />

[13] Gebauer, J., Shaw, M. J., & Gribbins, M. Task technology fit<br />

for mobile information systems. Journal of Information<br />

Technology. p. 259-272, 2010.<br />

[14] Ghyasi, A. F., & Kushchu, I. mGovernment: Case for<br />

developing countries. Retrieved March 24, 2012, from<br />

Mobile Government Lab: http://www.mgovernment.org/<br />

resurces/mgovlab_afgik.pdf.<br />

[15] ITU. ICT- Facts and Figures: The World in 2011. Retrieved<br />

March 24, 2012, from International Telecommunications<br />

Union: http://www.itu.int/ITU/ict/facts/2011/<br />

material/ICTFactsFigures2011.pdf<br />

[16] ITU & OECD. M-government: Mobile technologies for<br />

responsive governments and connected societies. ITU &<br />

OECD, 2011.<br />

[17] ITU. (2011, December). Key 2000-2010 Country Statistics.<br />

Retrieved March 10, 2012, from International<br />

Telecommunications Union: http://www.itu.int/ITU-<br />

D/ict/statistics/<br />

[18] Karen, L., Jungwoo L. “Developing Fully Functional E-<br />

Government. A Four Stage Model”. Government Information<br />

Quarterly, Vol. 18, Issue 2 (2001). p. 122-136.<br />

[19] Krimmer, R., Triessnig, S., & Volkamer, M. The<br />

Development of Remote E-voting Around the World: A<br />

review of roads and directions. Vote ID (pp. 1-15).<br />

Heidelberg, DE: Springer-Verlag Berlin, 2007.<br />

[20] Khan, I. H. Electoral malpractices during the 2008 elections<br />

in Pakistan. Karachi: Oxford University Press, 2011.<br />

[21] Kushchu, I., & Borucki, C. Impact of Mobile Technologies<br />

on Government. Retrieved March 25, 2012, from Mobile<br />

Government Lab: http://www.mgovernment.org/resurces/<br />

mgovlab_ikcb.pdf<br />

[22] Kushchu, I., & Kuscu, M. H. From M-government to Egovernment.<br />

Retrieved March 24, 2012, from Mobile<br />

Government Lab: http://www.mgovservice.ru/upload/<br />

uploadfiles/From%20eGov%20to%20mGov.pdf<br />

[23] Moon, M. J. From E-government to M-government?<br />

Emerging trends in the use of mobile technology by State<br />

governments. Washington: IBM Centre for the Business of<br />

Government, 2004.<br />

[24] Naik, G., Joshi, S., & Basavaraj, K. Fostering inclusive<br />

growth through e-Governance Embedded Rural Telecenters.<br />

Government Information Quarterly (2012), p. 81-89.<br />

[25] Naqvi, S. J., & Al-Shihi, H. M-government initatives in<br />

Oman. Issues in Informing Science and Technology (2009),<br />

p. 818-824.<br />

[26] News, T. ECP, Nadra solve mystery of abnormal increase in<br />

registered voters. Retrieved March 25, 2012, from The<br />

News: http://www.thenews.com.pk/Todays-News-6-98244-<br />

165<br />

ECP-Nadra-solve-mystery-of-abnormal-increase-inregistered-voters<br />

[27] Norris, D. F. E-Government...Not E-Governance...Not Edemocracry<br />

Not Now! Not Ever? ICEGOV 2010 Beijing,<br />

China: ACM. pp. 339-346, 2010<br />

[28] Pakistan Today. Over 4.6m citizens verify vote through<br />

SMS. Retrieved March 25, 2012, from Pakistan Today:<br />

http://www.pakistantoday.com.pk/2012/03/18/city/islamabad<br />

/over-4-6m-citizens-verify-vote-through-sms/<br />

[29] Sandy, G. A., & Macmillian, S. A success factors model for<br />

M-government. Euro mGov (pp. 349-352). Brighton, UK:<br />

Mobile Government Consortium International Pub, 2005<br />

[30] Symonds, M. A survey of government and the internet: The<br />

next revolution. The Economist (June, 2000), p. 36.<br />

[31] Tribune. ECP 'SMS voters’ verification service may break<br />

World Record. Retrieved 2012 25, March, from The Express<br />

Tribune: http://tribune.com.pk/story/350452/ecp-sms-votersverification-service-may-break-world-record/<br />

[32] Tribune, P. Neutral caretakers, independent EC promised;<br />

passed 20th amendment bill. Retrieved March 24, 2012, from<br />

Pakistan News Service: http://paktribune.com/news/Neutralcaretakers-independent-EC-promised;-passed-20th-<br />

Amendment-bill-247519.html<br />

[33] Trimi, S., & Sheng, H. Emerging trends in M-government.<br />

Communications of the ACM (May, 2008), p. 53-58.<br />

[34] VR Salkute, S. K. Implications of mobile communication<br />

technologies (mct) in m-government: challenges, technology<br />

and applications. International Research Journal of<br />

Management and Business Studies (2011), p. 62-67.<br />

[35] Yang, T.-M., Zheng, L., & Pardo, T. The boundaries of<br />

information sharing and integration: A case study of Taiwan<br />

e-government. Government Information Quarterly (2012), p.<br />

51-60.


Integrating Argumentation Technologies and<br />

Context-Based Search for Intelligent Processing<br />

of Citizens’ Opinion in Social Media<br />

Carlos Chesñevar,<br />

Ana Maguitman<br />

Dept.of Computer Science and Eng.<br />

Universidad Nacional del Sur<br />

Av. Alem 1253<br />

8000 Bahía Blanca, Argentina<br />

+54 291 459 5135<br />

{cic,agm}@cs.uns.edu.ar<br />

ABSTRACT<br />

Nowadays, governments are adopting Web 2.0 technologies for<br />

interacting with citizens, empowering them to share their views,<br />

react to issues of their concern and form opinion. In particular,<br />

social media play an important role in this context, due to their<br />

widespread use. For governments, a major technical challenge is<br />

the lack of automated intelligent tools for processing citizens’<br />

opinion in government social media. At the same time, during the<br />

last decade, argumentation theory has consolidated itself in<br />

Artificial Intelligence as a new paradigm for modeling common<br />

sense reasoning, with application in several areas, such as legal<br />

reasoning, multiagent systems, and decision support systems,<br />

among others. This paper outlines an argument-based approach<br />

for overcoming such challenge, combined with context-based<br />

information retrieval. Our ultimate aim is to combine contextbased<br />

search and argumentation in a collaborative framework for<br />

managing (retrieving and publishing) service- and policy-related<br />

information in government-use social media tools.<br />

Categories and Subject Descriptors<br />

J.1 [Administrative Data Processing]: Government; I.2<br />

[Artificial Intelligence]: Learning; H.3 [Information Storage<br />

and Retrieval]: Information Search and Retrieval<br />

General Terms<br />

Algorithms, Human Factors, Languages<br />

Keywords<br />

Social media; Government 2.0; e-Governance; Participation;<br />

Intelligent Tools<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Elsa Estevez<br />

United Nations University<br />

Int. Institute for Software Technology<br />

Center for Electronic Governance<br />

P.O. Box 3058, Macao SAR, China<br />

+853 85040491<br />

elsa@cs.uns.edu.ar<br />

166<br />

Ramón Brena<br />

ITESM Monterrey<br />

Av. E. Garza Sada 2501,<br />

Col. Tecnológico, 64849 Monterrey,<br />

N.L., México<br />

+52 81 8358-2000 ext. 5246<br />

ramon.brena@itesm.mx<br />

1. INTRODUCTION AND MOTIVATIONS<br />

Government 2.0 refers to government's adoption of Web 2.0<br />

technologies to socialize government services, processes, and data<br />

[1][2]. Enabling new ways of communication – text, audio, video<br />

as well as two-way communications, Government 2.0 provides<br />

new mechanisms for government agencies to: 1) increase<br />

transparency – bringing public sector agenda and government<br />

activities closer to citizens [3], 2) facilitate participation –<br />

engaging citizens in making opinion and contributing to policydecision<br />

making; and 3) enhance service delivery – pushing<br />

service-related information and gathering citizens’ opinions about<br />

service delivery. As an example of Government 2.0 adoption, the<br />

Government of Singapore offers a directory of the web 2.0 and<br />

other social media initiatives, such as Facebook pages, Flickr<br />

photostreams, Twitter accounts, and YouTube channels, among<br />

others; used by government agencies [4].<br />

Aware of the benefits and willing to pursue them, governments<br />

first need to overcome various types of challenges posted by<br />

Government 2.0. In particular, the use of social media requires<br />

governments to overcome challenges related to privacy, security,<br />

data management, accessibility, social inclusion, governance and<br />

policy-related issues [5]. Focusing on the data management<br />

perspective, only integrating data streams from social media<br />

requires solving two important issues: 1) the magnitude of the<br />

information flow associated with such data streams (e.g. Twitter<br />

disseminates 55 million tweets a day), and 2) extracting<br />

meaningful information –social media data streams are usually<br />

incomplete which may be potentially inconsistent, as citizens<br />

might have different views on a certain issue.<br />

Addressing technical challenges of data management in<br />

government-use social media tools, this paper presents DECIDE<br />

2.0 – a framework integrating argumentation technologies and<br />

context-based search for intelligent processing of citizens’ opinion<br />

in social media. The framework relies on text mining and opinion<br />

mining techniques to filter noise and detect main topics being<br />

discussed by citizens in social media. Recognizing that the use of<br />

such techniques is not a common government practice, the main<br />

contribution of DECIDE 2.0 is to provide an automated tool for<br />

extracting arguments based on citizens’ opinions. The framework


will enable to assess and confront pro- and cons- arguments to be<br />

used by policy makers and government officials as inputs in<br />

decision making processes.<br />

The rest of the paper is structured as follows. Section 2 presents<br />

an overview of the framework; while Section 3 explains the main<br />

technologies applied in DECIDE 2.0 – context-based search and<br />

argumentation using Defeasible Logic Programming (DeLP).<br />

Finally, Section 4 outlines a roadmap for future work.<br />

2. DECIDE 2.0 - OVERVIEW<br />

DECIDE 2.0 aims at extending the current state of the art of web<br />

2.0 technologies by integrating existing social media tools with<br />

argumentation and context-aware technologies. Following its aim,<br />

DECIDE 2.0 combines context-based search [6] and<br />

argumentation [7] in a collaborative system for managing<br />

(retrieving and publishing) service- and policy-related information<br />

in social media tools used by governments. Therefore, DECIDE<br />

2.0 contributes to a more enhanced set of Government 2.0 tools.<br />

Context of<br />

e-Government-<br />

related<br />

issue<br />

Citizens<br />

Citizens’<br />

Opinion<br />

Knowledge<br />

base<br />

post<br />

opinions<br />

C2) Argument-based<br />

decision making<br />

C1) Extracting opinions<br />

using context-based<br />

search<br />

3. INTEGRATING ARGUMENTATION<br />

AND CONTEXT-BASED SEARCH<br />

Our approach involves two main stages: a) context-based search<br />

from social media - C1 in Figure 1; and b) argumentative decision<br />

making on the basis of the obtained information – C2, C3 and C4<br />

in Figure 1. Next we will analyze these two stages in more detail.<br />

3.1. Context-Based Search for Social Media<br />

Context-based search in Twitter is an instance of context-based<br />

search in general [6]. The task of context-based search could be<br />

applied in many different situations. For example, a<br />

contextualized suggestion interface could be useful to a journalist<br />

for exploring information sources while she writes a news article.<br />

It could also be helpful to a researcher, to identify novel but<br />

r<br />

Citizens’ Opinion<br />

Database<br />

Fig. 1. DECIDE 2.0 Framework<br />

DECIDE 2.0 was originally presented in [8] and a revised version<br />

of its architecture is presented in Figure 1. The architecture<br />

comprises four main components: C1) Extracting Opinions -<br />

based on data provided by social media, extracts citizens’<br />

opinions on a given theme using context-based search and<br />

produces formal predicates, and stores opinions and predicates in<br />

a knowledgebase; C2) Argument-based Decision Making – based<br />

on the generated knowledgebase, the component selects predicates<br />

on a given theme; C3) Applying DeLP Web Services – predicates<br />

are analyzed with DeLP web services to assess whether they<br />

follow some assumptions or not; C4) Producing Global<br />

Assessment – based on the results of the previous stage, arguments<br />

are classified into pro- and cons- and are consolidated into a<br />

global assessment of citizens’ opinion on a given theme.<br />

Even though DECIDE 2.0 is intended to capture citizens’ opinions<br />

from different social media, our current research is particularly<br />

focused on the use of Twitter. Consequently, in what follows we<br />

will outline part of our ongoing research in this direction.<br />

SOCIAL MEDIA TOOLS<br />

167<br />

C3) Applying Defeasible<br />

Logic Programming<br />

(DeLP) web services<br />

C4) Producing global<br />

assessment of citizens’<br />

opinions<br />

post<br />

policy-related<br />

issues<br />

Citizens’<br />

Opinion<br />

(with details for<br />

policy-making<br />

oriented<br />

decisions)<br />

Government<br />

Officials<br />

related material to consider or to help assure that relevant areas<br />

have been considered in her research work.<br />

To illustrate our approach, we define a case study where<br />

government stakeholders involved in a particular policy area are<br />

interested in collecting opinions from Twitter on a topic that is<br />

openly discussed by community members.<br />

One of the goals of the proposed framework is to develop a topic<br />

suggestion tool that has the capability of identifying a set of<br />

opinions that share a common theme. We assume that a citizen’s<br />

opinion refers to a certain theme and contains several terms. In<br />

turn, the opinion may be related to one or more topics and it is<br />

possible to associate each topic with the related terms in the<br />

citizen’s opinion. In addition, the suggested topics can be<br />

evaluated in the light of a set of criteria for assessing their quality.


The concepts are illustrated in Figure 2. Technically. given a<br />

corpus of opinions O = {o1, o2, … ,om}, and a universe of possible<br />

terms K ={k1, k2, …, kn}, we consider a topic ti of an opinion oj to<br />

be a nonempty subset of the terms ki1, …, kip contained in K<br />

satisfying a set of criteria for topic quality. In this sense, a topic<br />

can be characterized as a set of cohesive terms associated with<br />

opinions that share a common theme.<br />

Fig. 2. DECIDE 2.0 Concepts<br />

A contextualized search system starts with a piece of text d<br />

reflecting a general context or topic of interest td and identifies a<br />

set N = {t1, t2, …, tq} of new topics related to topic td. The<br />

performance of the main component of the system - a<br />

contextualized topic suggester, can be judged according to various<br />

criteria [10]:<br />

o Global coherence: The new suggested topics (topics in N)<br />

must be relevant to the general topic of interest td.<br />

o Local coherence: Each suggested topic must be of high<br />

quality according to the criteria of the domain. Such criteria<br />

might include: 1) measures of coherence - each topic<br />

description is constituted of tightly related terms and opinions,<br />

2) descriptiveness - the terms used to identify the topics are<br />

good descriptors, 3) discriminative power - the terms help<br />

differentiate among other suggested topics , 4) conciseness -<br />

the topic is summarized in few terms; etc.<br />

o Coverage: The set of new suggested topics (N) must contain<br />

most of the topics considered to be relevant.<br />

o Novelty: The set of new topics (N) must go beyond the<br />

information captured in the initial topic td.<br />

o Diversity: topics in N must be sufficiently diverse from each<br />

other.<br />

Using context-based search, given a set O of opinions provided by<br />

citizens via Twitter and a set of possible terms K on a topic of<br />

community discussion td, we can identify new topics associated<br />

with those opinions. Clearly, users might confront opinions,<br />

including positive or negative remarks within their tweets.<br />

Sentiment analysis techniques [11][12] allow to determine the<br />

attitude of a speaker (citizen) or a writer with respect to some<br />

topic or the overall contextual polarity of a document (e.g.<br />

positive, negative, neutral). As a final result, we will be able to<br />

identify different logical predicates associated with a user’s<br />

opinion, the topics involved, and the attitude of the speaker.<br />

As an example, consider the following piece of text d (extracted<br />

from http://www.conservapedia.com):<br />

ObamaCare, more formally known as "The Patient Protection and<br />

Affordable Care Act," was passed by Congress on March 21,<br />

2010, and signed into federal law by President Barack Obama on<br />

March 23. This law began the process to socialize the United<br />

States health care system. The centerpiece of ObamaCare is the<br />

individual mandate, a provision that makes it mandatory for every<br />

citizen to purchase private health insurance, which is<br />

unprecedented in American history.<br />

168<br />

By applying techniques described in [13] it is possible to identify<br />

a set of good topic descriptors and topic discriminators (e.g.<br />

preventive health care , obamacare, etc.) as well as a list of<br />

representative hashtags associated with this topic, such as #hcr<br />

and #obamacare. A context-based search system might then<br />

identify the following set of opinions, among others:<br />

o1: Thanks for the new health law, pregnant women can receive<br />

many free preventive health services and screenings. (tweeted by<br />

user U1)<br />

o2: Health care reform does not make health care more<br />

affordable it makes people buy something they can’t afford.<br />

(tweeted by user U2)<br />

From the opinions above, logical predicates can be extracted,<br />

structuring previous information in logic programming fashion:<br />

opinion(o1, “Thanks for…”)<br />

opinion(o2, “Thanks for…”)<br />

topic(t1, preventive health care)<br />

useropinion(u1,o1, t1, positive)<br />

useropinion(u2,o2, t1,negative)<br />

Such set of logical predicates derived from citizens’ opinions on a<br />

particular context will provide a Citizens’ Opinion Knowledgebase<br />

(see Figure 1), on top of which an argumentative analysis<br />

will be carried out.<br />

3.2. Argumentation using DeLP<br />

Over the last few years, argumentation systems have been gaining<br />

increasing importance in several areas of Artificial Intelligence,<br />

mainly as a vehicle for facilitating rationally justifiable decision<br />

making when handling incomplete and potentially inconsistent<br />

information [7]. Argumentation provides a sound model for<br />

dialectical reasoning, which underlies discussions or opinion<br />

confrontation in social networks.<br />

Rule-Based Argumentation Systems, such as Defeasible Logic<br />

Programming (DeLP) [14] are increasingly being considered for<br />

applications in developing software engineering tools, constituting<br />

an important component of multi-agent systems for negotiation,<br />

problem solving, and for the fusion of data and knowledge. Such<br />

systems implement a dialectical reasoning process by determining<br />

whether a proposition follows from certain assumptions,<br />

analyzing whether some of those assumptions can be disproved by<br />

other assumptions in our premises. In this way, an argumentation<br />

system provides valuable help to analyze which assumptions from<br />

our knowledge base are really giving rise to inconsistency and<br />

which assumptions are harmless.<br />

In DeLP we refer to a knowledgebase as a pair of sets (KS, KD),<br />

distinguishing strict and defeasible knowledge. Strict knowledge<br />

(KS) corresponds to the knowledge which is certain; typical<br />

elements in KS are statements or undisputable facts about the<br />

world (e.g. adopting the representation used in logic<br />

programming, implications of the form Q(x)←P(x)). The strict<br />

knowledge is consistent, i.e. no contradictory conclusions can be<br />

derived from it. Defeasible knowledge (KD) corresponds to that<br />

knowledge which is tentative, modelled through “rules with<br />

exceptions” (defeasible rules) of the form “if P then usually Q”<br />

(e.g., “if somebody is a citizen, it usually votes”). Such rules<br />

model our incomplete knowledge about the world, as they can<br />

have exceptions (e.g., a citizen may be travelling abroad without<br />

access to a voting place, or may not be willing to vote).<br />

Syntactically, a special symbol (⇐) is used to distinguish<br />

“defeasible” rules from logical implications.


The underlying DeLP process is as follows. Given a particular<br />

query Q - e.g. assessing whether ObamaCare Programme is<br />

supported by citizens’ opinions – isSupported(ObamaCare),<br />

DeLP will automatically perform a backward chaining process to<br />

obtain a sequence of defeasible rules instantiations allowing to<br />

conclude Q. Such a sequence is called an argument supporting Q.<br />

Clearly, as contradictory information can be present in the<br />

defeasible knowledgebase, counter-arguments might arise (e.g. an<br />

argument supporting ~isSupported(ObamaCare). When two<br />

arguments A and B are in conflict, a preference criterion is used in<br />

DeLP to determine which argument should prevail. The argument<br />

that prevails will be called a defeater. The preference criterion to<br />

be applied (e.g. specificity [14]) can be defined in a modular way.<br />

Note that the notion of defeat among arguments may lead to<br />

complex “cascade” situations: an argument A may be defeated by<br />

an argument B, which in turn may be defeated by an argument C,<br />

and so on. Besides, every argument involved may have on its turn<br />

more than one defeater. Argumentation systems allow us to<br />

determine when a given argument is considered as ultimately<br />

acceptable with respect to the knowledge we have available by<br />

means of a dialectical analysis, which takes the form of a tree-like<br />

structure called dialectical tree. The root of the tree is a given<br />

argument A supporting some claim, and children nodes for the<br />

root are those defeaters B1, B2, .. Bk for A. The process is repeated<br />

recursively on every defeater Bi, until all possible arguments have<br />

been considered. The tree leaves are arguments without defeaters.<br />

Some additional restrictions apply - e.g. the same argument<br />

cannot be used twice in a path, as that would be fallacious and<br />

would lead to infinite paths.<br />

In DECIDE 2.0 we expect to have a knowledge engineer with<br />

expertise in DeLP, who will be in charge (along with egovernment<br />

officials) of characterizing a knowledge base of strict<br />

and defeasible rules for assessing valuable aspects for policymaking<br />

oriented decisions. Through suitable visualization tools,<br />

the DeLP machinery will provide an automated dialectical<br />

analysis of arguments and counterarguments when facing a<br />

problematic situation (associated with a particular topic or context<br />

for decision making), helping government officials to make better<br />

and more informed decisions. It must be remarked that DeLPbased<br />

recommender systems have been already successfully<br />

formalized [15]. A particular deployment of DeLP for integrating<br />

sentiment analysis and recommendations has also been applied<br />

previously in a commercial software product for travelling<br />

recommendations [16]<br />

4. BRIEF ROADMAP: CONCLUSIONS<br />

Research on the proposed framework will lead directly to<br />

improved coverage, scalability and context-awareness with<br />

respect to the current model of information delivery and retrieval<br />

in social networks. Governments can greatly benefit from the<br />

proposed solution in twofold - by having adequate mining<br />

techniques to retrieve valuable information provided by citizens<br />

on social media, and by targeting different announcements to the<br />

appropriate group of government stakeholders.<br />

In order to materialize the proposed solution, some important<br />

technical problems are to be solved, and constitute research<br />

questions of this work. Major challenges that we intend to address<br />

defining a roadmap for our future work include: 1) developing<br />

algorithms for integrating information - several users may post<br />

messages related to the same topic; hence accrual of information<br />

needs to be modeled properly; 2) implementing efficient models<br />

of trust and reputation propagation - users post information on<br />

social media whose reliability has to be assessed in order to<br />

169<br />

effectively use such information for decision making; and 3)<br />

developing customized information models providing targeted<br />

information to various categories of stakeholders requires having<br />

different “views” of the issues under analysis.<br />

5. ACKNOWLEDGMENTS<br />

The research is funded by LACCIR (Latinamerican and Caribbean<br />

Collaborative ICT Research), Microsoft Research, CONACyT<br />

(Mexico) and Interamerican Development Bank (IDB) and PIP<br />

CONICET Projects 112-200801-02798 and 112-200901-00863.<br />

6. REFERENCES<br />

[1] O’Reilly, T. Government as a Platform. Innovations, vol 6,<br />

no.1, pp 13-40, 2010.<br />

[2] DiMaio, A., Government 2.0: A Gartner Definition, 2009.<br />

http://blogs.gartner.com/andrea_dimaio/2009/11/13/governm<br />

ent-2-0-a-gartner-definition/, last retrieved 28 February 2012.<br />

[3] Bonson, E., Torres, L., Royo, S., and Flores, F., Local e-<br />

Government 2.0: Social Media and Corporate Transparency<br />

in Municipalities, Government Information Quarterly, vol.<br />

29, pp 123-132, 2012.<br />

[4] Government of Singapore, Government Social Media<br />

Directory, available at: http://www.socialmedia.gov.sg/Web/<br />

Home/Default.aspx, last retrieved 15 April 2012.<br />

[5] Bertot, J.C, Jaeger, P.T, and Hansen, D., The Impact of<br />

Polices on Government Social Media Usage: Issues,<br />

Challenges, and Recommendations, Government Information<br />

Quarterly, vol. 29, pp 30-40, 2012.<br />

[6] Lorenzetti, C., Maguitman, A. A Semi-supervised<br />

Incremental Algorithm to Automatically Formulate Topical<br />

Queries. Information Science. Elsevier. 179 (12), 2009.<br />

[7] Simari, G., Rahwan, I. (eds), Argumentation in Artificial<br />

Intelligence, Springer Verlag, 2009.<br />

[8] Estévez, E., Chesñevar, C., Maguitman, A., Brena, R.<br />

DECIDE 2.0 – A Framework for Intelligent Processing of<br />

Citizens’ Opinion in Social Media. In Proc. dg.o 2012,<br />

Maryland, USA, pp.266-267, ACM Press, 2012.<br />

[9] Guo, L., Lease, M. Personalizing Local Search with Twitter.<br />

SIGIR 2011 Workshop on Enriching Information Retrieval<br />

(ENIR 2011).July 24–28, 2011, Beijing, China. Available at:<br />

http://select.cs.cmu.edu/meetings/enir2011/papers/guolease.pdf.<br />

[10] Maguitman, A., Leake, D., Reichherzer, T., Suggesting novel<br />

but related topics: towards context-based support for<br />

knowledge model extension, Proc. of the 10th IUI Conf., San<br />

Diego, California, USA, January 2005.<br />

[11] Twitter Sentiment Corpus, available at: http://www.<br />

sananalytics.com/lab/twitter-sentiment/, retrieved April 2012.<br />

[12] Bing Liu. "Sentiment Analysis: A Multifaceted<br />

Problem." IEEE Intelligent Systems, 25(3), pp. 76-80, 2010.<br />

[13] Maguitman, A., Leake, D., Reichherzer, T., Menczer,<br />

F. Dynamic Extraction of Topic Descriptors and<br />

Discriminators: Towards Automatic Context-Based Topic<br />

Search. Proceedings of the 13 th CIKM Conf.. ACM Press.<br />

Washington, DC, USA, November 2004<br />

[14] García, A., Simari, G. Defeasible Logic Programming: An<br />

Argumentative Approach. Theory and Practice of Logic<br />

Programming 4(1-2): 95-138, 2004.<br />

[15] Chesñevar, C., Maguitman, A, Simari, G. Recommender<br />

Systems based on Argumentation, in "Emerging Artificial<br />

Intelligence Applications in Computer Engineering".<br />

Maglogiannis et al (eds). Frontiers in Artificial Intelligence<br />

and Applications, Vol. 160, pp. 53-70.. IOS Press, 2007.


[16] Galitsky, B., McKenna, E. Sentiment Extraction from<br />

Consumer Reviews for Providing Product Recommendations.<br />

US Patent Application US 2009/0282019 A1<br />

170


Preparing for Digital Curation Governance: Educating<br />

Stewards of Public Information<br />

ABSTRACT<br />

We report results of research into curriculum development for<br />

dual degree programs and the development of a dual degree<br />

curriculum jointly undertaken by the University of North<br />

Carolina’s School of Information and Library Science (SILS) and<br />

School of Government (SOG). This IMLS-funded program<br />

provides training in public information stewardship to four<br />

cohorts of eighteen masters’ level students. The curriculum<br />

development rests upon previous curriculum development<br />

projects, examination of masters’ programs throughout the world,<br />

semi-structured interviews of public sector information experts,<br />

recommendations from an expert Advisory Board, and focus<br />

group responses from current and alumni project Fellows.<br />

Categories and Subject Descriptors<br />

J.1 [Computer Applications]: Administrative Data Processing –<br />

Government<br />

General Terms<br />

Professional Development, Digital Curation, Electronic<br />

Governance<br />

Keywords<br />

Continuing Education, Digital Information, Public Sector,<br />

Government<br />

1. INTRODUCTION<br />

Curation of digital assets from all sectors of society provides<br />

fundamentally new challenges and opportunities. Nowhere is the<br />

need for stewardship of digital content greater than with<br />

government information. Government activities and services are<br />

now predominately performed using computer systems, and many<br />

interactions with government are now performed over the<br />

Internet. According to a recent study, 82% of internet users (61%<br />

of all American adults) “looked for information or completed a<br />

transaction on a government website” in the past year [7]. There<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Christopher A. Lee and Helen R. Tibbo<br />

School of Information and Library Science<br />

University of North Carolina<br />

216 Lenoir Drive, CB #3360<br />

1-(919)-962-7024<br />

callee, tibbo@email.unc.edu<br />

171<br />

has been a dramatic push in many countries toward open access to<br />

government data, which will only be successful if appropriate data<br />

are retained and long-standing issues of data fragmentation can be<br />

addressed [6].<br />

The public administration literature uses the term “governance”<br />

for the exercise of authority and control, in order to advance goals<br />

of the state. In contrast to “government,” which suggests<br />

established structures, governance is a continually evolving and<br />

interactive set of processes. The governance concept has spawned<br />

many associated terms within both the public and private sectors,<br />

including corporate governance, information technology<br />

governance, and data governance. Effective governance requires<br />

an understanding of stakeholder needs, existing policies, social<br />

norms, individual behaviors, incentive structures and<br />

characteristics of potential implementation mechanisms.<br />

“Digital curation governance” is an increasingly important arena<br />

of activity with associated requirements for professional education<br />

and engagement: ensuring the quality, integrity, discovery, access,<br />

and meaningful use of digital collections over time. Digital<br />

curation governance is a shared responsibility that requires<br />

extensive communication, collaboration and mutual learning.<br />

Those advancing the cause of digital curation governance must<br />

have skills and competencies to navigate the policy arena, manage<br />

projects, mobilize stakeholders and dig into the bits of digital<br />

collections.<br />

Many schools of information and library science have established<br />

curricula to prepare professionals to establish and administer new<br />

arrangements between information, technology and people. As<br />

these professionals move into higher levels of responsibility and<br />

authority, they engage not only in management but also in<br />

governance, which includes “specifying the decision rights and<br />

accountability framework to encourage desirable behavior in the<br />

use” of information and technology [14].<br />

A common theme in the literatures on governance and digital<br />

curation has been the shared and distributed nature of the<br />

activities. Governance can be driven and shaped by many nongovernment<br />

actors, facilitated by changes in the geopolitical<br />

landscape [10] and information technologies [9]. Successful longterm<br />

stewardship of public information depends upon<br />

contributions and actions of individuals from various sectors.<br />

This will require “effective governance mechanisms…to<br />

aggregate the collective interest into an effective preservation<br />

strategy that ensures that the effort and cost of preservation are<br />

appropriately apportioned” [3]. Innovative and timely professional<br />

education will need to support new forms and features of<br />

governance.


2. NEW NEEDS AND EXPECTATIONS<br />

Navigating the current environment increasingly requires the<br />

development and implementation of clear policies for data<br />

curation. The National Association of State Chief Information<br />

Officers (NASCIO) includes among its top state CIO priorities for<br />

2011: document/content/records/e-mail management; data and<br />

information management; data ownership in cloud computing;<br />

and data governance [11]. Supporting, documenting and<br />

evaluating government activities requires responsible stewardship<br />

of public digital information, which will involves coordinated<br />

efforts by a diversity of players. Professional education for<br />

stewards of public information is most effective if it can<br />

incorporate fundamental elements of both library and information<br />

science (LIS) and public administration curricula.<br />

Many records services and archives have developed and<br />

advocated standards, policies and guidelines for public officials.<br />

The most common examples are email policies, metadata<br />

standards and recordkeeping system functional requirements.<br />

While these documents are valuable, they have often not been<br />

implemented widely and rarely carry enforcement mechanisms.<br />

Records professionals often have not integrated the documents<br />

into the larger arenas of policy and public administration in which<br />

they operate.<br />

Based on early experiences with electronic records, two<br />

prominent themes in the literature are that records professionals<br />

must collaborate with and draw expertise from other professionals<br />

[8][12], and records professions must influence practices within<br />

the public sector, rather than focusing solely on the management<br />

of records already transferred to archival repositories [2].<br />

As public digital information was becoming ubiquitous, there was<br />

significant parallel growth in “strength and individualization in<br />

graduate level archival education programs, a dramatic increase in<br />

full-time, tenure-track faculty, a growing number of course<br />

offerings often eclipsing the LIS offerings in an archival student’s<br />

course of study, and the nascent development of degrees<br />

acknowledging the archives and records field” [5]. Within the<br />

United States, “new archivists and career changers (from another<br />

career into archives) increasingly view the master’s degree as a<br />

necessary requirement” with a master of library and information<br />

science (MLIS) or an equivalent being “the degree of choice” [1].<br />

Unfortunately, these developments have not yet translated into<br />

widespread education on electronic records [1], nor have most<br />

records professionals had any formal education in issues of policy<br />

development, implementation or analysis. We believe it is<br />

important to develop clear tracks of graduate study that (1) attract<br />

students who already have an interest in government service, (2)<br />

bring government service opportunities to the attention of those<br />

already pursuing ARM careers, and (3) be built in programs that<br />

have a robust technology infrastructure.<br />

3. EDUCATING STEWARDS OF PUBLIC<br />

INFORMATION<br />

In 2009, the School of Information and Library Science (SILS)<br />

and School of Government (SOG) at the University of North<br />

Carolina, Chapel Hill (UNC-CH) began a project called Educating<br />

Stewards of Public Information in the Twenty-First Century<br />

(ESOPI-21), funded by the Institute of Museum and Library<br />

Services (IMLS). The project has redesigned and enhanced a dual<br />

degree program that was earlier developed by SILS and the SOG.<br />

172<br />

Students in the program earn dual MSIS/MPA or MSLS/MPA<br />

degrees, in order to prepare for careers in stewardship of digital<br />

information in the public sector. In 2011, IMLS funded a second<br />

project called Educating Stewards of the Public Information<br />

Infrastructure (ESOPI 2 ).<br />

The ESOPI projects have developed educational and professional<br />

engagement opportunities. They fund two cohorts of eighteen<br />

graduate-level Fellows, who are pursuing dual degrees at SILS<br />

and SOG. The projects build on the work of two other IMLSfunded<br />

projects: the DigCCurr I & II (Digital Curation<br />

Curriculum) projects.<br />

4. DUAL-DEGREE CURRICULUM<br />

The MSIS/MSLS and MPA dual degree program at UNC-CH is<br />

offered jointly by SILS and the SOG. It integrates policy<br />

development, issues of legal compliance, and knowledge of<br />

government structures and information with principles, values,<br />

methods and technologies of the information professions.<br />

4.1 Master of Information/Library Science<br />

The School of Information and Library Science (SILS) at UNC-<br />

CH offers two masters degrees: Master of Science in Information<br />

Science (MSIS) and Master of Science in Library Science<br />

(MSLS). Each degree requires 48 semester hours, which students<br />

usually complete in four semesters (two academic years) of fulltime<br />

study. This includes 24 semester hours of required core<br />

courses and 24 semester hours of elective courses. Students must<br />

also complete a comprehensive exam and a master’s paper.<br />

The MSLS and MSIS core courses address five functional areas:<br />

organization, collection and retrieval, information-related<br />

behavior, design and evaluation, and management. The majority<br />

of the required courses are the same for both degrees. The<br />

differences are: MSLS students complete courses on Information<br />

Resources and Services (INLS 501) and Resource Selection and<br />

Evaluation (INLS 513), while MSIS students complete a course<br />

on Information Retrieval (INLS 509); and MSIS students take a<br />

class on Systems Analysis (INLS 582), which is not required for<br />

MSLS students.<br />

4.2 Master of Public Administration<br />

The Master of Public Administration degree at the SOG is also<br />

designed to be completed in two years of full-time study.<br />

Students must complete at least 44 semester hours of course work.<br />

Core courses address: Public Administration Institutions and<br />

Values, Organization Theory, Public Service Leadership, Public<br />

Administration Analysis and Evaluation, Professional<br />

Communications, Human Resource Management, Public<br />

Financial Management, and Law for Public Administration.<br />

MPA students must also complete of a summer-long management<br />

internship in a position with meaningful administrative<br />

responsibilities, and a portfolio during the final semester of study.<br />

One component of the portfolio is a comprehensive oral exam.<br />

4.3 MPA and MSIS/MSLS Dual Degree<br />

The UNC-CH MPA/MSIS and MPA/MSLS dual degree program<br />

is designed to prepare students to deal with information issues in a<br />

variety of public sector settings. This dual degree opportunity is<br />

designed as a three-year, full-time program, requiring at least 71


semester hours. Nine of the forty-four (44) semester hours<br />

required for the MPA may be counted from the SILS curriculum,<br />

and twelve of the forty-eight (48) semester hours required for the<br />

SILS degree may be counted from the MPA curriculum.<br />

5. PRACTICAL ENGAGEMENT<br />

COMPONENT<br />

Project Fellows engage in coursework and simultaneously work<br />

for 15 hours per week (or 360 hours over the summer) at one of<br />

the projects’ participating partner institutions: the National<br />

Archives and Records Administration, University Archives at<br />

UNC-CH, North Carolina Department of Cultural Resources,<br />

Town of Chapel Hill, NC Orange County’s CIO’s Office, NC-<br />

LIVE, the H. W. Odum Institute of Research in Social Science,<br />

and UNC-CH Environmental Finance Center. The ESOPI projects<br />

have provided fellowships to eighteen students 2009-2014.<br />

Tasks performed by the fellows have included the creation of<br />

various policies and policy-related guidance documents (on social<br />

media, email, and text messaging), authoring an article on<br />

eDiscovery software capabilities, revising and developing new<br />

online training modules, and advising government energy<br />

efficiency and water quality programs on possible financing<br />

options and institutional arrangements.<br />

6. RESEARCH METHODS<br />

ESOPI research has included investigation of functions and<br />

activities reflected in current research literature; professional<br />

association guidance on key curricular needs; and current<br />

offerings of graduate programs in public policy, information<br />

science, and archives and records management.<br />

The project has engaged in various research approaches, including<br />

a comprehensive literature and website review of information and<br />

library science and public administration masters-level programs,<br />

a series of interviews with Advisory Board Members, a series of<br />

interviews with public sector information experts, and a focus<br />

group study of current and alumni Fellows from the project.<br />

In 2010, we conducted two sets of semi-structured phone<br />

interviews with experts in public administration and public<br />

information management. The first eight interviews were with<br />

members of the ESOPI advisory board. These were followed by<br />

interviews with ten public-sector professionals who had presented<br />

their work at the 2010 Best Practices Exchange.<br />

In 2011, we conducted a focus group with four ESOPI fellows in<br />

their final semester of the dual degree program. The discussion<br />

revealed many program strengths, challenges and opportunities<br />

for improvement.<br />

7. FINDINGS<br />

Findings can be characterized in terms of factors related to<br />

“stewardship of public information,” desired knowledge and<br />

competencies, current professional challenges, and SILS/SOG<br />

dual degree integration.<br />

7.1 Interviews<br />

When asked to explain what is meant by “stewardship of public<br />

information,” participants in our studies have provided a variety<br />

of answers, often emphasizing characteristics of stewardship that<br />

173<br />

are particularly relevant to their own jobs or disciplines.<br />

However, there were four main themes that emerged from the<br />

interview data about this issue. First, many interview participants<br />

discussed the importance of being able to understand and apply<br />

the definition of public record, whatever that might be within<br />

one’s particular jurisdiction. A second theme was balancing<br />

privacy or confidentiality on the one hand with public access on<br />

the other. A third theme was that of needing to understand the<br />

value of public information (what makes certain forms of<br />

information valuable and how to convey that importance to<br />

relevant stakeholders). Finally, interview responses suggested the<br />

need to differentiate the role of custodian as opposed to owner<br />

which may overlap but often reside in different individuals or<br />

organizations).<br />

Many of the interview questions related to desired knowledge and<br />

competencies. Participants identified many different responses,<br />

which we have grouped into three broad categories: contextual<br />

background knowledge; technical and operational skills; and<br />

social skills and approach to work (see Table 1).<br />

Table 1 - Desired Knowledge and Competencies<br />

• Contextual background knowledge - how government works,<br />

legal frameworks, accountability mechanisms, third party<br />

agreements and contracts, comprises in information<br />

lifecycle, balance between privacy and accessibility,<br />

planning and evaluation processes, project management and<br />

requirements definition and design, recordkeeping<br />

requirements, patterns of information use, environmental and<br />

budgetary drivers of workplace evolution<br />

• Technical and operational skills - integrating technological<br />

knowledge with understanding of government functions and<br />

processes; allocating storage and space; identifying and<br />

recommending access methods, preservation techniques and<br />

system designs; data quality and data management, metadata<br />

and access provision via interface design; identifying and<br />

explaining which information does or does not have longterm<br />

value; data and workflow modeling<br />

• Social skills and approach to work - verbal and written<br />

communication skills; teamwork skills; “thinking on one’s<br />

feet”; appreciating importance of speaking carefully and<br />

thoughtfully in the public sector; commitment to open<br />

government and public accountability; focus on creating<br />

efficiency and economy in processes; thinking at the<br />

enterprise level to act as change agents; capabilities to gain<br />

sponsorship, build coalitions, and get support by engaging in<br />

stakeholder identification and team building; ability to<br />

“manage people when you are not their boss”; curiosity and<br />

willingness to engage in ongoing education<br />

We also asked interview participants about current professional<br />

challenges. Responses fell into the following categories: limited<br />

funding for infrastructure (including storage); insufficient IT skills<br />

of responsible staff; outreach to stakeholders and making business<br />

case for investment in information stewardship; characteristics of<br />

data creation (large volume, highly distributed, often unstructured,<br />

inconsistent metadata conventions and quality); underdeveloped<br />

user interfaces and access mechanisms; and defining new job<br />

roles and categories.<br />

Members of the ESOPI Advisory Board have also provided<br />

substantial input on how to approach the dual degree, what


practical work experience contexts to pursue, and how to set the<br />

future direction of the dual degree.<br />

7.2 Focus Group and Dual Degree Findings<br />

Our research has revealed numerous benefits and<br />

complementarities of completing both degrees. Interview<br />

participants and graduating ESOPI fellows have identified a<br />

variety of advantages, including complementary knowledge, skills<br />

and perspectives, as well as a wider range of employment<br />

opportunities.<br />

We have also learned about cultural differences between the SOG<br />

and SILS. The SOG has a more regimented curriculum and<br />

smaller number of students, resulting in a more tight-knit cohort<br />

of students. The SOG also places heavy emphasis on preparing<br />

students to behave as public officials, with associated expectations<br />

for personal presentation and interaction. By contrast, SILS has a<br />

more individually-crafted curriculum and a larger set of students,<br />

resulting in less of a cohesive cohort. SILS courses often place<br />

great emphasis on scholarly knowledge and recent research<br />

literature.<br />

Feedback from ESOPI Fellows has revealed that the majority of<br />

content from the MSIS/MSLS and SOG degrees is<br />

complementary, rather than being repetitive. The dual degree has<br />

been designed to allow students to replace similar courses from<br />

one program to the other, e.g. the SOG course on Public Service<br />

Leadership (PUBA 711) can substitute for the SILS course on<br />

Management for Information Professionals (INLS 585). Courses<br />

in the two programs related to research methods, analysis and<br />

evaluation do have similarity in scope, but they address the topics<br />

quite differently given the nature of the two programs. SILS is<br />

considering changes to its research methods course sequence, and<br />

we may need to revisit this area of the dual degree.<br />

8. CONCLUSIONS AND IMPLICATIONS<br />

Stewardship of public information is a fundamental responsibility<br />

of a democratic society. Providing appropriate access to public<br />

information promotes accountability, rights of citizens, effective<br />

administration of policy, and social memory. Public officials and<br />

public servants must increasingly make and enact decisions<br />

related to information systems; this requires an understanding of<br />

ways in which people, information and technology can best<br />

complement each other. Information professionals are also<br />

increasingly required to engage in policy discussions and<br />

processes; this requires an understanding of the history, principles,<br />

processes and methods of public administration.<br />

Fundamental to ensuring successful e-governance is appropriate<br />

stewardship of the information that supports, documents and<br />

advances governance processes. This work includes its own flavor<br />

of governance, which we have called digital curation governance.<br />

Enabling it will require professionals with a range of skills and<br />

capabilities that may not have previously been considered part of<br />

public administration or the work of information professionals.<br />

We see great potential for advancing professional capabilities<br />

required at the frontier of public information stewardship.<br />

9. ACKNOWLEDGMENTS<br />

Research associated with this work has been supported by the<br />

Institute for Museum and Library Services (Grant Awards # RE-<br />

05-09-0085-09 and # RE-05-11-0076). We would like to<br />

174<br />

acknowledge numerous contributions of Lori Richards to the two<br />

ESOPI projects and to various products reported in this paper.<br />

10. REFERENCES<br />

[1] Bastian, J. and Yakel, E. 'Are We There Yet?'<br />

Professionalism and the Development of an Archival Core<br />

Curriculum in the United States. Journal of Education for<br />

Library and Information Science, 46, 2 (2005), 95-114.<br />

[2] Bearman, D. and Hedstrom, M. Reinventing Archives for<br />

Electronic Records: Alternative Service Delivery Options. In<br />

Electronic Records Management Program Strategies.<br />

Archives and Museum Informatics, Pittsburgh, PA, 1993, 82-<br />

98.<br />

[3] Blue Ribbon Task Force on Sustainable Digital Preservation<br />

and Access. Sustainable Economics for a Digital Planet:<br />

Ensuring Long-Term Access to Digital Information. 2010.<br />

[4] Conference of Directors of National Libraries. Resolution on<br />

the Preservation of the Digital Heritage - Adopted by the<br />

General Conference of UNESCO at the 31st session. United<br />

Nations Educational, Scientific and Cultural Organization,<br />

Paris, 2001).<br />

[5] Cox, R. J., Yakel, E., Bastian, J. A., Wallace, D. and<br />

Marshall, J. Archival Education at the Millennium: The<br />

Status of Archival Education in North American Library and<br />

Information Science Schools. Library Quarterly, 71, 2<br />

(2001), 141-194.<br />

[6] Doyle, C. D. Federal Electronic Information in the United<br />

States. In Encyclopedia of Library and Information Sciences.<br />

CRC Press, Boca Raton, FL, 2010, 1823-1833.<br />

[7] Government Online. Pew Research Center, Washington, DC,<br />

2010.<br />

[8] Hedstrom, M. Building Record-Keeping Systems: Archivists<br />

are Not Alone on the Wild Frontier. Archivaria, 44 (Fall<br />

1997), 44-71.<br />

[9] Marche, S. and McNiven, J.D. E-Government and E-<br />

Governance: The Future Isn’t What It Used To Be. Canadian<br />

Journal of Administrative Sciences, 20, 1 (March 2003), 74-<br />

86.<br />

[10] Rosenau, J.N. and Czenpiel, ed. Governance without<br />

Government: Order and Change in World Politics.<br />

Cambridge University Press, Cambridge, 1992.<br />

[11] State CIO Priorities for 2011. National Association of State<br />

Chief Information Officers, October 19, 2010.<br />

[12] Walch, V.I. Maintaining State Records in an Era of Change:<br />

A National Challenge. Council of State Historical Records<br />

Coordinators, 1996.<br />

[13] Wallace, D. A. Survey of Archives and Records Management<br />

Graduate Students at Ten Universities in the United States<br />

and Canada. American Archivist, 63, 2 (Fall 2000), 284-300.<br />

[14] Weill, P. and Ross, J.W. IT Governance: How Top<br />

Performers Manage IT Decision Rights for Superior Results.<br />

Harvard Business School Press, Boston, MA, 2004.


REGNET: Regulatory Information Management,<br />

Compliance and Analysis<br />

ABSTRACT<br />

This paper describes a research effort that aims to develop<br />

information infrastructure and tools to facilitate access,<br />

compliance and analysis of government regulations. It is well<br />

recognized that the complexity, diversity, and volume of<br />

government regulations are detrimental to business and hinder<br />

public understanding of government. The burden of complying<br />

with regulations can fall disproportionately on small businesses<br />

since these businesses may not have the expertise or resources to<br />

keep track of the regulations and the requirements. The situation<br />

can potentially be improved by developing appropriate tools that<br />

can help facilitate the regulatory and compliance process. To<br />

illustrate, this paper discusses the applications of information<br />

technology for selected services related to regulations, such as<br />

compliance assistance, comparison of regulation from diverse<br />

sources, and e-rulemaking.<br />

Categories and Subject Descriptors<br />

H.3.3 [Information Storage and Retrieval]: Information Search<br />

and Retrieval – retrieval models, I.2.1 [Artificial Intelligence]:<br />

Applications and Expert Systems – law.<br />

General Terms<br />

Algorithms, Management, Legal Aspects.<br />

Keywords<br />

regulations; compliance assistance; relatedness analysis; erulemaking;<br />

information retrieval; e-government.<br />

1. INTRODUCTION<br />

This paper provides an overview of the REGNET research project<br />

at Stanford University, which aims to gain insights on information<br />

infrastructure and tools that can facilitate access, compliance,<br />

analysis and use of government regulations. Regulations, in<br />

general, provide many social benefits, such as protecting our<br />

environment and improving public safety and accessibility.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Kincho H. Law and Gloria Lau<br />

Engineering Informatics Group<br />

Department of Civil and Environmental Engineering<br />

Stanford University<br />

Stanford, CA, 95014, USA<br />

law@stanford.edu; glau@stanford.edu<br />

175<br />

However, the complexity, diversity, and volume of Federal and<br />

State regulations are detrimental to business and also hinder<br />

public understanding of government. As new issues arise, new<br />

regulations are promulgated; old regulations, however, are rarely<br />

removed. Regulations emanating from different agencies often<br />

overlap; because settings and objectives differ, they may be<br />

inconsistent. The scope of concern and the terminology used to<br />

express those concerns often differs among agencies. The<br />

distributed responsibilities also increase the complexity in dealing<br />

with regulations. Advances in information technology can<br />

potentially improve the situation by developing appropriate tools<br />

that can help facilitate the regulatory process, from rulemaking to<br />

compliance assistance.<br />

“Deciphering and complying with federal regulations is a legal<br />

and paperwork nightmare for many businesses. To keep pace,<br />

some hire consultants--sort of regulatory accountants--to keep<br />

track of the applicable health, safety, environmental and equalopportunity<br />

rules [1].” Regulations can be particularly<br />

burdensome on small businesses since they often do not have the<br />

resources to keep track of and to deal with these complicated<br />

regulations and the compliance procedures. This burden has been<br />

recognized and targeted by legislation through the Regulatory<br />

Flexibility Act (RFA), which was amended by Small Business<br />

Regulatory Enforcement Fairness Act (SBREFA). Agencies<br />

have a commitment to take into account the burden that<br />

regulations can place on small businesses. SBREFA requires that<br />

agencies to establish procedures, policies and guides to promote<br />

compliance with RFA. Agencies published, in accordance to<br />

SBREFA, Small Entity Compliance Guides that are written in<br />

plain language and elucidate the rights of small entities in<br />

enforcement actions (e.g. reducing civil penalties for violations).<br />

Furthermore, agencies, such as EPA, must provide Congress and<br />

the General Accounting Office with copies of all final rules and<br />

supporting analyses [2]. The act clearly recognizes the<br />

information problem facing business, particularly small<br />

businesses, in compliance with regulations. The Small Business<br />

Administration (SBA) (with participation from various federal<br />

agencies, including EPA, FDA, OSHA, etc.) launched an<br />

initiative to build a “one-stop” portal to assist small businesses to<br />

comply with regulations [3]. In recent years, governmental<br />

portals (such as the FirstGov.gov and USA.gov) have emerged to<br />

provide public to gain access to US government information and<br />

services on the web. Government regulations are available online<br />

(for examples, see www.gpoaccess.gov/cfr/ and<br />

www.regulations.gov). Most of the online portals are designed<br />

primarily for displaying the regulatory information and often<br />

usable only by experienced users, who are familiar with the


subject and the portal. Some primitive searching capabilities may<br />

be provided; however, it remains difficult to locate crossreferenced<br />

information and to link the regulatory information with<br />

useful applications. Utilization of advanced information<br />

technologies and development of new and innovative high quality<br />

tools are crucial to move the regulatory information available and<br />

useful to the public.<br />

This paper describes a research effort investigating useful<br />

information services related to regulatory information. The paper<br />

is organized as follows: First, a brief literature review on<br />

applications of IT in laws and regulations is provided in the next<br />

section. Example applications are then presented to illustrate<br />

some of the research issues investigated in the REGNET project.<br />

The paper is concluded with a brief summary and discussion on<br />

current research.<br />

2. LITERATURE REVIEW<br />

Research on information science and technology applicable to<br />

regulations and laws has been active research area for decades.<br />

There has been a great deal of work done on building expert<br />

systems for law [4,5]. T. Bench-Capon provided a review on the<br />

applications of knowledge-based systems for legal applications,<br />

particularly the research and development efforts related to the<br />

Alvey DHSS Demonstrator project in U.K. [6]. The reference<br />

includes several hundreds of citations that appeared before 1990<br />

which are related to logic and rule based approaches and their<br />

application in legal systems. Erdelez and O’Hare also provided<br />

an overview of the research and status of legal informatics in the<br />

1990s [7]. Applications of case-based reasoning and information<br />

retrieval techniques have been proposed [5,8]. Current state on<br />

information technology and laws can also be found in a recent<br />

book edited by Lodder and Oskamp [9]. While legal knowledge<br />

representation and reasoning has been an active research topic, an<br />

integrated approach covering the management of regulations,<br />

efficient access and retrieval of regulatory and related documents<br />

and tools for compliance assistance is missing.<br />

Policies and public interests concerning how IT can be<br />

appropriately and effectively applied to regulation management,<br />

rulemaking and compliance assistance have been actively<br />

discussed in workshops and public forums [10-12]. It has been<br />

recognized that information technologies, including information<br />

retrieval, text mining, knowledge representation, logic reasoning,<br />

natural language processing and many other areas, can find<br />

applications in legal informatics and further enhance the<br />

development of regulatory information systems. Issues such as<br />

what types of support are needed to go from the textual<br />

information of the regulations to the formal models that can<br />

support computations, to integrate and link diverse source of<br />

related documents to regulations, and to provide means to analyze<br />

and compare regulatory data, are fundamentally important to an<br />

effective regulatory information system. Practical applications<br />

require that the computer be able to interpret the situation or<br />

circumstances, scenarios and exceptional cases. Solutions that do<br />

emerge must support the treatment of multiple, heterogeneous<br />

regulations and related documents from diverse sources. Modeling<br />

regulations requires not only the understanding of individual<br />

content within a regulation provision, but also the relationships<br />

among and within provisions as well as mechanisms for linking<br />

applications, supplemental documents and related information<br />

with the regulations. Research in this field must proceed in two<br />

176<br />

parallel tracks: (1) representing the regulations so that they can be<br />

accessed according to the needs of the users and the regulatory<br />

agencies, and (2) structuring the regulations so that they can be<br />

assessed automatically to support applications, such as<br />

compliance assistance, business processes and others. The<br />

research of REGNET investigates information service<br />

infrastructure that takes textual repositories as a base and develop<br />

methodologies and tools to locate, merge, compare, and analyze<br />

the information. This paper describes selected examples to<br />

illustrate some of the research issues investigated in the REGNET<br />

project.<br />

3. A REGULATION-CENTRIC<br />

COMPLIANCE ASSISTANCE<br />

FRAMEWORK<br />

There has been a push for government agencies to put more<br />

emphasis on compliance assistance in lieu of enforcement to<br />

encourage companies to comply with regulations [13]. Towards<br />

this end, specialized programs, using expert system technologies<br />

for example, have been built to assist users in understanding<br />

regulations and fulfilling the requirements [14]. Among the<br />

limitations of many compliance assistance systems is that the<br />

tools do not directly map or link to the source documents that they<br />

represent. Our research adopts a regulation-centric approach to<br />

structuring a compliance assistance system around the regulation<br />

itself [15,16]. The rules together with the metadata about the<br />

regulations are directly embedded within the provisions they<br />

represent. This framework allows clear linkages to the regulation<br />

text. Because all encoded regulation rules are tied to particular<br />

regulation provisions, it is straightforward to map the compliance<br />

process to the provisions. The following briefly describes the<br />

structure of the document repository for the regulations and the<br />

regulation assistance system.<br />

3.1 A. Document Repository<br />

The scope of our research and the document repository<br />

demonstrative development cover Title 40 of the US Code of<br />

Federal Regulations (40 CFR): Protection of the Environment<br />

[17]. Besides the regulations themselves, the repository also<br />

includes supplementary and supportive documents that are<br />

important for the accurate interpretation of the federal<br />

regulation(s) to which they refer [18]. 1 For the research<br />

prototype, supplemental documents dealing with used oil, which<br />

include the preamble to the regulation text found in 40 CFR 261<br />

and 279, administrative decisions, guidance documents, federal<br />

cases, letters from the general counsel and letters of interpretation<br />

from the issuing agency. The document repository is designed not<br />

1 Supplementary and supportive documents are important part of<br />

regulatory information and are commonly considered in<br />

judiciary decisions. To illustrate, for the case “Beazer East, Inc.<br />

v. U.S. EPA, Region III” (963 F.2d 603, 3 rd Cir. 1992), Beazer<br />

East, Inc., argued that the aeration basins were “tanks”, not<br />

“surface impoundments”, and were therefore not subject to<br />

RCRA’s groundwater-monitoring regulations. The court ruled<br />

in favor of EPA by considering the so called “Weddle<br />

memorandum”, which was issued to clarify the definitions of a<br />

“tank” and a “surface impoundment,” as an interpretive rule,<br />

which can be exempted from the notice and comment<br />

requirements of the Administrative Procedures Act.


Search Terms/ Concepts<br />

References<br />

Definitions<br />

only to facilitate displaying the provisions but also to support<br />

compliance assistance by making these important documents<br />

more accessible.<br />

A document-centric repository is designed to structure and to<br />

organize the regulation texts and metadata. Mirroring the<br />

standard structure of regulations, the XML-based framework<br />

includes tags for each level of regulation text – for example part,<br />

subpart, section or subsection. A parsing system using basic<br />

pattern matching according to the regulation structures is built to<br />

transform the regulations from Portable Document Format (PDF)<br />

or HTML into the XML-based document framework. In addition<br />

to the regulation texts, the XML-based structure is augmented<br />

with regulation-specific metadata, including concept tags,<br />

reference tags and definition tags (see Figure 1).<br />

o With existing text mining and information retrieval tools,<br />

concepts can be generated automatically or semiautomatically<br />

from the regulation texts. The concept tags<br />

are introduced so that links to related supporting documents<br />

in the document repository can be dynamically generated.<br />

This is useful because supporting documents and regulations<br />

may not directly reference each other even when they<br />

address the same topic. The automatic application of concept<br />

tags to the XML framework means that as new supporting<br />

documents are added to the document repository, regulations<br />

stored in the framework can automatically be linked to them<br />

via the terms that they share.<br />

o Regulation provisions tend to include casual references to<br />

other provisions. Simple references (for example, “as stated<br />

in 40 CFR section 262.14(a)(2)”) and complex references<br />

(for example, “the requirements in subparts G through I of<br />

this part” as in part 265) exist. Manually translating such<br />

references would be time consuming. A parsing system was<br />

developed using a context-free grammar and a semantic<br />

representation/interpretation system that is capable of tagging<br />

regulation provisions with the list of references they contain.<br />

The references serve not only for retrieval of related<br />

provisions, but also provide a list of provisions that may<br />

require consideration during the compliance checking<br />

process.<br />

o Regulation contain many domain-specific terms and<br />

acronyms that can make regulation text difficult for novices<br />

Search by Concept Category<br />

Letter of of Interpretation<br />

(a) Definition, definition and concept tags (b) Retrieving supporting document using concepts<br />

Figure 1: Metadata defined for regulations<br />

177<br />

to understand. Adding the definition tags would allow a<br />

regulation viewing system to incorporate explicit definitions<br />

of terms and acronyms into its user interface (for example,<br />

by mousing over the term). Definitions can be extracted<br />

from the regulations (and other sources) and automatically<br />

attached to the terms identified by a parser.<br />

3.2 Compliance Assistance<br />

Our research of a compliance assistance infrastructure builds upon<br />

the XML regulation framework and takes advantage of the<br />

regulation metadata described earlier. Besides the concept,<br />

reference and definition tags, logic and control processing<br />

metadata are added into the XML regulation framework. The<br />

logic metadata represents a rule or concept from a regulation. First<br />

Order Predicate logic sentences are used to represent the rules that<br />

must be followed for an entity to be in compliance with the<br />

regulations. Control processing metadata provides information<br />

about what provisions need to be checked for compliance.<br />

Metadata are also introduced to manage the interaction between<br />

the user and the system. Each logic or control processing<br />

metadata is associated with a specific regulation provision and is<br />

manually tagged with logic and control process metadata.<br />

The compliance assistance system controls the process by taking<br />

advantage of the metadata information. First, the system parses<br />

the XML-structured regulation to extract the information<br />

necessary to run a compliance check. Only those logic rules and<br />

control processing metadata (based on the information from the<br />

reference tags) are acquired and dynamically loaded into the<br />

reasoning system. Logic reasoning tools, such as a theorem<br />

prover, can then be used to perform the logic checks [19].<br />

One essential feature of the web-based compliance assistance<br />

system is that it helps guide the user through the regulations.<br />

Utilizing the metadata tagged with the regulations, the system can<br />

link to any referenced regulation provisions and display terms and<br />

definitions. Key conceptual phrases for the provision are<br />

displayed and linked, enabling instant access to repository<br />

documents related to the provision. When the system completes<br />

the check against the regulation provisions or detects a conflict<br />

between the user’s answers and the regulation, it displays a<br />

summary of the question-and-answer history as well as the results<br />

of the compliance check.


One can easily build a compliance system for specific application<br />

utilizing the regulation compliance assistance system and the<br />

repository as a back end. To illustrate, Figure 2 shows linking the<br />

provisions from the used oil regulations of the New York state to<br />

the federal regulations implemented in the prototype. The online<br />

guide is built for vehicle maintenance shops to check compliance<br />

with the used oil based on paper-based 2002 guide developed by<br />

the New York State department of Environmental Conservation<br />

Prevention Unit [20]. As noted in Figure 2(b), the provision<br />

references 40 CFR 279.23, which can be used as a link to the<br />

regulation assistance system, as shown in Figure 2(c). Figure<br />

2(d) shows the compliance result which shows the questions,<br />

answers and the related provisions that contributed to the logical<br />

conclusion.<br />

There are many challenges in developing a compliance assistance<br />

system. The regulation-centric approach where the document<br />

repository includes not only the regulation documents but also the<br />

supplemental document as well as rules and computational logic<br />

embedded within the provisions can offer many advantages.<br />

First, because users can see the regulation text as they interact<br />

with the system, users may have better understanding of the<br />

results produced by the system. Second, since users can see the<br />

regulations during compliance process they may be able to learn<br />

how the regulation works, and re-tracing the results easier for<br />

validation purposes. Third, with supplementary documents<br />

linking with the regulation, users can not only track how the<br />

system is proceeding with its analysis, but also enquire<br />

background information on the intents and issues of the<br />

regulations, and directly address the questions that the regulation<br />

is intended. Fourth, updating the system as the regulation changes<br />

would become easier, since with the mapping between the<br />

regulation and the rules in the system, what parts of the system<br />

need to be changed become more obvious when the regulation is<br />

altered. Last but not least, even though regulations are often<br />

ambiguous, contain many exceptions, and are not written in the<br />

(a) Vehicle maintenance shop compliance guide (b) Compliance guide for used oil<br />

(c) Compliance guides linking to RAS (d) Results displaying questions, answers and provision<br />

Figure 2: A regulation assistance system<br />

178<br />

form that is computationally sound, the regulation texts are often<br />

well structured and organized. By implementing the compliance<br />

assistance system according to the regulation structure can greatly<br />

facilitate modular development of a compliance assistance system.


4. COMPARATIVE STUDIES OF<br />

REGULATORY INFORMATION<br />

Government regulations should ideally be understandable and<br />

retrievable with ease by practitioners as well as the general public.<br />

Requirements for a given situation could be different from<br />

different regulations. Multiple sources of regulations, for<br />

instance, from the Federal, State and local governments, amend,<br />

complement and potentially conflict with one another.<br />

Regulations from different agencies on similar and related issues<br />

could differ and inconsistent with their intents. There are many<br />

reference guides that are published independent of governing<br />

bodies, attempting to help the public to better understand and<br />

comply with the regulations. The regulations, amending<br />

provisions and interpretive manuals together create a massive<br />

volume of documents with potentially similar content but possible<br />

differences in format, terminology and context. An information<br />

infrastructure that can consolidate, compare and contrast different<br />

regulatory documents will greatly enhance and aid the<br />

understanding of regulations.<br />

Retrieving and interpreting particular US government regulations<br />

have become easier with the establishment of government portals<br />

to enhance transparency to the public. For example, business.gov<br />

(or sba.gov) is a centralized portal that contains information to<br />

guide business owners and entrepreneurs through government<br />

rules and regulations and to identify resources that can help them<br />

start, grow and succeed in business. Regulations.gov provides a<br />

forum for users to comment on existing and pending federal rules.<br />

Government portals now provide useful information to help<br />

citizens to access regulations and submit feedbacks. However,<br />

what is needed is an information framework that enables<br />

individuals and small businesses with limited resources to retrieve<br />

related regulations from multiple copies of governing regulations<br />

and related regulatory documents and then perform comparative<br />

analysis. The REGNET project seeks to establish such a<br />

framework and have initiated a number of studies focusing on US<br />

national and regional regulations and codes in the domains of<br />

environmental and accessibility standards.<br />

4.1 Relatedness Analysis of Regulatory<br />

Documents<br />

Text document comparison, in particular similarity analysis<br />

between documents, has been an active research area in<br />

Information Retrieval [21,22]. Regulatory documents differ from<br />

generic text documents in that sections are organized<br />

hierarchically and they are heavily cross referenced. As noted<br />

earlier, a wide variety of meaningful concepts can be extracted<br />

and categorized using text mining and information retrieval tools.<br />

However, terminologies used in the regulations for a specific<br />

application, such as hazardous wastes, are better defined than free<br />

form text documents. On the other hand, common sense or<br />

dictionary knowledge may not substitute domain knowledge;<br />

“lift” and “elevator”, for example, are synonymic terms in normal<br />

English usage, but each have specific meanings in accessibility<br />

regulations. In addition to traditional information retrieval<br />

179<br />

techniques, our framework exploits the structural organization of<br />

the regulatory documents, references and their distributions, and<br />

the “bounded” terminology set to further enhance comparative<br />

analysis of regulations [23-25]. To illustrate, we compare<br />

similarities between sections from different regulations. Our<br />

attempt is to identify the most related provisions between different<br />

regulations. The “relatedness” analysis framework takes into<br />

consideration the structure (section hierarchy, referencing) of the<br />

document and the features (concepts, synonyms, etc.) that are<br />

specific to the corpus. In our current approach, a base score for<br />

each pair of provisions is first computed by matching extracted<br />

features (including concept phrases, synonym information,<br />

measurements and units, etc..). The scoring scheme for each of<br />

the features essentially reflects how much resemblance can be<br />

inferred between the pair of sections based on that particular<br />

feature. The score is then refined by taking into account the<br />

hierarchical organization of regulations. Finally, we further refine<br />

the score by considering reference distribution, which takes into<br />

account that regulations are heavily self-referenced and crossreferenced.<br />

Figure 3 shows an example that reveals the similarity (almost<br />

identical texts) discovered between sections from Parts 141-143 of<br />

40 CFR and Division 4 of 22 CCR on regulations related to<br />

drinking water [17,26]. It is not uncommon that one agency<br />

directly adopts provisions issued by another agency. However,<br />

subtle differences exist and can have significant effects to the<br />

public. As an example, Figure 4 shows the barium requirements<br />

for drinking water by both the US EPA and the California DHS<br />

[17,26]. While the two provisions contain identical texts (except<br />

for the agencies), a careful reader might also note that the EPA<br />

and the California DHS do have different barium requirements –<br />

the EPA requires 2 parts per million while the California DHS<br />

sets the requirement at 1 part per million. This example also<br />

illustrates the importance of domain knowledge, where a<br />

measurement comparison would reveal that these two provisions<br />

are not identical, even though the wordings are almost the same.<br />

Another interesting application for comparison analysis is to<br />

locate similar provisions from different states [27].<br />

In developing a regulation information management (RIM)<br />

system that would allow searching, retrieving and comparing<br />

regulations, domain knowledge plays a very important role in<br />

understanding regulations and the relationships between them.<br />

For instance, different regulations use different chemical<br />

acronyms, such as TTHM or HAA (used in 40CFR) and “total<br />

trihalomethanes” or “haloacetic acids” (appeared in 22CCR).<br />

Besides typical text mining and information retrieval<br />

methodologies, we believe a knowledge driven approach,<br />

combining with similar analysis, is a powerful way to develop a<br />

RIM system. In particular, distinct knowledge sources or<br />

regulations do not have to be made completely consistent, only<br />

the terms and the concepts that articulate their application<br />

connections are involved. Ontological information (terms,<br />

features and relationships) commonly used by industry experts<br />

can be important to search and compare regulations for specific<br />

industry sectors and regulatory domains [28,29].


Figure 3: Comparison of similar sections in 40CFR [17] and 22CCR [26] on drinking water regulations<br />

40.cfr.141.32.e.16 Barium<br />

The United States Environmental Protection<br />

Agency (EPA) sets drinking water standards and<br />

has determined that barium is a health concern<br />

at certain levels of exposure. . . .In humans,<br />

EPA believes that effects from barium on blood<br />

pressure should not occur below 2 parts per<br />

million (ppm) in drinking water. EPA has set the<br />

drinking water standard for barium at 2 parts<br />

per million (ppm) to protect against the risk of<br />

these adverse health effects. Drinking water<br />

that meets the EPA standard is associated with<br />

little to none of this risk and is considered<br />

safe with respect to barium.<br />

4.2 Comparing Drafted Regulations with<br />

Public Comments<br />

The making of government regulations involves communication<br />

between the issuing agency and the public. During the rule-<br />

22.ccr.64468.1(c) Barium<br />

The California Department of Health Services<br />

(DHS) sets drinking water standards and has<br />

determined that barium is a health concern at<br />

certain levels of exposure. . . In humans, DHS<br />

believes that effects from barium on blood<br />

pressure should not occur below 2 parts per<br />

million (ppm) in drinking water. DHS has set the<br />

drinking water standard for barium at 1 part per<br />

million (ppm) to protect against the risk of<br />

these adverse health effects. Drinking water<br />

that meets the DHS standard is associated with<br />

little to none of this risk and is considered<br />

safe with respect to barium.<br />

Figure 4: Comparison of drinking water standards for barium between US EPA [17] and CA DHS [26]<br />

180<br />

making process, government agencies are required to inform the<br />

public about the drafted rules and to solicit comments and<br />

reviews. E-rulemaking redefines the process of rule drafting and<br />

commenting by utilizing electronic media, such as the Internet.<br />

For example, email has become a popular communication channel<br />

for the public to submit comments on proposed rules.


1105.4 [6]<br />

Content of<br />

Section 1105.4<br />

6 Related Public Comments<br />

The process of e-rulemaking with participation from the public<br />

involves sorting through and organizing a massive volume of<br />

electronically submitted comments. We extended the related<br />

analysis framework to compare drafted regulations with<br />

associated public comments [23,30,31]. To locate related<br />

materials, we use regulation structures and features as well as<br />

certain characteristics of the drafted rules to add knowledge to the<br />

comparison. In particular, most drafted rules are domain-specific,<br />

focusing on a narrowly-defined issue or area of interest. The<br />

relatedness analysis takes advantage of the added knowledge to<br />

facilitate the comparison between the drafted rules and public<br />

comments.<br />

To illustrate, we applied the prototype system to a 15-page drafted<br />

chapter for the ADAAG titled, “Guidelines for Accessible Public<br />

Right of Way,” which has received over 1400 public comments<br />

[32,33]. Figure 5 shows the results indicating the public<br />

comments that are related to a specific drafted rule as well as an<br />

example that is not relevant to the proposed rules. Figure 5(b)<br />

shows a typical pair consisting of drafted section and its identified<br />

related comment. The draft discusses situations that “signal<br />

timing is inadequate for full crossing of traffic lanes,” while the<br />

commenter wrote “walk lights that are so short in duration”. The<br />

result shows the importance of a full content comparison between<br />

provisions and comments is necessary instead of just simple<br />

keyword matching. Figure 5(c) shows a different type of comment<br />

screening that a particular piece of public comment is not latched<br />

with any drafted section. The commenter suggests how a visually<br />

impaired person should practice blindness skills as opposed to the<br />

drafted rule which concerns with installing electronic devices on<br />

streets to help.<br />

Although this experiment is performed on regulations with a<br />

relative small set of comments, the potential of such knowledgedriven<br />

similarity analysis approach could be quite useful for the erulemaking<br />

process, where electronic media, such as emails and<br />

ADAAG rights-of-way draft<br />

1105.4.1 Length<br />

Where signal timing is inadequate for full crossing of all<br />

traffic lanes or where the crossing is not signalized, …<br />

Public comment<br />

Deborah Wood, October 29, 2002<br />

… This often means walk lights that are so short in<br />

duration that by the time a person who is blind realizes<br />

they have the light, …<br />

(b) Related draft rule and comment<br />

ADAAG rights-of-way draft<br />

No relevant section identified<br />

Public Comment<br />

Donna Ring, September 6, 2002<br />

If you become blind, no amount of electronics on your<br />

body or in the environment will make you safe and give<br />

back to you your freedom of movement. You have to<br />

learn modern blindness skills from a good teacher. …<br />

(a) Comparison of drafted rules with public comments (c) Comment not related to drafted rules<br />

Figure 5: Application of relatedness analysis for e-rulemaking<br />

181<br />

the internet, are used by the public to comment on proposed rules<br />

and regulations.<br />

5. SUMMARY AND DISCUSSION<br />

This paper has demonstrated, in a small way, how information<br />

technology can potentially be used effectively to facilitate<br />

regulatory information management and compliance assistance.<br />

The complexity and scale of regulations pose many challenges to<br />

information technology research. In REGNET we have<br />

investigated fundamental issues related to government<br />

regulations, their features, characteristics and properties that need<br />

to be addressed. In this paper, we have presented a regulatory<br />

compliance assistance framework that not only focuses on<br />

translating requirements into computational rules but also takes<br />

into consideration the organization of regulations as well as the<br />

supplementary information that are needed to enable better<br />

understanding and interpretation of the regulations. We have<br />

presented examples to illustrate how advanced IT development<br />

can be applied to facilitate retrieval of regulatory information and<br />

to compare related regulations issued by different agencies and<br />

organizations. The relatedness analysis methodology has been<br />

shown to be potentially useful for supporting the e-rulemaking<br />

process.<br />

Ongoing research in REGNET continues to explore how<br />

information technology can facilitate better understanding of<br />

regulations and public policies. For instance, regulations are<br />

traditionally issued and managed by isolated individual state and<br />

federal agencies. Coordination among different agencies about<br />

what issues agencies need to collaborate and in what capacity is<br />

not always easy. As part of the REGNET effort, Ekstrom has led<br />

the development of a tool to gauge agency involvement in a<br />

specific topic related to marine ecosystem management [34,35].<br />

Utilizing information retrieval techniques and text analysis, the<br />

tool first maps out agency’s involvement in a particular topic


ased on the laws and regulations issued by an agency, and then<br />

analyze possible areas of overlaps and disparities among the<br />

regulations by the different agencies on the topic. The tool has<br />

the potential to identify objectively what agencies are involved in<br />

the management of a topic across sectors and levels of<br />

government. In a collaborative effort with Prof. Jay Kesan at<br />

University of Illinois, our research has been extended to deal with<br />

laws and regulations related to intellectual properties (IP) [36,37].<br />

Information pertaining to IP includes not only laws and<br />

regulations, but also patents, court cases, scientific literature, and<br />

other related data. Our research is to develop a computational<br />

framework that can assist in retrieving related information about a<br />

specific topic across these diverse domains, with the objective to<br />

mitigate and help solve many of the complicated issues involved<br />

in patent filings and compliance.<br />

While our research has demonstrated the potential use of<br />

information science and technology in government regulation<br />

domain, much research and development efforts remain. Among<br />

the challenges include interpretation and validation of regulations,<br />

which are often ambiguous in nature. Translating regulations in<br />

computable rules, even manually, can be difficult. Automated<br />

translations would require the development of formal models for<br />

rule making and rule writing. Last but not least, technology<br />

transfer mechanisms are needed to bridge the gap between<br />

fundamental research demonstration and the development of tools<br />

ready for deployment.<br />

6. ACKNOWLEDGMENT<br />

This research has been partially supported by the National Science<br />

Foundation (Contract Numbers EIA-9983368, EIA-0085998, and<br />

IIS-0811460). The authors would like to thank Professor Gio<br />

Wiederhold of Stanford University for his mentorship in the<br />

REGNET project. The authors would also like to thank Larry<br />

Brandt and Valerie Gregg (former program directors of NSF’s<br />

Digital Government Program), and Sylvia Spengler, (program<br />

director of NSF’s Information Integration and Informatics<br />

program) for their encouragement and supports. The<br />

contributions by the former and current research students of the<br />

Engineering Informatics Group at Stanford University are<br />

gratefully acknowledged. In particular, the regulation assistance<br />

system (RAS) was implemented by Dr. Shawn Kerrigan under the<br />

supervision of the first author. Any opinions expressed in this<br />

paper are those of the authors and do not necessarily reflect the<br />

opinions of the National Science Foundation and their<br />

collaborators.<br />

7. REFERENCES<br />

[1] C. Skrzycki, “The regulators; compliance education goes<br />

self-service”, The Washington Post, May 23rd, 2000.<br />

[2] M. Romine, “Politics, the environment, and regulatory<br />

reform at the Environmental Protection Agency,”<br />

Environmental Lawyer, September 1999.<br />

[3] Business Compliance One Stop Workshop, Small Business<br />

Administration, Queenstown, MD, July 24-26th, 2002.<br />

[4] P. Wahlgren, Automation of Legal Reasoning, Kluwer Law<br />

and Taxation Publishers, 1992.<br />

182<br />

[5] J. Zeleznikow and D. Hunter, Building Intelligent Legal<br />

Information Systems: Representation and Reasoning in Law,<br />

Kluwer Law and Taxation Publishers, 1994.<br />

[6] T. Bench-Capon, Knowledge Based Systems and Legal<br />

Applications, The APIC Series 36, Academic Press, 1991.<br />

[7] S. Erdelez and S. O’Hare, “Legal informatics: application of<br />

information technology in law,” in Annual Review of<br />

Information Science and Technology, M. E. Williams(ed.),<br />

ASIS, Vol. 32, 1997.<br />

[8] P. Wahlgren, Automation of Legal Reasoning, Kluwer Law<br />

and Taxation Publishers, 1992.<br />

[9] A. R. Lodder and A. Oskamp (ed.), Information Technology<br />

and Lawyers: Advanced Technology in the Legal Domain,<br />

from Challenges to Daily Routine, Springer, 2006.<br />

[10] C. Coglianese, “E-rulemaking: information technology and<br />

regulatory process,” Faculty Research Working Paper Series,<br />

Kennedy School of Government, Harvard University, Report<br />

No. RWP 04-002, 2004.<br />

[11] J.E. Fontane, “Prospects for improving the regulatory process<br />

using E-rulemaking,” Communications of the ACM,<br />

46(1):63-64, 2003.<br />

[12] C. Coglianese, H. Kilmartin and E. Mendelson,<br />

“Transparency and public participation in the federal<br />

rulemaking P\process: recommendations for the new<br />

administration,” George Washington Law Review, 77:924-<br />

972, 2009.<br />

[13] J.M. Van Wert, “Business compliance one-stop: creating a<br />

single face of government,” presented at the National<br />

Compliance Assistance Providers Forum, U.S.<br />

Environmental Protection Agency and Texas Commission on<br />

Environmental Quality San Antonio, TX. 2002.<br />

[14] A. Botkin, “Wizards, advisors and websites, Oh My!<br />

interactive electronic tools for compliance assistance,”<br />

presented at the National Compliance Assistance Providers<br />

Forum, U.S. Environmental Protection Agency and Texas<br />

Commission on Environmental Quality, San Antonio, TX ,<br />

2002.<br />

[15] S. Kerrigan, A Software Infrastructure for Regulatory<br />

Information Management and Compliance Assistance, Ph.D.<br />

Thesis, Stanford University, August 2003.<br />

[16] S. Kerrigan and K.H. Law, “A regulation-centric, logic-based<br />

compliance assistance framework,” Journal of Computing in<br />

Civil Engineering, ASCE, 19(1):1-15, 2005.<br />

[17] Code of Federal Regulation, Title 40: Protection of<br />

Environment, (Part 260-265: Hazardous Waste Management<br />

System) 2003.<br />

[18] F.A. Heffron and N. McFeeley, The Administrative<br />

Regulatory Process, Longman, 1983.<br />

[19] W.W. McCune, Otter 3.0 Reference Manual and Guide,<br />

ANL-94/6, Mathematics and Computer Science Division,<br />

Argonne National Laboratory, Argonne, IL., 1993<br />

[20] New York State Department of Environmental Conservation<br />

Pollution Prevention Unit., Environmental Compliance And


Pollution Prevention Guide for Vehicle Maintenance Shops,<br />

2002.<br />

[21] R. Baeza-Yates and B. Ribeiro-Neto, Modern Information<br />

Retrieval ACM Press, 1999.<br />

[22] C.D. Manning, P. Raghavan and H. Schutze, H., Introduction<br />

to Information Retrieval, Cambridge University Press, 2008.<br />

[23] G. T. Lau. A Comparative Analysis Framework for Semi-<br />

Structured Documents, with Applications to Government<br />

Regulations, Ph.D. Thesis, Department of Civil and<br />

Environmental Engineering, Stanford University, Stanford,<br />

CA, August 2004.<br />

[24] G. T. Lau, K. H. Law, and G. Wiederhold. "A relatedness<br />

analysis of government regulations using domain knowledge<br />

and structural organization," Information Retrieval, 9:657-<br />

680, 2006.<br />

[25] G. T. Lau, K. H. Law, and G. Wiederhold. "Comparative<br />

analysis of government regulations using structural and<br />

domain information," IEEE Computer, 38(12):70-76, 2005.<br />

[26] California Code of Regulations, Title 22 (Social Security),<br />

Division 4.5, Chapter 12, Standards Applicable to Generators<br />

of Hazardous Waste, Barclays (Publisher), 1997.<br />

[27] G. T. Lau, H. Wang, and K. H. Law. "Locating Related<br />

Regulations Using a Comparative Analysis Approach,"<br />

Proceedings of the National Conference on Digital<br />

Government Research (dg.o2006), San Diego, CA, May 21-<br />

24, 2006.<br />

[28] C. P. Cheng, J. Pan, G. T. Lau, K. H. Law, and A. Jones,<br />

"Relating Taxonomies with Regulations," Proceedings of the<br />

9th Annual International Conference on Digital Government<br />

Research (dg.o2008), Montreal, Canada, May 18-21, 2008.<br />

183<br />

[29] C. P. Cheng, G. T. Lau, K. H. Law, J. Pan, and A. Jones,<br />

"Regulation retrieval using industry specific taxonomies,"<br />

Artificial Intelligence and Law, 16(3): 277-303, 2008.<br />

[30] G. T. Lau, K. H. Law, and G. Wiederhold. "A relatedness<br />

analysis tool for comparing drafted regulations and the<br />

associated public comments," Journal of Law and Policy for<br />

the Information Society, 1(1):95-110, 2005.<br />

[31] G. T. Lau and K. H. Law. "A prototype study on electronicrulemaking,"<br />

Encyclopedia of Digital Government, May<br />

2006.<br />

[32] ADA Accessibility Guidelines for Buildings and Facilities,<br />

The Access Board, 1998.<br />

[33] Draft Guidelines for Accessible Public Rights-of-Way, US<br />

Architectural and Transportation Barriers Compliance Board,<br />

Washington, DC, 2002.<br />

[34] J. Ekstrom, G. Lau, C.P. Cheng, D. Spiteri, and K. Law,<br />

"Gauging agency involvement in environmental management<br />

using text analysis of laws and regulations," I/S – A Journal<br />

of Law and Policy for the Information Society, 6(2):189-219,<br />

2010.<br />

[35] J. Ekstrom, G. Lau, D. Spiteri, J.C.P. Cheng, and K. Law,<br />

"MINOE: a software to evaluate ocean management in the<br />

context of ecosystems,” Coastal Management, 38: 5, 457-<br />

473, 2010.<br />

[36] S. Taduri, H. Yu, J.P. Kesan, G.T. Lau, and K.H. Law,<br />

“Developing a comprehensive patent related information<br />

retrieval tool,” Journal of Theoretical and Applied Electronic<br />

Commerce Research, (in press).<br />

[37] H. Yu, S. Taduri, J.P. Kesan, G.T. Lau, and K.H. Law,<br />

“Retrieving information across multiple related domains<br />

based on user query and feedback: application to patent laws<br />

and regulations,” 4th International Conference on Electronic<br />

Governance, Beijing, China, 2010.


Session 7<br />

Policies 2


From Information-Poor to Information-Rich: Bridging<br />

Regional Economic Disparities in Nigeria through e-<br />

Governance<br />

Sanjo Faniran<br />

International Cooperation Department<br />

Plot 421 Constitution Avenue,<br />

Central Business District, Abuja, Nigeria<br />

+2348034264007<br />

sfaniran@npc.gov.ng<br />

ABSTRACT<br />

Most of the recent economic advancement experienced globally<br />

has been driven largely by information and communication<br />

technologies (ICTs) - from Kigali to Kuala Lumpur, Nairobi to<br />

New Delhi - bringing significant changes in development of the<br />

human society through technological innovation and information<br />

dissemination. The pervasive use of digital technologies has, no<br />

doubt, improved people’s day–to–day life in different ways and to<br />

varying extents resulting in “economically-rich” and<br />

“economically-poor” regions of the world, and at the same time,<br />

“information-rich” and “information-poor” societies. This broadly<br />

reflects the differing levels of access and utilization of<br />

information and communication technologies, a phenomenon<br />

referred to as the digital divide. This paper examines the coincidence<br />

between economic disparities and ICT use, both<br />

between and within countries. We argue that just as the adoption<br />

of focused strategies in ICTs by developing countries is bridging<br />

the global digital divide between countries and fast-tracking<br />

economic development in many of today’s emerging economies,<br />

the prioritization, adaptation and rapid diffusion of ICTs through<br />

e-governance could also help reduce economic disparities<br />

between sub-national entities and regions within countries. We<br />

review case studies from India and South Africa, and compare<br />

with Nigeria which aspires to become a top 20 economy by 2020.<br />

By examining the results of the 2010/11 surveys on ICT access<br />

and income-poverty distribution across the country, the paper<br />

highlights the recent efforts by sub-national administrations in<br />

Nigeria to advance e-government, presenting key opportunities to<br />

bridge the growing economic disparities between regions in<br />

Nigeria.<br />

Categories and Subject Descriptors<br />

J.4 [Computer Applications]: Social and Behavioral Sciences –<br />

Economics<br />

General Terms<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

184<br />

Kayode Olaniyan<br />

National Bureau of Statistics<br />

Plot 721 Constitution Avenue,<br />

Central Business District, Abuja, Nigeria<br />

+2348038499670<br />

kolaniyan@nigerianstat.gov.ng<br />

Management, Economics<br />

Keywords<br />

Digital Divide, Economic Development, Poverty, ICT Use,<br />

Nigeria<br />

1. INTRODUCTION: THE DIGITAL<br />

DIVIDE AND REGIONAL ECONOMIC<br />

DISPARITIES<br />

A greater number of countries, and their citizens, are gaining both<br />

knowledge of and skills at using modern ICTs, connecting to the<br />

internet, and interacting using multiple media channels at a<br />

rapidly increasing rate. According to the 2012 UN E-Government<br />

Survey, the world average on the e-government index increased<br />

by 10 percent over the last two years led by Europe and the<br />

Americas [6]. One important point that the survey notes, however,<br />

is that the digital divide – the differing levels of access and usage<br />

of ICTs between the developed and the developing world -<br />

remains a phenomenon of growing, rather than diminishing,<br />

importance. This is despite the array of cutting-edge technologies<br />

and evolution of social media and networking tools, which have<br />

re-defined inter-human relationships, government and governance<br />

in many parts of the world. According to a 2006 report, a person<br />

living in a high-income country is over 22 times more likely to be<br />

an Internet user than someone in a low -income country. Secure<br />

Internet servers, a rough indicator of electronic commerce, are<br />

over 100 times more common in high-income countries than in<br />

low-income countries. In spite of their rapid growth in developing<br />

nations, mobile phones are 29 times more prevalent in highincome<br />

countries, and mainline penetration is over 21 times that<br />

of low-income countries [5].<br />

The usage to which many citizens put the internet, mobile phones<br />

and other digital devices to spread information and record (and in<br />

some cases influence) recent events, from Japan’s tsunami to the<br />

different dimensions of the Arab Spring, demonstrate how far the<br />

developing world has come, and how fast it is catching up with<br />

the rest of the world. But despite the achievements towards<br />

bridging the digital divide, and improving its positive impacts on<br />

the society, there are still glaring regional disparities which are<br />

both the causes and consequences of the economic well-being of<br />

the developed world.<br />

With a history of high levels of functional education and<br />

widespread telephony infrastructure, Europe and the Americas as<br />

a whole remain far ahead of the rest of the world regions [6].


Asia, which is home to around three-fifths of the world citizens,<br />

has only around 70 per cent of the level of e-government in<br />

Europe while the level of services in Africa barely squares off at<br />

40 per cent of those in Europe. Within any region, countries at the<br />

lower percentile of e-development do not fare well either. This is<br />

especially true of the lower income countries in both Asia and<br />

Africa. The 10 least e-ready countries in Asia have barely 37 per<br />

cent of the level of e-government in Europe while in Africa the<br />

figure is little more than 20 per cent [6]. Figure 1 below shows<br />

global trends over the last decade in regional progress towards egovernment.<br />

Figure 1: Advances in regional e-government development<br />

(Source: UN E-Government Survey, 2012)<br />

However, this scenario is not entirely hopeless. Within the last<br />

decade in particular, many developing countries especially in<br />

Africa and Asia, have increased their web presence, clearly<br />

utilizing the opportunity to leapfrog the development cycle<br />

through innovative adoption and deployment of ICTs. In Eastern<br />

Africa, for example, mobile money transfer has taken strong roots<br />

in Kenya and Uganda, and rapidly spreading across the continent<br />

[1]. The effects of these technologies on socio-economic<br />

development, gender empowerment, increased schooling rates and<br />

rising income levels have been the subject of many recent<br />

economic literature.<br />

In view of the important role that ICTs play in bridging the digital<br />

divide between countries and regions of the world, can the<br />

deployment of ICTs also bridge the digital divide within countries<br />

to the same extent thereby reducing economic disparities within<br />

the country? This paper addresses this question by examining the<br />

case of Nigeria, a West African nation, which aspires to become a<br />

top 20 economy by 2020. The telecommunications industry<br />

remains the fastest-growing sector in the country, recording<br />

34.38% growth in 2010 and 34.76% in 2011, rapidly transforming<br />

the business, economic and governance landscape across the<br />

country. The rest of the paper is structured as follows: in section<br />

2, a brief review of the methodology employed is presented, while<br />

section 3 discusses the country experiences of India and South<br />

Africa as case studies. In section 4, the Nigerian case is explored<br />

more in-depth with respect to ICT access and the nature of<br />

economic disparities in the country. Section 5 highlights some<br />

opportunities for e-governance to reduce the disparities, while key<br />

challenges to realizing this are presented in section 6. Section 7<br />

concludes the paper.<br />

185<br />

2. METHODOLOGY<br />

A review of two country cases studies – India and South Africa –<br />

is undertaken to examine what the experience of countries with<br />

similar large populations and economic conditions have been with<br />

respect to bridging the digital divide. This is supported by<br />

examining the latest available official data on ICT use and poverty<br />

distribution at sub-national level for the country to determine<br />

whether a relationship exists between access to ICTs and<br />

economic development. For this purpose, access to ICTs is<br />

measured by the percentage of persons who own or have access to<br />

personal computers, mobile phones and internet access.<br />

Economic development, on the other hand, is indicated by the<br />

relative poverty (percentage) rate. Given the strong correlation<br />

between access to internet, and access to personal computers<br />

(estimated at 0.83, or 83%), and the fact that the data series for the<br />

latter is more complete than the former “access to personal<br />

computers” is selected as the better indicator of ICT access, and<br />

hence the measure of the digital divide in Nigeria.<br />

Data is obtained from Nigeria’s National Bureau of Statistics<br />

(NBS) General Household Survey (2010/11) which produced data<br />

on ICT use in Nigeria, as well as the Harmonised Nigeria Living<br />

Standard Survey (2009/10) which produced data on relative<br />

poverty.<br />

3. COMPARATIVE COUNTRY CASE<br />

STUDIES<br />

In this section, we discuss the cases of India and South Africa:<br />

two countries that have undertaken considerable efforts to bridge<br />

the digital divide among sub-national entities and regions in their<br />

domains. India’s global leadership in the IT industry is wellacknowledged<br />

1 . The second most populous nation in the world,<br />

India ranked 125 th on the UN E-Government Development Index<br />

(EGDI) in 2012. India is one of the countries where<br />

telecommunication development activities have gained<br />

momentum in the past decade. Efforts have been made from both<br />

governmental and non-governmental platforms to enhance<br />

telecommunication infrastructure, provide modern technologies to<br />

serve all segments of India’s culturally-diverse society, and to<br />

transform the country into a IT powerhouse. However, the digital<br />

divide still remains significant between rural and urban India [7],<br />

[8]. While the major cities are even at par with some developed<br />

countries, rural areas in states like Eastern Bihar and Orissa are<br />

worse off than several least-developed countries. With respect to<br />

teledensity 2 for example, according to the Telecom Regulatory<br />

Authority of India (TRAI) while States like Delhi and Chennai<br />

have more phones than people (with >100% teledensity rate) the<br />

teledensity in States like Chhattisgarh and Jharkhand are as low as<br />

4.18% and 3.49% respectively. India has around half a million<br />

software developers and is second only to the US, but 300,000<br />

Indian villages do not have a phone connection, 26 per cent of the<br />

population lies below the poverty line and 35 per cent illiterate.<br />

There are only 5 PCs per 1000 people, 9 mobile lines per 1000<br />

and 37 fixed lines per 1000 people in India, which is extremely<br />

low when compared to China.<br />

1 This section relies on [4]<br />

2<br />

Number of landline telephones in use per 100 individuals living<br />

in an area.


To address the divide, specific government initiatives taken<br />

include the CARD project for land administration in Andhra<br />

Pradesh; the Bhoomi project in Karnataka covering over 6 million<br />

farmers and as many records of land ownership; Sourkaryan<br />

project which provides rural cyber hubs in Andhra Pradesh; the<br />

Gyandoot project in Madya Pradesh which facilitates access to<br />

information on crops, weather and markets; and the FRIENDS<br />

project in Kerala for tax and utility payments. These e-governance<br />

initiatives are a clear demonstration of improving rural<br />

infrastructure and information access thus bridging the rural-urban<br />

digital divide in India.<br />

Africa’s largest economy today, South Africa ranks third among<br />

African countries on the 2012 EGDI 3 . There are 9 provinces and<br />

each has its own provincial legislature and Provincial<br />

Administration with various departments responsible for various<br />

aspects of service delivery. Provincial departments are key<br />

agencies of service delivery. Nevertheless, there are<br />

infrastructurally-disadvantaged areas, especially rural areas, with<br />

limited access to electricity and telephone lines.<br />

In summary, both case studies attest to the existence of withincountry<br />

digital divide even in developing countries, just as the<br />

global digital divide exists between the developed and developing<br />

worlds. In the next section, we discuss the Nigerian experience<br />

with respect to the nature of the digital divide and its interactions<br />

with the level of economic disparities across the country.<br />

4. ICT ACCESS AND ECONOMIC<br />

DISPARITIES IN NIGERIA<br />

Nigeria, with population of about 160million in 2012 ranked 162 nd<br />

on the UN E-government development index (2012) and is<br />

recognised among highly-populated (larger than 100 million)<br />

nations that made a special effort to improve service delivery to<br />

large swathes of their populations despite the challenges they face<br />

[6]. Africa’s largest country by population, Nigeria has 36 (subnational)<br />

States split almost equally into Northern and Southern<br />

Nigeria. Development indicators have historically pointed to<br />

better outcomes for the southern part of the country than the<br />

northern part. Nevertheless, it may be useful to add a note of<br />

caution that the evidence here does not warrant any conclusions<br />

regarding the direction of causation. However, the evidence does<br />

suggest a possible relationship between access to ICT and<br />

measure of poverty.The telecommunications industry has<br />

remained the fastest growing sector in the country, generating<br />

hundreds of thousands of jobs, directly and indirectly, and<br />

changing business processes and governance, while linking up<br />

new areas to centres of economic activity. According to the<br />

Nigerian Communications Commission (NCC), between February<br />

2011 and February 2012, the number of active mobile phone lines<br />

increased by 10million to just over 92 million lines. Such has been<br />

the phenomenal growth in Nigeria’s mobile telephone market.<br />

Mobile phones represent the device with the highest total access<br />

rate, with nearly 64% of the population having access to mobile<br />

phones, according to data provided by the National Bureau of<br />

Statistics. As shown in Table 1, Anambra, Osun, Kogi, Ogun,<br />

Niger and Lagos (each with more than 85% total access levels)<br />

have the highest percentages of population with mobile phone<br />

access, while States with less than 50% access to mobile phones<br />

3 This section draws heavily from [3]<br />

186<br />

include mostly the Northern States of Zamfara, Kano, Katsina,<br />

Bauchi and Adamawa.<br />

Table 1. Total access to ICTs and relative poverty among<br />

States in Nigeria<br />

State<br />

Phones<br />

(%)<br />

Personal<br />

Computers<br />

(%)<br />

Internet<br />

access<br />

(%)<br />

Relative<br />

poverty<br />

(%)<br />

Kano 36.2 0.4 0.5 72.3<br />

Kebbi 65.0 0.5 0.3 80.5<br />

Zamfara 36.1 0.6 0.5 80.2<br />

Borno 54.1 0.7 N/A 61.1<br />

Sokoto 33.1 0.8 0.3 86.4<br />

Bauchi 42.8 1.1 0.5 83.7<br />

Katsina 39.7 1.3 1.3 82.0<br />

Ebonyi 82.0 1.5 0.8 80.4<br />

Kaduna 54.8 1.9 0.5 73.0<br />

Bayelsa 64.0 2.0 2.0 57.9<br />

Taraba 33.1 2.1 1.7 76.3<br />

Imo 81.9 2.5 2.3 57.3<br />

Benue 55.0 2.6 1.7 74.1<br />

Abia 70.6 2.9 2.6 63.4<br />

Ondo 75.0 3.0 2.1 57.0<br />

Enugu 71.2 3.1 4.0 72.1<br />

Yobe 51.8 3.3 3.0 79.6<br />

Ekiti 77.9 3.6 2.2 59.1<br />

Gombe 62.3 3.7 1.1 79.8<br />

Adamawa 46.5 3.7 1.8 80.7<br />

Nasarawa 74.8 4.1 4.2 71.7<br />

Plateau 67.2 4.5 3.6 79.7<br />

Jigawa 75.4 4.6 2.0 79.0<br />

Kwara 78.0 4.6 2.7 74.3<br />

Akwa Ibom 68.1 4.7 1.5 62.8<br />

Niger 86.2 4.7 4.4 43.6<br />

Delta 76.8 5.2 3.4 70.1<br />

Oyo 81.5 6.0 4.3 60.7<br />

Cross River 54.3 6.3 3.3 59.7<br />

Ogun 87.1 6.4 4.7 69.0<br />

Edo 78.5 6.9 5.0 72.5<br />

Anambra 95.1 8.6 3.4 68.0<br />

Rivers 75.8 9.0 10.8 58.6<br />

Osun 91.9 10.0 8.5 47.5<br />

Lagos 85.6 15.8 27.0 59.2<br />

FCT Abuja 71.8 15.9 14.1 59.9<br />

Kogi 87.6 17.4 8.7 73.5<br />

National 63.9 4.5 3.6 69.0<br />

Sources: Nigeria National Bureau of Statistics General Household<br />

Survey, 2010/11, Nigeria Poverty Profile, 2009/10. A coloured<br />

row indicates a Southern State, otherwise a Northern State.<br />

Further analysis of table 1 indicates that in terms of personal<br />

computer access Kogi, FCT, Lagos, Osun and Rivers have the<br />

highest rates of access to PCs, while Kano, Kebbi, Zamfara,<br />

Borno and Sokoto have the least. Internet access rates suggest the<br />

same trends as access to PCs. These depict, although not<br />

absolutely, the disparity between the Northern and Southern<br />

regions of the country: while the southern states have a generally<br />

higher access rate to ICTs, the Northern States have generally


lower access rates. In terms of relative poverty however, Northern<br />

States have a generally higher poverty level.<br />

Figure 2: Scatter diagram showing the relationship between<br />

access to personal computers and relative poverty in Nigeria<br />

(Source: computed by authors)<br />

The gap in PC access rates in Nigeria suggests that economic<br />

disparities also exist between these States in Nigeria, as reflected<br />

in the differing levels of poverty. This point is further clearly<br />

seen in Figure 2, which shows a negative relationship between<br />

access to personal computers (as a measure of ICT access) and<br />

level of poverty. It can be observed that States with lower levels<br />

of poverty have higher ICT access rates, while states with higher<br />

poverty levels have lower ICT access rates. Overall, many states<br />

in Nigeria have high poverty levels, hence the observations (dots)<br />

in Figure 2 appear clustered toward the upper left corner of the<br />

chart. Nevertheless, the downward sloping line shows clearly the<br />

inverse relationship between ICT access rates and economic<br />

development. Therefore, if ICTs have the potential to lower<br />

poverty rates, as seen in the case of the Southern states, it may be<br />

suggested that increasing ICT access rates for the Northern states<br />

could potentially lower poverty rates so as to reduce the socioeconomic<br />

disparities among states in Nigeria. E-governance<br />

presents a viable opportunity to increase ICT access rates in the<br />

country. This is discussed in the next section.<br />

5. OPPORTUNITIES FOR E-<br />

GOVERNANCE<br />

E-government is about visibility and transparency of government<br />

in the delivery of public services to the citizens, a deliberate and<br />

conscious policy to improve access to information by citizens and<br />

to deliver public services efficiently. In recognition of the critical<br />

role that e-governance can play in accelerating the rate of<br />

economic development in the country, the Federal Government in<br />

mid-2011 created the Ministry of Communication Technology to<br />

provide sectoral leadership and policy guidance to the government<br />

and administering policies to enable Nigeria bridge the digital<br />

divide. [2]. In addition, notable efforts by some state governments<br />

to bridge the divide are on-going. For example, in Lagos, Cross<br />

River and Ekiti, citizens are now comfortable with e-tax forms<br />

while Osun State has announced plans to introduce e-learning in<br />

secondary schools using the tablet device. On another level, the<br />

deployment of electronic governance tools such as community<br />

information centres, e-kiosks etc, offer the necessary support to<br />

private entrepreneurs to thrive especially where such e-<br />

187<br />

governance platforms provide information that may be expensive<br />

to obtain privately such as weather forecasts, educational services,<br />

business support opportunities or agricultural markets information<br />

and prices. By creating such platforms of information exchange,<br />

economic activity is stimulated via private entrepreneurship,<br />

promoting better production, encouraging trade and ultimately<br />

impacting also on socio-economic disparities among States or<br />

regions.<br />

6. CONCLUSION<br />

As Nigeria aspires towards becoming one of the largest<br />

economies in the world by Gross Domestic Product (GDP) by the<br />

year 2020, the challenges to adopting and promoting egovernance<br />

to bridge the digital divide and boost rapid economic<br />

integration need to be overcome. And they are not<br />

insurmountable; but they require political will, effective<br />

prioritization and sufficient financial commitment.<br />

7. ACKNOWLEDGMENTS<br />

We wish to thank the Hon. Minister/Deputy Chairman, National<br />

Planning Commission, Dr. S.U. Usman, for his inspirational<br />

leadership and support for this project. Special thanks also go to<br />

the Statistician-General of the Federation, Dr. Yemi Kale for his<br />

unending encouragement. We also wish to thank Mr. B.O.<br />

Akpanyung, Mr. C.E. Ezeilo, Alhaji Idris and Mr. Yukubu, all of<br />

National Planning Commission for their technical inputs and<br />

insightful comments on the paper.<br />

8. REFERENCES<br />

[1] Demombynes, G. and A. Thegeya. (2012). Kenya’s mobile<br />

revolution and the promise of mobile savings,Policy<br />

Research Working Paper 5988, the World Bank 2012<br />

[2] Johnson, O. (2012) “The ICT industry in Nigeria: A<br />

roadmap”, Federal Ministry of Communication Technology<br />

Abuja, Nigeria (www.fmct.gov.ng)<br />

[3] Langmia, K.(2005). The role of ICT in the economic<br />

development of Africa: The case of South Africa,<br />

International Journal of Education and Development using<br />

Information and Communication Technology, (IJEDICT),<br />

Vol. 2, Issue 4, pp. 144-156.<br />

[4] Shah, M. (2007). E-governance in India: Dream or reality?<br />

International Journal of Education and Development using<br />

Information and Communication Technology (IJEDICT),<br />

Vol. 3, Issue 2, pp. 125-137.<br />

[5] United Nations (2006). Bridging the technology gap between<br />

and within nations, Commission on Science and Technology,<br />

E/CN.16/2006/2<br />

[6] United Nations (2012). United Nations E-Government<br />

Survey, United Nations, New York<br />

[7] Dasgupta, S.; Lall, S. and Wheeler, D. (2002) Policy Reform,<br />

Economic Growth, and the Digital India, Policy Review<br />

Working Paper of the World Bank, No. WPS-2567,<br />

Washington, DC<br />

[8] Singh, Neena (2007) “Bridging the Digital Divide in India:<br />

Challenges and Opportunities”, World Libraries, Vol. 17,<br />

No. 1.


ICT for Development and the MuNet Program- Experiences<br />

and Lessons Learnt from an Indigenous Municipality in<br />

Guatemala<br />

Jorge López-Bachiller<br />

Municipality of Patzún Consultant<br />

2ª calle, 2-75 zona 2, Patzún<br />

Chimaltenango, Guatemala C.A.<br />

+502 45 36 30 88<br />

jlopezbachiller@munetguatemala.org<br />

ABSTRACT<br />

The aim of this paper is to present experiences and lessons learnt<br />

from the use and contribution of Information and Communication<br />

Technologies (ICT) to the development of the MuNet Program<br />

and one of its implementation instances in Patzún (Guatemala).<br />

With 94% indigenous population from the Maya Kaqchikel ethnic<br />

group, Patzun economy is based on agriculture and handicraft.<br />

Since 2005, Patzun Municipality is part of the Efficient and<br />

Transparent Municipality (MuNet) Program of the Organization<br />

of American States (OAS). Due to the MuNet Program, Patzun<br />

citizens and the local government were empowered through the<br />

use of ICT and ICT-based applications. As a result, citizens’<br />

quality of life and governance processes were improved.<br />

Categories and Subject Descriptors<br />

H.4 [Information Systems Applications]; J [Computer<br />

Applications] - J.1 Administrative Data Processing – Government<br />

General Terms<br />

Performance, Experimentation, Human Factors<br />

Keywords<br />

MuNet; Modernization; Local Government; Digital Divide; ICT;<br />

Indigenous Population; Guatemala<br />

1. INTRODUCTION<br />

Located in the central part of Guatemala, Patzun has a population<br />

of 52,000 - 94% of them indigenous from the Maya Kaqchikel<br />

ethnic group. Agriculture products are the main income for 90%<br />

of the population. Before 2005, the community had poor access to<br />

ICT services. Informing citizens was not a priority for the local<br />

government and citizen’s participation was restricted to<br />

development tasks and community councils.<br />

The rest of this paper is structured as follows. Section 2 presents<br />

the MuNet Program; while Section 3 one of its instantiation -<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Javier Saenz-Core<br />

MuNet II Project Coordinator<br />

Italia 536 B- B8000DKL<br />

Bahía Blanca, Argentina<br />

+54 9 291 4545726<br />

jsaenzcore@gmail.com<br />

188<br />

Diego Cardona<br />

Universidad del Rosario<br />

Calle 12 C No 4 – 80 of 1-01<br />

Bogotá, Colombia<br />

+57 311 2395061<br />

diego.cardona@urosario.edu.co<br />

Patzun Municipality. Challenges and lessons learnt from Patzun<br />

experience are discussed in Sections 4 and 5, respectively.<br />

Conclusions are drawn in Section 6.<br />

2. MUNET PROGRAM<br />

Continuous developments of ICTs have opened new opportunities<br />

to transform governments. Electronic Government (e-<br />

Government) refers to the ICT-based transformations of<br />

government structures and processes aiming at improving<br />

efficiency in government operations, enhancing interactions with<br />

citizens and other social actors, reducing transaction costs and<br />

incrementing users’ satisfaction on public services [14].<br />

In Latin America, municipalities are the government level where<br />

most social development activities take place. Therefore, actions<br />

oriented to enhance relationships between citizens and public<br />

administrations should start at the municipality level to guarantee<br />

immediate perceptible changes. Following this principle, the<br />

MuNet Program was designed as part of the cooperation activities<br />

among the Canadian International Development Agency (CIDA)<br />

[15], the “Andes Foment Corporation“ (CAF) [16] and the<br />

Executive Secretariat for Integral Development (SEDI) [17] from<br />

OAS. The aim of the MuNet program is to help Latin American<br />

municipalities in the adoption of ICT, as a tool to increase<br />

transparency, efficiency and citizen participation.<br />

The Program was launched in Latin America in 2005. Comprising<br />

two phases, 11 countries and 22 municipalities, including Patzún,<br />

participated in Phase I. The Program methodology comprised<br />

achieving political support from the mayor or local authority,<br />

creating a MuNet team with municipality personnel and<br />

developing e-Government strategies. In 2010, the Phase II of the<br />

Program was started, with four participating countries - Panama,<br />

Guatemala, Paraguay and Costa Rica, and 179 municipalities.<br />

3. MUNET IMPLEMENTATION PATZÚN<br />

EXPERIENCE<br />

The execution of the MuNet Program in Patzun lasted for four<br />

years. In such time frame, the municipal budget was USD 6M,<br />

from which USD 32,000 were dedicated to ICT. Despite the<br />

scarce resources, the municipality was able to achieve its ICTrelated<br />

strategic objectives due to international cooperation and<br />

optimal management. The implemented ICT initiatives are<br />

explained below.


3.1 Municipality Modernization<br />

Initially, the Municipality had five old computers. The new<br />

municipal government purchased new hardware and software.<br />

Currently, 25 computers are available.<br />

3.2 Internet Installation<br />

The Municipality used to have a non-stable 256 kbps Internet<br />

connection. This service was only available to the Mayor, the<br />

Treasurer, and the Secretary. To improve the service, a telephone<br />

company (Telgua) was hired to provide a service of 1 MHz.<br />

Wiring of all municipality offices was made and currently 30 staff<br />

have Internet access. Due to the increase in personnel, more<br />

installations are being made in new offices.<br />

3.3 Employee’s Training<br />

One feature of Patzún Municipality is the continuous renewal of<br />

its staff. Therefore, new personnel have to be trained to acquire<br />

the required skills. 35% of the personnel do not have email<br />

accounts or do not use them properly. To overcome this difficulty<br />

a corporative email platform “@patzun.gob.gt” was deployed. In<br />

addition, personnel has to be trained in the focused use of internet<br />

and its applications to improve the services provided to citizens,<br />

and to work with others government departments. To promote a<br />

correct use of ICT, a user manual has been developed and is<br />

shared with the new staff. In addition, more communication<br />

devices are planned to be adopted.<br />

3.4 MuNet Team<br />

When the MuNet Program started, a MuNet team of consultants<br />

was assembled and trained. Over time, this team has been<br />

restructured with the incorporation of new members. Nowadays,<br />

the team has a Program Manager, who leads and defines the<br />

strategy.<br />

3.5 Free Internet Access to Community<br />

A part of the strategy to close the digital gap, Internet access has<br />

been provided by the Municipality to the community. Two free<br />

access points were installed equipped with donated computers.<br />

The time for the use of computers is restricted so more users can<br />

benefit from the service.<br />

3.6 Community Digital Center<br />

To reduce the digital gap, citizens need to be educated in the use<br />

of ICT. In order to contribute to this task, national and<br />

international institutions helped to create a Digital Community<br />

Center. Opened in 2010, the Center offers free ICT-basic courses<br />

(office and communication tools) to the community and<br />

government institutions.<br />

3.7 Government Website<br />

A very important element of the Municipality ICT-driven<br />

development has been the deployment of its website -<br />

www.patzun.gob.gt. The website provides information about the<br />

history, culture and geography of Patzun; as well as information<br />

about the government’s agenda and how citizens can be involved.<br />

Some sections, particularly those dedicated to history and culture,<br />

include multimedia materials, relying on free tools as Picasa and<br />

YouTube.<br />

3.8 Language Stimulation<br />

To promote and protect the Kaqchikel language, a team is creating<br />

a Wikipedia version of the municipal website in Kaqchikel. The<br />

189<br />

team members are linguistics, Kaqchikel speakers and local and<br />

international collaborators. Social development is tightly related<br />

to the promotion and protection of their culture. For this reason<br />

the content of the municipal website is presented in Spanish and<br />

Kaqchikel.<br />

3.9 Inter-Institutional Coordination<br />

The success of the project mainly relied on the support received<br />

from the Municipality, various public institutions and private<br />

companies, as well as individual contributions of collaborators<br />

from Guatemala and other countries. Mainly, the project was<br />

developed and coordinated by MuNet OAS, public institutions at<br />

Patzún and the National Secretary of Science and Technology<br />

(SENACYT) [18], Guatemala.<br />

3.10 Other Initiatives<br />

Some other experimental ICT-related initiatives are being<br />

developed in Patzún in specific vertical domains: e-Health, e-<br />

Safety, e-Learning, and e-Prevention. Results obtained so far are<br />

positive, show the potential of ICT use.<br />

4. CHALLENGES<br />

After presenting the overview of the MuNet Program and concrete<br />

examples of one implementation instance – the case of Patzún<br />

Municipality, this section discusses some of the main challenges<br />

faced during the project implementation and the adopted<br />

approaches to overcome it:<br />

o Resources – The Municipality faced difficulties to allocate<br />

resources to the project. Resources are limited or needed for<br />

other initiatives. Approach: To implement small actions with<br />

great impact on the population and thus convince the authorities<br />

about the benefit of investing on the project.<br />

o Human capital – The community lacked qualified human<br />

resources able to teach informatics. Approach: To foster<br />

international cooperation and appeal to national organizations<br />

to contribute with such resources.<br />

o Resistance to change – Municipal staff showed resilience to<br />

change and adopt new working practices. Approach: To<br />

manage cultural change and show how community members<br />

become familiar with the use of ICT.<br />

o Adoption of new practices – The team was uncertain about the<br />

acceptance from public employees to adopt ICT as a tool to<br />

enhance their efficiency, and apply it for creating new<br />

applications. Approach: To show enhanced efficiency in the<br />

management, leading and showing by examples how staff can<br />

innovate on their daily work.<br />

o Changing staff - Some personnel previously trained on ICT did<br />

not continue working at the municipality and new staff was<br />

hired after the elections in 2011. Approach: The new<br />

government hired younger staff that was more familiar with<br />

ICT.<br />

o Lack of support from central government – During the<br />

implementation of Phase I there was lack of support from the<br />

central government. Approach: In January 2012, the national<br />

government created the Digital Agenda for the Change, which<br />

is expected to generate decentralized actions. Municipal staff<br />

participated in meetings at the national level aiming at<br />

identifying ICT-related decision making areas or impact areas.<br />

o Lack of strategy to bridge digital divide - Guatemala does not<br />

have similar initiatives to reduce the digital gap. Approach: At<br />

the local level, the two community centers provided free<br />

internet access and delivered training on basic ICT


competencies and skills, contributing to reduce the digital<br />

divide.<br />

o Lack of awareness about potential benefits of ICT – Local<br />

authorities possess limited knowledge on ICT and its potential.<br />

Approach: Communicate in a massive and effective way to<br />

municipal authorities the benefits achieved through the use of<br />

ICT.<br />

5. LESSONS LEARNED<br />

The following two sections present some lessons learnt from<br />

Patzún Municipality (Section 5.1) and from the MuNet Program<br />

(Section 5.2).<br />

5.1 Patzún Municipality<br />

o Strategy for Digital Divide – The first important aspect to<br />

consider is to create a strategy to reduce the digital divide. Two<br />

mainstream topics of such strategy should be indigenous people<br />

development and inclusion.<br />

o Inter-disciplinarity – The project would have benefitted more<br />

from a multidisciplinary team.<br />

o Motivation – Part of the success of the project relied on the<br />

highly-motivated team.<br />

o Communication – The effective communication of both strategy<br />

and implemented activities is crucial to raise the interest of<br />

other institutions, creating the awareness and support that the<br />

program requires.<br />

o Stakeholders’ Participation – To enrich the opportunities and<br />

benefits of the program, participation of representatives from<br />

different areas - i.e. health, education, youth, is required.<br />

o Continuous Training – The support of local authorities is<br />

needed to ensure continuous efforts to building human capacity.<br />

o Efficiency –The program proved the efficiency to change<br />

traditional styles of working, reducing costs through the use of<br />

ITC tools.<br />

o Awareness – After taking the online e-Government course<br />

delivered by the MuNet Program, the awareness raised and<br />

competencies developed among government staff constituted a<br />

key factor to design and implement e-Government strategies.<br />

5.2 MuNet Program<br />

Community development in any municipality must be<br />

accompanied with the provision of access to ICT. Since<br />

indigenous populations have fewer resources and opportunities,<br />

their inclusion in the knowledge society requires the<br />

implementation of e-Government initiatives. However,<br />

implementing such initiatives much rely on the political will of<br />

community leaders and national authorities.<br />

Major qualitative impacts of the MuNet Program include:<br />

o Identifying municipal government strategic objectives in the<br />

short, medium and long term<br />

o Inspiring municipalities to improve their ICT infrastructure to<br />

enhance connectivity<br />

o Implementing online services for citizens<br />

o Contributing to increase citizen’s trust in the municipal<br />

government<br />

o Expanding team members’ perspective beyond the local<br />

context, stressing the importance of ICT in global development.<br />

o Deploying ICT applications to monitor the execution of projectrelated<br />

tasks.<br />

190<br />

Lessons learnt from the execution of Phase I of the MuNet<br />

Program are classified into the following perspectives:<br />

o Program Planning – It is important to define the terms of<br />

reference of project consultants and local stakeholders, and to<br />

establish local teams ensuring that interdisciplinary and<br />

multiple skills are represented.<br />

o Training – Officials and municipal workers should have a<br />

preparatory phase for the program implementation. Technology<br />

Adoption – A wide gap was identified among cultural and<br />

social diversity across teams. To overcome differences,<br />

required and essential organizational changes were<br />

implemented and a record of the identified technical challenges<br />

was maintained for future improvements. Additionally, as long<br />

as the program implementation progresses and ICT becomes<br />

embedded in the administration, new ICT demands emerged<br />

from specific areas – health, education, etc.<br />

o Political Management – Top-level leadership is essential for<br />

project success. Such leadership should manifest abilities in<br />

management and communication to share the achievements<br />

with project stakeholders, and maintain the e-Government<br />

strategy according to the municipal development plan.<br />

o Dissemination – Document all facts and events and dedicate<br />

special efforts to internally and externally disseminate the<br />

project progress. Moreover, awareness should be raised among<br />

project stakeholders on the opportunities offered by ICT.<br />

o Sustainability – It's essential to create legal, financial, and<br />

political instruments as well as building national and<br />

international networks to provide project sustainability.<br />

o Collaboration - MuNet contributed to strengthen collaboration<br />

among government authorities and officials, guaranteeing<br />

autonomy in the long term.<br />

Methodological Approach - MuNet offered a comprehensive<br />

methodological framework for the municipalities to use.<br />

6 CONCLUSIONS<br />

This paper introduced the MuNet Program and the experience of<br />

its implementation in Patzun Municipality. The Patzún experience<br />

- called “Patzún, all its information in a click” has participated in<br />

several competitions; winning a third place in the call to the best<br />

local innovations organized by the Executive Secretariat of the<br />

Presidency Coordination (SCEP). In addition, it has being<br />

nominated in the category of e-Inclusion for the World Summit<br />

Awards 2011 Guatemala.<br />

Next steps for Patzún Municipality include presenting the<br />

program and its progress to the Municipal Corporation and<br />

obtaining their commitment to continue the activities under the<br />

Modernization Commission, led by a Councilor. To raise more<br />

visibility, there will be an official re-launch of the website and<br />

presentation of the actions carried out by the Municipality to<br />

reduce the digital divide. Finally, the Municipality will continue<br />

its efforts to publicize its actions in this field, both nationally and<br />

internationally.<br />

Next steps for the MuNet Program include seeking allies in<br />

government who are committed to implementing e-Government<br />

strategies and updating and improving several methodologies.<br />

7 REFERENCES<br />

[1] Cardona, D, MuNet un esfuerzo de la OEA/ACDI/CAF para<br />

llevar el gobierno electrónico a los municipios en el


hemisferio, On Line document<br />

www.ahciet.net/comun/pags/agenda/eventos/2005/124/ponen<br />

cias/11.00%20diego%20Colombia_Rio.ppt [February, 2012]<br />

[2] Cardona, D, Open Knowledge, Free Society third edition of<br />

the On Line Congress of the Observatory for CyberSociety,<br />

On Line document<br />

http://www.cibersociedad.net/congres2006/gts/gt.php?id=142<br />

[February, 2012]<br />

[3] Cardona, D, et al, MuNet. Una herramienta para lograr<br />

municipios eficientes y transparentes, en Said, E, TIC,<br />

Comunicación y Periodismo Digital. Reflexiones de América<br />

Latina y Europa; Universidad del Norte, Barranquilla, 2010<br />

[4] Cardona, D, et al, MuNet, Municipios Eficientes y<br />

Transparentes, On Line document<br />

http://portal.oas.org/Portal/Sector/Secretar%C3%ADaGenera<br />

l/SEDI/OESEDI/Proyectos/NPA/UsoEficientedeTICs/MuNet<br />

FaseI/tabid/1767/language/es–CO/default.aspx<br />

[February, 2012]<br />

[5] Iberomunicipios, V Premio Iberoamericano de Ciudades<br />

Digitales, On Line document<br />

http://www.iberomunicipios.org/premio/def1.aspx?idn=1005<br />

3&idm=10166&ids=10735 [February, 2012]<br />

[6] Lasagna, M, 1.- Programa MuNET: Productos y Resultados,<br />

On Line document<br />

http://www.educoas.org/RestrictedSites/Curso1/Newsletter-<br />

Agosto06/Paratenerencuenta17.html [February, 2012]<br />

[7] OEA, Firman en la OEA acuerdo sobre desarrollo municipal<br />

en países andinos y centroamericanos, On Line document<br />

http://www.oas.org/oaspage/press_releases/press_release.asp<br />

?sCodigo=C-171/04 [February, 2012]<br />

[8] OEA, oeainnovacionesyalianzas.org, On Line document<br />

http://www.oeainnovacionesyalianzas.org/ [February, 2012<br />

[9] Porrua, M, Introducción al Programa MuNet, On Line<br />

document<br />

http://hasp.axesnet.com/contenido/documentos/Caracas%20e<br />

Gobierno%202005%20-<br />

191<br />

%20Introducci%C3%B3n%20Programa%20MuNet.ppt<br />

[February, 2012]<br />

[10] Porrua, M, MuNet: municipal efficiency and transparency,<br />

On Line document http://www.it4allbilbao.org/ponentes/Miguel_A_Porrua.pdf<br />

[February, 2012]<br />

[11] Saenz, J, Experiencias y perspectivas de Gobierno<br />

Electrónico a nivel local en la región LAC, On Line<br />

document<br />

http://www.cofemer.gob.mx/images/stories/conferencias/XX<br />

I_Conferencia_Nacional_de_MR/Javier_Sanz.ppt [February,<br />

2012]<br />

[12] Saenz, J, et al, MuNet, a new way to improve municipalities,<br />

Proceedings of the 3rd International Conference on Theory<br />

and Practice of Electronic Governance ACM International<br />

Conference Proceeding Series; Vol. 322, Pages: 240–245,<br />

2009, On Line document<br />

http://doi.acm.org/10.1145/1693042.1693090 [February,<br />

2012]<br />

[13] Villagrán, S, MuNet (Municipios Eficientes y<br />

Transparentes), On Line document<br />

http://www.protic.org/proyectos.shtml?&sh_itm=df10f42820<br />

87ae1170cbb506cafb2fd2.<br />

[14] Field, T., Mield, T., Muller, E. and Law, E., The e-<br />

Government Imperative. Organization for Economic Cooperation<br />

and Development, ISBN 92-64-10117-9, Paris,<br />

France, 2003, available at http:213.253.134.43/<br />

oecd/pdfs/browseit/4203071E.PDF.<br />

[15] Canadian International Development Agency, CIDA,<br />

http://www.acdi-cida.gc.ca/home.<br />

[16] Corporación Andina de Fomento,<br />

http://www.caf.com/view/index.asp?ms=19<br />

[17] Organization of American States (OAS), Executive<br />

Secretariat for Integral Development (SEDI),<br />

http://www.oas.org/en/sedi/<br />

[18] National Secretary of Science and Technology (SENACYT),<br />

http://www.concyt.gob.gt/


ICT Policy in Africa - A Comparative Study of Ghana and<br />

Kenya Drawing on Lessons from Developed Countries<br />

ABSTRACT<br />

Kenya and Ghana realized that developing a National Information<br />

Communication Technology Policy (NICTP) is vital for the<br />

development of a nation. They also realized that Information and<br />

Communication Technology (ICT) sector is a key accelerator to<br />

development. The two countries have made progress including<br />

liberalization of the ICT sector. The ICT sector has changed<br />

considerably in the two countries. However, there is need to<br />

review all stages of the policy and come up with suggestions for<br />

improvements or gaps that need to be filled. This paper looks into<br />

the process of reviewing Kenya and Ghana NICTP by applying<br />

the benchmarking process as a supporting tool for policy-making<br />

and improvement. The paper illustrates the analysis carried out<br />

and the results from five successful countries recognized<br />

worldwide on ICT policy formulation, policy focus areas and<br />

policy implementation. Besides the policy process and<br />

stakeholder‘s involvement, the ICT policy goals, objectives and<br />

mission are discussed. The institutional arrangements for driving<br />

the ICT policy at regional and international dimensions, as well as<br />

the implementation processes, policy comparison and monitoring<br />

are elaborated. The paper winds up with recommendations on how<br />

the policy comparison processes should be conducted.<br />

Categories and Subject Descriptors<br />

K.4 COMPUTERS AND SOCIETY<br />

K.4.0 General<br />

K.4.1 Public Policy Issues (privacy, regulation, transborder data<br />

flow).<br />

General Terms<br />

Legal Aspects<br />

Keywords<br />

ICT, NICTP, benchmarking, policy, mission, vision<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies<br />

are not made or distributed for profit or commercial advantage and that<br />

copies bear this notice and the full citation on the first page.<br />

Copyrights for components of this work owned by others than ACM<br />

must be honored. Abstracting with credit is permitted. To copy<br />

otherwise, to republish, to post on servers or to redistribute to lists,<br />

requires prior specific permission and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Agnes Owuato Odongo<br />

Kenya electricity generating company limited<br />

P.O Box 79439.00200 Nairobi, Kenya<br />

Mobile No. +254-722-273-589<br />

agwuato@yahoo.com<br />

192<br />

1. INTRODUCTION<br />

ICT policy is a formal statement that specifies the objectives,<br />

goals, principles, strategies, etc intended to direct and control the<br />

development, operation and use of ICT. ICT policies must<br />

consider additional policies like education, trade and investment,<br />

foreign, monetary, transport polices, etc. ICT policies have been<br />

recognized by the African executives. The PANAFTEL network<br />

concept was approved in 1976. The PANAFTEL coordinating<br />

committee was established in 1973, to mobilize the resources<br />

necessary for the establishment of the system and to implement<br />

the network speedily. By 1982 a basic telecommunications<br />

infrastructure had been constructed within Africa, allowing intra-<br />

African telecom traffic, largely avoiding the previous long,<br />

complex and very expensive transit routes through Europe. By the<br />

end of 1982, 67 routes between African countries were available<br />

by using Intel sat satellite circuits. African authorities and the<br />

private sector should become more involved in the network<br />

exploitation through the different telecommunications<br />

restructuring processes; and to modernize the network by<br />

judiciously combining all technologies to build the continent<br />

telecommunications network representative. This should meet the<br />

countries need and prepare Africa for insertion within the global<br />

information technology infrastructure (GII).<br />

1.1Ghana<br />

The National Information Communication Technology Policy<br />

(NICTP) development process for Ghana started in the year 2003<br />

as a result of the perceived lack of guidance on ICT [8]. The lack<br />

of ICT Policy and existence of isolated initiatives led to random<br />

adoption of different systems and standards, resulting in<br />

unnecessary duplication of effort hence wastage of resources.<br />

Benefits of effective adoption of ICT are likely to result not only<br />

in an increase in connectivity or access, but more importantly the<br />

benefits acquired from the facilitation of new types of<br />

development solutions and economic opportunities that the<br />

utilization of ICT makes possible.<br />

Ghana ICT Policy Process [8] has been touted as the most<br />

participatory policy development process on the continent.<br />

Extensive consultation with major stakeholders was conducted<br />

throughout the length and breadth of the country in search for<br />

national priorities and needs, as well as to sensitize the<br />

community prior to the development of the ICT4AD framework<br />

document and the eventual write-up of the policy document,<br />

action plans and legislations.<br />

The opportunities are envisaged in the National Strategy to<br />

simultaneously target the development of the ICT sector and<br />

industry as well as use ICTs as a broad-based enabler of


developmental goals, with emphasis on the development,<br />

deployment and exploitation of ICTs, to aid the development of<br />

all other sectors of the economy. The said NICTP was essential<br />

and necessary to guide the ICT development in Ghana. The<br />

NICTP development was a four step process [8] under which<br />

these are some of the decisions made:<br />

To create enabling environment to facilitate the deployment,<br />

utilization and exploitation of ICTs<br />

• To support the development of a viable knowledge-based<br />

ICT industry<br />

• To facilitate the modernization of the agricultural sector<br />

• To support the development of a competitive high valueadded<br />

services sector<br />

• To aid the process of developing a national human resource<br />

capacity and the nation’s R&D capabilities<br />

• To promote an better educational system that deploys ICTs<br />

• To facilitate a wide-spread deployment and exploitation of<br />

ICTs within the society<br />

• To support the modernization of civil and public service<br />

• To facilitate the development, expansion, rehabilitation and<br />

the continuous modernization of the national information and<br />

communications infrastructure<br />

• To guide development and implementation of e-government,<br />

e-commerce and business strategies and action plans<br />

• To facilitate development and implementation of necessary<br />

legal, institutional and regulatory framework and structures<br />

The policy was approved and published in 2005, this was the first<br />

phase. The publishing of the policy followed implementation<br />

strategy as the ICT policy development process. This first policy<br />

implementation process was faced with various challenges that<br />

made the phase less effective in delivering the objectives. Some of<br />

the challenges experienced are that [8]:<br />

• Ghana has a relatively high population growth rate<br />

• Ghana has a youthful population; about 60% are under 25<br />

years of age and 5% over 65 years of age<br />

• Ghana has a high illiteracy rate with close to 40% of the<br />

population without any form of education<br />

• Ghana has a high primary school dropout rate close to 50%<br />

fail to progress secondary school and senior secondary<br />

school leavers failing to continue with their education.<br />

• Close to 40% of Ghanaians currently lives below the poverty<br />

line and 10 regions of the country currently have more than<br />

40% of their people living in poverty.<br />

Ghana recognized that the socioeconomic problems and<br />

challenges facing it are likely to be compounded by the new<br />

challenges posed by globalization and the information age,<br />

namely [22]: narrow export base dominated by traditional exports;<br />

under-developed physical infrastructure; Poor and limited<br />

communications infrastructure, etc. And that for it to make<br />

progress in developmental process, the nation has to take step to<br />

address the developmental challenges and to put in place efforts to<br />

address the additional challenges posed by globalization and the<br />

information revolution.<br />

From these weaknesses and challenges, Ghana saw a need of<br />

reviewing the policy to address the observed weaknesses and<br />

challenges, synergies and regional cooperation in ICT policies and<br />

harmonize regional policy framework in order to achieve<br />

economies of scale. Ghana through the formulation of a number<br />

193<br />

of socioeconomic development policy frameworks over the years<br />

has identified a number of key developmental objectives to<br />

address the developmental problems facing the country. Of these<br />

policy frameworks, the key ones are Vision 2020 Socioeconomic<br />

Development Framework, the Ghana Poverty Reduction Strategy<br />

(2000-2004), the Ghana Science and Technology Policy and the<br />

Coordinated Program for Economic and Social Development of<br />

Ghana (2003-2012). Some of the key socioeconomic development<br />

objectives of Ghana as the policy Frameworks [8]:<br />

• The social and economic pressures of a youthful population<br />

• Rapid population growth and declining per capita income<br />

• An under-performing agricultural sector<br />

• An economy dominated by the agricultural sector with weak<br />

under-developed industrial and service sector<br />

• The Ghana heavy debt burden<br />

• The disproportionate informal private sector<br />

• Low professional, technical and managerial manpower base<br />

• Relatively high proportion of population illiteracy<br />

• Low job creation capacity of the economy<br />

• Narrow export base dominated by traditional exports<br />

• Under-developed physical infrastructure<br />

• Poor and limited communications infrastructure<br />

Socioeconomic problems and challenges facing Ghana are likely<br />

to be compounded by the new challenges posed by globalization<br />

and the information age. And that for Ghana to make progress in<br />

its developmental process, the nation in addition to taking steps to<br />

address these developmental challenges will also need to put in<br />

place efforts to address the additional challenges posed by<br />

globalization and the information revolution.<br />

1.2 Kenya<br />

The National Information Communication Technology Policy<br />

(NICTP) development process for Kenya started in the year 2003<br />

as a result of the perceived lack of guidance on ICT [14]. The<br />

Government recognizes the role of ICTs in the social and<br />

economic development of the nation and has promulgated a<br />

national ICT Policy based on the Economic Recovery Strategy for<br />

Wealth and Employment Creation (2003-2007). The move to<br />

develop a national ICT policy was triggered BY three key and<br />

mutually reinforcing factors namely the fast and haphazard<br />

growth of information technology that lacked direction and<br />

regulation; the desire to develop the national ICT policy<br />

guidelines to steer development of ICTs in order to address the<br />

disorder; and the readiness of UNESCO to fund the process.<br />

This policy seeks to facilitate sustained economic growth and<br />

poverty reduction; promote social justice and equity; mainstream<br />

gender in national development; empower the youth and<br />

disadvantaged groups; stimulate investment and innovation in<br />

ICT; and achieve universal access [14]. It is based on<br />

internationally accepted standards and best practices, particularly<br />

the COMESA Model adopted by the COMESA Council of<br />

Ministers in March 2003.<br />

The policy is based on four guiding principles: 1) infrastructure<br />

development 2) human resource development 3) stakeholder<br />

participation 4) appropriate policy and regulatory framework.<br />

The Government recognizes that there is a growing digital divide<br />

between the countries that are highly endowed and developed in<br />

the field of information technology and Kenya as well as between<br />

rural and urban areas in the country. The said NICTP was


essential and necessary to guide the ICT development in Ghana.<br />

The NICTP development was done by four committees under the<br />

supervision of Ministry of Information and Communication given<br />

the mandate by the government to formulate the ICT policy.<br />

The policy formulation process was in form of consultations that<br />

followed a three-tier approach at the national, provincial and<br />

district levels with stakeholders that included the Private Sector,<br />

Civil Society, Development Partners and local communities. This<br />

approach led to the formation of a National Steering Committee of<br />

stakeholders charged with the responsibility of spearheading<br />

consultations and ensuring inclusion at all levels; and chaired by<br />

Minister for Information and Communication. Also involved in<br />

the process were Kenya's development partners; civil society<br />

representatives and government officials. The government has<br />

implemented ICT policy reforms between 1999 and 2006 which<br />

resulted in a number of structural changes in the ICT sector.<br />

Several policy documents were released namely in January 1997,<br />

April 1999, and Dec 2001[14].<br />

The Kenya ICT policy was approved and published in 2006. The<br />

publishing was followed by implementation of the strategy that<br />

was faced by various challenges so the implementation less<br />

effective in delivering the objectives stated in the policy<br />

document. Some of the challenges experienced are that [14]:<br />

• To harness the potential of ICTs for economic growth and<br />

poverty reduction<br />

• Lack of a comprehensive policy and regulatory framework<br />

• Inadequate infrastructure<br />

• Insufficient skilled human resources<br />

Kenya recognized that the socioeconomic problems and<br />

challenges facing it are likely to be compounded and that for it to<br />

make progress in developmental process; the nation has to take<br />

step to address the developmental challenges and to put in place<br />

efforts to address the additional challenges posed by globalization<br />

and the information revolution.<br />

From these weaknesses and challenges, Kenya saw a need of<br />

reviewing the policy to address the observed weaknesses and<br />

challenges, synergies in ICT policies and harmonize regional<br />

policy framework in order to achieve the set objectives. Kenya<br />

through the formulation of a number of socioeconomic<br />

development policy frameworks over the years has identified a<br />

number of key developmental objectives to address the<br />

developmental problems facing the country as listed below [14]:<br />

Policy, legal and regulatory framework, ICT infrastructure, human<br />

resource development, electronic learning, universal access,<br />

public-private partnerships (ppp), e-government, Electronic<br />

commerce, content development, electronic security, ICT<br />

leadership, engendering ICT, and youth and ICT<br />

Kenya has had a long history of economic leadership in East<br />

Africa as one of the largest and most advanced economies in the<br />

region. However, inconsistent efforts at structural reforms and<br />

poor policies over the past decades have generated a prolonged<br />

period of decline in development indicators and significantly<br />

eroded the leadership position, at a time when other countries in<br />

the region have made significant strides. While Kenya was a<br />

prime choice for foreign investors seeking to establish a presence<br />

in Eastern and Southern Africa in the 1960s and 1970s, poor<br />

economic policies or inconsistent efforts at structural reforms,<br />

increased problems of corruption and governance, and the<br />

194<br />

deterioration of public services have discourage Foreign Direct<br />

Investment (FDI) since the 1980s.<br />

Therefore, for Kenya, to make progress in the developmental<br />

process, the nation in addition to taking steps to address these<br />

developmental challenges will also need to put in place efforts to<br />

address the additional challenges posed by globalization and the<br />

information revolution. Some of the key investment laws are<br />

outdated and fail to account for modern practices and principles in<br />

conducting and regulating business. A large degree of<br />

discretionary power is left to the civil service in administrating<br />

and enforcing the principles laid out in the laws.<br />

This paper underlines the need and effective process of NICTP<br />

review suitable for Ghana and Kenya, and the analysis of the key<br />

success factors that need to be considered during undertaking of<br />

the review task.<br />

2. METHODOLOGY<br />

ICT is dynamic and therefore the processes and activities keep<br />

changing within short time scales. The rapid changes in the ICT<br />

sector affect key decisions made and essentially call for an up to<br />

date environmental scan. Due to the dynamic nature of ICT,<br />

benchmarking emerges to be the best tool for policy review. In<br />

this paper, a review of the ICT Policy formulation of fast growing<br />

countries in recent years namely Australia, Korea, Malaysia,<br />

Canada and Singapore is considered effective. In the final phase,<br />

an analysis on how the Kenya and Ghana ICT Policy was<br />

developed and implemented is made and thus exposing the<br />

commonalities and differences.<br />

2.1 Source of Information<br />

In this paper, key documents reviewed and analyzed included the<br />

following: National ICT policies for Kenya, Ghana, Singapore [2]<br />

[20], Korea [13] [15], Canada [10], Australia [6] [5] and Malaysia<br />

[1] [16]. Other documents are [12] [7]:<br />

2.2 Selecting the Five Relatively Successful<br />

Countries for Benchmarking<br />

The selection of countries for benchmarking was based on the<br />

ranking of ICT Development Index (IDI) 2010 report released in<br />

February 2012 by ITU [9] (http://inwent-iijlab.org/Weblog/2010/07/26/ict-development-index-itu-omitssierra-leone-again/).<br />

Ghana has been touted to be the ICT hub of<br />

West Africa was ranked 116 th and Kenya 115 th . The republic of<br />

Korea was ranked 3 rd ; and Australia, Singapore Canada and<br />

Malaysia was ranked 14 th , 19 th , 26 th, and 56 th respectively.<br />

The desktop survey was used to review the policies of Australia,<br />

Canada, Republic of Korea, Singapore, and Malaysia based on the<br />

IDI 2010 results as indicated above. In the final stage, the<br />

Benchmarking analysis of the ICT policy cycle (formulation,<br />

implementation and review process) in Kenya and Ghana was<br />

considered against experiences of five relatively successful<br />

countries namely Singapore, Korea, Canada, Australia and<br />

Malaysia. The research of this paper is discussed within the<br />

context of: 1) the policy development process and stakeholders<br />

involvement 2) the ICT policy goals, objectives and mission 3)<br />

ICT policy focal areas 4) institutional arrangements driving the<br />

ICT policy development and implementation 5) regional and<br />

international dimensions 6) implementation processes 7) policy<br />

monitoring, evaluation and review.


3. BENCHMARKING AS A POLICY<br />

REVIEW TOOL<br />

1. Translate obstacles into<br />

more concrete concerns<br />

2. Develop the basis of<br />

specification of policy<br />

actions<br />

Policy Mission &Vision<br />

Too general to measure<br />

1. Measure output and<br />

outcome of policy<br />

implementation<br />

2. Review and benchmark<br />

the prevailing status<br />

Policy<br />

challenges<br />

Policy<br />

objectives<br />

Policy<br />

focus goals<br />

Inter-regional<br />

benchmarking<br />

Indicators<br />

Benchmarking:<br />

1. Determine if goals Policy<br />

been met<br />

assessment<br />

2. If no asses the reasons<br />

Adapted from Selhofer 2003<br />

Conclude and recommend<br />

www.observatory.gr/files/meletes/<br />

BISER_Benchmarking_Rep.pdf<br />

Figure 1. Policy making roles benchmarking<br />

Benchmarking has different meaning based on the institutional<br />

and organization set-up in which it is applied. It can be used to<br />

measure the success factors of a policy towards developing an<br />

ICT society. There are several regional benchmarking options like<br />

bottom-up, top down, horizontal approaches etc. In the bottom-up<br />

approach, regions get together and agree among themselves on a<br />

set of common indicators. Since the region has different policy<br />

framework, it is not possible to apply the method initially. The<br />

choice of indicators is a result of a compromise among different<br />

regions without top-bottom coordination. This implies that the<br />

same indicator can measure different parameter in different<br />

regions for example a measure of policy output, results, and<br />

impacts, or a simple framework of readiness indicator could be<br />

adopted [19].<br />

This paper considers the position of indicators into the policy<br />

review process and benchmarking as stipulated in Figure 1. The<br />

role of benchmarking is to determine policy challenges through<br />

policy evaluation that have impact on the policy review process.<br />

3.1 Policy Development, Review Process and<br />

Stakeholders Involvement<br />

The policy formulation of five selected countries demonstrate<br />

several advantages of involving stakeholders like the private<br />

sector, academia and civil society organizations such as<br />

professional bodies in the policy processes. The process for<br />

development of Australian, Canada, and Singapore, Malaysia and<br />

Korea ICT policies had consultative meetings with a range of<br />

stakeholders. Of interest is the case of Australia where the<br />

stakeholders were approached by e-mail regarding their<br />

discussions on effective use of ICT by citizens and consumers<br />

across civil society [5] [5].<br />

The government should involve key stakeholders in the policy<br />

formulation process in order to affect its outcomes. Kenya did not<br />

involve all key stakeholders [14]. In principle, the policy lacked<br />

195<br />

ownership of the majority of the stakeholders. The National ICT<br />

Policy and Plan Development Committee of Ghana were involved<br />

all key stakeholders and had an integrated approach to their<br />

national ICT development process. The process became an all<br />

inclusive venture and ensured that the policy development process<br />

and final product is acceptable to all [8]. In principle, the policy<br />

had ownership of the majority of the stakeholders and had clear<br />

harmonized approach to its implementation strategies.<br />

3.2. Benchmarking ICT Policy Vision,<br />

Missions and Objectives of Selected Countries<br />

Compared to the Ghana’s and Kenya’s<br />

The policy vision, mission and objectives of Korea, Australia,<br />

Canada, Malaysia and Singapore emphasize on addressing citizen<br />

problems which are similar to those of Kenya and Ghana.<br />

Furthermore, countries like Singapore [20] and Malaysia [16] [17]<br />

have provided milestones in the policy. Malaysia’s vision is to<br />

utilize ICT to transform progressively to information and a<br />

knowledge society; and as the fifth economy pillar of the<br />

economy and transforming the country to a regional ICT hub.<br />

Ghana NICTP vision statement: “Ghana to improve the quality of<br />

life of the people by significantly enriching their social, economic<br />

and cultural well-being through the rapid development and<br />

modernization of the economy and society using information and<br />

communication technologies as the main engine for accelerated<br />

and sustainable economic and social development; the vision<br />

statement sets out the roadmap for developing Ghana’s<br />

information society and economy and provides a basis for<br />

facilitating the socioeconomic development of the country in the<br />

emerging information, knowledge and technological age to be<br />

dominated by information and knowledge-based economies” [8].<br />

The Kenya policy vision is “A prosperous ICT-driven Kenyan<br />

society” and the mission statement is “to improve the livelihoods<br />

of Kenyans by ensuring the availability of accessible, efficient,<br />

reliable and affordable ICT services” [14]. The policy vision,<br />

mission and objectives of Kenya and Ghana lacks milestones of<br />

how to achieve these compared to Singapore above. Emphasis on<br />

universal access is lacking in the vision and mission statement as<br />

the success of becoming the ICT hub depending on accessibility<br />

issues; that includes the concept of digital divide between access<br />

in urban/rural and national/international relations.<br />

3.3. Strategic ICT Leadership<br />

The objective of the Strategic ICT leadership involves an increase<br />

in the use of ICT for equitable and sustainable socioeconomic and<br />

cultural development, aiming at improving the awareness on the<br />

role and potential of ICT. In so doing, creating an authoritative<br />

national organization to effect, coordinate and review the ICT<br />

policy. The role of prioritizing ICT investment in development<br />

assistance policies and programs, enhancing synergy, economies<br />

of scale and productivity in all ICT matters and creating a<br />

favorable environment for cooperation and partnership in ICT<br />

among public and private sectors, civil society became an<br />

important ingredient to its development. This is in consistent with<br />

best-practice in Singapore, Korea, Canada, Australia and Malaysia<br />

picking a few supporting examples. The review process has to<br />

follow this definitive focus. The case of Ghana and Kenya the<br />

level of leadership is not ranked high like in Korea where ICT<br />

policy committee is chaired by the prime minister. Ghana ICT<br />

policy committee chair person is a university professor, while in


Kenya it is the minister for Information Communication ministry.<br />

The political goodwill may not be achieved easing in order to<br />

support policy implementation.<br />

3.4 ICT Infrastructure<br />

Infrastructure covers both national and institutional levels. At<br />

national levels, a system to ensure usefulness of the installed<br />

infrastructure has to be assured of. In Kenya’s and Ghana’s case<br />

for instance, building the broadband infrastructure is an agenda.<br />

Achievements realized in Korea, Malaysia, Canada, Australia and<br />

Singapore is as a result of broadband deployment. All countries<br />

based on the objectives of the respective Act, targets were set<br />

which include:<br />

• An increase in penetration for the whole country and rural<br />

areas respectively. An interim target of 30 per 100 persons<br />

had been set for Malaysia by the year 2005 and fully<br />

developed by year 2020 for example [1].<br />

• Quality of service at affordable costs.<br />

• Infrastructure development, communications and multimedia<br />

infrastructures with adequate and effective plans for<br />

supporting overall economic development.<br />

• Creation of a hub to serve the global hub of communications<br />

and multimedia industry in this region.<br />

Development of ICT infrastructure is mentioned in the policy. The<br />

policy went further to mention need for provision of infrastructure<br />

e.g. energy and roads, support software development, promotion<br />

of local manufacturing among others. The policy recognizes<br />

power of open source software. However, the policy is just<br />

generic. The Kenya ICT policy is not providing details on how it<br />

will promote local software development. The Ghanaian Policy<br />

proposes no duty on computer hardware [8]. The policy for the<br />

benchmarked five countries are explicit on how to go about by<br />

saying that foreign owned and multinationals who will establish<br />

such production facilities and employ the local workforce, shall be<br />

offered special incentives. This can be part of technology transfer<br />

to the local workforce.<br />

The Kenya NICTP has several objectives concerning broadband<br />

issues to hitherto disenfranchised and isolated populations in the<br />

country and to extend the connection to the neighboring countries.<br />

The fact finding report revealed that, the private sector especially<br />

the mobile operators have invested substantially in developing an<br />

efficient infrastructure [4] [11]. However, interoperability,<br />

reliability and rural access are still a challenge in some parts of the<br />

country based on the provider to the initiative. Infrastructure<br />

sharing is the most sustainable and efficient way of rolling out<br />

infrastructure, even though it is facing internal resistance from the<br />

operators who consider their infrastructure as a business<br />

differentiation tool.<br />

The Ghana NICTP has several objectives concerning universal<br />

access issues to hitherto disenfranchised and isolated populations<br />

in the country. The fact finding report revealed that, in the private<br />

sector especially the mobile services have grown thus increasing<br />

the number of service providers. Spacefon, a GSM operator is the<br />

only mobile phone operator that has deployed its services in all<br />

the ten regional capitals and most key cities and towns across the<br />

country [8]. However, interoperability, reliability and rural access<br />

are still a challenge in the country to the initiative. Infrastructure<br />

sharing is the best as the sustainable and efficient way of rolling<br />

out infrastructure. Ghana Telecom, the national carrier that is<br />

supposed to be at the forefront of ICT development is struggling<br />

196<br />

and has failed to keep up with the times. The problems of Ghana<br />

Telecom are further compounded by the array of legal battles it<br />

has found itself to deal with. Telekom Malaysia has been<br />

throwing legal challenges to the national carrier and the Ghana<br />

government.<br />

3.5 The ICT Industry and Human Resource<br />

The ICT industry is service or hardware manufacturing or<br />

assembly based. Companies should be involved in all aspects of<br />

the business. A national ICT policy could stimulate the<br />

establishment, development and growth of ICT businesses<br />

through incentives and support provision. In Korea for example,<br />

several strategies to enhance productivity and efficiency across<br />

economic sectors and SMEs through the use of ICT were set and<br />

it worked. Furthermore, the International Cooperation Division of<br />

Department of Information Technology has been set up to<br />

promote international cooperation in the emerging and frontier<br />

areas of information technology under bilateral, multilateral or<br />

regional framework. Such interaction provides an opportunity for<br />

sharing of knowledge and experience with countries, international<br />

bodies, academia and institutions for forging partnerships for<br />

mutual progress.<br />

As far as international cooperation with Korea is concerned, it<br />

has been envisaged to promote the investment flow from Korea<br />

to the Indian ICT hardware sector, exploitation of<br />

complementarities, development of technology, human resource<br />

development, next generation ICT industry, Broadband<br />

infrastructure, E-Governance, etc. Two major Korean companies<br />

LG and Samsung are established brand names in Indian<br />

households and have already acquired a major share of the Indian<br />

market in the electronics and white goods segments. The Indian<br />

customers are happy with the pricing and service provided [21].<br />

NICTP was to make Ghana and Kenya a producer and not a mere<br />

consumer of ICT products and services. It is thus clear that the<br />

ICT Policy is expected to create conducive environment for a<br />

vibrant and sustainable ICT industry, making the country a more<br />

competitive developer and producer of ICT products and services.<br />

The policy lacks support to entrepreneurship and emphasis on<br />

small and medium enterprises (SMEs). On human resource<br />

development, Korea, Australia, Canada, Singapore and Malaysia<br />

defined it clearly in their ICT policies. Malaysia set several<br />

objectives to improve the human resource capacity that stimulates<br />

improving science and technology courses, the use of e-learning<br />

and training teachers on ICT skills. Korea, Singapore, Canada and<br />

Australia trained the mass so that the mass is able to use the<br />

technology and appreciate the advantages.<br />

Kenya and Ghana NICTP provides for the development of an ICT<br />

ready workforce with the objective of increasing human resource<br />

ICT skills, support ICT training for political decision-makers,<br />

community and civil society leaders, as well as private and public<br />

sector executives, expand and develop the teaching of ICT at all<br />

levels of the national system of formal and informal education and<br />

training, to foster interest among scientists and citizen at large.<br />

However, the policy does not address how this is achieved. Korea<br />

set up a 3rd Basic Plan for Informatization Promotion (2002-<br />

2006) issued in April 2002, to provide every Korean with learning<br />

opportunity by fostering an online learning environment and<br />

training on Internet usage skill [15. Kenya and Ghana policy does<br />

not focus on regional linkages in human capacity development,<br />

for collaboration and knowledge sharing.


3.6 ICT Productive and Service Sectors<br />

The inception and diffusion of ICT in the production sectors<br />

forms an important basis for exploitation of the ICT muscles at<br />

the full-scale. The ICT policy needs to strengthen the competitive<br />

and comparative advantage of hardware and ICT service providers<br />

locally, regionally and internationally. Policies of some countries<br />

have focused on local companies over foreign-owned companies<br />

just as is the case with Korea ICT policy‘s priority to enhance<br />

productivity and efficiency across economic Sectors and SMEs<br />

through [13] [15]. Kenya and Ghana NICTP focuses on local<br />

companies to contribute to the reduction of poverty and to<br />

improve the quality of life of Kenyans and Ghana people,<br />

fostering enterprise, entrepreneurship and innovativeness for<br />

sustainable socio-economic and economic development.<br />

3.7 ICT Legal and Regulatory Framework<br />

Many of the leading countries in ICT policy formulation and<br />

implementation formulated regulatory and legal frameworks for<br />

easy implementation of the ICT policy. Singapore and Korea<br />

created several acts and regulations that provided legal<br />

recognition of electronic contracts and electronic signatures [13]<br />

[15]. Malaysia on the other hand, developed Digital Signature Act<br />

1997 to give a digital signature the same legal status as an<br />

ordinary signature, thumbprint or other binding mark in use [16]<br />

[17]. Above all, Singapore and Malaysia enacted binding laws on<br />

cyber crime and Korea created laws for online procurement.<br />

Deployment of the necessary infrastructure to support secure<br />

electronic transactions for e-business and e-government need be<br />

implemented. Korea, Australia, Singapore, Canada and Malaysia<br />

are well known worldwide as the leading in the implementation of<br />

e-government. Other entailing key issues include measures to<br />

protect the confidentiality and privacy of citizens, increase the<br />

level of awareness on information security threats and best<br />

practices to safeguard data. Singapore established cabinet<br />

agencies to oversee ICT policy development. The key question is<br />

whether there is one best institutional model for policy<br />

development and implementation. It is critical that agency or<br />

commission leads in ICT planning and development.<br />

Technological development to regulate is critical. Digital<br />

technology has enabled the use of one digital network to distribute<br />

services that used to require different analogue networks. Thus,<br />

broadcasting, telephony and internet can be delivered using one<br />

network. Malaysia‘s Communications and Multimedia<br />

Commission [16] [17] and Singapore‘s Infocomm Development<br />

Authority [1] [21] are good examples.<br />

The Kenya Communications Commission of Kenya (CCK) is a<br />

convergence regulator bringing the convergence concept in<br />

communication sector to reality in Kenya [14]. The policy talks of<br />

strengthening the mandates of CCK to ensure quality and<br />

compatibility of IT products and services. However, the policy is<br />

quiet about the modes of strengthening needed and seems to<br />

ignore the importance of other standard bodies and professional<br />

groups to assist. There is no dedicated regulator for "ICT" in<br />

Kenya. The National Communications Secretariat has struggled<br />

with a culture of secrecy, which has made cooperation with more<br />

progressive entities such as the CCK and the Directorate of Egovernment<br />

housed inside the President's office. Emphasis is<br />

needed on confidentiality and privacy, formulation of the National<br />

197<br />

Information Security Strategy and promoting adoption of<br />

Information Security Standards at national level.<br />

The National Communication Authority (NCA) was established<br />

by an Act of parliament in 1996, to regulate the information and<br />

communication technologies (ICTs) industry in Ghana. Since<br />

inception the NCA focus has been on promoting growth of the<br />

communication sector and significant progress has been made in<br />

meeting the objectives. However, an area that needs similar<br />

attention is the “consumer” aspect of its mandate. Global trends in<br />

the ICT industry make it mandatory for consumer issues to be<br />

included in national regulatory structures. In addition, the world<br />

ICT governing body, ITU, upholds the need for regulators to carry<br />

the responsibility of addressing the consumer issues [17].<br />

3.8 Public Service and Local<br />

Many developed and developing countries focus on the use of ICT<br />

to enhance service delivery to the public. Remarkable efforts have<br />

been shown in many of these countries including Singapore,<br />

Australia, Canada, Korea and Malaysia. The five have set out<br />

goals for the use of ICT for delivering government services and<br />

have implemented the same. This pillar (Public service) in the<br />

Kenya and Ghana NICTP focuses on effective delivery of services<br />

to the public [14] [8]. The specific objectives of e-government<br />

outlined in NICTP are to increase the productivity of both the<br />

public and private sectors, empowering the public by building and<br />

e-Government platform that facilitates their relationship and<br />

interactions with the Government, and enhances the range and<br />

delivery of more effective public services at both central and local<br />

levels, while also generating accurate and timely information to<br />

better shape policies, strategic plans and tactical decisions for<br />

developing and enhancing the delivery of affordable public<br />

services. The policy has also outlined strategies for promoting<br />

good corporate and public governance by furthering information<br />

sharing, transparency and accountability. In Kenya and Ghana<br />

part of this pillar has been implemented and some government<br />

transactions are now done online.<br />

Compared to infrastructure development, content development<br />

has not received as much attention from governments worldwide.<br />

Already we see that lack of local content has driven Internet<br />

traffic in many countries to foreign sites. There are countries such<br />

as Singapore that have initiatives to develop local content.<br />

Singapore and Malaysia have laws and rules regarding<br />

objectionable Internet content [1]. Singapore is unique in<br />

combining government rules with industry self-regulation in<br />

managing content [21]. In some countries, governments are<br />

nervous about content, in particular one that is challenging the<br />

political and economic interests of the State or its allies. Content<br />

that has the potential for political mobilization also comes within<br />

the orbit of the State‘s surveillance, which is provided for by the<br />

laws enacted in those countries.<br />

While other countries have developed laws governing the<br />

management of local content, Kenya has done little in regard to<br />

this. The government should provide support, resources, and put<br />

laws in place. Ghana NICTP lacks local content.<br />

Korea has strategies for harnessing ICT for Social Development<br />

[13] [15]. These include the specific targets of increasing ICT<br />

integration in society, by providing access to ICTs to all<br />

communities including those isolated geographically or<br />

economically, provide universal access through the enhancement


of existing Public Internet Access Points (PIAPs), reducing the<br />

digital divide, by encouraging the youth to set up computer clubs<br />

aimed at encouraging their interest in IT-related fields and provide<br />

online access to express their needs.<br />

A commitment to universal access is the cornerstone of efforts to<br />

reach out to include everyone in the information economy and is a<br />

first step in bridging the digital divide. A funding mechanism to<br />

meet the cost of universal access has to be discussed and<br />

negotiated by the telecoms regulator and/or the government<br />

department/ministry responsible for this. Operators should<br />

contribute to the cost of rolling out access as part of their<br />

obligations under the licensing agreements they have signed with<br />

the local regulatory authority of the government.<br />

3.9 Institutional Arrangements for Driving the<br />

ICT Policy<br />

Kenya and Ghana have established CCK and NCA respectively as<br />

the sector ICT regulator just like Comparing Korea, Canada,<br />

Australia, Singapore and Malaysia with (. The regulator is an<br />

independent, credible, and effective quasi-government body<br />

whose functions are to regulate and monitor the ICT sector and<br />

foster competition through the issuance of licenses to operators<br />

and franchise holders. The regulator was established as part of the<br />

Government Policy reforms in the communication sector for both<br />

the countries with the aim of improving the availability of the<br />

info-communications services to the public as well as to allow<br />

new players into the market. Both CCK and NCA reports to the<br />

line Ministry in their respective countries.<br />

Furthermore, institutional arrangements for ICT policy<br />

implementations should consider the participation of both public<br />

and private sector and functional linkages between different key<br />

institutions should feature clearly in the policy.<br />

4. FORMULATION PROCESS OF KENYA<br />

AND GHANA ICT POLICY<br />

4.1 Kenya National ICT Policy Formulation<br />

Process<br />

Kenya developed its ICT policy as part of ICT for Economic<br />

Growth (2006) to represent the nation’s vision in the information<br />

age [14]. The aspirations set included Recovery Strategy for<br />

Wealth Creation and Employment as well as Poverty Reduction.<br />

The move to develop a national ICT policy was triggered off by<br />

three key and mutually reinforcing factors namely the fast and<br />

haphazard growth of information technology that lacked direction<br />

and regulation; the desire to develop the national ICT policy<br />

guidelines to steer development of ICTs in the country to address<br />

the disorder; and the readiness of UNESCO to fund the process.<br />

The development of a policy for the deployment of ICT for socialeconomic<br />

development in Kenya began in mid nineties. The<br />

policy is based on four guiding principles: infrastructure<br />

development, human resource development, stakeholder<br />

participation and appropriate policy and regulatory framework.<br />

The challenge is to harness the potential of ICTs for economic<br />

growth and poverty reduction [14].<br />

4.1.1 Kenya ICT Policy Framework<br />

In order to identify and address the critical factors for the success<br />

of the policy formulation and plan development process, and<br />

eventual ICT implementation process, extensive consultation with<br />

…<br />

198<br />

KENYA ICT POLICY FRAMEWORK: Tiered approach to<br />

sector management<br />

various institutions and organizations were conducted based on a<br />

Kenya opted for a tied framework with the policy instrument driving legal and regulatory aspects as<br />

3 tiered approach to sector management, figure 2 [14].<br />

Increasing level Specificity<br />

illustrated on first diagram.<br />

Instrument<br />

Policy &Vision-Policy<br />

Guidelines<br />

Regulation Framework-<br />

KCA 98<br />

Regulations-KCR 2001<br />

Operator License<br />

Source of Authority<br />

Stakeholder-<br />

Minister/Citizen<br />

Parliament<br />

Minister<br />

Regulator<br />

Figure 2: Kenya’s IT Policy Framework<br />

4.1.2 KENYA ICT Policy ICT POLICY Institutional FRAMEWORK Support Framework<br />

Institutional Positioning<br />

Policy<br />

Formulation<br />

Regulation<br />

Service<br />

Operation<br />

Consumers<br />

Ministry for Communication<br />

Communications<br />

Commission of Kenya<br />

Arbitration<br />

Advisory<br />

Legislature-Parliamentary Committee<br />

on Public Works, Energy and Communications<br />

National Communications<br />

Secretariat<br />

Appeals Tribunal<br />

Content oo<br />

Universal Access<br />

Universal Access Fund<br />

Service Providers, Telecoms, ISP Broadcasters ,Vendors<br />

Figure 3: Kenya’s IT Policy Institutional Framework<br />

4.1.3 ICT policy development process<br />

Economic Recovery Strategy for Wealth and Employment<br />

Creation gave birth to “Investment Program for the Economic<br />

Recovery Strategy for Wealth and Employment Creation 2003-<br />

2007 (IP-ERS)”, released in May 2004. The consultations<br />

followed a three-tier approach at the national, provincial and<br />

district levels with stakeholders that included the Private Sector,<br />

Civil Society, Development Partners and local communities. This<br />

approach led to the formation of a National Steering Committee of<br />

stakeholders charged with the responsibility of spearheading<br />

consultations and ensuring inclusion at all levels; and chaired by<br />

Minister of Information and Communication. Also involved in the<br />

process were Kenya's development partners; civil society<br />

representatives and government officials. The government has<br />

implemented ICT policy reforms between 1999 and 2006 which<br />

resulted in a number of structural changes in the ICT sector.<br />

Several policy documents were released at intervals namely in<br />

January 1997, April 1999, and Dec 2001.<br />

4.1.4 ICT Cardinal Pillars<br />

The Cardinal Pillars of the Kenya policy are: 1) education and<br />

Training 2) new opportunities 3) marketing networking and<br />

promotion 4) recruitment and retention 5) market intelligence and<br />

research 6) business support and investment.<br />

4.2 Ghana National ICT Policy Formulation<br />

Process<br />

Ghana developed its ICT policy [8] for Accelerated Development<br />

(ICT4AD) process led by the Economic Commission for Africa<br />

(ECA) within the context of the African Information Society<br />

Initiative (AISI). To the benefactor countries, the initiative served<br />

as a framework for a radical socioeconomic transformation of the<br />

countries through the deployment and exploitation of ICTs within<br />

the context of the challenges of the globalization and Information


Age. It is based on the policy framework document “An<br />

Integrated ICT-led Socioeconomic Development Policy and Plan<br />

Development Framework for Ghana”. The Ghana ICT4AD Policy<br />

Statement recognizes the aspirations and provisions of key<br />

socioeconomic development framework documents like Vision<br />

202o Socio-Economic Development Framework, Ghana Poverty<br />

reduction Strategy (GPRS) (2002 – 2004) and Coordinated<br />

Program for Economic and Social Development of Ghana (2003 -<br />

2012)<br />

4.2.1 ICT Policy Framework<br />

The development, deployment and exploitation of ICTs within the<br />

economy and society can contribute to and accelerate Ghana’s<br />

socioeconomic development process provided some critical<br />

success factors and conditions are addressed at the: national,<br />

organizational levels as well as at the level of individuals in the<br />

work place and in the society at large.<br />

4.2.2 Ghana’s ICT Policy - Institutional Support<br />

Framework<br />

Ghana ICT policy framework structure [22] formed four bodies to<br />

assume responsibility of coordinating, facilitating monitoring and<br />

subsequently ensuring the implementation of the policy:<br />

• The National ICT Policy and Plan Development Committee,<br />

constituted by the President, and chaired by a University<br />

Professor.<br />

• The Ministry of Communications as the host ministry and the<br />

policy implementation agency<br />

• The Ghana ICT Directory, as an implementation arm of the<br />

Ministry of Communications<br />

• The National Information Technology Authority, as a<br />

Presidential Advisory body<br />

4.2.3 Ghana’s ICT Policy Process<br />

Ghana ICT Policy Process [22] has been touted as the most<br />

participatory policy development process on the continent.<br />

Extensive consultation with major stakeholders was conducted<br />

throughout the length and breadth of the country in search for<br />

national priorities and needs, as well as to sensitize the<br />

community prior to the development of the ICT4AD framework<br />

document and the eventual write-up of the policy document,<br />

action plans and legislations. The development, deployment and<br />

exploitation of ICTs within the economy and society can<br />

contribute to and accelerate Ghana’s socioeconomic development<br />

process provided some critical success factors and conditions are<br />

addressed at the: national and organizational levels as well as at<br />

the level of individuals in the work place and in the society at<br />

large. It was a four step process [22] involving the development of<br />

a framework, development of a policy, followed by development<br />

of plans and eventually the implementation of the policy strategies<br />

and action plans. Ghana conducted extensive consultation with the<br />

stakeholders that was located across the length and breadth of the<br />

country. Participatory nature of the process was referenced by the<br />

ECA as a benchmark for its facilitated ICT Policies<br />

4.2.4 Ghana’s ICT Policy – Cardinal Pillars<br />

The Cardinal Pillars of Ghana ICT4AD Policy are as follows [8]:<br />

1) accelerating Human Resource Development 2) promoting ICTs<br />

in Education 3) facilitating Government administration and<br />

service delivery 4) facilitating private sector development 5)<br />

developing export-oriented ICT products and service industry 6)<br />

199<br />

modernizing agriculture and development of agro-business 7)<br />

developing a globally competitive value added service industry.<br />

4.3 Policy Priorities and Internet Regulation<br />

Despite the broad participation of multiple stakeholders in<br />

Ghana’s policy formulation process, and partial participation of<br />

stakeholder Kenya’s case, the implementation in both countries<br />

did not translate into action plans to acceptable level [8][17]. The<br />

establishment of the Ministry of Information Communications<br />

made it possible to update the policy framework and implements<br />

some flagship projects. Consequently there has been a major<br />

disconnection between communication policies that address<br />

access issues and broad based ICT policies that focus on the<br />

exploitation of ICTs as instrument of development. Although<br />

access to communication was improved through cellular services,<br />

progress with regards to fixed lines and broadband network that<br />

underpin ICT application has remained very low. Increasing<br />

access to affordable communication and developing human<br />

capacity are vital for the success of ICT policy.<br />

Although Kenya and Ghana have started internal processes of<br />

governance over the Internet by developing their own set of<br />

National ICT Strategies, infrastructure, technological and<br />

regulatory frameworks, there is wide gap between national policy<br />

and the regulation of online environment in the aspects of<br />

international communications infrastructure, content access and<br />

development, electronic trade and on-line applications. In<br />

particular Ghana is not focusing on local content in its policy.<br />

A team should be formed to address Internet issues. The policy<br />

review shows that there is an overlap in the priority areas, a<br />

reflection of the common social and economic challenges in the<br />

two countries. The overlap is evident particularly in the areas of:<br />

human resources development; broadband infrastructure<br />

development; policy; legislative and regulatory framework; ICT<br />

sector development; and ICT applications and content.<br />

Main areas of focus of ICT policy Include: ICT Leadership, ICT<br />

Infrastructure, ICT Industry, Human Capital, Legal and<br />

Regulatory Framework, Productive Sectors, Service Sectors,<br />

Public Service, Local Content and Universal access. Furthermore,<br />

the vision and mission expressed in the policy documents remain<br />

consistent, an indication of a degree of convergence in adopting<br />

common vision to harness information and communication<br />

technologies for development.<br />

The review indicates that; there is under emphasis of the need for<br />

highly skilled human resources and ICT research and<br />

development that could have long term economic and social<br />

benefits to the country. The smart use of ICTs in the universities,<br />

public and private sector is critical for national and regional<br />

competitiveness. The application of ICTs in agriculture and health<br />

has not been given equal attention considering number of<br />

workforce and resources devoted to these sectors in the country.<br />

4.3 Institutional Arrangement and<br />

Participation of Stakeholders<br />

Institutional arrangement and the participation of various<br />

stakeholders particularly the media, civil society, private sector<br />

and the academia provide a good indication of the maturity of ICT<br />

policy. The review of institutional arrangement shows that the<br />

more the ICT function is sponsored by the highest political<br />

leadership like the President, the better the chance of its success.<br />

Likewise, the higher the involvement of the major stakeholders in


the policy process e.g. formulation, implementation and policy<br />

review; the higher the ownership and the better the success in<br />

implementing ICT programs.<br />

Although Kenya and Ghana have relatively developed broad<br />

consultation process in the ICT sector, the participation of civil<br />

society in ICT policy issues has not been that consistent due to<br />

lack of a strong ICT civil society with a national coverage. Figure<br />

2 shows institutional framework for policy formulation and<br />

implementation for Kenya. The ministries formed by the two<br />

governments to administer the implementation of ICT policy<br />

should promote strong civil society participation. As a result of<br />

lack of limited ownership the formed ministries are expected to<br />

alleviate coordination challenges. It is necessary to encourage<br />

civil society participation and strong competitive private sector<br />

facilitated by good regulatory framework.<br />

Evaluation of the governance framework shows that various<br />

sectors and institutions continue to compete for external resources<br />

to meet their needs and concerns independently, rather than<br />

creating a favorable framework applicable to all. The main lessons<br />

drawn from the ICT policy can be summarized as follows:<br />

streamline institutional arrangements, establish the directorate of<br />

ICT at the Ministry of Communication Science and Technology<br />

has a high chance of success in the implementation of ICT<br />

programs and mobilize the resources.<br />

Since the Ministry to champion ICT exists in Ghana and Kenya,<br />

the established directorate will drive the policy process, develop<br />

priority and flagship projects and implement projects through<br />

public and private partnerships. The minister should act as key<br />

champions and sponsors for the ICT policy process. The<br />

separation of policy (political) and regulatory (procedural)<br />

function has been a key governance challenge. There is no one<br />

size fit strategy for the separation of policy and regulatory<br />

functions; however it is essential that the regulator is insulated<br />

from day-to-day interference of policy makers and secure its<br />

financial autonomy. The legitimacy of the regulator can be<br />

improved by enhancing competence and improving interaction<br />

with the public. A good coordination among institutions needs a<br />

champion Minister, trust and flexibility within the ICT policy.<br />

4.4 Implementation of ICT Policy<br />

In general terms, the ICT policy leads to an implementation plan<br />

benchmarked by flagship projects, although the presence of an<br />

implementation plan may not guarantee the success of policy. A<br />

review of the situation of Kenya and Ghana show that the<br />

implementation of the ICT policy is driven by external funding<br />

than a well thought-out plan that addresses the key building<br />

blocks like infrastructure, regulatory functions and human<br />

resources development as envisaged and monitored.<br />

Although NICTP existed, Kenya and Ghana did not develop the<br />

implementation strategy. Various projects targeted to the policy<br />

have been implemented with support from external donor<br />

agencies. The national fiber backbone network, Universal Access,<br />

and the e-government projects are among the current flagship<br />

projects for the implementation of the national ICT policy. The<br />

main objective of the national backbone project is to establish a<br />

telecom backbone transmission network to satisfy domestic and<br />

regional ICT requirements in the long term. It intends to provide<br />

long-distance telephone networks, data backbone networks and<br />

extend Internet bandwidth countrywide by offering sufficient<br />

capacities, network resiliency and guaranteed quality of service<br />

200<br />

provision to meet the needs of voice, data, mobile, internet, leased<br />

circuit etc.<br />

5. KEY FACTORS ON THE<br />

DEVELOPMENT OF NICTP<br />

The NICTP for Kenya and Ghana were analyzed using<br />

benchmarking principals and compared to other countries. The<br />

emerging issues from the work and the entailing findings are<br />

categorized in the following key elements summarized as: the<br />

policy process and stakeholders involvement; the ICT policy<br />

goals, objectives and mission; ICT policy focus areas; institutional<br />

arrangements to drive ICT policy, regional and international<br />

dimensions, implementation processes; and policy review and<br />

monitoring<br />

The Institutional framework for implementing the national policy<br />

implementation and monitoring was not described adequately in<br />

the Kenya policy; hence some roles were left hanging. Monitoring<br />

was not covered in the Ghana policy. It is my observation and<br />

strong feeling that the policy left a serious governance gap. Based<br />

on the review it can be concluded that, coordination of the<br />

implementation strategy was inadequate and resulted in<br />

misunderstanding on the way forward and a priority on where<br />

funds or source of funding for the proposed activities.<br />

6. CONCLUSION<br />

The analysis of the current NICTP development and<br />

implementation was conducted. Weaknesses were identified<br />

through the benchmarking analysis that compared Kenya and<br />

Ghana NICTP from other countries of similar nature but in<br />

different regions. The review shows that from the onset of the<br />

initiatives, drafting and development of the policy, stakeholders<br />

were not fully involved for Kenya’s as was the case of Ghana,<br />

thus resulting in: 1) lack of full ownership and operational<br />

institutional framework 2) poor participation of key stakeholders<br />

3) poor coordination during implementation 4) lack of coherent<br />

but integrated implementation strategies.<br />

Kenya and Ghana NICTP is very generic. It eliminates strategy<br />

from the vision where the policy looks at vision, principles and<br />

guidelines, the Strategy should look at implementation plan, by<br />

focusing on who is to do what by when, where, benefits and cost<br />

of implementing the policy. The policy ignores implementation<br />

and no action plan is provided in the entire document.<br />

Therefore, in order to rectify the situation, the policy review<br />

process has to consider changes in technology, new national and<br />

regional developments and recognize the need to add acts and<br />

policies to support policy implementation by creation enabling<br />

environment. A good policy with its implementation strategies<br />

and institutional framework has the potential of making ICT an<br />

effective tool in achieving set goals. For an effective policy<br />

review process the paper recommended the following:<br />

• NICTP assessment should involve stakeholders and<br />

ministries for a multi-stakeholder participatory approach.<br />

Policy vision and mission to be shared by key role players to<br />

address universal access and infrastructural developments.<br />

• The policy should appreciate laws and regulations like cyber<br />

usage, e-transaction, confidentiality and privacy.<br />

• The reviewed policy has to emphasize downstream issues<br />

like ICT Incubator to promote local entrepreneurial culture.


• In regard to vision and strategy the national ICT policy<br />

should be specific and should include strategy in the vision.<br />

• It should be noted that many a nation develop ICT policies<br />

but few realize the widely acclaimed benefits of ICT in terms<br />

of socio-economic development, because it takes more than<br />

policy development to realize those benefits.<br />

7. ACKNOWLEDGMENTS<br />

My thanks go to ICEGOV sponsoring organizations and<br />

conference organizers for the financial support given to attend the<br />

ICEGOV 2012 conference and to present a paper.<br />

8. REFERENCES<br />

[1] BALRAJ-AMBIGAPATHY, S, GOONASEKERA, A AND<br />

LEE CHUN, W. 2001. Asian Communication Handbook<br />

―Malaysiaǁ‖ in (eds). Singapore: AMIC.<br />

[2] Cheryl Marie Cordeiro and Suliman Al-Hawamdeh, “National<br />

Information Infrastructure and the realization of Singapore<br />

IT2000 initiative,” Division of Information Studies,<br />

Information Research, Vol. 6 No. 2, 2001.<br />

[3] David A. Wolfe and Allison Bramwell, “Growing the ICT<br />

Industry in Canada: A Knowledge Synthesis Paper”, 2010.<br />

[4] David Gichoya, “Factors Affecting the Successful<br />

Implementation of ICT Projects in Government”, 2005.<br />

[5] Delivering Australian Government Services: Access and<br />

Distribution Strategy (http://www.finance.gov.au), 2006.<br />

[6] Delivering Australian Government Services: Managing<br />

Multiple Channels (http://www.finance.gov.au), 2006.<br />

[7] Ewen Le Borgne and Jaap Pels, “Knowledge management<br />

and Communication strategy West Africa Water Initiative<br />

Knowledge Management project, October 2010<br />

[8] Ghana’s ICT4AD Policy Document (http://www.ict.gov.gh),<br />

2003<br />

[9] ICT Development Index (IDI) 2010 report February 2012 by<br />

the International Telecommunication Union (ITU)<br />

(http://inwent-iij-lab.org/Weblog/2010/07/26/ictdevelopment-index-itu-omits-sierra-leone-again/)<br />

[10] ICT Policy Development: the Case of Canada, 2012 IPCSIT<br />

vol. 36 (2012) © (2012) IACSIT Press, Singapore,<br />

(http://www.ipcsit.com)<br />

[11] Investment Policy Review Kenya, 2005 by United Nations<br />

(http://mirror.undo.org).<br />

[12] Investment Policy Review of Kenya, 2005 (http://unctad.org)<br />

[13] IT839 Strategy Document (http://www.vus.sk)<br />

[14] Kenya ICT Policy Document (http://www.ist-africa.org)<br />

[15] Korea’s Informatization Policy to Deliver ICT Use in<br />

Everyday Life (http://unpan1.un.org), 2007 Edition<br />

[16] Malaysia draft national IT policy (revised) 2007-2013,<br />

(http://www.eeas.europa.eu)<br />

[17] Malaysia National ICT Policy; Malaysia‘s Vision 2020,<br />

which foresees Malaysia becoming an industrialized country<br />

(http://www.epu.gov.my)<br />

201<br />

[18] Margaret Abba-Donkor, “Effective regulation: The<br />

importance of addressing consumer issues in an Era of<br />

digitization and convergence”, 2007.<br />

[19] OSIMO, D., AND GAREIS, K. 2005. The role of interregional<br />

benchmarking in the policy-making process:<br />

experiences in the field of information society, in<br />

<strong>proceedings</strong> of the Regional Studies Association conference,<br />

Aalborg, Denmark.<br />

[20] Singapore National ICT Policy, Transform Singapore into a<br />

vibrant global ICT capital with a thriving and prosperous Net<br />

Economy by year 2010, (http://www.unapcict)<br />

[21] Sudhir Kumar Marwaha, International Cooperation in the<br />

ICT Field: Bridging the Digital Divide, 2009.<br />

[22] The Ghana ICT for Accelerated Development (ICT4AD)<br />

Policy, 2003 (http://www.ict.gov.gh/).


Laggards or Victims of Socioeconomic Conditions?<br />

Findings from Ongoing Survey of Female Slum-dwellers<br />

Without Cell Phone Ownership<br />

ABSTRACT<br />

This paper presents the following details from an ongoing survey<br />

of 334 poor female slum-dwellers who don’t own cell phones:<br />

demographic features including socioeconomic status, sources of<br />

income, barriers to adopt cell phones, and perceived incentives for<br />

and consequences of using cell phones in India. The findings<br />

differ from three key characteristics of laggards identified by the<br />

diffusion of innovation literature. The findings based on responses<br />

from 334 poor laggards suggest hypotheses for predicting the cell<br />

phone adoption by the remaining poor laggards in India.<br />

Categories and Subject Descriptors<br />

H.1.1 [Systems and Information Theory]: Value of Information<br />

H.1.2 [User/Machine Systems]: Human Factors<br />

General Terms<br />

Economics and Human Factors<br />

Keywords<br />

Diffusion of Innovation, Laggards, Poor Slum-Dwellers,<br />

Adoption of Cell Phones<br />

1. INTRODUCTION<br />

Cell phones are the most widely adopted information and<br />

communication technology (ICT) innovation in the world with<br />

more than five billion subscribers as of December 2010, and the<br />

customer-base was expected to exceed six billion by the end of<br />

2011[1]. Since 2000, coverage of mobile telephony has expanded,<br />

and cell phone subscriptions in developing countries like India<br />

and China have increased by over 500%. Intense competition and<br />

innovation within the telecommunications sector in the last decade<br />

has catapulted India into the largest and fastest-growing cell<br />

phone market in the world. Inexpensive cell phone handsets ($15<br />

Devendra Potnis and Kanchan Deosthali<br />

University of Tennessee<br />

01-865-974-2148, 01-518-322-6693<br />

dpotnis@utk.edu, kdeostha@utk.edu<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are not<br />

made or distributed for profit or commercial advantage and that copies bear<br />

this notice and the full citation on the first page. Copyrights for components of<br />

this work owned by others than ACM must be honored. Abstracting with<br />

credit is permitted. To copy otherwise, to republish, to post on servers or to<br />

redistribute to lists, requires prior specific permission and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

202<br />

per piece and above), fierce competition in the Indian cell phone<br />

industry (five out of 15 service providers sharing the market<br />

almost equally), and very cheap tariff rates (less than two cents<br />

per minute) have made cell phones affordable even to poor.<br />

Further, collective ownership models (sharing cell phones through<br />

SIM cards and payments for air-time) and flexible payment<br />

options such as micro-payments (up to a dollar) make cell phones<br />

an attractive communication medium [3].<br />

In India, thirty percent of the nation’s 1.3 billion people are under<br />

18[5], which is the legal age for buying cell phones in the country.<br />

Out of 910 million potential cell phone owners, 907 million had<br />

adopted the ICT innovation as of September 2011 [4]. Thus,<br />

according to the diffusion of innovation literature, the citizens<br />

above 18 who do not own cell phones can be labeled as<br />

innovation laggards. The diffusion of innovation theory [2]<br />

proposes five categories for innovation adopters: innovators, early<br />

adopters, early majority, late majority, and laggards (see Figure<br />

1).<br />

Figure 1. Adopter Categories [2]<br />

Adopter categories are the classifications of members of a social<br />

system on the basis of innovativeness, or the degree to which an<br />

individual or other unit of adoption accepts new ideas when<br />

compared to other members of a system.<br />

1.1 Research Objective<br />

Despite the cheapest cell phone prices in the world and a host of<br />

affordable services and products offered over the cell phones,<br />

more than 3 million Indian adults – categorized as innovation<br />

laggards – do not own and/or use cell phones. To learn more<br />

about these innovation laggards, this study focused on poor<br />

female slum-dwellers who don’t own cell phones. These female<br />

slum-dwellers earn less than two dollars a day and represent one<br />

of the most disadvantaged populations in the male-dominant<br />

Indian society. The following research questions were explored as<br />

part of this ongoing study:


1) What are the demographic characteristics, including<br />

socioeconomic status, of female slum-dwellers who do not<br />

own cell phones?<br />

a) Is there a correlation between respondents’ income,<br />

education, age, family characteristics, and facilities at<br />

home and their lack of cell phone ownership?<br />

2) What are the key barriers to cell phone adoption by<br />

respondents?<br />

3) What are the perceived consequences of and incentives for<br />

cell phone adoption?<br />

The second section describes the relevant theory from diffusion of<br />

innovation literature. The third section presents the research<br />

methodology used to collect responses from slum-dwellers in<br />

urban and rural India. The fourth section presents the study<br />

findings, and the final section concludes with hypotheses and<br />

suggestions for future research, and practical implications of study<br />

findings.<br />

2. DIFFUSION OF INNOVATION<br />

Diffusion is a special type of communication in which messages<br />

are new ideas. It is a social change, defined as the “process by<br />

which alteration occurs in the structure and function of a social<br />

system” [2, p.6]. Social changes occur when new ideas are<br />

invented, diffused, and are adopted or rejected. Although the cell<br />

phone is not a new technology, it is definitely a new idea for<br />

millions of poor in India to start using cell phones for everyday<br />

life. The following sub-sections portray characteristics of laggards<br />

and consequences for and incentives of innovation as described by<br />

the diffusion of innovation theory [2].<br />

2.1 Characteristics of Laggards<br />

Laggards are the last in a social system to adopt an innovation.<br />

They are conservative and “localite” in their outlook. They often<br />

interact with those who have traditional values. They are not part<br />

of any social network and live in their own worlds with very<br />

limited exposure to the outside world. There are no leaders among<br />

laggards, and they are rarely associated with any opinion leaders.<br />

The point of reference for the laggard is always the past. They do<br />

not believe in innovations and, hence, tend to be suspicious of<br />

new innovations. Laggards adopt an innovation only when they<br />

are sure about its success, since they cannot afford to lose the<br />

investment made in any innovation.<br />

2.2 Perceived Consequences of and Incentives<br />

for Innovation<br />

Consequences are the changes that occur to an individual or to a<br />

social system as a result of the adoption or rejection of an<br />

innovation. There are three types of consequences of diffusion of<br />

innovation: (i) desirable versus undesirable consequences,<br />

depending on whether the effects of an innovation in a social<br />

system are functional or dysfunctional; (ii) direct versus indirect<br />

consequences, depending on whether the changes to an individual<br />

or to a social system occur in immediate response to an innovation<br />

or as a second-order result of the direct consequences of an<br />

innovation; and (iii) anticipated versus unanticipated<br />

consequences, depending on whether the changes are recognized<br />

and intended by the members of a social system or not.<br />

There are a variety of incentives observed with the diffusion of<br />

innovation. The incentives are as follows. Either the individual<br />

adopter or the system associated with that adopter is benefitted<br />

203<br />

due to the individual’s adoption of innovation. Positive incentives<br />

like awards and rewards or negative incentives like penalties and<br />

fines increase the rate of adoption. Monetary or social incentives<br />

trigger the act of adoption. Immediate incentives, which are<br />

incentives that are paid at the time of the adoption, increase<br />

adoption rate; in contrast, delayed incentives could benefit<br />

adopter(s) days, weeks, months, or even years after adoption.<br />

3. RESEARCH METHODS<br />

The current study focused on poor females living in urban and<br />

rural slums who did not own cell phones. Two female assistants in<br />

their 40s from the lowest socioeconomic stratum were recruited<br />

for data collection. The assistants were literate enough to write<br />

down responses on the survey questionnaire. The assistants were<br />

paid 60 cents for each respondent they surveyed. The assistants<br />

randomly distributed surveys and collected data from selected 386<br />

slum-dwellers. Out of 386 responses, 334 responses were usable.<br />

The data collection is still going on in rural and urban areas of<br />

Maharashtra, one of the western states in India. The convenient<br />

sampling of respondents limits the generalizability of study<br />

findings.<br />

4. FINDINGS<br />

This section provides answers to the three research questions.<br />

4.1 Demographic Characteristics Including<br />

Socioeconomic Status<br />

Out of 334 female respondents, 79 belong to rural slums and 255<br />

live in urban slums. The average age of respondents was close to<br />

37 years (see Figure 2).<br />

Figure 2. Age Distribution for % of Respondents<br />

Approximately 37% of respondents were illiterate. Out of the<br />

remaining 63% of respondents, (a) 29% of respondents dropped<br />

out of school before 10 th grade, (b) 21% of respondents attended<br />

school until 10 th grade, and (c) 13% of respondents attended<br />

college. Fifty seven percent of respondents earned less than a<br />

dollar a day, 36% of respondents earned more than a dollar a day<br />

and less than two dollars a day, and 7% of respondents earned<br />

more than two dollars a day. Television, in-house bathrooms, and<br />

tap water connections were the three topmost facilities and<br />

services enjoyed by the respondents (see Figure 3).


Figure 3. Facilities & Services Enjoyed by Respondents<br />

There was no correlation found between respondents’ education,<br />

age, marital status, family characteristics, and facilities at home<br />

and their lack of cell phone ownership.<br />

4.1.1 Sources of Income<br />

The survey sought primary, secondary, and tertiary sources of<br />

income from each respondent. Table 1 lists the income sources<br />

into the following categories: (i) business of selling services, (ii)<br />

business of selling products, (iii) employment, (iv) helper in nonemployee<br />

role for someone else’s business, (v) unemployed, (vi)<br />

retired, and (vii) miscellaneous.<br />

Table 1. Source of Income<br />

# Types of Income Primary Secondary Tertiary<br />

Sources N= 312 N= 181 N =84<br />

1 Business of<br />

selling services<br />

44% 44% 35%<br />

2 Business of<br />

selling products<br />

24% 27% 43%<br />

3 Employee 14% 13% 13%<br />

4 Helper in Nonemployee<br />

Role<br />

2% 4% 5%<br />

5 Unemployed 13% 12% 4%<br />

6 Retired 2% 0% 0%<br />

7 Miscellaneous 1% 0% 0%<br />

The business of selling services emerged as the topmost income<br />

source in primary and secondary category, whereas the business<br />

of selling products was the topmost tertiary source of income for<br />

respondents. Respondents offered the following services: house<br />

cleaning, dishwashing, cloth washing, cooking and catering, babysitting,<br />

dropping children to schools, massaging, teaching,<br />

tailoring, singing, training women for handicraft, renting photo<br />

frames to hospitals, singing, match-making, portering, and<br />

nursing. The business of selling products included a variety of<br />

products, such as vegetables, fruits, sweetmeats, traditional<br />

snacks, spices, dry fish, tea, meals, fish, bangles, pearl ornaments,<br />

hair-bands, dress material/clothing, flowers, fabric paintings,<br />

birthday party decorations, ribbons for typewriters, calendars,<br />

rubber stamps, brooms, and sticks for ice-cream candies.<br />

The different forms of employment for the women were as<br />

follows: compounder at a dispensary, care-taker of mentally<br />

retarded children, assistant in a photo studio, sales-girl, student<br />

assistant, office staff in placement office, nurse, assistant in<br />

transportation business, assistant at telephone booth, hotel staff,<br />

204<br />

construction worker, government employee, bottle company<br />

worker, delivery girl by a courier company, assistant to an<br />

accountant, assistant to caterers, farm workers, server in<br />

weddings, floor mill operator, and assistant at a computer<br />

institute. Another type of income source for women was serving<br />

as helpers in others’ businesses. This included helping in<br />

husbands’ businesses, fathers’ businesses, uncles’ businesses, and<br />

sons’ businesses. The unemployed women were: students, job<br />

seekers, housewives whose husbands did not allow them to work,<br />

physically handicapped women, caretakers of their big families,<br />

daughter-in-laws refrained by their in-laws to work, illiterate, and<br />

less educated women.<br />

4.2 Key Barriers to Cell Phone Adoption<br />

Respondents reported three key barriers that kept them away from<br />

owning cell phones. Table 2 shows low income or insufficient<br />

income as the most significant barrier and second most significant<br />

barrier to adopting cell phones. Miscellaneous financial reasons<br />

were reported as the third most significant barrier that prevented<br />

respondents from owning cell phones. The miscellaneous<br />

financial reasons were as follows: scarce money to eat food on a<br />

daily basis, insufficient money to repair a leaking roof, low<br />

savings for children’s schooling, uncertainty and unpredictability<br />

of daily wages, no raise in income and salary, seasonal<br />

employment, unemployment, lack of permanent job, remittance of<br />

money to relatives in native places, insufficient savings to buy a<br />

cell phone, lack of guidance for operating cell phones, loss in<br />

business, very small profit margin in business, meager pension,<br />

savings lost in son’s accident, medical expenses, and a lot of<br />

accrued debt due to mother’s sickness and daughter’s wedding.<br />

The miscellaneous non-financial reasons that served as barriers to<br />

cell phones included government policies, socio-cultural<br />

backwardness, illiteracy, less education, dependency on relatives,<br />

retirement, disabled husband, resistance by husband and in-laws<br />

to use cell phones, lack of freedom to make decisions, availability<br />

of office phones to make personal calls, lack of electricity to<br />

charge cell phones, lack of knowledge for operating cell phones,<br />

ease of access to public phone booths, old age, husband’s<br />

addiction to alcohol, possible mishandling and misuse of cell<br />

phones by children, and extreme difference of opinions among<br />

family members for using cell phones.<br />

Table 2. Barriers to Cell Phone Adoption<br />

# Types of Barriers First<br />

Key<br />

Barrier<br />

N=325<br />

1 Entire Financial Burden<br />

on Respondent Alone<br />

2%<br />

2 Low/Insufficient Income 30%<br />

Second<br />

Key<br />

Barrier<br />

N=304<br />

Third<br />

Key<br />

Barrier<br />

N=208<br />

2% 0%<br />

27% 10%<br />

3 Inflation 14% 14% 14%<br />

4 a. Large Family b. More<br />

# of Dependents than<br />

Bread-winners<br />

5 Lack of Need for Using<br />

6<br />

Cell Phones<br />

Borrow Cell Phones<br />

from Others<br />

4% 8% 10%<br />

4%<br />

3%<br />

4% 3%<br />

4% 2%


7<br />

Unaffordable Cell Phone<br />

Prices and Maintenance<br />

7%<br />

6% 8%<br />

8 Miscellaneous Financial<br />

Reasons<br />

13% 16% 32%<br />

9 Poverty 12% 5% 1%<br />

10 Costly<br />

Upbringing and<br />

Education of Children<br />

11 Miscellaneous Nonfinancial<br />

Reasons<br />

3%<br />

9% 6%<br />

8% 5% 14%<br />

4.3 Perceived Consequences of and Incentives<br />

for Cell Phone Adoption<br />

Anticipated and desirable consequences of adopting cell phones<br />

were as follows. Ninety-five percent of respondents think that<br />

their status in the family would improve if they started using cell<br />

phones. Ninety eight percent of respondents believe that cell<br />

phone usage will lead to personal development. Table 3 presents<br />

respondents’ top perceived incentives for cell phone adoption.<br />

Social networking with family, relatives, friends, and neighbors<br />

emerged as the most important incentive for cell phone adoption.<br />

Table 3. Perceived Incentives for Cell Phone Adoption<br />

# Incentives for First Second Third<br />

Cell Phone Adoption N = 334 N = 327 N = 271<br />

1 Easy to make calls to<br />

anybody any time<br />

3% 3% 1%<br />

2 For expanding business 25% 28% 17%<br />

3 To maintain social contact<br />

with family, relatives,<br />

friends, and neighbors<br />

55% 51% 62%<br />

4 To seek out help in<br />

emergency situations<br />

17% 17% 19%<br />

5 Entertainment 0% 1% 1%<br />

5. CONCLUSION<br />

The lack of cell phone ownership among female slum-dwellers<br />

was largely based on unfavorable socioeconomic and financial<br />

conditions and not driven by choice as is the case with laggards.<br />

Poor female slum-dwellers are the victims of socioeconomic<br />

conditions in rural and urban India, discouraging them from<br />

adopting cell phones. Table 4 lists the differences between three<br />

key characteristics of laggards identified by the diffusion of<br />

innovation theory and the current study findings.<br />

Table 4. Differences in Theory and Study Findings<br />

# Theoretical Views<br />

for Laggards<br />

1 Laggards are<br />

conservative<br />

their outlook.<br />

in<br />

Current Study Findings<br />

In the male-dominant Indian<br />

society, business of selling services<br />

and products forms the topmost<br />

source of income for poor female<br />

slum-dwellers. Respondents are<br />

financially independent microentrepreneurs<br />

with modern<br />

205<br />

2 Laggards are not<br />

part of any social<br />

network with very<br />

limited exposure to<br />

the outside world.<br />

3 Laggards do not<br />

believe in<br />

innovations, hence<br />

are suspicious of<br />

innovations.<br />

outlook.<br />

Social networking with friends and<br />

family members emerged as the<br />

topmost incentive for slumdwellers<br />

to adopt cell phones.<br />

100% of respondents expressed<br />

their confidence in the utility of<br />

cell phones. They were not<br />

suspicious about the value created<br />

by adopting cell phones.<br />

Findings based on responses from 334 poor laggards suggest<br />

hypotheses for predicting cell phone adoption by the remaining<br />

poor laggards in India, who do not own and use cell phones. The<br />

hypotheses are as follows.<br />

H1: Demographic variables (e.g., education, age, marital status,<br />

family characteristics, and facilities at home) do not influence cell<br />

phone adoption.<br />

H2: Low or insufficient income is the main barrier for cell phone<br />

adoption.<br />

H3: Improvement in social status is the most evident perceived<br />

consequence of cell phone adoption.<br />

H4: Social networking is the major perceived incentive for cell<br />

phone adoption. Hence, H4a: Respondents are more likely to<br />

adopt cell phones, if they have family, friends, relatives, or<br />

neighbors who own and use cell phones.<br />

In addition, future research focusing on personal characteristics<br />

and communication patterns of laggards without cell phone<br />

ownership would equip us better for predicting cell phone<br />

adoption by laggards in India.<br />

Practical implications for cell phone manufacturers are as follows.<br />

Cell phone features supporting the “business of selling services<br />

and products” could increase the cell phone adoption by<br />

microentrepreneurs in India. In addition, mobile applications<br />

facilitating social networking with appropriate user interfaces<br />

designed for illiterate and semi-literate cell phone users would be<br />

an additional incentive for poor laggards to adopt cell phones.<br />

6. ACKNOWLEDGEMENT<br />

We would like to thank the University of Tennessee at Knoxville<br />

for funding this study.<br />

REFERENCES<br />

[1] ITU. International Telecommunications Union<br />

Retrieved from www.itu.int/ on December 21, 2011.<br />

[2] Rogers, E. Diffusion of Innovations (4th ed.).<br />

New York: Free Press. 1995.<br />

[3] Sinha, C. Effect of Mobile Telephony on Empowering Rural<br />

Communities in Developing Countries, Conference on Digital<br />

Divide, Global Development and the Information Society<br />

(Tunis, Tunisia, 2005), 2005.<br />

[4] TRAI. Telecom Regulatory Authority of India<br />

Retrieved from http://www.trai.gov.in/ on October 23, 2011.<br />

[5] US Census Bureau. US Census Bureau’s Intl. Database,<br />

Retrieved from http://www.census.gov on May 1, 2010.


Promoting user uptake of e-government in Colombia<br />

Diana Parra Silva<br />

International Consultant<br />

Orinoco 5006<br />

Montevideo, Uruguay<br />

+598 97305822<br />

dianaparra@hotmail.com<br />

ABSTRACT<br />

This paper describes the key factors for the development of a<br />

successful strategy for the e-government uptake in Colombia.<br />

Categories and Subject Descriptors<br />

A.0 [General]: Conference <strong>proceedings</strong>.<br />

General Terms<br />

Management, Measurement, Performance.<br />

Keywords<br />

E-government, "Gobierno en linea", Uptake, Marketing.<br />

1. INTRODUCTION<br />

In 2005, the OECD identified that having a strong brand, as well<br />

as developing a solid marketing strategy, was a key factor in egovernment<br />

successful cases. In 2009, some years later, the same<br />

organization dedicated a publication to highlight the importance<br />

of public awareness on e-government.<br />

Raising awareness about the importance of user uptake has<br />

become a pressing matter in the last years, to such an extent that<br />

the UN E-Government Survey 2012 recognized it as a highpriority<br />

aspect, when it points: "availability of online public<br />

services ('supply-side') has been the primary focus of egovernment<br />

studies and policymaking, but over the past years<br />

citizens' usage of e-government services ('demand-side') has also<br />

become a priority issue".<br />

The fundamentals behind this fact have triggered a discussion on<br />

two aspects: if citizens are not aware of the government's online<br />

services and do not use them, are the efforts made by public<br />

administrations valuable for the citizens? And, will the benefits<br />

commonly associated to e-government and the social return of<br />

investments be achieved without a critical mass of users?<br />

"Gobierno en linea" is the Colombian strategy, led by a<br />

Programme with the same name, that contributes on developing a<br />

more efficient, transparent and participative government, which<br />

provides better services by means of ICT. This strategy guides the<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

206<br />

Johanna Pimiento Quintero<br />

Manager of "Gobierno en linea"<br />

CR 8 12-00<br />

Bogota, Colombia<br />

+571 3442270<br />

johanna.pimiento@gobiernoenlinea.gov.co<br />

delivery of online services by public agencies, at both national<br />

and local levels.<br />

The Programme, taking into consideration the discussion<br />

mentioned before has impelled the awareness of e-government<br />

services in the country through the diagnosis, design, development<br />

and follow-up of a marketing and outreach strategy in Colombia<br />

from 2008 to 2010. Below you will find the most relevant aspects<br />

concerning such experience, which gave Colombia the basis to<br />

promote the citizens' awareness up to the present days.<br />

2. BASELINE<br />

In 2007, a study carried out in 21 municipalities allowed gathering<br />

information about knowledge, use, needs and expectations. The<br />

study consisted of face-to-face surveys conducted in 2,500<br />

households which represented the total of individuals residing at<br />

urban areas, selected according to age, socioeconomic strata and<br />

education of the country's population. The following are some<br />

highlights of the study's findings:<br />

o Only 23% of Colombians had visited a website of the<br />

government, which meant that there were nearly 4<br />

million of Internet users at that time that had never<br />

visited any public agency website.<br />

o Only 4% had used a government online service.<br />

o 77% had not used government online services because<br />

they didn't know how they worked, they were<br />

considered to be unsafe or unreliable.<br />

o 54% of nonusers were willing to use them, representing<br />

19 million of potential users.<br />

These findings motivated the decision to develop the marketing<br />

and outreach strategy for enhancing awareness and use of egovernment<br />

services.<br />

3. DIAGNOSTIC<br />

In 2008, the work began by analyzing the desired positioning for<br />

"Gobierno en linea": being efficient, participatory and transparent,<br />

as well as a provider of high quality services, which was<br />

transformed into the strategy's specific objectives:<br />

o To increase the government's efficiency by optimizing<br />

processes and sharing resources, as well as exchanging<br />

accurate and quality information.<br />

o To promote transparency and participation, by<br />

increasing the visibility of public matters and enabling<br />

new channels for participation and social control.


o To provide better services fulfilling the citizen's needs,<br />

with high quality, and reduced costs and time; making<br />

them simpler and accessible through multiple channels.<br />

A diagnosis was made with the intention of gathering more<br />

information in order to design the marketing and outreach<br />

strategy, using: 4,700 surveys in households, SMEs and large<br />

companies, associative organizations and public agencies; a<br />

positioning study with 6,003 surveys; 104 focus groups with<br />

citizens, entrepreneurs and public servants; 369 interviews with<br />

ICT companies, SMEs, Colombians living abroad and<br />

international organisms.<br />

In addition, the main characteristics of the communicational<br />

approach of the leading countries on e-government were<br />

researched, along with the best international practices regarding<br />

incentives to citizens and companies for online services usage.<br />

Likewise, macro and micro characteristics were analyzed<br />

(economical, political, social and cultural factors; consumer, client<br />

and competition profiles, among others), as well as domestic and<br />

international audiences and potential users. Moreover, a study was<br />

carried out in order to determine the positioning of the brand and<br />

the organization and how they were perceived.<br />

Equally important was to know the acceptance, motivations and<br />

habits of use, possible advantages and disadvantages, main<br />

benefits and problems, and usage intention for each target<br />

audience. Also, a study to evaluate opportunities and risks of<br />

repositioning or renovating the Programme denomination (called<br />

"Agenda de Conectividad" at the moment) was made.<br />

The following are some highlights about how the target audiences<br />

perceived the positioning values:<br />

o What is EFFICIENCY? "To not keep people wandering<br />

around, from one government office to another". "Equal<br />

treatment for everyone".<br />

o What is TRANSPARENCY? "It is a government with<br />

clear rules". "It implies the right of citizens to review<br />

the government's performance".<br />

o What is PARTICIPATION? "To be able to have a free<br />

opinion and to express my ideas". "That every opinion<br />

is taken into account".<br />

o What is TO PROVIDE A GOOD SERVICE? "To make<br />

the client feel well". "That the human being comes<br />

first".<br />

When people used Gobiernoenlinea.gov.co, they said things like:<br />

o "There is no discrimination; it shows us that<br />

opportunities are equal for everybody because it is open<br />

to the public".<br />

o "It no longer depends on the shift of public servant's<br />

opinion; it is not open to interpretations".<br />

o "With this type of portals one can make things easily<br />

and it is not incited to pay somebody to speed up an<br />

administrative formality".<br />

o "It is serious because it avoids external middlemen".<br />

4. DESIGN<br />

From world experiences on e-government, it was concluded that<br />

the communication objective for these services is mainly oriented<br />

towards raising awareness on online services and promoting its<br />

use by target audiences.<br />

207<br />

Therefore, it was decided to develop the marketing and outreach<br />

strategy on "awareness and use", focusing on building a closer<br />

relationship between people and the government.<br />

The strategy focused on the following target audiences:<br />

o Citizens: Although they do not always know how to use<br />

it and they are not very aware of the administrative<br />

formalities, it is the main target audience because it is<br />

the most massive and most of the online services are<br />

provided for them.<br />

o Citizens living abroad: For this target audience,<br />

Gobiernoenlinea.gov.co is an optimal channel offering<br />

information and services, given that through this portal<br />

they will always have access to the government from<br />

any part of the world.<br />

o Enterprises: It refers to large companies with a closer<br />

contact to the government because they must regularly<br />

comply with mandatory formalities. They support<br />

initiatives that make them save time and money in their<br />

interactions with the government.<br />

o SMEs: It refers to small and medium enterprises, which<br />

should be considered as a specific target audience since<br />

they have different habits than large companies in their<br />

interaction with the government. SMEs require more<br />

support from the government because they do not have<br />

the same resources or the same expertise as large<br />

companies.<br />

o Public servants: They are especially important, as they<br />

are the human assets that assure e-government's good<br />

operation. They may have certain fears, resistance to<br />

change and may also think that technology might come<br />

in to take their place.<br />

o International community: The interaction with this<br />

target audience is a window to global advocacy of<br />

success and achievements. They provide the possibility<br />

of learning from other experiences and it is also a way<br />

of sharing what has been accomplished.<br />

It was decided that the message was to be clear, outstanding and<br />

inspiring; solid enough to be used in every media communication.<br />

Such communications should have a pertinent tone according to<br />

the target audience to be reached taking into account its specific<br />

characteristics.<br />

Similarly, it was decided that the denomination of the Programme<br />

("Agenda de Conectividad") should be changed, using the same<br />

name of the strategy ("Gobierno en linea") and therefore unifying<br />

its image. A new logo was designed to be present throughout the<br />

communication actions; the logo had to be simple and close to the<br />

citizen and it should also convey credibility and the government's<br />

identity (see Table 1). Using focus groups the whole process was<br />

tested by citizens, businessmen and public servants.<br />

Table 1. Changes in name and image<br />

Before After


It was also decided that it was necessary to have a slogan, a short<br />

phrase, easy to remember, which would link the functional matter<br />

to the emotional one; something that would linger in time and that<br />

will reflect the identity and the characteristics of the brand.<br />

Consequently it should communicate change, easiness, and<br />

proximity in such a way that each target audience could feel<br />

identified with it: "Making your relationship with the government<br />

easier" was chosen as the appropriate one.<br />

To influence target audiences' perception, a five stages strategy<br />

was designed, as detailed below:<br />

o Stage of Preparation - its purpose was to advance in<br />

research and strategic planning, prepare schedules and<br />

budgets, and negotiate with the media, producing and<br />

pre-testing campaigns, among others actions. It lasted<br />

for 7 months.<br />

o Stage of Sensitization - oriented specifically to public<br />

servants. Communication objective: to raise their brand<br />

awareness for the launching. Key message: We are all<br />

"Gobierno en linea". It lasted for 2 months.<br />

o Stage of Awareness - oriented to all target audiences.<br />

Communication objective: to generate positive<br />

perceptions for a better brand positioning, that would<br />

raise its awareness and impact. Key message: We are<br />

working to make your relationship with the government<br />

progressively easy. It lasted for 3 months.<br />

o Stage of Experience - oriented to all target audiences.<br />

Communication objective: to generate satisfactory<br />

experiences in all the audiences. Key message:<br />

"Gobierno en linea" works; check it out. It lasted for 12<br />

months.<br />

o Stage of Habit - oriented to all target audiences.<br />

Communication objective: to set habit's groundwork to<br />

use "Gobierno en linea" when interacting with the<br />

government. Key message: You can always find<br />

something new on "Gobierno en linea". It lasted for 12<br />

months.<br />

5. IMPLEMENTATION<br />

For the stage of awareness, which started in late 2008, a campaign<br />

focusing on massive media and brand activation was carried out,<br />

under the premise: "Questions about administrative formalities are<br />

easier to answer than questions about life" (see Figure 1).<br />

Figure 1. Sample of the Awareness Stage<br />

208<br />

For example, it is more difficult to answer a question about life<br />

such as "What should I study?" than getting information to answer<br />

a question about an administrative formality such as "How can I<br />

get an educational loan?".<br />

For the stage of experience, implemented in 2009, the objective<br />

was to produce satisfactory experiences for the target audiences,<br />

with the aim of allowing people to verify that "Gobierno en linea"<br />

actually works.<br />

In order to achieve such goal, workshops inside an itinerant<br />

classroom with a circus tent shape were carried out. The tent<br />

traveled more than 7,500 kilometers visiting 16 departments<br />

(states) across the country. It allowed more than 71,500 people<br />

(students, adults, social groups, communal leaders, elderly people,<br />

handicapped people, single mothers, indigenous, afro-<br />

Colombians, street vendors, teachers, public servants, among<br />

others), to have a direct contact with online services. The<br />

campaign was called "Vive Gobierno en linea" (Livin' "Gobierno<br />

en linea") and advertising material was used in local media,<br />

inviting people to participate in the workshops (see Figure 2).<br />

This campaign was granted the 2010 FRIDA Award for Best<br />

Initiative of Public Administration in the region.<br />

Figure 2. Sample of the Experience Stage<br />

Finally for the stage of habit, executed in 2010, the objective was<br />

to motivate people to try not one but several online services,<br />

demonstrating through good experiences some of the new<br />

available services for the different target audiences, under the<br />

premise: "a good experience makes a good history".<br />

The fact that Colombians should be the ones communicating the<br />

benefits and kindness of "Gobierno en linea" was found to be a<br />

good opportunity, because people would use real life, human and<br />

inclusive stories. Thus, a contest was launched so that people<br />

could share their experiences through testimonies recorded on<br />

video. The best ones were turned into TV spots for the campaign<br />

under the name "Experiences that make history" (see Figure 3).


Figure 3. Sample of the Habit Stage<br />

The starting point for the development of each campaign was the<br />

media mix that was determined for each target audience:<br />

o Citizens: ATL - Ads on national and regional press,<br />

magazines, television and radio, as well as free PR press<br />

(political speech of regional and national important<br />

authorities). TTL - Social media such as Facebook,<br />

Twitter, Flickr and YouTube, links on websites of the<br />

government and online ads. BTL - Events, banners,<br />

merchandising and text messages.<br />

o Citizens living abroad: ATL - Ads on international TV<br />

channels. TTL - To make contact with this segment<br />

digital and social media were crucial.<br />

o SMEs: ATL - Specialized magazines, professional<br />

guilds, radio stations and news channels. BTL -<br />

Specialized events, direct email with information about<br />

the different uses and benefits, as well as brand presence<br />

at fairs and congresses.<br />

o Enterprises: ATL - Ads in specialized magazines<br />

oriented to different sectors and professional<br />

associations. Also, ads on TV and radio news shows.<br />

BTL - Presence at fairs and specialized congresses for<br />

large companies, as well as through speakers<br />

discoursing about different trends with the purpose of<br />

catching companies’ attention.<br />

o International Community: ATL - Articles in specialized<br />

magazines. An annual magazine was created divulging<br />

successful cases and advances. BTL - Brand presence in<br />

events and congresses. TTL - Online networks related to<br />

e-government, for posting a variety of successful cases.<br />

Others - To follow international rankings and other<br />

types of publications.<br />

o Public servants: BTL: to carry out events, seminars,<br />

chats, direct email, presence at fairs and congresses.<br />

Others: production of training materials (using familyfriendly<br />

language and situations applicable to their<br />

realities).<br />

6. RESULTS AND FOLLOWING ACTIONS<br />

During the first three years of the strategy a follow-up was made<br />

analyzing the raise of awareness and use of electronic means in<br />

the interaction between people and the government.<br />

209<br />

A raise of 309% of awareness (increasing from 22% up to 90%)<br />

and a raise of 550% in use (increasing from 6% up to 39%) were<br />

achieved. One fact that is worth highlighting, is the one referring<br />

to "re-use" (do it again): among people who had actually used<br />

"Gobierno en linea", 99% asserted that they would be willing to<br />

use it again.<br />

These results, together with an analysis of usage evolution,<br />

allowed inferring that next steps for the marketing and outreach<br />

strategy should be focused on promoting "the first time use". Once<br />

people experience online services, they would be willing to<br />

continue to use them due to the benefits perceived.<br />

The main lesson learnt was that a communication strategy should<br />

not be approached as a series of isolated actions but as a whole<br />

strategy (as its name indicates) with clear challenges, objectives,<br />

key messages, concepts, stages and indicators, and should also be<br />

projected within a definite timeline.<br />

Furthermore, users need to be analyzed in depth in order to<br />

understand how they think and how they interact with the<br />

government, as well as the kind of messages they might consider<br />

interesting; plus examine how their perceptions are changing in<br />

order to set the service value promise according to their<br />

expectations.<br />

From that starting point on, a strategic plan was designed and<br />

piloted during 2011: an accompaniment outline was implemented,<br />

to help agencies to design their marketing and outreach strategies<br />

so as to enhance the use of online services, by transferring the<br />

knowledge gained by the Programme in such area.<br />

During the last years (between 2010 and 2011), through the<br />

maintenance of the strategy initially designed, awareness suffered<br />

a slight fall from 90% to 88% (that is within the margin of error in<br />

measurements), while use rose from 39% to 55% over the same<br />

period, which showed that the strategy was being successful and<br />

should continue this way (see Table 2).<br />

Table 2. Increase of awareness and use<br />

Aspect 2008 2009 2010 2011<br />

Awareness 22% 66% 90% 88%<br />

Use 6% 30% 39% 55%<br />

For Colombia the necessity to define sustained actions towards<br />

user uptake of e-government has been a priority. As a<br />

consequence of these actions, future strategies should leverage the<br />

lessons learnt in recent years.<br />

7. REFERENCES<br />

[1] OECD. e-Government for Better Government, 2005.<br />

[2] OECD. Rethinking e-Government Services, 2009.<br />

[3] UN. E-Government Survey 2012: E-Government for the<br />

People, 2012.<br />

[4] Gobierno en linea Programme. Study of knowledge, use,<br />

needs and expectations, 2007.<br />

[5] Gobierno en linea Programme. Results of application of the<br />

methodology for monitoring and evaluation, 2008, 2009,<br />

2010 and 2011.


Session 8<br />

Measurement 1


From Failure to Success: Using Design-Reality Gap<br />

Analysis as a Mid-implementation Assessment Tool for<br />

e-Government<br />

Lemma Lessa<br />

School of Information Sciences<br />

Addis Ababa University, Ethiopia<br />

(+251) 911683805<br />

lemma.lessa@gmail.com<br />

ABSTRACT<br />

e-Government implementation failure in low-income countries is<br />

reported to be as high as 85% where 35% being classified as total<br />

failures - the project never started or was started but immediately<br />

abandoned, and 50% are partial failures - major project goals are<br />

not attained or there were undesirable outcomes [5]. Given this<br />

rate of failure we wanted to investigate a project with partial<br />

failure and draw lessons learned that can be replicated in other<br />

projects. This paper looks at a Land Management Information<br />

System (LMIS) in Ethiopia that facilitates citizen’s request for<br />

land information. The project is credited for reducing the delay in<br />

retrieving land information, simplifying the process, and reducing<br />

the potential for corruption.<br />

We use Design-Reality gap model [5] as a theoretical framework<br />

to assess the project status. Primary data were collected from four<br />

different groups involved in the project including agency<br />

representatives from the Federal Government of Ethiopia, officials<br />

from the capacity building office of Diredawa City<br />

Administration, municipality representatives, and IT<br />

professionals. Our analysis revealed the main contributors for the<br />

success of the e-Government project and also show the<br />

implementation gaps which need due attention in the future to<br />

maximize the success of the project. Based on the implementation<br />

experiences of this project, list of recommendations are provided<br />

for successful execution of possible related initiatives in the<br />

future.<br />

Categories and Subject Descriptors<br />

J. [Computer Applications] J.1 [Administrative Data Processing]<br />

- Government; H.4 [Information systems Applications] H.4.m<br />

[Miscellaneous]<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Solomon Negash<br />

Department of Information Systems<br />

Michael J. Coles College of Business<br />

Kennesaw State University, USA<br />

770-420-4312<br />

snegash@yahoo.com<br />

210<br />

Mesfin Belachew<br />

Ministry of Communications and<br />

Information Technology, Ethiopia<br />

(+251) 911791462<br />

mesfinbelachew@gmail.com<br />

General Terms<br />

Management, Measurement, Performance<br />

Keywords<br />

e-Government, implementation success, Design-Reality gap<br />

model, ITPOSMO model, developing countries, low-income<br />

countries<br />

1. INTRODUCTION<br />

It has been said a lot about the tremendous role of e-Government<br />

to improve and more importantly transform the public sector<br />

especially in developing countries context. Although there are<br />

significant investments on e-Government initiatives in spite of<br />

limited budget, there are only few success stories recorded<br />

whereas majorities of those efforts end up in a failure. It is of the<br />

interest of all respective governments if those e-Government<br />

initiatives can be ideally successful as well as sustainable. In line<br />

with this there is also emerging keen interest to evaluate the<br />

contributions of such initiatives on the effectiveness and<br />

efficiency of their public services as it is natural to evaluate<br />

whether benefits out weight costs or not and as they ideally expect<br />

very much positive impacts in this regard.<br />

An e-Government project is said to be successful if most<br />

stakeholders attain their major goals and do not experience<br />

significant undesirable outcomes. Considerable amount of<br />

research has been carried out on the use and positive role of ICTs<br />

in low-income countries in areas such as health, public<br />

administration, and education [9]. And some studies have pointed<br />

out information systems project failure in low-income countries<br />

([7]; [4]). Researchers have also argued that most of these projects<br />

fail either totally or partially due to ‘design-actuality’ [4] or<br />

‘design-reality’ gaps [5], long-term sustainability problems [1], or<br />

lack of commitment on the part of political leadership and public<br />

managers [2].<br />

According to a study curried out by Heeks (in [4, p.2]) who has<br />

done substantial research in the subject area, most<br />

implementations of e-Government in low-income countries fail,<br />

with 35% being classified as total failures (project was never<br />

started or was started but immediately abandoned), and 50% are<br />

partial failures (major goals are not attained and/or there were<br />

undesirable outcomes). Similarly, in a study by [6], it was<br />

estimated that US$3 trillion will be spent on information


technology (IT) projects by governments during the ten year<br />

between 2000 and 2010; with the overall estimated failure rate of<br />

60%, much of this investment will go to waste. This is a<br />

disturbing fact, especially as developing countries have limited<br />

resources at their disposal.<br />

One way to avoid failure is to learn from successful projects<br />

within the developing countries. If we find such a project that is<br />

successful, then we should analyze why it was a success in order<br />

to learn lessons for other Developing Country e-Gov projects.<br />

Especially lessons learned from other low-income countries are<br />

more relevant for this group and encourage South-to-South best<br />

practice sharing. The e-Government system under consideration is<br />

a partial failure. What we are actually asking in this paper is how<br />

we can seek to steer projects that are partial failures from failure<br />

to success just by assessing progress to date, and identifying<br />

future action priorities to enable greater success.<br />

The rationale for the study is, thus, to promote local best practices<br />

while learning from strengths and mistakes of those initiatives so<br />

far. Hence, the main objectives of this study are exploring the<br />

factors critical to the success of the e-Government initiative;<br />

identify the extent of success, and forward recommendations for<br />

future action. In addition, we present the application of the<br />

Design-Reality Gap model, a theoretical model that explains<br />

success/failure of IT project implementation in low-income<br />

countries, vis-à-vis e-Government project.<br />

2. A CASE STUDY OF LAND<br />

MANAGEMENT INFORMATION<br />

SYSTEM (LMIS)<br />

The Ethiopian ICT Development Agency (EICTDA) is a<br />

government body responsible to promote integration and<br />

utilization of ICT in Ethiopia. The deputy director of the Agency<br />

related to us one of an e-Government project in a city<br />

municipality in one of the regional governments. This piece of<br />

work is aimed at analyzing the project which is known as Land<br />

Management Information System (LMIS). This system is<br />

considered as a successful both by EICTDA and the Diredawa<br />

city administration.<br />

The Land Management Information System (LMIS) under<br />

consideration was launched mid 2009 at Diredawa city<br />

administration. Diredawa is located in eastern part of Ethiopia and<br />

is one of the two city administrations directly reporting to the<br />

Federal government of Ethiopia. The LMIS was initiated by the<br />

ICT development bureau of the administration and outsourced in<br />

an open bid to a local software developing company. The<br />

application is aimed at managing the land-related information of<br />

the city. It has taken about a year to implement the system. The<br />

key stakeholders involved in the process of implementation were<br />

the top management, the Capacity Building Bureau, and the ICT<br />

staff in the city administration.<br />

The new system manages and provides information related to<br />

land(s) owned by residents. More specifically, it manages and<br />

provides basic information about the land(s) including size (area<br />

in sq. meter), zoning (such as commercial, residential, school, or<br />

church), plan number, and file number (container number). It also<br />

manages information on personal details (such as family<br />

information – spouse, children), documents (scanned softcopy of<br />

211<br />

each piece of paper that indicate different historical information in<br />

the land owner’s file/container), and address (address for the<br />

owner).<br />

Current<br />

Reality<br />

Information<br />

Technology<br />

Processes<br />

Objectives<br />

and values<br />

Staffing and<br />

skills<br />

Management systems<br />

and structures<br />

Other resources time<br />

and money<br />

Design proposal for<br />

New eGov project<br />

Information<br />

Technology<br />

Processes<br />

Objectives<br />

and values<br />

Staffing and<br />

skills<br />

Management systems<br />

and structures<br />

Other resources time<br />

and money<br />

Figure 1. The ITPOSMO dimensions of e-<br />

Government project design-reality gaps [5]<br />

o Information - indicates the information used in the e-<br />

Government application (comparing the information<br />

o<br />

requirements contained within the design of the e-<br />

Government application vs. the information currently really<br />

being used in the organization);<br />

Technology – indicates the technology used in the agency<br />

(comparing the requirements contained within the design of<br />

the e-Government application vs. the real situation now);<br />

o Process – indicates the work processes undertaken in the<br />

agency (comparing the processes needed for successful<br />

implementation of the e-Government application vs. the real<br />

situation now);<br />

o Objectives – indicates the objectives and values that key<br />

stakeholders need for successful implementation of the e-<br />

Government application vs. their current real objectives and<br />

values;<br />

o Staffing and Skill - indicate the staffing numbers and skill<br />

levels/types required in/by the agency (comparing the<br />

requirements for successful implementation of the e-<br />

Government application vs. the real situation now);<br />

o Management and Structure – indicate the management<br />

systems and structures required in the agency (comparing the


equirements for successful implementation of the e-<br />

Government application vs. the real situation now);<br />

o Others – indicate such issues as the time and money required<br />

to successfully implement and operate the new application<br />

compared with the time and money really available now.<br />

3. COLLECTION OF DATA<br />

All the Primary data were collected from the supply side of the<br />

system as citizens have no direct interaction with the system yet.<br />

Thus, those involved in the project were considered. Accordingly,<br />

interview was made with the Deputy administrator of the city<br />

administration; head of the Capacity Building and ICT Sector<br />

Bureaus; head of the ICT sector in the capacity building bureau;<br />

seven top level managers in the city administration whose duties<br />

are highly related to the Land Management practice, and the<br />

system administrator of the new system. In addition, group<br />

discussion was made with the four IT staff (data encoders) in the<br />

city administration. The questions for the structured interview<br />

were prepared based on the constructs of the Design-Reality gap<br />

model and a copy of the interview questions were given to each<br />

study subject at least two days in advance. But, some more<br />

clarifications were obtained through telephone conversation from<br />

two of the interviewees among the top level managers in the city<br />

administration during our discussion while rating the numerical<br />

values for each of the constructs in the Design-Reality Gap model.<br />

3.1 Presentation and analysis of data<br />

Thematic analysis [8] of the organizational reality and<br />

requirements within the design of the e-Government application<br />

was made based on the qualitative data collected from the field as<br />

per the seven ITPOSMO dimensions. Next, the rating of each<br />

dimension as well as the interpretation of the sum of the<br />

numerical values of the dimensions is made by adopting a detailed<br />

guideline available for same (See at<br />

http://www.egov4dev.org/success/techniques/risk_drg.shtml).<br />

The rating of each dimension was made in a coconscious among<br />

the three researchers based on the data at hand and<br />

recommendations made by interviewees during the group<br />

discussion. Accordingly, each dimension is numerically rated in a<br />

scale from zero to ten where zero is to mean no change between<br />

the design proposal and current reality; ten means complete<br />

change between the design and current reality; and five would<br />

indicate some degree of change. Finally, all the rating numbers for<br />

each dimension were added up and interpreted as depicted in<br />

Table 1.The original table is for use with predictive – i.e. pre-hoc<br />

design-reality gap analysis before implementation. As this system<br />

has already been implemented, we were interested in doing a midimplementation<br />

assessment in order to see what has been achieved<br />

so far, and where the project may go in future. Thus, rewordings<br />

were done on the items in the table accordingly.<br />

Table 1: Interpretation of total gap score<br />

Total Gap<br />

Score<br />

Interpretation<br />

0-14 The e-Government project well<br />

succeeded.<br />

15-28 There is partial failure in the e-<br />

Government project as actions are not<br />

212<br />

taken to close design-reality gaps.<br />

29-42 The e-Government project might fail<br />

totally, or might well be a partial<br />

failure unless action is taken to close<br />

design-reality gaps.<br />

43-56 The e-Government project may well<br />

fail unless action is taken to close<br />

design-reality gaps.<br />

57-70 The e-Government project certainly<br />

failed as actions are not taken to close<br />

design-reality gaps.<br />

4. DESIGN-REALITY GAP ANALYSIS<br />

AND DISCUSSIONS<br />

In this section we will use the seven dimensions from the Design-<br />

Reality Gap model to analyze the case study gaps. We will<br />

describe the design goals and the current reality followed by gap<br />

assessment between the two.<br />

4.1 Information<br />

The Land Management Information System (LMIS) was designed<br />

manage data on the basic land information and owner profile. It<br />

provides information on land purpose/zoning (commercial vs.<br />

residential), lot size, land location, land identification number,<br />

other legal information in relation to that piece of land, the land<br />

owner name and address, spouse name, children names, and<br />

household number. The system design requires all supporting and<br />

related documents to be scanned and available online.<br />

In reality majority of the land and user profile information are<br />

made ready by the new system except few documents to be<br />

scanned in incorporated.<br />

Gap = 3; a significant portion of the design goals are<br />

implemented. But supporting documents of few land owners were<br />

not scanned and incorporated yet.<br />

4.2 Technology<br />

The design called for technologies including scanners, server<br />

computer and local area network, Internet connection, and<br />

personal computers. Scanners needed to digitize the current paper<br />

based documents, new court decisions, and tax receipts. Server<br />

computer and network needed for storing information in a<br />

centralized location for access by decision makers including<br />

engineers, finance officers, land administrators, and city<br />

managers. Internet connection needed for off-site access mostly<br />

by field personnel. About fifteen personal computers with<br />

Pentium IV processor and at least 40GB hard disk space were<br />

needed for decision makers and data entry personnel.<br />

The implemented reality has all technology requirements except<br />

scanners and some concerns regarding the processing as well as<br />

storage capacity of the Personal Computers as their capacity is<br />

lesser than the required capacity.


Gap = 5; The weak and unreliable Internet connection provided by<br />

the Ethiopian Telecommunications and also the shortage of<br />

scanners weakens the Land Management Information System<br />

(LMIS) system ability to function in its full capacity.<br />

4.3 Processes<br />

A business process re-design project has preceded the Land<br />

Management Information System (LMIS) project. Therefore the<br />

business process for the Land Management Information System<br />

(LMIS) was already defined and in place in the manual system.<br />

The major top-level processes that the system is involved in<br />

include the following among others: Land information registration<br />

sub-process – aimed at registering and documenting all required<br />

information regarding the land management; Land ownership<br />

licensing sub-process – aimed at providing and approving<br />

ownership license to owners of plot of land for a given purpose<br />

(business; residence; public service; or other); and Information<br />

provision service – aimed at providing any information regarding<br />

a plot occupied for an owner or any other concerned body within<br />

and outside the city administration such as the court and others.<br />

The new system design followed the business process already<br />

implemented; hence the reality was the same as the design, except<br />

in few cases the workers are required to follow the old process in<br />

those cases where there is no scanned copies of any document<br />

about a land owner.<br />

Gap = 2; the design was intended to incorporate scanned<br />

documents. Although a small portion of the process it still poses<br />

minimal gap.<br />

4.4 Objectives and Values<br />

Two primary objectives and values of the design were efficient<br />

and transparent system. As to efficiency, the manual system took<br />

3-4 months to process land administration inquiries, reducing this<br />

long processing time was one of the design objectives. Regarding<br />

transparency also the manual system has introduced many<br />

loopholes that are prone to corruption; hence the design calls for a<br />

transparent system. The design in terms of transparency assumes<br />

that this objective is also shared by all the public servants.<br />

In relation to efficiency, the current reality shows a significant<br />

improvement in land administration processing both in time,<br />

effort, and resource consumption. The current system takes less<br />

than a day to complete land administration queries, a significant<br />

improvement that reduced the time from months to hours. The<br />

intended transparency, however, is compromised because decision<br />

makers find loopholes to revert to the manual system. Although<br />

the design requires buy-in to the goals of efficiency and<br />

transparency, and that this buy-in – while absent among some<br />

(corrupt) staff in the middle and lower levels of the decision<br />

making ladder – was present for few senior decision makers and<br />

the volunteers.<br />

Gap = 7; Lack of scanned document is used as a primary reason<br />

for reverting to the manual system, but also decision makers resist<br />

using the new system and find excuses to revert to the manual<br />

system. The intent to overcome corruption is minimized but not<br />

eliminated.<br />

213<br />

4.5 Staffing and Skills<br />

The design calls for personnel including one system administrator,<br />

one network administrator, one database administrator, four data<br />

encoders, and two computer maintenance crew. The design called<br />

for all personnel to have experience and the administrators to have<br />

at least a bachelor degree.<br />

In reality only five people were hired (the system administrator<br />

and the four data encoders), none had experience; they were all<br />

fresh graduates from ICT diploma program. Of course, they have<br />

stayed in the job for about a year on average and they have built<br />

up skills by learning on the job.<br />

Gap = 7; Five of the staffing positions were filled, skill level fall<br />

short of the design.<br />

4.6 Management Systems and Structures<br />

The design called for a new structure with an ICT department that<br />

manages the Land Management Information System (LMIS). The<br />

design also called for salary structure with clearly defined<br />

promotion levels. In reality the intended department was not<br />

created and the reporting structure falls under the existing land<br />

administration department. No permanent employees were hired;<br />

all ICT hires have temporary status.<br />

Gap = 8 failed to create the intended department and management<br />

structure.<br />

4.7 Other Resources<br />

In other resources we looked at cost and time overrun. The design<br />

was loosely defined to take a year. The city administration<br />

allocated the required one-time budget for the project. The project<br />

was completed in the projected time period. However there is<br />

acute shortage of budget to cover the running cost required just<br />

following the system implementation.<br />

Gap = 3; project time was as expected. Although money was spent<br />

to complete the project the city administration did not consider the<br />

running costs of the new system.<br />

5. CONCLUSIONS<br />

Summary of the Design-Reality gap is shown in Table 2.<br />

Table 2: Summary of Design-Reality gap<br />

SN Dimension Gap<br />

1 Information 3<br />

2 Technology 5<br />

3 Process 2<br />

4 Objectives and values 7<br />

5 Staffing and Skills 7


6 Management system and structure 8<br />

7 Other resources 3<br />

Total 35<br />

The total gap of 35 indicates that there is a partial failure in the e-<br />

Government project and the project may fail totally unless action<br />

is taken to close design-reality gaps; see Table 1 for reference.<br />

The largest gap is ‘management system and structure’ which is 8<br />

followed by significant gaps in ‘staff and skill’ & ‘Objectives and<br />

values’, both showing 7. The main reason for the large gaps in<br />

these three dimensions was the lack of awareness about the<br />

priority of such systems among the decision makers except the<br />

champions. The transparency objective is also lacking because the<br />

documents not scanned still require manual intervention, this in<br />

turn has created a loophole for corruption. Installing scanners to<br />

digitize the all process flows will further reduce the Design-<br />

Reality and increase the project success. These are clear<br />

indications for the fact that the project may still continue to be a<br />

partial failure unless those gaps are closed. However, in our<br />

discussion with the management they too have lately recognized<br />

this gap. In relation to the ‘management system and structure’<br />

dimension, we are also informed that a new ICT department has<br />

been proposed and getting ready to implement. We were also<br />

informed additional staff with appropriate skills will soon be<br />

hired. A permanent position with clearly defined promotion scale<br />

is also in the works. Reducing the gaps in these two areas will<br />

significantly increases the project success rate.<br />

The dimensions with the least Design-Reality gap are ‘process’<br />

and ‘other resources’. The business process changes made prior to<br />

the project launch became an opportunity and has made the<br />

process gap low. The typical resistance often experienced during<br />

business process change has already been done and implemented.<br />

‘Other resources (cost and time)’ gap was low because of the<br />

commitment from the project champion. Funding issues were not<br />

constrained by bureaucratic red tape; instead the champion had<br />

funded the project. The time commitment was also managed and<br />

accomplished by the project champion. The role of the champion<br />

played a critical role in materializing this project.<br />

Given the overall rating of 35, the e-Government project may well<br />

fail unless action is taken to close design-reality gaps. The main<br />

actions needed are to reduce the largest design-reality gaps (i.e.<br />

working on key issues such as Management system and structure,<br />

objectives and values, and staffing and skill, and also availing<br />

financial resources to cover the recurrent costs which resulted in<br />

large design reality gap). The Diredawa city administration should<br />

try to identify ways in each case to make design more like reality<br />

and/or to make reality more like design.<br />

Finally, the value of Design-Reality gap analysis model as a midimplementation<br />

assessment tool for e-government projects is<br />

worth mentioning. In this piece of work, we have found Design-<br />

Reality gap analysis model as valuable tool in that it has<br />

capability to show possible gaps during implementation which<br />

actually need proper intervention from stakeholders and we have<br />

noticed that the model can also serve as a mid-implementation<br />

assessment tool for e-government projects as it can be<br />

214<br />

longitudinally used at different points to see the progress in<br />

closing identified gaps in the process of implementation as well as<br />

post-implementation periods.<br />

The current research concludes with highlighting the following<br />

key findings and recommendations:<br />

o Project champions: As revealed in the study, the most<br />

critical factors that contributed to the success of the e-<br />

Government implementation are exceptional<br />

o<br />

commitment from few influential decision makers to<br />

overcome the barriers and challenges for change, the<br />

alignment of the new systems with the Business Process<br />

Reengineering initiative, and unreserved effort from<br />

volunteers to support the change effort by the<br />

government.<br />

The e-Government project was not initially planned as a<br />

solution in the overall reform effort by the city<br />

administration. Rather it came to being at the end of the<br />

comprehensive business process reengineering effort<br />

when the administration noticed that the new business<br />

processes cannot be put in place unless automation in<br />

undertaken. This in turn shows that unless short term<br />

and long term measures are taken in order to bridge the<br />

observed gaps in all the ITPOSMO dimensions and<br />

specifically the gaps in objectives and values; staffing<br />

and skill as well as financial resource constraint; the<br />

success and sustainability of these e-Government<br />

applications will definitely be in trouble.<br />

o Collaboration: Although not institutionalized, the effort<br />

made by few top management members and IT<br />

professionals in the capacity building bureau brought<br />

difference and hence credited for the success. Hence,<br />

the top management commitment takes the lion’s share<br />

of the achievement attained at the end of the day.<br />

o Staffing, Skills and structure: The IT professionals are<br />

not recognized as permanent in the current<br />

o<br />

organizational structure and as a result they are working<br />

in a temporary basis. This may disappoint the<br />

professionals and force them look for better job and<br />

salary elsewhere which in turn endanger the day to day<br />

operation of the application put in place. It should be<br />

underlined that the success of such initiatives depends<br />

largely on human skills and capabilities. Hence,<br />

education and training initiatives must be considered as<br />

priority actions. Staff need to be trained to handle new<br />

processes and activities; they have to be given<br />

incentives to prevent the brain drain of skilled people;<br />

and they need to feel part of the organization by<br />

engaging in the decision making process. Planned and<br />

continuous awareness creation effort through series of<br />

workshops, events, seminars, and conferences is<br />

required in the future to better create clear impression<br />

about the benefits of the new system among all<br />

stakeholders.<br />

Continuous improvement: Evaluating such an effort<br />

should not be one time activity rather it should be done<br />

periodically in order to assure long term success of the<br />

new system.


6. ACKNOWLEDGEMENT<br />

We are grateful to the management of Ethiopian Information &<br />

Communication Technology Agency (EICTDA) of the Federal<br />

Democratic Government of Ethiopia for partially sponsoring the<br />

case study.<br />

7. REFERENCES<br />

[1] Aichholzer, G., Scenarios of eGovernment in 2010 and<br />

implications for strategy design, Electronic Journal of<br />

eGovernment, 2(1), 2004, 1–10.<br />

[2] Bhatnagar, S., Social implications of information and<br />

communication technology in developing countries: Lessons<br />

from Asian success stories, The Electronic Journal of<br />

Information Systems in Developing Countries, 1(4), 2000, 1–<br />

9.<br />

[3] Dada, D., The Failure of EGovernment in Developing<br />

Countries: A Literature Review, The Electronic Journal on<br />

Information Systems in Developing Countries, 26, 7 (2006)<br />

215<br />

[4] Heeks, R., Information systems and developing countries:<br />

Failure, success, and local improvisations, The Information<br />

Society, 18(2), 2002, 101–112.<br />

[5] Heeks, R., Most eGovernment-for-development projects fail:<br />

How can risks be reduced? iGovernment Working Paper<br />

Series, paper no. 14, 2003.<br />

[6] Heeks, R. and Stanforth, C., Understanding eGovernment<br />

project trajectories from an actor-network perspective,<br />

European Journal of Information Systems, 16, 2007,165-177.<br />

[7] Ndou, V., E-Government for Developing Countries:<br />

Opportunities and Challenges, The Electronic Journal on<br />

Information Systems in Developing Countries, 18(1), 2004,<br />

1-24 http://www.ejisdc.org (2004)<br />

[8] Orodho, A. J. and Kombo, D.K., Research Methods.<br />

Nairobi:Kenyatta University, Institute of Open Learning,<br />

2002.<br />

[9] Walsham and Shahy, Information Systems Research<br />

Landscape in Developing countries, Information Technology<br />

for Development, 2005, Published online in Wiley<br />

InterScience (www.interscience.wiley.com), Wiley<br />

Periodicals, Inc.


Measuring Organizational Interoperability in Practice: The<br />

case study of Population Welfare Department of<br />

Government of Sindh, Pakistan<br />

ABSTRACT<br />

Devender Maheshwari<br />

Technical University Delft<br />

2628 BX DELFT<br />

The Netherlands<br />

Tel. 0031152783284<br />

D.Maheshwari@tudelft.nl<br />

Government organizations use technology to interoperate with<br />

each other in order to provide effective and efficient services to<br />

the citizens. Interoperation between these organizations is<br />

challenging due to the organizational differences among different<br />

types of public organizations. Measuring organizational<br />

interoperability of government organizations using technological<br />

advancements is difficult and often remains at the technical level<br />

and do not measure the organizational level. Existing<br />

interoperability models and frameworks focus on different aspects<br />

of organizational and technical interoperability independently; but<br />

there is hardly any single measurement instrument addressing<br />

both. Though the interoperability models and frameworks<br />

describe the layers, levels, and stages; they do not identify any<br />

assessment constructs for measuring and benchmarking the<br />

organizational interoperability. This paper investigates<br />

interoperability maturity models to identify assessment layers for<br />

measuring and benchmarking the interoperability, and propose the<br />

measurement instrument that will allows government<br />

organizations to effectively measure organizational<br />

interoperability. We develop a list of measurement constructs for<br />

the sub-layers of organizational interoperability layer to assess the<br />

maturity of organizational interoperability. Finally, we conduct a<br />

case study at Population Welfare Department Government of<br />

Sindh, Pakistan to investigate the applicability and usefulness of<br />

the organizational layer and its measurement constructs in the<br />

proposed interoperability measurement instrument for assessing<br />

the maturity of organizational interoperability.<br />

Categories and Subject Descriptors<br />

D.2.12 [Interoperability]: Distributed objects; H.1.1. [Information<br />

Systems]: Models and Principles –Systems and Information<br />

Theory; H.4 [Information Systems Applications]: Miscellaneous;<br />

J.1 [Administrative Data Processing]: Government<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

216<br />

Marijn Janssen<br />

Technical University Delft<br />

2628 BX DELFT<br />

The Netherlands<br />

Tel. 0031152781140<br />

M.F.W.H.A.Janssen@tudelft.nl<br />

General Terms<br />

Measurement, Documentation, Design, and Theory<br />

Keywords<br />

E-government, Interoperability, Measurement, Benchmarking,<br />

Public Service Organizations.<br />

1. INTRODUCTION<br />

Interoperability is described to have significant impact on public<br />

organizations to advance the processes, procedures, operations,<br />

and effective service provision to the citizens [30-31, 37-38].<br />

Maturity of public organizations is often characterized by the<br />

interoperability as a key element for e-government integration,<br />

new connectivity creation among networks, information sharing,<br />

and collaboration [13, 21, 27]. Measuring interoperability is not<br />

only a technological challenge, but a sociotechnical matter since<br />

both technical as well organizational capabilities reflect the<br />

maturity of public organizations [16, 38, 48]. This means that the<br />

aspects of organizational interoperability are equally important for<br />

interoperability measurement. Hjort-Madsen [21] describes that<br />

the complexity of organizational aspects of interoperability may<br />

surpass the technical as the public organizations move toward<br />

inter-organizational governance. Van der Veer and Wiles [50, p-6]<br />

describe the organizational interoperability as “the ability of<br />

organisations to effectively communicate and transfer<br />

(meaningful) data [7] even though they may be using a variety of<br />

different information systems over widely different<br />

infrastructures, possibly across different geographic regions and<br />

cultures”, whereas the European Interoperability Framework (EIF)<br />

IDABC [23, p-16] describes it as "defining business processes and<br />

bringing about the collaboration of administrations that wish to<br />

exchange information and may have different internal structures<br />

as well as aspects related to requirements of the user community”.<br />

Recently, this bias has been criticized by many as the public<br />

organizations interoperate more and more with each other for<br />

information sharing to provide effective and efficient services.<br />

Hence, the need of disparate back-office systems to interoperate<br />

and collaborate with each other requires enhanced interoperability<br />

among different back-offices. Interoperability in literature is<br />

mostly described from technical viewpoint as a capability of<br />

different systems to exchange and share information in useful<br />

manner [2, 24, 33, 41]. Many definitions of interoperability can be<br />

found in literature [10, 24-25, 33, 41].<br />

It is easily ascertained from the literature that several authors and<br />

organizations discuss technical aspects of interoperability<br />

standards e.g. [3, 9, 11, 34, 46, 49]; whereas the organizational


aspects are hardly discussed as they are messy. Goldkuhl [16]<br />

describes that the interoperability is not only a technical subject,<br />

but there is a need to conceptualize the organizational aspects as<br />

well. He further explains that the interoperability is also about<br />

what people do for information systems to interoperate. Scholl<br />

and Klischewski [41] describe that the assessment of<br />

interoperability is still unclear and faces many challenges, the<br />

evaluation and measurement methods need to be investigated<br />

properly. They also identify nine major constraints that affect the<br />

interoperability: 1) constitutional, 2) jurisdictional, 3)<br />

collaborative, 4) organizational, 5) informational, 6) managerial,<br />

7) technological, 8) cost, and 9) performance. Some of these<br />

constraints also reflect the organizational aspects of<br />

interoperability and need to be included in interoperability<br />

measurement process. Aspects of organizational Interoperability<br />

can be measured within an organization between two or more<br />

information systems as well as between different organizations<br />

with multiple information systems.<br />

This paper presents a measurement instrument and a set of<br />

measurement constructs to assess and benchmark organizational<br />

aspects of interoperability. Section 2 discusses the interoperability<br />

maturity models and frameworks to investigate the organizational<br />

aspects of interoperability. Section 3 proposes the interoperability<br />

measurement instrument and derives the measurement constructs<br />

for each sub-layer of the organizational interoperability layer. In<br />

section 4, a case study is conducted at the population welfare<br />

department government of Sindh, Pakistan using the developed<br />

organizational layer and its measurement constructs for assessing<br />

the organizational interoperability. Finally, section 5 discusses the<br />

results of the outcome of case study.<br />

2. BACKGROUND<br />

Interoperability maturity models described in literature mostly<br />

focus on the technical aspects of public organizations [3, 9, 11, 22,<br />

28, 34, 46]; whereas the organizational aspects are parsley<br />

discussed with little emphasis on the measuring and<br />

benchmarking perspective. Measures to assess organizational<br />

interoperability are hardly indicated in these interoperability<br />

maturity models. Maheshwari et al. [32, p-2] discuss ten different<br />

interoperability maturity models and related measurement<br />

approaches to investigate the interoperability measurement issues<br />

and challenges in public service organizations. Only a handful of<br />

maturity models [16, 22-23, 28] discuss the aspects of<br />

organizational interoperability, whereas the majority remains<br />

centrally focused on technical interoperability. Furthermore, they<br />

argue that the measuring and benchmarking the interoperability of<br />

public organizations is challenging as it encompasses a<br />

widespread array of diverse areas and dimensions. In a similar<br />

vein, Shahkooh et al. [43] investigated some generic (e.g.<br />

INTEROP NoP, NEHTA, and IDEAS) and country specific (e.g.<br />

Australia, Malaysia, New Zealand, and United Kingdom) egovernment<br />

interoperability frameworks. They, after investigating<br />

different frameworks describe interoperability as:<br />

“a set of policies, strategies, standards, guidelines, and<br />

instructions to connect different governmental organizations in<br />

order to facilitate fast and easy information exchange to deliver<br />

services to the citizens, businesses, and employees” [43, p-65]<br />

Thus, the interoperability on the whole is a combination of<br />

technical as well organizational aspects that affect the information<br />

exchange and sharing between any two or more entities. Though<br />

the existing interoperability models and frameworks sparsely<br />

217<br />

address these issues in different layers, levels, and steps; there are<br />

hardly any guidelines to incorporate these aspects into a single<br />

measurement instrument. This paper proposes the measurement<br />

instrument that incorporates both technical and organizational<br />

aspects of interoperability. In order better understand the<br />

interoperability measurement layers, we investigate the selected<br />

interoperability maturity models and frameworks that are<br />

commonly discussed literature and utilized by national and<br />

international organizations:<br />

Levels of Information Systems Interoperability (LISI): The<br />

LISI model developed by the US Department of Defense (DoD)<br />

comprises of five levels i.e. isolated systems, connected systems,<br />

functional distributed, domain integrated, and enterprise universal.<br />

These levels of LISI are centrally focused on the technical<br />

interoperation of the systems [18, 35, 43, 46].<br />

NC3TA Reference Model for Interoperability (NMI): The<br />

NMI model also mainly focuses on the technical aspects of<br />

interoperability while including the interoperability degrees i.e.<br />

unstructured data, structured data, seamless data sharing, and<br />

seamless information sharing to classify the content type of the<br />

exchanged data and information flows. The model aims to<br />

improve the functional efficiency by introducing the structured<br />

data interpretation and exchange [35, 46].<br />

Organizational Interoperability Model (OIM): The IOM model<br />

is an extension of LISI model that includes the organizational<br />

aspects of interoperability. Although the model only focuses on<br />

the organizational interoperability, the levels of OIM i.e.<br />

independent, ad-hoc, collaborated, integrated, and unified are<br />

closely aligned with the environmental description of levels of the<br />

LISI model. OIM model provides some information in each level<br />

for shared value systems, shared goals, and common structures but<br />

does not provide any guideline to achieve the desired<br />

organizational interoperability [9, 18, 35].<br />

Levels of Conceptual Interoperability Model (LCIM): The<br />

LCIM model in [18, 35, 46] describes five levels of conceptual<br />

interoperability i.e. system specific data, documented data, aligned<br />

static data, aligned dynamic data, and harmonized data. The<br />

model shows that the interoperability is not only subjective to the<br />

technical capability of the systems but also the composability on<br />

the conceptual levels. The levels of LCIM conceptual model were<br />

later extended and reproduced [47, 49] as i.e. no-interoperability,<br />

technical interoperability, syntactic interoperability, pragmatic<br />

interoperability, dynamic interoperability, and conceptual<br />

interoperability. The LCIM conceptual models also centrally<br />

focus on the technical interoperability of the systems [18, 35, 46-<br />

47].<br />

European Interoperability Framework (EIF): The EIF 1.0<br />

framework by Interoperable Delivery of European eGovernment<br />

Services to public Administrations, Businesses and Citizens<br />

(IDABC) was first introduced in 2004 [23]; which was later<br />

upgraded to EIF 2.0 in 2008 [22]. The version EIF 1.0 comprised<br />

of three layers i.e. organizational, semantics, and technical; which<br />

were extended to five layers in EIF 2.0 i.e. organizational,<br />

semantics, technical, political, and legal interoperability. Unlike<br />

other models and frameworks (LISI, NMI, OIM, LCIM), the EIF<br />

focused not only on technical interoperability but also other<br />

organizational aspects of the interoperability [15-16, 22-23, 30,<br />

43].<br />

European Interoperability Maturity Model (EIMM): The<br />

EIMM by Advanced Technologies for interoperability of


Heterogeneous Enterprise Networks and their Applications<br />

(ATHENA) comprises of five levels i.e. performed, modeled,<br />

integrated, interoperable, and optimizing. ATHENA intended to<br />

assess the interoperability in enterprise domain using EIMM. The<br />

model specifically focuses on both organizational as well<br />

technical aspects of interoperability in enterprise domain [3, 18].<br />

Though the maturity models are developed by different individual<br />

researchers [9, 46], national [11], and international [22, 34]<br />

organizations; none of these models or frameworks discuss<br />

measures to assess the organizational aspects of interoperability.<br />

The stages, levels, and layers are sequentially numbered without<br />

any further guideline about the measurements method or the<br />

measures themselves. Literature reviews of interoperability<br />

maturity models and frameworks suggests that the maturity of<br />

technical interoperability is somewhat achievable due the<br />

established standards and policies, but the aspects of<br />

organizational interoperability e.g. policies, business processes,<br />

financial, and governance are important and need to be addresses<br />

carefully. In other words, some of the organizational aspects are<br />

often described as the barrier of interoperability adoption and<br />

implementation [1, 12, 41].<br />

3. MEASUREMENT APPROACH<br />

Literature review of maturity models and frameworks discussed in<br />

Section 2 gives insight about the importance of organizational<br />

aspects of interoperability, but does not provide sufficient<br />

guideline to measure organizational interoperability. The maturity<br />

models describe interoperability levels in a linear fashion, whereas<br />

these levels are implemented on top of each other in practice.<br />

Although some authors [e.g. 50] argue that the successful<br />

implementation of technical, syntactical, and semantic<br />

interoperability is necessary for organizational interoperability,<br />

whereas others [e.g. 28, 32] suggest that both organizational as<br />

well technical interoperability can be implemented on top of each<br />

other. This paper proposes a two layered measurement instrument<br />

where each layer can be implemented on top of each other.<br />

Organization Layer<br />

• Policy<br />

• Enterprise architecture<br />

• Business process<br />

• Judicial<br />

• Governance<br />

• Economical<br />

Technical Layer<br />

• Syntactic<br />

• Semantic<br />

• Physical infrastructure<br />

Figure 1 Interoperability Measurement Instrument.<br />

Proposed measurement instrument as shown in Figure 1 is based<br />

on the methodology of architecture layers of interoperability by<br />

[28], whereas the selection of layers based on the socio-technical<br />

design approach. Bostrom and Heinen [6] argue that the success<br />

of the organizations depend socio-technical system (STS), where<br />

social system represents people and structure and technical system<br />

218<br />

represents technology and tasks. Measurement aspects of the<br />

technical and organizational interoperability as shown in Figure 1<br />

are derived based on the literature review interoperability maturity<br />

models and frameworks. Janssen and Scholl [28] describe that the<br />

settlements should be reached among various involved partners to<br />

avoid unwanted situations regarding the quality, compatibility,<br />

and extent of information collaboration and interoperation. The<br />

arrows shown in the Figure 1 from top to bottom and bottom to<br />

top of each layer shows that implementation of interoperability<br />

layers is non-linear, which means that each layer can be<br />

implemented independent of each other. Hence, the<br />

interoperability measurement aspects of each layer are relative,<br />

but can be measured independently.<br />

The explanation of technical sub-layers is already clear and well<br />

defined by many organizations as well as individual authors [e.g.<br />

22-23, 28, 32, 49], whereas the organizational interoperability and<br />

the measurement aspects of its sub-layers are hardly discussed in<br />

literature. Therefore, this paper briefly discusses the measurement<br />

aspects of organizational layer and derives the adequate<br />

measuring and benchmarking constructs for each sub-layer.<br />

3.1 Organizational Layer<br />

Organizational factors (e.g. technology adaption, economic<br />

constraints, openness, and back-office cooperation) and<br />

organizational issues (e.g. collaboration, business process, and<br />

coordination) that impact the performance of information systems<br />

are used to describe interoperability [14, 16-17]. Organizational<br />

layer places the foundation for functional infrastructure of public<br />

organizations for collaboration, exchange, and sharing of<br />

information. Table 1 gives short description of each organizational<br />

sub-layer as depicted in Figure1. Interoperability sub-layers<br />

explained in Table 1 are sparsely described in literature, but there<br />

is hardly any discussion about the measures to assess them.<br />

Tolk, Turnitsa et al. [47] describe that the pragmatic<br />

interoperability can reflect the maximum maturity if the<br />

information sharing by the sender as well receiver is translucent,<br />

clear, and truthfully interpretable. Policy sub-layer analyzes the<br />

maturity of organizational aspects and helps to avoid the adverse<br />

effects by identify the limitations. This layer also envisages<br />

personal, environmental, standardization, and policy aspects to<br />

distinguish the types of communication, and embraces the<br />

information exchange intention of sender [28, 39].<br />

For the public organizations aiming to facilitate citizens and<br />

businesses with seamless service delivery, the enterprise<br />

architecture can perform the essential role and provide guidance to<br />

address organizational issues [19]. Enterprise architecture of a<br />

public organization provides systematic understanding of basic<br />

elements describing existing and anticipated environment [5].<br />

Thus, enterprise architecture is useful to measure the basic<br />

information about organizational elements. Tough enterprise<br />

architecture encapsulates majority of organizational aspects, we<br />

only focus on interoperability related measures. Thus, the sublayer<br />

enterprise architecture is used to measure the basic<br />

information about human resource and formal communication.<br />

Interoperability in public organizations aims to improve the<br />

service provision by advancing the business processes and<br />

procedures for citizens, business, employees [32]. The business<br />

process sub-layer in this context measures the processes and<br />

procedures alignment, whereas the processes and procedures for<br />

information exchange and sharing between the collaborating and<br />

interoperating information systems are often reflected by the


service level agreements. The interoperating information systems<br />

desire comprehensive, understandable, and coherent re-adaptation<br />

of business processes.<br />

Judicial aspects of interoperability are sparsely described by many<br />

[3, 8, 22-23, 28, 41, 49] as an important factor affecting the<br />

Sub-layers Description Constructs<br />

Policy<br />

Enterprise<br />

Architecture<br />

Business<br />

Process<br />

Judicial<br />

Governance<br />

Economical<br />

This layer deals with<br />

back-office procedures<br />

and processes between<br />

the interoperating<br />

systems from policy<br />

perspectives for clear,<br />

transparent, and truly<br />

interpretable exchange<br />

of information by<br />

sender as well as<br />

receiver [41, 47].<br />

Enterprise architecture<br />

represents wide-spread<br />

areas of public<br />

organizations that can<br />

be effective to resolve<br />

interoperability<br />

conflicts [40] as a mean<br />

to measure the basic<br />

information.<br />

Business process deals<br />

with the alignment of<br />

business processes and<br />

procedures, valuecreation,<br />

monitoring,<br />

controlling, and long<br />

and short term<br />

agreements.<br />

Judicial layer reflects<br />

the organizational laws<br />

and regulations,<br />

constitutional and legal<br />

restraints, and<br />

organizational safety<br />

and security issues that<br />

affect the interaction of<br />

information systems.<br />

Governance<br />

mechanisms determine<br />

how communication,<br />

responsibilities, and<br />

decision-making<br />

structures are<br />

formalized [26, p.2307].<br />

Economic layer<br />

concerns the issues that<br />

limit the overarching<br />

scope of<br />

interoperability.<br />

1. Context and<br />

demarcation<br />

s<br />

2. Collaboratio<br />

n<br />

3. Policies<br />

4. Standards<br />

5. Formal<br />

communicat<br />

ion<br />

6. Human<br />

resource<br />

Formal<br />

7. Processes<br />

and<br />

procedures<br />

alignment<br />

8. Service level<br />

agreements<br />

9. Laws and<br />

regulations<br />

10. Constitution<br />

al restrains<br />

11. Political<br />

commitment<br />

12. Jurisdictiona<br />

l regulations<br />

13. Change<br />

management<br />

14. Environmen<br />

t and ethics<br />

15. Financial<br />

constraints<br />

overall maturity of interoperability. This sub-layer discusses the<br />

219<br />

law and regulation and constitutional restrains that affect the<br />

maturity of interoperability. Goldkuhl [16, p-4] describes the<br />

judicial interoperability as “congruence between different laws<br />

and regulations”. According to Janssen and Scholl [28] the<br />

governance in public organizations is differentiated by the wellorganized<br />

and cogent interoperation among organizational<br />

mechanisms, as long as these mechanisms guide in the correct<br />

direction.<br />

Table 1 Organizational sub-layers and measurement constructs<br />

Janssen and Joha [26, p-2307] explain that the “governance<br />

mechanisms determine how communication, responsibilities, and<br />

decision-making structures are formalized”. Measures to assess<br />

the maturity of judicial sub-layer of organizational interoperability<br />

include political commitment, jurisdictional regulations, and<br />

change management. Finally, we define the economical sub-layer<br />

of interoperability, which is discussed quite often in literature but<br />

rarely incorporated in maturity models and frameworks. This sublayer<br />

describes the financial issues of organization interoperability<br />

that restricts the overarching purview and affects the maturity e.g.<br />

return on investment. Based on the literature review of<br />

organizational interoperability and interoperability maturity<br />

models and frameworks in Section 2 we derived the sub-layers of<br />

organizational interoperability as discussed in Section 3. In order<br />

to briefly understand the importance and classification of these<br />

sub-layers of organizational interoperability, we will discuss each<br />

measurement construct shown in Table 1 in details.<br />

3.2 Measurement Constructs Organizational<br />

Interoperability<br />

In this subsection the constructs are further detailed and refined to<br />

enable the assessment in real-life situations.<br />

1. Context and demarcation. Interoperability requires clear and<br />

distinctive interoperation between information systems, processes,<br />

organizations, and employees. According to Strang, Linnhoff-<br />

Popien et al. [44, 45], clear and distinctive contextual<br />

interrelationship and specifics help to assess the interoperability<br />

compatibility and substitutability. Although there is an informal<br />

consensus about the context and demarcations of technical<br />

interoperability, the contextual definitions, goals, objectives,<br />

ontologies, and demarcations of organizational interoperability is<br />

hardly discussed in literature. This measure gives a reflection of<br />

the level of to-the-point clearness and distinctiveness of<br />

organizational interoperability [32].<br />

2. Collaboration. Inter and intra-organizational interactive and<br />

willing full working relationship in public organizations [32],<br />

where the shared goals, and roles and responsibilities are<br />

recognized to support organizational interoperability [9].<br />

Although the organizational framework can be distinct in nature,<br />

the collaboration is essential for organizational interoperability.<br />

This measure determines the level of organizational collaboration.<br />

3. Standards. Although policies and standard are two separate<br />

measures, their description and implications are somewhat interrelated.<br />

Standards are necessary for organizational interoperability<br />

as majority of maturity models and frameworks are still<br />

conceptual. In our view, standards are essential to advance<br />

organizational interoperability. They can describe the conceptual<br />

settlements between the concerned interacting quarters in subtle<br />

agreed documented format in consultation with recognized<br />

standardization bodies [52].


4. Policies. This is also a necessity of pubic organizations to<br />

ensure the effective implementation of the organizational<br />

interoperability as per the standards. Depending on the size,<br />

scope, and type of organization (local, regional, or national), the<br />

policies for organizational interoperability is required for business<br />

process alignment among the interoperating quarters with regional<br />

and national policies and regulations [52].<br />

5. Formal communication. Communication of information in<br />

public organizations using pre-defined proper channels is<br />

important for interoperability. Weedman [51] describes the formal<br />

communication as a core for any established field as it offers<br />

opinions, discoveries, suggestions, improvements, experiences,<br />

and ideas. For example regular meetings between the responsible<br />

authorities and employees will help both to resolve issues with<br />

mutual cooperation and understanding. The measure determines<br />

the frequency of formal meetings and communication channels for<br />

information exchange and sharing at the organizational<br />

interoperability level.<br />

6. Human resources. Unlike other layers, the interoperability at<br />

organizational layer is also subject to the capability of the<br />

effective human resources. Adaption of new technological<br />

advancements, policies, agreements, procedures, and processes<br />

not only requires willingness but also skills and knowledge. This<br />

measure determines the maturity of human resources for<br />

implementation of organizational interoperability.<br />

7. Processes and procedures alignment. Interoperability is often<br />

related to business processes and procedures, IDABC [22-23]<br />

refer to organizational interoperability as describing business<br />

processes and procedures. Janssen and Scholl [28] state that<br />

business process layer derives the attention to process-driven<br />

integration. Alignment of processes and procedures helps public<br />

organizations with business transitions, integration, control and<br />

monitor, value-creation, and management of interoperability<br />

related issues.<br />

8. Service level agreement. Interoperability at organizational<br />

level is subject to agreements, negotiations, and compliance of<br />

service related terms and conditions for effective information<br />

sharing and exchange. Thus, the quality of service (QoS)<br />

requirements is agreed between the concerned stakeholders to<br />

ensure the minimum service delivery. Service level agreements<br />

are strictly bound for implementation and incompliance is<br />

rewarded with heavy penalties. European interoperability<br />

framework [23] discusses that several service level agreements<br />

can be made for organizational interoperability based on the<br />

demand and business process connections [29].<br />

9. Laws and regulations. Organizational interoperability is still at<br />

the conceptual level [38, 41, 48]. There is a desire for new laws<br />

and regulations for effective and efficient information sharing and<br />

exchange at organizational level. This measure illustrates the need<br />

for new laws and regulations for organizational interoperability on<br />

top of the existing laws and regulations.<br />

10. Constitutional restrains. Scholl and Klischewski [41] explain<br />

that the interoperability objectives are not aligned with the<br />

democratic government’s constitutional power distribution at<br />

national, regional, and local levels etc. Though the constitutions<br />

limit the organizational interoperability objectives to certain<br />

boundaries, the objectives have not yet reached the desired<br />

maturity within those boundaries. This measure determines the<br />

maturity of organizational interoperability objectives within the<br />

constitutional boundaries in public organizations.<br />

220<br />

11. Political commitment. Pardo and Burke [37] describe that<br />

political commitment is necessary for public organizations to<br />

continue with their objectives for implementation of long-term<br />

projects in case of the changes in political administration. Political<br />

commitment is a need for consistency to ensure the success of<br />

organizational interoperability. This measure evaluates the<br />

political commitment for organizational interoperability.<br />

12. Jurisdictional regulations. Public organizations at different<br />

levels (national, regional, and local) follow distinct patterns of<br />

business processes and information handling. They operate<br />

independent of each other [42] and have the liberty to interoperate<br />

or share the information only if they volunteer [20]. To avoid illuse<br />

of this liberty, jurisdictional regulations are essential to<br />

engage public organizations for information sharing and<br />

interoperation. This measure determines the implementation of<br />

jurisdictional regulations for organizational interoperability.<br />

13. Change management. Organizational leadership and<br />

management are responsible for execution different task and<br />

assignments. Leaders are responsible guidance, motivation,<br />

creativity, innovation, and resource mobilization to achieve the<br />

organizational objectives [36]. In the context of organizational<br />

interoperability, Maheshwari, Veenstra et al. [32] describe the<br />

leadership responsibilities as “smooth execution of tasks by<br />

assigning right-job-for-right-person”. Hence, the organizational<br />

interoperability requires effective change management.<br />

14. Environment and ethics. Organizational culture and ethics<br />

has direct influence on the interoperability. Working environment<br />

free of rivalries and inimical behavior allows employees to<br />

interoperate easily for information exchange and sharing among<br />

different stakeholders. Though hardly discussed in literature, this<br />

aspect of organizational interoperability can be useful for assess<br />

the internal working environment.<br />

15. Financial constraints. Financial aspects have greater<br />

importance in practice over others concerning the quality and<br />

maturity of interoperability. Dos Santos and Reinhard [12] infer<br />

that financial barriers limit organizations to procure resources<br />

based on lower price than better quality. Interoperability<br />

initiatives by public organizations face challenges of major<br />

resistance for change acceptance, which can also result in<br />

financial turmoil. Therefore, the overarching return on<br />

interoperability investments not only reflects the financial success,<br />

but also the level of change acceptance.<br />

4. A CASE STUDY OF POPULATION<br />

WELFARE DEPARTMENT<br />

GOVERNMENT OF SINDH<br />

As an illustrative case study research case, the proposed<br />

measurement instrument and constructs were applied to assess the<br />

organizational interoperability of Population Welfare Department<br />

(PWD) Government of Sindh, Pakistan in January, 2012. The<br />

research method was based on open-ended interviews with the top<br />

management followed by a survey session with the experts from<br />

different sub-departments to test the applicability and usefulness<br />

of organizational measurement constructs. The purpose of<br />

conducting the open-ended interviews with the top managmenet<br />

was to refine the proposed measruement model before conducting<br />

the structured survey session. Furthermore, a survey session not<br />

only allowed selected participants to fill-in the questionnaire but<br />

also inteactive discussions, reflections, suggestions, and feedbacks<br />

about the survey itself and measurement instrument. With


concensus of all participants, the technical interoperability was<br />

pusposefully excluded from the survey session as the maturity of<br />

the technical interoperability was already available and<br />

documented.<br />

The case study was designed specifically based on the relationship<br />

among the open-ended interviews and the sturctured survey<br />

session from the measuring and benchmarking pespectives. The<br />

open-ended interviews allowed us to not only ask the indepth<br />

questions but also the opportunity to have better understanding of<br />

the back-office infromation sharing, handling, and gathering.<br />

Which in result helped us to recrusively update and improve the<br />

structured survey questionnaire. Though the management was<br />

well aware of the overall processes and procedures; a participative<br />

session was necessary to confirm the findings from the interviews<br />

of the top management to the findings of the operational<br />

employees from the different departments. Furthermore, the<br />

session allowed us for immediate reflections and discussion about<br />

the applicability and usefulness of measruement constructs and<br />

the instrument.<br />

Population welfare program Sindh is an integral part of Federal<br />

Population Welfare program Pakistan. In 2010 the Ministry of<br />

Population Welfare Pakistan was devolved and the functions were<br />

completely transferred to the province creating Ministry of<br />

Population Welfare, Government of Sindh. PWD Sindh has<br />

approximately 24,00 employees, most of them operate in small<br />

villages and remote areas where the literacy ratio is very low.<br />

PWD aims to provide family planning services ensuring high<br />

quality service delivery at the doorstep of people. PWD facilitates<br />

its services at District, Town, and Tehsil level through Family<br />

Welfare Centers (FWCs), Mobile Service Units (MSUs),<br />

Provincial Line Departments (PLDs), Registered Medical<br />

Practitioners (RMPs), Labour, Local Government, and Non-<br />

Governmental Organizations (NGOs).<br />

Figure 2 Outcome of illustrative case study<br />

221<br />

The interviews were conducted with the top management that<br />

included the director general PWD Sindh and four assistant<br />

directors; who are responsible for the respective functional wings<br />

i.e. Admin & Finance (A & F), Monitoring Evaluation and<br />

Planning (ME & P), Communication, Training, Logistic and<br />

Supplies (CTL & S), and Medical wing of PWD Sindh. Each<br />

interview lasted for approximately an hour and half (90 minutes),<br />

in which a total of sixty selected questions were asked from each<br />

interviewee. The questions were put together to measure the<br />

organziational interoperability as per the list of measruement<br />

constructs described in Section 3.2. Though the number of<br />

questions per construct were uniformly distrubuted, it was<br />

understood from the discussion with interviewees that some<br />

constructs i.e. Service Level Agreement, Laws and Regulations,<br />

and Juristictional regulation required less questions than the others<br />

i.e. Collaboration, Change Management, and Human Resources.<br />

Although the management is responsbile for provincial<br />

administrative setup; they had clear vision and knowledge about<br />

the processes, procedures, and services as they were quite flexible<br />

while answering the questions. The management was fully aware<br />

of the importance of organizational interoperability as the major<br />

objectives of PWD focus on coordination and collaboration<br />

among local and district back-offices; integrated services;<br />

enhanced interaction with businesses, citizens, NGOs, and<br />

government organzitions; ensuring maximum public participation;<br />

and improving quality of family planning services delivery. The<br />

interviews of the top management provided further insight and<br />

understanding of the PWD Sindh to ask more relevant, precise,<br />

and in-depth questions about the organizational interoperability.<br />

To be able to compare and benchmark the current marutiy levels,<br />

each interviewee was also asked to rate the desired maturity for<br />

each described construct from level-0 to level-9. The dotted-line<br />

in Figure 2 shows the desired maturity level for each oncstruct.<br />

Following the knowledge gained from the interviews, a<br />

comprehensice list of 75 structured questions was prepared for the<br />

survey session comprising on 25 technical and non-technical<br />

employees lower down the hierarchy at PWD Sindh. Participants<br />

of the survey session were also briefed about the measurement<br />

approach and constructs before providing them the questionnaire.<br />

Therefore, along with the survey questionnaire, a separate<br />

evaluation form was also provided to the participants for<br />

discussion at the end to reflect upon the applicability and<br />

usefulnes of the proposed measurement approach.


Table 2 Measurement outcomes of interoperabiltiy constructs<br />

There were 25 participants in the survey session, who filled in the<br />

structured questionnaire about organziational interoperability by<br />

categorically specifying the maturity value for each of the related<br />

questions per construct from level 0 (lowest) to the level 9<br />

(highest). For the participants lacking the knowledge about<br />

particular measruement construct, an option of ‘don’t know’ was<br />

also added to each question. As the participants were from<br />

different sub-sections of the functional wings; some participants<br />

did not answer the particular set of questions, of which they were<br />

least knowledgeable. Approximately 20 percent values per<br />

question (5 out of 25) were asnwered with the option ‘don’t<br />

know’. The average value of the total number of answers per each<br />

question was assigned to the ‘don’t know’ answers. Furthermore,<br />

the mean of the average values of questions for each construct was<br />

calculated as maturity level. Figure 2 shows the outcome of<br />

survey session where the dotted line represents the desired<br />

maturity level and the plane line represents the measured maturiy<br />

level.<br />

For better understanding of the case study findings, we further<br />

investigated and analyzed the outcomes of the measurement<br />

values from the survey questionnaire; the values of standard<br />

deviation and mean for each construct were derived as shown in<br />

Table 2. The lowest and highest standard deviation values of the<br />

measurement constructs in Table 2 explain that though the<br />

average calculated maturity levels for some contructs shown in<br />

Figure 2 are close to the desired maturity levels, the low and high<br />

standard deviation values determine that some participants had<br />

different opinions than others.<br />

The case study of PWD shows that the measurement of<br />

organizational interoperability can help policy makers in design<br />

and development of interoperability maturity models. The<br />

differences in the desired and measured maturity levels clearly<br />

indicate that moer focus is needed on the organizational aspects of<br />

interoperability. We also conclude from the case study that the<br />

selection of measurement constructs for organziational<br />

interoperability is difficult and depend on the complexity, size,<br />

and scople of the back-office information gathering, sharing, and<br />

handling. Finally, the case study using the proposed measurement<br />

instrument shows that the mearuement constructs for<br />

organizational interoperability can be implemented on top of each<br />

other.<br />

5. DISCUSSION<br />

Interpretation of the organizational measurement constructs and<br />

maturity levels is quite difficult and complex as there is hardly<br />

any existing literature, but we realize that this can be dealt to a<br />

greater extend by extensive discussions with concerned experts.<br />

The discussion with the participants in the case study shows that<br />

the total numbers of questions designed for the measurement were<br />

relevant, but there was consensus among all the experts that<br />

measurement of organizational interoperability is complex and<br />

requires large amount of questions. It is, however, questionable if<br />

it is desired or feasible to have hundreds of questions for<br />

measuring all the details about the measures. The challenge is to<br />

measure with a limited number of questions that can be filled in<br />

within a short time frame.<br />

Though our structured survey questionnaire included 75 selected<br />

questions, the focus was to better assess the level of abstraction<br />

that is required to measure interoperability at a satisfactory level.<br />

The participatory discussions with the participants, after they<br />

222<br />

No.<br />

Measurement<br />

Constructs<br />

SD-<br />

Low<br />

Mean SD-High<br />

1 Context and demarcations 6,22 7,04 7,86<br />

2 Collaboration 6,11 7 7,89<br />

3 Policies 5,32 6,04 6,76<br />

4 Standards 6,11 7 7,89<br />

5 Formal communication 6,08 6,92 7,76<br />

6 Human resource 5,21 6,12 7,03<br />

7<br />

Processes and<br />

procedures alignment<br />

6,08 6,92 7,76<br />

8 Service level agreements 5,21 6,12 7,03<br />

9 Laws and regulations 6,11 7 7,89<br />

10 Constitutional restrains 6,47 7,12 7,77<br />

11 Political commitment 7,03 7,92 8,81<br />

12 Jurisdictional regulations 5,34 6,08 6,82<br />

13 Change management 6,25 7 7,75<br />

14 Environment and ethics 5,18 5,92 6,66<br />

15 Financial constraints 6,09 7,12 8,15<br />

filled the questionnaire, provided positive feedbacks about the<br />

applicability and usefulness of the measurement instrument and<br />

constructs. Participants suggested that although some of the<br />

constructs e.g. human resources, change management, and<br />

financial constraints are very important for organizational<br />

maturity; they were hardly included in the measurement process.<br />

Some participants quoted in the feedback form that the policy sublayer<br />

is very important for organizational interoperability and<br />

must be part of measurement process. Another major finding of<br />

this case study is the outcome of the architecture layer constructs<br />

i.e. human resources and formal communication. Majority of<br />

participants highly recommended these constructs as they<br />

constitute the basis for enhanced interaction, collaboration, and<br />

training programs for the back-office employees. Participants also<br />

highlighted that technology alone cannot resolve organizational<br />

interoperability problems if the human resources in the backoffice<br />

are not skilled and trained. Participants discussed the<br />

example of old age employees who hardly speak English and use<br />

ICT enabled software and systems.<br />

The outcome of the case study as shown in Figure 2 and Table 2<br />

reveals that the measurement of organizational interoperability<br />

layers is possible, but for some measurement constructs mixed<br />

reviews were found by the participants about the maturity levels.<br />

For example, the interpretation of measured maturity levels is<br />

difficult as it partly depends on the type, complexity, and scope of<br />

organizational functions, operations, and processes. Some experts<br />

had the consensus about the understanding of measures, whereas<br />

others had different views. This can be observed by looking at the<br />

variations in values of standard deviation compared to their<br />

averages. For example two constructs of policy and economic<br />

measures i.e. collaboration and financial constraints have an<br />

average of 7 and 7.12 but standard deviation values (6.11 - 7.89)<br />

and (6.09 – 8.15) respectively, which means that some<br />

participants partially disagree with the average maturity level<br />

assigned by others.


Furthermore, it is understood from the highest standard deviation<br />

values for political commitment (8.81) and financial constraints<br />

(8.15) that though some participants were extremely positive<br />

about the consistent political will and funds, whereas others were<br />

not satisfied and had ambiguities. They believe that political<br />

commitment and financial constraints need further improvement.<br />

The discussions with experts revealed that the highest average<br />

(7.92) of political commitment does not necessarily represent the<br />

successful organizational interoperability as some commitments<br />

did not produce fruitful outcomes. Hence, despite of effective<br />

measurements outcomes, the benchmarking can be a disguise if<br />

the interpretation is not correct [4]. Furthermore, they argue that<br />

the policy makers should coordinate directly with back-office for<br />

feedback about these constructs. Selecting interoperability<br />

measures for benchmarking is difficult as the organizations vary<br />

in scope, objectives, and complexity. The measurement<br />

instrument and the constructs described in this paper are the first<br />

step towards advancement of organizational interoperability.<br />

Satisfaction shown from Population Welfare Department, The<br />

case of Sindh is a positive indication that the instrument is<br />

applicable and useful, but there is a need of further extension of<br />

this research to generalize the usefulness of in different types of<br />

public organizations.<br />

Finally, the participants were asked to discuss the applicability of<br />

the proposed measurement instrument and the measurement<br />

constructs for organizational interoperability. The overall<br />

feedback from the participants during participative discussions<br />

about the measurement instrument and constructs was quite<br />

satisfactory, whereas some participants had different views about<br />

some measurement constructs e.g. constitutional restrains and<br />

financial constraints. Though they agree upon the importance of<br />

including these constructs in assessment of organizational<br />

interoperability for the reasons of creating awareness that they’re<br />

important, the measuring and benchmarking of these constructs at<br />

the provincial, district, and local level requires further<br />

investigation. The discussion also concluded that more focus is<br />

required on the aspects of organziational interoperability as it is<br />

equally important to the technical interoperability.<br />

6. CONCLUSIONS<br />

Measurement of organizational interoperability is still a major<br />

challenge for public organizations as there is hardly any<br />

promising, tested, and validated measurement instruments.<br />

Although the organizational aspects of interoperability have<br />

recently proven themselves equally important as technical aspects,<br />

they are still sparsely described in conceptual maturity models and<br />

frameworks. There is hardly any available literature describing<br />

measurement methods and measures to assess organizational<br />

interoperability. There is a definite need of improvement in<br />

organizational interoperability as there are no existing benchmarks<br />

due to the lack of adequate measurement methods and measures.<br />

This paper proposes a measurement instrument focusing both<br />

organizational and technical interoperability. Based on the<br />

literature reviews of existing interoperability maturity models and<br />

frameworks, we developed a list of 15 organizational<br />

measurement constructs in 6 sub-layers of the organizational<br />

layer. Though the proposed measurement instrument includes<br />

both organizational and technical interoperability measurement<br />

layers, our focus was to assess organizational interoperability. The<br />

sub-layers of organizational interoperability provide the guideline<br />

for assessment, whereas the selection of relevant measures or<br />

measurement constraints can vary from organization or<br />

223<br />

organization. Furthermore, we conducted a case study of the<br />

population welfare organization government of Sindh to illustrate<br />

the operationalization of developed measurement instrument and<br />

test the applicability and usefulness of selected constructs. The<br />

case study shows that the measurement constructs and the<br />

instrument provides considerable insight into organizational<br />

aspects of interoperability. The case study entails that the<br />

measurement constructs can be implemented on top of each other.<br />

We found that our approach using measurement layers and<br />

constructs is seen as helpful, but further research is recommended<br />

to investigate the applicability of the measurement instrument<br />

while selecting and applying the measurement constructs to the<br />

different types of public organizations. Finally, we conclude that<br />

the target group of this case study was limited, whereas more<br />

respondents should be included for further evaluation of proposed<br />

measurement instrument and measures.<br />

7. ACKNOWLEDGEMENTS<br />

Thanks to director general Population Department, Government of<br />

Sindh for granting us permission to conduct interviews and survey<br />

session for case study. We specially thank the participants of<br />

PWD Sindh for interactively participating in questionnaire based<br />

survey on measuring and benchmarking the organizational<br />

interoperability.<br />

8. REFERENCES<br />

[1] Andersen, D.F. and S.S. Dawes, Government information<br />

management: A primer and casebook. 1991: Prentice Hall.<br />

[2] Archmann, S. and I. Kudlacek, Interoperability and the<br />

exchange of good practice cases. European Journal of<br />

ePractice, 2008. 2(1): p. 3-12.<br />

[3] ATHENA, C., Enterprise interoperability maturity model<br />

(EIMM) ATHENA IP (Advanced Technologies for<br />

interoperability of Heterogeneous Enterprise Networks and<br />

their Applications Integrated Project) IST-507849 accessed<br />

from: modelbased.net/aif/methodology/eimm.htm, 2004.<br />

[4] Bannister, F., The curse of the benchmark: an assessment of<br />

the validity and value of e-government comparisons.<br />

International Review of Administrative Sciences, 2007.<br />

73(2): p. 171.<br />

[5] Bellman, B. and F. Rausch, Enterprise Architecture for e-<br />

Government, in Electronic Government: Third International<br />

Conference, EGOV 2004, R. Traunmüller, Editor. 2004,<br />

Springer: Berlin / Heidelberg. p. 48-56.<br />

[6] Bostrom, R.P., and Heinen, J.S., "Mis Problems and Failures:<br />

A Sociotechnical Perspective Part I: The Cause", MIS<br />

quarterly, 1(3), 1977, pp. 17-32.<br />

[7] Caffrey, L., et al., Government secure intranets. Information<br />

technology & globalisation series. 1999, London:<br />

Commonwealth Secretariat.<br />

[8] Cimander, R. and H. Kubicek, Organizational<br />

interoperability and organizing for interoperability in egovernment.<br />

Second European Summit on Interoperability in<br />

the iGovernment held in Rome, 2009: p. 109–122.<br />

[9] Clark, T. and R. Jones. Organizational interoperability<br />

maturity model for C2. 1999.<br />

[10] Commission, S.S., A New Zealand E-Government<br />

Interoperability Framework (e-GIF). Retrieved from


http://unpan1.un.org/intradoc/groups/public/documents/apcit<br />

y/unpan006368.pdf, 2002.<br />

[11] DoD, W., DC., C4ISR Architectures Working Group report.<br />

Levels of Information Systems Interoperability (LISI)<br />

February ,1998 1998.<br />

[12] Dos Santos, E.M. and N. Reinhard, Electronic Government<br />

Interoperability: Identifying the Barriers for Frameworks<br />

Adoption. Social Science Computer Review, 2011.<br />

[13] Estermann, B., R. Riedl, and A.C. Neuroni. Integrated and<br />

transcendent e-government: keys for analyzing<br />

organizational structure and governance. 2009: Digital<br />

Government Society of North America.<br />

[14] Feenstra, R.W., M. Janssen, and R.W. Wagenaar, Designing<br />

a Service Composition Framework to Support Multi Actor<br />

Network, in Proceedings of Euro mGov 2006: The Second<br />

European Conference on Mobile Government, I. Kushchu, C.<br />

Borucki, and G. Fitzpatrick, Editors. 2006, Mobile<br />

Government Consortium International LLC: Brighton, UK.<br />

p. 103-112.<br />

[15] Gatautis, R., E. Vitkauskaitė, et al. (2009). Lithuanian<br />

eGovernment interoperability model.<br />

[16] Goldkuhl, G. The challenges of Interoperability in Egovernment:<br />

Towards a conceptual refinement. 2008.<br />

[17] Gottschalk, P. and H. Solli-Saether, Stages of e-government<br />

interoperability. Electronic Government, an International<br />

Journal, 2008. 5(3): p. 310-320.<br />

[18] Guédria, W., Y. Naudet, et al. (2008). Interoperability<br />

Maturity Models–Survey and Comparison–, Springer.<br />

[19] Guijarro, L., Interoperability frameworks and enterprise<br />

architectures in e-government initiatives in Europe and the<br />

United States. Government Information Quarterly, 2007.<br />

24(1): p. 89-101.<br />

[20] Hamilton, A., et al., The federalist papers. 2008: Oxford<br />

University Press, USA.<br />

[21] Hjort-Madsen, K., Enterprise architecture implementation<br />

and management: A case study on interoperability. 2006.<br />

[22] IDABC, E., Draft document as basic of EIF version 2.0.<br />

European Communities: accessed on 02-01-2011 at<br />

http://ec.europa.eu/idabc/servlets/Docb0db.pdf?id=31597,<br />

2008.<br />

[23] IDABC, E., European Interoperability Framework for Pan-<br />

European E-Government Services. European Communities,<br />

2004.<br />

[24] IEEE, IEEE Standard Computer Dictionary: A Compilation<br />

of IEEE Standard Computer Glossaries. 1990: New York:<br />

IEEE, 1990.<br />

[25] IEEE, Standards Information Network IEEE 100—The<br />

authoritative dictionary of IEEE standards terms (7th ed.).<br />

New York, NY: IEEE., 2000.<br />

[26] Janssen, M. and A. Joha, Understanding IT governance for<br />

the operation of shared services in public service networks.<br />

International Journal of Networking and Virtual<br />

Organizations, 2007. 4(1): p. 20-34.<br />

[27] Janssen, M. and A.M. Cresswell, An enterprise application<br />

integration methodology for e-government. Journal of<br />

224<br />

Enterprise Information Management, 2005. 18(5): p. 531-<br />

547.<br />

[28] Janssen, M. and H. Scholl. Interoperability for electronic<br />

governance. 2007: ACM.<br />

[29] Klischewski, R., Information integration or process<br />

integration? How to achieve interoperability in<br />

administration. Electronic Government, 2004: p. 57-65.<br />

[30] Kubicek, H. and R. Cimander, Three dimensions of<br />

organizational interoperability. European Journal of<br />

ePractice, 2009.<br />

[31] Lueders, H. Interoperability and Open Standards for<br />

eGovernment Services. 2005.<br />

[32] Maheshwari, D., A.F.v. Veenstra, and M. Janssen,<br />

Developing Measures for Benchmarking the Interoperability<br />

of Public Organizations. 16-17 June, ECEG Ljubljani,<br />

Slovenia. 2011.<br />

[33] Moen, W., Interoperability for Information Access:<br />

Technical Standards and Policy Considerations. Journal of<br />

Academic Librarianship, 2000. 26(2): p. 129-32.<br />

[34] NATO, NATO C3 Technical Architecture (NC3TA). 34<br />

(ADatP-34) March 2003, NATO standard website:<br />

http://www.nato.int/docu/standard.htm, 2003.<br />

[35] Panetto, H. and A. Molina (2008). "Enterprise integration<br />

and interoperability in manufacturing systems: Trends and<br />

issues." Computers in industry 59(7): 641-646.<br />

[36] Pardo, T.A. and G.B. Burke, Improving Government<br />

Interoperability: A capability framework for government<br />

managers. Center for Technology in Government, Albany,<br />

2008.<br />

[37] Pardo, T.A. and G.B. Burke, IT Governance Capability:<br />

Laying the foundation for government interoperability.<br />

Center for Technology in Government Technical Report,<br />

2009.<br />

[38] Pardo, T.A., T. Nam, and G.B. Burke, E-Government<br />

Interoperability: Interaction of Policy, Management, and<br />

Technology Dimensions. Social Science Computer Review,<br />

2011.<br />

[39] Picot, A., R. Reichwald, et al. (2008). Information,<br />

organization and management, Springer Verlag.<br />

[40] Schekkerman, J., Extended Enterprise Architecture Maturity<br />

Model (E2AMM) Version 2.0. 2006.<br />

[41] Scholl, H. and R. Klischewski, E-government integration and<br />

interoperability: framing the research agenda. International<br />

Journal of Public Administration, 2007. 30(8): p. 889-920.<br />

[42] Seifert, J.W. A primer on e-government: Sectors, stages,<br />

opportunities, and challenges of online governance. 2003:<br />

DTIC Document.<br />

[43] Shahkooh, K. A., M. Sadeghi, et al. (2011). "Interoperability<br />

Evaluation of Iranian Organizations through Proposed<br />

National E-government Interoperability Framework (Case<br />

Study of Tehran Municipality)." Journal of AISS: Advances<br />

in Information Sciences and Service Sciences 3(1): 62-77.<br />

[44] Strang, T. and C. Linnhoff-Popien. Service interoperability<br />

on context level in ubiquitous computing environments. in<br />

International Conference on Advances in Infrastructure for<br />

Electronic Business, Education, Science, Medicine, and


Mobile Technologies on the Internet (SSGRR2003w),<br />

L'Aquila/Italy (2003). 2003b: Citeseer.<br />

[45] Strang, T., C. Linnhoff-Popien, and K. Frank. CoOL: A<br />

context ontology language to enable contextual<br />

interoperability. 2003a: Springer, page(s) 236-247.<br />

[46] Tolk, A. and J. Muguira. The levels of conceptual<br />

interoperability model. 2003: Citeseer.<br />

[47] Tolk, A., et al., Composable M&S web services for netcentric<br />

applications. The Journal of Defense Modeling and<br />

Simulation: Applications, Methodology, Technology, 2006.<br />

[48] Traunmüller, R. and M. Wimmer, E-government: the<br />

challenges ahead. Electronic Government, 2004: p. 1-6.<br />

[49] Turnitsa, C. Extending the levels of conceptual<br />

interoperability model. 2005.<br />

[50] van der Veer, H. and A. Wiles, Achieving Technical<br />

Interoperability. European Telecommunications Standards<br />

Institute, 2008.<br />

[51] Weedman, J., Informal and formal channels in boundaryspanning<br />

communication. Journal of the American Society<br />

for Information Science, 1992. 43(3): p. 257-267.<br />

[52] Widergren, S.E., et al., Interoperability Context-Setting<br />

Framework. 2007, GWAC Interoperability Workshop, April<br />

11-12, 2007. Dallas, Texas. Pacific Northwest National<br />

Laboratory (PNNL), Richland, WA (US).<br />

225


Ranking and Hotspot Detection Methods on Infant Health for<br />

Districts in Java, Indonesia: E-Governance Micro Tools<br />

Yekti Widyaningsih<br />

Department of Mathematics<br />

Faculty of Mathematics and Natural Sciences<br />

University of Indonesia<br />

yekti@ui.ac.id<br />

ABSTRACT<br />

As the Academia stakeholder, this paper shares the method and<br />

theory which extend the understanding of Electronic Governance.<br />

The purpose of this research is to obtain the ranking of infant<br />

health in Java based on five indicators and three indicators. These<br />

indicators or variables are number of infant deaths (infd), number<br />

of people in poverty (pov), number of infants with low birth<br />

weight (lbw), number of deliveries in absence of health personnel<br />

(abhp), and average education shortfall of women (avedsf). All<br />

variables are district level aggregates. Besides ranking, hotspots<br />

based on those indicators are also detected by ULS hotspot<br />

detection method, while rankings are computed based on ORDIT,<br />

implemented in R software. Rankings of the districts based on 5<br />

(all) indicators and 3 indicators (infd, pov, lbw) are obtained. Also,<br />

ranking is obtained based on salient scaling of 5 indicators and<br />

salient scaling of 3 indicators. According to those results, the most<br />

severe districts are districts 87 and 90, while the least severe<br />

districts are districts 73, 31, and 35. There are many districts in<br />

the hotspot area as the results of the ULS hotspot detection.<br />

Districts 87, 90, 47, 58, 83, 44, and 45 are the worst areas of<br />

infant health. This result is important information for the<br />

government, especially the Health Department to make decisions<br />

for the improvement of health programs. The methods can be used<br />

as a micro tool to extend the function and understanding of egovernance.<br />

Categories and Subject Descriptors<br />

D.2.4 [Software/Program Verification - Statistical method]; G.3<br />

[Probability and Statistics – Correlation];J.2 [Physical Sciences<br />

and Engineering - Mathematics and statistics]; J.4 [Social and<br />

Behavioral Sciences – Sociology]; K.6 [Management of<br />

Computing and Information Systems]<br />

General Terms<br />

Measurement, Performance, Theory, Legal Aspects, Verification<br />

Keywords<br />

Ranking, Infant Health Indicators, ORDIT, R Software,<br />

Computational Complexity, Hotspot, Upper Level Set Scan<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

226<br />

Wayne L. Myers<br />

Penn State Institutes of Energy and Environment<br />

Penn State University, University Park,<br />

PA 16802 USA<br />

wlm@psu.edu<br />

Statistics<br />

1. INTRODUCTION<br />

Governments around the world wrestle with a wide range of social<br />

and political challenges and look for innovations in technology,<br />

not only in the government institutions of, but also in the<br />

interactions between the government and citizens to help them<br />

meet these challenges. Serving citizens efficiently and effectively,<br />

engaging interested parties in decision making, and creating<br />

sustainable economies, are among the many ways innovations in<br />

policy and practice can directly impact the public value created by<br />

any Electronic Governance investment. To justify continued or<br />

new investments in Electronic Governance, decision makers must<br />

increasingly provide evidence that the innovations they are<br />

supporting create public value. Decision-makers play a very<br />

important role in the management of a country. The decisions<br />

made will have an impact, both at present and in the future. As the<br />

Academia stakeholder, this paper shares the methods and theories<br />

which extend the understanding of Electronic Governance.<br />

Hopefully, this paper can contribute concrete solutions for<br />

specific challenges faced by governments, especially in making a<br />

decision about infant health improvement. To achieve effective<br />

decision making, it is important to know the areas or districts most<br />

in need of improvement. For a problem like this, ranking methods<br />

are necessary.<br />

To meet these social challenges, it is important for the<br />

government to plan and arrange budgets at the districts level that<br />

are appropriate to its need for improvement in particular matters.<br />

This paper focuses on districts ranking based on infant health<br />

indicators. Many researches about infant health have been done.<br />

Some of them are as follows. A research has shown that<br />

persistence of poverty and continuing unequal distribution of<br />

health care resources to pregnant women and young mothers<br />

render relative risks of neonatal and post-neonatal mortality 1.5<br />

times greater than that experienced by infants not born in poverty<br />

[1]. In addition, ‘poverty is infant health risk’ is a theoretical<br />

proposition according to Centers for Disease Control and<br />

Prevention [2]. OECD reported that the correlation between<br />

percentage of low birth weight infants and infant mortality rates is<br />

stronger in emerging countries [3]. Other research showed that<br />

adding a maternity clinic to a village decreases the odds of infant<br />

mortality by almost 15 per cent, in comparison to the risk before<br />

the clinic was added. An additional doctor reduces the odds by<br />

about 1.7 per cent [4]. Furthermore, the final model of Desai and<br />

Alva, shows that maternal education has a statistically significant<br />

impact on infant mortality and height-for-age in only a handful of<br />

countries [5]. According to those findings, an abstract concept,<br />

infant health relates to the six measurable indicators: poverty,<br />

infant mortality, low birth weight, health personnel, and education<br />

1


of mothers. Based on this reason, we decided to use these<br />

indicators to obtain the ranking of districts. The objective of the<br />

current research is to find which districts are the worst districts for<br />

infant health. Infant health is an important factor to be discussed<br />

because this factor is the result of many other factors related to<br />

socio economic components [6]. This research focused on five<br />

indicators to be investigated.<br />

Ranking methods based on multiple indicators using R open<br />

source software and hotspot detection using ULS software are<br />

introduced here as tools to support the Ministry of Health. This<br />

concept can be used as a micro tool in e-governance and is<br />

available to support e-health governance in implementing the full<br />

range of government activities, internal processes, the<br />

development of policy and services for citizens. The possible<br />

systematic process is as the following: idea -- algorithm –<br />

(implementation on R software) -- subroutine on C ++ (program<br />

language) – online user friendly interface display.<br />

The study area of this research is Java, one of the five biggest<br />

islands in Indonesia. The Capital city of Indonesia is located in the<br />

west area of Java. The percentage of population on this island is<br />

about 60% of the total population of Indonesia [7]. This is one<br />

reason why this island is interesting to be studied.<br />

The method of this research is prioritization based on partial order<br />

theory. Through this method, a ranking of the districts based on<br />

five and three indicators will be found. The present purpose is to<br />

provide convenient computational capability and visualizations<br />

for progressive or partial prioritization based largely on concepts<br />

of partial order theory and implemented in R [8] as illustrated in a<br />

context of infant health as a complex multidimensional domain<br />

that must be placed in public and private perspectives in pursuit of<br />

public health management. One of the practical perspectives in<br />

the health status of a district is concerned with infant health which<br />

has multiple indicators [9]. Here the focus is on placing the<br />

multiple dimensions of infant health in a professional and public<br />

perspective to support district improvement policy. Furthermore, a<br />

hotspot of these indicators is detected using ULS method.<br />

2. DATA<br />

As an abstract measure of a district, infant health is supported by<br />

five indicators as mentioned in section 1. Table 1 shows the data<br />

for this purpose consisting of five indicators of infant health<br />

[7][10]. They are the number of infant deaths (infd), the number<br />

of people in poverty (pov) in thousands, the number of infants<br />

with low birth weight (lbw), the percentage of deliveries in<br />

absence of health personnel (abhp), and average education<br />

shortfall of women (avedsf) in years. All variables are aggregates<br />

of district. The value of avedsf is computed by subtracting average<br />

duration of education in a district from maximum in all districts.<br />

The district column is the id for districts, infd is the number of<br />

infant deaths, pov is the number of people in poverty (in<br />

thousands), lbw is the number of infants with birth weight less<br />

than 2500grams, abhp is the percentage of deliveries (births)<br />

without health personnel presence, and avedsf is average of<br />

women education shortfall as explained earlier.<br />

The study area of this research is Java in Indonesia but omitting<br />

Banten province and Kepulauan Seribu districts because of<br />

incomplete data in those areas. Figure 1a is the map of Java<br />

(without Banten province and Kepulauan Seribu district) with<br />

district id, mapped by the R sp package [11][12].<br />

227<br />

Latitude<br />

10°�S<br />

Table 1. Leading lines of the dataset with infant health<br />

indicators as column criteria and districts as cases<br />

4°�S<br />

6°�S<br />

8°�S<br />

district infd pov lbw abhp avedsf<br />

1 61 125.6 145 20.02 4.4<br />

2 112 157.9 187 14.63 4.6<br />

3 78 149.1 130 16.19 3.7<br />

4 97 170.5 252 2.95 3.4<br />

5 83 171.2 250 0.51 3.6<br />

6 298 267.4 401 11.56 3.5<br />

... ... ... ... ... ...<br />

107 106 94<br />

104 105 99 93<br />

100<br />

79 95<br />

91<br />

92<br />

90<br />

63<br />

96<br />

80<br />

81<br />

87 98<br />

61<br />

89 88<br />

62 60<br />

101<br />

78<br />

97<br />

77<br />

64<br />

82<br />

86<br />

23<br />

29<br />

72 71 70 69 68 67 76<br />

26 27<br />

58 59<br />

28<br />

24 25<br />

66 65<br />

22<br />

46 37<br />

83 102 103<br />

47<br />

75<br />

44 45<br />

50<br />

52 57<br />

84<br />

85<br />

73<br />

21<br />

35 15<br />

51 74<br />

18 17 16<br />

48<br />

56<br />

20 3619<br />

34<br />

49 42 53 54<br />

14<br />

39 43<br />

33<br />

306<br />

38<br />

12<br />

40 55<br />

13<br />

2<br />

32<br />

11<br />

41<br />

1 3<br />

4 315<br />

7 8<br />

9<br />

10<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

Figure 1a. Map of Java (without Banten Province and<br />

Kepulauan Seribu District) with district id as mapped by the<br />

R sp package [11],[12].<br />

Some districts have a capital city located in the centre with its<br />

own data. As an example, district 73 is in the middle of district 51,<br />

district 31 is in the middle of district 5, district 35 is in the middle<br />

of district 16, and there are 19 other city-type districts as well.<br />

3. DATA COLLECTION<br />

The data used in this study is secondary data derived from Data<br />

and Information Centers, Health Department of Indonesia [10].<br />

This secondary data is obtained from the reports of public health<br />

centers and hospitals in every district. The data are indicators of<br />

infant health in every district, i.e. the number of infant deaths, the<br />

number of babies with weight below normal, the number of births<br />

without any medical personnel present, and maternal education,<br />

while the number of people in poverty was obtained from<br />

Indonesian Statistics [7].<br />

The number of people in poverty is the population that is under<br />

the poverty line. The poverty line is used as a boundary to<br />

determine whether or not a person is poor. In 2007, the definition<br />

for the poor are the people who have an average per capita<br />

expenditure per month below the poverty line of Rp 211.726<br />

(about U.S. $ 20) [7].<br />

4. DATA PROCESSING<br />

The steps of data processing in this research are (1) preparing the<br />

data set for ORDIT into k+1 columns as shown in Table 1, where<br />

k is the number of indicators, first column is the case id, (2)<br />

obtaining the scatter plot and correlation coefficients of the<br />

indicators, (3) transforming the values of indicators to the ranks,<br />

(4) obtaining the ranking of the districts based on 5 indicators, 3<br />

indicators, and 2 indicators (salient5 and salient3, the ranking<br />

results of 5 indicators and 3 indicators, respectively) using ORDIT<br />

2


method, (5) preparing the data set for ULS process (hotspot<br />

detection) into 4 columns: id, number of cases, population size,<br />

and adjacent districts (6) detecting the hotspot area for each<br />

indicator, (7) comparing and summarising the results.<br />

In step (4), ranking is carried out for 5 and 3 indicators because<br />

those 3 indicators, i.e. infd, pov, and lbw have stronger<br />

correlations than the others. These results will be compared.<br />

Computations for steps (2), (3), and (4) use R open source<br />

software and computation for step (6) using ULS software. Figure<br />

1b presents the flowchart of data processing.<br />

Figure 1b. Flowchart of data processing<br />

5. METHOD<br />

The methods used in this research are ordering dually in triangles<br />

for ranking, and upper level set scan statistics for hotspot<br />

detection.<br />

5.1 Ordering Dually in Triangles<br />

Ordering Dually in Triangles (ORDIT) is a method for ranking<br />

purposes based on several indicators. Many objects can be ranked,<br />

such as persons, districts, schools, universities, and many others.<br />

ORDIT method in this research is used to rank the districts based<br />

on 5 and 3 infant health indicators.<br />

To obtain the ranking of the objects, this method uses<br />

mathematical concepts related to the partial order set (poset). The<br />

following subsubsections describe the ORDIT theory.<br />

In mathematics, especially order theory, a partially ordered<br />

set (or poset) formalizes and generalizes the intuitive concept of<br />

an ordering, sequencing, or arrangement of the elements of a set.<br />

A poset consists of a set together with a binary relation that<br />

indicates that, for certain pairs of elements in the set, one of the<br />

elements precedes the other. Such a relation is called a partial<br />

order to reflect the fact that not every pair of elements need be<br />

related: for some pairs, it may be that neither element precedes the<br />

other in the poset. Thus, partial orders generalize the more<br />

familiar total orders, in which every pair is related.<br />

5.1.1 Rating Relations/Rules for Ascribing Advantage<br />

This subsubsection describes the protocols for comparing cases or<br />

collectives of cases via ratings, rules and relations that ascribe<br />

advantage to some cases over some others or fail to do so for<br />

228<br />

particular pairs [7]. There are three possibilities in comparing<br />

pairs of cases, where one case is denoted by Г and the other by θ.<br />

“Г aa θ” wherein Г has ascribed advantage over θ. Г has<br />

subordinate status to θ which implies “θ aa Г”. “Г ii θ” whereby<br />

these are indefinite instances without ascribed advantage and<br />

without subordinate status, which implies “θ ii Г”. Thus the<br />

protocol either designates one member of a pair as having<br />

ascribed advantage and the other subordinate status, or that<br />

pairing as being indefinite. ff(aa) is the frequency of number of<br />

occurrences for the ascribed advantage. ff(ss) is the frequency of<br />

number of occurrences for the subordinate status. ff(ii) is the<br />

frequency of number of occurrences for being indefinite. Each of<br />

the N cases can be compared on this basis to all others in the<br />

deleted domain DD=N–1 of competing cases with the percent<br />

occurrence of these relations being tabulated as follows, AA =<br />

100 × ff(aa)/DD, SS = 100 × ff(ss)/DD, II = 100 × ff(ii)/DD.<br />

Clearly, AA + SS + II = 100%; and for later use let us define<br />

CCC = 100 – AA as the complement of case condition relative to<br />

ascribed advantage (AA) [8].<br />

5.1.2 Subordination Schematic and Ordering Dually in Triangles<br />

(ORDIT)<br />

Subordination can be symbolized diagrammatically [8] in a<br />

triangle depiction, where the point representing a district makes a<br />

triangle divided into two parts, ‘trapezoidal triplet’ (of AA, SS,<br />

and II) and a topping triangle (of CCC and II). The combination<br />

of these two parts forms a right triangle with the ‘tip’ at AA =<br />

100% in the upper-left and the toe at SS = 100% in the lower-right<br />

(see Figure 5). The hypotenuse is a right-hand ‘limiting line’ of<br />

plotting positions because AA+SS+II=100%. Topping triangle<br />

provides the basis for an ‘ORDIT ordering’ of the districts or<br />

instances.<br />

An idealized district has AA = 100% of the deleted domain (DD)<br />

of other districts, that is the frequency of ascribed advantage being<br />

equal to the number of competing districts, so if the ideal actually<br />

occurs, then the trapezoidal triplet becomes a triangle.<br />

The numbers for ORDIT can be coupled as a decimal value<br />

ccc.bbb. The ccc component is obtained by rounding CCC to two<br />

decimal places and then multiplying by 100. The bbb component<br />

is obtained by dividing SS by CCC, and imposing 0.999 as an<br />

upper limit. Then add these two values as ccc.bbb. This ordering<br />

is assigned the acronym ORDIT for ORdering Dually In<br />

Triangles. It preserves all aspects of AA, SS and II except for the<br />

actual number of districts. Simple rank ordering of ORDIT values<br />

becomes salient scaling of the district [8].<br />

5.1.3 Product-order Rating Regime<br />

A general relational rule for ascribing advantage is product-order<br />

whereby advantage is gained by having all criteria at least as good<br />

and at least one better. Conversely, subordinate status lies with<br />

having all criteria at least as poor and at least one poorer. This<br />

relational rule is applicable to all kinds of criteria as long as they<br />

have the same polarity (sense of better and worse). Scheme 2 in<br />

[8] Function Facilities gives an R function called ProdOrdr that<br />

determines ORDITs and salient scaling according to productorder.<br />

This function takes as its inputs a vector of IDs for<br />

instances and a data frame of same-sense criteria. All indicators<br />

are either positive sense or negative sense. Indicators in this<br />

research are negative indicators which means that the larger<br />

the value of the indicators, the more severe the district. The output<br />

is a data frame of ORDITs and salient scaling values<br />

3


5.1.4 Precedence Plots<br />

Based on computation of AA and SS for a particular district, the<br />

structure in the lower part of the subordination schematic can be<br />

used to prepare a ‘precedence plot’ for visualization (Figure 5).<br />

The precedence plot is a plot for AA (ascribed advantage) as Yaxis<br />

and SS (subordinate status) as the X-axis. The prominent<br />

position declines from top (upper-left) to toe (lower-right).<br />

Primary prominence varies vertically showing that there is a<br />

larger percentage of ascribed advantage (greater severity) with<br />

increasing height. Horizontal variation on a given level shows<br />

clarity of comparison. Farther to the right is greater clarity as<br />

more definite (less severe) with a larger percentage of subordinate<br />

status versus indefinite instances among the couplets where<br />

ascribed advantage (greater severity) is lacking. In other words,<br />

more indefinite instances constitute increased lack of clarity<br />

(incomparability in the usual parlance of partial ordering).<br />

Scheme 3 in [8] Function Facilities gives an R function named<br />

PrecPlot which accepts the output of the ProdOrdr function and<br />

produces a precedence plot.<br />

5.1.5 Representative Ranks<br />

Representative ranks show descriptive order statistics of indicator<br />

rankings for each district. Representative ranks are concerned<br />

with the rank distribution for any particular district. The rank<br />

numbers received by a given district across all criteria can be<br />

placed in a single array and sorted in ascending order. The<br />

minimum, median, and maximum ranks for the district are<br />

conveniently informative.<br />

5.2 Upper Level Set (ULS) Scan statistics<br />

By definition, a hotspot is a zone characterized by a high response<br />

rate, it makes intuitive sense that ULS method search for a hotspot<br />

begin with a cell with the highest response rate and annex to it<br />

other cells with high response rates. The need to bring a definite<br />

order for the search leads one to the concept of the ULS scan tree<br />

or just the ULS tree. Denoting for cell a the response rate ga =<br />

ya/na, a ∈ T over the connected region R, we define the ULS tree<br />

as follows:<br />

Let G = {ga | a ∈ T}<br />

Suppose r1 > r2 > … > rm are all distinct members of G.<br />

Define for i = 1, 2, …, m,<br />

Ti = { a ∈ T | ga = ri },<br />

and the upper level sets as unions of Ti’s,<br />

Ui = T1 ∪ T2 ∪ … ∪ Ti<br />

= { a ∈ T | ga ≥ ri }.<br />

Let Ci = set of connected components of Ui, i = 1, 2, …, m, and<br />

the reduced parameter space ΩULS = C1 ∪ … ∪ Cm.<br />

The ULS tree = (ΩULS) is a tree whose nodes are members<br />

of Ω ULS. The root of the ULS tree is Um = R. Let Z be a node<br />

belonging to the ULS tree. If all cells belonging to Z have the<br />

same response rate, then Z is a leaf node. Thus, members of C1 are<br />

leaf nodes. If not all cells in Z have the same rates then let e =<br />

min{ ga | a ∈ Z} and connected components of Z – {a ∈ Z: ga =<br />

e} are members of Z. [13]<br />

Since our search for a hotspot is based on cellular response rates,<br />

we assign a unique level to each node of the ULS tree in terms of<br />

its response rate and then scan the tree by level starting with nodes<br />

level 1 down. Members of C1 are level 1 nodes. The root is the<br />

level m node. In general, for 1 ≤ i ≤ m, the level of a zone Z is i if<br />

and only if min{ ga | a ∈ Z } = ri. Since each cell is introduced in<br />

229<br />

a unique node in the ULS tree, the ULS tree has at most N nodes.<br />

Hence |ΩULS| ≤ N, the equality holding if and only if m = N. [13]<br />

Several geometric properties should be satisfied by a collection of<br />

cells from tessellation of study area before it could be considered<br />

as a candidate for a hotspot cluster<br />

1) the union of the cells should comprise a geographically<br />

connected subset of the region R. Such collections of cells<br />

will be referred to as zones and the set of all zones is denoted<br />

by Ω. A zone Z∈Ω is a collection of cells that are connected.<br />

2) the zone should not be excessively large. This restriction is<br />

generally achieved by limiting the search for hotspot to zones<br />

that do not comprise more than fifty percent of the region.<br />

[14]<br />

6. RESULTS AND DISCUSSION<br />

6.1 Correlation Analysis and Descriptive<br />

Statistics<br />

Paired scatter plots make a simple way to see and get information<br />

about the strength of the relationship between two indicators.<br />

Scatter plots of pairs of infant health indicators are shown in<br />

Figure 2. If the observation points tend to be in a straight line,<br />

there is a correlation (relationship) between two variables<br />

(indicators). Table 2 shows the correlation coefficient between<br />

two indicators. Through this table it can be seen how strong the<br />

relationship between the two indicators is. According to Figure 2,<br />

there are tendencies of linear relationship between indicators infd<br />

and pov, infd and lbw, and pov and lbw. Table 2 shows that the<br />

correlation between infant death and poverty is 0.567. It can be<br />

said that there is a positive statistical association between those<br />

two indicators because it has p-value of 1.621e-10 (less than<br />

0.05). In statistics, if a parameter estimation (in this case is the<br />

coefficient correlation) has p-value of less than 0.05, it means the<br />

error probability of making conclusion is less than 5 percent. This<br />

is also true regarding infant death and low birth weight (r =<br />

0.4163; p-value = 7.425e-06); and for poverty and low birth<br />

weight (r = 0.399; p-value < 0.0001). There are positive<br />

relationships between infant death (infd) and absence of health<br />

personnel (abhp) and also between infd and average education<br />

shortfall (avedsf), even though both relationships are weaker. The<br />

relationship between infant death and births without health<br />

personnel (abhp) is stronger (r = 0.319; p-value = 0.0007531)<br />

than the relationship between infant death and average education<br />

shortfall (r = 0.290; p-value = 0.002375).<br />

Variability of the infant health indicators is shown by Figure 3a<br />

and 3b. Figure 3a shows boxplots of infm, pov (in thousands), and<br />

lbw. Thus, lbw is more variable than the other two indicators and<br />

contains outliers. Figure 3b shows boxplots of births without<br />

health personnel (%) and education shortfall.<br />

4


0 200 600<br />

0 10 30 50<br />

infd<br />

0 200 600 0 10 30 50<br />

pov<br />

lbw<br />

abhp<br />

0 200 400 600 0 1000 2000 0 2 4 6<br />

Figure 2. Scatter plots of five indicators of infant health<br />

Table 2. Correlation matrix of five indicators of infant health<br />

infd pov lbw abhp avedsf<br />

infd 1.000 0.567 0.416 0.319 0.290<br />

pov 0.567 1.000 0.399 0.317 0.559<br />

lbw 0.416 0.399 1.000 0.304 -0.005<br />

abhp 0.319 0.317 0.304 1.000 0.299<br />

avedsf 0.290 0.559 -0.005 0.299 1.000<br />

0 500 1000 1500 2000 2500<br />

infd pov lbw<br />

avedsf<br />

Figure 3a. Parallel Boxplots of infant health data (Infant<br />

deaths, poverty, low birth weight) in Java, 2007<br />

0 200 400 600<br />

0 1000 2000<br />

0 2 4 6<br />

230<br />

0 10 20 30 40 50<br />

abhp avedsf<br />

Figure 3b. Parallel Boxplots of infant health data (births<br />

without health personnel, average education shortfall) in Java,<br />

2007<br />

6.2 Ranking Process<br />

Better results of the ORDIT method will be obtained if the<br />

correlations between indicators are sufficiently strong. Based on<br />

Table 2, correlations between infd, pov, and lbw are higher with<br />

each other than the correlation between abhp and avedsf. For this<br />

reason, ranking of districts will be carried out based on 5 (all)<br />

indicators and 3 indicators (infd, pov, lbw). A comparison of the<br />

results will give a broader view of the ranking. Theoretically, rank<br />

results will be more representative, if the variables (indicators)<br />

have stronger relationship or higher coefficient correlation where<br />

infant health is an abstract concept and unable to be measured.<br />

Table 3 shows the place rank of each infant health indicator for<br />

the leading lines of the data sets by Function Facilities of R [8]<br />

function called PlacRank in Schema 1. The first column of the<br />

data frame to be ranked is assumed to contain case identifiers, and<br />

this column remains unaltered.<br />

Table 3. Head (first 6 lines) of the data frame in ranking<br />

obtained by applying the PlacRank function to place ranks of<br />

infant health indicators via the R commands [8]<br />

No. district infd pov lbw abhp avedsf<br />

1 1 85.5 77 82.0 30 28.5<br />

2 2 53.0 71 71.0 44 22.5<br />

3 3 75.5 72 86.5 41 54.0<br />

4 4 62.0 67 55.0 92 65.0<br />

5 5 72.0 66 56.5 98 57.5<br />

6 6 12.0 40 38.0 59 61.0<br />

Tables 4a and 4b show the head (first six lines) of the data frame<br />

obtained by applying the ProdOrdr function to the place ranks of<br />

infant health measurement. In the current content, the idea of<br />

‘better’ from reference [4] is replaced by ‘more severe’. Table 4a<br />

and 4b are the results of ProdOrdr for 5 indicators and 3 indicators<br />

respectively. Figure 4 is a scatter plot of these two salient scaling<br />

(rankings) based on 5 and 3 indicators. It shows that there is a<br />

linear tendency between those two ranking results with correlation<br />

0.82 (p-value < 2.2e-16). This means the rankings based on 5 and<br />

5


3 indicators are similar but not the same. In this case, the ranking<br />

process may use only 3 indicators, especially if the principle of<br />

parsimony is applied.<br />

Table 4a. Head (first 6 lines) of data frame obtained by<br />

applying the ProdOrdr function to place ranks of infant<br />

health measurement for 5 indicators via the R commands [4]<br />

CaseIDs AA SS ORDIT Salient<br />

1 13.08 7.48 8692.086 46.5<br />

2 13.08 7.48 8692.086 46.5<br />

3 12.15 19.63 8785.223 52<br />

4 5.61 30.84 9439.327 71.5<br />

5 3.74 28.97 9626.301 80<br />

6 21.5 6.54 7850.083 28.5<br />

Table 4b. Head (first 6 lines) of data frame obtained by<br />

applying the ProdOrdr function to place ranks of infant<br />

health measurement for 3 indicators via the R commands [8]<br />

CaseIDs AA SS ORDIT Salient<br />

salient3<br />

1 13.08 57.94 8692.667 79<br />

2 19.63 38.32 8037.477 58<br />

3 14.02 53.27 8598.62 76<br />

4 24.3 35.51 7570.469 51<br />

5 20.56 37.38 7944.471 57<br />

6 46.73 7.48 5327.14 22<br />

0 20 40 60 80 100<br />

45<br />

0 20 40 60 80 100<br />

salient5<br />

Figure 4. Scatter Plot of salient with 5 indicators and 3<br />

indicators as generated by R [8]<br />

Precedence plot of districts by product-order is shown in Figure<br />

5a and 5b. The labels on plotted points in Figure 5 are district<br />

numbers in the data file. These lines must be retrieved to<br />

determine identities of the respective districts. Table 6a shows the<br />

five most severe districts based on 5 indicators and Figure 6a<br />

shows the map of these districts. Location of the 3 districts (90,<br />

64<br />

61<br />

15<br />

93<br />

231<br />

87, 81) is in West Java, while one district (47) is in Central Java<br />

and district 58 is at the border of Central Java and East Java.<br />

Table 6b shows the 5 least severe districts based on 5 indicators<br />

and Figure 6b shows the map of these districts. Location of the 5<br />

least severe districts (city type) is in the central of its main district<br />

and almost cannot be seen from the map on Figure 6b; district 73<br />

is in the middle of district 51 in Central Java; district 31 is in the<br />

middle of district 5; district 106 is a small area in the west area of<br />

the island; district 35 is in the middle of district 16; district 36 is<br />

in the middle of district 19. The three districts (31, 35, 36) are in<br />

East Java area.<br />

AA as %DD<br />

AA as %DD<br />

0 20 40 60<br />

0 20 40 60 80<br />

90<br />

87<br />

47<br />

58 84<br />

0 20 40 60 80<br />

4758<br />

72<br />

44<br />

83<br />

45<br />

90<br />

61<br />

79<br />

81<br />

9<br />

SS as %DD (Deleted Domain)<br />

(a)<br />

77 30<br />

34<br />

31<br />

43 73<br />

0 20 40 60 80<br />

SS as %DD (Deleted Domain)<br />

35 36 75<br />

106<br />

95 77 30<br />

101 34 7536<br />

106 96<br />

103 78<br />

43 31<br />

7338<br />

(b)<br />

Figure 5. Precedence plot (based on place ranks) of districts<br />

labeled with district numbers for 5 indicators (a) and 3<br />

indicators (b), from R commands [8]<br />

6


Table 6a. Five most severe districts based on 5 indicators<br />

according to ORDIT ordering and salient scaling, as retrieved<br />

by R commands [8]<br />

Latitude<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S<br />

CaseIDs AA SS ORDIT Salient<br />

90 74.77 0 2523 1<br />

87 58.88 0 4112 2<br />

47 51.4 0 4860 3<br />

58 45.79 0 5421 5<br />

81 45.79 0 5421 5<br />

107 106 94<br />

104 10599<br />

93<br />

100<br />

79 95<br />

91<br />

92<br />

90<br />

63<br />

96<br />

80<br />

81<br />

10197<br />

82<br />

87 98<br />

89 88<br />

86<br />

61<br />

62<br />

78 77<br />

64<br />

72 71 70 69 68 67 76<br />

58<br />

60<br />

59<br />

23<br />

24 25<br />

26<br />

29<br />

27 28<br />

83<br />

66 65<br />

22<br />

37<br />

102 46 47<br />

75<br />

85<br />

103<br />

44 45<br />

50<br />

52 57<br />

21<br />

35 15<br />

84<br />

73 51<br />

74<br />

18 17 16<br />

48 56 20 3619<br />

49<br />

34<br />

42 53 54<br />

14<br />

39 43<br />

33<br />

306<br />

38<br />

40<br />

13<br />

55 2<br />

41<br />

32<br />

12<br />

11<br />

1 3 4 315<br />

7 8<br />

9<br />

10<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

Figure 6a. Five most severe districts based on 5 indicators,<br />

mapped by the sp package of R [11],[12]<br />

Table 6b. Five least severe districts with 5 indicators<br />

according to ORDIT ordering and salient scaling, as retrieved<br />

by R commands [8]<br />

Latitude<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S<br />

CaseIDs AA SS ORDIT Salient<br />

73 0 63.55 10000.6 104<br />

31 0 71.03 10000.7 105<br />

106 0 71.96 10000.7 106<br />

35 0 81.31 10000.8 107<br />

36 0 82.24 10000.8 108<br />

107 106 94<br />

104105<br />

99 93<br />

100<br />

79 95<br />

91<br />

92<br />

90<br />

63<br />

96<br />

80<br />

81<br />

101 97<br />

82<br />

87 98<br />

89 88<br />

86<br />

61<br />

62<br />

78 77<br />

64<br />

72 71 70 69 68 67 76<br />

58<br />

60<br />

59<br />

23<br />

24 25<br />

26<br />

29<br />

27 28<br />

83<br />

66<br />

22<br />

46 65<br />

37<br />

102 103<br />

47<br />

75<br />

44 45<br />

50<br />

52 57<br />

84<br />

85<br />

73<br />

21<br />

35 15<br />

51<br />

74<br />

17 16<br />

48<br />

56<br />

19 18<br />

20 36<br />

34<br />

49 42 53 54<br />

14<br />

39 43<br />

33<br />

306<br />

38<br />

40<br />

13<br />

55 2<br />

41<br />

32<br />

1 3<br />

4 31<br />

5 7 8<br />

12<br />

11<br />

9<br />

10<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

232<br />

Figure 6b. Five least severe districts based on 5 indicators,<br />

mapped by the sp package of R [11],[12].<br />

Table 7a and 7b present the 5 most severe districts and the 5 least<br />

severe districts, respectively, based on 3 indicators. Five most<br />

severe districts are shown in Figure 7a. Two districts (83 and 87)<br />

are located in West Java, and 2 districts (44 and 90) are located in<br />

the border area between West Java and Central Java, and district<br />

45 locates in Central Java, this district adjacent to district 44.<br />

Figure 7b shows five least severe districts. District 43 is a city in<br />

the south area of Central Java, district 73 is in the center of district<br />

51 as mentioned before, district 38, district 31, and district 35 are<br />

districts in East Java. All these districts are city type districts.<br />

Table 7a. Five most severe districts with 3 indicators<br />

according to ORDIT ordering and salient scaling, as retrieved<br />

by R commands [8]<br />

CaseIDs AA SS ORDIT Salient<br />

44 90.65 0 935 1<br />

83 87.85 0 1215 2.5<br />

87 87.85 0 1215 2.5<br />

45 84.11 0 1589 4<br />

90 76.64 1.87 2336.08 5<br />

Table 7b. Five least severe districts with 3 indicators<br />

according to ORDIT ordering and salient scaling, as retrieved<br />

by R commands [8]<br />

Latitude<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S<br />

CaseIDs AA SS ORDIT Salient<br />

43 0 79.44 10000.794 104<br />

73 0 88.79 10000.888 105<br />

38 0 91.59 10000.916 106<br />

31 0 93.46 10000.935 107.5<br />

35 0 93.46 10000.935 107.5<br />

107 106 94<br />

104105<br />

99 93<br />

100<br />

91 90<br />

79 95<br />

92<br />

63<br />

87 98<br />

61 60<br />

89 88<br />

62<br />

78<br />

96<br />

101 97<br />

77<br />

64<br />

82<br />

86<br />

23<br />

26<br />

29<br />

72 71 70 69 68 67 76<br />

80<br />

59<br />

27 28<br />

81<br />

58<br />

24 25<br />

66<br />

22<br />

46 65<br />

37<br />

83 102 103<br />

47<br />

75<br />

44 45<br />

50<br />

52 57<br />

84<br />

85<br />

73<br />

21<br />

35 15<br />

51<br />

74<br />

17 16<br />

48<br />

56<br />

19 18<br />

20 36<br />

34<br />

49 42 53 54<br />

14<br />

39 43<br />

33<br />

306<br />

38<br />

12<br />

40<br />

13<br />

55 2<br />

32<br />

11<br />

41<br />

1 3<br />

4 31<br />

5 7 8<br />

9<br />

10<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

Figure 7a. Five most severe districts based on 3 indicators,<br />

mapped by the sp package of R [11],[12].<br />

7


Latitude<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S<br />

107 106 94<br />

104105<br />

99 93<br />

100<br />

91 90<br />

79 95<br />

92<br />

63<br />

87 98<br />

61 60<br />

89 88<br />

62<br />

78<br />

96<br />

101 97<br />

77<br />

64<br />

82<br />

86<br />

23<br />

26<br />

29<br />

72 71 70 69 68 67 76<br />

80<br />

59<br />

27 28<br />

81<br />

58<br />

24 25<br />

66<br />

22<br />

46 65<br />

37<br />

83 102 103<br />

47<br />

75<br />

44 45<br />

50<br />

52 57<br />

84<br />

85<br />

73<br />

21<br />

35 15<br />

51<br />

74<br />

17 16<br />

48<br />

56<br />

19 18<br />

20 36<br />

34<br />

49 42 53 54<br />

14<br />

39 43<br />

33<br />

306<br />

38<br />

12<br />

40<br />

13<br />

55 2<br />

32<br />

11<br />

41<br />

1 3<br />

4 31<br />

5 7 8<br />

9<br />

10<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

Figure 7b. Five least severe districts based on 3 indicators,<br />

mapped by the sp package of R [11],[12]<br />

Ranking of districts is continued based on salient scaling of 5<br />

indicators (salient5) and salient scaling based on 3 indicators<br />

(salient3) as indicators for new ranks.<br />

Table 8a shows the five least severe districts; and Table 8b shows<br />

the five most severe districts. Here sal5 and sal3 (salient result of<br />

5 and 3 indicators) used as indicators to obtain ranking of the<br />

districts. It has positive sense, so smaller number of the salient<br />

result means least severe of districts.<br />

Table 8a. Five least severe districts with salient5 and salient3<br />

as indicators according to ORDIT ordering and salient<br />

scaling, as retrieved by R commands [8]<br />

CaseIDs AA SS ORDIT Salient<br />

35 99.07 0.00 93 1<br />

31 97.2 0.93 280.332 2<br />

36 95.33 0.00 467 3<br />

73 95.33 1.87 467.4 4<br />

43 94.39 2.80 561.499 6<br />

Table 8b. Five most severe districts with salient5 and salient3<br />

as indicators according to ORDIT ordering and salient<br />

scaling, as retrieved by R commands [8]<br />

CaseIDs AA SS ORDIT Salient<br />

47 1.87 91.59 9813.933 104<br />

83 0.93 96.26 9907.972 105<br />

44 0 92.52 10000.925 106<br />

90 0 96.26 10000.963 107<br />

87 0 98.13 10000.981 108<br />

Figure 8a and 8b shows the districts of Table 8a and 8b,<br />

respectively. Table 9 is a resume of all results of ORDIT rankings.<br />

The first column is the ids of districts, second, third, and fourth<br />

columns indicate whether the district is a member of 5 least or 5<br />

worst severe districts based on 5 indicators, 3 indicators, and 2<br />

233<br />

indicators (salient5 and salient3), respectively. The fifth column is<br />

a mark for a district as a member of all results.<br />

Latitude<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S<br />

107 106 94<br />

104105<br />

99 93<br />

100<br />

91 90<br />

79 95<br />

92<br />

63<br />

87 98<br />

61 60<br />

89 88<br />

62<br />

78<br />

96<br />

101 97<br />

77<br />

64<br />

82<br />

86<br />

23<br />

26<br />

29<br />

72 71 70 69 68 67 76<br />

80<br />

59<br />

27 28<br />

81<br />

58<br />

24 25<br />

66<br />

22<br />

46 65<br />

37<br />

83 102 103<br />

47<br />

75<br />

44 45<br />

50<br />

52 57<br />

84<br />

85<br />

73<br />

21<br />

35 15<br />

51<br />

74<br />

17 16<br />

48<br />

56<br />

19 18<br />

20 36<br />

34<br />

49 42 53 54<br />

14<br />

39 43<br />

33<br />

306<br />

38<br />

12<br />

40<br />

13<br />

55 2<br />

32<br />

11<br />

41<br />

1 3<br />

4 31<br />

5 7 8<br />

9<br />

10<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

Figure 8a. Five best districts based on salient 5 and salient 3<br />

as indicators, mapped by the sp package of R[11],[12]<br />

Latitude<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S<br />

107 106 94<br />

104105<br />

99 93<br />

100<br />

91 90<br />

79 95<br />

92<br />

63<br />

87 98<br />

61 60<br />

89 88<br />

62<br />

78<br />

96<br />

101 97<br />

77<br />

64<br />

82<br />

86<br />

23<br />

26<br />

29<br />

72 71 70 69 68 67 76<br />

80<br />

59<br />

27 28<br />

81<br />

58<br />

24 25<br />

66<br />

22<br />

46 65<br />

37<br />

83 102 103<br />

47<br />

75<br />

44 45<br />

50<br />

52 57<br />

84<br />

85<br />

73<br />

21<br />

35 15<br />

51<br />

74<br />

17 16<br />

48<br />

56<br />

19 18<br />

20 36<br />

34<br />

49 42 53 54<br />

14<br />

39 43<br />

33<br />

306<br />

38<br />

12<br />

40<br />

13<br />

55 2<br />

32<br />

11<br />

41<br />

1 3<br />

4 31<br />

5 7 8<br />

9<br />

10<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

Figure 8b. Five most severe districts based on salient 5 and<br />

salient 3 as indicators, mapped by the sp package of R<br />

[11],[12].<br />

Table 9. Five worst and five best districts as the result of<br />

ORDIT rankings<br />

Worst District salient5 salient3 salient53 Mark<br />

90 Yes Yes Yes √<br />

87 Yes Yes Yes √<br />

47 Yes No Yes<br />

58 Yes No No<br />

81 Yes No No<br />

44 No Yes Yes<br />

83 No Yes Yes<br />

45 No Yes No<br />

Best District<br />

73 Yes Yes Yes √<br />

31 Yes Yes Yes √<br />

106 Yes No No<br />

35 Yes Yes Yes √<br />

36 Yes No Yes<br />

43 No Yes Yes<br />

38 No Yes No<br />

6.3 THE RESULTS OF ULS HOTSPOT<br />

DETECTION<br />

The districts in the hotspot area as the result of ULS hotspot<br />

detection based on each indicator are shown in Figure 9. It shows<br />

that for the first three indicators hotspot area (a,b,c) is dominant in<br />

Central Java, but for the forth indicator (d), the hotspot area is<br />

8


dominant in West Java, while for the fifth indicator (e) the hotspot<br />

area comprises some districts of East Java<br />

Latitude<br />

Latitude<br />

9°�S 8°�S 7°�S 6°�S 5°�S<br />

Latitude<br />

9°�S 8°�S 7°�S 6°�S 5°�S<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S<br />

The Hotspot of Number of Infants Death in Java Island, 2007<br />

190<br />

266 89 196<br />

115<br />

174 28<br />

170<br />

86<br />

328<br />

244<br />

39<br />

109<br />

189<br />

413 85<br />

134 345<br />

60134<br />

114<br />

107<br />

392<br />

173 178<br />

10 44<br />

145<br />

169 78 170 210 83 208<br />

96<br />

329 125<br />

162<br />

83 223<br />

31<br />

56<br />

72 117<br />

115 177<br />

147<br />

186 69<br />

312 104 69<br />

663<br />

25<br />

392 270<br />

141<br />

217 142<br />

347<br />

96<br />

340<br />

14 372<br />

100 2<br />

47<br />

260 101<br />

111 66<br />

100<br />

133<br />

96 18<br />

62<br />

61<br />

63 253 46<br />

66<br />

37 32<br />

24<br />

85<br />

298 17<br />

82<br />

50<br />

187<br />

131 112<br />

174<br />

172<br />

84<br />

61<br />

97 6<br />

78 83 142 77<br />

285<br />

139<br />

6 22<br />

54<br />

108<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

ULS hotspot detection, mapped with R<br />

(a)<br />

The Hotspot of Number of People in Poverty (in thousands) in Java Island, 2007<br />

519.5<br />

229.6<br />

400.4<br />

111.7 231.2<br />

49.1 70.3<br />

371.6<br />

365.3<br />

701.6 267.5 319 258 203.7 215.4260.5<br />

352.3<br />

283.9<br />

394.6<br />

519.1<br />

297.8<br />

288.3<br />

325.5<br />

338.9 257.4<br />

297.6 273.6<br />

178.5 229.5<br />

321.5<br />

203.7<br />

435.5<br />

328.2 361.5<br />

26.2<br />

780 550.2<br />

270.5 300.4 270.4<br />

188.7<br />

11.5 223.3<br />

302.4 375.6 20.1<br />

74.9<br />

261.6143.8<br />

214.9 130.6 230.5<br />

420.6 102.212.1<br />

203<br />

21.3<br />

161.5380.1230.9<br />

278.7<br />

131.5 60<br />

34.9<br />

35.3 267.4 15<br />

93.9<br />

201<br />

277.1<br />

273.3 157.9<br />

56.6<br />

165.7<br />

301.2<br />

125.6 170.5 15.2<br />

199<br />

149.1 171.2 365.3<br />

417<br />

227.3<br />

213.1<br />

9470.7 141.7<br />

35.4 122.6 106.9 294.4<br />

35.9<br />

91.4<br />

235.8<br />

114.5<br />

361.7<br />

28.3 398<br />

161.8 234.4<br />

43.7<br />

22.6<br />

87.2<br />

187.7<br />

54.5 12.9<br />

171.8<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

ULS hotspot detection, mapped with R<br />

(b)<br />

The Hotspot of Low Birth Weight in Java Island, 2007<br />

610 129 261<br />

947 1962 215 392<br />

154<br />

815 90<br />

540<br />

212<br />

814<br />

238<br />

96<br />

386<br />

580<br />

1085 238<br />

490 299<br />

478 752<br />

172<br />

149<br />

113<br />

788<br />

60<br />

768<br />

172<br />

295 300 522 483 9 137<br />

931<br />

445<br />

436 345<br />

606<br />

125 189<br />

164<br />

130 85 144<br />

262 644<br />

208<br />

228 1307<br />

2464 111 105<br />

507<br />

62<br />

572 815 1003<br />

208<br />

276 413<br />

271<br />

36 971<br />

616<br />

357 83<br />

209<br />

556 295<br />

131 214<br />

422<br />

238<br />

274 43<br />

476<br />

86<br />

68 40 350<br />

156<br />

204 5<br />

164<br />

66 401 19<br />

220<br />

530<br />

409<br />

383 187<br />

164<br />

250<br />

176<br />

145<br />

252 11<br />

130 250 668 573<br />

388<br />

184<br />

1456<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

ULS hotspot detection, mapped with R<br />

(c)<br />

234<br />

Latitude<br />

10°�S 8°�S 6°�S<br />

Latitude<br />

The Hotspot of Non Health Personnel Assisted (in percentage) in Java Island, 2007<br />

6.3<br />

14.6 3.2 0<br />

26.6<br />

30.3 14.5<br />

11.7<br />

21.9<br />

43.8<br />

18.5<br />

22.5 10.5<br />

2.5 14.2<br />

43.3 39.7<br />

13.6<br />

21.6<br />

7.6 4.8<br />

18.7<br />

29.7<br />

3.2<br />

33.9<br />

13.5<br />

18.3<br />

37.3<br />

18.5 17.8 15.1 2.3 22 9.9<br />

22.6 21.2<br />

48.9<br />

6<br />

8.9 0<br />

20.6<br />

27.3<br />

28.2 8.7<br />

8.8 10.6<br />

5<br />

18.9<br />

47.6 22.8 22.7<br />

25.8<br />

24.1<br />

0.2<br />

12 5.9<br />

25.9<br />

15.8 9<br />

29.6<br />

0.2<br />

41.1<br />

4.8 9.5<br />

0 4.5<br />

4.5<br />

14 0.2<br />

2.4 11.9<br />

20.3<br />

12.4<br />

6.2 0<br />

9.1<br />

0.9<br />

7.3 9.8 10.4<br />

19.7<br />

6 7.2<br />

4.6 11.6 9.9<br />

19<br />

21.3<br />

14.5 11.3<br />

4.6 14.6<br />

0<br />

12.6<br />

17.6<br />

20.2<br />

3 2.4<br />

16.2 0.5 22.2 5.4<br />

19.3<br />

13.9<br />

0 0 8.9<br />

12.6<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

10°�S 9°�S 8°�S 7°�S 6°�S 5°�S 4°�S<br />

107 106 94<br />

104 105 99 93<br />

100<br />

79 95<br />

91<br />

92<br />

90<br />

96<br />

80<br />

81<br />

10197<br />

82<br />

87 98<br />

89 88<br />

86<br />

108<br />

83<br />

102 103<br />

84<br />

85<br />

ULS hotspot detection, mapped with R<br />

(d)<br />

Longitude<br />

The Hotspot of Average Education Shortfall in Java Island, 2007<br />

63<br />

62 61 60<br />

78 77<br />

64<br />

23<br />

29<br />

72 71 70 69 68 67 76<br />

26 27<br />

58 59<br />

28<br />

24 25<br />

66<br />

22<br />

46 65<br />

37<br />

47<br />

75<br />

44 45<br />

50<br />

52 57<br />

73<br />

21<br />

35 15<br />

51<br />

74<br />

17 16<br />

19 18<br />

48 56 20 36<br />

49 42 53 54<br />

34<br />

14<br />

39 43<br />

306<br />

33<br />

38<br />

12<br />

40<br />

13<br />

55 2<br />

32<br />

11<br />

41<br />

1 3 4 315<br />

7 8<br />

9<br />

10<br />

106°�E 108°�E 110°�E 112°�E 114°�E 116°�E<br />

Longitude<br />

ULS Hotspot Detection, mapped with R<br />

(e)<br />

Figure 9. ULS Hotspot districts of infd (a), pov (b), lbw (c),<br />

abhp (d), and avedsf (e) as generated by the R commands<br />

[11],[12].<br />

Table 10 shows the five worst districts for salient5, salient3 and<br />

salient53 and information whether the district is a hotspot or not a<br />

hotspot. There is no district of the first column as the hotspot<br />

based on indicator avedsf (average education shortfall), so this<br />

column is omitted. Districts 90 and 87 are strong enough to be<br />

considered as the worst districts of infant health.<br />

Table 10. Five worst districts for salients and ULS hotspot<br />

districts for each indicator<br />

Distr sal5 sal3 sal53 hinfd hpov hlbw habhp<br />

90 Yes Yes Yes Yes No Yes Yes<br />

87 Yes Yes Yes Yes No Yes Yes<br />

47 Yes No Yes Yes Yes Yes Yes<br />

58 Yes No No Yes Yes Yes No<br />

81 Yes No No No No No Yes<br />

83 No Yes Yes Yes No Yes Yes<br />

44 No Yes Yes Yes Yes Yes No<br />

45 No Yes No Yes Yes Yes No<br />

9


7. CONCLUSION<br />

According to ORDIT analysis with five and three indicators and<br />

sal5 & sal3 as indicators, the most severe districts of infant health<br />

are districts 90 and 87. The least severe districts are district 73,<br />

31, and 35 (all are cities). The most severe districts are in West<br />

Java. The two least severe districts are cities in Central Java and<br />

one least severe (best) district is a city in East Java. The least<br />

severe areas are city type districts. The most severe districts (90<br />

and 87) are also confirmed by the ULS method as the worst<br />

districts for infant health. These districts are in the hotspots area<br />

of three indicators. To improve infant health in Java, the<br />

government, especially the Health Department should give more<br />

attention to districts 90 (Indramayu) and 87 (Cirebon) which are<br />

the worst districts for infant health. Hopefully through this study,<br />

ORDIT ranking and ULS hotspot detection methods will be<br />

recognized to be useful micro tools to support decision makers in<br />

the e-governance.<br />

8. ACKNOWLEDGEMENTS<br />

I would like to acknowledge the valuable guidance of Prof. G.P.<br />

Patil, Center for Statistical Ecology and Environmental Statistics,<br />

Department of Statistics, the Pennsylvania State University. Many<br />

thanks to the Directorate General of Higher Education Indonesia<br />

for financial support through the Doctoral Sandwich Program that<br />

I received.<br />

9. REFERENCES<br />

[1] Gortmaker, S.L. Poverty and Infant Mortality in the United<br />

States. American Sociological Review, 44, 2 (Apr. 1979),<br />

280-297.<br />

[2] Frieden, T.R. CDC Health Disparities and Inequalities<br />

Report – United States. Morbidity and Mortality Weekly<br />

Report. 60. 2011<br />

[3] OECD. Health at a Glance 2011: OECD Indicators, OECD<br />

Publishing. http://dx.doi.org/10.1787/health_glance-­‐<br />

2011-­‐en<br />

235<br />

[4] Frankenberg, E. The Effects of Access to Heath Care on<br />

Infant Mortality in Indonesia, Health Transition Review 5,<br />

(1995), 143 – 163.<br />

[5] Desai, S. and Alva, S. Maternal education and child health: Is<br />

there a strong causal relationship? Demography, 35, 1 (Feb.<br />

1998), 71-81.<br />

[6] Braveman, P., Cubbin, C., Marchi, K., Egerter, S., Chaves,<br />

G. Measuring Socioeconomic Status/ Position in Studies of<br />

Racial/Ethnic Disparities: Maternal and Infant Health, Public<br />

Health Reports: September–October 2001, Vol.116.<br />

http://www.ncbi.nlm.nih.gov/pmc/articles/<br />

PMC1497365/pdf/12042609.pdf<br />

[7] Biro Pusat Statistik, Indonesia Population by Province 1971,<br />

1980, 1990, 1995, 2000 dan 2010.<br />

http://www.bps.go.id/tab_sub/view.php?tabel=1&daftar=1&i<br />

d_subyek=12&notab=1, 2010<br />

[8] Myers, W. and Patil, G.P. Preliminary Prioritization Based<br />

on Partial Order Theory and R Software for Compositional<br />

Complexes in Landscape Ecology, with Applications to<br />

Restoration, Remediation, and Enhancement. Environmental<br />

Ecological Statistics. 17, 4, 2010, 411-436.<br />

[9] Jahan, S. Poverty and infant mortality in the Eastern<br />

Mediterranean region: a meta-analysis. J Epidemiol<br />

Community Health 2008, 62, 745–751.<br />

[10] DEPKES RI. Bank Data Pusdatin-DepKes RI. 2009.<br />

http://www.bankdata.depkes.go.id/nasional/public/report/cre<br />

atetablepti<br />

[11] Roger,S.B., Pebesma, E.J., Rubio,V.G. Applied Spatial Data<br />

Analysis with R, Springer, Washington. 2008.<br />

[12] Moore, C. Mapping with R: Choropleth of 3rd grade reading<br />

proficiency in the Twin Cities, Article. April 19, 2008.<br />

[13] Patil, G.P., Joshi, S.W., Koli, R.E. PULSE, Progressive<br />

Upper Level Set Scan Statistics for Geospatial Hotspot<br />

Detection. Environmental Ecological Statistics. 17, 2, 2010,<br />

411-436.<br />

[14] Patil, G. P. and Taillie, C. Upper Level Set Scan Statistic for<br />

Detecting Arbitrarily Shaped Hotspots. Environmental and<br />

Ecological Statistics, 11, 2004, 183 – 197.<br />

http://www.stat.psu.edu/~gpp.<br />

10


Technological Assessment of e-government Web<br />

presence in Nigeria<br />

Awoleye, O. Michael<br />

National Centre for Technology<br />

Management (NACETEM), An Agency<br />

of the Federal Ministry of Science &<br />

Technology, P.M.B. 012, Obafemi<br />

Awolowo University, Ile-Ife, 20005,<br />

Nigeria<br />

+234-(0)7069197823<br />

awoleye@yahoo.co.uk<br />

ABSTRACT<br />

Government bringing innovation into its activities is a good<br />

gesture but innovation that constitutes peril due to inadequate<br />

technical capability necessitates re-assessment, hence this<br />

investigation.This study investigated susceptibility of some<br />

chosen government websites to infiltration due to flaws in the<br />

design of their websites. Sixty four websites of some<br />

organizations were randomly selected using an advanced feature<br />

of google to sieve organization’s websites that have adopted the<br />

use of country code Top Level Domain (ccTLD) i.e. the<br />

“.gov.ng”. The research was based on some major measuring<br />

parameters which are: Cross Site Scripting (XSS), Structured<br />

Query Language injection (SQLi), Cookie manipulation (CM),<br />

unencrypted password (UP) and broken links (BL). The sixty four<br />

(64) government websites chosen span 8 categories of sectors<br />

with a view to evaluating their immunity against cyber attacks. It<br />

was found that 27 (42.2%) of the websites are vulnerable to XSS,<br />

while 20 (31.3%) to SQLi. Also, 24 websites which represents<br />

37.5% of the websites examined are having the password inputted<br />

by the user unencrypted while a high percentage (70.3) have<br />

informational issues, like broken links which in itself may not<br />

constitute high vulnerability but could create susceptible platform<br />

which could permit infiltration. Thereafter, some appropriate<br />

policy directions which provide technical advice as to protect<br />

government resources available through the Internet were<br />

advanced. This tends to also increase citizens’ confidence on the<br />

adoption of the government web-presence initiative.<br />

Categories and Subject Descriptors<br />

K.4.6. [Security and Protection]<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Ojuloge, Blessing<br />

National Centre for Technology<br />

Management (NACETEM), An Agency<br />

of the Federal Ministry of Science &<br />

Technology, P.M.B. 012, Obafemi<br />

Awolowo University, Ile-Ife, 20005,<br />

Nigeria<br />

+234-(0)8035762207<br />

blessingojuloge@yahoo.com<br />

236<br />

General Terms<br />

Management, Security, Performance<br />

Keywords<br />

Siyanbola, Willie O.<br />

National Centre for Technology<br />

Management (NACETEM), An Agency<br />

of the Federal Ministry of Science &<br />

Technology, P.M.B. 012, Obafemi<br />

Awolowo University, Ile-Ife, 20005,<br />

Nigeria<br />

+234-(0)8033449687<br />

williesiyanbola@yahoo.com<br />

Web presence, e-government, management, vulnerability, policy,<br />

cross site injection, SQL injection, security, performance, cyber<br />

security<br />

1. INTRODUCTION<br />

Advancement in Internet and its services has culminated into<br />

many applications and it provides information gathering platform<br />

for citizens and opportunities for businesses to thrive [1].<br />

Organizations and government bodies have leveraged severally on<br />

these facilities provided by the web for improved efficiency in<br />

service delivery, transparency, increased revenue, cost-saving and<br />

global competitiveness. The art of online administration of<br />

government activities is referred to as e-government [2]. By this,<br />

the government can reach more citizens without boundary<br />

irrespective of their locations at any point in time. And in turn, the<br />

citizens can also reach the government without the bureaucracy<br />

barrier [3].<br />

The understanding of these facts most especially the benefits,<br />

prompted the Nigerian Government to suggest to all its bodies at<br />

all levels (federal, state and local) to make their presence known<br />

on the Internet, by creating websites to deliver their services and<br />

for effective information exchange. It also mandated them to use<br />

the country code Top Level Domain (ccTLD), knowing the<br />

benefits derivable from such as well as its security implications.<br />

Using a ccTLD, the users are guaranteed genuineness of the<br />

domain since the registration of such domain is supervised. It is<br />

worth noting to state that Nigeria Internet Registration<br />

Association- NIRA (a non-government organisation) is<br />

responsible to managing the ccTLD for Nigeria, while National<br />

Information Technology and Development Agency (NITDA) has<br />

been saddled with the responsibility of managing the government<br />

sub-domain (.gov.ng) as a part of the entire ccTLD. The<br />

requirement for the registration processes of the domain is quite<br />

stringent and hence the likelihood of domain hijack or<br />

misrepresentation is remote. This is important because of the<br />

services that some of these organisations provide online which


include but not limited to: payment of tax, record keeping<br />

(financial records, medical records, intellectual property<br />

information, trade secrets and other citizens’ personal data) etc.<br />

Making some of these services available online presents a better<br />

and easy way of government-citizens’ relationship, most<br />

especially on discharging obligations within and across the<br />

parties. However, the concern now is the fear of adequate<br />

technical capability or awareness of susceptibility of the design of<br />

such platforms (websites) without given cognizance for avoidance<br />

of common programming errors which may jeopardize successful<br />

operation of the websites. A website is said to be vulnerable when<br />

it has the propensity for infiltration which may be as a result of<br />

flaws within the codes that made up the website, this is referred to<br />

application level [4] or server side attacks. Other issues of concern<br />

have to do with some underlying technicalities that can prevent<br />

unforeseen circumstances that may befall the successful operation<br />

of the websites.<br />

It has been reported in literature that dynamic web applications<br />

contain a wide range of input validation vulnerabilities such as<br />

cross site scripting [5][6][7][8][9] and SQL injection<br />

[10][11][12][13][14]. Because of the web popularity relative to<br />

the number of millions of Internet users, the internet has become<br />

prime targets for attackers [15] and today they are motivated by<br />

financial gains rather than just being destructive, Symantec (2007)<br />

as cited in [1]. Attacks against web applications constitute more<br />

than 60% of the total attack attempts observed on the Internet as<br />

showed in a report [16]. Also, in the study carried out by [6] it<br />

was reported that 82% of the e-government websites around the<br />

globe were vulnerable to Cross Site Scripting (XSS) and Structure<br />

Query Language injection (SQLi). It was further discovered in the<br />

study that 90% of European, 85% of Asian, 76% of the North<br />

American and 49% of African government websites are<br />

vulnerable to common web application attacks [6]. Apart from the<br />

specified web application attacks earlier mentioned, denial of<br />

service (DoS), unauthorized access to networks, theft of employee<br />

or customer information, online financial fraud etc are also known<br />

prevalent attacks [1].<br />

Furthermore, SQL injection and cross-site scripting may be used<br />

by attackers to alter back-end tables from databases and to launch<br />

phishing attacks on vulnerable servers. Most website owners fail<br />

to validate their application for common flaws and until now,<br />

there is no study that has provided empirical data on how<br />

vulnerable the Nigerian government websites are. It is in this<br />

context that this research is necessitated in order to create<br />

awareness for the government and its bodies on vulnerability level<br />

of their websites and the need to take necessary action. It also<br />

presents some policy suggestions to safeguard possible<br />

occurrences and to present measures to avert continued<br />

susceptibility.<br />

2.0 WEB APPLICATION SECURITY<br />

Web applications have become fertile ground for cyber attackers,<br />

attempting to penetrate systems and misuse private data. Cenzic, a<br />

web security firm, reported that almost 90% of web-related flaws<br />

were caused by web application vulnerabilities with the three<br />

most common types being: SQL injection, Cross-site Scripting,<br />

and Authentication vulnerabilities. The SAN Institute, a<br />

worldwide security organization, reported cross-site scripting,<br />

SQL injection and cross site forgery as major web vulnerabilities<br />

in 2007 [18]. It was further reported that, XSS is the most<br />

237<br />

dangerous and easily found web application security issue that can<br />

cause varieties of issues which may include defacement of web<br />

sites, insertion of hostile content, phishing attacks and allow<br />

hackers to take over a user’s browser. Details of these attacks<br />

shall be discussed in following sections.<br />

2.1 Cross site scripting (XSS)<br />

Cross site scripting is a vulnerability that allows an attacker to bypass<br />

client-side security mechanisms normally imposed on web<br />

content by the browsers. By finding ways of injecting malicious<br />

scripts, usually in the form of JavaScript, VBScript, ActiveX,<br />

HTML or Flash into a vulnerable application, an attacker may<br />

gain privileges to sensitive page-content of the web pages [19]<br />

Because a browser cannot know if the script should be trusted or<br />

not, it will execute the script in the user context and give attacker<br />

access to cookies or session tokens retained by the browser.<br />

Common attack vectors are search applications which reflect the<br />

search string, and parameters supplied in the URL.<br />

2.2 Structured query language injection<br />

(SQLi)<br />

An SQL injection attack consists of insertion or "injection" of a<br />

SQL query via the input data from the client to the application<br />

without proper filtering of dangerous script characters. A<br />

successful SQL injection exploit can read sensitive data from the<br />

database, modify database data (Insert/Update/Delete), execute<br />

administration operations on the database (such as shutdown the<br />

DBMS), recover the content of a given file existing on the DBMS<br />

file system and, in some cases, issue commands to the operating<br />

system [18][19].<br />

2.3 Cookie manipulation<br />

A cookie is a small piece of information usually created by the<br />

web server and stored in the web browser. Each time the user<br />

access the web server, this data is passed back to the server. The<br />

cookie contains information used by web applications to persist<br />

and pass variables back and forth between the browser and the<br />

web application. Client-side cookies can be persistent i.e. files<br />

stored on the client computer until an expiry date; or session i.e.<br />

files kept in the memory of the client computer until the session is<br />

ended. As a result of the cookie structure and their usage, all data<br />

stored in a client-side cookie could be easily read and<br />

manipulated.<br />

2.4 Unencrypted password<br />

One of the security features employed in a web application is<br />

password. Sensitive data such as credit card numbers, social<br />

security numbers sent into the server without using encrypted<br />

connection such as secure socket layer (SSL), can be intercepted<br />

by hackers. Encrypting the transmission of data makes it difficult<br />

to intercept sensitive information as it travels between two parties.<br />

3.0 METHODOLOGY<br />

The research was carried out on 64 Nigerian e-government<br />

websites randomly selected to determine their common web<br />

security issues. An advanced Google search feature was employed<br />

to elicit websites with a sub-domain of ‘.gov.ng’ and with a ‘php<br />

& html’ extension [6] Google retrieved a number of results but<br />

priority was given to the websites with the highest page rank, this


is with a view to using websites which files has been highly<br />

populated in the search engine database.<br />

3.1 Testing tool<br />

The second phase was to choose a software testing tool to scan for<br />

web vulnerabilities. Several criteria were part of the decision in<br />

choosing the testing tool. First, the testing software must be<br />

compatible with the windows operating system since the test was<br />

carried out on the researchers’ personal computer systems (PC).<br />

Secondly, the software must have specific vulnerability testing<br />

options to scan web sites, as opposed to common server-based<br />

scanning products. After review of different web scanners,<br />

Acunetix Web Vulnerability Scanner was employed. This is noted<br />

to be in the same category with Nmap, which has been widely<br />

used [1]. Acunetix was used to test different web application<br />

vulnerability issues including: Cross-Site Script (XSS), SQL<br />

injection (SQLi), cookie manipulation (CM), unencrypted<br />

password (UP) and broken links (BL) of the web pages, which are<br />

main targets here. The choice of these parameters is premised on<br />

the high impact of its severity compared to others. In addition to<br />

this testing tool, manual testing was also carried out on some few<br />

websites in a way as not to leave footprints on the website. This is<br />

necessary in order to confirm the results generated by Acunetix<br />

web vulnerability scanners.<br />

3.2 Procedure<br />

After launching the web scanner, the desired Universal Resource<br />

Location (URL) is entered in the wizard box provided and the<br />

‘go’ button is fired. If the Internet connection on the computer is<br />

available then the scanner will begin the process. The scanner<br />

(Acunetix), thus virtually crawl the website of any given URL and<br />

presents the analysis of the vulnerability for every run. The<br />

Internet connection used for the exercise is a 3.5G on a High<br />

Speed Downlink Packet Access (HSPDA). The scanning process<br />

took on average 25 minutes, although the times varied from 15<br />

minutes up to 1 hour depending on the size of the entire given<br />

website. The manual test for XSS as well as SQLi was carried out<br />

to confirm the results generated by the vulnerability scanner. This<br />

is possible when such scripts as alert (‘This website is<br />

vulnerable’) is inputted into any available input field<br />

such as: the search, feedback and form fields within the website<br />

and the action button is pressed thereafter. If the web page is<br />

vulnerable, a Java script enabled browser will show a java script<br />

pop-up alert window containing the text in the parenthesis, ‘This<br />

website is vulnerable’. Also to manually test for SQL injection<br />

vulnerabilities, a single quote ( ' ) can be used as input. The single<br />

quote is a special character in SQL, and if it is included in the<br />

SQL query it will most likely generate an SQL statement error.<br />

All the 64 Nigerian government websites were tested over a<br />

period of two weeks within the month of August 2011 and<br />

technical report was produced for each site, listing the types and<br />

numbers of specific vulnerabilities. Each report was divided into<br />

several sections listing four levels of security vulnerability: High,<br />

Medium, Low and Informational. High level – these are critical<br />

problems which could cause high risk damage to the website e.g<br />

website defacement [1], database manipulation and modification<br />

[6], phishing, identity theft [1] amongst others. Medium and Low<br />

level – these are problems that could pose some level of risk to<br />

users of the web application. Informational – these are messages<br />

that probably have little risk to users, but still should be analyzed<br />

238<br />

by web developers because of the possibility of creating high<br />

vulnerabilities. The sites tested were categorized into Agencies,<br />

Judiciary, Law Enforcement/Defence, Media, Ministries,<br />

Parastatals, States and Others categories.<br />

4.0 RESULTS AND DISCUSSION<br />

Out of the 64 Nigerian government sites tested, 27, which<br />

represent 42.2% were vulnerable to XSS while 31.3% are<br />

vulnerable to SQLi. It was also discovered that 37.5% and 70.3%<br />

were vulnerable to unencrypted password and broken links<br />

respectively. These findings are represented and summarized<br />

mathematically in algebraic expressions using set theory as shown<br />

in Table 1.<br />

Table 1: Algebraic representation of e-government vulnerabilities<br />

in Nigeria<br />

Algebraic<br />

Expressions<br />

Interpretations<br />

U = 64 the universal set, i.e total sample tested.<br />

n(XSS) = 27 the number of websites vulnerable to<br />

XSS.<br />

n(SQLi) = 20 the number of websites vulnerable to<br />

SQL injection<br />

n(UP) = 24 the number of websites vulnerable to UP<br />

n(BL) = 45 the number of websites vulnerable to BL<br />

n(SQLi ∪ XSS) =<br />

34<br />

n(SQLi ∩ XSS) =<br />

13<br />

n(SQLi ∩ XSS 1 ) =<br />

7<br />

n(SQLi 1 ∩ XSS) =<br />

14<br />

n(U - (SQLi ∪<br />

XSS) 1 ) = 30<br />

the number of websites vulnerable to<br />

both SQL injection & XSS<br />

the number of websites exclusively<br />

vulnerable to both SQL injection & XSS<br />

the number of websites vulnerable to<br />

SQL injection but not XSS<br />

the number of websites vulnerable to<br />

XSS but not SQL injection<br />

the number of websites vulnerable to<br />

other parameters under test but not XSS<br />

nor SQL injection<br />

Legend: SQLi – Structured Query Language injection<br />

XSS – Cross Site Scripting<br />

UP – Unencrypted Password<br />

BL – Broken Links<br />

Table 2 shows the distribution of vulnerability in each category,<br />

for example apart from other categories which constitute the<br />

highest percentage of XSS vulnerability; the judiciary followed by<br />

one out of every four being vulnerable 25% relative to the<br />

participation in the test.


Categories<br />

Only XSS<br />

(%)<br />

Table 2: Distribution of vulnerability in each category.<br />

XSS and SQLi Analysis CM &<br />

Only SQLi XSS &<br />

XSS None<br />

UP<br />

(%)<br />

SQLi (%) or SQLi(%) (%)<br />

(%)<br />

Agencies (n=10) 20 (2) 0 (0) 20 (2) 40 (4) 60 (6) 30 (3) 70 (7)<br />

Judiciary (n=8) 25 (2) 12.5 (1) 25 (2) 62.5 (5) 37.5 (3) 37.5 (3) 50 (4)<br />

Law Enf./Def (n=5) 20 (1) 0 (0) 40 (2) 60 (3) 40 (2) 40 (2) 80 (4)<br />

Media (n=2) 0 (0) 50 (1) 0 (0) 50 (1) 50 (1) 0 (0) 100 (2)<br />

Ministries (n=6) 16.7 (1) 16.7 (1) 33.3 (2) 66.7 (4) 33.3 (2) 33.3 (2) 66.7 (4)<br />

Others (n=7) 42.9 (3) 0 (0) 28.6 (2) 71.4 (5) 28.6 (2) 28.6 (2) 85.7 (6)<br />

Parastatals (n=13) 23.1 (3) 15.4 (2) 15.4 (2) 53.8 (7) 46.1 (6) 46.2 (6) 76.9 (10)<br />

States (n=13) 15.4 (2) 15.4 (2) 7.7 (1) 38.5 (5) 61.5 (8) 46.2 (6) 61.5 (8)<br />

* Please note that the values in parenthesis represent the actual number of the vulnerability found.<br />

XSS- Cross Site Scripting, SQLi- Structure Query Language injection,<br />

CM- Cookie Manipulation, UP- Unencrypted Password, BL- Broken Links<br />

Table 3: Type and magnitude of website vulnerabilities across categories<br />

Level of Severity/<br />

Category<br />

Highly Severe Less Severe<br />

XSS SQLi CM/UP BL<br />

Agencies 14.8 10.5 12 15.6<br />

Judiciary 14.8 10.5 12 8.9<br />

Law Enf./Def 11.1 10.5 8 8.9<br />

Media 0.0 5.3 4 4.4<br />

Ministries 11.1 15.8 8 8.9<br />

Others 18.5 10.5 8 13.3<br />

Parastatals 18.5 21.1 24 22.2<br />

States 11.1 15.8 24 17.8<br />

25.0<br />

20.0<br />

15.0<br />

10.0<br />

5.0<br />

0.0<br />

Figure 1: Pictorial representation of vulnerabilities across sectors<br />

239<br />

XSS<br />

SQLi<br />

CM/UP<br />

BL<br />

BL<br />

(%)


In Figure 1, the parastatals have the highest percentages of<br />

vulnerability in all the four parameters used in the research.<br />

Parastatals and Others categories have the highest vulnerability to<br />

XSS with 18.5% each. Ministries and States websites are more<br />

vulnerable to SQLi behind Parastatals with 15.8% each. Media<br />

houses category has the lowest percentage (5.3) of vulnerability to<br />

SQLi. Parastatals and States categories have the highest<br />

percentage of vulnerability to cookie manipulation and<br />

unencrypted passwords with percentages 24% each. Most of the<br />

categories had informational issues with their websites, Parastatals<br />

XSS &<br />

SQLi<br />

40%<br />

None<br />

46%<br />

XSS &<br />

SQLi<br />

33%<br />

None<br />

60%<br />

Agencies<br />

Only<br />

XSS<br />

20%<br />

Law Enforcement/Defence<br />

Ministries<br />

None<br />

33%<br />

Parastatals<br />

None<br />

40%<br />

XSS &<br />

SQLi<br />

15%<br />

XSS &<br />

SQLi<br />

20%<br />

Only<br />

XSS<br />

20%<br />

Only<br />

XSS<br />

17% Only<br />

SQLi<br />

17%<br />

Only<br />

XSS<br />

23%<br />

Only<br />

SQLi<br />

16%<br />

Figure 2: Pie charts showing vulnerabilities for categories of<br />

Government websites<br />

240<br />

(22.2%) and States (17.8%) categories have broken links in their<br />

websites.<br />

Table 3 gives the percentages of vulnerable websites for each<br />

category. ‘Others’ category has the highest ratio of vulnerability<br />

to either XSS or SQLi, followed by Ministries. More than 70% of<br />

‘Others’ category has vulnerability, while 38.5% of state<br />

government websites are vulnerable. Figure 2 illustrates the<br />

sectoral percentages representation of vulnerability to some<br />

parameters under test using pie charts.<br />

None<br />

38%<br />

XSS &<br />

SQLi<br />

25%<br />

Only<br />

SQLi<br />

50%<br />

XSS &<br />

SQLi<br />

29%<br />

None<br />

62%<br />

Judiciary<br />

None<br />

28%<br />

Media<br />

Others<br />

States<br />

None<br />

50%<br />

Only<br />

XSS<br />

25%<br />

Only<br />

XSS<br />

15%<br />

Only<br />

SQLi<br />

12%<br />

Only<br />

XSS<br />

43%<br />

Only<br />

SQLi<br />

15%<br />

XSS &<br />

SQLi<br />

8%


From table 3, it can be deduced that the website from the ‘Others’<br />

and Judiciary categories have the highest percentage of<br />

vulnerability to only XSS, while the Media category has the<br />

highest vulnerability to only SQLi. Out of the 8 categories<br />

examined, State category has the highest percentage (61.5) of<br />

websites that are not vulnerable to XSS or SQLi, use fewer<br />

technologies and have fewer numbers of pages in their websites,<br />

hence decreasing the possibility of introducing vulnerability in<br />

their web application.<br />

Table 3: Vulnerability Test Results<br />

High Level<br />

Agencies<br />

N=10<br />

Judiciary N=8 Law<br />

Enf./Def<br />

N=5<br />

* Numbers of websites are enclosed in parenthesis<br />

Table 3 shows overall vulnerability test results of 64 Nigerian<br />

websites. There was a wide range of total errors for each category.<br />

Within the ‘high level’, which relates to critical problems found in<br />

the sites, the 13 ‘States’ web sites had a total error count of 380<br />

(out of which a particular State Government website had 339),<br />

followed by Judiciary category with total error count of 249.<br />

Media and Ministries web sites had lower numbers of 1 and 64<br />

error counts respectively at this level. Results in the ‘medium/low<br />

error level’ showed that Parastatals websites had 40 errors while<br />

Law enforcement/defence, Ministries and Others categories had 3,<br />

3 and 2 errors respectively. Most of the sites did possess medium<br />

intensity issues, and only 2 Media websites did not have them,<br />

while a good number of 3 Law enforcement/defence, 4 Ministries<br />

and Others websites were free of problems at this level. Most sites<br />

across the categories did have informational warnings. There were<br />

a total of 117 warnings in Parastatals website, 3 in Media and 69<br />

in others websites.<br />

5.0 SUMMARY AND CONCLUSION<br />

It was shown in this work that most Nigerian government<br />

websites across federal, state and local government are vulnerable<br />

to different forms of attacks. This is due to application errors<br />

and/or deficiency in the design especially as it relates to coding of<br />

the back-end. An average of 53.1 percent of sites contains critical<br />

vulnerabilities (XSS and SQLi), 37.5% have medium-low level<br />

issues (cookie manipulation and unencrypted password) and 70.3<br />

percent contain informational issues (broken links) in their<br />

websites. This is an undesirable level of protection. As more<br />

Media<br />

N=2<br />

services are offered on a daily basis to the public through the<br />

portals and the number of government databases connected with<br />

these services are increasing, the risk of malicious data, identity<br />

theft and manipulating the integrity of the databases increases. It<br />

is therefore important that government take preventive measures<br />

now to prevent any eventualities, some of these are articulated in<br />

the policy recommendation in the next sections.<br />

Ministries<br />

N=6<br />

Others<br />

N=7<br />

Parastatals<br />

N=13<br />

6.0 POLICY RECOMMENDATION<br />

States<br />

N=13<br />

Total Errors 214(4) 249(5) 69(3) 1(1) 64(4) 76(5) 196(7) 380(5)<br />

Site with no<br />

Errors<br />

Medium/Low Level<br />

6 3 2 1 2 2 6 8<br />

Total Errors 18(3) 26(3) 3(2) 0 3(2) 2(2) 40(6) 24(6)<br />

Site with no<br />

Errors<br />

Informational<br />

7 5 3 2 4 5 7 7<br />

Total warning 38(8) 34(4) 25(4) 3(2) 31(4) 69(6) 117(10) 58(8)<br />

Site with no<br />

warning<br />

2 4 1 0 2 1 3 5<br />

241<br />

It is expedient that different organizations take necessary steps to<br />

close all possible loop holes that may be detrimental to their<br />

resources available on their websites. This may involve website<br />

validation or possibly an entire re-design. Before launching a<br />

website, it is a good practice to cross-check and validates all<br />

aspects of the design either by hosting it on a local server or on a<br />

test bed. By this procedure, software development cycle principles<br />

would have been followed, which the application is not out of<br />

order in this context. This involve: planning, requirements<br />

analysis, design & development, implementation (coding), testing<br />

& integration, evaluation (validation), release (launching) and<br />

support (maintenance).<br />

The government also has vital roles to play, this involve setting<br />

web standards as well as monitor and evaluate compliance. This<br />

standard will be for all the government Ministries, Departments<br />

and Agencies (MDAs) and could also extend to non-governmental<br />

bodies and private firms with a web presence activities within the<br />

country or are planning to have one. This standard should cover<br />

all areas of the website cycle which will not leave out: (i) The<br />

domain itself. First, this must be appropriate and must comply<br />

with country code top level if serious transactions involving<br />

ecommerce (for example) are to be allowed on it. (ii) The design<br />

and development up to evaluation in that order must be<br />

ascertained. (iii) Deployment and hosting must be guided; the<br />

country of the hosting service provider may be localized. The


facilities (both hardware and software types, versions etc) in the<br />

premise of the hosting provider must meet a set security standard.<br />

(iv) General management, this includes updating, upgrading and<br />

entire re-design etc, open source could be encouraged but with<br />

caution in this instance. Apart from the fore, the government<br />

should also commission a unit of an agency like National<br />

Information Technology Development Agency (NITDA) for<br />

example, to monitor and evaluate compliance to the standards<br />

from time to time. If all these could be dutifully observed, then<br />

there is likelihood that the challenge of web insecurity will<br />

drastically be minimized.<br />

7.0 REFERENCE<br />

[1] Zhao, J.J. & Zhao, S.Y. (2010). Opportunities and threats: A<br />

security assessment of state e-government websites.<br />

Government Information Quarterly 27 (2010) 49–56.<br />

[2] Backus, M. (2001). E-Governance and Developing<br />

Countries: Introduction and examples. Report No 3, April<br />

2001. Available on<br />

http://www.ftpiicd.org/files/research/reports/report3.pdf<br />

[3] Awoleye O.M., Oluwaranti A.I., Siyanbola W.O. and<br />

Adagunodo E.R. (2008). Assessment of e-Governance<br />

Resource Use in Southwestern Nigeria. Proceedings of the<br />

2nd International Conference on Theory and Practice of<br />

Electronic Governance Cairo, Egypt. ACM International<br />

Conference Proceeding Series; Pages 154-159<br />

[4] Ali, A.B., Shakhatreh, Y.I, Abdullah, M.S. & Alostad, J.<br />

(2010). SQL-Injection Vulnerability Scanning Tool for<br />

Automatic Creation of SQL-injection attacks. Procedia<br />

Computer Science 3, pp 453–458.<br />

[5] Cook, S. (2003). A web Developer’s Guide to Cross<br />

Scripting.<br />

[6] Moen, V., Klingsheim, A.N., Simonsen, K.I.F. & Hole, K.J.<br />

(2006). Vulnerabilities in E-Governments. Proc.2nd<br />

International Conference on Global E-Security (ICGeS-06),<br />

ondon, England, April 20–22, 2006.<br />

[7] Christey, S., & Martin, R.A. (2007). Vulnerability Type<br />

Distributions in CVE. Document Version: 1.1, May 22,<br />

2007. available on http://cve.mitre.org/docs/vulntrends/vuln-trends.pdf<br />

[8] Higgins, K.J. (2006). Cross Site Scripting: Attackers’ New<br />

Favourite Flaw. Available on<br />

http://www.darkreading.com/security/applicationsecurity/208804050/cross-sitescripting-attackers-newfavorite-flaw.html<br />

[9] Bates, D., Barth, A., & Jackson, C. (2010). Regular<br />

Expression Considered Harmful in Client-Side XSS Filters.<br />

WWW 2010, April 26–30, 2010, Raleigh, North Carolina,<br />

USA. ACM 978-1-60558-799-8/10/04. Available on<br />

http://www.collinjackson.com/research/xssauditor.pdf<br />

[10] Halfond, W.G.J., Viegas, J. & Orso, A. (2006). A<br />

Classification of SQL Injection Attacks and<br />

Countermeasures. College of Computing Georgia Institute of<br />

Technology, 2006.<br />

[11] Huang, Y.W., Huang, S.K, & Lin, T.P. (2003). Web<br />

Application Security Assessment by Fault Injection and<br />

242<br />

Behaviour Monitoring. WWW2003, May 20-24, 2003,<br />

Budapest,Hungary. ACM 1-58113-680-3/03/0005. Available<br />

http://www2003.org/cdrom/papers/refereed/p081/FINAL_W<br />

AVES_WWW2003.htm<br />

[12] Bandhakavi, S., Bisht, P., Madhusudan, P., &<br />

Venkatakrishnan, V.N (2007). CANDID: Preventing SQL<br />

Injection Attacks using Dynamic Candidate Evaluations.<br />

WWW 2010, April 26–30, 2010, Raleigh, North Carolina,<br />

USA. ACM 978-1-60558-799-8/10/04. Available on<br />

http://cs.uiuc.edu/~madhu/ccs07.pdf<br />

[13] Lee, I. Jeong, S., Yeo, S. & Moon, J. (2011). A Novel<br />

Method For SQL Injection Attack Detection Based On<br />

Removing Sql Query Attribute Values. Mathematical and<br />

Computer Modeling, pp 1-11.<br />

[14] Xie, Y. & Aiken, A. (2006). Static Detection of Security<br />

Vulnerability in Scripting Languages. 15th USENIX Security<br />

Symposium, 2006. Available on<br />

http://theory.stanford.edu/~aiken/publications/papers/usenix<br />

06.pdf<br />

[15] Balduzzi, M., Gimenez, C.T., Balzarotti, D. & Kirda, E.<br />

(2010). Automated Discovery of Parameter Pollution<br />

Vulnerabilities in Web Applications.<br />

[16] SANS Institute (2009b). Top Cyber Security Risks -<br />

Executive Summary” September 2009. Available on<br />

http://www.sans.org/top-cyber-security-risks/summary.php<br />

[17] SANS Institute (2009a). SANS Top-20 2007 Security Risks<br />

(2007 Annual Update). Available on<br />

http://www.sans.org/top20/#s1.<br />

[18] Halkidis, S.T., Chtzigeorgiou, A. & Stephanides, G. A<br />

Practical Evaluation of Security Patterns. Available on<br />

http://users.uom.gr/~achat/papers/AIDC2006.pdf<br />

[19] OWASP Foundation (2007). The Ten Most Critical Web<br />

Application Security Vulnerabilities. Available on http://<br />

www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf


Session 9<br />

Social Media in Government


Exploring Social Media Usage in Saudi E-Government<br />

Websites<br />

Hend S. Al-Khalifa, Muna S. Al-Razgan, Nora I. Al-Rajebah and Ameera M. Almasoud<br />

Information Technology Department<br />

College of Computer and Information Sciences<br />

King Saud University<br />

Riyadh, Saudi Arabia<br />

{hendk;ma;razgan;nrajebah;amma;masoud}@ksu.edu.sa<br />

ABSTRACT<br />

Many governments worldwide have employed social media<br />

services to increase their openness and transparency. These<br />

services have played an important role in bridging the gap<br />

between governments and citizens and increase the interaction<br />

with each other. This paper explores the prevalence of social<br />

media services in Saudi e-Government agencies' websites and<br />

analyzes their patterns of usage.<br />

Using a comprehensive analysis of 170 Saudi government<br />

websites, we found that Twitter, Facebook and YouTube were the<br />

most commonly used social media services among e-Government<br />

agencies, and they were utilized as a one-way communication<br />

channel.<br />

Categories and Subject Descriptors<br />

J.4 [Computer Applications]: Social and Behavioral Sciences –<br />

sociology, psychology.<br />

General Terms<br />

Management<br />

Keywords<br />

Social Media, Twitter, Facebook, YouTube, Blog, E-government,<br />

Saudi Arabia.<br />

1. INTRODUCTION<br />

With the proliferation of an array of different social media<br />

services such as blogs, Facebook and Twitter, people became<br />

more connected to each other. Social media services are defined<br />

as “media for social interaction, using highly accessible and<br />

scalable communication techniques. It is the use of web-based and<br />

mobile technologies to turn communication into interactive<br />

dialogue” [1].<br />

In fact, there are many categories of social media sites based on<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

243<br />

the service they provide, for instance: Blogging services (e.g.<br />

Wordpress/Blogger), Media-sharing services, (e.g. YouTube<br />

"Video", Flickr "photos"), Social networking (e.g. Facebook and<br />

LinkedIn) and Micro-Blogging services (e.g. Twitter).<br />

Social media services are gaining popularity worldwide. Based on<br />

Alexa 1 ranking for top visited sites in the world, we can notice<br />

that 50% of the top ten most visited websites are social media<br />

services, which includes: Facebook, YouTube, BlogSpot and<br />

Twitter.<br />

Recently social media websites have been used to improve the<br />

relationship between government agencies and their citizens and<br />

to increase interaction. They provide good means of eparticipation,<br />

which offers "the opportunity to achieve and satisfy<br />

the need to be heard by politicians and participate in the decisionmaking<br />

and policy formulation processes through the use of ICT"<br />

[2]. In this respect, social media services were widely adopted in<br />

e-Government websites because they created fast and readily<br />

available communication channels with the citizens.<br />

Given the importance of employing social media services in<br />

today's e-Government websites; in this study we present the<br />

results of analyzing the prevalence and usage of social media<br />

services in Saudi Arabia e-Government agencies websites.<br />

In order to explore the prevalence of social media services in<br />

Saudi e-Government agencies websites, we first need to know<br />

what are the widely used social media services in Saudi Arabia?<br />

According to Alexa website, YouTube, Facebook, Twitter and<br />

Blogspot, respectively are among the top ten most visited websites<br />

in Saudi Arabia 2 . Also the statistics presented in the "Internet<br />

World Stats" 3 show that there are more than 4.5 Million Saudi<br />

Facebook users on Dec 31, 2011; with a penetration rate equal to<br />

17.4%. Most of these users are under 30 years old. On the other<br />

hand, in September, 2011 the number of Saudi Twitter users has<br />

reached 127,457 users according to Arab Social Media Report [3].<br />

The previous numbers show an increased usage of social media<br />

among young Saudi citizens.<br />

Knowing these facts about the usage growth of social media<br />

services in Saudi Arabia, this study will answer the following<br />

questions:<br />

1<br />

The top 500 sites on the web by Alexa.com on March 26, 2012<br />

2<br />

Top sites in Saudi Arabia by Alexa.com on March 26, 2012:<br />

http://www.alexa.com/topsites/countries/SA<br />

3<br />

http://www.internetworldstats.com/middle.htm, Date Accessed 26 March<br />

2012.


1. What kind of social media services do Saudi e-Government<br />

websites use?<br />

This research question is meant to address the combination<br />

of technology, telecommunication and social interaction<br />

between the Saudi government and its citizen, and which<br />

tools of the social media is more suitable for Saudi citizens.<br />

Knowing these information will help in improving the<br />

service and delivery of information through the correct<br />

channel.<br />

2. Which e-Government agency is using social media services<br />

and tools and to what extent?<br />

Since the aim of this paper is to know which government<br />

agency is actively using social media and to what extent?<br />

Identifying this government agency will help in delivering<br />

our recommendations and better improve their services.<br />

3. In what capacity in terms of announcement, discussion,<br />

consultation, seeking ideas have social media been used in<br />

Saudi e-Government websites?<br />

Finding the answers to these questions will help in (1) providing<br />

recommendations to Saudi e-Government websites to better<br />

utilize social media services and (2) identify weaknesses in their<br />

current usage. Thus, this study provides the first comprehensive<br />

examination and analysis of 170 Saudi e-Government websites.<br />

The focus will be on top social media services used in Saudi<br />

Arabia, as mentioned before.<br />

In the following section, we present some related work on the<br />

usage of social media in e-Government context. In section 3, we<br />

describe the methodology we followed in order to collect Saudi<br />

government agencies websites. Then in section 4, we discuss our<br />

findings and answer the three posed research questions. Finally<br />

section 5 provides recommendations and future directions for this<br />

research.<br />

2. RELATED WORK<br />

In the past few years, we have witnessed the utilization of social<br />

media services by many governmental websites worldwide. The<br />

aim of the utilization was to provide a two way interactive<br />

communication channel with the citizens and to relate the<br />

government with their constituencies.<br />

Among the previous studies on the adoption of social media<br />

service in government agencies websites, is a study by Alam et al.<br />

[4] on the usage of Facebook in the Australian Taxation Office<br />

(ATO). They found that ATO used Facebook as a one-way<br />

communication tool to provide information about their e-Tax<br />

service.<br />

Similarly, Upadhyay and Ilavarasan [5] studied Facebook pages<br />

of three government agencies in Delhi, India. These include<br />

Municipal Corporation of Delhi, Delhi Traffic Police and<br />

Planning Commission. Based on the agencies usage the authors<br />

offered suggestions for policymaking to facilitate a wider and<br />

more effective reach of social media in the developing countries.<br />

On the other hand, Rojas et al. [6] studied the interaction of six<br />

territorial public entities in Colombia through Facebook and<br />

Twitter. They found that the usage of Twitter and Facebook by the<br />

244<br />

six entities was not as expected. As a result they provided a set of<br />

recommendations to improve eParticipation on Social Media.<br />

In another study based on a three-tiered approach to eParticipation<br />

(Inform, Consult and Empower) [7], Inform: about the existing<br />

policy, consult: by sharing knowledge and opinions, and<br />

empower: by pursuing particular issues to the policy actors. The<br />

authors found that the main challenge to their approach was not<br />

the technological barriers; instead it was the socio-political<br />

barriers.<br />

In a wider context, Chua et al. [8] analyzed 200 international<br />

government websites using content analysis and multiple<br />

regression analysis. They found that the prevalence of seven Web<br />

2.0 applications in descending order was: RSS, multimedia<br />

sharing services, blogs, forums, social tagging services, social<br />

networking, services and wikis. Finally, Gharawi et al. [9]<br />

introduced the perceived values and pressing issues which<br />

concerning practitioners that may complicate adoption of social<br />

media services in e-Government websites.<br />

From the previous research, we can see that many international<br />

government websites do use social media services; however their<br />

usage were very basic and did not fully utilize the potential and<br />

capabilities of social media. So, will this be the case with Saudi e-<br />

Government websites? The answer will be addressed in the next<br />

sections.<br />

3. METHODOLOGY<br />

3.1 Collection of Saudi e-Government<br />

Websites<br />

One hundred ninety four Saudi government agencies websites<br />

listed in the Saudi e-Government Portal (saudi.gov.sa) was<br />

considered in this study. These websites were visited to make sure<br />

that their addresses are correct. From the 194 websites only 170<br />

were working properly. Table 1 shows the number of collected<br />

websites based on their category type.<br />

Table 1. Number of e-Government websites in each category<br />

3.2 Methods of Data Analysis<br />

During the period between 2 ed and 28 th March 2012 three experts<br />

in social media domain were involved in the analysis. The first<br />

step was to count the appearance of four social media services,


namely: Twitter, Facebook, blogs and YouTube for each website<br />

in the e-Government categories (e.g. funds, municipality,<br />

ministries, universities supported by the government, etc.). For<br />

each social media service the expert codes it with either “yes” or<br />

“no” to denote its presence or absence. We also noticed while<br />

visiting some e-Government agencies websites the usage of other<br />

types of social media services such as Flickr, Linkedin, Google+,<br />

etc. Thus, they were counted.<br />

The second step was to observe and distill the usage patterns for<br />

each social media type based on the criteria shown in Table 2.<br />

Table 2. Criteria used for exploring the usage patterns for e-<br />

Government websites<br />

Social Media Type Criteria<br />

Twitter<br />

Facebook<br />

YouTube<br />

Blog<br />

4. FINDINGS<br />

• Number of followers<br />

• Number of tweets<br />

• Is it up-to-date?<br />

• Is it interactive?<br />

• Type of usage (e.g. news,<br />

announcements, answers, etc.)<br />

• Number of likes<br />

• Are user comments allowed?<br />

• Is it up-to-date<br />

• Is it interactive<br />

• Type of usage (e.g. news,<br />

announcements, answers, etc.)<br />

• Number of uploaded videos<br />

• Number of subscribers<br />

• Number of views<br />

• Is it up-to-date?<br />

• Type of videos<br />

• Are user comments allowed?<br />

• Is it up-to-date?<br />

• Type of posted topics<br />

4.1 Prevalence of Social Media Services<br />

To address our first research question "What kind of social media<br />

services do Saudi e-Government websites use?" Figure 1 shows<br />

the breakdown of social media usage based on their types for the<br />

170 different Saudi government agencies.<br />

245<br />

Figure 1. Percentage of Social Media usage<br />

We can see from the figure above that Facebook is one of the<br />

highly used services with 37%, next comes Twitter with 35%,<br />

then YouTube with 25%, and finally Blogs with only 3%. The<br />

usage of Facebook and Twitter are the most popular among Saudi<br />

agencies due to the high engagement of Saudi community in using<br />

these services. We also noticed that since Facebook and Twitter<br />

are becoming popular among young Saudi citizens, the usage of<br />

blogs has started to diminish.<br />

Figure 2. Percentage of Other Social Media usage<br />

We mentioned previously that there are other social media<br />

services that have been used in Saudi e-Government agencies,<br />

such as Flickr, Google+, LinkedIn, Forums, and Scribd. Figure 2<br />

shows the distributions of these services. The highest percentage<br />

is for Flickr which equals to 46%, the second highest is Linkedin<br />

with %21, the third one is Forums which equals to 15%, and the<br />

rest has been used in low percentage as shown in the figure above.<br />

4.2 Uses of Social Media Services<br />

To address our second and third research questions "Which e-<br />

Government agency is using social media services and tools and<br />

to what extent?" and "In what capacity in terms of announcement,<br />

discussion, consultation, seeking ideas have social media been<br />

used in Saudi e-Government websites?" an in-depth inspection<br />

was carried out on Facebook, Twitter and YouTube, since they<br />

were the highly used social media services in Saudi e-Government<br />

websites.


4.2.1 Facebook Usage<br />

Figure 3. Percentage of agencies that use Facebook per<br />

category<br />

Figure 3 shows the usage of Facebook among Saudi government<br />

agencies; we noticed that the highest usage in descending order<br />

was in universities (80%), municipalities (56%), councils (51%)<br />

and funds (40%). The rest ranged between 33% and 14%.<br />

The high usage of Facebook among universities websites explains<br />

the popularity of social media services among the young Saudi<br />

generation.<br />

Also, we noticed that some agencies did not use Facebook, such<br />

agencies include: Diwans, Colleges, and Departments. This can be<br />

attributed to the fact that the number of agencies' websites under<br />

these categories was low, i.e. they usually consist of three<br />

websites in each category.<br />

Regarding the usage patterns of Facebook, we can find that news<br />

and announcements dissemination were the most commonly used<br />

patterns. To be more specific, Funds and Presidencies were so<br />

active in terms of updating their pages with news. However, all e-<br />

Government agencies interaction with the citizens via their<br />

Facebook pages used one direction without any discussion, which<br />

can be considered as poor interaction. This way of interaction<br />

might be attributed to the recent establishment of government<br />

agencies Facebook pages or the absence of a clear usage policy of<br />

such a media.<br />

4.2.2 Twitter Usage<br />

Figure 4. Percentage of agencies that use Twitter per category<br />

246<br />

In our analysis we found that there were 64 out of 170<br />

government agencies which have Twitter accounts. From Figure<br />

4, it can be clearly seen that the highest Twitter usage among the<br />

64 government agencies was present in the University category<br />

with a percentage of 72%. Municipality category comes second,<br />

with a percentage of 67% followed by Ministry, Principality,<br />

Fund, Council and other agencies categories that have a usage<br />

range of 38% to 43%. While Directorate, Commission,<br />

Presidency, and Establishment categories have a usage ranged<br />

from 17% to 22%. Similar to the findings of Facebook usage,<br />

College, Diwans, and Department categories were not using<br />

Twitter.<br />

Furthermore, among the 64 agencies which used Twitter, 77%<br />

were up to date with recent tweets. In general, utilizing Twitter to<br />

communicate with citizens is roughly a new trend in Saudi Arabia<br />

as many agencies created their accounts between 2010 and 2011.<br />

In terms of the different themes of usage, Twitter accounts were<br />

mainly used for disseminating news and announcements. Overall,<br />

Twitter is used as a one way channel to broadcast announcements<br />

and news benefiting from the growing interest in Twitter inside<br />

the Saudi society. Small amount of interaction was encountered,<br />

among all agencies, i.e. 22% were interactive. The Ministry and<br />

University categories have good interaction with their followers<br />

which appears in terms of Q&As and replies. Other Agencies like<br />

Saudi Arabian airlines and the National Center for Assessment in<br />

Higher education are very active as well. It seems that these<br />

agencies allocate enough resources (human and time) to interact<br />

with the citizens.<br />

4.2.3 YouTube Usage<br />

Figure 5. Percentage of agencies that use YouTube per<br />

category<br />

Figure 5 shows the usage of YouTube among Saudi government<br />

agencies. The highest usage was in: universities (31%),<br />

municipalities (19%), ministry (13%), other agency (10%), and<br />

the rest were below 8%. The agencies who do not use YouTube<br />

were Colleges, Diwans, Department, and Council. Their lack of<br />

usage might be attributed to the fact that videos are not needed in<br />

their line of business.<br />

Regarding the usage patterns of YouTube, we found that<br />

announcements, interviews, how-to's (direction) and events<br />

broadcasted in TVs were the most commonly used patterns.<br />

Moreover, in most agencies channels viewers’ comments were<br />

allowed. Finally, we can notice that most of YouTube channels


were recently established and they usually have less than 200<br />

videos uploaded.<br />

5. DISCUSSION AND CONCLUSION<br />

Social media is newly introduced in Saudi e-Government websites<br />

given the creation date of their accounts in different social media<br />

services. In this paper we have explored the prevalence of social<br />

media services among Saudi e-Government agencies and the<br />

attitude towards their usage.<br />

Our findings show that the use of Facebook and Twitter were<br />

admirable, given the small number of Saudi e-Government<br />

agencies officially using them. In fact, the usage of social media<br />

services was most common in Universities and Municipalities<br />

websites. Our analysis also showed that most e-Government<br />

agencies publish the same content on both Facebook and Twitter.<br />

In terms of their usage trends, we have noticed that either the<br />

agencies’ website was up-to-date and participated in more than<br />

one social media service, or the website is so simple, with no<br />

participation in any service. The apparent usage pattern, as we<br />

have stated previously, was for disseminating news and<br />

announcements, i.e. only as a one way communication channel.<br />

In order to overcome the problems found in current usage of<br />

social media services we provide the following recommendations<br />

for Saudi e-Government agencies:<br />

• Create a clear social media strategy that prevents any<br />

misunderstandings or misuse of the service and defines<br />

the overall goals of its usage.<br />

• Clarify the purpose of each social media service to the<br />

citizens i.e. whether it is for discussions, Q&As, or<br />

news/announcement channel.<br />

• Verify social media accounts to give them more trust and<br />

credibility.<br />

• For agencies from the same category or interest, it is<br />

advisable to get connected with each other, this will help<br />

service the Saudi citizens.<br />

• Allocate enough resources (personnel and time) in each<br />

government agency for moderating and managing social<br />

media channels.<br />

• Learn which social media is popular among Saudi citizen<br />

and engage and focus on that service.<br />

• Improve the current usage of social media services by<br />

adopting an interactive two-way communication channel<br />

with the citizens.<br />

• Consult and seek knowledge from the citizens about how<br />

to improve the agency social media service.<br />

247<br />

Finally, it is worth mentioning that since the usage of social media<br />

in Saudi government is very recent, there is no deep involvement<br />

yet between policy makers and Saudi citizens. Therefore, the<br />

recommendation was given to help improve the usage of the<br />

current services, and hopefully in the near future we reach the<br />

ultimate goal which is “inform-consult-empower” between policy<br />

makers and Saudi citizens.<br />

6. REFERENCES<br />

[1] “Social media - Wikipedia, the free encyclopedia.” [Online].<br />

Available: http://en.wikipedia.org/wiki/Social_media.<br />

[Accessed: 25-Mar-2012].<br />

[2] K. Ergazakis, K. Metaxiotis, and T. Tsitsanis, “A State-of-<br />

The-Art Review of Applied Forms and Areas, Tools and<br />

Technologies for e-Participation,” International Journal of<br />

Electronic Government Research, vol. 7, no. 1, pp. 1–19,<br />

2011.<br />

[3] “Arab Social Media Report,” Dubai School of Government.<br />

Available: http://www.dsg.fohmics.net/en/asmr3/. [Accessed:<br />

25-Mar-2012].<br />

[4] S. L. Alam, J. Campbell, and R. Lucas, “Using Social Media<br />

in Government: The Australian Taxation Office e-Tax<br />

Facebook Page,” in 2011 IEEE Ninth International<br />

Conference on Dependable, Autonomic and Secure<br />

Computing (DASC), 2011, pp. 1002–1009.<br />

[5] J. M. Rojas, C. J. Ruiz, and C. Farfán, “e-participation and egovernance<br />

at web 2.0 in local governments of Colombia,” in<br />

Proceedings of the 5th International Conference on Theory<br />

and Practice of Electronic Governance, New York, NY,<br />

USA, 2011, pp. 301–304.<br />

[6] A. Upadhyay and P. V. Ilavarasan, “Social media, egovernance<br />

and developing countries: insights from India,”<br />

in Proceedings of the 5th International Conference on Theory<br />

and Practice of Electronic Governance, New York, NY,<br />

USA, 2011, pp. 351–352.<br />

[7] Lee D., Loutas N., Sanchez Nielsen E., Mogulkoc E.,<br />

Lacigova O., Inform-Consult-Empower: A Three-tiered<br />

Approach to eParticipation. In Proceedings of 3rd ePart<br />

Conference, Delft, The Netherlands, 2011, pp. 121-132.<br />

[8] A. Y. Chua, D. Goh, and R. Ang, “Web 2.0 applications in<br />

government websites: prevalence, use and correlations with<br />

perceived website quality,” Online Information Review, vol.<br />

36, no. 2, p. 2–2, Apr. 2012.<br />

[9] M. Gharawi, N. Helbig, J. Hrdinová, and D. Werthmuller,<br />

“An exploratory study of social media adoption in<br />

government,” in Proceedings of the 4th International<br />

Conference on Theory and Practice of Electronic<br />

Governance, New York, NY, USA, 2010, pp. 359–36


Government Crisis Communication on the Microblog: A<br />

Theory Framework and the Case of Shanghai Metro Rear-<br />

End Collision<br />

ABSTRACT<br />

Crisis brings various damages including a tarnished reputation. To<br />

protect and restore its reputation is an important task for a<br />

government agency in times of crisis. A microblog, which is<br />

attracting more and more public attention, can be used as a<br />

platform for the government to communicate with the public in<br />

order to manage its reputation in times of crisis. However, there is<br />

not enough research done in this area. In this paper, the author<br />

develops a general framework for a government agency to<br />

conduct crisis communication on the microblog. At the end of the<br />

paper, the case of a Shanghai City Metro rear-end collision is<br />

introduced to show how the government can use the framework to<br />

respond to a crisis.<br />

Categories and Subject Descriptors<br />

K.4.m [Computer and Society]: Miscellaneous.<br />

General Terms<br />

Management, Measurement, Performance, Theory<br />

Keywords<br />

Microblog; Social Media; Public Relation; Crisis Communication,<br />

China<br />

1. INTRODUCTION<br />

1.1 Background<br />

On September 27, 2010, a rear-end collision occurred at Shanghai<br />

City’s Metro in China. This accident was first reported by a<br />

microblogger on Sina Microblog [42], a popular Chinese<br />

microblog website 1 .<br />

What makes this affair different is the responses made by the<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

1 http://www.weibo.com/<br />

Xiao Liang<br />

Department of Informatics<br />

University at Albany, SUNY<br />

1400 Washington Avenue<br />

Albany, NY 12222<br />

xliang@albany.edu<br />

248<br />

Shanghai Metro’s official microblog 2 . The response messages<br />

were widely spread, and both the responses and the Shanghai<br />

Metro received considerable acclaim.<br />

On one hand, this indicates that the public would like to see<br />

government agencies appear on a microblog in times of crisis; on<br />

the other hand, it raises the question of how a government agency<br />

could use microblogs in a crisis to facilitate crisis communication.<br />

1.2 Introduction of the Problem<br />

Crisis is the “perception of unpredictable event that threatens<br />

important expectancies of stakeholders and can seriously impact<br />

an organization’s performance and generate negative outcomes”<br />

[6]. One of the negative outcomes of a crisis is a tarnished<br />

reputation [10], which is the source of negative attitudes towards<br />

an organization [26]. Therefore, to protect their reputations<br />

becomes an important task for all organizations in times of crisis.<br />

Crisis communication is the approach aimed at maintaining and<br />

repairing reputation during a crisis. This approach, by definition,<br />

is “the dialogue between the organization and its public prior to,<br />

during, and after the negative occurrence. The dialogue details<br />

strategies and tactics that are designed to minimize damage to the<br />

image of the organization” [12].<br />

As a channel of communication, the media is an unneglectable<br />

constituent. Scholars assert that, according to different<br />

characteristics of the media, an organization should apply<br />

different strategies in order to achieve the best result [4]. The<br />

microblog, as a type of new media, is attracting more and more<br />

public attention. Many organizations have begun to use it as a<br />

platform to communicate with their publics during crises [31].<br />

However, there has not much research done in this area [31].<br />

This paper aims to provide government agencies with a general<br />

framework for harnessing the microblog to communicate with the<br />

public during a crisis. However, there is no one size-fits-all model;<br />

the general framework functions as a basic guideline allowing<br />

government agencies to develop specific strategies in different<br />

situations shaped by factors such as the responsibility of the crisis,<br />

the information required by the public, and the social value in<br />

which the organization is embedded. The model takes a stage<br />

approach, which views the crisis as a process composed of<br />

2 http://www.weibo.com/shmetro/


different phases. Four theories of crisis communication are<br />

discussed, and the common issues that the theories focus on are<br />

used to build the framework. Finally, the author uses Shanghai<br />

Metro’s crisis communication to show how a government agency<br />

can employ the microblog to communicate with the public in<br />

times of crisis.<br />

2. PREVIOUS STUDIES<br />

In this section the author first talks about the stage approach. The<br />

author then discusses four common issues affecting crisis<br />

communication strategies concerned by primary crisis<br />

communication theories. Finally, the author discusses some<br />

features of the microblog.<br />

2.1 Three Stages of a Crisis<br />

According to the stage approach, the development of a crisis can<br />

be divided into phases, according to which different tasks are<br />

assigned [14]. There are many stage models, among which the<br />

three-stage model is the most used [32]. The author will also use<br />

three-stage model due to its simplicity.<br />

Simple as the three-stage approach is, scholars try to assign<br />

various definitions to the phases [15, 30]. Coomb summed up the<br />

previous studies and proposed a summarized three-stage model.<br />

His model includes a pre-crisis stage, crisis event stage, and postcrisis<br />

stage [7].Specifically, the pre-crisis stage is when a crisis<br />

has not happened yet. In this phase, the tasks are to detect crisis<br />

signs, prevent possible risks, reduce the potential harm, and<br />

prepare for possible responses [7, 30]. The crisis event stage is<br />

when crisis has occurred and brought damages. The organization<br />

should recognize the crisis as soon as possible and make<br />

responses to the crisis so as to mitigate negative impact [7, 15].<br />

The post-crisis stage is when the immediate effect of a crisis is<br />

over [7]. In this phase the organization should learn from the crisis,<br />

monitor the public’s impression, and make sure that the crisis is<br />

truly over [7, 27].<br />

2.2 Communication Strategies<br />

In this section, the author discusses four common issues examined<br />

by primary crisis communication theories, namely the corporate<br />

apologia theory, image restoration theory, situational crisis<br />

communication theory (SCCT), and organizational renewal<br />

theory[1, 38].The corporate apologia theory focuses on the<br />

apology strategy in a crisis. The image restoration theory is<br />

concerned with strategies for repairing the reputation under attack.<br />

Apology is included in this theory as a general strategy. The<br />

SCCT argues that an organization should apply strategies<br />

according to the situation of the crisis. Lastly, the organizational<br />

renew theory encourages the organization to emphasize the<br />

positive side of the crisis. These four theories fall in the research<br />

area of public relations and recommend strategies for repairing<br />

and retaining organizational reputation in a crisis. Table 1 shows<br />

the features of each theory.<br />

Table 1. Crisis Communication Theories<br />

Theory Main Arguments<br />

Corporate Apologia<br />

o The theory focuses on apology strategies.<br />

o Depending on the responsibilities for the<br />

crisis, five strategies are suggested.<br />

o Strategies: denial, counterattack, excuse,<br />

promising not to do it again, and seeking a<br />

legal solution which is not a public relation<br />

stance.<br />

249<br />

Image Restoration<br />

SCCT<br />

Organizational<br />

Renewal Theory<br />

o This theory focuses on restoring<br />

organizational image when the image is under<br />

attack.<br />

o Two elements of an attack:<br />

-­‐ The accused is held responsible for an<br />

action.<br />

-­‐ The action is considered to be offensive.<br />

o Strategies:<br />

-­‐ Denial and evasion (to the first element).<br />

-­‐ Reducing offensiveness, and corrective<br />

action (to the second element).<br />

-­‐ Mortification (general strategy).<br />

o Crisis strategies depend on the history of the<br />

crisis, previous reputation, and the<br />

responsibilities for the crisis.<br />

o Crisis clusters divided by the responsibility:<br />

victim cluster, accidental cluster, prevention<br />

cluster.<br />

o Strategies applied accordingly: denial,<br />

diminishing, and bolstering.<br />

o The theory is more prospective than<br />

retrospective. It emphasizes rebuilding.<br />

o Four facets of the theory: organizational<br />

learning, ethical communication, prospective<br />

vision, and effective organizational rhetoric.<br />

The theories mainly focus on four factors that an organization<br />

should consider when designing its crisis communication<br />

strategies. These four factors are the crisis situation, the<br />

stakeholders, the values, and the further view. In the following<br />

part of this section the author discusses the four factors one by one.<br />

2.2.1 Crisis situation<br />

The responsibility for a crisis and the level of damage are two<br />

aspects of crisis situations [2, 5].<br />

First of all, the responsibility for a crisis could affect the public’s<br />

attitude towards an organization. This phenomenon is explained<br />

by the attribution theory, which argues that audiences always<br />

search for the cause of an event and try to form attributions for the<br />

responsibility [41]. Various emotions, such as sympathy and anger,<br />

are experienced by audiences after they attribute the responsibility<br />

[41]. For example, if an organization is a victim of the event,<br />

audiences are likely to develop sympathy towards the organization<br />

[5]. Thus, the responsibility becomes an issue one should consider<br />

when designing a crisis communication strategy.<br />

The corporate apologia theory and image restoration theory stress<br />

the importance of crisis responsibility. Depending on whether the<br />

organization is responsible for the crisis, the corporate apologia<br />

theory suggests strategies such as denial, counterattack, excuse,<br />

promising not to do it again, and seeking a legal solution which is<br />

considered as a no-public-relation approach [16]. The image<br />

restoration theory proposes denial and evasion of responsibility<br />

[2].<br />

The SCCT sums up the work of the previous two theories. It<br />

identifies three clusters of crises according to the crisis<br />

responsibility taken by an organization: victim cluster, accidental<br />

cluster, and prevention cluster [13]. Strategies, such as denial,<br />

diminishing, and bolstering, are suggested by the theory [5].<br />

The perceived level of damage is another factor of a crisis<br />

situation. It is argued that if the crisis manager lessens the<br />

perceived harmfulness of the crisis or shows some control over<br />

the damage; then the reputation damage can be reduced [2]. The<br />

level of damages is thoroughly discussed by Benoit in the image


estoration theory. He termed it as “offensiveness of the wrongful<br />

doing” and took it as one of the components of an attack to the<br />

organization [29]. Benoit argued that the perceived offensiveness<br />

of an action is more important than the reality. In other words, the<br />

wrongful action might not be as heinous as it is perceived by the<br />

audience [2]; thus, the crisis manager should deliver information<br />

that will help the public to objectively assess the damage. The<br />

image restoration theory suggests some message options that can<br />

reduce the perceived offensiveness of wrongful actions, such as<br />

bolstering, minimizing the negative feelings (diminishing),<br />

differentiating the crisis from other similar crises, transcendence,<br />

attacking the accusers, and the compensation [2].<br />

2.2.2 Stakeholders<br />

Stakeholders are vital elements in crisis communication because<br />

they are the ones who are affected by the crisis and who form<br />

attitudes towards the organization. Specifically, the previous<br />

reputation among stakeholders and the needs of the stakeholders<br />

are two important elements which the organization ought to pay<br />

attention to.<br />

Research shows that a negative reputation can lead to additional<br />

damage during crises [21]. The SCCT takes the previous<br />

reputation as an important factor that affects the choice of crisis<br />

communication strategies [5]. Hence, instead of suffering the<br />

negative impact which results from a ruined reputation, an<br />

organization is better to build a sound relationship with the<br />

stakeholders before the crisis.<br />

Besides managing the organization’s reputation, to meet the needs<br />

of stakeholders is the first and foremost task during crises [5].<br />

Different stakeholders have different concerns and expectations.<br />

The paper only discusses some general needs in the crisis event<br />

stage and post-crisis stage respectively.<br />

The first need is to reduce uncertainties. A crisis usually breeds<br />

uncertainties [28]. On one hand, people need information to<br />

reduce uncertainties and thereby to make the right decision in<br />

order to minimize the damage [26]. On the other hand, people<br />

need information to diminish the pressure brought by uncertainties<br />

[5, 36].<br />

Secondly, in the post-crisis stage, stakeholders need compensation<br />

and emotional reparations. The corporate apologia theory stresses<br />

that an appropriate apologetic message should acknowledge all<br />

the stakeholders and express empathy to the injured individuals in<br />

the crisis [17]. The image restoration theory recommends the<br />

organization to compensate for the losses of the victims. If the<br />

compensation is accepted by the stakeholders, the image of the<br />

organization might be improved [2].<br />

Finally, it is worth noting that sometimes the organization does<br />

meet the expectations of its stakeholders. However, the action is<br />

not very well expressed. Hence, it is crucial to fill the gap between<br />

the expression and the action [9].<br />

2.2.3 Values<br />

Failing to meet social values, such as being dishonest, will hurt<br />

the organization’s reputation [11]. During the crisis, an<br />

organization faces different interest groups that have a variety of<br />

values. An effective solution is to stress some core values of the<br />

society [32]. Honesty, addressing responsibility, openness, and<br />

humanism are important values identified as by the literature [18,<br />

40].<br />

250<br />

Being honest means to be truthful and sincere [18]. Accepting<br />

responsibilities is considered ethical [40]. Openness requires the<br />

organization to make the information accessible to the public in<br />

order to reduce uncertainties and increase transparency [40, 43].<br />

Humanistic care is about offering help to the public physically,<br />

psychologically, and financially [40].<br />

2.2.4 The future<br />

That an organization should seek opportunities in a crisis and help<br />

the public to see the future is the core argument of the<br />

organizational renewal theory [39]. To correct wrongdoings and<br />

to learn from the crisis are two important aspects discussed by the<br />

four theories.<br />

Correcting the wrongdoing is regarded by the SCCT and image<br />

restoration theory as part of the diminishment strategy [2, 5]. The<br />

corporate apologia theory also values making statements to<br />

correct wrongdoings as a part of an effective apologetic strategy<br />

[16]. Moreover, the SCCT considers the history of similar crises<br />

to be a factor that can negatively affect crisis communication [5].<br />

To correct the wrongdoing is also a necessary action to renew the<br />

organization’s reputation and to prepare for a future crisis.<br />

Learning from a past crisis plays an important role in rebuilding<br />

an organization. An organization can learn from the crisis by<br />

evaluating its crisis response strategy as well as investigating the<br />

reason for the crisis. To improve the crisis response mechanism,<br />

to correct the reason for the crisis, and to rebuild the organization<br />

are some of the aims.<br />

3. FRAMEWORK<br />

3.1 Microblog<br />

In this section, the author discusses two important activities on the<br />

microblog and some techniques that can help an organization<br />

organize the information on a microblog.<br />

The microblog as a new meda is attracting more and more public<br />

attention [25]. Research shows that people react less negatively to<br />

crisis communication strategies on the microblog (twitter), and the<br />

public tries to seek and share information on the microblog in<br />

times of crisis [31]. Although there is research that has focused on<br />

using social media in crises in general, there is little research that<br />

specifically investigates the usage of the microblog in crises [31].<br />

In order to understand how the microblog can help with crisis<br />

communication, there is a need to first understand its major<br />

activities and how to handle the information on it.<br />

Two major activities on the microblog are collecting and<br />

disseminating information, which are supported by the<br />

information processing capability of the microblog. First, the large<br />

user group provides the organization with a resource for collecting<br />

information about stakeholders’ attitudes and expectations [35].<br />

Secondly, the large number of users also enables the organization<br />

to broadcast information to the relevant audiences. Third,<br />

information spreads quickly on the microblog. Due to mobile<br />

devices, such as smart phones, people can share information<br />

whenever they use their mobile devices. Moreover, the microblog<br />

is interactive. By using functions, such as “@”, comments, and<br />

private chats, the organization could both give feedback to and<br />

receive timely feedback from the public. Finally, people might<br />

argue that the blog is also interactive. However, since it is easy to<br />

create and share information on the microblog, the microblog is


more suitable for information disseminating within a limited time<br />

frame [34].<br />

Besides collecting and disseminating information, handling<br />

information on the microblog is another issue. Two major<br />

problems in terms of handling information are information<br />

overload [19] and the length limitation of each message. In Table<br />

2, the author suggests some techniques to assist in organizing and<br />

retrieving information, as well as breaking length limitation.<br />

Table 2.Information Overload and Length Limitation<br />

3.2 The Framework<br />

The framework is arranged by Coomb’s three-stage model. The<br />

stages are pre-crisis stage, crisis event stage, and post-crisis stage.<br />

Coomb also gives the tasks of each stage. The author will discuss<br />

each task in detail with respect of Coomb’s descriptions as well as<br />

the four factors that the author generalizes from primary crisis<br />

communication theories. Accordingly, the author then discusses<br />

what types of messages could be delivered and collected by the<br />

organization.<br />

3.2.1 Pre-crisis stage<br />

In the pre-crisis stage, the crisis has not happened yet. The task of<br />

this stage is to detect crisis signs, prevent possible risks and<br />

reduce potential harm, and prepare for a possible crisis response.<br />

Firstly, there are usually signs that indicate a possible crisis [8].<br />

However, it is not easy to detect those signals; therefore, it<br />

requires the organization to collect information systematically<br />

from both internal and external sources [8]. A government agency<br />

could take advantage of the large user group of the microblog<br />

[24].The general public and the opinion leaders [8, 22] are both<br />

sources of information [24]. The general public could express<br />

their concerns as well as report suspicious phenomena through<br />

comments, “@”, private messages, and so on. Moreover, opinion<br />

leaders and experts, who have knowledge on particular issues and<br />

the power to affect the public’s opinion, should not be neglected<br />

by government agencies [8, 22]. Besides, the comments on<br />

messages that an opinion leader has posted are also an information<br />

resource. Overall, the information for detecting crisis signs can be<br />

collected from both the public and the opinion leaders and experts.<br />

251<br />

The public’s concerns and attitudes, and the suspicious<br />

phenomena reported are the information a government agency<br />

should pay attention to.<br />

The second task is to reduce potential harm. One of the ways to<br />

reduce the harm is to educate the public so that they can make the<br />

right decisions when a crisis hits. On the microblog, the<br />

government can post educational messages enriched by pictures,<br />

videos, and external articles. However, posting educational<br />

messages is just one way to reduce the potential harm. The type of<br />

information delivered in order to degrade the potential harm<br />

depends on the crisis that an agency anticipates. In other words, a<br />

government agency should analyze the potential crisis and<br />

systematically design the microblog messages that will be helpful<br />

in reducing the harm.<br />

Thirdly, in order to prepare possible crisis responses, a<br />

government agency should consider the four factors that affect the<br />

strategies of crisis communication, namely the crisis situation,<br />

stakeholders, social values, and the future view. Accordingly, in<br />

the preparation stage, an agency should build sound informationsharing<br />

mechanisms on the microblog, establish a good reputation<br />

among stakeholders, understand the needs of stakeholders,<br />

comply with social values, and stress the future view.<br />

Build information-sharing mechanisms before the crisis has been<br />

discussed by scholars for a long time [20]. The public can be one<br />

of the grids that provide information about a crisis. The public can<br />

even spontaneously provide assistance during a crisis. A<br />

government agency may empower the citizen to become involved<br />

in such activities on the microblog.<br />

The microblog can be used as a platform to build a sound<br />

relationship with the public. Few studies have been done on how<br />

an organization should communicate with the public on the<br />

microblog in order to build a good relationship. However, we can<br />

use the studies on general online communication as a source of<br />

reference. Two major strategies to maintain good relationships<br />

have been suggested by scholars: communicated relational<br />

commitment and conversational human voice [23].The former<br />

requires the organization to show willingness to maintain a<br />

relationship with the public; the latter highlights the importance of<br />

the human voice of the people who form the organization [23]. On<br />

the microblog, to enhance relational commitment can be reflected<br />

in the agency’s involvement in the public’s affairs. Besides, to<br />

show openness in organizational affairs can also help to maintain<br />

commitment [34]. The humanity of a government agency can be<br />

reflected in microblog posts that use a personal voice instead of an<br />

official tone. The person in charge of the official microblog can<br />

also show personal opinions, which can help with expressing a<br />

human voice [23, 34, 37].<br />

Information about the public’s expectations (needs) will assist the<br />

government in coping with a crisis. Such information can be<br />

collected directly from the public’s comments, “@”, and private<br />

messages. Again, the opinion leaders and experts play a role as<br />

well.<br />

The fourth requirement is to deliver messages fitting with social<br />

values. The posts and discussions on the microblog can reflect<br />

some social values as well as rules in the world of the microblog.<br />

A government agency should continuously monitor the public’s<br />

values on the microblog. Table 3 shows strategies for the precrisis<br />

stage.


Table 3. Strategies for Pre-crisis Stage<br />

3.2.2 Crisis event stage<br />

In the crisis event stage, the tasks are to identify the crisis and to<br />

launch appropriate crisis responses.<br />

A crisis usually hits suddenly, leaving the organization and the<br />

public little time to respond [3]. Consequently, to identify the<br />

crisis at the first moment becomes vitally important. Online<br />

information dissemination is fast; thus, online media can be used<br />

as a channel to report the crisis. A good example for this is the<br />

Shanghai City Metro accident, which was first reported on a<br />

microblog by an ordinary citizen [42].<br />

After identifying a crisis, an organization should respond to it as<br />

soon as possible. In rest of Section 3.2.2, the author discusses the<br />

response strategy according to the four factors covered by popular<br />

crisis communication theories: the crisis situation, the<br />

stakeholders, the social values, and the future view.<br />

First of all, public-generated messages might contain clues of a<br />

crisis situation, such as the crisis responsibility/perceived crisis<br />

responsibility and the level of damage/perceived level of damage.<br />

Thus, the government agency can pay attention to both the factors<br />

involved in the crisis as well as the public’s attitude on the<br />

microblog. Moreover, the government should design crisis<br />

communication strategies according to the crisis situation.<br />

Secondly, the response messages posted on the microblog should<br />

meet the needs of stakeholders. On one hand, a government<br />

organization can make use of information that is collected in the<br />

pre-crisis stage; on the other hand, the organization can deliver<br />

information that meet the general needs of stakeholders, such as<br />

decision-making needs, the need to reduce emotional uncertainties,<br />

and the need for reparations and compensation. Importantly, if an<br />

organization meets the needs of the public, then it should be<br />

reflected in its messages.<br />

252<br />

Third, the response messages on the microblog should also be in<br />

accord with the core values of stakeholders. The public’s<br />

perception of social values and the rules of messages on the<br />

microblog should be collected and analyzed in the pre-crisis stage;<br />

thereby, the organization can deliver appropriate information in<br />

legitimate formats.<br />

Ultimately, to stress the future can be another task in this stage.<br />

The government agency can inform the public that they are<br />

correcting the wrongdoing as well as learning from the crisis. The<br />

rhetoric used in the posts underlining the future view should be<br />

positive [39]. Table 4 shows the strategies in the crisis event stage.<br />

Table 4. Strategies for Crisis Event Stage<br />

3.2.3 Post-crisis stage<br />

In this stage, the tasks are preparing for the next crisis, making<br />

sure the stakeholders are left with positive impressions, and<br />

checking that the crisis is truly over.<br />

Preparing for the next crisis includes activities such as evaluating<br />

the crisis response strategy and learning from the most recent<br />

crisis [7, 39].On the microblog, feedback is the material for<br />

evaluation and learning purposes. The public’s attitude displayed<br />

in each message can be used to evaluate whether the strategy was<br />

favored. The public’s needs in the crisis as expressed in their posts<br />

and comments can be used to adjust the crisis strategy during and<br />

after the crisis.<br />

Besides the evaluation and learning purposes, feedback can also<br />

be used for the purpose of investigating the public’s impression of<br />

the organization.<br />

Sometimes after the end of the immediate effects, the long-term<br />

impact of a crisis can last months or even years. For instance,<br />

even after physical and financial losses are compensated for,<br />

people still need time to seek emotional relief and rebuild<br />

confidence [5, 7]. Another example is that the organization needs<br />

time to investigate the responsibility for the crisis as well as the<br />

level of damage. In both cases, the organization should continue


collecting information about the crisis. On the microblog, the<br />

public’s feedback and the experts’ opinions should be monitored<br />

so as to help evaluate whether the crisis is truly over. If the crisis<br />

is not completely over yet, the organization should continue to<br />

apply response strategies depending on the crisis situation and the<br />

needs of the public. Table 5 shows the strategies for the post-crisis<br />

stage.<br />

Table 5. Strategies for Post-crisis Stage<br />

4. THE CASE<br />

In this section, the author will introduce the Shanghai City<br />

Metro’s crisis communication on the microblog.<br />

4.1 Introduction, Method, and Questions<br />

The rear-end collision happened at Shanghai City Metro’s Route<br />

No.10 on September 27, 2011. This accident was first reported by<br />

an ordinary microblogger on Sina Microblog [42].The first report<br />

appeared on the microblog website at 14:47 [42]. Before this post<br />

occurred, on the same day from 14:17 to 14:20, the Shanghai City<br />

Metro’s official microblog had posted three messages reporting<br />

that the equipment on Route No.10 had malfunctioned, and the<br />

train was required to slow down. At 14:40, five minutes before the<br />

first report of the collision, the official microblog made a post<br />

informing the public that they were controlling the amount of<br />

passengers connecting to Route No. 10. At 15:03, the official<br />

microblog informed the public that Route No.10 between Yili<br />

Road and Sichuan Bei Road was closed, and no passengers were<br />

allowed to access the train. Two minutes later, the official<br />

microblog made another post that repeated the content of the<br />

previous post, as well as provided information to assist the<br />

passengers in choosing other vehicles for transportation. In the<br />

next 48 hours, the official microblog responded to the crisis. The<br />

response was widely spread by the public and received many<br />

compliments.<br />

In this section, the crisis response made by the official microblog<br />

will be discussed. The questions are:<br />

1) How did the official microblog respond to the crisis?<br />

2) How does the response fit the framework proposed in this<br />

paper?<br />

The data was collected in December 2011. The 52 crisis-related<br />

messages posted and reposted between September 27, 2011 and<br />

253<br />

September 29, 2011 were examined. The author classified the<br />

messages by their main purposes. For instance, the official<br />

microblog apologized in many posts; however, the main purpose<br />

of only two posts was to apologize.<br />

Eight categories are identified. The apology category contains<br />

messages only expressing an apology. The human care messages<br />

show that the organization cares about the victim’s feelings. The<br />

future view category stresses what the organization is going to do.<br />

The responsibility category contains messages related to the<br />

responsibility for the crisis and the investigation into the<br />

responsibilities. Both the “current situation” and the “help<br />

information” help with reducing uncertainties. “Positive tone”<br />

tries to view the crisis from the positive side, such as how people<br />

have helped each other. Figure 1 shows the classification of the<br />

posts. Other relevant posts were searched by using the search<br />

function and keywords such as “passenger education,”“Metro<br />

safe,” etc.<br />

Figure1.Classification of the Posts<br />

These crisis responses will be discussed within the framework that<br />

the author proposed in Section 3. The author will especially focus<br />

on the crisis event stage.<br />

4.2 Pre-crisis Stage<br />

In the pre-crisis stage, the tasks are detecting crisis signs, reducing<br />

potential harm, and preparing for crisis responses.<br />

4.2.1 Detecting crisis signs<br />

First, in order to acquire external information for possibly<br />

detecting signs of a crisis, a government agency should have<br />

many followers and the concerned public on the microblog. The<br />

Shanghai City Metro’s official microblog has millions of<br />

followers, including individuals, relevant organizations, and even<br />

the news media. In the meantime, the official microblog follows<br />

various microbloggers such as individuals, experts, other<br />

organizations, and the news media, which is helpful in acquiring<br />

information from experts and opinion leaders. Besides, there is<br />

evidence indicating that the official microblog is aware of external<br />

information on the microblog. For instance, in August 2011,<br />

among 229 messages relating to Metro affairs posted by the<br />

official microblog, there were 82 messages from external sources.<br />

The messages were from comments, the accounts followed by the<br />

official microblog, and the people who “@” Shanghai Metro in<br />

their messages. In fact, during the crisis the official microblog<br />

posted 8 messages based on information provided by other


accounts, among which seven messages were from external<br />

resources and 3 help messages were generated by individual<br />

microbloggers.<br />

4.2.2 Reducing potential harm<br />

The second task in the pre-crisis stage is to reduce potential harm.<br />

The Shanghai City Metro’s official microblog tries to reach this<br />

goal by offering educational information so that the passengers<br />

could understand safe and dangerous behaviors on the Metro. The<br />

official microblog has two groups of messages under the tag of<br />

“To teach you how to take the Metro” and “safe Metro”. However,<br />

there is little information on what to do when collisions and other<br />

disasters happen.<br />

4.2.3 Preparing for crisis responses<br />

To prepare for possible crisis response is the third task of the precrisis<br />

stage. Three sub-tasks here are preparing to collect<br />

information on crisis situations, understanding the needs and core<br />

values of the public, and building a sound relationship with the<br />

public.<br />

In order to prepare for collecting useful information during a crisis,<br />

an organization should encourage the public to share information<br />

on the microblog. There is no evidence showing that the Shanghai<br />

City Metro’s official microblog is deliberately promoting such an<br />

information-sharing system; however, it does actively reply to and<br />

appreciate those who report suspicious behaviors and items. For<br />

instance, on August 29, 2011, a microblogger found a suspicious<br />

bag on the train and reported it to the official microblog. The<br />

official microblog informed the Metro staff to check the train and<br />

posted the result on the microblog. Another example is that a<br />

passenger complained about the Metro staff at the station asking<br />

him for his personal information. After investigation, the official<br />

microblog told the passenger that those people were not Metro<br />

staff and warned other passengers to stay alert. Such<br />

communication assists in managing the Metro and could be a<br />

strong beginning to building an information-sharing system.<br />

Another two sub-tasks in terms of collecting information to<br />

prepare a crisis response are to understand the needs of<br />

stakeholders and to investigate their values. As the author has<br />

argued in Section 3.2.1, such information can be collected from<br />

comments, “@”, private messages, messages produced by opinion<br />

leaders and experts, and so on. The Shanghai City Metro’s official<br />

microblog firstly has rich information resources, as is argued in<br />

Section 4.1; it also displays awareness of user-generated<br />

information by replying to comments and reposting messages.<br />

The author suggests the official microblog should also pay<br />

attention to the public’s opinion of social events and the way<br />

people communicate on the microblog in order to learn the rules<br />

of the microblog and values of the public/stakeholders.<br />

The final sub-task of preparing crisis responses is to build a good<br />

relationship with stakeholders. Two techniques are suggested by<br />

the author in Section 3.2.1, namely to show willingness to<br />

maintain the relationship and to communication with a human<br />

voice. The Shanghai City Metro’s official microblog engages in<br />

maintaining the relationship by involving the public in Metro<br />

affairs. It also shows enthusiasm to those who need help. For<br />

instance, a person lost the ID card on the train. The Metro<br />

broadcasted this information on the microblog so that this person<br />

could get the card back. Besides, the official microblog tries to<br />

respond to the public’s suggestions on the management issues of<br />

the Metro, which indicates the open attitudes of the Metro. The<br />

254<br />

human voice is about showing personal opinions on<br />

organizational affairs [23, 34, 37]. One example of this is that the<br />

official microblog forwarded the news that the ticket department<br />

of Metro Company visited a rest home for the elderly. Along with<br />

the “thumbs up” picture, the Metro made the comment that “to<br />

love old people is to love ourselves”. Moreover, the official<br />

microblog also displays Metro employees’ working lives along<br />

with pictures and explanations. For instance, the official<br />

microblog once forwarded a message with a picture of the dinner<br />

of a train operator who also used a microblog. The author<br />

understands that it is sensitive to express personal opinions on<br />

certain organizational affairs. Thus, such less sensitive affairs can<br />

be a good place for the official microblog to show the human<br />

voice.<br />

4.3 Crisis Event Stage<br />

In the crisis event stage, the tasks are recognizing a crisis and<br />

responding to the crisis. The rich information resources on the<br />

microblog can help with recognizing the crisis. In this section, the<br />

author only focuses on the strategies that the Shanghai City<br />

Metro’s official microblog has used to cope with the crisis.<br />

4.3.1 Crisis situation<br />

Firstly, crisis communication strategies should cope with the<br />

situation of the crisis; that is, the responsibility for the crisis and<br />

the level of damage. There were two messages made on<br />

September 28 that related to the responsibility for the collision.<br />

One message explained the reason for the accident and admitted<br />

that there were “relevant individuals” violating the “relevant<br />

rules” which led to the collision; the other message indicated that<br />

the “relevant department” and “relevant agency” had tested the<br />

“relevant equipment” of the Metro, and punishment would be<br />

applied to those responsible for the accident. The public’s<br />

attitudes towards these two messages were varied. For instance,<br />

the first message received 395 comments. There were 78<br />

messages doubting the investigation result, among which 35<br />

messages criticized the wording “relevant individuals” and<br />

“relevant rules” for the vagueness. People also complained that<br />

the message was too simplistic and gave no detailed information<br />

or systematic analysis. To the second message, people still had<br />

problems with the word “relevant”.<br />

According to the crisis situation, the official microblog apologized<br />

twice. The first apology was made during the crisis (at 20:18 on<br />

September 27): “This is the worst day in the history of Shanghai<br />

Metro. No matter what the reason is and who should take the<br />

responsibility, we regret the loss and the hurt experienced by the<br />

citizens and the passengers. We will help the injured and return to<br />

normal option as soon as possible. We will also assist in the<br />

investigation and accept the possible responsibility. We will learn<br />

from the accident and do better in the future. Although the<br />

apology is so powerless, we have to profoundly<br />

apologize.”Another apologetic message was posted at 14:52 on<br />

September 28, saying, “We appreciate all the criticisms…We will<br />

work hard…We apologize again”. The former message received<br />

9945 comments; while the latter received 112 comments. Some<br />

comments concerned the reason of the crisis. One comment was:<br />

“What we need is the reason and the responsibility for the<br />

accident instead of apology…” There were also voices of support.<br />

A microblogger commented, “I feel …this message expresses the<br />

good attitude and the willingness to take responsibilities…”<br />

Another comment said, “The communication is good. The Metro


is better than those government agencies that will never accept<br />

their faults.”<br />

The level of damage was also addressed. Four messages published<br />

information about the number of injured and their situations in the<br />

hospital. In a message posted at 17:43 on September 27, the<br />

official microblog claimed that according to the information from<br />

the hospital, 212 people were injured. It was also claimed that<br />

most of the victims were slightly injured. The wording “slightly<br />

injured” could be seen as fact information as well as a diminishing<br />

strategy. However, the audience showed suspicion of the data. For<br />

instance, one comment was: “How do you define the phrase<br />

‘slightly injured’?” Moreover, there were more than one comment<br />

indicating doubt about the number of injured persons. For instance,<br />

one microblogger claimed that the number of injured reported by<br />

Japanese TV (at 22:00 on September 27) was 271. However, the<br />

official microblog failed to respond to these different voices.<br />

Bolstering is also suggested by crisis communication theories [2,<br />

5]. This aims at increasing positive feelings towards the<br />

organization in order to reduce the offensiveness of the crisis [2].<br />

The official microblog tried to show concern for the passengers<br />

and the efforts they were making to mitigate the negative impact<br />

of the collision. For instance, the official microblog reposted a<br />

message (9:01 on September 28) with a picture of volunteers<br />

helping passengers. The official microblog commented: “We<br />

appreciate the citizen’s support. Watching the passengers living<br />

the station, we feel very sorry. Now we will do our best to check<br />

the route and return to normal option as soon as possible. Please<br />

trust us.” This message showed concern for passengers who were<br />

affected by the collision. It also showed people were helping each<br />

other. This message received 210 comments. There were 17<br />

comments indicating that what the public needs is the<br />

investigation into the responsibility for the collision and the<br />

reason of the accident, 10 comments concerning the future safety<br />

of the Metro, 13 messages blaming the Metro for trying to turn the<br />

bad event into a good one, and 8 comments blaming the Metro for<br />

talking rather than doing. However, there were still 26 comments<br />

supporting this post. One comment was: “The government does<br />

not usually speak in such a tone. The Metro’s public<br />

communication is praiseworthy. In my opinion, this crisis<br />

communication is acceptable and even touching. ” Interestingly<br />

enough, some of the microbloggers expressed their love of the<br />

city and the volunteers other than the Metro. One comment was<br />

“This is the spirit of Shanghai City (to help each other).” It seems<br />

that the official microblog successfully related the accident to the<br />

whole city.<br />

4.3.2 Meet the public’s needs<br />

The general public’s needs in the crisis event stage are the need<br />

for the organization to make decisions and reduce the negative<br />

emotions caused by uncertainties.<br />

The official microblog posted 18 messages with alternative bus<br />

transfer information. Pictures and tables were appropriately used<br />

here in order to bypass the limitations of the length of the text<br />

message. Moreover, the official microblog attempted to report the<br />

current situation of the crisis, including how many people were<br />

injured and the status of the train involved in the collision. Such<br />

information contributed to reducing uncertainty about the crisis.<br />

The reactions of the public were varied. Some were appreciative,<br />

saying, “The reaction of the Metro is quick and efficient.”<br />

However, there were still microbloggers showing their concerns<br />

255<br />

for the issues of who or what was responsible for the crisis. Other<br />

citizens were worried about safety issues.<br />

4.3.3 The social values<br />

The messages posted during the crisis should meet the<br />

requirements of social values. Some core values identified by<br />

scholars are honesty, responsibility, openness, and humanism.<br />

Many of the messages posted by the official microblog were with<br />

pictures from the scene of the accident, which increased the<br />

reliability of the Metro Company. What is more, the official<br />

microblog also cited posts from other microbloggers. However,<br />

the Metro failed to respond to the fact information that was<br />

different from the information posted by the official microblog,<br />

which hurt the trustworthiness of both the messages and the Metro.<br />

Moreover, there was no clear statement regarding the<br />

responsibility for the collision. We can see from the comments<br />

that people were angry about the vague descriptions of the<br />

responsible parties. However, the official microblog did express<br />

the willingness to release information. Messages tagged “the latest<br />

information” were used to release information about the crisis<br />

situation.<br />

For humanism, in their apology the Metro Company showed their<br />

regrets. They used the words “we regret the loss and the hurt<br />

experienced by the citizens and the passengers”. Besides, in one<br />

message it was shown that volunteers, police, and bus drivers<br />

were there to help passengers enthusiastically. In a message<br />

saying, “Watching the passengers leaving the State, we feel so<br />

sorry…”, the Metro showed concern to those who were involved<br />

in the accident. However, the official microblog did not<br />

particularly show sympathy for the injured.<br />

4.3.4 The future view<br />

The future view should stress the positive side, the future,<br />

rebuilding, and correcting mistakes. The official microblog did<br />

meet this requirement. In more than one message, the Metro use<br />

the words “We will”. For instance, in the apology messages, “We<br />

will learn from the accident…” and “We will work hard…” were<br />

used. In some messages, the official microblog cited pictures of<br />

people helping each other to remind the public of the positive side<br />

of the accident. Although the messages received support, such as<br />

“cheer up!” and “touching,” there were people who wished the<br />

Metro would act instead of only speaking.<br />

4.4 Post-crisis Stage<br />

In the post-crisis stage the tasks are preparing for the next crisis,<br />

namely learning from the crisis as well as evaluating the crisis<br />

response strategy; checking the public’s impression; and checking<br />

that the crisis is truly over.<br />

First, the organization showed its intention to learn from the crisis,<br />

at least in its apology. Moreover, the comments made by the<br />

public during the time of the crisis can be a good resource for the<br />

organization to evaluate its crisis communication strategies.<br />

Secondly, there was evidence indicating that the official<br />

microblog did try to follow the public’s comments and monitor<br />

the public’s impression. The official microblog replied to one<br />

citizen’s comment, “We appreciate all of the comments; even<br />

some of the comments are criticisms”.<br />

Finally, strategies such as apology, bolstering, and compensation<br />

can all be used in the post-crisis stage due to the lack of full


information in the crisis event stage. In the apology message,<br />

which appeared in the crisis event stage, there was no clear<br />

statement of responsibility. This vagueness could be due to the<br />

lack of information in the crisis event stage. However, at the postcrisis<br />

stage, there was no further statement about the responsibility<br />

for the accident. Instead, the official microblog posted one<br />

message which expressed the future view. The message (18:48 on<br />

September 29) received 52 comments. Other than support, the<br />

major issues as seen by the public were still the reason and the<br />

responsibility for the accident and the real actions taken by the<br />

Metro.<br />

5. CONCLUSIONS AND SUGGESTIONS<br />

In this paper, the author develops a general framework for a<br />

government agency to develop crisis communication on the<br />

microblog. Coomb’s three-stage model is used, and four issues<br />

concerned by primary crisis communication theories are discussed.<br />

The four issues are the crisis situation, stakeholders, the values,<br />

and the future view. In each stage of a crisis, the crisis manager<br />

should take into account both the tasks of each stage and the four<br />

issues when designing crisis communication strategies.<br />

The author also uses the Shanghai City Metro rear-collision as an<br />

example to show how a government can use the framework to<br />

communicate with the public on the microblog. The case enriches<br />

the framework in the following aspects.<br />

First, the primary concern of the public is the reason and the<br />

responsibility for the crisis. The statement of responsibility should<br />

not be vague and lacking in detail; otherwise, the public will be<br />

unsatisfied and may even develop a negative impression of the<br />

organization.<br />

Secondly, the strategies aimed at lessening the perceived level of<br />

damage should be based on facts. The organization should be able<br />

to convince the public; otherwise, such strategy will only lead to<br />

untrustworthiness. The microblog is interactive, which is an<br />

advantage when dealing with third-party information. When<br />

confronted by third-party information which is different from<br />

official information, the organization should actively respond in<br />

order to avoid the impression of being dishonest.<br />

People would like to see the organization admit responsibility and<br />

seek forgiveness. However, the apology as well as other strategies,<br />

such as positive tone and human care, should be accompanied by<br />

effective action taken by the organization.<br />

6. LIMITATIONS AND FURTUER<br />

RESEARCH<br />

First, evidence indicating that at least two crisis-related messages<br />

posted by the official microblog was deleted. Thus, there is no<br />

way of knowing whether the messages were consistent with the<br />

crisis communication strategy.<br />

Secondly, the four theories employed in this paper are mostly<br />

developed in business settings. Although scholars have applied<br />

them to government agencies, a thorough comparison and contrast<br />

of business and government settings will improve the<br />

effectiveness of these theories.<br />

Finally, in the paper, it was asserted that an organization should<br />

learn from the public by listening to their opinions on the<br />

microblog. A further study could be done on how a government<br />

256<br />

agency should collect and analyze the information on the<br />

microblog to understand and learn from the public.<br />

REFERENCES<br />

[1] Avery, E. J., Lariscy, R.W., Kim, S., and Hocke, T. A<br />

quantitative review of crisis communication research in<br />

public relations from 1991 to 2009. Public Relations<br />

Review,36, 2 (2010), 190-192.<br />

[2] Benoit, W. L. Image repair discourse and crisis<br />

communication. Public Relations Review, 23, 2 (1997), 177-<br />

186.<br />

[3] Claeys, A., and Cauberghe, V. Crisis response and crisis<br />

timing strategies, two sides of the same coin. Public<br />

Relations Review. 38, 1 (2012). 83-88.<br />

[4] Coombs, W. T., and Holladay, S.J. Further explorations of<br />

post-crisis communication: Effects of media and response<br />

strategies on perceptions and intentions. Public Relations<br />

Review, 35 (2009), 1-6.<br />

[5] Coombs, W. T. Protecting organization reputations during a<br />

crisis: The development and application of Situational Crisis<br />

Communication Theory. Corporate Reputation Review, 10,<br />

3(2007), 163-176.<br />

[6] Coombs, W.T. Ongoing Crisis Communication. Sage,<br />

Thousand Oaks, CA, 2006, 2-3.<br />

[7] Ibid. 17-20.<br />

[8] Ibid. 21-31<br />

[9] Ibid. 41.<br />

[10] Coombs, W. T., and Holladay, S. J. Helping crisis managers<br />

protect reputational assets: Initial tests of the Situational<br />

Crisis Communication Theory. Management Communication<br />

Quarterly, 16 (2002), 165-186.<br />

[11] Curtin, P. A., and Boynton, L. A. Ethics in public relations:<br />

Theory and practice. In R. L. Health (Eds.), Handbook of<br />

Public Relations, Sage, Thousand Oaks, CA, 2001, 411-421.<br />

[12] Fearn-Banks, K. Crisis Communications: A Casebook<br />

Approach. Lawrence Erlbaum Associates, Mahwah, NJ,<br />

2002, 2.<br />

[13] Fediuk, T. A., Pace, K. M., and Botero, I. C. Exploring crisis<br />

from a receiver perspective: Understanding stakeholder<br />

reactions during crisis events. In T. Coombs, and S. J.<br />

Holladay (Eds.), The Handbook of Crisis Communication.<br />

Wiley-Blackwell, New York, 2010, 635-656.<br />

[14] Gonzalez-Herrero, A., and Pratt, C. B. How to manage a<br />

crisis before – or whenever – it hits. Public Relation<br />

Quarterly, 40, 1 (1995), 25-29.<br />

[15] Health, R. L., and Millar, D. P. A rhetorical approach to<br />

crisis communication: Management, communication<br />

processes, and strategic responses. In Dan P. Millar, and<br />

Robeert L. Health (Eds.). Responding to Crisis. Lawrence<br />

Erlbaum Associates. Mahwah, NJ, 2004, 1-17.<br />

[16] Hearit, K. M. Crisis Management by Apology. Lawrence<br />

Erlbaum Associates, Mahwah, NJ, 2006, 15-17.<br />

[17] Ibid, 68.


[18] Ibid, 64-66.<br />

[19] Hemp, P. Death by information overload. Harvard Business<br />

Review, (September 4 th 2009), Retrieved from<br />

http://hbr.harvardbusiness.org/2009/09/death-byinformation-overload/ar/pr<br />

[20] Jaeger, P. T., Shneiderman, B., Fleischmann, K. R., Preece,<br />

J., Qu, Y., and Wu, P. F. Community response grids: Egovernment,<br />

social networks, and effective emergency<br />

management. Telecommunication Policies, 31 (2007), 592-<br />

604.<br />

[21] Jeong, S. Public’s Responses to an oil spill accident: A test<br />

of the attribution theory and situational crisis communication<br />

theory. Public Relations Review, 35 (2009) 307-309.<br />

[22] Kaiser, C., Schlick, S., and Bodendorf, F. Warning system<br />

for online market research – Identifying critical situations in<br />

online opinion formation. Knowledge-Based Systems. 24<br />

(2011), 824-836.<br />

[23] Kelleher, T. Conversational voice, communicated<br />

commitment, and public relations outcomes in interactive<br />

online communication. Journal of Communication. 59 (2009),<br />

172-188.<br />

[24] Kelleher, T., and Miller, B. M. Organizational blogs and the<br />

human voice: Relational strategies and relational outcomes.<br />

Journal of Computer-Mediated Communication, 11, 2 (2006),<br />

395-414.<br />

[25] Lovejoy, K, Waters, R. D., Saxton, G. D. Engaging<br />

stakeholders through Twitter: How nonprofit organizations<br />

are getting more out of 140 characters or less. Public<br />

Relations Review, 38 (2012), 313-318.<br />

[26] Maxwell, T. T. The public need to know: Emergencies,<br />

government organizations, and public information policies.<br />

Government Information Quarterly, 20 (2003), 233-258.<br />

[27] Mitroff, I. I., Crisis management and environmentalism: A<br />

natural fit. California Management Review, 36,8 (1994),<br />

101-113.<br />

[28] Moyihan, D. P. Learning under uncertainty: Networks in<br />

crisis management. Public Administration Review, 68,2<br />

(2008), 350-361.<br />

[29] Muraliadharan, S. Dillistone, K., and Shin, J. The Gulf Coast<br />

oil spill: Extending the theory of image restoration discourse<br />

to the realm of social media and beyond petroleum. Public<br />

Relations Review, 37, 2011, 226-232.<br />

[30] Richardson, B. Socio-technical disasters: Profile and<br />

prevalence. Disaster Prevention and Management, 3, 4<br />

(1994),41-69.<br />

[31] Schultz, F., Utz, S., and Goritz, A. Is the medium the<br />

message? Perceptions of and reactions to crisis<br />

257<br />

communication via twitter, blogs and traditional media.<br />

Public Relations Review, 37 (2011), 20-27.<br />

[32] Seeger, M. W., Sellnow, T. L., and Ulmer, R. R.<br />

Communication and Organizational Crisis. Praeger,<br />

Westport, CT, 2003.<br />

[33] Seeger, M. W., and Ulmer, R. R. A post-crisis discourse of<br />

renewal: The cases of Malden Mills and Cole Hardwoods.<br />

Journal of Applied Communication Research, 30, 2 (2002),<br />

126-142.<br />

[34] Smith, B. G. Socially distributing public relations: Twitter,<br />

Haiti, and interactivity in social media. Public Relations<br />

Review.36 (2010), 329-335.<br />

[35] Stelzner, M. A. Social Media Marketing Industry Report,<br />

2010, Retrieved from<br />

http://marketingwhitepapers.s3.amazonaws.com/SocialMedia<br />

MarketingReport2010.pdf<br />

[36] Sturges, D. L. Communicating through crisis: A strategy for<br />

organizational survival. Management Communication<br />

Quarterly, 7 (1994), 297-316.<br />

[37] Sweetser, K. D., and Metzgar, E. Communicating during<br />

crisis: Use of blogs as a relationship management tool.<br />

Public Relations Review, 33 (2007), 340-342.<br />

[38] Ulmer, R. R., Sellnow, T. L., and Seeger, M. W. Effective<br />

Crisis Communication. Sage, Thousand Oaks, CA, 2011, 16-<br />

20.http://www.google.com/books?hl=zh-<br />

CN&lr=&id=bC3J1C0BXQwC&oi=fnd&pg=PR1&dq=effec<br />

tive+crisis+communication&ots=kxQvzSFyyt&sig=uAhAU<br />

NczYbXa7ZuZdMpb1UlTgw#v=onepage&q=effective%20crisi<br />

s%20communication&f=false<br />

[39] Ulmer, R. R., Seeger, M. W., and Sellnow, T. L. Post-crisis<br />

communication and renewal: Expanding the parameters of<br />

post-crisis discourse. Public Relations Review, 33 (2007),<br />

130-134.<br />

[40] Ulmer, R. R., Sellnow, T. L., and Seeger, M. W. Effective<br />

Crisis Communication. Sage, Thousand Oaks, CA, 2007,<br />

170-174.<br />

[41] Weiner, B. An attributional theory of achievement<br />

motivation and emotion. Psychology Review, 92 (1985), 548-<br />

573.<br />

[42] XINHUANET. Ten Hours of Shanghai Metro Rear-end<br />

Collision on Microblog, 2011, Retrieved<br />

fromhttp://news.sina.com.cn/c/2011-09-<br />

28/002423227102.shtml<br />

[43] Yang, S., Kang, M., and Johnson, P. Effects of narratives,<br />

openness to dialogic communication, and credibility on<br />

engagement in crisis communication through organizational<br />

blogs. Communication Research. 37, 4 (2010), 473-4


Government Official Microblogs: An Effective Platform for<br />

Facilitating Inclusive Governance<br />

Xinping Liu and Lei Zheng<br />

Department of Public Administration, Fudan University<br />

619 Wenke Building, 220 Handan Road, 2000433 Shanghai, China<br />

ABSTRACT<br />

Applications of social media could bring more convenience to the<br />

government for getting public feedback, or more citizen<br />

participation, in order to provide more inclusive public services.<br />

Microblogs is one of those social media tools. Nowadays, all<br />

governments have begun to use government official microblogs to<br />

publish information, collect public opinions, and interact with the<br />

public. Based on current literature review and analysis, this paper<br />

first develops a theoretical framework on the effect that<br />

microblogs brings to public inclusive governance from the<br />

perspective of microblogs’ interaction object. Theoretically, this<br />

research indicates that microblogs have a positive impact on<br />

inclusive governance, but this effect remains to be tested by future<br />

practice. There are still some problems in current public<br />

interaction between governments and citizens through microblogs,<br />

and the government needs to change their musty ideas and guide<br />

the effective interaction actively. Finally, this paper further<br />

discusses limitations of this research and directions of future<br />

research.<br />

Categories and Subject Descriptors<br />

K.6.1 [Management of Computing Information Systems]: Project<br />

and People Management-Management Techniques<br />

General Terms<br />

Management, Measurement, Performance<br />

Keywords<br />

Government Microblogs, Governance, Social Media, China<br />

1. INTRODUCTION<br />

The development of ICTs has brought public governance new<br />

opportunities, as well as challenges. In the era of Web 2.0, a huge<br />

number of web-based applications have emerged. These<br />

applications rely on the concept of the user as a producer of<br />

information, which provide more possibilities for better<br />

governance [13], for example, government official microblogs.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

+86 13774260846, +86 13501838298<br />

{081017039, zhengl}@fudan.edu.cn<br />

258<br />

Nowadays, countries around the world take seriously to apply<br />

social media like microblogs, and high-level officials from US,<br />

Britain, and Japan has been microblog users. Applications of<br />

social media could bring some improvements aiming at providing<br />

feedback to agencies, and more citizen participation. Also, agency<br />

staff could use social media for improving formal cooperation<br />

[13].<br />

By the end of 2010, Chinese microblog accounts have exceeded<br />

75 million. With its network effect taking shape, microblogs is<br />

playing a more and more important role in Chinese social and<br />

political life. The year of 2010 was named as “China’s first year<br />

in microblog's era” by Chinese citizens. By taking advantage of<br />

the rapidly growing microblog community, government could run<br />

official microblogs to interact with citizens, enhance government<br />

information services, keep tracking with public opinion, help with<br />

emergency response, improve government credibility and further<br />

promote the development of e-governance. Nowadays, many<br />

Chinese governments and officials have opened official<br />

microblogs to interact with citizens. Microblog, to some extent, is<br />

becoming a more and more useful tool for the government.<br />

However, compared to the traditional channels between<br />

government and citizens, what are the new changes of<br />

microblogs? What meaning does it bring to government<br />

governance? These are the main research questions of this paper.<br />

2. LITERATURE REVIEW<br />

As a new kind of social media and web2.0 tool, microblogs<br />

attracted much academic attention in recent years. The current<br />

studies are mainly focusing on the definition of microblog, its<br />

characteristics and its implications on government governance,<br />

especially on public participation.<br />

2.1 Definition of Microblog<br />

Microblog as one kind of social media has increasingly become an<br />

effective way of information dissemination and personal<br />

communications. Social media is “a group of Internet-based<br />

applications that build on the ideological and technological<br />

foundations of Web 2.0, and that allow the creation and exchange<br />

of User Generated Content” [4]. With the help of social media,<br />

ordinary people have become producers of content as well as<br />

consumers so called “prosumers”, being capable of publishing<br />

their own contents on the Web. Microblog is one kind of social<br />

media using web 2.0 technologies, which make people<br />

communicate with each other without ant time and space<br />

constraints once the Internet is available. The users send message<br />

on these websites to interact with other people, and the maximum<br />

length of one message should be less than 140 words.


When it comes to the characteristics of microblog, it is commonly<br />

believed by the scholars that microblogs is a new kind of social<br />

media and Web 2.0 tool, with the main features include<br />

timeliness, simplicity, economy, grassroots, interactive, pluralism,<br />

autonomy, the original ecology, fragmentation, group<br />

polarization, and at the same time it could weaken the role of<br />

opinion leaders. Zhao and Lai [15] also argued that microblogs<br />

have 4A characteristics, including Anyone, Anywhere, Anytime,<br />

Anything, that is, anyone can become the microblog<br />

communicators and can transmit any information at any time and<br />

any place.<br />

2.2 Microblogging on Government Inclusive<br />

Governance<br />

With the development of international electronic public services,<br />

new information technologies has contributed a lot on the<br />

promotion of inclusive governance and improved the level of<br />

public participation. Governments has been increasingly paid<br />

more attention on providing diversified, personalized, ubiquitous,<br />

and high-quality public services, which has clearly showing the<br />

characteristics of e-inclusion" [5][6]. Also, in public participation<br />

area, successful public participation depends on diversification,<br />

inclusiveness and equality; and diversification means its<br />

participants are able to represent the view of people from different<br />

social fields, social hierarchy; inclusiveness refers to lowering the<br />

threshold of e-participation; equality involves equal participation<br />

[1]. Microblogs provide a useful platform to improve public<br />

participation.<br />

2.3 The Mechanism of Microblog’s Effects on<br />

Public Inclusive Governance<br />

As mentioned earlier, public participation requires people from<br />

different social fields, social hierarchy to participate equally [1],<br />

and microblogging reduce the threshold of public participation, so<br />

people could participate in anytime and anywhere. Therefore,<br />

microblogs expand the scope of public participation, and could<br />

provide more feedback to citizens.<br />

2.3.1 Different Types of Microblog’s Users: A Multi-<br />

Perspective<br />

Microblogs has significant differences from the traditional<br />

government portal, blogs and other forums. Their users on these<br />

websites overlap a lot, but still not the same. The characteristics of<br />

different website applications involve different active citizens.<br />

1) Personality. Previous research has proved that in the<br />

increasingly user-generated Web, users’ personality traits<br />

may be crucial factors leading them to engage in this<br />

participatory media [3]. The former researches established<br />

three personality traits that are central to social media use:<br />

extraversion, neuroticism, and openness to experience<br />

[3][10].<br />

2) Age: Correa et al. [3] also found that it was particularly<br />

important among the young adult and extraversion was the<br />

most important predictor of social media use. Prensky<br />

concludes that many digital immigrants confront each change<br />

in technology as something new to be mastered. Generally,<br />

young adult, the elderly who are open to new things and<br />

digital technologies tend to be more active in microblogs and<br />

other social media tools [8].<br />

259<br />

3) Gender: Gender presented another difference among<br />

personality traits. While extraverted men and women were<br />

both likely to be more frequent users of social media tools,<br />

only the men with greater degrees of emotional instability<br />

were more regular users. No significant relationship existed<br />

between women and emotional stability [3].<br />

4) Social ranking: the low threshold of microblogs and the<br />

characteristics of the grass-roots has weakened the role of<br />

opinion leaders which enables people from different social<br />

class to participate in public governance, and promotes the<br />

exchange of social heterogeneity groups [12], namely, people<br />

from different social classes, departments, and other ethics.<br />

5) Education Level: since microblog is easy to use, users could<br />

come from different education levels. Technology is not a<br />

barrier any longer, which could give the government more<br />

kinds of public opinions.<br />

6) Special Target Group: taking the disabled as an example,<br />

Zhao & Qiu [14] examined the significance of social media<br />

to disabled students, and argued that social media tools are<br />

vital to the lives of teenagers today because microblogs<br />

removes physical distances and can significantly expand the<br />

living space of youth who otherwise are confined by their<br />

disabilities. The Center for Technology in Government<br />

(CTG) identified that social media like microblogs could<br />

provide more service channels for the disabled [2].<br />

7) Space-time dimensions: Microblogs has 4A characteristics,<br />

that is, Anyone, Anywhere, Anytime, Anything [15], which<br />

expand the scope and depth of interaction and participation<br />

both vertically and horizontally.<br />

In summary, microblogs has not only expanded the scope of<br />

public participation, so that different personality traits, age, sex,<br />

social class, education level could have equal interactions with the<br />

governments, but also expanded the channels for participation.<br />

Moreover, it vertically breaks the time limit of interaction and<br />

weakens the barriers of geographic isolation to promote<br />

participation any time at anywhere.<br />

2.3.2 Governance in Microblog Era: Inclusive and<br />

Targeted<br />

Based on the literature review above, with the help of microblog<br />

platform, government expands their service scope effectively, and<br />

brings more G2C participation and interaction, which give great<br />

impetus to inclusive governance. Due to the particularity of online<br />

participation, more introverted people could participate more,<br />

which could also strengthen the interactive effects of other active<br />

users. Those digital immigrants like the elderly who are open to<br />

new things and digital technologies, and the digital natives, that is,<br />

young people, and can participate public affairs online, while they<br />

have limited channel to participate before. So microblogs can<br />

make up the general public participation. From the social level,<br />

citizens from varied levels can participate equally, and this could<br />

impel the government to promote public decision-making more<br />

democratization and deliver more equal public services<br />

effectively. Microblogs also enables those vulnerable groups to<br />

participate in the process of governance. From the space-time<br />

dimension, it brings more possibilities for the government to<br />

provide cross-regional (or even cross-border) services<br />

ubiquitously, and extends depth of inclusive governance.


It is worth mentioning that, while expanding the breadth of<br />

interactive citizens, microblogs could also strengthen the<br />

interaction more targeted. Interactive citizens could have a<br />

significant difference depend on different government<br />

departments or various events. For example, from gender<br />

perspective, women may mostly participate in microblogs for<br />

expressing their views, or expanding their social networks and<br />

social activities, while men may be for strengthening their<br />

relationship with others, learning about current political events.<br />

Therefore, education, tourism, food and other related government<br />

departments may be more favored by women, while<br />

transportation, defense, and public security will be paid more<br />

attention by men.<br />

3. METHODOLOGY AND RESEARCH<br />

PLAN<br />

This research will take an analysis on secondary data, including<br />

research reports, thesis and research papers. In order to ensure the<br />

impartiality of the findings, the reports selected in this article are<br />

not only from universities or other research institutes, but also<br />

those from enterprises and social organizations.<br />

There are many microblog platforms, like Sina, Sohu, Tencent,<br />

and so on. It could be a great challenge to discuss all the<br />

government official microblogs. Therefore, this paper simplifies<br />

the data collection and chooses Sina as an example. According to<br />

the DCCI survey in 2010, Sina is the most preferred microblog<br />

platform, which has the highest number of users or potential users,<br />

with the selection rate 69.7%. So I believe the status quo on Sina<br />

could reflect the reality of microblogs in China.<br />

4. ANALYSES ON STATUS QUO OF<br />

GOVERNMENT OFFICIAL<br />

MICROBLOGS<br />

In theory, microblog brings opportunities to the governments for<br />

inclusive and targeted governance by expanding the range of<br />

public participation. However, due to the development of China's<br />

microblog is not mature enough, so evaluation and discussion on<br />

the current status quo can provide recommendations for the<br />

development of the governmental official microblogs.<br />

4.1 The Existing Government Official<br />

Microblogs and its Populations of<br />

Concern<br />

1) Governmental institutions start opening microblogs: according<br />

to “2011 China Administrative microblog research report”<br />

(conducting by “Public Opinion and Communication Research<br />

Laboratory”, Fudan University), till March 20, 2011, 1708<br />

governmental agencies have opened real-name authentication<br />

microblogs, and the distribution of the government's official<br />

microblogs are not balanced either geographically or<br />

institutionally, including governmental level, institutional, and<br />

sectoral distribution [9]. The report further found that most<br />

Shanghai government officials registered there microblogs on the<br />

Xinmin Net (http://t.xinmin.cn), with the proportion up to total<br />

more than 84 percent, followed by Eastday (http://t.eastday.com/),<br />

which accounts for 15 percent account, while only 1 percent of<br />

them has registered on Sina or other microblog platforms. This<br />

situation is worthy of consideration, microblog is the interactive<br />

platform of government and the public, while most citizens are<br />

260<br />

mainly active on the website of Sina or other open microblog<br />

platform, how to promote the interaction between governments<br />

and the public if governments open their microblogs on other<br />

website like Xinmin or Eastday.<br />

2) The analysis of “Concern” subject of government official<br />

microblogs: for governments, microblogs is not only a platform<br />

for issuing information, but also to collect public opinions.<br />

According to a cursory analysis of governmental official<br />

microblogs “concerns”, different governments have various kinds<br />

of “concerns”. Most government microblogs has few “concerns”,<br />

and even many government official microblogs concerned no<br />

more than ten other microblogs. Those “concerns” are mainly<br />

from the mass media, government agencies or departments of the<br />

same level, other government agencies, government branches at<br />

lower levels which have business contact, government officials,<br />

corporate high level executives, academics and other citizens.<br />

Government official microblogs pay more attention to the mass<br />

media, government agencies (all levels), and government officials,<br />

while less on citizens’. Microblogs provide a more convenient and<br />

efficient platform for the government to collect public opinions,<br />

but its active attention to the practical needs of ordinary citizens is<br />

still relatively lack.<br />

4.2 The Main Characteristics of Sina<br />

Microblog Users<br />

Currently, many scholars have conducted lots of analyses on the<br />

characteristics of the user of the microblogs multi-dimensionally.<br />

On the segmentation of individual users, taking "behavioral<br />

loyalty" and "emotional loyalty" as two standards, Zheng [16]<br />

divided all the Sina individual users into three types, mild,<br />

moderate, and extreme, and she further analyzed the user<br />

difference in terms of gender, age, education, and income. Report<br />

from Beijing Online Media Association analyzed the<br />

characteristics of the early users of the microblogs, and find out<br />

that the microblog users can be divided into four categories,<br />

namely, self-expression type (46%), socially active (16%), discuss<br />

and participatory (16%) and diving-prefer type (21%).<br />

Specifically, microblogs has opened up the possibility of<br />

expanding interactive citizens or organizations, which could<br />

enhance inclusive governance. According to Sina’s White Paper<br />

on Chinese First-year microblog, among all the active users of<br />

Sina microblog, women occupy 65 percent, while men accounting<br />

for 35% [11].<br />

On the dimension of age, users from different ages use microblog<br />

on different purpose. Mainly of them are 20-30 years old, with<br />

main purposes to maintain contact with their friends, or to record<br />

their feelings, and to learn the social hot issues, while people from<br />

30 to 40 years old is more focus on learn the social issues and<br />

expanding the circle of friends; however, users over the age of 40<br />

pay more attention to understand the social hot issues, expressing<br />

their opinions, and expand their network; on the contrary, users<br />

under the age of 20 is more emphasis on recreation and leisure,<br />

recording their feelings, and making new friends [7]. Studies have<br />

shown that the younger age groups from 18-30 years old has a<br />

greater level of participation on microblogs, accounting up to<br />

67%, which means microblog users tend to be younger [16].<br />

From the view of income, occupation and education, data from<br />

Beijing Online Media Association shows that more than 63%<br />

microblog users has got a bachelor degree at least. Moreover,<br />

there is no significant income difference between microblog users


and non-microblog users. The number of microblog users with<br />

income of more than 5000 RMB per month is a little bit higher<br />

than those of non-microblog users, by 3 percent. Zheng [16]<br />

argued that current Sina microblog extreme users have lower<br />

education level and relatively low income.<br />

5. CONCLUSION AND IMPLICATIONS<br />

The most important reason for government to use social media is<br />

to move closer to the users, in other words, “go where the mass<br />

go” [8]. Given the breadth of microblog users, government could<br />

achieve a more effective interaction and communication with the<br />

public by opening official microblogs. Theoretically, this research<br />

indicates that microblogs have a positive impact on inclusive<br />

governance, but this effect remains to be tested by future practice.<br />

It could expand the channels for vulnerable groups to participate<br />

more in public affairs, and it breaks the time and space isolation,<br />

and enables ubiquitous participation. With the help of microblog<br />

platform, government expands their service scope effectively, and<br />

brings more G2C participation and interaction, which give great<br />

impetus to inclusive governance. Upon the participation of<br />

different groups, government could conduct more targeted<br />

governance.<br />

Overall, microblog makes interaction between governments and<br />

citizens more easily accessed in terms of geography, time, gender,<br />

age, occupation, income, and education. The assessment results<br />

are consistent with the theoretical framework, but still need<br />

further discussion and verification. Government concerns on<br />

microblogs are still in a narrow range, and they needs to pay more<br />

attention on ordinary people. Although governments conduct<br />

more interaction on government official microblogs, the degree of<br />

participation still needs to be improved. Theoretically speaking,<br />

one can access to the Internet with a mobile phone, but microblog<br />

is still a new thing. The current use of it is still very limited, and it<br />

will take more time to develop microblogs and to promote its<br />

implications in public governance.<br />

According to DCCI's estimates, the annual growth rate of the<br />

various microblog accounts will be 140%-200% in the following<br />

three years, and the outbreak year of growth will appear in the<br />

years 2012, 2013 [11]. Government should pay close attention on<br />

the implications of microblogs continuously. Meanwhile,<br />

microblog is a grassroots media with no information<br />

“gatekeeper”, so government also needs to correct and clarify<br />

information timely.<br />

The limitations of this study are very obvious. Since the practical<br />

development of microblogs in China is still in its infancy stage,<br />

the discussions in this study are only a theoretical analysis. There<br />

are many other problems which need to be further solved, such as<br />

who are relatively active on what on microblogs, the public are<br />

concerning about what kind of topics, viewpoints on what kind of<br />

topics can be collected through the microblogs, what are the<br />

differences between microblog users and users of traditional<br />

media. The discussion on the status quo is mainly based on the<br />

assessment of current report, and lack of further empirical data<br />

validation. All these problems provide direction on further<br />

expanding and sublimation of this study.<br />

261<br />

6. REFERENCES<br />

[1] Brasier, K.J. Planning for citizen engagement. USGSA,<br />

Engaging Citizens in Government. Fall 2009, Retrieved<br />

October11, 2009<br />

[2] Center for Technology in Government. Exploratory Social<br />

Media Project: Phase I: Identifying benefits and concerns<br />

surrounding use of social media in government, 2010.<br />

[3] Correa, T., Hinsley, A. W., and Zúñiga, H. G. Who interacts<br />

on the Web? The intersection of users’ personality and social<br />

media use. Computers in Human Behavior, 26 (2010): 247-<br />

253.<br />

[4] Kaplan, A., and Haenlein, M. Users of the world, unite! The<br />

challenges and opportunities of social media. Business<br />

Horizons, 2010, 53(1), 59–68.<br />

[5] Liu, X. The trends of EU e-government development.<br />

Chinese e-government E-government Blue Book (2010) ,<br />

Wang Changsheng Xu Xiaoping (ed.) , Social Sciences<br />

Documentation Publishing House, 2010.<br />

[6] Liu,X., and Zheng, L. New trend of international egovernment:<br />

the inclusive public services. E-government<br />

Journal, 2010(12).<br />

[7] Ma, X. The value and development of China 's microblogs.<br />

Master's thesis from Nanchang University. December 2010.<br />

[8] Prensky, M. (2001). Digital natives, digital immigrants. On<br />

the Horizon, 9(5), 1–6.<br />

[9] Ren, Y. The status quo Research on Chinese government's<br />

official microblogs. Undergraduate dissertation from Fudan<br />

University. June 2011.<br />

[10] Ross, C., Orr, E.S., Sisic, M., and Arseneault, J.M. M.G.<br />

Simmering, & R.R. Orr. Personality and motivations<br />

associated with Facebook use. Computers in Human<br />

Behavior, 2009, 25(2), 578–586.<br />

[11] Sina. Sina’s White Paper on Chinese First-year microblog,<br />

September 2010.<br />

[12] Tang, L., and Liu, H. Understanding Group Structures and<br />

Properties in Social Media. Yu, et al.(eds.), Link Mining:<br />

Models, Algorithms, and Applications. 2010.<br />

[13] Traunmüller, R. Web 2.0 Creates a New Government. K.N.<br />

Andersen et al. (Eds.): EGOVIS 2010, pp. 77–83, 2010.<br />

[14] Zhao, Y., and Qiu, W. The Potential of Social Media for<br />

Students with Disabilities. Gray, T., and Silver-Pacuilla, H.<br />

(eds.), Breakthrough Teaching and Learning: 2011: 71-86.<br />

[15] Zhao, Z., and Lai, X. Analysis of the implications of<br />

microblogs on the dissemination of news and information:<br />

based on Twitter.com, Socialist Theory Guide, 2010 (4): 93 -<br />

95.<br />

[16] Zheng, Y. The development of Sina microblog. Master's<br />

thesis from Beijing Jiaotong University. June 2010.<br />

[17] Zhou, C. Microblog: the implications of new network<br />

platforms on government affairs. E-commerce Journal, 2010<br />

(10): 39- 40.


Managing Chinese Government Microblogs:<br />

Enablers and Barriers<br />

ABSTRACT<br />

This paper examines the enablers and barriers for the effectiveness<br />

of Chinese government microblogs with regard to government<br />

information disclosure, public service and citizen participation,<br />

and then builds a theoretical framework.<br />

Categories and Subject Descriptors<br />

H.4.2 [Information Systems Applications]: Type of systems – egovernment<br />

applications<br />

General Terms<br />

Management, Human Factors, Theory<br />

Keywords<br />

Social Media, Government, China, Enablers and Barriers<br />

1. INTRODUCTION<br />

Since 2010, a great number of government microblogs accounts<br />

have been opened and run by Chinese government agencies to<br />

foster government information disclosure, public service and<br />

citizen participation. According to the Chinese Government<br />

Microblogs Assessment Report of 2011, the total number of<br />

Chinese government microblog accounts have exceeded 50<br />

thousand by the end of 2011 [1]. This paper examines the enablers<br />

and barriers for the management of Chinese government<br />

microblogs with an empirical study, and attempts to identify the<br />

social, economic, political, organizational and technological<br />

factors that could influence the effectiveness of government<br />

microblogs. It also explores the relationship among these factors<br />

and builds a theoretical framework. Based on the findings of the<br />

study, the paper also makes some recommendations to Chinese<br />

government agencies in order to improve the effectiveness of<br />

government microblogs.<br />

As part of a research project on government microblogging in<br />

China [2], this paper conducts an empirical study on the factors<br />

influencing the effectiveness of Chinese government microblogs,<br />

and explores the interrelationship among these enablers and<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Lei Zheng<br />

Fudan University<br />

NO.220,Handan Road, Shanghai, China<br />

+86-21-55665676, 200433<br />

zhengl@fudan.edu.cn<br />

262<br />

barriers. This study employs two methods for data collection. One<br />

is focus groups carried out from April through June, 2011, with 78<br />

civil servants from Shanghai Municipal Government agencies and<br />

county governments, using brainstorming method to collect<br />

various viewpoints. The other is in-depth interviews conducted<br />

from July through October, 2011, using semi-structured<br />

questionnaires with managers of nine popular and influential<br />

government microblogs in Shanghai, as well as managers who are<br />

responsible for government customers, in the two major<br />

microblogs operating companies in China. The author records and<br />

transcribes the data collected, and analyzed the data with<br />

qualitative approach under the guidance of grounded theory by<br />

using Atlas.ti software. The research findings are as follows.<br />

2. FINDINGS<br />

2.1 External Enablers for Government<br />

Microblogs<br />

2.1.1 Growth in the Living Standards<br />

In recent years, Chinese people’s living standards have been<br />

greatly improved. The ownership rates of home computers and<br />

mobile phones are rising continuously, so is the rapid growth in<br />

microblog users. As interviewees mentioned, the increasing<br />

income of citizens has provided a basic foundation for the<br />

development and pervasiveness of microblogs.<br />

2.1.2 Rising Citizen Participation<br />

The rising intention of Chinese citizens to participate in public<br />

affairs in China has created favorable conditions for the<br />

development and management of government microblogs.<br />

Microblogs have gained wide public attention as a new tool of<br />

communication and interaction. Citizens use this platform actively<br />

to read news, express their opinions and participate in public<br />

affairs, which also propel government departments to open<br />

institutional microblogs to interact with the public. Therefore,<br />

some interviewees believe that it is the high time for government<br />

to operate microblogs.<br />

2.1.3 Policy Support<br />

Some civil servants pointed out that the existing national policy<br />

environment is also favorable for Chinese government to run<br />

microlbogs. In recent years, the government attaches importance<br />

to build a service-oriented government and harmonious society,<br />

and to achieve social management innovation. The central<br />

government introduces corresponding policies and regulations to<br />

promote government information disclosure. Overall, this policy<br />

environment promotes the disclosure of government information<br />

and citizens’ interaction with government.


2.1.4 Technological Maturity of Microblogs<br />

The microblog applications and platforms continue to mature,<br />

which guarantees the sustainable operation of government<br />

microblogs. Some interviewees pointed out that microblog<br />

platforms such as Sina and Tencent are easy to operate, stable in<br />

technology, and mature in functionality with friendly user<br />

experience. Therefore, the technological risks for the government<br />

to run microblogs have been minimized.<br />

2.1.5 International Influence<br />

In recent years, employing social media by government has<br />

become a global trend and has created huge impacts. In many<br />

countries, government agencies and senior officials use social<br />

media for political elections and political communication. Some<br />

interviewees in this research believed that this international trend<br />

has also influenced China to some extent, and propelled Chinese<br />

government agencies to run microblogs to interact with the public.<br />

2.2 Internal Enablers for Government<br />

Microblogs<br />

2.2.1 Leadership Attention and Supports<br />

The rapid development of microblogs has gained great attention<br />

from many government leaders. Some government microblog<br />

accounts were opened at their direct requests. One interviewee<br />

mentioned, “The leaders in our bureau placed serious emphasis on<br />

government microblogs. The project was fully funded and staffed,<br />

while trainings and working sessions were held regularly. Leaders<br />

in various offices and institutions opened their own personal<br />

microblogs to interact with our institutional microblog.”<br />

2.2.2 Abundant Information Resources in Government<br />

At present, government possesses a wealth of information<br />

resources to support the operations of government microblogs. As<br />

many civil servants mentioned, government is now the largest<br />

reservoir of authoritative, reliable and timely information in<br />

society, with strong potential to disseminate information, deliver<br />

targeted information services, and respond promptly to the public<br />

response.<br />

2.2.3 Advantages in Human Resources<br />

Some civil servants pointed out that the government had<br />

considerable advantages in human resources, which could<br />

contribute to the operation of government microblogs. The<br />

advantages are generally twofold. One is the human resources<br />

within the government. “China has a large number of civil<br />

servants”, an interviewee pointed out, “many of them are young<br />

and mastered with network technologies. They are potential<br />

microblog managers.” The other is the human resources outside<br />

the government. “Government can also use external human<br />

resources, such as experts, scholars and overseas returnees. These<br />

people could be invited as trainers and researchers to enhance the<br />

operational capability of government microblog managers.”<br />

2.2.4 Secured Funding<br />

The daily operation and management of microblogs require a<br />

certain amount of financial investment to cover personnel costs,<br />

training costs, equipment costs and communication costs. Many<br />

civil servants said, as long as the leadership paid attention to<br />

government microblogs indeed, funds would not be a big problem.<br />

Moreover, government microblogs are usually running on existing<br />

microblog platforms maintained by private companies. Given that<br />

ICT infrastructure had been considerably invested in many<br />

263<br />

government agencies, there wouldn’t be large additional<br />

equipment investment to run government microblogs.<br />

2.2.5 Adequate ICT infrastructure in Government<br />

Interviewees indicated that after years of e-government<br />

development, most government agencies has now possessed<br />

adequate ICT infrastructure, equipped with computers, servers,<br />

networks and other hardware facilities and software applications.<br />

The government's information security capabilities have also been<br />

greatly improved in recent years, and all these have provided a<br />

strong guarantee for the government to run microblogs effectively<br />

and safely.<br />

2.3 External Barriers for Chinese<br />

Government Microblogs<br />

2.3.1 Hackers and “Water Army”<br />

The ecological complexity of Internet society barricades the<br />

development of government microblogs. There are both angels<br />

and devils on the Internet. Some interviewees pointed out that<br />

hackers were hard to defend on the Internet. Government<br />

microblogs are especially threatened by hacking. Once the<br />

accounts were broken through, the negative impact would be very<br />

serious. A microblog manager stated: "Although Sina and Tencent<br />

claimed that they would ensure the security of government<br />

microblogs, these accounts are still at the risk of malicious<br />

intrusion. The account security is difficult to be guaranteed.<br />

Recently, one government microblog in Dalian City has just<br />

suffered a hacker attack.”<br />

“Internet water army”, a group of Internet also composes a<br />

challenge. The “army” refers to ghostwriters who are paid to post<br />

online comments with particular commercial or political<br />

intentions. These comments could manipulate, mislead and cover<br />

up public opinions for the benefits of special interest group, and<br />

make it hard for government to tell the true opinions of citizens<br />

and interact with citizens.<br />

2.3.2 Low trust in government and disinterests<br />

In addition, citizens’ low trust in government and disinterests to<br />

politics also exist on the Internet. Some interviewees<br />

acknowledged that citizens’ trust in government declines in recent<br />

years, and the government was facing a huge challenge. As for the<br />

posts published on government microblogs, “the public would<br />

hold a skeptical attitude. Thus government microblogs would not<br />

only have difficulties to play their roles, but also become the<br />

public laughingstock in some occasions, which couldn’t worth the<br />

candle.”<br />

Due to either low interests in public participation or suspicion of<br />

the government’s intention, some citizens don’t have much<br />

interest in interacting with government microblogs. Some people<br />

believe that government microblogs were opened up just for a<br />

“show”.<br />

2.3.3 Lack of Regulations<br />

Meanwhile, the ambiguity and absence of Internet regulations and<br />

policies also affect the performance of government microblogs.<br />

One interviewee pointed out: "The low threshold of posting<br />

information on microblogs and the inadequate review process<br />

make it hard to authenticate the information on microblogs. And<br />

there may be some ‘Internet Water Army’. Thus, the effectiveness<br />

of the government microblogs would be undermined. “Another<br />

civil servant mentioned: “At present, speech on the Internet is<br />

relatively free in China. Without a sound regulatory mechanism,


due to their tremendous influence, government microblogs may<br />

become the target of malicious attacks.”<br />

2.3.4 Digital Divide<br />

Some interviewees worried that the users of microblogs were<br />

mostly young people in middle class, while the elderly and poor<br />

could rarely use microblogs, not even use computers. This<br />

situation is unlikely to change in short term. After the opening up<br />

of government microblogs, non-users of micorblogs would be<br />

further marginalized and their interests might be ignored, which<br />

would exacerbate the digital divide.<br />

2.3.5 Fast Technological Upgrading and Substitution<br />

Some civil servants also doubted about the sustainability of<br />

microblogs and worried that they wouldn’t be popular for long<br />

due to the rapid IT advancement and upgrading. “Government<br />

websites, mayor’s mailboxs and the official blogs which were<br />

once hot for a time perhaps could be the lesson for government<br />

microblogs.” “What if microblogs have been abandoned by<br />

Internet users after the government had put a lot of manpower and<br />

material resources on microblogs? Wouldn’t it be worthless?”<br />

As the future of government microblogs still lies in uncertainties,<br />

consequently, microblog management has not yet become a<br />

routine work in government agencies with designated and fixed<br />

posts. Some civil servants worried that if they were assigned to a<br />

full-time job on microblog management, once their superiors shift<br />

their attention on government microblogs, their positions will be<br />

removed. One microblog manager gave a vivid description: “No<br />

one wants to work full-time on the microblog, because no one<br />

wants to ‘die’ on it”.<br />

2.3.6 Technological Risks<br />

Some civil servants also worried that, as a new phenomenon,<br />

microblog was not yet mature, and some risks were still unknown.<br />

For example, some interviewees said that “government<br />

microblogs were operated on external platforms, and the<br />

platform’s operation faults may lead to system errors and even<br />

crashes, resulting in unexpected consequences.”<br />

2.4 The Internal Barriers for Chinese<br />

Government Microblogs<br />

2.4.1 Lack of Institutions and Guidelines<br />

Because microblogs are new tools for government, some<br />

interviewees indicate that the government still lacks adequate<br />

institutions for the operation of government microblogs. In<br />

addition, in lack of effective and specific guidelines, microblog<br />

managers are confused with conflicting issues and hesitate to take<br />

measures. As results, the effectiveness of government microblogs<br />

is seriously affected.<br />

With regard to which department within the government should be<br />

responsible leading and managing government microblogs, there<br />

are no existing policies or regulations to follow in most<br />

government agencies. Nowadays, most leading departments of<br />

government microblogs are in the charge of Party Committees or<br />

publicity departments, and specific management teams and<br />

coordination teams for microblogs are quite different. In most<br />

occasions, government microblogs are operated by either the<br />

Internet Management and Publicity office, or General<br />

Administrative Office, or the Communist Youth League, or<br />

related functional departments. Both advantages and<br />

disadvantages are found with these different arrangements.<br />

264<br />

Besides, the interviews discovers that Chinese government<br />

agencies now mainly adopts two forms—part time jobs and shifts<br />

—to assign staff to the daily operation and management of<br />

government microblogs. The size of the operating teams ranges<br />

from one person to as many as ten members, and few departments<br />

introduce full-time posts for the management of government<br />

microblogs. A microblog operator mentioned, “We do our job in<br />

shifts. From Monday to Friday, the one who has spare time can<br />

post service tips or something at his or her convenience.” And due<br />

to the special nature of microblogs, the peak time of usage are the<br />

30 minutes before work in the morning, the lunch break and the<br />

evening session, while most civil servants work from nine to five,<br />

some of the microblog managers have to work overtime.<br />

Owing to the feeling of uncertainty towards government<br />

microblogs, some civil servants worried that once they worked on<br />

government micorblogs full time, their original jobs would be<br />

affected. Therefore, workers in some departments take shifts for<br />

the daily operation of microblogs. The shift lasts from three<br />

months to six months. The shift is temporary for a specific<br />

operator so that their original post won’t be influenced, and the<br />

operatoe on the shift is not required to work on other tasks until<br />

the shift is over. With this arrangement, the experience that a<br />

certain government microblog operator accumulated during his or<br />

her shift would hardly pass on to his or her successors. With their<br />

varied personal styles of different operators, the management<br />

stability of government microblogs is also jeopardized.<br />

2.4.2 Low Attention from Leadership<br />

Some government microblog managers mentioned that although<br />

their leaders requested them to open and run government<br />

microblogs, they didn’t pay attention to them fundamentally. That<br />

is to say, they just stress the importance orally, but do not provide<br />

matching personnel, financial and material resources. Some<br />

leaders did nothing more than coping with a task assigned by<br />

leaders in higher levels. In addition, the attention of the leadership<br />

frequently shifts, which would also affect the stable and<br />

sustainable operation of government microblogs.<br />

In particular, many civil servants pointed out that under the<br />

existing Chinese administrative system, the attention and support<br />

of superior leadership is extremely important to the development<br />

of government microblogs, and is the key to success. “The reason<br />

why some government microblogs are abandoned was that they<br />

didn’t earn full attention and support from the leadership.”<br />

Therefore, a lot of microblogs have become an object of “display”<br />

of the government, a microblog manager mentioned, "Currently,<br />

what concerns us most is the support of higher authorities."<br />

2.4.3 Lack of Resources<br />

Many government departments reported that in spite of the<br />

increasing tasks and workload of government microblogs, the<br />

necessary funds and resources still fell behind. As mentioned<br />

above, a good support of human, financial and material resources<br />

mainly depended on the attention earned from the leadership. At<br />

present, most government microblogs have no specifically<br />

allocated funds. The facility investment, daily operation expenses,<br />

communication costs, training fees, and personnel expenses (work<br />

allowances and bonuses) are not secured financially. Some<br />

departments stated clearly: “Our human and material resources are<br />

limited. We lack funds, equipment and professional supports.”<br />

Without secured specially allocated funds, the expenditures on<br />

government microblogs in many departments were mainly


appropriated from the budget for general administrations or other<br />

purposes. A government microblog manager illustrated: “The<br />

Bureau of Finance said that they haven’t listed this item in their<br />

budget in advance, so they could not allocate any fund for us.<br />

Therefore, this year we used the overhead cost, which is from the<br />

General Administrative Office’s expenditures.” “Other costs such<br />

as training and activities are not funded at all. Even our own<br />

finance staff wouldn’t approve them, not to mention the Bureau of<br />

Finance. ”<br />

2.4.4 Conservative and Closed Organizational<br />

Culture<br />

The study finds out that many government agencies shows<br />

apprehension towards external barriers and attacks. The<br />

government microblog managers worried that when the Internet<br />

users and opinion leaders questioned the contents on government<br />

microblogs, the government's authority would be directly<br />

challenged. “Government microblogs might be taken advantage of<br />

by interest groups, resulting in social discord. They may also give<br />

a vent for disadvantaged groups to show their angers and be<br />

threatened by malicious comments, which would pose negative<br />

impacts on the image of government.”<br />

Besides, the current messages and posts in government<br />

microblogs are too official, formal and rigid, and present<br />

themselves as government “bulletin boards”. “In the long run,<br />

government microblogs would inevitably lose their attractiveness<br />

and vitality, and ultimately become useless things.” a civil servant<br />

noted, “The current ‘leader first’ culture prevails within the<br />

government, forming an arrogant attitude of government on the<br />

Internet as well. It would inevitably intensify the tension between<br />

the government and the public, which would worsen the<br />

communication between them.”<br />

2.4.5 Bureaucratic Review Process<br />

As a novelty, government microblog is however restrained by the<br />

traditional bureaucratic review process currently. In fear of<br />

making mistakes when posting information and interacting with<br />

citizens, some government microblogs still adopt traditional<br />

review process and thereby reduce the speed and effectiveness of<br />

response. A government microblog manager pointed out: “the<br />

review process is also where the contradiction lies. If we response<br />

every microblog in accordance with the full-process review,<br />

timeliness will be hurt. With this process, we then could only take<br />

official and diplomatic phases to answer them.”<br />

Moreover, the leadership often lacks a thorough understanding of<br />

the features of microblogs and the way of managing them. Some<br />

leaders still adopts old ways to superintend government<br />

microblogs, and some of them are even blind commanders. Under<br />

their improper leadership, some microblog managers are very<br />

confused and frustrated. A government microblog manager<br />

mentioned “The leader who is responsible for government<br />

microblogs doesn’t have a good knowledge of them. He views<br />

operating microblogs as the same way as publishing a newspaper,<br />

and holds editing assemblies every morning and night.”<br />

2.4.6 Inadequate Personnel Capabilities<br />

Since managing government microblog is a fresh new task for<br />

agencies, many managers still lack management experiences and<br />

capabilities. For an instance, some civil servants worried about<br />

answering questions in specialized field raise by the public. “If<br />

you respond with insufficient or inaccurate information, you could<br />

265<br />

not satisfy the public needs; if you put aside questions, people<br />

would feel ignored. So it is quite a dilemma.”<br />

Therefore, many government microblog managers reflected their<br />

urgent need to receive professional trainings, particularly in the<br />

skills of attracting attentions and response in emergencies. “If you<br />

want to attract public attention, professional media packaging or<br />

trainings are very much needed to improve our management<br />

capabilities.” “I hope there are regular trainings, and show us how<br />

to deal with unexpected things. In addition, when a government<br />

microblog is just opened, it is actually our own staff who initiates<br />

the participation in the microblog. Therefore, these people must<br />

also be trained in dealing with complex situations.”<br />

Many government microblog managers also mentioned that the<br />

original workload for some civil servants was already very heavy.<br />

In microblog management, they felt hard to balance their new task<br />

with the old one. They were unable to response quickly or manage<br />

government microblogs at any time. A government microblog<br />

manager pointed out clearly: “there are only six people in our<br />

office. In order to take care of all the tasks, we could only take<br />

turns to work part-time on microblogs. Gradually we feel<br />

exhausted.”<br />

2.4.7 Lack of Cross-boundary Collaborations<br />

The study has found that most government microblogs are<br />

unlinked with each other, without information sharing or<br />

operational collaborations. Especially in dealing with<br />

emergencies, there are no joint efforts among institutions and<br />

individuals to enhance information dissemination and interaction.<br />

A microblog manager from the railway station cited an example:<br />

“our services are information-based. The source of information is<br />

rather important, but very often in emergencies the information<br />

from other transport units is way beyond our grasp. The customers<br />

were very confused and failed to receive information from our<br />

service counters. The truth is that we didn’t know the information<br />

they asked either, because we didn’t have any sources of<br />

information. Talking about this accident on high-speed railways,<br />

we didn’t receive any notifications from the dispatch center and<br />

other transportation partners. Actually, we knew about this<br />

accident by searching content by ourselves through other<br />

microblogs. Without any information provided by our partners in<br />

transportation, it is not surprising that we couldn’t serve the<br />

passengers well. All complaints are pointed to the front desk,<br />

because we are the service terminal. However, we have no<br />

partnership with other units.”<br />

2.4.8 Information Confidentiality<br />

The government has considerations for security and<br />

confidentiality towards the information published by microblogs.<br />

Some microblog managers worried that “Once the government's<br />

confidential information was revealed on the Internet, the situation<br />

would be difficult to restore”. This would make the government<br />

hesitate to publish information on microblogs.<br />

2.4.9 Information Accuracy<br />

Besides, some interviewees also worried that the limitation of 140<br />

characters for each message may result in information inaccuracy<br />

and ambiguity. “Different people have different interpretations of<br />

the contents, which would affect the accuracy and authority of the<br />

information published by government microblogs.”


3. ACKNOWLEDGEMENT<br />

This research is funded by the Shanghai Pujiang Plan and the<br />

Education Innovation Project by Education Committee, Shanghai<br />

Municipal Government.<br />

4. REFERENCES<br />

[1] China National Academy of Governance (2011). Assessment<br />

Report on Chinese Government Microblogging.<br />

[2] Zheng, L., et al (2011). Studying the Management<br />

Mechanism of Government Microblogs in China: A Research<br />

Plan. Proceedings of the 5th International Conference on<br />

Theory and Practice of Electronic Governance, ACM Press.<br />

266


Study on Social Media Applications by Government in<br />

Hong Kong<br />

ABSTRACT<br />

In the Web2.0 Era, social media is playing a more and more<br />

important role in government affairs. This paper conducts a<br />

research based on 44 accounts opened by Hong Kong government<br />

on five social media platforms, including Facebook, Twitter,<br />

YouTube, SinaMicroblog and Blog. The authors identify fourteen<br />

observation contents of those accounts in order to give a general<br />

picture of the current situation of Hong Kong government social<br />

media application. Finally, give some suggestions to mainland<br />

China social media application practice.<br />

Categories and Subject Descriptors<br />

K.6.1 [Project and People Management]: Management<br />

Techniques<br />

General Terms<br />

Management, Measurement, Performance<br />

Keywords<br />

Hong Kong, Government, Social Media, Application<br />

1. INTRODUCTION<br />

Chinese government agencies and officials have set up microblog<br />

accounts since 2008 and are facing many challenges. Even though<br />

western countries start early in government social media<br />

application, it’s hard to copy their experience due to China’s<br />

unique national contextual. Hong Kong Special Administrative<br />

Region, on one hand, shares the same language and culture origin<br />

with Mainland China. On the other hand, it started social media<br />

application in government earlier. Its experience will have a great<br />

reference value to Mainland China. Through observing 44 social<br />

media accounts of Hong Kong government agencies and officials,<br />

this essay studies the current situation of social media application<br />

by Hong Kong government and gives suggestions for the future<br />

social media practice of mainland government.<br />

2. LITERATURE REVIEW<br />

Many scholars have contributed a lot in the field of government<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Huina Xu and Qian Chen<br />

Department of Public Administration<br />

Fudan University<br />

220 Handan Road<br />

200433, Shanghai, China<br />

{11210170057, 10210170073}@fudan.edu.cn<br />

267<br />

using social media tools in recent days. David Landsbergen (2010)<br />

studies the use of social media by several departments within the<br />

city of Columbus, USA and discusses how social media provide<br />

the government a way to do things in way that government<br />

haven’t done before[1]. Enrique Bonson et al. (2012) find out that<br />

most EU local governments are using social media tools to<br />

enhance transparency[2]. Sergio Picazo-Vela et al. (2012) present<br />

the perceptions of risks, benefits and strategic guidelines about<br />

social media application in Central Mexico[3]. John Carlo Bertot<br />

et al. (2012) indicate how governments promote transparency and<br />

accountability through ICTs, social media, and collaborative egovernment[4].<br />

Chinese scholars also have done some researches<br />

on government using social media. The 2011 China government<br />

microblog research report generally introduced the current<br />

situation of government moicroblogs development in China[5].<br />

Yan Su (2011) introduces several examples of the internet and<br />

social media communication by Hong Kong government[6].<br />

Since Chinese government social media application is now facing<br />

many challenges, this study aims to analyze the current situation<br />

of Hong Kong social media application and give some<br />

suggestions to Mainland China.<br />

3. RESEARCH METHOD<br />

On the basis of non-participant observation and secondary data<br />

analysis, this article studies the current situation of Hong Kong<br />

government social media application from the public management<br />

perspective. This study conducts both quantitative and qualitative<br />

analysis by observing fourteen contents of Hong Kong<br />

government social media accounts. This study selects the research<br />

objects by applying the data provided on Hong Kong Government<br />

portal (www.gov.hk) which has set "social media links" that lists<br />

Hong Kong government agency and official social media<br />

accounts. According to the data updated on the website in April<br />

2011, a total of 44 social media accounts have been opened by 14<br />

Hong Kong government officials and 16 government agencies on<br />

five social media platforms including Blog, Facebook, Twitter,<br />

YouTube and SinaMicroblog. In reference to western countries’<br />

social media application handbooks while considered the actual<br />

situation in Hong Kong, this study identifies the following<br />

fourteen observation contents.<br />

1) Account owner: to distinguish whether the social media<br />

account is owned by government official or government<br />

agency;<br />

2) Social media types: to specify which social media platform<br />

the account belongs to: Blog, Facebook, Twitter, YouTube or<br />

SinaMicroblog;


3) Established year: to specify the established year of the social<br />

media account;<br />

4) Account introduction: to find out whether the social media<br />

account identifies itself as government agency or official<br />

clearly;<br />

5) Account images/photos: whether the Hong Kong government<br />

social media account has its own account image or photo;<br />

6) Amount of followers: refers to the amount of followers who<br />

subscribe the government social media accounts;<br />

7) Amount of followings: refers to the amount of social media<br />

accounts that government social media accounts have<br />

subscribed;<br />

8) Type of followings: refers to the type of accounts that Hong<br />

Kong government agencies and officials subscribe;<br />

9) Amount of posts: refers to the amount of posts that released<br />

from the established date till April 20, 2011;<br />

10) Posting frequency: refers to how often Hong Kong<br />

government agency and official accounts post one piece of<br />

information;<br />

11) Content of posts: such as work-related information,<br />

entertainment information, personal views, etc.;<br />

12) Posting forms: to find out whether government agency and<br />

official accounts use pictures, video or other forms in posting;<br />

13) Language: refers to the type of language used in posting,<br />

including English, traditional Chinese and simplified<br />

Chinese;<br />

14) Interaction: to find out whether there is interaction between<br />

government social media account owners and netizens.<br />

4. RESEARCH FINDINGS<br />

4.1 Account Owners, Social Media Types and<br />

Amounts<br />

The figure 1 shows that the most widely used government social<br />

media types are Facebook and YouTube. The data also shows that<br />

Hong Kong government agencies and officials have different<br />

preference on social media types. Government agencies prefer<br />

opening accounts on Twitter, YouTube and Facebook, while<br />

government officials prefer Facebook and Blog.<br />

Figure 1. The number of Hong Kong government agency and<br />

official accounts on different social media platforms.<br />

The Figure 2 shows that nine out of thirty HK government<br />

agencies and officials have opened more than two social media<br />

accounts, among which seven are government agencies.<br />

Government agencies, compared with government officials, seem<br />

to open two even more social media accounts.<br />

268<br />

Figure 2. Number of social media accounts each Hong Kong<br />

government agency and official opens.<br />

4.2 Established Year and Newly-Opened<br />

Social Media Accounts by Year<br />

Figure 3 shows that Hong Kong government has opened social<br />

media accounts as early as in 2006 (Since the web design of<br />

Facebook is difficult for researchers to find the established year,<br />

Facebook is not included in this statistical analysis.). The annual<br />

amount of the newly-opened government social media accounts<br />

has raised up since 2009. Seventeen new social media accounts<br />

were established in year 2010, which seems to be the peak year of<br />

Hong Kong government social media application development.<br />

Figure 3. Newly-opened HK government accounts by year.<br />

Among seventeen newly-opened social media accounts in 2010,<br />

fourteen are opened by government agencies while three by<br />

government officials (Table 1). Government agencies social<br />

media applications appears to develop faster than government<br />

officials. Furthermore, most newly-opened accounts in 2010 open<br />

on YouTube and Twitter.<br />

Table 1. Newly-opened Hong Kong government social media<br />

accounts in 2010 on different social media platforms<br />

Hong Kong<br />

government<br />

officials<br />

Hong Kong<br />

government<br />

agencies<br />

Twitter 0 4 24%<br />

SinaMicroblog 1 2 18%<br />

YouTube 0 8 47%<br />

Blog 2 0 11%<br />

Percentage<br />

Total 3 14 100%<br />

4.3 Account Instruction<br />

Ninety-five percent of the Hong Kong government social media<br />

accounts clearly identify themselves as government agencies or<br />

officials. All of those accounts not identifying themselves are<br />

Hong Kong government official accounts opened on Facebook.


4.4 Account Images/Photos<br />

All the government social media accounts have their own images<br />

or photos. In terms of the consistency of images/photos of the<br />

same government agency/official on multiple social media<br />

platforms, this study finds out that three Hong Kong government<br />

agencies (Chief Executive's Office, Hong Kong Observatory and<br />

the Investment Promotion Agency) and one government official<br />

(Kenneth Chen, Deputy Secretary of Department of Education)<br />

use the same images and photo on different social media<br />

platforms. Another four government agencies, each of which has<br />

opened more than three social media accounts, use partly the same<br />

image on different social media platforms. One government<br />

agency, the Hong Kong Government, use different images on its<br />

Twitter and Facebook accounts.<br />

4.5 Amount of Followers and Followings<br />

The amount of followers of government agency and official<br />

accounts indicates the coverage and effectiveness of accounts<br />

among the netizens. The analysis of the amount of the followers<br />

of 36 Hong Kong government social media accounts (Since Blog<br />

doesn’t have the function of following, it is not included in this<br />

statistics.) shows that 78% government social media accounts<br />

have 100 to 10000 followers. Only a few accounts have either less<br />

than 100 or more than 10,000 followers.<br />

Compared to the large amount of followers of Hong Kong<br />

government social media accounts, most government agencies and<br />

officials follow only several accounts. Seventy-five percent<br />

government accounts only follow other government accounts,<br />

while 25 percent follow other government accounts as well as<br />

non-government accounts such as news and media, celebrities,<br />

companies, ordinary netizens, etc.<br />

4.6 Amount of Posts<br />

The amount of posts is calculated from the established date to<br />

April 20, 2011. Most Hong Kong government accounts post fewer<br />

than 1000 pieces of information till April 20, 2011. Only four<br />

accounts including Hong Kong Radio on YouTube, Independent<br />

Commission Against Corruption (ICAC) on YouTube and<br />

Government Information Services on both Twitter and YouTube<br />

have posted more than 1000 pieces of information. (Since the lack<br />

of data of the amount of posts on Facebook, accounts on<br />

Facebook are not included in the statistics.)<br />

A cross analysis of amount of posts and social media types<br />

indicates a significant difference among each platform. The<br />

amount of posts of 75% government accounts on Blog is less than<br />

100 while amount of posts on Twitter and SinaMicroblog is<br />

mostly between 100 and 1000. The amount of posts on Blog is<br />

smaller than that on other social media platforms (figure 4).<br />

269<br />

Figure 4. Cross analysis of amount of posts and social media<br />

types.<br />

4.7 Posting Frequency<br />

Posting frequency is calculated as follows: P (frequency) = (the<br />

total number of days from the established date to April 20, 2011) /<br />

(Amount of posts). The authors have classified the calculation<br />

result as follows: (0-1) represents that on average, posting one<br />

piece of information costs less than one day. (1-7) represents that<br />

on average, posting one piece of information requires one to seven<br />

days. (7-30) represents that on average, posting one piece of<br />

information costs more than one week (7 days) but less than a<br />

month; (30-50) represents that the average posting frequency is<br />

more than one month but within two months. Figure 5 shows that<br />

more than half of government accounts post information every<br />

one week. The average highest posting frequency is nine times a<br />

day while the slowest is every 40 days.<br />

Figure 5. Posting frequency of HK social media accounts.<br />

4.8 Content of Posts<br />

Based on observation, most information released by government<br />

accounts is related to the work of agencies and officials.<br />

Government official accounts release information not only related<br />

to their own work but also related to their after-work life and<br />

personal points of view. However, government agencies only<br />

release information related to the agencies themselves.<br />

4.9 Language<br />

Figure 6 shows traditional Chinese is the most widely used<br />

language in Hong Kong Government social media accounts. The<br />

study also finds that some government agencies (such as Hong<br />

Kong Observatory) launched one Chinese version account and<br />

one English version account on the same social media platform.<br />

Those two accounts update synchronously and the content of the<br />

posts are almost the same. Tracing back to the origin of those two<br />

accounts, the information is released in both Chinese and English<br />

in one account. After a period of time, this account is separated<br />

into two accounts, Chinese one and English one.


Figure 6. Language used in Hong Kong social media accounts.<br />

5. INSPIRATION AND SUGGESTIONS<br />

5.1 Government Social Media Applications<br />

and Effects are Influenced by the<br />

Characteristics of Social Media Platforms<br />

Based on the different characteristics of different social media<br />

platforms, the amount of posts, posting frequency and posting<br />

forms on different social media platforms vary a lot. Both the<br />

amount of posts and posting frequency on Blog are the lowest,<br />

compared with Facebook, Twitter and YouTube. In addition, the<br />

social media openness to the public has influence on the<br />

government social media applications. The study indicates that<br />

even though the established date of SinaMicroblog is later than<br />

other social media platforms, the amount of followers on<br />

SinaMicroblog is larger than that on Facebook, Twitter and<br />

YouTube. One possible reason is that SinaMicroblog mainly<br />

targets Chinese which have the largest population in the world. At<br />

the mean time, Facebook, Twitter and YouTube are blocked in<br />

Mainland China.<br />

Each social media platform has its own characteristics which<br />

would attract different user groups. Government agencies should<br />

choose suitable platform to provide service to its target citizens.<br />

5.2 Government Social Media Applications<br />

and Effects are Influenced by the<br />

Characteristics of Government Agencies<br />

and Officials<br />

This study has shown that the functional difference of government<br />

agencies and officials would affect their performance on social<br />

media applications. For example, Government Information<br />

Service and Hong Kong Observatory are two different agencies.<br />

They vary in the command of information resources, posting<br />

techniques, and allocation of human resources and funds. As a<br />

result, their performance on social media applications differs a lot.<br />

Furthermore, the study has shown that government agencies open<br />

more social media accounts than government officials.<br />

Government agencies have professionals to manage accounts and<br />

funds to support the daily account maintenance. On the contrast,<br />

most government officials have to manage account by themselves.<br />

Each additional account would put extra burden on the officials.<br />

That may be the reason why government agencies seem to open<br />

more accounts than government officials.<br />

In general, different government agencies and officials have<br />

different command of posting techniques, human resources and<br />

funding, which would result in the performance difference.<br />

270<br />

Government should match their own characteristics with the<br />

social media platform to achieve the best results.<br />

5.3 The Normalization of Government Social<br />

Media Application Should be<br />

Strengthened<br />

This study has found out that there are still five percent<br />

government accounts not identify themselves. In addition, half of<br />

the government social media accounts, which open more than two<br />

accounts on different social media platforms, don’t share the same<br />

image or photo. Account identification and the same image would<br />

help to enhance the authority of government accounts and make it<br />

easier for citizens to recognize the government accounts.<br />

5.4 Followings Amount Should be Enlarged<br />

Compared with the great amount of followers of government<br />

accounts, the followings should be enlarged. It would help the<br />

government agencies and officials get close to the ordinary people<br />

and know what the people are thinking.<br />

6. CONCLUSION<br />

With the social media playing a more and more important role in<br />

public affairs, government using social media has become<br />

inevitable. Mainland china can learn from the experience of social<br />

media applications by HK government. First, mainland china can<br />

take advantage of different types of social media platforms to<br />

reach different netizens and realize the equalization of services<br />

supply. Second, mainland government agencies and officials<br />

should choose one or more suitable social media platforms and<br />

maximize the advantages of the platform. Third, government<br />

agencies and officials should follow more non-government<br />

agency accounts in order to hear the voice of the people. Finally,<br />

multiple languages should be used in social media applications to<br />

meet the needs of different people working or traveling in China.<br />

7. REFERENCES<br />

[1] Landsbergen, D. (2010). Government as Part of the<br />

Revolution: Using Social Media to Achieve Public Goals.<br />

Proceedings of the 10th European Conference on E-<br />

Government, pp. 243-250.<br />

[2] Bonsón, E., Torres, L., Royo, S., & Flores, F. Local egovernment<br />

2.0: Social media and corporate transparency in<br />

municipalities. Government Information Quarterly, pp.123-<br />

132<br />

[3] Picazo-Vela, S., et al., Understanding risks, benefits, and<br />

strategic alternatives of social media applications in the<br />

public sector, Government Information Quarterly (2012)<br />

[4] Bertot, J. C., Jaeger, P. T., & Grimes, J. M. Using ICTs to<br />

create a culture of transparency: E-government and social<br />

media as openness and anti-corruption tools for societies.<br />

Government Information Quarterly, 27(3), 264–271.<br />

[5] China official microblog research report. (2011). Public<br />

opinion and transmission laboratory.<br />

[6] Yan Su. Internet communication analysis of Hong Kong<br />

Special Administrative Region government. Journalism<br />

Lover, 2011(11), pp.74-75


Session 10<br />

ICT & Governance<br />

Transformation


E-Government and Transformation of Governance and<br />

Service Delivery in Bangladesh: A Developing Country<br />

Perspective<br />

ABSTRACT<br />

As elsewhere around the world, lately e-government has become a<br />

major component of governmental policy in Bangladesh. It has<br />

received a particular push with the launch of ‘Digital Bangladesh’.<br />

The twin pillars of the campaign - ‘connecting citizens’ and<br />

‘offering services to their doorsteps’ - are considered key to<br />

fighting poverty and achieving the Millennium Development<br />

Goals. While enthusiasm for e-government is widespread and a<br />

variety of programs are currently underway that offer endless<br />

opportunities for the future, in a developing country like<br />

Bangladesh road to e-government is not without pitfalls and<br />

challenges. This paper sheds lights on the trajectory of egovernment<br />

in Bangladesh with a particular focus on its current<br />

status and future goals. More specifically, it seeks to highlight<br />

some innovative e-government schemes and their impacts on<br />

service delivery processes and mode of interactions between<br />

government and citizens. The paper focuses on some key<br />

constraints that undermine and frustrate governmental drives for<br />

realizing the vision of Digital Bangladesh. It also comments on<br />

their policy implications.<br />

Category<br />

General Literature<br />

General Terms<br />

Management, Human Factors, Performance, Reliability and<br />

Security<br />

Keywords<br />

E-government, Digital Bangladesh, ICT Policy, Union<br />

Information Service Centres, Digital Divide<br />

1. INTRODUCTION<br />

Public governance around the world has long been subjected to<br />

widespread criticisms for poor performance and procedural<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Noore Alam Siddiquee<br />

Department of Politics & Public Policy<br />

Flinders University<br />

Adelaide 5001, Australia<br />

+ 618 8201 2302<br />

noore.siddiquee@flinders.edu.au<br />

271<br />

rigidities, among others. Decades of public sector reforms appear<br />

to have done little either to improve the delivery of<br />

public services or to brighten the image of service providers.<br />

Inefficiency, lack of accountability and transparency, inflexibility,<br />

red-tape and corruption are among the multitude of problems that<br />

characterize public bureaucracies and service delivery systems.<br />

This is particularly the case in developing countries. The advent of<br />

e-government has offered real prospects of making a difference in<br />

this regard. E-government promises not only to improve<br />

efficiency in service delivery but also to promote transparency and<br />

accountability thereby reducing corruption and mismanagement in<br />

public governance [4; 16]. In addition, it is believed to promote<br />

innovation in delivery of public services, offer increased<br />

flexibility in the service use and foster people’s participation and<br />

empowerment [18]. In developing countries e-government has<br />

assumed an additional significance: it is expected to help eradicate<br />

poverty, boost national economic growth, reduce bureaucratic<br />

complexity and establish good governance [7].<br />

Thus it is nothing surprising that of late e-government has become<br />

a key component of public sector reform across the globe. So<br />

popular is the e-government today that it is hard to find a country<br />

that has not embraced it in recent years. As elsewhere, Bangladesh<br />

has followed the global trend. Since the adoption of e-government<br />

as a policy issue in late 1990s, the government of Bangladesh has<br />

initiated and implemented variety of measures seeking either to<br />

improve internal efficiency of the government agencies or to<br />

enhance external delivery of services to the citizens or both. Egovernment<br />

is seen as strategy for transforming public governance<br />

and service delivery, it is also viewed as a tool for fighting<br />

poverty and achieving Millennium Development Goals (MDGs).<br />

While enthusiasm for e-government is widespread and a variety of<br />

programs are currently underway as part of governmental aim of<br />

developing an efficient, accountable and citizen-centric public<br />

administration, in a developing country like Bangladesh the road<br />

to e-government is anything but smooth and straightforward. In<br />

fact, a large number of countervailing forces and barriers act to<br />

thwart and frustrate governmental drives in this regard. This paper<br />

reviews the trajectory of e-government in Bangladesh. Based<br />

mainly on secondary sources the paper seeks to highlight the roles<br />

of e-government in transforming governance and service delivery<br />

system and some of the constraints and challenges involved.


2. THE EVOLUTION OF E-GOVERNMENT<br />

IN BANGLADESH<br />

Even though development of an efficient, transparent and<br />

accountable system of administration has been a recurrent theme<br />

of all reform initiatives since Bangladesh gained her independence<br />

in the early 1970s, e-government has not found expression in the<br />

governmental policy discourse until the late-1990s. In fact, the<br />

ICT revolution and growth of e-commerce etc. elsewhere did not<br />

generate much interest among the Bangladeshi policy makers.<br />

Thus, the initial period was characterised by what could be termed<br />

as a combination of lack of interest, confusion and neglect on part<br />

of political and administrative leadership. After initial periods of<br />

confusion and inaction the first concrete step towards egovernment<br />

was made by the Awami League government<br />

following its assumption of power in 1996. It agreed to connect<br />

the country with the information superhighway, designated ICT as<br />

a thrust sector, waived taxes on computers and computer<br />

accessories and allocated US $6 million in 1997-98 annual budget<br />

towards supporting the development of ICT sector in the country.<br />

It also formed a Task Force with the Prime Minister as its head.<br />

Composed of representative of the government ministries, the<br />

private sector, academia and NGOs the Task Force was<br />

responsible for providing overall direction concerning the<br />

application of ICT in government in order to improve operational<br />

efficiency, enhance quality of services and advance public welfare<br />

by extending public services even to most remote areas. All this<br />

marked the beginning of Bangladesh’s journey towards egovernment.<br />

Following the political change in 2001 the new government<br />

continued the drives initiated by the previous regime. The<br />

formulation of ICT Policy, 2002 was among significant moves<br />

made during 2001- 2005 period. However, in the absence of<br />

coherent vision and well-designed strategies various agencies<br />

initiated and implemented e-government programs in isolated and<br />

uncoordinated fashion. With the launch of the Access to<br />

Information (A2I) programme in 2006 a new phase of egovernment<br />

development began. Located in the Prime Minister’s<br />

Office and supported by the UNDP the A2I program has played a<br />

catalysing role in promoting people oriented to e-government.<br />

Series of workshops and seminars organised under the A2I<br />

program have led to identification of a large number of citizen<br />

services for implementation at various levels. This has also<br />

encouraged various ministries and divisions of the government to<br />

initiate and implement a range of e-government programs aimed<br />

at offering enhanced services to their respective clients. The<br />

military backed care-taker government that was in power during<br />

2007-2008 was highly supportive of the e-government agenda: it<br />

played a vital role in successfully implementing web-initiatives<br />

and augmenting capacity and awareness at various levels. This<br />

may have marked a shift from infrastructure building towards<br />

delivery of services using ICT, still programs remained largely<br />

isolated and limited in scope.<br />

The incumbent Awami League government having assumed power<br />

in 2009 made e-government a priority and initiated<br />

comprehensive measures to this end. In line with its election<br />

manifestos the new government introduced a charter of change<br />

with ‘Digital Bangladesh’ as an integral component of its Vision<br />

2021. Conceived and implemented under the United Nations<br />

Development Program (UNDP) –funded Access to Information<br />

(A2I) program –Digital Bangladesh represents the cornerstone of<br />

272<br />

e-government in Bangladesh. The Digital Bangladesh agenda<br />

involves a digitised government, ICT enabled services, nationwide<br />

internet connectivity, high-tech parks for businesses and IT<br />

trained professionals. It consists of four pillars: (i) developing<br />

human resources suitable for 21 st century demands; (ii) connecting<br />

citizens in a meaningful ways; (iii) taking services to the<br />

doorsteps of the people and (iv) making private sector more<br />

productive and competitive through the use of ICT [10]. The<br />

Digital Bangladesh campaign has led to a more comprehensive,<br />

sustained and robust approach to e-government with emphasis on<br />

citizen-centred service delivery. Although the drives for<br />

infrastructure development continue in view of country’s overall<br />

e-government development index currently emphasis is placed on<br />

fostering integration and expansion of scopes for transactional<br />

services. Numerous programs and projects (as shown later) are<br />

being implemented towards realizing the vision.<br />

3. INSTITUTIONAL AND LEGAL<br />

FRAMEWORK<br />

E-government is a relatively new phenomenon in Bangladesh.<br />

Hence, the institutional, legal and regulatory framework for egovernance<br />

is still evolving. At the apex of the institutional<br />

framework for e-government in Bangladesh is the Prime<br />

Minister’s Office (PMO) that provides stewardship of the Digital<br />

Bangladesh program. The E-Government Cell established within<br />

the PMO provides policy directives and guidelines for the<br />

implementation of e-government programs including oversight<br />

and coordination of such initiatives. The National ICT Task Force<br />

(NTF) chaired by the Prime Minister is responsible for<br />

mainstreaming ICT throughout the public sector. Renamed<br />

recently as the Digital Bangladesh Task Force it is represented by<br />

stakeholders from the government, the private sector and the civil<br />

society. It is responsible for monitoring milestones in the<br />

implementation of Digital Bangladesh agenda and advising the<br />

government on policy matters and means of achieving goals<br />

identified. A number of government ministries have been given<br />

significant roles to play. The Ministry of Science and Information<br />

Communication Technology (MoSICT) is responsible for the<br />

development of infrastructure and human resources for successful<br />

application of ICT in the society. It also formulates ICT policies<br />

and oversees the implementation of such policies. Given that one<br />

of the responsibilities of the Ministry is to support the overall<br />

socio-economic development of the country through research,<br />

development, extension and successful utilisation of science and<br />

technology including ICT, it has undertaken and implemented<br />

variety of programs including the establishment of computer<br />

training centres throughout the country to impart ICT related<br />

knowledge and skills to government employees as well as<br />

members of the public. The Bangladesh Computer Council<br />

(BCC)- an autonomous agency established in 1990 provides<br />

technical assistance to the MoSICT.<br />

The development of telecommunications infrastructure is the<br />

responsibility of the Ministry of Post and Telecommunications<br />

(MoPT). It lends critical support to the e-government by<br />

promoting the growth of telecommunications sector<br />

commensurate with emerging demands and needs. While the<br />

ministry is responsible for the overall development of the<br />

telecommunications sector, Bangladesh Telecommunications<br />

Company Limited (BTCL) – a public limited company under the<br />

ministry has been mandated to provide basic telecommunications<br />

services throughout the country. It provides landline telephones


and domestic as well as international call services. Likewise, the<br />

Bangladesh Telecommunications Regulatory Commission<br />

(BTRC) - an autonomous body established under the Ministry in<br />

2002 is the licensing authority that regulates telecommunication<br />

service providers – both fixed line and mobile phones throughout<br />

the country. It is also responsible for promoting ICT application<br />

through, among others, oversight of the VSAT operators and<br />

internet service providers, the development of digitisation<br />

schemes and regulation of tariffs and standards. Table 1 lists<br />

major agencies involved along with their primary responsibilities.<br />

Table 1: Important Public Sector Actors in E-Government<br />

Government<br />

Ministry/Agency<br />

Prime Minister’s Office<br />

(E-Government Cell)<br />

Ministry of Science &<br />

Information and<br />

Communication<br />

Technology<br />

Bangladesh Computer<br />

Council<br />

Ministry of Post and<br />

Telecommunications<br />

Bangladesh<br />

Telecommunications<br />

Regulatory Commission<br />

(BTRC)<br />

Responsibilities<br />

Overall policy directions<br />

Policy formulation and<br />

mainstreaming ICT in the public<br />

sector<br />

Support MoSICT and provide<br />

training as well as advisory services<br />

to government and citizens.<br />

Develop telecommunication<br />

infrastructure and services<br />

Regulation of the<br />

telecommunications industry &<br />

licensing<br />

Ministry of Information Dissemination of information<br />

Ministry of Planning Support DBTF to realize its goals<br />

Ministry of Finance Support the e-government programs<br />

with appropriate allocation of funds<br />

Ministry of Education Development of curriculum for ICT<br />

education; computerisation of<br />

schools<br />

Ministry of Law, Justice<br />

and Parliamentary<br />

Affairs<br />

ICT Task Force/Digital<br />

Bangladesh Task Force<br />

National Information<br />

Management<br />

Committee (MoP)<br />

National ICT Education<br />

Task Force<br />

Review of ICT related laws and<br />

policies<br />

Mainstream ICT in the government,<br />

advise ministries/agencies and<br />

monitor progress<br />

Development of citizen<br />

identification card for service<br />

delivery purposes<br />

Advancing educational skills and<br />

quality through ICT<br />

273<br />

Source: Based on [14] & other sources<br />

Likewise, a set of policies and laws have been formulated and<br />

enacted in order to provide a legal framework for e-government in<br />

the country. The National ICT Policy formulated in 2002<br />

represents the first concrete measure that provides a<br />

comprehensive outline of the vision of e-government. The ICT<br />

policy 2002 presented e-government as a strategy for improving<br />

efficiency of the government, reducing wastage of resources and<br />

enhancing planning and raising the quality of public services. It<br />

also envisaged, among others, the establishment of<br />

telecommunication infrastructure nationwide, connecting to<br />

submarine fibre optic cable network, extending internet facility to<br />

rural areas, establishing cyber kiosks in post offices, Union<br />

Parishad and Upazila (sub-district) complexes, setting up an<br />

internet exchange and increasing the bandwidth capacity and<br />

availability [9]. Thus it had underscored the spread of ICT in<br />

governmental agencies across the country. The policy required<br />

each Ministry/Division to have an ICT unit comprised of ICT<br />

professionals and websites with policy documents and updated<br />

information.<br />

However, the implementation of the policy was anything but<br />

satisfactory. Among others, the lack of ownership and<br />

coordination among implementing agencies and absence of<br />

leadership have contributed to the failure of the policy. The<br />

Information and Communication Technology (ICT) Act was<br />

adopted in 2006. The Act was also intended to help prevent<br />

cybercrimes and safeguard online transactions so as to promote ecommerce.<br />

However, the Act could not be implemented in its true<br />

spirit as necessary rules and regulations were never introduced<br />

[9]. Following the launch of the Digital Bangladesh as the flagship<br />

project the government has promulgated a new ICT policy. The<br />

ICT Policy 2009 envisions the ICT as a tool to bring about<br />

‘transparent, accountable and responsible government’ [11]. It is<br />

fairly comprehensive for besides outlining specific objectives and<br />

priorities it has identified over 300 action items for<br />

implementation in key sectors of the economy in order to improve<br />

the delivery of services. It also seeks to develop human resources,<br />

enhance social equity and ensure cost-effective delivery of<br />

governmental services to support the national goal of becoming a<br />

middle-income country within 10 years and joining the ranks of<br />

developed nations within 30 years [11]. Another major legislation<br />

is the ICT Act 2009. This is, in fact, a slightly modified version of<br />

ICT Act 2006 which remained unimplemented. The Act provides<br />

legitimacy of the electronic records and digital signature. While it<br />

is true that the current legal framework of e-government is largely<br />

driven by ICT Policy 2009 and the ICT Act, 2009 a number of<br />

other tools and policy documents as listed in table 2 have had a<br />

significant bearing on e-government. Collectively, they provide a<br />

broad framework of e-governance in the country.<br />

Table 2: Major E-government Policies and Laws<br />

Policy/Legislation Objective(s)<br />

Telecommunications<br />

Act, 2001<br />

Facilitate liberalisation of<br />

telecommunications sector<br />

ICT Policy, 2002 Provide guidelines for development<br />

of the ICT sector


Internet Connection &<br />

Usage Policy, 2004<br />

Copyright (Amended)<br />

Act, 2005<br />

Provide a framework for the use of<br />

internet facilities<br />

Protect intellectual property rights<br />

and legalise electronic<br />

communication<br />

ICT Act, 2006 Provide legal basis of the ICT<br />

Right to Information<br />

Act, 2009<br />

Provide legal entitlement to citizens<br />

to seek public information and<br />

demand transparency &<br />

accountability of public institutions<br />

ICT Policy, 2009 Provide an up-to-date and<br />

comprehensive framework for the<br />

development of ICT with action<br />

plans consistent with Digital<br />

Bangladesh vision<br />

ICT Act, 2009 Improve legal structure of ICT by<br />

incorporating necessary<br />

amendments to ICT Act, 2006<br />

Broadband Policy, 2009 Facilitate the growth of high-speed<br />

internet services at an affordable<br />

price<br />

Telecommunications<br />

Act (Amended), 2010<br />

International Long<br />

Distance<br />

Telecommunication<br />

Services Policy, 2010<br />

Update Telecommunications Act,<br />

2001<br />

Facilitate low-cost ILDTS<br />

including VOIP services<br />

Source: Based on [14] and other sources<br />

4. TRANSFORMATION OF GOVERNANCE<br />

AND SERVICE DELIVERY: SELECTED E-<br />

GOVERNMENT PROGRAMS<br />

Although a late starter, the government of Bangladesh has<br />

initiated and implemented a large number of schemes with the aim<br />

of realizing the visions and goals as outlined above. More<br />

specifically, these programs seek to transform governance and<br />

service delivery system offering citizens with improved services.<br />

In this section of the paper we focus on selected e-government<br />

schemes that portray the current state of e-government in<br />

Bangladesh and the progress made to-date in various spheres.<br />

These are some well-known programmes and they capture G2C,<br />

G2B and G2G dimensions.<br />

4.1 Web-Presence of Government & Forms<br />

Concerted governmental drives during recent years have resulted<br />

in a considerable progress towards making government<br />

information and services available online. One clear indication is<br />

that most government agencies including ministries, divisions,<br />

departments and statutory bodies have web-presence with useful<br />

information and contact details. The national web portal of the<br />

government of Bangladesh (www.bangladesh.gov.bd) serves as a<br />

one-stop access to information and services offered by various<br />

274<br />

agencies and departments. Governmental websites and portals<br />

have begun to offer services beyond information dissemination.<br />

The Prime Minister’s Office has launched a website<br />

(www.forms.gov.bd) which has made virtually all government<br />

forms accessible online. This is a significant development in that<br />

the citizens and businesses are now able to access variety of forms<br />

without having to visit respective offices. This saves time and<br />

helps them avoid the hassle associated with visiting various<br />

agencies.<br />

4.2 Digitisation of Land Records System<br />

This involves digitisation of country’s complex and age-old land<br />

ownership records that are source of huge corruption and<br />

litigations. Following several successful pilot projects the<br />

government decided to spread the benefits of such experiments<br />

throughout the country. Currently in progress, this project would<br />

drastically reduce the complexities and corruption associated with<br />

land administration. This would greatly simplify land<br />

administration and put an end to the current practice where<br />

citizens need to visit more than 10 different agencies to obtain<br />

their records and/or to have them updated.<br />

4.3 Online Hajj Information Management System<br />

The Online Hajj Information Management system of the Ministry<br />

of Religious Affairs is an example of innovation in area of G2C<br />

service. In place since 2002 the portal serves as a source of<br />

information to thousands of pilgrims who go to Mecca to perform<br />

Hajj every year. Besides allowing verification of information like<br />

their location, health condition and flight details etc. the<br />

interactive features of the portal allow easy and reliable<br />

communication between pilgrims and their relatives.<br />

4.4 Land Resources Information System<br />

The Agro-Ecological Zone (AEZ) database of the Bangladesh<br />

Agricultural Research Council (BARC) contains information on<br />

country’s land resources including geography, soil, and climate,<br />

hydrology, cropping system and crop sustainability. This is used<br />

to generate readily accessible information of the physical land<br />

resources of the country for use by researchers, extension workers,<br />

and decision makers in land and agricultural resource<br />

management as well as for agricultural planning. This has served<br />

as the basis for the development of a more comprehensive and<br />

multi-scale GIS-based Land Resources Information System which<br />

helps deal with the intricacies of land resource planning under<br />

complex environmental conditions.<br />

4.5 Electronic Birth Registration System, RCC<br />

The Electronic Birth Registration Information System (EBRIS)<br />

introduced by Rajshahi City Corporation (RCC) with technical<br />

assistance from the UNICEF has earned award as an innovative egovernment<br />

at the local level. It allows registration of birth<br />

electronically, generates birth certificate and immunisation card<br />

for each newly born babies and list of babies due for vaccination<br />

on a particular day. The EBRIS has replaced the manual process<br />

of registration where multiple agencies were involved thus<br />

helping remove duplication of entries and other problem. Also, it<br />

has contributed to achieve near 100 % immunisation coverage in<br />

RCC area [1].


4.6 Computerisation of Railway Ticketing System<br />

Under one of the early e-government projects the Ministry of<br />

Communication computerised the railway seat reservation and<br />

ticketing system nationwide. In operation since 1996 this is now<br />

being expanded to e-ticketing where the passengers of inter-city<br />

trains will be able to purchase electronic ticket using mobile<br />

phones and other devices. This would help rail users to avoid<br />

hassle of travelling all the way to train stations and waiting in long<br />

queues for collecting tickets.<br />

4.7 Automation of Internal Processes: The<br />

Bangladesh Bank<br />

While the drives for process automation can be found in virtually<br />

every public entity, the Bangladesh Bank is among the handful of<br />

agencies that have been successful in integrating ICT in its core<br />

business processes. As such all aspects of its operation including<br />

internal management, export receipts and import payments and<br />

monitoring and supervision of commercial banks have been<br />

automated. It has also made a significant progress with electronic<br />

banking through the introduction of automated check clearance<br />

and e-payment gateway, online money transfers and payment of<br />

utility bills via the internet.<br />

4.8 HRM Database, Ministry of Public Administration<br />

The Ministry of Establishment - recently renamed as the Ministry<br />

of Public Administration was among the first to computerise part<br />

of its internal operation. The Personnel Management Information<br />

System (PMIS) is an online database that covers information of all<br />

class I officers of the government of Bangladesh. It has shown<br />

immense benefits for the ministry as well as the concerned<br />

officials. The supervisory authority uses the database for<br />

personnel management functions including the management of<br />

their annual confidential reports (ACRs). The respective officer<br />

can access his or her personal data sheet (PDS); it also allows<br />

him/her to request updating personal information to reflect<br />

changes to situation such as completion of a training program.<br />

This also helps them to track their career development and<br />

provide regular information on career opportunities.<br />

4.9 Process Automation, NBR<br />

As a result of the successful implementation of a number of<br />

donor-funded projects like Customs Administration<br />

Modernisation Project, Excise, Taxes and Customs Data<br />

Computerisation Project and Modernisation and Automation<br />

Project, much of the core businesses of the National Board of<br />

Revenue (NBR) have already been automated. Thus NBR has<br />

recorded a considerable success in its operations and objectives.<br />

For example 90% of country’s trade are now fully automated<br />

which reduces the cost of doing business on the one hand and<br />

facilitates trade and commerce on the other. This has also<br />

contributed to reduce tax evasion raising governmental revenue<br />

considerably. Significant progress has also been made with<br />

regard to e-taxation especially filing of tax returns by individuals<br />

and small businesses.<br />

4.10 E-Procurement<br />

Currently under active implementation the eGP project seeks to<br />

make public procurement system efficient, transparent and<br />

accountable. This would allow the entire cycle of procurement<br />

decisions and actions from the opening of tender to evaluation of<br />

bids and authorisation and final payment could be done<br />

275<br />

electronically. It will not only reduce time required in completing<br />

tender procedures, it will also reduce corruption leading to<br />

improvement in quality of government purchases. While the<br />

government plans to bring the entire public procurement system<br />

under e-procurement in phases, initially four government<br />

departments/agencies that handle lion’s share of government<br />

contracts - the Directorate of Roads & Highways, Local<br />

Government Engineering Department, Bangladesh Water<br />

Development Board and Rural Electrification Board - have been<br />

selected for the first phase of e-tendering pilot project (Daily<br />

Inqilab, 3 June, 2011).<br />

These alongside many other similar schemes in various spheres of<br />

public administration indicate a new trend where ICT is applied to<br />

improve internal efficiency of the government agencies at the<br />

same time making sure that the citizens and businesses get fast,<br />

reliable and hassle-free services. Clearly, e-initiatives cover all<br />

possible dimensions (G2C, G2B and G2G) of e-government and<br />

offer enormous prospects to redesign governance and service<br />

delivery in future. Progress already achieved, limited though<br />

compared to other similar contexts, like online presence of<br />

government agencies and interactive features is no less significant.<br />

When considered against e-government maturity models, it is<br />

evident that Bangladesh has progressed from information stage to<br />

permit online interaction and transactions with government<br />

agencies [for more on this, see 12, 3 & 4]. Such features allow<br />

citizens to download various government forms, policies and<br />

regulations and a range of other useful services at their own<br />

convenience. Also there are cases where people are able to pay<br />

utility bills, buy train tickets, register for admission into public<br />

universities and get results of public examinations using mobile<br />

phones. However, still benefits of e-government are limited due<br />

mainly to factors like insufficient infrastructure development and<br />

connectivity, inadequate interactive and transactional features and<br />

widespread digital divide in the society.<br />

5. BRIDGING DIGITAL DIVIDE: E-<br />

GOVERNMENT AT LOCAL &<br />

COMMUNITY LEVELS<br />

Such problems however have not escaped attention of the policy<br />

makers and other actors. This is evident in various efforts made to<br />

find innovative solutions to such problems thereby ensuring the<br />

benefits of e-government are widely shared. The Union<br />

Information & Service Centres (UISCs) are cases in point. Driven<br />

by the desire of achieving twin goals of Digital Bangladesh, i.e.,<br />

connecting citizens and delivering services at their doorsteps<br />

UISCs have been established throughout the country (Daily Star,<br />

1 Nov, 2010). Conceived and implemented under the UNDP<br />

funded A2I program, UISCs in fact represents a bold attempt at<br />

bridging digital divide and connecting the rural communities to<br />

the Internet. Equipped with computers and internet UISCs are<br />

now functioning in all 4501 unions – the lowest tier of local<br />

government offering useful services to citizens. The services<br />

offered in UISCs range from email, word processing, printing<br />

and scanning to access government forms, birth and death<br />

registration information, passport and visa support and<br />

information on public examinations to health, education and<br />

disaster management. Modelled on the successful Gyandoot<br />

project of Uttar Pradesh, India the UISCs are housed in in the<br />

local Union Parishad office and managed by local entrepreneurs.<br />

While the initial funding and hardware support came from the A2I


program and the Ministry of Local Government is responsible for<br />

coordinating the overall activities and building capacity by<br />

training relevant personnel [14] the sustainability of the scheme<br />

has been taken care of by involving local youths who run the<br />

centres and charge a modest fee for the services rendered.<br />

It is pertinent to note that a number of non-governmental<br />

initiatives have already laid the foundation for schemes like<br />

UISCs. NGO initiatives have demonstrated success in reaching<br />

out to the unreachable in the countryside. The GramenPhone<br />

Community Information Centres (GCIS) and Pallitathya Kendra<br />

(Village Information Centres) are among the leading nongovernmental<br />

initiatives in this area. GrameenPhone has set up<br />

over 500 information centres in remote locations seeking to<br />

enhance the rural communities’ access to internet and multi-media<br />

services. Managed by local entrepreneurs, who receive training<br />

and initial support from GrameenPhone, these centres offer wide<br />

range of off-line and on-line services. Usual GrameenPhone<br />

services (e.g., payphones and electronic recharge for prepaid<br />

mobile accounts services) aside, these centres provide internet<br />

surfing and emailing, chatting, computer composing, scanning and<br />

printing and information on health and education. Plans are<br />

underway to expand the range of services available via such<br />

centres. Similarly the initial success of the Pallitathya Kendra<br />

project of Development Research Network (D.Net) has led to its<br />

subsequent expansion. Currently, there are over 100 Pallitathya<br />

Kendras around the country that provide IT skills, training in<br />

computer operations, advanced IT courses, ancillary services and<br />

livelihood information. Citizens use these centres to access variety<br />

of information from common agricultural problems, socio-legal<br />

advice and financial services to medical issues [14]. An important<br />

feature of the PK is that mobile InfoLadies help make services<br />

available to those who cannot physically reach the centres. These<br />

Infoladies on their bicycles carry notes, phones and medical<br />

equipment thus making the services to those most disadvantaged<br />

and in the remotest corners of the country.<br />

The other initiatives that seek to address digital divide and make<br />

the benefits of ICT available to the disadvantaged groups include<br />

e-huts and Tathya Toris. BracNet - an affiliate of the Bangladesh<br />

Rural Advancement Committee (BRAC) established e-huts with<br />

the aim of making internet accessible to those living in rural areas<br />

at an affordable price. Currently e-huts provide technological<br />

solutions for small businesses and local people. BracNet aims to<br />

expand the scope and reach by multiplying the number of e-huts<br />

to 1000 - each serving as a one-stop shop for various types of<br />

digital services including internet browsing, basic computer<br />

training, broadband internet services, photocopying and scanning<br />

[6]. Likewise, Tathya Tori (information boat) project of the<br />

GrameenPhone is an innovative scheme that seeks to educate and<br />

empower river-based people with information and services [15].<br />

Under the support from CARE Bangladesh Tathya Toris are<br />

equipped with digital content and serve as mobile centres to<br />

provide internet and associated services to the people living in<br />

haor areas. Besides the provision of periodic medical services<br />

and computer training, Tathya Toris also make available<br />

information on agriculture, fisheries and other livelihood matters.<br />

6. MAJOR CONSTRAINTS &<br />

CHALLENGES<br />

It is obvious from the preceding discussions that Bangladesh has<br />

made slow but steady progress towards implementation of e-<br />

276<br />

government. Wide variety of measures undertaken and<br />

implemented in various spheres has helped raise country’s eprofile<br />

and readiness. However, still the overall progress is rather<br />

modest when considered against other countries around the world.<br />

The 2010 e-government survey ranks Bangladesh at 134position<br />

out of 185 nations globally [19]. Although Bangladesh has<br />

advanced from the earlier position of 142 in 2008 and placed<br />

herself ahead of Bhutan and Pakistan, on the whole this progress<br />

is far from satisfactory given the fact that compared to many other<br />

countries around the world and some of her neighbours (e.g. India,<br />

Sri Lanka and Maldives) this rank is abysmally low and the level<br />

of preparedness is far from what is required to provide integrated<br />

services to the citizens. Table 3 shows the current state of ICT<br />

infrastructure in Bangladesh and the nation’s overall position in<br />

World E-government Index. Currently, governmental drives for<br />

expanding the benefits of e-government are handicapped by a<br />

range of challenges and constraints:<br />

Table 3: Bangladesh’s Position in World E-Government<br />

Development Index, 2010<br />

World E-Government Development<br />

Index Rank<br />

Online Service Component (Rank 60)<br />

a. Points for emerging<br />

information service<br />

b. Points for enhanced<br />

information services<br />

c. Points for transaction services<br />

d. Points for connected<br />

approach<br />

Telecommunication Infrastructure<br />

Component (Rank 161)<br />

a. Estimated user per 100<br />

inhabitants<br />

b. Fixed telephone lines per 100<br />

inhabitants:<br />

c. Mobile subscriber per 100<br />

inhabitants<br />

d. Personal computers per 100<br />

inhabitants:<br />

e. Total fixed broadband per<br />

100 inhabitants:<br />

Human Capital Component (Rank 167)<br />

a. Adult literacy rate:<br />

a. Combined gross enrolment<br />

ratio for<br />

primary, secondary and<br />

tertiary schools:<br />

E Participation index (Rank 102)<br />

Source: [17: p. 117]<br />

2010 2008<br />

134 out<br />

of 190<br />

48<br />

44<br />

05<br />

15<br />

0.32<br />

0.84<br />

27.90<br />

2.25<br />

0.03<br />

53.50<br />

48.46<br />

0.1000<br />

142 out<br />

of 192<br />

NA<br />

NA<br />

NA<br />

NA<br />

0.31<br />

0.79<br />

13.25<br />

2.42<br />

0.00<br />

47.50<br />

56.01<br />

Rank 78<br />

6.1 Infrastructural Challenges<br />

The infrastructure serves as the backbone of e-government. It<br />

encompasses computers and telecommunications capacity in terms<br />

of wireless and broadband networks. In order to avail the fruits of<br />

ICT revolution compatible ICT infrastructure must be in place.<br />

Viewed from this perspective, the overall situation in Bangladesh<br />

is hardly satisfactory. Computer Ownership per 100 people is


abysmally low (2.25). In addition to those presented in table 3<br />

other evidence indicates a poor state of affairs. Internet penetration<br />

rate has been very low: there are only 204 internet service<br />

providers (IPS) 80% based in Dhaka, and the number of regular<br />

internet users is 3 million. Tele-density per 100 people is 32.04;<br />

number of fixed phone lines in 2007 of 1.12 mil and mobile phone<br />

users of 76.43 million (2011). In fact, inadequate infrastructure is<br />

a huge challenge for the government as well as the citizens.<br />

Despite very many efforts made to build strong ICT infrastructure<br />

still most government agencies operate with manual systems and<br />

procedures making digitisation of data an enormous task. The ratio<br />

of personal computers to staff of government offices has improved<br />

–but still low. This means that many of those junior officers and<br />

those working at the field levels are without much needed<br />

computers which hamper the delivery of services online. Also,<br />

government departments and agencies are not interconnected<br />

between themselves and with their field offices; the networking<br />

infrastructure is weak outside capital and major cities [12].<br />

Given the fact that ICT penetration in Bangladesh is still low,<br />

people having no or limited access to Internet are unable to enjoy<br />

the benefits of e-government, even if services are available<br />

electronically. Evidence shows that despite recent improvements<br />

in ICT infrastructure, Bangladesh is still at the bottom of network<br />

readiness index and ranked 118 among 133 countries [8]. The<br />

proportion of households with computers increased from 0.8 in<br />

2002 to 1.9 in 2007 and the proportion of households with internet<br />

has increased from 0.1 in 2002 to 1.3 in 2007. The problem is<br />

exacerbated by inadequate supply of electricity and the<br />

concentration of PC and Internet users in major cities and towns.<br />

Majority of the population in Bangladesh are without electricity<br />

and those having access to it also experience regular blackout and<br />

disruptions without notice. Likewise, computers are still too<br />

expensive for most Bangladeshi households and the Internet<br />

remains costly on the one hand and unreliable in most parts on the<br />

other. Even the introduction of mobile Internet and WiMax<br />

technology that promises to break the barrier of reaching the<br />

unreachable has recorded limited success given that very few<br />

users are currently prepared or trained to use such devices to<br />

access government information and services.<br />

6.2 Digital Divide<br />

Bangladesh is a country of extreme disparities. Such disparities<br />

seem to be widening in recent times as the vast majority of the<br />

population remain unaffected by the ICT revolution,<br />

notwithstanding the governmental drives to bridge the divide by<br />

making the ICT services to those who cannot afford them.<br />

Without doubt, the existing programs are steps in the right<br />

direction- but they are grossly inadequate to tackle the massive<br />

gaps created by the ICT revolution. The government is faced with<br />

an enormous challenge to ensuring that people of various socioeconomic<br />

strata have equitable access to services and benefits. As<br />

noted, access to Internet and ownership of PCs are<br />

disproportionately concentrated in Dhaka and major cities. It is<br />

true that the internet users and broadband networks are growing,<br />

however this appears to create further divide between the cities<br />

and rural areas, between the educated and affluent segments of the<br />

population and the poor and ordinary masses. Although data on<br />

gender, age of ICT users are unavailable, it is conceivable that the<br />

vast majority of those using ICT in Bangladesh are male and<br />

young – not female and elderly. Prevailing problems like massive<br />

277<br />

poverty and inequality, illiteracy and widespread corruption<br />

contribute to widen the gaps further under of e-government.<br />

6.3 Inadequate Human Capital<br />

Low levels of literacy among the general masses and lack of<br />

efficiency among the government servants responsible for<br />

implementing e-government initiatives frustrate governmental<br />

drives. It is ironical that despite being one of the most populous<br />

countries in the world, inadequate human capital continues to be a<br />

major barrier to e-government in Bangladesh. First, lack of literacy<br />

poses a formidable challenge to the development of a competent<br />

user group in the country. Currently Bangladesh’s Human Capital<br />

Index is only 0.5182 with adult literacy rate of 53.5% and the<br />

combined gross enrolment of primary, secondary and tertiary<br />

schools being 48.46% [19]. This low level of literacy makes it<br />

difficult for nearly half of the population fails to understand any<br />

meaning of e-government. Second, though projects are underway to<br />

promote IT literacy among the students the use of those equipment,<br />

especially in rural areas, is far from optimal because of such<br />

setbacks as interrupted power supply, poor location, unavailability<br />

of trained personnel, low motivation and awareness among those<br />

involved.<br />

Third, the current level of skills and expertise available in the public<br />

sector is inadequate. A recent study shows that 52% of the officers<br />

of the Bangladesh who are IT literate do not find their skills<br />

sufficient to perform daily work and only 38.7% use ICT in official<br />

activities. A vast majority of the officers (82%) felt that they needed<br />

training to be able to discharge their duties [13]. Training programs<br />

run by government and private institutions have generally failed to<br />

keep pace with the developments and growing demands; whatever<br />

training is available rarely need-based and carefully planned to<br />

allow application in the workplace. The Bangladesh experience also<br />

shows disconnects between high level policy development and lower<br />

level engagement and commitment, between infrastructure capacity<br />

and field level operations. Many public officials have access to<br />

computers and internet but they rarely make appropriate use of such<br />

facilities. It merely suggests that the potential of such tools remains<br />

mostly underutilised; they are used primarily for purposes other than<br />

service delivery for example word-processing, browsing the internet<br />

and for preparing presentational materials.<br />

6.4 Financial, Legislative and Regulatory Constraints<br />

E-Government in Bangladesh is still in its infancy. Despite the<br />

recent drives and programs, the vision of using ICT to improve<br />

governance and quality of life of citizens has not been fully<br />

embedded in the legal and regulatory framework [14] As<br />

indicated, the current legislative and regulatory framework of egovernment<br />

driven mainly by two important documents - the ICT<br />

Policy 2009 and the ICT Act 2009 has addressed many of the<br />

inadequacies and concerns, yet it fails to provide a comprehensive<br />

and robust basis for e-government. While the government aims to<br />

provide greater public access to ICT and facilitate transactions and<br />

services, the existing laws are insufficient in terms of privacy,<br />

security and intellectual property rights [14]. In the current<br />

context there is a feeling that a far more comprehensive legislative<br />

framework is required than at present, not just for tackling<br />

cybercrimes and for electronic certification and authentication<br />

purposes but also for standardisation of government data and<br />

information, security of shared services platforms and the like [2].<br />

Needless to add that poor legal and regulatory framework along<br />

with insufficient ICT infrastructure serves as a fundamental


constraint on online and integrated services. Also, a key challenge<br />

of e-government in Bangladesh is limited funding from the<br />

government and its heavy reliance on donor support. Budgetary<br />

allocation for e-government has remained inadequate; although it<br />

has increased in volume it continues to remain very low as a<br />

percentage of total developmental spending. The planned target of<br />

increasing governmental spending for ICT sector to 2% of the<br />

annual development plan (ADP) has remained far way off. In<br />

2009-10 budget the government allocated $ 20.83m to ICT<br />

development which represents a mere 0.43% of the total ADP.<br />

7. CONCLUSION<br />

It is obvious that Bangladesh has made slow but important<br />

progress towards implementation of e-government. Although<br />

initial drives began in the late 1990s, the e-government campaign<br />

received a major push in recent times which paved the way for the<br />

development of key ICT infrastructure – both hardware and software<br />

- and some important initiatives. Variety of schemes initiated<br />

and implemented since the early years have raised Bangladesh’s eprofile<br />

and e-readiness. Currently virtually all public agencies<br />

including those at the field level have their web-presence; they<br />

also offer informational and in limited cases, interactive and<br />

transactional services. Bangladesh has also seen the introduction<br />

of a number of innovative schemes that promise to transform<br />

nature of governance and pattern of interaction between the<br />

government and citizens and deliver significant gains in terms of<br />

efficiency, convenience and accountability, among others.<br />

Attempts are currently underway to expand the range of services<br />

that could be offered online and to ensure that those without<br />

access to new technology are able to enjoy the benefits of ICT<br />

revolution. Taken together they have marked the beginning of<br />

citizen-centric public administration: members of the public are<br />

now provided with alternative channels of accessing services in a<br />

more hassle-free environment.<br />

However, it must be emphasized that e-government has yet to<br />

bring about a fundamental change in public governance as most<br />

programs have not gone beyond informational and interactive<br />

stages and the vast majority of services continue to be provided<br />

through traditional channels. The expansion of e-government<br />

benefits has been handicapped by a range of constraints and<br />

limitations. As shown, the barriers and challenges that Bangladesh<br />

faces are complex and multi-dimensional which must be overcome<br />

in order to achieve radical change to the process of governance<br />

and service delivery. In fact, the experience of e-government<br />

around the world shows that there is no quick fix to such<br />

challenges. It requires robust leadership, continuous drive and<br />

innovation in different spheres where the government, the private<br />

sector, NGOs and members of the community all have important<br />

roles to play. Perhaps the most critical in this regard is the<br />

commitment and conviction on part of political and administrative<br />

leadership to carry this task forward. Without such commitment<br />

and sustained efforts the vision of Digital Bangladesh is unlikely<br />

to be realized.<br />

8. REFERENCES<br />

[1] Akther, M.S., Onishi, T. and Kidokoro, T. (2007).’ Egovernment<br />

in a developing country: citizen-centric approach for<br />

278<br />

success’, International Journal of Electronic Governance, 1(1): 38-<br />

51<br />

[2] Bangladesh Enterprise Institute (BEI) (2010). Realizing the<br />

Vision of Digital Bangladesh through E-Government, July.<br />

[3] Bhuiyan, M.S.H. (2010). E-Government Applications in<br />

Bangladesh - Status and Challenges, Paper presented at Fourth<br />

International Conference on Theory and Practice of Electronic<br />

Governance October 25-28, Beijing China.<br />

[4] Bhuiyan, S.H. (2011). ‘Modernizing Bangladesh public<br />

Administration through e-governance: Benefits and challenges’,<br />

Government Information Quarterly, 28: 54-65<br />

[5] Bhatnagar, S. (2004). E-Government: From Vision to<br />

Implementation, New Delhi: Sage Publications<br />

[6] Ebrahim, A. Pirson, M. and Mangas, P. (2009). ‘Brummer and<br />

the bracNet Investment’, Harvard Business School, April.<br />

[7] Faroqi, M.G. and Siddiquee, N.A. (2011). ‘Limping into the<br />

Information Age; Challenges of E-Government in Bangladesh’,<br />

Journal of Comparative Asian Development, 10(1): 33-61.<br />

[8] GITR (2009). The Networked Readiness Index & Ranking<br />

2009-2010, The Global Information Technology Report 2009-10,<br />

World Economic Forum.<br />

[9] Government of Bangladesh (GoB) (2002). National Information<br />

and Communication Technology (ICT), Policy 2002, Dhaka:<br />

Ministry of Science and Information and Communication<br />

Technology.<br />

[10] GOB (2009a). E-Government Bulletin January: Access to<br />

Information Program, Dhaka: Prime Minister’s Office<br />

[11] GOB (2009b). National Information and Communication<br />

Technology (ICT), Policy 2009, Dhaka: Ministry of Science and<br />

Information and Communication Technology.<br />

[12] Hasan, S. (2011). E-Government in Bangladesh Public<br />

administration: Impact on the Procedure of Interaction, PhD thesis<br />

submitted to the University of Sydney, August.<br />

[13] Hoque, S.M.S. and Zaman, F. (undated). ‘E-Government:<br />

Preparedness of the Bangladesh Civil Service’. Unpublished paper.<br />

[14] Institute of Governance Studies (IGS) (2009). Digital<br />

Bangladesh: The Beginning of Citizen-Centric E-Government? IGS:<br />

BRAC University.<br />

[15] Islam, M.A. and Tsuji, K. (2009).’Bridging digital Divide in<br />

Bangladesh: Study on Community Information Centres’, The<br />

Electronic Library, 29(4); 506-522.<br />

[16] OECD (2003). The E-Government Imperative, OECD E-<br />

Government Studies.<br />

[17] Rahman, T. and Khan, N.A. (2012). ‘Reckoning Electronic<br />

Government in Bangladesh’, International Journal of Public<br />

Administration, 35: 112-121<br />

[18] United Nations (UN) (2008). E-Government Survey: From E-<br />

Government to Connected Governance, Ney York.<br />

[19] UN (2010). Global e-Government Survey, 2010, UN<br />

Department of Economics and Social Affairs.


Evaluating and Assessing a Typology of Ubiquitous City<br />

Services by Classifying and Assigning Actual Services<br />

from an Inventory of Identified Services in Practice<br />

Jungwoo Lee<br />

jlee@yonsei.ac.kr<br />

Hyejung Lee<br />

h.jlee@yonsei.ac.kr<br />

Taesung Kim<br />

Yonsei University<br />

Yonsei University IT Policy & Strategy Research Institute<br />

Seodaemungu, Yonseiro 50, NMH 412 Seodaemungu, Yonseiro 50, NMH 412 Seodaemungu, Yonseiro 50<br />

120-749, Republic of Korea, Seoul 120-749, Republic of Korea, Seoul 120-749, Republic of Korea, Seoul<br />

+82-10-5398-7751<br />

+82-2-2123-4526<br />

+82-2-2123-8308<br />

ABSTRACT<br />

Two trends are obvious in urban management. Urban areas are<br />

increasing in scope and population worldwide, and ubiquitous<br />

services(u-services) are becoming critical in urban management<br />

worldwide. Though many u-services are under development, no<br />

consensus seems to be made concerning common typology,<br />

though a number of frameworks are suggested. In this study,<br />

efforts are concerted to heuristically validate a rather<br />

comprehensive typology of u-city services. Using 228 u-services,<br />

inventoried and presented in u-Eco City projects in Republic of<br />

Korea, classifying exercises are conducted, by three experts in the<br />

field, against a most popularly quoted typology. Findings indicate<br />

that the selected typology is high on comprehensively<br />

exhaustiveness and empirical applicability while low on mutual<br />

exclusivity, simplicity and theoretical contribution. Implications<br />

for improving the typology are suggested followed by limitations<br />

and directions for further research.<br />

Categories and Subject Descriptors<br />

K.4.0 [COMPUTERS AND SOCIETY]: General<br />

General Terms<br />

Design, Standardization<br />

Keywords<br />

U-City Services, Service Classification, Classification, Validation,<br />

Service Typology, Typology<br />

1. INTRODUCTION<br />

With the advances in ubiquitous technologies, attempts were<br />

made to change the paradigm of urban development by<br />

introducing those technologies into city planning and<br />

management. These attempts are attracting attentions from city<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

279<br />

sgtkimts@yonsei.ac.kr<br />

administrators. Many cities are developing and implementing uservices<br />

using U-technologies, positioning themselves as u-city or<br />

smart city [1], [2], [17].<br />

U-services are (1) available to a large number of beneficiaries as<br />

they cover almost every dimension of human life and municipal<br />

administration; (2) likely to develop into convergence services by<br />

combining with many different functions; and (3) expected to help<br />

enhance efficiency through inter-service interactions unlike the<br />

existing unit services which are typically walled by functions. In<br />

reality, local governments are developing u-services independent<br />

from each other due to current institutional walls. This seems to<br />

lead into inefficiencies in u-service operations as well as<br />

overlapping investments [3], [4], [5].<br />

To overcome these problems, it is important to standardize uservices.<br />

Relevant authorities’ service systems which have been<br />

separately managed should be connected and talk to each other<br />

using a bit standardized definitions and technical details, enabling<br />

us to build integrated operations centers for different u-cities and<br />

services [17].<br />

These integrated operation centers may play a critical role in<br />

providing efficient u-services to its people and enhancing their<br />

convenience of living and quality of life by using state-of-the-art<br />

IT infrastructure and ubiquitous information services to make the<br />

urban environment more sustainable. For connection and<br />

expansion of u-services, it is necessary to classify the services<br />

first so that their types and interrelationships can be identified,<br />

theoretically and practically. For this purpose, previous studies<br />

have attempted to develop and synthesize a u-service typology.<br />

However, most of these typologies are based on theoretical or<br />

normative point of view. The appropriateness of these typologies<br />

is scarcely put into empirical verification.<br />

In this regard, this study selected a relatively comprehensive<br />

typology of u-services presented in a academic literature, and<br />

evaluate this typology, heuristically and intensively, using 228 uservices<br />

inventoried and identified in U-Eco City projects [1].<br />

Results of the study are presented at the end with suggestions for<br />

enhancements.<br />

2. RELATED WORK<br />

2.1 U-service typology<br />

Table 1 list the previous studies in which any type of u-service<br />

typology are presented. In studies conducted before 2008, the u-


services were mainly classified in terms of service providers,<br />

urban activities/functions and special differences. Many of those<br />

studies failed to depart from the patterns of classifying the<br />

services by pre-defined administrative functions. Moreover, they<br />

have a limitation in understanding inter-service relationships, due<br />

to the lack of view on bigger goals such as objectives, and<br />

methods of classifications [9], [10], [13], [15]. K. S. Jeong claims<br />

to propose an integrated typology combining and merging existing<br />

typologies [6]. His typology uses four larger categories, nine<br />

medium categories and thirty four small categories, covering<br />

physical space, electronic space, service types, and aspects of<br />

service providers, element technologies and values. It is claimed<br />

as a flexible, comprehensive and multi-dimensional typology that<br />

may allow components and elements of a city, providing criteria<br />

Table 1. Previous Typologies of U-Services<br />

for applying in a variety of combinations. In addition to Jeong,<br />

others also have proposed u-service typologies. However, no<br />

efforts have been concerted minimum level of evaluation of such<br />

typologies.<br />

These typologies seem to be not much based on empirical<br />

evidence but formed from a theoretical or normative perspective.<br />

The ideal typology of any kind in scientific research is based on<br />

empirical induction from corroborative data, but actually in social<br />

science research it is difficult to derive such an inductive model<br />

[13], [16]. Therefore, in social sciences, models of intentional<br />

classification are commonly used as alternatives, which are<br />

difficult to evaluate in terms of validity because they have not<br />

been verified with empirical evidence.<br />

Type Service category Service areas<br />

Personal Life Culture/Entertainment, Health/Welfare<br />

Industry classification,<br />

Industrial Economics<br />

KETI 2006 [15]<br />

Business/Commerce, Communications/Broadcasting/Publishing,<br />

Construction, Finance/Insurance, Logistics/Transportation, Information<br />

Public Administration General Administration, Social Security Administration<br />

Public sector<br />

Facilities management, Environmental,<br />

Security /Police/Safety, Transportation, Complaints/Administrative<br />

Service provider, Jung<br />

(2007)[9]<br />

Private sector<br />

Corporations<br />

Individuals<br />

Business/Commerce,Communications/Broadcasting/Publishing,Finance/Ins<br />

urance, Logistics/Transportation, Construction, Information<br />

Dwelling-houses, home, health/welfare, education,<br />

culture/recreation/tourism<br />

Industry support U-work, U-convention<br />

City activities and Community support U-government, U-administration, U-tourism, U-office/business, U-learning<br />

features, Lee (2007)<br />

[10]<br />

Life support<br />

Construct city<br />

U-home, U-health, U-Prevention/Police Administration<br />

U-Port, U-underground facility, U-Traffic, U-Facilities Management, U-<br />

Environmental Management<br />

City component‧<br />

features, Lim (2008)<br />

[12]<br />

Life<br />

Industry<br />

Public<br />

U-Dwelling-houses, U-Education, U-Broadcasting/Communication, U-<br />

Prevention/Police Administration<br />

U-Production, U-Business, U-Logistics, U-security<br />

U-Defence, U-administration, U-health/welfare, U-Culture/Tourism, U-<br />

Traffic/Transportation<br />

Environment U-environment, U-disaster<br />

Laws Regulations<br />

Spatial unit Building, street, district, facility, city, broadband<br />

Space factor<br />

Spatial facilities<br />

Comprehensive<br />

By whom<br />

typology for U-city Human factor<br />

For whom<br />

service, Jeong (2009)<br />

Goals<br />

[6]<br />

Activities<br />

Function factor<br />

media facilities, Unit Space control facilities, Community complex,<br />

integrated control center<br />

Public, private, public-private partnership<br />

Public agencies, citizens, Company<br />

Life support, business support, industrial support<br />

Living healthy, Security and Safety, Community, Education, Economy,<br />

Leisure, Culture<br />

Behaviours Living, Working, Moving, Playing, Cybering<br />

Commonalities Common-based services, Specialized services, Potential service<br />

Also, there are not many studies of the criteria that can be used to<br />

evaluate the social science models of classification. Since it is<br />

difficult to verify the social science models empirically, a<br />

theoretical evaluation must be involved, but there have been few<br />

attempts to study the criteria by which to verify them theoretically.<br />

Recently, in order to resolve the problem, Y. H. Chun suggested<br />

five conditions under which to evaluate the fitness of a typology<br />

[13]. This study aims to make clear the ambiguous definitions of<br />

u-services by empirically and theoretically evaluating Jeong’s<br />

280<br />

typology in view of the five conditions suggested and to suggest a<br />

way to build a better typology.<br />

2.2 General Conditions to be a Good<br />

Typology<br />

Chun suggested that the classification model for a desirable<br />

typology should meet five general conditions: 1) exhaustiveness,<br />

2) mutual exclusiveness, 3) parsimony, 4) empirical workability,<br />

and 5) theoretical fruitfulness [13], [16].


Exhaustiveness indicates that all categories should be included<br />

within a typology. For U-services, exhaustiveness has an<br />

important significance in that the U-services are not fixed or static<br />

but highly likely to develop into convergence services according<br />

to their necessity. If a U-service typology lacks exhaustiveness, it<br />

may be meaningless as a typology because it will not cover all of<br />

the U-services that can be created or terminated depending on<br />

environment.<br />

Mutual exclusiveness can be a good condition for typology in that<br />

confusion may be caused if there is a logical overlap between<br />

categories or if a single concept simultaneously falls into different<br />

categories, but actually it is difficult to meet in social sciences<br />

where each classification target does not have a rapid discontinuity<br />

between categories. In particular, the condition of mutual<br />

exclusiveness is difficult to satisfy in U-services that include many<br />

convergence services, and thus if this is taken into account, it will<br />

end up just in enumeration, not in classification.<br />

Parsimony is the concept that when other conditions are the same,<br />

the simpler classification model the better and the more<br />

complicated the worse. However, the parsimony a typology has is<br />

commonly against the practical value of the classification model.<br />

Accordingly, if a category becomes too wide for parsimony, the<br />

classification may be made simpler than necessary and thus not be<br />

of help in empirical studies or practical applications. For U-service<br />

classification models, it is difficult to ensure parsimony due to the<br />

complexity of U-services themselves. However, if the principle of<br />

parsimony is not met, the U-service classification models can end<br />

up merely serving for enumeration, not as typology, due to the<br />

complexity of services themselves.<br />

Empirical workability indicates that operations for measurement<br />

should be possible when verification is conducted with an<br />

involved person’s arbitrary decisions limited to a minimum in<br />

classification. However, the lack of such empirical workability is a<br />

troublesome problem which is present in most classification<br />

models available in social sciences and can be considered as an<br />

inherent limitation of social science research that takes advantage<br />

of abstract concepts.<br />

Theoretical fruitfulness is that it will be good if eventually a<br />

typology itself presents a generally acceptable theory. As<br />

mentioned above, this theoretical fruitfulness commonly conflicts<br />

with empirical workability. The reason is that due to the<br />

abstractness of classification criteria it is very uncommon that the<br />

classification models making theoretical fruitfulness actually<br />

extend to empirical studies.<br />

In this study, we selected Jeong’s typology and heuristically<br />

classified 228 unit U-services being currently developed in Korea<br />

after their application to the selected system. The results of<br />

classification were empirically analyzed in terms of whether they<br />

are compliant with the five conditions. Through the analysis this<br />

study identified the shortcomings of the total U-service typology<br />

and other things that need to be made up for in the system.<br />

3. ANALYSIS<br />

In evaluating the appropriateness of Jeong’s U-service typology,<br />

this study examined the distribution patterns and characteristics of<br />

current services by assigning 228 unit services to eight medium<br />

classification categories (i.e., spatial units, spatial facilities,<br />

service providers, beneficiaries, service objectives, urban activities,<br />

281<br />

human behaviors, and function-implementing methods), exclusive<br />

of laws/institutions.<br />

3.1 Procedure<br />

The medium category of “laws/institutions,” unlike other<br />

classification criteria, represents which laws include U-servicerelated<br />

provisions, rather than a set of actual services. This<br />

category was excluded because it was not fit for the purpose of<br />

this study, and eight other medium categories of actual services<br />

were used in this study.<br />

In the classification of U-services into eight medium categories,<br />

the 228 unit services were verified through in-depth interviews<br />

with three experts selected from those who participated in the U-<br />

Eco City project for two or more years. As the first activity of<br />

service classification, each expert reviewed a list of 228 Uservices<br />

and classified the U-services appropriately into one of the<br />

given categories. The second activity was to compare the Uservice<br />

classifications with those by two other experts. In the<br />

coherence of service classification, 195 (85.5%) of 228 unit<br />

services were consistently classified by all the three experts as<br />

“culture, tourism or sports” but the classification of 11 services<br />

(4.8%) was completely inconsistent among the experts who<br />

categorized them as “transportation, health care, facility<br />

management or labor/employment.”<br />

3.2 Heuristics Used<br />

Table 2(Fig. 1-8) shows how the services were categorized. The<br />

classification of 228 unit services by the given criteria revealed the<br />

following limitations: (1) the definitions of some small categories<br />

were unclear to use for classification purposes; (2) there was a<br />

preponderance of certain categories in the classification of Uservices;<br />

and (3) there were similar items overlapping between<br />

medium-categories.<br />

First, some classification criteria were unclearly defined. Two<br />

examples are the definition of information media facility services<br />

as types of “services provided from fixed facilities” and the<br />

definition of unit-space control facility services as types of<br />

“services limited to facilities and their attached facilities.” Both<br />

of the definitions reflect the concept of “services provided from<br />

facilities,” and accordingly this causes confusion when services<br />

are actually classified. For instance, the “traffic signal violation<br />

enforcement service” working on the road can be recognized as<br />

being provided from fixed facilities and at the same time viewed<br />

as that limited to attached facilities. Moreover, if it is unclear<br />

whether service beneficiaries are the public or business entities,<br />

the human behavior forms of moving and cybering can be<br />

considered for service classification. Second, when the 228 unit<br />

services were classified in terms of their names, some<br />

classification criteria were found to play only a nominal role rather<br />

than serve as typology. For example, in the service classification<br />

by urban activities, the category of “security/safety” represented<br />

95% of transportation services, 100% of crime/disaster prevention<br />

services, and 93% of facility management services; and the<br />

category of “leisure” included 94% of culture, tourism and sports<br />

services. This typology does not seem to reflect service types in a<br />

balanced way, and therefore further studies need to focus on<br />

reducing the uneven distribution of classification items and<br />

making classification criteria more practical. Third, there were<br />

similar items overlapping between medium categories. Especially,


such overlapping was prominent between the medium categories<br />

of urban activities and human behavior.<br />

In this study, urban activities were subdivided into life/health,<br />

security/safety, community, education, economy and leisure, and<br />

human behavior was classified into living, working, moving,<br />

playing and cybering. In the human behavior category, living,<br />

playing and working seem similar to life/health, leisure and<br />

economy, respectively, in urban activities. Actually, these<br />

similarities were found in the classification of U-services as well.<br />

In the medium category of “service objectives” with three small<br />

categories (i.e., life support, activity support and industrial<br />

support) thereunder, life support and activity support can be<br />

considered as corresponding to life/health and economy,<br />

respectively, in the urban activities category, and likewise they are<br />

also similar to living and working, respectively, in the human<br />

behavior category. Consequently, there are semantic overlaps not<br />

only between the three medium categories of service objectives,<br />

urban activities and human behavior under the large category of<br />

“functional elements” but between their subcategories as well. A<br />

solution to this overlapping problem is to develop different types<br />

of medium categories or provide small categories directly under<br />

the large category of “functions.” More studies will be needed on<br />

the way to improve the classification of functions by removing<br />

overlaps from small categories [Supplementary table 1].<br />

3.3 Analysis Results<br />

The present study analyzed a U-service typology empirically<br />

through the categorization of U-services. In light of the study<br />

findings, we can assume that Jeong’s U-service typology is high in<br />

exhaustiveness and empirical workability and low in mutual<br />

exclusiveness, parsimony and theoretical fruitfulness.<br />

1) Exhaustiveness: Unlike the previous studies which analyzed<br />

services from a single or two points of view, Jeong attempted<br />

to explain his typology from nine different points of view. In<br />

the process of analyzing 228 unit services, his typology<br />

covered all the services as classified. These facts indicate that<br />

Jeong’s typology is highly exhaustive.<br />

2) Mutual exclusiveness: Even though Jeong’s typology<br />

satisfies the condition of exhaustiveness, it is difficult to say<br />

that it is faithful to the principle of mutual exclusiveness,<br />

because of cases where a single unit service falls under more<br />

than one category simultaneously. Emergency medical<br />

service and U-ski service can be taken as examples of this.<br />

Emergency medical service is to give first aid to a patient<br />

while he/she is being carried in an ambulance, reviewing<br />

patient data with a doctor in hospital. U-ski service helps<br />

users to use ski equipment rentals and lifts conveniently and<br />

provides supports for skiers to monitor their movements and<br />

routes in play and check their achievement records. In this<br />

Table 2. Relevance of Jeong’s classification<br />

3)<br />

study, both of the two services were thought to take not only<br />

a form of life support—for example, making life more<br />

convenient or helping the ambulance crew save a patient’s<br />

life—but also a form of activity support—for example,<br />

helping skiers improve their performance. As a result, they<br />

overlapped between two different areas.<br />

Parsimony: Jeong’s typology consists of 9 medium categories<br />

and 34 small categories. It was a good attempt to try to cover<br />

all possible things on a categorical basis, but his typology is<br />

bad in terms of parsimony because it involves too many<br />

subdivision levels and thus takes a very complicated form.<br />

This low parsimony is also associated with overlaps between<br />

medium categories founded in the empirical analysis. It<br />

should be noted that it is somewhat inevitable to sacrifice<br />

parsimony for comprehensiveness and practicability, but if<br />

any typology does not maintain a certain level of parsimony,<br />

it may end up just enumerating or listing things, not<br />

analyzing them as intended.<br />

4) Empirical workability: This is that operations for<br />

5)<br />

measurement should be possible at acceptable level. Some of<br />

classification criteria were found unclear or ambiguous, but<br />

experts who participated in this study showed consensus in<br />

85.5% of the 228 unit services they categorized using the<br />

present typology. This indicates that the system has high<br />

empirical workability. In general, empirical workability is<br />

low in social science studies as abstract concepts are used,<br />

but Jeong’s typology ensures high empirical workability<br />

because his suggested classification criteria are based on<br />

substantial concepts.<br />

Theoretical fruitfulness: The primary purpose of developing a<br />

classification model is to discover a certain pattern and<br />

regularity from real-world information which appears messed<br />

up, scattered and diverse. In this sense, theoretical<br />

fruitfulness is an important principle for evaluating a<br />

classification model. In view of the current level of<br />

contribution, the U-service typology used in this study seems<br />

limited as it just takes a combination of other typology rather<br />

than advances a new theory. This limitation resulted in a<br />

preponderance of certain categories in the empirical analysis.<br />

For example, in the service classification by urban activities,<br />

the “security/safety” category represented 95% of<br />

transportation services, 100% of crime/disaster prevention<br />

services and 93% of facility management services; and the<br />

“leisure” category included 94% of culture, tourism and<br />

sports services. In short, the services were unevenly<br />

distributed among given categories, like a set of services<br />

entirely belonging to a single category. This indicates that the<br />

present typology failed to play its role properly.<br />

Summarizing all the findings above together, relevance of Jeong’s<br />

typology can be described as shown in Table 3.<br />

Exhaustiveness Mutual exclusiveness Parsimony Empirical workability Theoretical fruitfulness<br />

Suitability + - - + -<br />

282


Fig. 1 Spatial Unit<br />

Fig. 3. By whom<br />

Fig. 5. Objectives<br />

Fig. 7. Behaviour<br />

Table 3. Service Classification Results<br />

283<br />

Fig. 2 Spatial facilities<br />

Fig. 4. For whom<br />

Fig. 6. Activities<br />

Fig. 8. Commonality


4. CONCLUSION<br />

This study empirically evaluated the appropriateness of a Uservice<br />

typology by applying 228 unit U-services to Jeong’s<br />

typology for the categorization of the services. As compared to the<br />

previous studies of u-service typologies which regarded it as<br />

meaningful to develop a theoretical framework for classification<br />

of U-services, it is important to note that this study found the<br />

problems with the present typology via empirical heuristic<br />

application and identified problem areas. Jeong’s typology was<br />

found to have high exhaustiveness and empirical workability when<br />

the system was analyzed from empirical and theoretical points of<br />

view. Since u-services are variable according to service categories,<br />

they can be newly developed or combined when the needs for<br />

them increase in future with technological or environmental<br />

changes. The high empirical workability of the typology used in<br />

this study can be explained by the fact that there was a consensus<br />

of 85.5% among experts in U-services when they categorized the<br />

services using the typology. High empirical workability helps<br />

reduce confusion in a process of service development as it allows<br />

U-services to be accurately classified. The results from an<br />

empirical analysis suggest that the classification criteria should be<br />

defined more clearly so that empirical workability is enhanced.<br />

However, Jeong’s U-service typology needs to be improved in<br />

terms of mutual exclusiveness, parsimony and theoretical<br />

fruitfulness. Such typology provides a foundation in building a U-<br />

Eco City and must be organized for extension to broadband<br />

services. This study is significant in that it attempted empirical and<br />

theoretical analyses of a U-service typology and came up with<br />

ways to evaluate and improve the typology, but on the other hand<br />

its research methodology was limited to qualitative approaches. In<br />

order to recover this limitation, future studies will need to build an<br />

improved typology through a quantitative analysis of contents.<br />

5. ACKNOWLEDGMENTS<br />

This work was partially supported by Office of Research Affairs<br />

(2010-7-0571) at Yonsei University, Seoul, Republic of Korea.<br />

Authors also appreciate help and support of Ms. Hahyun Kim and<br />

Dr. Minjung Lee in preliminary analysis of this study.<br />

This research was partially supported by a grant (07High Tech<br />

A01) from High tech Urban Development Program funded by<br />

Ministry of Land, Transportation and Maritime Affairs of Korean<br />

Government. Preliminary results of this study have been reported,<br />

in Korean, in the Journal of Korean Society of IT Services, 11(1),<br />

pp. 325-340, in March 2012.<br />

6. REFERENCES<br />

[1] Ministry of Land, Transport and Maritime Affairs, U-Space<br />

Construction Technology, 2010<br />

[2] H.J. Woo, J.H. Lee, S.Y. Park, "Proposing User-Oriented u-<br />

Service Classification by Ubiquitous Characteristic", Journal<br />

of the Korea Society of IT Services, V.10 N.2, pp.119~139,<br />

2011<br />

284<br />

[3] H. J. Roh, "Analysis on the u-City Conceptual Design Factors<br />

from Ubiquitous Computing Technology", Master Thesis,<br />

Yonsei University, 2005<br />

[4] J. C. Kwon, "A study on Law and Institution environment for<br />

Development of U-city", National Information Society<br />

Agency (http://www.nia.or.kr/), 2006<br />

[5] H. M. Oh, A study on Service Convergence Roadmap for<br />

Ubiquitous Environment, National Information Society<br />

Agency (http://www.nia.or.kr/), 2006<br />

[6] K. S. Jeong, T. H. Moon, S. Y. Heo, "A Study on U-City<br />

Service Classification and the Service Framework for the<br />

Standardization of U-City Service", Korea Planners<br />

Association ,V.44, N.3, 2009<br />

[7] Gu Kim, "A study on U-City service priorities and the spread<br />

strategy", JOURNAL OF KOREAN ASSOCIATION FOR<br />

REGIONAL INFORMATION SOCIETY, V11 No. 1, pp<br />

127-148, 2008<br />

[8] S. J. Ahn, D. H. Oh, "A Study on the Classification Criteria<br />

of U-city based on the Characteristics of U-city Services",<br />

Journal of The Korean Urban Management Association v.23<br />

n.3, 2010<br />

[9] W. S. Jeong, B. S. Cho, "A Study on Priorities of u-City<br />

Services Using Weighted Model", Korea Spatial Planning<br />

Review, V52 N.3,pp 93-214, 2007<br />

[10] J.I. Oh, "Concept, Vision, and Vitalization Strategies of U-<br />

City", Journal of the Korean Information Science Sociaty,<br />

V.23. N.11, pp 21-26, 2005<br />

[11] J.G. Lee, H.S. Uk, "A Study on the diffusion and<br />

advancement of U-city service model", National Information<br />

Society Agency(http://www.nia.or.kr), 2006<br />

[12] C.S. Leem, E.J. Yu, B.G. Kim, N.S. Baek, Y.D. Son, "u-City<br />

PIPE Model", ITR report, IT Research & evaluation, 2008<br />

[13] Y. H. Chun, "The Diversity of Policy Tolls: Issues and<br />

Evaluations of Tool Classifications", Journal of<br />

Governmental Studies, V.13 N.4, pp. 1-37, 2007<br />

[14] K.S. Jeong, T.H. Moon, S.Y. Heo, "A Study on U-service<br />

Pool Evaluation and SRM Template for Development of U-<br />

City SRM", korea Planners Association, V.45 N.13, 2010<br />

[15] W.S. Jeong, B.S. Jo, H.S. Jo, “U-City Industry and Service<br />

Classification Trends”, Korea Electronics Technology<br />

Institute, http://www.eic.re.kr, 2006.08,<br />

[16] Yong-Sik Lee, "Policy Instrument Typology and<br />

Applicationon Sports for All Policy , Korea Sport Science<br />

Institute, Korean Journal of Sport Science, , Vol. 21, No. 3,<br />

1431-1440 2010.<br />

[17] J.W. Lee, S.H. Baik, C.H. Lee, "Building an Integrated<br />

Service Management Platform for Ubiquitous Ecological<br />

Cities", IEEE Computer Society, pp.56-63, 2011


SUPPLEMENTARY TABLE 1. RESULT OF SERVICE CLASSIFICATION<br />

Space<br />

Human<br />

Functions<br />

By spatial unit<br />

By function<br />

By whom<br />

For whom<br />

For what<br />

Activities<br />

Behavior<br />

C/S<br />

Domain<br />

Administration<br />

Traffic<br />

Health & welfare<br />

Environment<br />

Crime & Prevention<br />

Building 2 0 8 1 3 2 6 7 7 7 9 52<br />

Street 5 0 0 0 0 1 0 0 0 0 4 10<br />

District 1 0 3 1 1 0 0 0 2 0 0 8<br />

Facility 2 8 2 3 2 8 3 4 0 0 3 35<br />

City 7 22 12 7 9 1 6 3 2 4 1 74<br />

broadband 0 12 3 5 6 2 2 4 9 6 0 49<br />

Information media 11 13 19 8 6 1 9 4 9 10 4 94<br />

Spatial unit control 3 10 6 5 3 11 4 8 7 7 11 75<br />

Community management<br />

facility<br />

Facilities<br />

Management<br />

0 0 2 0 0 0 4 4 0 1 2 13<br />

Integrated control center 1 19 1 6 12 2 0 2 4 1 0 48<br />

Public 14 29 8 16 20 13 1 11 0 2 4 118<br />

Private 0 4 10 0 0 0 1 4 19 7 7 52<br />

Public-private partnership 1 9 10 3 1 1 15 3 1 8 6 58<br />

Public Agencies 8 3 1 11 12 10 0 2 0 0 0 47<br />

Citizens 7 39 22 8 9 3 17 16 6 6 16 149<br />

Businesses 0 2 5 0 1 1 0 0 14 11 1 35<br />

Life support 7 31 20 10 8 5 16 16 4 2 15 134<br />

Business support 8 11 9 9 13 9 1 3 12 11 2 88<br />

Industrial support 0 0 0 0 0 0 0 0 4 4 0 8<br />

Healthy living 0 1 16 14 0 0 0 0 0 0 4 35<br />

Security and safety 3 40 3 1 21 13 0 0 0 2 2 85<br />

Community service 11 1 9 2 0 0 0 0 0 0 4 27<br />

Education 0 0 0 0 0 0 16 1 0 1 0 18<br />

Economy 1 0 0 1 0 1 1 1 17 14 0 36<br />

Leisure and culture 0 0 0 1 0 0 0 17 3 0 7 28<br />

Living 0 1 17 3 13 3 1 1 0 0 5 44<br />

Working 15 7 10 15 8 11 16 3 19 17 4 125<br />

Moving 0 34 0 0 0 0 0 0 0 0 0 34<br />

Playing 0 0 1 1 0 0 0 15 1 0 6 24<br />

Cybering 0 0 0 0 0 0 0 0 0 0 2 2<br />

Common services 15 29 9 15 17 10 5 0 1 5 0 106<br />

Specialized services 0 13 19 4 4 4 17 13 19 12 17 119<br />

285<br />

Education<br />

Tourism & Sports<br />

Logistics<br />

Labor & Employ<br />

Other<br />

Service total<br />

Total<br />

228<br />

230<br />

228<br />

231<br />

230<br />

229<br />

231<br />

228


286


Explaining the eGovernment Paradox:<br />

An analysis of two decades of evidence from scientific<br />

literature and practice on barriers to eGovernment<br />

Alberto Savoldelli<br />

Independent Consultant<br />

C/ Via Piolti de Bianchi, 48, Milan, Italy<br />

+39 335 1309287<br />

savoldellia@gmail.com<br />

ABSTRACT<br />

Despite the plethora of research, policy analysis and practice<br />

works produced in the last two decades for explaining the<br />

potential of eGovernment and its impact on society, there is still<br />

very limited evidence that the promised productivity gains have<br />

been achieved. To date, its potential remains hypothetical. This<br />

eGovernment paradox contrasts the level of investments with the<br />

little impact produced and/or demonstrated so far. In this paper we<br />

attempt to provide an interpretation of this paradox, looking<br />

specifically at the sharp mismatch between the supply of online<br />

public services (deployment) and their usage (adoption), which<br />

we define as the “Adoption paradox”. The paper on the bases of a<br />

systematic review of the adoption barriers uncovered by almost<br />

twenty years of scientific and practitioner-generated analysis and<br />

evidence, rises the conclusions that, in most mature governments,<br />

the key barriers to real take up of eGovernment are those related<br />

to the lack of both a structured policy evaluation process and an<br />

effective stakeholders' engagement. The paper suggests that the<br />

critical success factor for eGovernment adoption is a transparent<br />

and trustworthy policy decision making process and that its key<br />

prerequisite is the definition and implementation of a well<br />

organized and fully participatory evaluation framework.<br />

Categories and Subject Descriptors<br />

J4 Social and behavioural sciences; K.4 Computers and Society;<br />

K.6 Management of Computers and Information Systems<br />

General Terms<br />

Management, Measurement, Performance, Economics,<br />

Evaluation.<br />

Keywords<br />

eGovernment adoption, Barriers, Drivers, Participation, Trust,<br />

Public Value, Policy Making, Digital Society<br />

1. INTRODUCTION<br />

We are now well into the second decade of Information and<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Cristiano Codagnone<br />

Milan State University<br />

Via Conservatorio, 7, Milan, Italy<br />

+39 02 50321247<br />

cristiano.codagnone@unimi.it<br />

287<br />

Gianluca Misuraca<br />

European Commission, JRC-IPTS<br />

C/ Inca Garcilaso, 3, Seville, Spain<br />

+34 954 480 572<br />

gianluca.misuraca@ec.europa.eu<br />

Communication Technology (ICT) usage in public administration<br />

service delivery. First evidence of this can be found in the<br />

“reinventing government” movement launched in 1992-1993<br />

through the well-known writing of Osborne & Gablear [1-2]. As a<br />

result, a large body of inter-disciplinary scientific literature has<br />

accumulated and been critically reviewed [2-6]. Alongside this<br />

scientific literature, there is also a growing body of institutional<br />

and policy-oriented reports [7-12] and of practitioner-generated<br />

analysis, case studies, and measurement efforts [13-27].<br />

As yet, however, there is very limited evidence that these gains<br />

have been achieved and eGovernment’s potential remains<br />

hypothetical [7]; [13]; [14]; [28]; [29]. Not surprisingly, some<br />

authors have started to talk about the “eGovernment Paradox”<br />

[30]; [31]. This follows the more famous “IT Productivity<br />

Paradox” summarised in Robert Solow’s quip that “you can see<br />

computers everywhere but in the productivity statistics” [32];<br />

[33].<br />

It was not until the mid '90s that the large investments made by<br />

firms into ICT produced productivity gains. The reasons for this<br />

paradox were mainly: a) measurement error (input and output not<br />

properly measured); b) lag time (ICT take time before having an<br />

effect); c) redistribution of profit (the effect can be positive for<br />

some and negative for others leading to a zero sum where no<br />

aggregate effect can be demonstrated); d) mismanagement of ICT<br />

(ineffective deployment not matching ICT with complementary<br />

initiatives such as re-organisation).<br />

In the case of eGovernment, the paradox can be seen in the<br />

contrast between the level of investments and the little impact<br />

produced and/or demonstrated so far [30]. It may also be due to<br />

the fact that delivering citizen-centric eGovernment does not<br />

necessarily reduce costs [29]; [34]. Our view is that the most<br />

evident and straightforward “eGovernment Paradox” is the sharp<br />

mismatch between the supply of online public services<br />

(deployment) and their usage (adoption). In Europe, for instance,<br />

the traditional benchmarking of eGovernment services shows that<br />

supply has reached saturation for most common online services in<br />

a majority of countries [14]. Yet, citizens (and to a lesser extent<br />

companies) are still more likely to use traditional methods (e.g.,<br />

phone calls or in-person visits) than the Web to interact with the<br />

government [14]; [35].<br />

For Europe, a simple description (both longitudinal and crosssectional)<br />

of eGovernment benchmarking data and a look at<br />

Eurostat statistics about usage of eGovernment services clearly<br />

show this mismatch, The supply-side index stands at 70% on<br />

average and the average usage percentage is below 30% of the


adult population. A recent more sophisticated statistical analysis<br />

of this data concluded that there is no statistically significant<br />

correlation between the level of supply of eGovernment services<br />

and the level of usage [29]; [36]. The “Adoption Paradox”<br />

encompasses, in our view, several of the reasons cited by the<br />

authors who introduced the concept of the “eGovernment<br />

Paradox” and those who explained the more famous “IT<br />

Productivity Paradox”. It is almost self-explanatory that if<br />

adoption does not reach significant levels then the financial<br />

resources invested in eGovernment simply creates a stratification<br />

of costs and no benefits, either internal or external (as was the<br />

case at the beginning of Internet banking). So, it is strategic to<br />

investigate in depth the reasons for non-adoption, as they will<br />

include related issues such as the lack of restructuring of policy<br />

making and implementation processes, measurement problems, all<br />

of which explain the excessive time lag between the<br />

implementation of eGovernment and the delivery of its promises.<br />

In Section 2, we illustrate the method and conceptualisation used<br />

and in Section 3 we report the results of the systematic analysis of<br />

the adoption barriers uncovered by about twenty years of<br />

scientific and practitioner-generated analysis and evidence. In<br />

Section 4, we discuss in depth the key findings of our analysis.<br />

These show that in the most mature public administrations, the<br />

key barriers to a real take up of eGovernment are those related to<br />

the lack of a structured policy evaluation process and a lack of<br />

stakeholders' participation in the decision making process. Finally,<br />

Section 5 offers the conclusions and directions for future research.<br />

2. METHOD AND CONCEPTUALISATION<br />

The systematic and diachronic analysis of eGovernment adoption<br />

barriers is based on an extensive literature review of a wide range<br />

of scientific journals and papers published in the last two decades,<br />

as well as practitioner-generated analysis 1 . The results of the<br />

literature review have been classified by re-elaborating the model<br />

proposed in [37], to which we have added one more dimension of<br />

analysis that we have called “Political/Institutional”. This has<br />

been done in order to highlight specific barriers related to the<br />

public policy management process. In order to make the results of<br />

our analysis more intelligible and also actionable in terms of<br />

future redesign of the eGovernment policy design and<br />

implementation processes, we have further developed from the<br />

original and well known work of Layne & Lee, [38, further<br />

improved by Andersen [39] in 2006], our own version of the<br />

Maturity Model (MM) against which the barriers have been<br />

mapped. This re-elaboration integrated the original model with<br />

key characteristics of eGovernment that have been identified by<br />

several scholars in literature [6]; [13]; [16]; [18]; [40]; [41]; [42];<br />

[43]. Our conceptualisation of the MM is illustrated in Figure 1<br />

and it is explained here below. It must be stressed that this model<br />

is a hybrid conceptual mix of empirical and prescriptive elements<br />

in that the later stages of the model are based on very rare best<br />

practices rather than widely observed empirical experiments.<br />

The Maturity Model has two conceptual dimensions:<br />

• Process orientation. This dimension is defined as a<br />

combination of the following variables: a) level of<br />

1 The literature review includes journals such as Government Information<br />

Quarterly; Strategic Information Systems; Business Process Management<br />

Journal; Journal of Global Information Management; Information Polity;<br />

International Journal of Public Sector Management; International<br />

Journal of Public Information System; Public Administration Review).<br />

288<br />

integration within each single public administration [42]; b)<br />

level of integration across public administrations, in jargon<br />

“joined-up government” [40]; [42]; [44]; and c) degree of<br />

processes’ outcomes orientation [16].<br />

• Citizens centricity. This dimension is defined as a<br />

combination of the following variables: a) degree of civil<br />

servants acceptance of, and support to, eGovernment [45];<br />

and b) level of citizen involvement in eGovernment services<br />

design and development [18]; [46]; [47].<br />

Figure 1 – eGovernment Maturity Model Source: Authors<br />

elaboration on [38]; [39].<br />

In the space defined by the two axes, as illustrated in Figure 1, the<br />

Maturity Model is shaped by two key drivers:<br />

• People and Organization driver. This driver concerns: a)<br />

the depth of the cultural changes in relation to eGovernment<br />

both inside the administration and among citizens; and b) the<br />

level of digital divide within which eGovernment is<br />

embedded.<br />

• Technology and Information driver. It helps to determine<br />

which technological stage has been achieved by a given<br />

public organization and the level of integration and openness<br />

of public information and data to civil servants and citizens.<br />

As a result of combining the two dimensions and the two drivers,<br />

the following six stages of maturity can be identified:<br />

• Stage 1 – Web presence through a simple online<br />

transposition of administrative processes without a clear<br />

orientation to outcomes. Typical eGovernment initiatives at<br />

this stage focus on infrastructural projects aimed at bundling<br />

the territory with ICT networks.<br />

• Stage 2 – Communication backbones are laid down and wide<br />

local area networks are completed. At this stage integration<br />

initiatives at both organizational and technological level are<br />

promoted within (among departments) and across public<br />

administrations.<br />

• Stage 3 – At this stage, transaction services are deployed<br />

together with privacy and security solutions to support these<br />

transactions. Dematerialization initiatives are largely adopted<br />

together with significant back office simplification.<br />

Management changes are introduced inside public<br />

administrations. Civil servants’ and public managers’<br />

performance evaluation is largely based upon their capability<br />

to achieve simplification targets.<br />

• Stage 4 – Outcome-oriented processes are widely<br />

implemented thanks to ICT adoption. Actions aimed at<br />

reducing digital divide and stimulating adoption of


eGovernment services to a large extent of the population are<br />

also deployed. Some significant examples of information,<br />

data sharing and data integration among public organizations<br />

are also evident. Measurement systems of public values of<br />

eGovernment services are significantly implemented even if<br />

not fully integrated with policy decision-making processes.<br />

The evaluation of public administration managers is largely<br />

based on their capability to achieve outcome related<br />

objectives.<br />

• Stage 5 – A large extent of data and information are made<br />

available for all and some significant business initiatives<br />

based upon public sector information usage are in place.<br />

Cloud computing infrastructures and cloud repositories for<br />

public administrations data are also largely available and<br />

empowering actions aimed at stimulating citizens and civil<br />

servants towards ICT and eco-sustainability of eGovernment<br />

services are conducted. Measurement systems are fully<br />

implemented and linked with policy decision making<br />

processes.<br />

• Stage 6 – ICT is not anymore a barrier to the take up of<br />

eGovernment services and the behaviour for continuous<br />

improvement is pervasive in public administration also<br />

unleashing social innovation [48] is widely diffuse in<br />

designing and developing public services.<br />

It is clear that the MM applied to eGovernment is not independent<br />

from the broader level of maturity of the Digital Society [49]<br />

within which eGovernment deployment and adoption is embedded<br />

[29]. Yet, the process of digital maturation of a given society or<br />

local community is never as linear as the MM would suggest [6];<br />

[50]; [51]; [52]. Therefore for a long-term sustainability of<br />

eGovernment services we have also to understand the needed<br />

efforts that each public administration has to make for reaching<br />

the required level of maturity suitable for deploying and rollingout<br />

a given eGovernment product/service and, then, supporting its<br />

effective adoption and long-term sustainability [29]; [52].<br />

However in most mature administrations neither the level of<br />

digital divide nor the lack of ICT infrastructures seem to be<br />

among the most constraining barriers to eGovernment adoption. It<br />

is rather the lack of a structured and trustworthy decision making<br />

process, effectively involving citizens and stakeholders that slow<br />

down adoption, which in turn weaken the capability to effectively<br />

and timely absorb and use public funds [53]. In this respect the<br />

lack of formal methods for managing and monitoring<br />

eGovernment initiatives further compound the challenges of<br />

successful adoption of eGovernment services [37 - 54]. These<br />

barriers are more and more evident at local level [4], where there<br />

is still an high variance in performances as commented for<br />

instance in [14]; [55]. At the same time the local government<br />

represents the most favourable ground for enhancing citizen<br />

centred eGovernment services with a real engagement of<br />

stakeholders and beneficiaries and an effective empowerment of<br />

the local community [13]; [19]; [43]; [47]; [56], [57] as discussed<br />

in the next chapters.<br />

3. RESULTS<br />

In this section we first apply a synchronic perspective to better<br />

interpret the evolution of adoption barriers and then extract the<br />

key lessons learned. The synchronic perspective we adopted,<br />

foresees the following three periods of implementation of<br />

eGovernment: 1994-2004; 2005-2009; 2010-2012. The choice of<br />

analysing time periods that have different length is due to the need<br />

289<br />

of observing the eGovernment phenomenon of mature public<br />

administrations in their evolutionary pathways that were quite<br />

slow at the beginning as mainly related to deployment of ICT<br />

infrastructures and awareness actions (see MM in Figure 1) and<br />

faster as much as the pathways were related to deployment and<br />

take-up of eGovernment services:<br />

• 1994-2004: this period ranges from the start-up of the<br />

“reinventing government” [1]; [2]; movement, to the first<br />

review of the Lisbon Strategy [58] launched by the European<br />

Union in the year 2000 with the aim to promote ICT in all<br />

competitive domains, including public administration. The<br />

optimistic view on ICT performance and the Internet<br />

diffusion has led to emphasize the lack of telecommunication<br />

infrastructures [8] and their communication capacity [38] as<br />

key barriers to eGovernment adoption. Both of which in turn<br />

have been associated to the lack of institutional support and<br />

standards [8] as a source of “Political/Institutional” barrier.<br />

The concept of “trust in eServices usage by citizens” is often<br />

associated with the concept of “security in transactions”<br />

and “trust in government in preserving personal data<br />

privacy, once the citizens provided them for using an<br />

eService” [38]; [59]. “Managerial/Organizational” barriers<br />

were also important to overcome with particular reference to<br />

“shortage of ICT skills” in public administration [41], while<br />

[8] sees as important barriers the “information<br />

mismanagement and reluctance to share information among<br />

departments”.<br />

• 2005-2009: the period of implementation of the i2010<br />

strategy in the European Union [60]. ICT infrastructural<br />

problems are still considered relevant and in particular<br />

operational costs and maintenance of eGovernment systems<br />

are considered as crucial obstacle [4]; [9]; [20]; [40]; [44],<br />

especially at the local level where the lack of financial<br />

resources is more evident [4]; [9]; [42]; [55]. Technological<br />

and operational barriers are still mentioned, and the most<br />

noteworthy are the “lack of integration across government<br />

systems”, the “lack of knowledge regarding eGovernment<br />

interoperability”, together with the “lack of citizens’ trust<br />

about eGovernment services privacy and security”. Lack of<br />

ICT skills in governmental organization and lack of<br />

cooperation amongst departments together with resistance to<br />

change of the civil servants are also still mentioned [4]; [9];<br />

[40]; [42]; [43]. During this period, however, the most<br />

important barriers affecting eGovernment adoption are the<br />

lack of “evaluation and measurement of eGovernment<br />

services” [4]; [10]; [39], the “difficulties in establishing a<br />

firm connection between ICT innovation, benefits and<br />

outcomes” [3]; [9] and the “digital divide” [9]. Even if still in<br />

embryonic terms, during this period start to be considerd<br />

important barriers the “lack of demand side involvement in<br />

the eGovernment decision making process” [10], the “lack of<br />

trust on government and on government reform” [45] and the<br />

“cost of the services for the users and their perception of<br />

benefits” [4]; [62]; [63], together with the “lack of<br />

eGovernent policy framework that can be applied at local<br />

level” [4]; [42].<br />

• 2010-2012: this period starts from the launch of the so called:<br />

“Digital Agenda for Europe” [66] until today. Most recently<br />

the “political/institutional” barriers have been seemingly<br />

singled out as the most important obstacle for the full take up<br />

of eGovernment services, with particular reference to “lack


of citizens' participation to the policy making process” and<br />

“lack of measurement system on eGovernment process<br />

performances and outcomes” [7]; [51]; [64]; [65]. According<br />

to the authors discussing them, these barriers have the side<br />

effects of producing a “lack of transparency and trust on<br />

political decisions” [64]; [65]; [66], together with a “lack of<br />

trust and empowerment of the citizens” [13]. Such authors<br />

suggest a possible way for overcoming these barriers by both<br />

tackling the “lack of eGovernment policy framework that can<br />

be applied at local level” [14] and the “lack of formal<br />

methods for supporting eGovernment decision making<br />

process” [5]; [52]; [53]; [65]; [67]. An initial attemp of<br />

analising barriers related to the “lack of sustainability of<br />

eGovernment initiatives” is presented in [51]. At the same<br />

time “technological/operational” barriers seem less<br />

important for the scientific community except for the “lack of<br />

open sources and open data standards” [67] and the<br />

“shortage of financial resources in public sector<br />

organizations” [14]; while the “managerial/organizational”<br />

barriers are considered still important with particular<br />

reference to the behaviour of policy makers and civil servants<br />

in supporting actions enhancing trustworthiness of the<br />

citizens, by reducing “lack of trust in the government<br />

willingness to allow citizens to have their say if their views<br />

contradict official policy”, “lack of transparency and trust in<br />

government” and “lack of personalized and secure services”<br />

[18].<br />

In coherence with the MM (Figure 1), if we make a cross-analysis<br />

of the evolution of the barriers to eGovernment, we can say that in<br />

the last twenty years for the most mature public administrations,<br />

the technological barriers have been significantly reduced but<br />

eGovernment services adoption is far to be effective and there is<br />

no clear evidence of which benefits ICT offer to citizens. This<br />

situation is not so different from what private organizations met at<br />

the early stages of ICT introduction - between the ’80s and the<br />

’90s - where ICT has produced significant expectations. Also in<br />

the private sector at the very beginning of the technological<br />

revolution, ICT possibilities were overestimated [68], and the<br />

“manifesto” of Hammer and Champy [69] in 1993 was considered<br />

the ultimate solution for improving performance and<br />

competitiveness in any private organization. Just few years later<br />

(see [51]; amongst several other authors) ICT assumed the role of<br />

enabling factor for supporting organisational changes and<br />

business process integration [70], and the role of both “change<br />

management” and “customer satisfaction” became central for<br />

competitiveness. No more than fifteen years later similar ICT<br />

adoption pathways and pit-falls have been followed by the public<br />

sector, unfortunately without learning too much from mistakes<br />

and failed experiences occurred in the past in the private sector<br />

[42]; [45]. An evidence of such argumentation can be found by a<br />

comparison of the position papers that Accenture has written on<br />

eGovernment services adoption at the beginnings of the years<br />

2000 and what the same organization has recently considered as<br />

the best approach to the take up of eGovernment services. In the<br />

Accenture’s position paper of 2001 “multichannel delivery and<br />

CRM” were identified as “the key issues government had to<br />

consider to improve the level of online services provided to<br />

citizens and business” [15]; ten years later the same organization<br />

recognized that “only cultural changes in public sector workers<br />

and collaborative learning between citizens and civil servants,<br />

together with ICT as enabling factors, could support an effective<br />

eGovernment adoption” [21]. Therefore it seems now evident that<br />

290<br />

eGovernment adoption in mature public administrations is<br />

affected by the lack of trust on both government behaviour and on<br />

possible misuse of digital information provided by citizens to civil<br />

servants. These two aspects of the problem are more related to the<br />

stakeholders’ and citizens’ perception of the policy making<br />

process and their expectation on eGovernment services [28]; [71].<br />

As Van de Walle [54] says: “achieving good performances in<br />

public services by governments is only a partial way to achieve<br />

citizens satisfaction and to improve trust in government”, only a<br />

transparent and participative policy making process can close the<br />

gap [10]; [47]; [65], as shown in Figure 2, where only a well<br />

structured policy planning process fully integrated with a<br />

performance management system and truly participated by<br />

stakeholders and citizens, can support a wide adoption of<br />

eGovernment services and creating a well established Digital<br />

Society.<br />

But, what does it mean “better Policy Planning Process”? Which<br />

are its key components? Which are main barriers to its adoption<br />

and which are the real benefits gained by its use in public<br />

governance?<br />

Possible answers to these questions are discussed in the following<br />

section, where we have gone deeper in understanding the<br />

meanings and usefulness of Policy Planning Process in<br />

eGovernment adoption.<br />

Figure 2 – eGovernment services adoption virtuous cycle<br />

4. DISCUSSION<br />

From the findings of our review as presented in the previous<br />

section we identified the Policy Planning Process as the core area<br />

where public administrations must make improvements in order to<br />

support eGovernment adoption and the overall development of the<br />

Digital Society. In this section we go a step further discussing key<br />

barriers that hinder an efficient and effective Policy Planning<br />

Process. Before doing that we have to define such process and its<br />

main components.<br />

The Policy planning process. As Heeks [10] says: “Policy<br />

Planning Process has a circular lifecycle”. It starts from needs<br />

arising from the community where the policy makers have been<br />

elected and it follows several stages that describes a policy cycle<br />

as shown in Figure 3, that we have adapted from [10]; [72].<br />

• Step 1 – Policy Strategy Formulation. It is the key step<br />

because it provides motivations and justifications of why a<br />

certain Policy Programme has to be implemented.<br />

Unfortunately, policy makers often begin to formulate a


policy agenda, as Heeks [10] says, based on “poor<br />

comparative benchmark performances” and “scarcely<br />

quantified good news/benefits” of previous eGovernment<br />

initiatives done by the same administration and/or others in<br />

previous Policy cycles. Lack of impact evaluation of past<br />

policies [4]; [39] is certainly one of the main reasons<br />

justifying difficulties of policy makers in defining correct<br />

long-term strategic plans. Another negative effect of lack of<br />

impacts evaluation of past policies is the scarce public<br />

confidence in the results of policy decisions. Citizens<br />

perceive this as lack of transparency of Policy Planning<br />

Process, thus the distance between policy makers and civil<br />

servants on one side and citizens on the other increases [29];<br />

[57]; [65]. In this regard, it is common opinion among<br />

several authors [10]; [13]; [42]; [47] that Policies have<br />

serious difficulties in being adopted without an effective<br />

engagement of beneficiaries and stakeholders since the very<br />

beginning of the Policy Planning Process.<br />

• Step 2 – Policy Guidelines Definition and Approval,<br />

where Policy makers define the strategic objectives of their<br />

policy agenda. To be effective, these objectives, more<br />

commonly called “Outcomes” [6], should be based upon<br />

both citizens’ expectations and needs of stakeholders and<br />

beneficiaries. Unfortunately, often policy makers and public<br />

managers have serious difficulties in linking decisions on<br />

policy strategy (Step1), with outcomes definition (Step 2)<br />

[3]; [9]. On the contrary this link is very powerful for Public<br />

Administrations. Once more this problem is due to a Policy<br />

Planning Process scarcely supported by quantified data and<br />

information on previous policy impacts [21]; [42]. The<br />

consequence of this lack of information is that Policy Plans<br />

are driven by contingencies and constraints, rather than midlong<br />

term strategy and well grounded digital policy.<br />

• Step 3 – Policy Implementation Plan Design and<br />

Approval. Public managers, together with stakeholders,<br />

produce an Implementation Plan of possible eGovernment<br />

initiatives that should be coherent with Policy Guidelines<br />

defined in “Step 2”. Usually such initiatives take the form of<br />

a “Project Idea”, subjected to budget constraints and targeted<br />

project objectives. Often risk assessment actions, together<br />

with possible countermeasures, are also provided at this Step<br />

[11]. The most common problem that usually affects Policy<br />

Implementation Plan design and, then, the success of the<br />

entire Policy Planning Process, is the mismatch between<br />

policy outcomes (as defined in “Step 2”) and project<br />

objectives [12]; [73]. More often civil servants in charge of<br />

Policy Implementation Plan and Stakeholders interested to<br />

promote a given “project idea” are used to describe it in a<br />

quite optimistic way, overestimating challenges and without<br />

considering budget constraints that could reduce the breath of<br />

the project’s impacts. Another important barrier is the lack of<br />

a preventive sustainability assessment of the eGovernment<br />

service to be deployed [46], which quite often mines<br />

eGovernment project's uptaking.<br />

• Step 4 – Policy Implementation through Projects.<br />

eGovernment projects are selected in coherence with the<br />

Implementation Plan and then deployed on the territory<br />

through Projects. Starting from the “project ideas” approved<br />

in the previous “Step 3”, public administrations in charge for<br />

funding the projects launch procurement processes based on<br />

291<br />

technical and administrative specifications. Selected<br />

providers cooperate with beneficiaries and stakeholders for<br />

achieving the expected objectives and for producing the<br />

agreed project’s outputs. Project management capabilities of<br />

Civil servants are required together with good ICT skills and<br />

organizational knowledge [54]; [74]. Once more a key<br />

success factor of this step is the effective involvement of<br />

stakeholders and beneficiaries in project development and<br />

deployment [42]; [67]. To this regard some scholars believe<br />

this involvement would be more effective if anticipated at the<br />

initial stage of Planning Process (“Step 1”), thus citizens’<br />

trust [65] is increased and co-production initiatives [44]; [47]<br />

could have better chances to succeed. More common barriers<br />

are “the resistance to change of the civil servants” [64] and<br />

the “lack of motivation of public managers in sharing and<br />

opening data amongst organization and to the public” [7].<br />

Figure 3, Policy Planning Process Cycle (our elaboration from<br />

Heeks [10].<br />

• Step 5 – Policy and Projects monitoring. This is a<br />

fundamental stage for a successful policy cycle<br />

implementation. Unfortunately, quite often this step mainly<br />

addresses the in-itinere evaluation of on-going eGovernment<br />

initiatives, with a very limited and superficial evaluation of<br />

the outcomes/impacts produced by the policy plan [17]. This<br />

is because eGovernment projects, as all other public<br />

investments, need to demonstrate that the public money<br />

produced the output specified in the legal documents signed<br />

with providers. Usually no specific legal constraints are<br />

agreed between administrations and providers in relation to<br />

impacts on beneficiaries that a given project should obtain.<br />

Moreover, the cost of an effective measurement system of<br />

the impacts of the Policy Plan and the long time frame when<br />

these should be achieved, discourage administrations,<br />

especially local ones, to emphasize this step [7]; [51]. On the<br />

contrary this has to be considered a fundamental step of the<br />

Policy Plan, without which the level of trust between citizens<br />

[65] and Public Administration would be significantly<br />

reduces, further penalising eGovernment adoption.<br />

• Step 6 – Gap Analysis of the Policy Implementation<br />

Plan. This step is aimed at supporting policy makers to move<br />

on to a new cycle, with a new policy based upon key results<br />

of the previous one [10]. However, more often the<br />

importance of this step is underestimated because usually


very poor impact assessment activities are made by public<br />

administrations in the previous “Step 5” [4]; [39].<br />

In theory, policy makers can start policy planning life cycle once a<br />

policy cycle is completed and move on to a new one with new<br />

strategic objectives [10]. In practice this might not happen<br />

because the Policy Planning Process is highly context-dependent<br />

and extremely affected by contingencies and needs that might be<br />

present on the territory and that have a high degree of urgency.<br />

Unfortunately cases from unsuccessful adoption of eGovernment<br />

tell us how difficult it is to define a structured and comprehensive<br />

implementation of such process and its maintenance over time<br />

[60]. Table 2 shows the key barriers to an effective execution of a<br />

Policy Planning Cycle. This is particularly true at the local level<br />

where Policy Makers and Civil Servants are very close to citizens<br />

and stakeholders [13]; [76], and the presence of a well organized<br />

Policy Evaluation Process could produce more direct and<br />

trustworthy effects on eGovernment adoption [4]; [14]; [42]; [55].<br />

Table 2 – Barriers to eGovernment Policy Planning Cycle<br />

execution<br />

eGovernment<br />

Policy<br />

Planning<br />

Cycle<br />

Policy<br />

Strategy<br />

Formulation<br />

Policy<br />

Guidelines<br />

Definition and<br />

Approval<br />

Policy<br />

Implementatio<br />

n Plan (∑ i-n=<br />

Project ideas)<br />

Design and<br />

Approval<br />

Policy<br />

implementatio<br />

n through<br />

Projects<br />

Barriers<br />

• lack of evaluation and measurement of policy<br />

strategy [4]; [39];<br />

• lack of stakeholders and beneficiary involvement<br />

in needs identification [10]; [13]; [43]; [47];<br />

• lack of comprehensiveness and continuity of<br />

policies and programmes [8];<br />

• lack of clear vision [42]; [44];<br />

• lack of exAnte evaluation approach [12];<br />

• lack of a structured evaluation process circle with<br />

an effective engagement of stakeholders and<br />

beneficiaries [22]; [46];<br />

• difficulties in linking policy decision with<br />

outcomes objectives [3]; [9]; [76]<br />

• lack of stakeholders and beneficiary participation<br />

in policy objectives definition [10]; [7]; [43];<br />

• unclear policy management strategy [42]; [44];<br />

• mismatching between policy outcomes (if<br />

•<br />

defined) and project objectives [12]; [74];<br />

project selected on expected outputs and not on<br />

expected outcomes [17];<br />

• lack of stakeholders and beneficiary involvement<br />

in projects design and specification [13]; [43];<br />

[47];<br />

• lack of coordination and/or strategic planning<br />

[8];<br />

• lack of coordination and cooperation between<br />

departments and among administrations [40];<br />

[42]; [44];<br />

• lack of structured risk management procedures<br />

[11];<br />

• lack of stakeholders and beneficiary involvement<br />

in project development [18] [43]; [47]; [54]; [66];<br />

[68];<br />

• lack of project management expertise [54; [74];<br />

• lack of knowledge and skills for assessing the<br />

risk and making contingency plan [7]; [68];<br />

• resistance to change [65];<br />

• Government departments failing to agree and<br />

implement common procedures and standards to<br />

provide shared networked eGovernmnet services<br />

Policy and<br />

Projects<br />

monitoring<br />

and Gap<br />

Analysis<br />

[9];<br />

• Lack of motivation of public managers in sharing<br />

and opening data amongst organization and to<br />

public [7];<br />

• project monitored on achieved outputs and not on<br />

achieved outcomes [17];<br />

• Lack of evaluation and measurement procedure<br />

[4]; [39];<br />

• Lack of measurement system on eGovernment<br />

process performances and outcomes [7]; [52];<br />

[65]; [66];<br />

• Lack of involvement of citizens and stakeholders<br />

in monitoring projects and policies and for<br />

supporting their sustainability [23];<br />

• Lack of transparency of the monitoring process<br />

and its results on project impacts [23]; [66].<br />

5. CONCLUSION AND FUTURE RESEARCH<br />

Our analysis underlines how in the mature government (see the<br />

MM described in Figure 1) technological barriers to eGovernment<br />

adoption have been significantly reduced, but eGovernment<br />

services are far away to be adopted and there are no clear<br />

evidences of which benefits ICT can offer to citizens. Resistance<br />

to change by civil servants and policy makers are now considered<br />

the most important barriers, causing an evident lack of<br />

trustworthiness in the citizens towards political institutions. The<br />

consequences of these barriers is an unstructured and<br />

untrustworthy decision making process, that slow down adoption,<br />

which in turn weaken the capability to effectively and timely<br />

absorb and use public funds.<br />

292<br />

Two fundamental barriers emerge from our study:<br />

� lack of full involvement of stakeholders and beneficiaries<br />

since the very beginning of the Planning Process;<br />

� lack of an evaluation process that should be conducted in<br />

parallel with each step of the Policy Planning Process itself.<br />

This is especially true at the local level that on the contrary might<br />

benefit more thanks to the proximity among Policy decision<br />

makers, civil servants and citizens [14]; [55]; [57]. However as<br />

[65] and [71] clarify, the two key barriers to an effective Policy<br />

Planning Process are not independent from each other, but rather,<br />

they are the two faces of the same coin:<br />

Good Governance implies stakeholders and citizens participation<br />

that cannot be guaranteed without transparency in the decision<br />

making process; high level of transparency cannot be achieved<br />

without a trusted and robust evaluation process.<br />

Figure 4 shows the circularity of both planning and evaluation<br />

processes and their interaction with the stakeholders and<br />

beneficiaries. As described in the figure, the inner circle<br />

represents the Policy Planning Process, while the outer one<br />

describes the Evaluation Process where the ex-Ante evaluation<br />

receives as input the results of the ex-Post evaluation of the<br />

previous Policy Planning Cycle and then, it produces as output the<br />

objectives of the new Policy Planning, that will be subject to both<br />

an in-itinere evaluation and a new ex-Post one. The middle circle<br />

defines the links between the two other circles. The two processes<br />

run in parallel and the key aspect of both is the active involvement<br />

of stakeholders [23]. Moreover the evaluation process that has the<br />

aim to assess the Public Value of a given Policy Strategy, by<br />

measuring the degree of achievement of the Policy


Implementation Plan’s outcomes and the quality 2 of<br />

eGovernment products and services, in the most transparent and<br />

participatory way as possible [11]; [24]; [86], presents the still<br />

unresolved problem of measuring these values in each step of the<br />

Policy Planning Cycle, maintaining the coherence of each<br />

measure and preserving the characteristics of transparency and<br />

reproducibility of the measurement. In this regard, scientific<br />

literature provides several examples of metrics which can be<br />

utilized for quantifying public value to a given eGovernment<br />

Project [81 - 82]. Some of them have been defined also by the<br />

authors of this article in the EU funded eGovernment Economics<br />

Project (eGEP) [83 – 85]. However the majority of them have<br />

been developed to benchmark eGovernment initiatives once they<br />

are already in place and none of them has the capability to<br />

evaluate a Policy Implementation Plan and, at the same time, the<br />

eGovernment projects it underlines. Finally in Figure 5 we have<br />

defined the key drivers for eGovernment adoption that in our<br />

opinion have to be considered to overcome the barriers identified<br />

in our analysis.<br />

Figure 4 – Circular nature of the Evaluation Process and its<br />

relationship with Policy Planning Circle<br />

Figure 5 defines the relationships among key drivers of<br />

eGovernment adoption, starting from the Parasuraman & Grewal<br />

model [87]: eGovernment adoption depends on both high service<br />

and product quality, together with a meaningful Public Value of a<br />

given service [17]; [44]; [61]; [73]; [85]. However, these drivers<br />

are filtered by public opinion’s perceptions on both the value of<br />

service/product deployed and the level of transparency of the<br />

related decision making process [65]; [66]; [76]. Positive<br />

perception of value of both the eGovernment initiatives and<br />

transparency of the decision making process, increases the<br />

citizen’s trust in policy makers and public administration and it<br />

stimulates eGovernment adoption.<br />

2 Measure of the quality of the outputs of eGovernment projects can be<br />

addressed under different perspectives [78-79]. However in our opinion,<br />

the quality of eGovernment Projects should be mainly measured in respect<br />

to the contribution of eGovernment services to increase participation and<br />

co-production (see Figure 1 - eGovernment adoption Maturity Model),<br />

thus the quality dimension should help to understand which is the<br />

capability of a given project to prevent lock in situations and to promote<br />

open technologies/services [80].<br />

293<br />

A higher level of public participation in the decision making<br />

process can improve the quality of the product and services and<br />

their public values and thus it can increase both citizen’s positive<br />

perception and trust of policy makers and public administration<br />

[20]; [26]. The scientific community has already proposed several<br />

approaches to assess citizens perceptions on a given policy<br />

making process [13]; [43]; [65]; [87]; and many have attempted to<br />

explore how to stimulate public participation for a better quality<br />

of eGovernment services and their adoption [39]; [22]; [26]; [27];<br />

[57]; [66]. There are also some examples of practical usage of<br />

citizens satisfaction surveys for create better eGovernment Policy<br />

Programmes, like the “Common Measurement Tool” developed<br />

by the Canadian Government that defined specific guidelines for<br />

assessing the citizens’ satisfactions on eGovernment services<br />

performances [88]. However several authors agree that still exist a<br />

lack of measurement systems in eGovernment process<br />

performance and outcomes [7]; [29]; [51]; [64]; [65]; [87].<br />

Figure 5 – Key drivers of eGovernment adoption: authors'<br />

adaptation from Parasuraman&Grewal [87].<br />

This is particularly true at local level where there is little evidence<br />

of Policy Evaluation Frameworks suitable for supporting Policy<br />

Making Processes [14]; [29]; [55]; [56]; [88]. The scope of this<br />

paper was therefore to contribute closing this gap and identifying<br />

the key barriers and drivers aimed at supporting the full adoption<br />

of eGovernment services towards the realisation of a well<br />

established Digital Society. In future research we aim at further<br />

enhancing the findings of this analysis contributing to the<br />

development of policy evaluation methodologies, frameworks and<br />

related models that can effectively assess the policy planning<br />

process and the impact of eGovernment, including in particular<br />

the ''openness dimension'' that underlines a transparent and<br />

trustworthy participatory policy-planning process.<br />

Disclaimer<br />

The views expressed in this paper are purely those of the authors<br />

and may not in any circumstances be regarded as stating an<br />

official position of the European Commission.<br />

6. REFERENCES<br />

[1] Osborne, D., Gablear, T. (1992). Reinventing<br />

Government: how the entrepreneurial spirit is transforming<br />

the public sector. Published by Addison-Wesley.<br />

[2] Osborne, D., (1993). “Reinventing<br />

Government”. In Public Productivity & Management<br />

Review, 16(4), pp:349-356.


[3] Titah, R., Barki, H., (2005). eGovernmnet<br />

Adoption and Acceptance: a LiteratureReview, Chaire de la<br />

Chaire du Canada en implementation et gestion des<br />

technologies des information. HEC Montreal.<br />

[4] Lofstedt, U., (2005). “eGovernment:<br />

Assessment of current research an some proposal for future<br />

directions”. InInternational Journal of Public Information<br />

System. 1, pp: 39-52.<br />

[5] Yildiz, M., (2007). “eGovernmnet research.<br />

Reviewing the literature, limitation and ways forward”. In<br />

Government Information Quarterly, 24( ), pp: 646-665.<br />

[6] Hassan, H., S., Shehab, E., Peppard, J.,<br />

(2011). “Recent advances in e-services in the public sector:<br />

state of the art and future trend”. In Business Process<br />

Management Journal. 17(3), pp: 526-545.<br />

[7] UN – DESA (United Nations Department of<br />

Economic and Social Affairs), (2010). eGovernmnet survey<br />

2010: leveraging eGovernmnet at a time of financial and<br />

economic crisis.<br />

[8] UN – DESA (United Nations Department of<br />

Economic and Social Affairs), (2003). Benchmarking<br />

eGovernment: A global perspective: Assessing the progress<br />

of the UN member states.<br />

[9] European Commission DG Information<br />

Society and Media Modinis Study, (2006). Breacking<br />

Barriers to eGovernment: Overcoming obstacles to<br />

improving European public services.<br />

[10] Heeks, R., (2006). Understanding and<br />

Measuring eGovernment: International Benchmarking<br />

Studies. Paper prepared for UNDESA workshop on<br />

“eParticipation and eGovernment: Understanding the<br />

Present and Creating the Future”. 27-28 July, Budapest,<br />

Hungary.<br />

[11] OECD, (2007). eGovernment for better<br />

Government. OECD eGovernment Studies.<br />

[12] OECD, (2009), Implementation guidelines on<br />

evaluation and capacity building for local and micro<br />

regional level – “the Hungary case”, OECD publication<br />

[13] Pratchett, L., Durose, C., Lowndes, V., Smith,<br />

G., Stoker, G., & Wales, C., (2009). Empowering<br />

Communities to influence Local Decision Making: a<br />

Systematic Review of the Evidence. London: Department for<br />

Communities and Local Government.<br />

[14] Capgemini, (2010). Digitizing Public Service<br />

In Europe: Putting Ambition into Action, 9th Benchmark<br />

Measurement, (2010). Delivered for the European<br />

Commission, DG Information Society: Brussels.<br />

[15] Accenture, (2001). eGovernment Leadership:<br />

Rhetoric vs Reality – Closing the Gap. Company position<br />

paper.<br />

[16] Gupta, M., P., & Jana, D., (2003).<br />

“eGovernment evaluation: a framework and case study”.<br />

InGovernment Information Quarterly, 20, pp: 365-387.<br />

[17] Perrin, B., (2006). Moving from Outputs to<br />

Outcomes: Practical Advice from Governments Around the<br />

World. Managing for performances and results series.<br />

Report sponsored by World Bank and the IBM Center for<br />

the Business of Government.<br />

294<br />

[18] Kolsker, A., Lee-Kelley, L., (2008).<br />

“Citizens’ attitudes towards eGovernment and eGovernance:<br />

a UK study”. In International Journal of Public Sector<br />

Management. 21(7), pp: 723-738.<br />

[19] Norris, D., F., (2006).Electronic Government<br />

at the Grassroots: the State of the practice. In A. V.<br />

Anttiroiko and M. Malkis (Eds.): Enciclopedia of Digital<br />

Government. Hershey, PA: Idea Group Reference.<br />

[20] Horst, M., Kuttschreuter, M., Gutteling, M.,<br />

J., (2007). “Perceived usefulness, personal experiences, risk<br />

perception and trust as determinants of adoption of<br />

eGovernment services in The Netherlands”. In Computers in<br />

Human Behaviour, 23( ), pp: 1838 -1852.<br />

[21] Accenture, (2011). Driving Public<br />

Enterpreneurship: Governmnet as a catalyst for innovation<br />

and growth in Europe. Company position paper in<br />

conjunction with Oxford Economics.<br />

[22] Jones, S., Irani, Z., Sharif, A., Themistocleus,<br />

M., (2006). eGovernment evaluation: reflection on two<br />

organizational studies. In Proceesings of the 39 th Hawaii<br />

International Conferences on System Science.<br />

[23] Sutton, K., (2004). Local Citizens<br />

Participation: Case Study of a Community Development<br />

Board.<br />

[24] Codagnone, C., Undheim, T.,<br />

(2008).“Government Efficiency and Effectiveness: The<br />

Theory and Practice of Evaluation and Measurment”. In<br />

European Journal of ePractice.1(4), pp: 1-15.<br />

[25] Johnsen, A., (2004), The politics of<br />

performances measurement: what does 25 years of<br />

experiences tell us about the state of performance<br />

measurement in public management, European Group of<br />

Public Administration Conference, Lublijana.<br />

[26] Wang, X., Wan Wart, M., (2007). “When<br />

Public Participation in Administration Lead to Trust: An<br />

Empirical Assessment of Managers’Perceptions: Essays on<br />

Citizens Participation and Governance”. In Public<br />

Administration Review. (2), pp: 265-278.<br />

[27] Reddic. C., G., (2004). “A two stage model of<br />

eGovernment: Theories and empirical evidences for U.S.<br />

cities”. In Government Information Quarterly, 21(1), pp:<br />

51-64.<br />

[28] Dawes, S., S., (2008). An Exploratory<br />

Framework for Future eGovernment Research Investments.<br />

Proceedings of the 41 st Hawaii International Conference on<br />

Systems Science.<br />

[29] Misuraca G. and Rossel, P., (2011).<br />

Reflexivity, modelling and weak signals of transformational<br />

tracks to support both micro- and macro-measuring of<br />

Information society services. In Proceedings of the 5th<br />

International Conference on Theory and Practice of<br />

Electronic Governance (ICEGOV2011), Tallinn, Estonia,<br />

26-28 September 2011 - ACM International Conference<br />

Proceedings Series, ACM Press.<br />

[30] Bertot, J. C., Jaeger, P. T. (2008). The E-<br />

Government paradox: Better customer service doesn't<br />

necessarily cost less. In Government Information Quarterly,<br />

25(2), 149-154.<br />

[31] Castelnovo, W. (2010). Is there an eGovernment Paradox?<br />

In D. O’Donnel (Ed.), 10th European eGovernment


Conference on eGovernment (pp. 90-98). Limerick, Ireland:<br />

Academic Publishing.<br />

[32] Solow, R. (1987). We'd better watch out. New York Times,<br />

July 12, p. 36.<br />

[33] Solow, R. (1998). The productivity paradox.<br />

Issues in Science and Technology, 15(1), 9-10.<br />

[34] Misuraca, G., and Rossel, P., (2011).<br />

Measuring and Meta-measuring; in search of new Pathways<br />

for Modelling Impacts of ICT-enabled services on the<br />

Information Society, (2011). In Proceedings of the IFIP<br />

2011 eGovernment Conference (Delft, Netherland, 28<br />

August – 2 September 2011 - http://www.egovconference.org/egov-2011.<br />

[35] Chabrow, (2004) E., Survey Says Citizens<br />

Want More Than eGovernment.<br />

http://www.informationweek.com/news/21100103.<br />

Retrieved on January 24 2012.<br />

[36] Fernández-i-Marín, X. (2011). The Impact of e-Government<br />

Promotion in Europe: Internet Dependence and Critical<br />

Mass. In Policy & Internet, 3(4).<br />

[37] Kunstelj, M., Vintar, M., (2004). “Evaluating<br />

the progress of eGovernmnet development: A critical<br />

analysis”. In Information Policy, 9(3-4). pp: 131-148.<br />

[38] Layne, K., Lee, J., W., (2001). “Developing<br />

fully functional e-government: a four stage model”. In<br />

Government Information Quarterly, 9(2), pp: 122-136.<br />

[39] Andersen, K., V., Henrisken, H., Z., (2006).<br />

“eGovernment maturity model: extension of the Layne and<br />

Lee model”. In Government Information Quarterly, 23 (2),<br />

pp: 236-238.<br />

[40] Gil-Garcia, J., R., & Pardo, T., A., (2005).<br />

“eGovernment success factors: mapping practical tool to<br />

theoretical foundations”. In Government Information<br />

Quarterly, 22(2), pp: 187-216.<br />

[41] Moon, M., J., (2002). “The evolution of<br />

eGovernment among Municipalities: Rhetoric or Reality”.<br />

In Public Administration Review. 62(4), pp: 424-433.<br />

[42] Norris, D., F., Moon, M., C., (2005).<br />

Advancing eGovernment at the grassoots: tortoise or hare.<br />

In Public Administration Review, 65(1), pp: 64-75.<br />

[43] Pekka, K., (2010). Co-production: a new<br />

concept in evaluation. Paper presented at the 9 th European<br />

Evaluation Society International Conference. October 6 – 8.<br />

Prague, Czech Republic.<br />

[44] Ebrahim, Z., Irani, Z., (2005). “eGovernmnet<br />

adoption: architecture and barriers”. In Business Process<br />

Management Journal, 11(5), p: 589-611.<br />

[45] Kramer, K. L., King. L., (2006). “Information<br />

Technology and Administrative Reform: will the time after<br />

eGovernment be different?” In International Journal of<br />

Electronic Government Research. 2(1), pp: 1-20.<br />

[46] Grimsley, M., Meehan, A., Tan, A.,<br />

(2005).Capital Accounting: Evaluation eGovernment<br />

projects from a Community Development Perspective.<br />

eGovernment Workshop ’05 (eGOV05), September 13,<br />

Brunel University, West London, UK.<br />

[47] Bovaird, T., (2007), “Beyond Engagement<br />

and Participation: User and Community Coproduction of<br />

295<br />

Public Services”. In Public Administration Review. 5, pp:<br />

846–860.<br />

[48] Hochgerner, J., (2011). The Analysis of<br />

Social Innovation as Social Practice.<br />

[49] European Commission, (2010).<br />

Communication from the Commission to the European<br />

Parliament, the Council, the European Economic an Social<br />

Committe and the Committe of the Regions: a Digital<br />

Agenda for Europe. COM(2010) 245. Brussels 19.05.2010.<br />

[50] Cursey, D., Norris, D., F., (2008). “Models of<br />

eGovernmnet: Are They Correct? An empirical<br />

Assessment”. In Public Administration Review. (3). pp:523-<br />

536.<br />

[51] Esteves, J., Rhoda, C. J., (2008). ”A<br />

comprehensive framework for the assessment of<br />

eGovernmnet projects”. In Governmnet Information<br />

Quarterly, 25, pp: 118 -132.<br />

[52] Kunstelj, M., Vintar, M., (2009). Evaluating<br />

One-stop Government: critical analysis of the concept and<br />

its implementation in the selected countries. NISPAcee<br />

Annual Conference, Budva, Montenegro.<br />

[53] Sarantis, D., Charabilidis, Y., Askounis, D.,<br />

(2011). “A goal-driven management framework for<br />

electronic government transformation project<br />

implementation”. In Government Information Quarterly, 28,<br />

pp: 117-128.<br />

[54] Sarantis, D., Smithson, S., Charabilidis, Y.,<br />

Askounis, D., (2010). “A critical assessment of project<br />

management methods with respect to electronic government<br />

implementation challenges”. In Systemic Practices and<br />

Action Research, 23(4), pp: 301-321.<br />

[55] Misuraca, G., Ferro, E. Caroleo, B (2010)<br />

Assessing emerging ICT-enabled governance models in<br />

European cities: results from a mapping survey. In<br />

<strong>proceedings</strong> of the IFIP 8.5 eGOV2010 Conference,<br />

Lausanne, 29 August – 3 September 2010, IFIP, Springer<br />

Publisher, LNCS 6228 (pp. 168-179).<br />

[56] Grimsley, M., Meehan, A. Tan, A., (2004).<br />

Evaluative Design of eGovernmnet Projects: a Community<br />

Development Perspective.Twelfth American Conference on<br />

Informatics Systems, Acapulco, Mexico.<br />

[57] Misuraca, G., Broster, D. and Centeno, C.,<br />

(2011) Digital Europe 2030: Designing scenarios for ICT in<br />

future governance and policy making, in Government<br />

Information Quarterly, Special Issue 10/2011, Elsevier<br />

Publishing.<br />

[58] Blanake, J., Lopez-Claros, A., (2004). The<br />

Lisbon Review 2004: an assessment of policies and reforms<br />

in Europe. Published by the World Economic Forum.<br />

[59] Pavlou, P., A., Chai, L., (2002). ”What drives<br />

electronic commerce across cultures? A cross-cultural<br />

empirical investigation of the theory of planned behaviour”.<br />

InJournal of Electronic Commerce Research. 3(4), pp: 240<br />

– 253.<br />

[60] European Commission, (2005). “i2010 – A<br />

European Information Society for growth and employment”.<br />

Communication from the Commission to the Council, the<br />

European Parliament, the European Economic and Social<br />

Committee and the Committee of the Regions.


[61] Gilbert, D., Balestrini, P., Littleboy, D.,<br />

(2004). “Barriers and benefits in the adoption of<br />

eGovernment”. In Governmnet Information Quarterly, 20,<br />

pp: 365-387.<br />

[62] Van Ryzin, G., (2006). Piece of a puzzle:<br />

linking government performances, citizens satisfaction and<br />

trust. A performing Public Sector: the Second Transatlantic<br />

Dialogue. June, Leuven, Belgium.<br />

[63] European Council, (2010). European Council<br />

conclusion on Europe 2020 strategy inclusive Digital<br />

Agenda. Conclusion of the European Council.<br />

[64] Fugini, M., Maggiolini, P., Krysnaia, N.,<br />

Boselli, R., Cesarini, M., Mezzamanica, M, (2008). Why is<br />

True eGovernment still difficult to be achieved? In IFIP –<br />

International Federation for Information Processing,<br />

Volume 280: “eGovernment; ICT Professionalism and<br />

Competence; Service Science”; Antonino Mazzeo, Roberto<br />

Bellini, Gianmario Motta (Ed. Boston: Springler). pp: 11-<br />

20.<br />

[65] Van Ryzin, G., (2009). Outcome, Process and<br />

citizens’ trust of the civil services. Paper prepared for the<br />

10 th National Management Research Conference, October 1-<br />

4. Ohio State University, John Glenn School of Public<br />

Affairs, Columbus, USA.<br />

[66] Belanger, F., Carter, L., (2008). “Trust and<br />

risk in eGovernment adoption”. In Strategic Information<br />

Systems, 17( ), pp: 165-176.<br />

[67] Anttiroiko, A-V., (2008). Local eGovernment<br />

for Development: preliminary remarks.<br />

[68] Teicholz, E., (1984). “Computer Integrated<br />

manufacturing”.InDatamation. 30(3), pp: 169-170.<br />

[69] Hammer, M., Champy, J., (1993).<br />

Reengineering the Corporation. New York: Harper Collins<br />

Publisher.<br />

[70] Peppard, J., Rowland, P., (1995).The essence<br />

of Business Process Reengineering. Series Edition: Adrian<br />

Buckley.<br />

[71] Van de Walle, S., (2002). Public services<br />

performance and trust in government: the problem of<br />

causality. Paper prepared for the Annual Conference of the<br />

European Group of Public Administration Study. Group 2:<br />

Productivity and Quality in the Public Sector. September 4-<br />

7. Potsdam.<br />

[72] Janssen, D., Rotthier, S., Snijkers, K., (2004).<br />

“If you measure it they will score: an assessment of<br />

international eGovernmnet benchmarking”. In Information<br />

Policy. 9(3/4), pp:121-130.<br />

[73] Heeks R., Molla A., (2009), Impact<br />

assessment of ICT development projects: a compendium of<br />

approaches, Manchester University Institute for<br />

development policy and management, Ed. Development<br />

Informatics Group.<br />

[74] Arnaboldi, M., Azzone, G. Savoldelli, A.<br />

(2004) “Managing a public sector project: the case of the<br />

Italian Treasury Ministry”. In: International Journal of<br />

Project Management 22: 213–223.<br />

[75] Bekkers, V., Homburg, V., (2007). “The<br />

myths of eGovernment: looking beyond the assumptions of<br />

296<br />

a new better government”. In The Information Society,<br />

23(5), pp: 373-382.<br />

[76] Holzer M., Kloby K., (2005), “Sustaining<br />

citizen-driven performances improvement: models for<br />

adaptation and issues of sustainability”. In The Public<br />

Sector Innovation Journal, Vol. 10, No, 1.<br />

[77] Kearns, I., (2004), “Public Value and<br />

Electronic Service Delivery: The UK Experience”. In<br />

eGovernment Reconsidered: Renewal of Governence for the<br />

Knowledge Age. Edited by E. L. Oliver & L. Sanders,<br />

Canadian Plains Research Center, University of Regina.<br />

[78] Omar, K., Scheepers, H., Stockdale, R.,<br />

(2011), eGovernment Services Quality Assessment through<br />

the Public Value Lens., In <strong>proceedings</strong> of the 10 th IFIP WG<br />

8.5 International Conference, EGOV 2011, Delft, The<br />

Netherlands, August/September, pp:431-440.<br />

[79] Shah, R., C., Kesan, J., P., (2010). “Software<br />

Governance”, in eGovernment Information, Technology and<br />

Transformation, Ed H. J. Scholl. AMIIS – Advances in<br />

Management Information Systems, Vladimir Zwass Series<br />

Editor. Chapter 8, pp: 125-140.<br />

[80] Foley, K., (2006). Using the value measuring<br />

methodology to evaluate government initiatives.<br />

Proceedings of the 2006 Crystal Ball User Conference. May<br />

1-3. Denver. Colorado.<br />

[81] US Chief Information Office (US CIO), Value<br />

Measuring Methodology. How to Guide, 2002, US CIO:<br />

Washington DC.<br />

[82] UK Office for Government Commerce,<br />

Measuring the Expected Benefits of E-Government, 2003,<br />

OGC: London.<br />

[83] SDAE (2005), MAREVA Méthode d’Analyse et de<br />

REmontée de la Valeur. Available at<br />

https://www.ateliers.modernisation.gouv.fr/ministeres/doma<br />

ines_d_expertise/budget_et_controle_d/public/foire-auxquestions/downloadFile/file/09.%20FAQ.zip?nocache=1195<br />

568309.47<br />

[84] Codagnone C. (2007). Measuring<br />

eGovernment: Reflections from eGEP Measurement<br />

Framework Experience. European Review of Political<br />

Technologies, 4, 89-106.<br />

[85] Codagnone, C. (2008). eGEP 2.0. Brussels:<br />

Delivered for the European Commission, DG Information<br />

Society.<br />

[86] Parasuraman, A., Grewal, D., (2000). “The<br />

Impact of Technology on the Quality-Value-Loyalty Chain:<br />

a Research Agenda”. In Journal of the Academy of<br />

Marketing Science. 28(1), pp: 168-174.<br />

[87] Dawes, S., S., Pardo, T., (2002). Building<br />

collaborative digital government system. In W.J. McIver, &<br />

A.K. Elmagarmid (Eds.), Advances in digital government.<br />

Technology, human factors and policy. Norwell, MA.<br />

Kluwer Academic Publisher.<br />

[88] Treasury Board of Canada (2004). Performance<br />

Measurement for the Government online Initiative. This<br />

document is available in alternative formats and on the<br />

Treasury Board of Canada Secretariat’s Web site at the<br />

following address:www.tbs-sct.gc.ca


Investigating the Relationships between Accountability<br />

and Governments’ Transformation to eGovernment<br />

ABSTRACT<br />

Many countries are moving towards eGovernment for ensuring<br />

higher efficiency, transparency and accountability in the public<br />

administration. Accountability, the obligation to justify one’s<br />

conduct, has been widely discussed in the social, public and<br />

political spheres. However, it is not so well understood how and<br />

to what extent Government’s accountability is affected with the<br />

transformation to eGovernment. This paper focuses on this aspect<br />

by means of literature review and analyzing indexes related to<br />

eGovernment and the factors associated with accountability<br />

available during the period 2005 -2010. The findings show that<br />

the relationship between accountability and eGovernment among<br />

the countries as whole is not straightforward as it depends on the<br />

characteristics of the individual governance. However, evidence<br />

in general shows that strong accountability, which is measured<br />

here through a level of integrity, influences the government to<br />

adopt eGovernment as it helps to open up the government and its<br />

policy process to its citizens and other stakeholders.<br />

Categories and Subject Descriptors<br />

K.4 [Computers and Society]: General, Public Policy Issues<br />

General Terms<br />

Management, Measurement, Performance, Human Factors<br />

Keywords<br />

eGovernment, Democracy, Accountability, Integrity<br />

1. INTRODUCTION<br />

Accountability is a distinct feature of social life [1] that refers to<br />

that “an actor feels an obligation to explain and to justify his or<br />

her conduct to some significant other” [2]. Accountability has<br />

been much talked in sphere of our lives especially for ordered<br />

social, public and political conducts.<br />

In this contemporary knowledge based society where the<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

M. Sirajul Islam and Åke Grönlund<br />

Örebro University<br />

School of Business (Informatics)<br />

Fakultetsgatan 1, SE-70182, Sweden<br />

+46 76 17 17 193, +46 70 58 51 790<br />

{sirajul.islam, ake.gronlund }@oru.se<br />

297<br />

influence of technologies and human values are unavoidable,<br />

accountability is treated as not only a moral obligation or sense of<br />

responsibilities [3][4] but also as one of the key indicators for<br />

performance measurement which is very evident in the<br />

contemporary public administrations. The United Nations (UN)<br />

defines accountability in public administration as an obligation of<br />

the government officials regarding handling of public resources<br />

and answerability on deviating from any stated performance<br />

objectives [5]. According to this definition, the key<br />

responsibilities of the public administration include not only to<br />

work for operational efficiency and effectiveness, but also to<br />

ensure operational transparency and establishing trust internally<br />

and externally. In a democratic environment, the government<br />

officials are held accountable explicitly as well as implicitly for<br />

their deeds and actions to the society in general and the citizens in<br />

particular. Appropriate use of Information and Communication<br />

Technologies (ICTs) in the public administration is expected to<br />

enhance operational efficiencies and thus paves the way for<br />

improved accountability and administrative effectiveness.<br />

The World Bank [6] defines eGovernment as the use of ICTs by<br />

the government agencies “that have the ability to transform<br />

relations with citizens, businesses, and other arms of government.<br />

These technologies can serve a variety of different ends: better<br />

delivery of government services to citizens, improved interactions<br />

with business and industry, citizen empowerment through access<br />

to information, or more efficient government management. The<br />

resulting benefits can be less corruption, increased transparency,<br />

greater convenience, revenue growth, and/or cost reductions.”<br />

Supplement to this definition, the UN [7] describes eGovernment<br />

as a powerful tool for enhancing the public sector together with<br />

citizens that can address particular development issues in a<br />

transformative society. Nowadays, eGovernment has been a way<br />

of realizing the vision of a global information society as “many<br />

countries are experiencing its transformative power in revitalizing<br />

public administration, overhauling public management, fostering<br />

inclusive leadership and moving civil service towards higher<br />

efficiency, transparency and accountability” [7]. Therefore,<br />

governments of those countries are inclined to transform their<br />

governance to eGovernment gradually. However, research shows<br />

that considering eGovernment as an automatic means of dramatic<br />

change in the public sector accountability is a ‘myth’ [8]. In fact<br />

there is a lack of clarity regarding to what extent and how the<br />

transparency, accountability and eGovernment are associated to<br />

each other [9]. This paper therefore aims at investigating ‘how is<br />

accountability affected when governments transform to<br />

eGovernment?’ by means of literature review and analyzing


available indexes and factors of eGovernment and accountability<br />

of the last five years.<br />

2. LITERATURE REVIEW<br />

“Accountability is a fundamental but underdeveloped concept<br />

[...]” [10]. It comes through a sense of moral responsibility at both<br />

the supply (i.e. the government) and demand (i.e. the citizens)<br />

ends. According to Smith et al. [4], responsibility is a concept that<br />

emerges in a social relationship in the causes of actions and<br />

events, which in turns depends on the person’s knowledge,<br />

capacity, ability to act appropriately as well as access to the<br />

appropriate resources. In addition to human values and qualities,<br />

discretion is an inseparable element of accountability that<br />

ultimately decides whether a particular action from an agent will<br />

be exposed or not in a given situation [4]. Accountability in public<br />

administration is varied depending on the functional spaces and<br />

nature of relationships among the internal as well as the external<br />

stakeholders. Romzek and Dubnick [10] describe four alternative<br />

systems of public administration (Figure 1), each of which is<br />

based on two critical factors – sources of agency control and<br />

degree of control over agency actions.<br />

Figure 1. Types of Accountability Systems [10]<br />

Among these alternatives (Figure 1), bureaucratic accountability<br />

systems are widely used mechanisms that depend on the<br />

organized and legitimate relationship between a superior and a<br />

subordinate as well as close supervision on a stated administrative<br />

rules and regulations. Legal accountability, which is closely<br />

related to bureaucratic accountability, is associated with frequent<br />

application of control to the administrative activities. Such a<br />

controlling application is depended on the relationships between<br />

the internal and external agencies, where external agency is<br />

considered as the ‘lawmaker’ and the internal agency (i.e. the<br />

public administrator) as the ‘executor’. Professional<br />

accountability involves an obligated responsibility of sincerely<br />

meeting the expected performance by the assigned employee with<br />

the expertise or special skills. Finally, political accountability is<br />

related to the democratic pressure that mainly concerns about the<br />

representation of the public administrator to certain<br />

constituencies, such as general public, elected officials, clients<br />

and heads of the agencies, special interests groups and future<br />

generations. Romzek and Dubnick argue that political<br />

accountability is seen on ethical dimension as such systems may<br />

promote favoritism and even corruption in the public<br />

administration. They further state that “the urge for political<br />

accountability, for example, is reflected in open meeting laws,<br />

freedom of information acts, and ‘government in the sunshine’<br />

statutes passed by many states and local governments [in the<br />

US].” [10]<br />

298<br />

Within the systems [10], the processes of accountability can be<br />

evident in three stages – (i) the information provision stage, (ii)<br />

the debating stage, and (iii) the judgment stage. The validity of<br />

information is enquired in the information provision stage, while<br />

it subsequently goes to debating stage for appropriateness of<br />

actions followed by rewarding or sanctioning of the taken actions<br />

in the judgment stage [4]. In this case, ICTs based<br />

communication has potential role over the information provision<br />

stage as such communication and data processing facilities can<br />

make the information easily accessible to wide audience. This<br />

explains that eGovernment is an essential enabler for enhancing or<br />

improving administrative integrity, transparency and<br />

accountability on an ethical dimension. However, there are some<br />

arguments that contradict the positive views on eGovernment in<br />

relation to accountability [8][9][11][12]. According to Kraemer<br />

and Dedrick [11], “In general, computing [in organizations] tends<br />

to reinforce existing tendencies, and by itself is not likely to affect<br />

organizational structure in significant ways”. In this regard, Wong<br />

and Welch [8] argue that the relationship between eGovernment<br />

and accountability is a conditional one as change in the<br />

accountability level depends on the context and characteristics of<br />

the public administration or the kind of bureaucracy.<br />

3. METHOD<br />

This study relies on the arguments on accountabilities in relation<br />

to ICTs available through on-line reports and research papers. In<br />

order to determine the relationship between accountability and<br />

eGovernment, three kinds of indexes are used, these are – UN<br />

global eGovernment indexes, Global Integrity indicators and<br />

EIU’s index of global democracy. There are so far no explicit<br />

indicators that would explain a comparative accountability status<br />

of a country. The 2010 Global Integrity indicators (GII) [13]<br />

scorecard assesses the existence, effectiveness, and citizen access<br />

to key governance and anti-corruption mechanisms through more<br />

than 300 actionable indicators, including some indicators related<br />

to country level accountability. The indicators, which are<br />

associated with the major issues of accountability, are fairly<br />

related to the accountability systems as discussed by Romzek and<br />

Dubnick [10] in the literature study as above. For example,<br />

bureaucratic systems can be related to the third category of GII<br />

(i.e. Government Conflicts of Interest Safeguards & Checks and<br />

Balances), while legal and professional systems can be fitted to<br />

the sixth category of GII (i.e Anti-Corruption Legal Framework,<br />

Judicial Impartiality, and Law Enforcement Professionalism).<br />

‘Public requests for government information’ is one of the<br />

indicators of GII that is close linked to the political accountability<br />

systems. As for an indicative comparison, a table (Appendix 2<br />

available at http://tinyurl.com/cp8ua6m) has been formulated that<br />

shows various performance indications during the period between<br />

2005 and 2010. The list of countries (40 in this study), as shown<br />

in the table, are chosen based on availability of Integrity data of<br />

the last three surveys covering 2006 to 2010 conducted by the<br />

Global Integrity [13].<br />

4. RESULTS AND DISCUSSION<br />

The integrity indicator is closely associated with accountability<br />

systems of the respective countries. Accountability performance<br />

in an environment of transformative governance cannot only be<br />

understood by the various parameters of Integrity [13], but also by<br />

the structure of bureaucracy which can also be well perceived by<br />

the characteristics of a regime, such as full or flawed democracy,


hybrid or authoritarian regime. Bovens [2] in this regard contends<br />

that “public accountability is not just the hallmark of democratic<br />

governance, it is also a sine qua non for democratic governance”<br />

Several regression analyses (Appendix 1 available at<br />

http://tinyurl.com/cp8ua6m) have been done in order to find<br />

relationships among the three variables - eGovernment,<br />

democracy and integrity. Results show that there are positive<br />

correlations exist among these variables, although the strengths of<br />

coefficient of the correlation varied under certain situation. The<br />

multiple regression tests indicates that 37% change in country’s<br />

eGovernment initiatives can be explained by the changes of<br />

democracy and integrity. On the other side, simple regression<br />

shows that democracy and integrity are both strongly correlated.<br />

However, while it comes with eGovernment (Y), country’s levels<br />

of democracy (democratic, flawed, hybrid and authoritarian) are<br />

weakly related. Furthermore, integrity (Y) is strongly correlated<br />

with eGovernment (X).<br />

According to data exhibited in Appendix 2 (available at<br />

http://tinyurl.com/cp8ua6m), determining relationship between the<br />

performances of country’s eGovernment (i.e. 40 countries in this<br />

study) and the other accountability indicators or vice-versa over<br />

the years (2005 to 2010) is not so straightforward. In general,<br />

USA, Canada and Japan demonstrate optimistic association<br />

among these three indicators – eGov, integrity and democracy.<br />

Bulgaria and South Africa have ‘strong integrity’ performance,<br />

but comparatively shown low rankings. One of the explanations<br />

could be that these two countries are quite new in converging to<br />

democracy in comparison to the latter three countries. Except<br />

Kazakhstan, countries with ‘moderate’ integrity either have<br />

flawed democracy or combination of both democratic and<br />

authoritative (i.e. hybrid) structures. According to eGovernment<br />

rankings, their status are highly diverged, for example – Colombia<br />

is the 31 st , while Ghana is at the 147 th position. The case of<br />

Kazakhstan seems interesting as the country is governed by an<br />

authoritarian regime [14], but ranks at the top 50 of global<br />

eGovernment index and holds a ‘fairly moderate’ integrity over<br />

the years. Kazakhstan’s integrity scorecards of the last three<br />

surveys [13] show that they have better performances in anticorruption<br />

measures, election integrity with voting and citizen<br />

participation, procurement process, government oversights and<br />

controls, and rule of laws. However, they are weak in facilitating<br />

public access to information and media, civil service regulations<br />

and ensuring government accountability at the executive,<br />

legislative, judiciary and budgetary processes. Except this, all the<br />

(forty) countries with authoritarian regimes have either ‘week’ or<br />

‘very weak’ integrities and most of them are placed at bottom half<br />

of the eGovernment indexes. Countries like Cameroon, Nigeria,<br />

and Yemen are far away in the ranking of integrity, eGovernment<br />

and democratic representations. Moldova and Bangladesh are<br />

weak in democracy, but demonstrate linear progresses in both<br />

integrity indexes and transforming to eGovernment. Bangladesh is<br />

progressing in the eGovernment indexes within the ‘weak<br />

integrity’ and hybrid structure of regime.<br />

Therefore, it appears that there is a relationship between the<br />

nature or characteristic of regimes and their transformation to<br />

eGovernment. But, how is the integrity affected that could<br />

determine accountability of a country? If we take USA as a bestcase<br />

example, we can see from their integrity scorecards that they<br />

have strong performance in some key areas of governments’<br />

integrity. These are [13], media and access to information, citizen<br />

299<br />

participation in the election, executive, legislative and budgetary<br />

accountabilities, audit institutions, anti-corruption, rule of law and<br />

law enforcement. On the other-side, they have weak presence over<br />

the national ombudsman.<br />

The above results also indicate that we cannot draw a straight line<br />

among the countries as whole in order to determine the<br />

relationship between eGovernment and integrity (as a proxy to<br />

accountability) or eGovernment and democracy. A good<br />

conclusion can be derived at just by analyzing individual country<br />

level performance in those indicators. According to this study, we<br />

found that out of 40 countries, only 9 of them have same level of<br />

indicators irrespective of their eGovernment status. For example,<br />

USA is 4 in all indicators and Yemen is 1 in all. 22 countries<br />

(55%) have similar association between their integrity and<br />

democracy indicators (for example, Argentina and Nepal).<br />

However, the relationship between eGovernment and integrity or<br />

eGovernment and democracy cannot be generalized as it is<br />

interestingly varied among the countries. 17 countries (43%) have<br />

same level of eGovernment and democracy indicators; whereas 13<br />

countries (33%) are with similar level of eGovernment and<br />

integrity (for example, Azerbaijan and Nicaragua).<br />

According to the above discussions and as for the research<br />

question of this paper is concerned, this cannot be so certain as to<br />

how and to what extent the elements of integrity in general and<br />

accountability in particular determine governments’<br />

transformation to eGovernment. Nevertheless, one thing is quite<br />

indicative that strong accountability provokes governments for<br />

strong transformation to eGovernment, whereas strong<br />

accountability depends on the strong democracy that at least<br />

comprises of congenial, transparent and result-oriented<br />

bureaucracy and strong judicial systems (for example USA,<br />

Canada and Japan). In this case, accountability is affected by the<br />

well-defined legal systems and the pressure coming from the open<br />

civil society due to strong presence of IC-based communications.<br />

5. CONCLUSIONS<br />

This paper addresses apparently an unexplored issue as how is<br />

accountability affected when governments transform to<br />

eGovernment. In doing so, it discusses the notion and<br />

characteristics of accountability in a special reference to ICTbased<br />

public administration and communications. The paper uses<br />

indexes of UN global surveys on eGovernment [7], global<br />

integrity [13] and EIU’s global democracy [14] published during<br />

the last five years (2005 -2010). The major finding is that<br />

accountability does influence the governments for transformation<br />

to eGovernment as it helps to open up the government and its<br />

policy process to internal as well as external stakeholders. More<br />

the transformation to eGovernment is, better indication for a<br />

democratic environment and administrative integrity. The study<br />

also indicates that to determine the influence of accountability to<br />

eGovernment transformation or vice-versa requires individual<br />

country level analysis. In fact the answer is not straightforward.<br />

The major limitation of this paper is that it attempts to address a<br />

complicated issue within a brief discussion. However, the findings<br />

can be used mainly for indicative purposes by the government<br />

officials and the researchers concerned about modernizing public<br />

administration and eGovernment. There are many unexplored<br />

elements in the integrity indicators [13] that need to be thoroughly<br />

investigated in order to better understand about the relationship


etween accountability and eGovernment. This suggestion can be<br />

treated as a call for future research as well.<br />

6. REFERENCES<br />

[1] Willmott, H. Thinking Accountability : Accounting for the<br />

Disciplined production of Self. In R. Munro J. Mouritsen<br />

(eds.), Accountability: Power, Ethos and the technologies of<br />

managing. London: International Thompson Business Press,<br />

1996.<br />

[2] Bovens, M. Public accountability. In The Oxford handbook<br />

of public management, ed. E. Ferlie, L. Lynne, and C. Pollitt,<br />

Oxford University Press, 2005, 182–208.<br />

[3] Johnssén, G. Accountability and Responsibility in e-<br />

Government. Presented at the 1 st Scandinavian Workshop on<br />

e-Government, Örebro, Sweden, 2004.<br />

[4] Smith, M., Noorman, M.E., Martin, A.K. Accountabilities,<br />

automations, Dysfunctions, and Values: ICTs in the public<br />

sector. London School of Economics, Working paper series<br />

169, 2008.<br />

[5] Armstrong, E. Integrity, Transparency and Accountability in<br />

Public Administration: Recent Trends, Regional and<br />

International Developments and Emerging Issues. United<br />

Nations Public Administration Network (UN-PAN), 2005.<br />

[6] World Bank. Definition of e-Government. 2005 Available at<br />

http://go.worldbank.org/M1JHE0Z280<br />

300<br />

[7] United Nations E-Government Survey 2010. United Nations<br />

Public Administration Network (UN-PAN), 2010.<br />

[8] Wong, W., Welch, E. Does E-Government Promote<br />

Accountability? A Comparative Analysis of Website<br />

Openness and Government Accountability. Governance, 17,<br />

2, 2004, 275-297<br />

[9] Orelli R.L., Padovani, E., Scorsone E. E-Government,<br />

Accountability, and Performance : A Comparative Analysis<br />

Between European Governments. EGPA 2009 Conference,<br />

Malta September 2-4, 2009.<br />

[10] Romzek, B. S., & Dubnick, M. J. Accountability in the<br />

public sector: Lessons from the challenger tragedy. Public<br />

Administration Review, 47, 3, 1987.<br />

[11] Kraemer, K., Dedrick, J. Computing and Public<br />

Organizations. Journal of Public Administration Research<br />

and Theory, 7, 1997, 89–112.<br />

[12] Heintze, T., Bretschneider, S. Information Technology and<br />

Restructuring in Public Organizations: Does Adoption of<br />

Information Technology Affect Organizational Structures,<br />

Communications, and Decision-Making. Journal of Public<br />

Administration Theory and Research, 10, 2000, 801–830.<br />

[13] Global Integrity Report- 2010. Global Integrity, Washington<br />

DC, USA, 2010.<br />

[14] Democracy Index -2010. Economist Intelligence Unit (EIU),<br />

2010.


Technologies, Tools and Web 2.0 in Support of Public<br />

Administration Workplace Communications<br />

ABSTRACT<br />

The aim of this paper is to investigate which are the technologies,<br />

tools and web 2.0 applications that support public administration<br />

workplace communications. The paper begins with e-<br />

Administration and web 2.0 uses in the context of public<br />

administration 2.0. Then the attention is focused on workplace<br />

communications review and technologies, and tools, which<br />

influence their efficiency and effectiveness. For the purpose of<br />

detailing the used public administration technologies and tools,<br />

O*NET database is investigated in terms of the governance and<br />

public management and administration occupations. In order to<br />

determine, to what extent the identified technologies, tools and<br />

web 2.0 applications are used in practice, an empirical survey is<br />

developed and carried out in “Information services and<br />

technologies” Directorate at Sofia Municipality. The paper<br />

concludes with a proposed PA 2.0 workplace communications<br />

model.<br />

Categories and Subject Descriptors<br />

H.3.5 [Online Information Services]: Data Sharing, Web-Based<br />

Services; H.4.1 [Office Automation]: Groupware, Spreadsheets,<br />

Time Management, Workflow Management; K.4.3<br />

[Organizational Impacts Automation]: Computer-Supported<br />

Collaborative Work<br />

General Terms<br />

Management, Performance, Economics, Human Factors<br />

Keywords<br />

ICT, Web 2.0, Public Administration, Communications<br />

1. INTRODUCTION<br />

“E-Government” refers to the use by government agencies of<br />

information technologies that have the ability to transform<br />

relations with citizens, businesses, and other arms of government.<br />

These technologies can serve a variety of different ends: better<br />

delivery of government services to citizens, improved interactions<br />

with business and industry, citizen empowerment through access<br />

to information, or more efficient government management,<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Milena Krumova<br />

Technical University – Sofia, Bulgaria<br />

Sofia 1000, bul. Kl. Ohridski 8<br />

+359 899 283987<br />

mkrumova@tu-sofia.bg<br />

301<br />

increasing revenue or re-structuring of administrative processes.<br />

[27]. The use of ICTs reflects on: (1) simplify and improve the<br />

internal administrative operations of government and their<br />

relations with other bodies involved in public management and<br />

service delivery; (2) facilitate public service interaction between<br />

government, citizens and other stakeholders, thus enabling better<br />

citizen participation and overall monitoring and evaluation of<br />

decision-making processes and their implementation; and (3)<br />

ensure inclusiveness and equal opportunity for all [14].<br />

According to M.Batorski and D.Hadden, e-Government did not<br />

achieve expected results because enabling technology was Web<br />

1.0 oriented. Social networking provides governments with a new<br />

paradigm: knowledge release rather than knowledge control.<br />

Government software technology can be categorized with the<br />

following framework [1]:<br />

o Internal: internal by governments<br />

o External: external to government with government<br />

involvement<br />

o Structural: follow government structure and mandate<br />

o Social: enable collaboration.<br />

eGovernment, both in practice and in concept, has been one of the<br />

important developments in public administration. The dynamic<br />

changes within the e-government reflect on the public<br />

administration internal and external communications and the<br />

services. The changes are strongly related to the people - public<br />

administrators and working requirements to them. Are they<br />

prepared to use technologies, tools and web 2.0 at their daily<br />

activities and communications?<br />

1.1 Research Objectives<br />

Fundamental and vital to public administration (PA) workplace<br />

communications is the information transmitting and making<br />

oneself understood by another or others. Communications are one<br />

of major challenges because they are a key for providing<br />

information, which results in efficient and effective performance<br />

in PA. The main goal of this study is to examine what are the<br />

main technologies, tools, in particular web 2.0 applications that<br />

support PA workplace communication? It seeks to increase the<br />

understanding that the effective use of technologies, tools and web<br />

2.0 (TTW2.0) possesses potential for communications<br />

improvement.<br />

1.2 Research Questions<br />

What are the major characteristics of e-Administration and PA 2.0<br />

in the context of TTW2.0?; How can PA workplace<br />

communications be improved by TTW2.0?; What are TTW 2.0


that the PA employees need to be well prepared for to work<br />

with?/How are TTW2.0 related to PA occupations according to<br />

O*NET?; In terms of workplace communications, is there a gap<br />

between TTW2.0 within O*NET and the used ones in it and a real<br />

working environment (Sofia Municipality “Information services<br />

and technologies” Directorate)?<br />

1.3 Research Method<br />

In order to meet the research goal, various methodologies were<br />

applied, such as, literature review, a desk-based review,<br />

interviews, web search and a web survey. The survey has been<br />

designed as a blend qualitative and in a small scale quantitative<br />

research technique.<br />

1.4 Structure of the Paper<br />

The paper i) starts with review about e-Administration and PA<br />

2.0. The advantages of technologies usage are outlined. The<br />

workplace communications and the communication itself are<br />

presented in the context of PA. Then, ii) it continues with O*NET<br />

database research related to the Government & Public<br />

Administration occupations. iii) The identified TTW2.0s are<br />

summarized. iv) Based on identified TTW2.0, a survey has been<br />

designed and empirically applied at Sofia Municipality<br />

“Information services and technologies” Directorate. The survey<br />

aimed to identify: “Where are the TTW2.0 used at and how<br />

communications can be improved? Is there a gap between<br />

necessary knowledge, skills and competencies to work with<br />

TTW2.0 and a real working environment in regards to workplace<br />

communications“. The results are presented and discussed. v) The<br />

paper ends with TTW2.0 uses for PA and a proposed abstract PA<br />

2.0 workplace communications model.<br />

2. E-ADMINISTRATION<br />

Electronic public administration or e-Administration is one of the<br />

main eGovernment domains: eSociety; eAdministration; eCitizens<br />

& eServices (Figure 1) [7]. e-Administration is the effective<br />

management of the coordination and control of processes and the<br />

electronic information they create. It has two fundamental<br />

objectives: to increase the efficiency of administrative processes<br />

within institutions and to lessen the administrative burden faced<br />

by all staff during this process [11].<br />

eGovernment domains<br />

1<br />

Building<br />

external<br />

interaction:<br />

eSociety<br />

2<br />

Improving<br />

government<br />

processes:<br />

eAdministration<br />

1<br />

Connecting<br />

citizens:<br />

eCitizens and<br />

eServices<br />

Creating empowerment<br />

Making strategic<br />

connections in government<br />

Managing process<br />

performance<br />

Effective and efficient<br />

communication processes<br />

Improving time<br />

management<br />

Cutting process costs<br />

Figure 1. eGovernment domains<br />

e-Administration is also viewed as an Information and<br />

Communication Technologies (ICT) and tools, with the goal<br />

302<br />

being to improve productivity and performance. It expresses a<br />

mechanism that transforms: traditional offices into paperless<br />

offices, paper processes into electronic processes, internal<br />

communications with other offices and organizations and public<br />

organisms with initiative and transparency. e-Administration<br />

brings many advantages: interoperability, with the administration<br />

and citizens; integration of services that allow total and horizontal<br />

access to information; teleprocessing, telecommunications,<br />

official and administration communication is carried out<br />

electronically; bidirectional communications system; email,<br />

sending documents via email; electronic signature and validation.<br />

e-Administration brings the administration closer to citizens,<br />

integrates administrations, offers the private sector and<br />

associations complete electronic services. It offers citizens and<br />

public administrators 1 new communication channels. A key<br />

purpose of the e-administration is to improve the internal<br />

workings of the public sector by cutting process costs, managing<br />

process performance, creating strategic connections within<br />

government bodies, and creating empowerment (Wikipedia). e-<br />

Administration can encompass both intra-office and inter-office<br />

communication.<br />

JRC study about ICT- driven models of eGovernment, including<br />

eAdministration, tried to provide input for longer-term strategic<br />

planning. A list of technologies was prepared, focusing on the<br />

disruptive potential of the technologies themselves: mobile<br />

devices (PDAs, wearable computers, MP3-players, mobile<br />

phones) intelligent agents (and robotics), sensors, language<br />

processing and semantic technologies, serious games, RFID and<br />

biometrics, ICT infrastructures (WiFi, WiMAX, Broadband), web<br />

technologies (social software) and GRID [8].<br />

3. PUBLIC ADMINISTRATION 2.0<br />

Social computing (also known as Web2.0) is spreading in all<br />

spheres of life including government and public administration. A<br />

research named “Web 2.0 in Government: Why and How?”<br />

addresses the general issues about web 2.0 applications relevance<br />

for the government context: what way web 2.0 is likely to have an<br />

impact on government; how significant could this impact be and<br />

how web 2.0 applications are implemented in the government<br />

context [19].<br />

Definition (Wikipedia): Web 2.0 is web application features that<br />

facilitate participatory information sharing, interoperability, usercantered<br />

design, and collaboration on the World Wide Web. Web<br />

2.0 allows users to interact and collaborate with each other in a<br />

social media dialogue as creators of user-generated content in a<br />

virtual community, in contrast to websites where users<br />

(consumers) are limited to the passive viewing of content that was<br />

created for them. It has been also described as: “a fusion of<br />

sociology and technology, transforming monologues (one-tomany)<br />

into dialogues (many-to-many) and is the democratization<br />

of information, transforming people from content readers into<br />

publishers.” Web 2.0 is created to actively communicate and<br />

participate on the Internet, [16] not just to read a content, listen to<br />

or observe. Much of web 2.0 activities involve individual users<br />

coordinating with others, through many to many communication<br />

channels (Figure 2). Web 2.0 promotes many to many interaction<br />

1 Public administrators are public servants working in public departments<br />

and agencies, municipality, at all levels of government. A civil servant<br />

or public servant is a person in the public sector employed for a<br />

government department or agency.


with resources, peers and experts within and beyond the<br />

organization area. Public servants can use blogs and wikis,<br />

participated in web conferencing and developed podcasts and<br />

videos and become more efficient in their workplace<br />

communications thus indirect influence over quality of public<br />

services.<br />

Wikis<br />

Tagging<br />

Social<br />

networking<br />

Media<br />

sharing<br />

Social<br />

bookmarking<br />

Blogging<br />

Media<br />

manipulation<br />

Many to many<br />

communications<br />

channels<br />

Web 2.0<br />

activities<br />

Figure 2. Web 2.0 activities<br />

Collaborative<br />

editing<br />

Recommender<br />

systems<br />

Conversational<br />

arenas<br />

Virtual<br />

worlds<br />

Syndication<br />

An important shift was seen not just as the use of particular tools<br />

or techniques, but to the fostering of digital engagement. This<br />

involves:<br />

o dialogue: moving from broadcast to conversation;<br />

o not only listening but responding;<br />

o two-way collaboration sharing information, data, discussion;<br />

o opening spaces for peers to interact - facilitating communities;<br />

o moving audience from awareness to action.<br />

Web 2.0 covers a range of technologies. The most widely used are<br />

blogs, wikis, podcasts, information tagging, prediction markets,<br />

and social networks [3] (Figure 3).<br />

303<br />

Web 2.0<br />

technologies<br />

Wikis, commenting,<br />

shared workspaces<br />

Blogs, podcasts,<br />

videocasts, peer to<br />

peer<br />

Prediction markets,<br />

information<br />

markets, polling<br />

Tagging, social<br />

bookmarking/<br />

filtering,<br />

user tracking,<br />

ratings, RSS<br />

Social networking,<br />

network mapping<br />

Figure 3. Web 2.0 technologies<br />

Broad<br />

collaboration<br />

Broad<br />

communication<br />

Collective<br />

estimation<br />

Metadata creation<br />

Social graphing<br />

Broadly discussed in e-Administration field, web 2.0 technologies<br />

enable communication, collaboration and content creation,<br />

individually or together, and then publish to a workplace<br />

community. PA 2.0 can link familiar productivity tools to intranet<br />

publishing and search capabilities, thus public administrators can<br />

communicate and collaborate more efficiently with greater<br />

flexibility and access to information [11]. There are three key<br />

characteristics of web 2.0 applicable to PA: open - accessible and<br />

transparent; social-based on people and contacts/communications<br />

between them and user-oriented [2].<br />

Many initiatives have adopted web 2.0 applications in the<br />

government context. There are relevant applications in the private<br />

sector, which could be transferred to the government context.<br />

According to “E-Government Survey 2012” there has been a<br />

drastic rise of social media at the public administration [26].<br />

Web 2.0 affects different domains of public administrators’<br />

activities. While the debate is mostly focused on the impact in<br />

citizen-government relations (the so-called front-office) at<br />

present, analysis show that web 2.0 applications are also relevant<br />

for the back office activities of public administration [19].<br />

4. PUBLIC ADMINISTRATION<br />

WORKPLACE COMMUNICATIONS<br />

Definition (Wikipedia): Communication is the exchange of<br />

thoughts, messages, or information, as by speech, visuals, signals,<br />

writing, or behavior. According to Herbert A. Simon, who is<br />

known for his theory of administrative behavior “without<br />

communication there can be no organization”. In the context of<br />

internal communication, there are four tasks: categorize the types<br />

of information necessary to be communicated to employees for<br />

the effective functioning of the institution; identify the current<br />

delivery methods for communicating internal information; assess<br />

the effectiveness of the current methods, and recommend<br />

guidelines for effective communication [10]. The PA<br />

communications can be inter-relationship of public servants with<br />

the citizen and “extra-organizational”, communications with<br />

institutions [13]. There are a number of PA communications:<br />

formal and informal; vertical and lateral; verbal and non-verbal.<br />

They can be also viewed as occurring at intranet, extranet or<br />

internet environment [21] (Figure 4).<br />

Category of technology


Without any regards to the form of communication, the<br />

communication itself plays a very important role in the PA. A<br />

number of variables influence the PA effectiveness of<br />

communications. Some are found in the environment, intranet<br />

environment, extranet or internet in which communications take<br />

place, some in the personalities of the sender and the receiver, and<br />

some in the relationship that exists between sender and receiver.<br />

In the present context, PA communications are discussed within<br />

intranet environment. In the literature, there exist many studies<br />

concerning PA communications effectiveness and efficiency.<br />

INTRANET<br />

Workplace<br />

Communications<br />

EXTRANET<br />

Communications<br />

INTERNET<br />

Figure 4. Intranet (workplace) communications<br />

In his study, F. Petru examines the role of communication for the<br />

managerial process effectiveness of public administration [20].<br />

D.Špaček and J.Špalek analyze the relationship between<br />

electronic public administration and the present public<br />

administration model as developed within the reform of public<br />

administration in the Czech Republic, which has a significant<br />

impact on the information flows (communication) and certainly<br />

on the electronic public administration in the Czech context. The<br />

authors argue that, the quality of communication can be<br />

significantly influenced by utilization of modern ICT [25].<br />

“Digital Communities” study accent on wikis or similar tools,<br />

such as Microsoft’s SharePoint or others, that could be used to<br />

standardize business processes, functions and terms across an<br />

entire government. Web 2.0 and social networking preparedness is<br />

also discussed [5].<br />

In the next part of the current research, O*NET database will be<br />

investigated. O*NET is identified as a benchmark database for<br />

occupations [22, 23]. It contains information about hundreds of<br />

standardized and occupation-specific descriptors, including<br />

required technologies and tools for public administration related<br />

occupations.<br />

5. O*NET - TECHNOLOGIES AND TOOLS<br />

@ PUBLIC ADMINISTRATION<br />

OCCUPATIONS<br />

Occupational Information Network (O*NET) 2 is a comprehensive<br />

database of worker attributes and job characteristics [17]. O*NET<br />

is the replacement for the Dictionary of Occupational Titles<br />

(DOT). O*NET is being developed as a timely, easy-to-use<br />

resource that supports public and private sector efforts to identify<br />

and develop the skills of the American workforce. It provides a<br />

2 Occupational Information Network, http://www.onetonline.org/<br />

304<br />

common language for defining and describing occupations. Its<br />

flexible design also captures rapidly changing job requirements.<br />

O*NET database can serve as the engine that drives value-added<br />

applications designed around core information. It provides the<br />

essential foundation for facilitating career counseling, education,<br />

employment, and training activities [18]. The database, is<br />

available to the public at no cost, is continually updated by<br />

surveying a broad range of workers from each occupation. The<br />

database also provides the basis for Career Exploration Tools, a<br />

set of valuable assessment instruments for workers and students<br />

looking to find or change careers. Content Model, is the<br />

conceptual foundation of O*NET (Figure 5).<br />

Figure 5. O*NET Content model<br />

The Content Model embodies a view that reflects the character of<br />

occupations (via job-oriented descriptors) and people (via workeroriented<br />

descriptors). The Content Model also allows occupational<br />

information to be applied across jobs, sectors, or industries (crossoccupational<br />

descriptors) and within occupations (occupationalspecific<br />

descriptors). These descriptors are organized into six<br />

major domains: worker characteristic; worker requirements;<br />

experience requirements; occupational requirements; workforce<br />

characteristics and occupation-specific information. It provides a<br />

framework that identifies the most important types of information<br />

about work and integrates them into a theoretically and<br />

empirically sound system.<br />

Figure 6 shows the occupations related to information:<br />

knowledge, skills, abilities, and interests, general work activities,<br />

work context, including technologies and tools. Figure 6 shows<br />

the investigation path of the current research.<br />

The domains enable the user to focus on areas of information that<br />

specify the key attributes and characteristics of workers and<br />

occupations. Occupation-Specific Information is one of the<br />

domains. It consists of tasks - occupation-specific Tasks and tools<br />

and technology - Machines, equipment, tools, software, and<br />

information technology workers may use for optimal functioning<br />

in a high performance workplace. O*NET advanced search<br />

options allows users to browse by data or career cluster.<br />

Government and public administration career cluster includes:<br />

governance; national security; regulation; planning; revenue and<br />

taxation; public management and administration. In the current<br />

context, government and public management and administration<br />

career cluster are investigated. A number of occupations are<br />

included in each career cluster within O*NET. The investigated<br />

occupations within Public Management and Administration career


cluster were: Court Clerks; Court, Municipal, and License Clerks;<br />

Eligibility Interviewers, Government Programs; License Clerks;<br />

Managers, Municipal Clerks; Postal Service Clerks; Postal<br />

Service Mail Carriers; Postal Service Mail Sorters, Processors,<br />

and Processing Machine Operators; Postmasters and Mail<br />

Superintendents; Social and Community Service Managers. The<br />

investigated occupations within Governance career cluster were:<br />

Administrative Services Managers; Broadcast News Analysts;<br />

Chief Executives; Communications Teachers, Postsecondary;<br />

Eligibility Interviewers, Government Programs; Emergency<br />

Management Directors; General and Operations Managers;<br />

Legislators; Managers; Mapping Technicians; Postmasters and<br />

Mail Superintendents; Public Relations Specialists; Reporters and<br />

Correspondents; Social and Community Service Managers;<br />

Storage and Distribution Managers; Surveying and Mapping<br />

Technicians; Surveying Technicians; Transportation Managers.<br />

O*NET<br />

Bright<br />

outlook<br />

Job Zone<br />

Job family<br />

Career<br />

cluster<br />

Green<br />

economy<br />

sector<br />

Industry<br />

STEM<br />

Discipline<br />

Marketing, sales and services<br />

Education & training<br />

Architecture & construction<br />

Agriculture, food and natural resources<br />

Business, Management & Administration<br />

Art, audio/video technology & communications<br />

Health services<br />

Government & Public<br />

administration<br />

Law, public safety, corrections and security<br />

Human services<br />

Manufacturing<br />

Transportation, distribution & logistics<br />

Finance<br />

Hospitality & tourism<br />

Science, technologies, engineering and<br />

mathematics<br />

Information Technology<br />

The summarized technologies, tools and web 2.0 applications<br />

within O*NET database are as follows:<br />

o Tools: Computer/laptop; Calculators, printers; USB flash<br />

drives; Personal digital assistants PDA; Mobile phones —<br />

smartphones; Scanner; Electronic charts or maps or atlases;<br />

etc.<br />

o Technologies: Spreadsheet software: Microsoft excel; IBM<br />

lotus 1-2-3; Word processing software: Microsoft word;<br />

Electronic mail software: e-mail; Microsoft outlook;<br />

Microsoft project; Presentation software: Microsoft<br />

PowerPoint; Map creation software: mapping software; etc.<br />

Regulation<br />

National Security<br />

Public<br />

Management and<br />

Administration<br />

Governance<br />

Revenue and<br />

taxation<br />

Planning<br />

Figure 6. O*NET – Government & Public administration career cluster<br />

o Web: Web page creation and editing software: Facebook;<br />

Social media software; Blogging software; MySpace;<br />

Podcasting software; Website management software; etc.<br />

It can be concluded that even the fact that technologies and tools<br />

are in the core of e-governance and e-administration, in some<br />

governance and PA within O*NET database, there are no<br />

technologies and tools used. For example, the main activities of<br />

Municipal Clerks are: draft agendas and bylaws for town or city<br />

council; record minutes of council meetings; answer official<br />

305<br />

Skills<br />

Knowledge<br />

Education<br />

Abilities<br />

Interests<br />

Tools and<br />

technologies<br />

Work values<br />

Work styles<br />

Work context<br />

Work activities<br />

Tasks<br />

Wages &<br />

employment<br />

correspondence; keep fiscal records and accounts; prepare reports<br />

on civic needs, where no technologies and tools are used. The<br />

Web page creation and editing exists only in few governance and<br />

public management, and administration occupations, such as<br />

Public Relations Specialists or Reporters and Correspondents.<br />

6. EMPIRICAL SURVEY<br />

Technologies, tools and web 2.0 used in the survey are based on<br />

O*NET investigation. The aim of the survey was to establish


whether there is a gap and what Technologies, Tools and Web 2.0<br />

(TTW2.0) are used in workplace and how they can support<br />

workplace communications. The methodology for empirical<br />

survey was as follows:<br />

1) The questionnaire for the survey was designed. It includes<br />

four groups of questions regarding: (a) public administration<br />

workplace communications; (b) technologies, tools and web<br />

2.0 usages within workplace; (c) benefits from better<br />

communications on the workplace; (d) willingness to learn,<br />

to improve knowledge, skills and competencies to work with<br />

new technologies, tools & Web 2.0. The Technologies and<br />

Tools which are used in the survey are based on the O*NET<br />

investigation. Web 2.0 applications are chosen as a result of<br />

the literary research and discussions with experts in the field.<br />

Particular focus is given to respondents` willingness to learn<br />

about Technologies and Tools and Web 2.0, in order to<br />

improve their knowledge, skills and competencies.<br />

2) Some meetings and interviews were done with representative<br />

from the Sofia Municipality Directorate “Information<br />

services and technologies” which is the main administrative<br />

and territorial unit in Sofia. Based on discussions with the<br />

representatives a decision about which directorate will best<br />

correspond to the goal of the research was made. Most of the<br />

occupations within the Directorate of “Information services<br />

and technologies” are strongly linked to the technologies and<br />

tools.<br />

3) PA staff, who work in the Sofia Municipality Directorate<br />

“Information services and technologies”, were asked to<br />

respond to the survey and about more than half of them<br />

agreed to give their responds. This questionnaire asked each<br />

respondent question about his/her subjective impression of<br />

the technologies and tools used at the workplace. The given<br />

responses were for more than 90% of the questions.<br />

4) The results of the study are presented into four parts: Part 1:<br />

PA workplace communications; Part 2: Technologies, tools<br />

and web 2.0 usage within workplace; Part 3: Benefits from<br />

better communications on the workplace; Part 4: Willingness<br />

to learn how to work with new technologies, tools & Web<br />

2.0.<br />

5) Data collection period: March 2012 – April 2012.<br />

Responding to this survey was not mandatory. Data are<br />

collected directly from survey respondents. The gathering of<br />

responses was done by a free web based surveying tool. It<br />

allowed automatically responses collection and analysis. For<br />

some of the questions five point Likert scale was used.<br />

6) The results are discussed, summarizing the most important<br />

relations between the groups of questions. The study was<br />

conducted to find answers about: what is the usage of<br />

technologies, tools and web 2.0; are there link between<br />

communications efficiency and TTW2.0 usage; are there gap<br />

in TTW2.0 at the public administration workplace; how<br />

many public employees and professionals are ready and<br />

willing to learn for TTW2.0 for improving their knowledge,<br />

skills and competencies.<br />

Many initiatives are conducted for the e-government development<br />

on a national level in Bulgaria. In December 2011, a start was<br />

given to the electronic exchange of documents between five state<br />

administrations, Ministry of Transport, Information Technology<br />

306<br />

and Communications (MTITC), Ministry of Foreign Affairs,<br />

Ministry of Economy, Energy and Tourism, Road Infrastructure<br />

Agency and BULATSA, by sending and receiving documents<br />

electronically until today [12]. These administrations use the same<br />

document management system. The electronic exchange of<br />

documents today saves time, increases efficiency and reduces<br />

administration costs of departments. Sofia Municipality takes an<br />

active role in e-Government development projects, and it is<br />

planned to be a pilot Lot 3 beneficiary Municipality. Currently,<br />

Sofia Municipality use Document Management Software<br />

“АКСТЪР ОФИС” and most of workplace communications are<br />

done by electronic tools and technologies [24].<br />

6.1 Part 1 - Better Communications at<br />

Workplace<br />

This part of the survey includes 18 questions. The starting point is<br />

to identify how each one of the staff communicates at work, what<br />

does he/she think about personal barriers and what does the<br />

information depend on. At the begging the questions are focused<br />

on indirect factors which influence workplace communications.<br />

The survey data showed that all of the respondents like their job,<br />

and about 69,3% of respondents like to be connected during<br />

working time. The data showed that the majority of the<br />

respondents (77%) agree that the communication itself depends on<br />

the Internet and the net and that two side of the communication,<br />

sender and receiver, are equally important (92,3%). Most of the<br />

respondents (84,6%) communicate more often when they are at<br />

work than when they are at home. The respondents who prefer to<br />

receive information in communication verbally are 46,2%, but<br />

those who prefers to receive information by mail are 38,5 %, no<br />

one prefers using Skype. Next question is about how do<br />

employees prefer to communicate. The responses are similar to<br />

the previous ones: 7,7% prefer to communicate online, 30,8%<br />

Face to Face (F2F), 46,2% F2F&online and 15,4% said that it<br />

doesn’t matter. This comes to the conclusion that most of the<br />

respondents prefer to receive information and to communicate by<br />

using electronic technologies. But, in regards to communication<br />

with some colleagues, 53,8% of the respondents said that they<br />

prefer to communicate more via mail than F2F, about 30,8% can`t<br />

say, 15,4% don’t prefer to communicate via mail more than via<br />

F2F.<br />

It can be concluded that the team working environment is not so<br />

good and there is a presence of bad workplace relationships<br />

concerning some of the staff. Most of the respondents (84,6%)<br />

agree that “Better communication will improve time to finish<br />

work, quality of work and his/her labor cost”. “How often do you<br />

contact someone daily?”, 72,7% of the respondents need to<br />

contact someone at least 5 to 19 times per day. About 18,2% of<br />

them need to contact someone at work more than 50 times, which<br />

leads to the conclusion that about ¼ of the respondents dependent<br />

on communicating with other colleagues at work. The survey data<br />

showed that 92,3% feel happy to take part in community events<br />

and are always ready to support someone in her/his work. 61,5%<br />

of respondents said that his/her competency of working with tool<br />

and technology is extremely important to communicate effectively<br />

and for 38,5% they are important. The result is that technologies<br />

have the potential to improve communications at the workplace.<br />

6.2 Part 2 - Technologies, Tools and Web 2.0<br />

This part of the survey contains three subparts. The first subpart<br />

includes technologies (7 questions), the second one includes tools


(8 questions) and the third subpart includes web 2.0 (10<br />

questions).<br />

6.2.1 Technologies<br />

The point is to identify whether the administrators are familiar<br />

with technologies or not. The data showed that the majority of the<br />

respondents are familiar with the technologies. Map creation<br />

software is the least one that is being used at work (no one uses<br />

it), Microsoft Project (9,1%). Word processing software is used at<br />

work (36,4%) and 66,7% of the respondents use it at work & at<br />

home equally. The most used at work is electronic mail software<br />

and spreadsheet software, out of total 63,6% use electronic mail<br />

software at work and 36,4% use it equally at work and at home.<br />

6.2.2 Tools<br />

“How often do you use the tool in your work activities: during the<br />

whole day, half of the day, ¼ of the day, less than an hour or don’t<br />

use it?”. All respondents said that they use computer/laptop durind<br />

the whole day. 18,2% of total respondents said that they use<br />

mobile phones and Smartphones whole day, 9,1% of respondents<br />

use scaners actively. Less used are calculators, USB flash,<br />

electronic charts, map or attlases<br />

6.2.3 Web 2.0<br />

In this subpart of the survey, the questions are related to web 2.0.<br />

Are the employees familiar with web 2.0, do they use web 2.0 at<br />

work or do they not use it? The data shows that, some of them are<br />

well familiar, whereas others are not. 10% of respondent know<br />

about the Blogging, Online virtual games and worlds, Media<br />

sharing and social media software. Most of respondents are<br />

familiar with blogging and social media software but do not use<br />

them. Social networking (Facebook; LinkedIn; My space) is the<br />

most used by the respondents. Out of the total 41,7% use social<br />

networking at home. No one has blog. The survey data shows that<br />

most of the respondents are familiar with web 2.0 applications<br />

but, don`t use them at work. Despite that some of Web 2.0<br />

applications are not allowed to be used at the workplace, the<br />

respondents know about them and used some of them for years.<br />

33,3% of respondents declare that they have Skype account since<br />

3 to 4 years, 33,3% have Skype account for more than 5 years.<br />

Out of the total, 16,4% of the respondents have Facebook account<br />

for more than 5 years.<br />

307<br />

6.3 Part 3 – Technologies, Tools and Web 2.0<br />

Use at the Workplace Communications<br />

Third part of the survey (7 questions) point the effect of<br />

communications based on the technologies, tools and web 2.0<br />

uses. 33,3% of respondents strongly agree, that better<br />

communications will improve mostly working community and<br />

team working (25%). 75% of respondents declare they agree that<br />

the information flows transparency will be improved, 83,3% agree<br />

that information exchange difficulties will be diminished. Out of<br />

the total, 58,3% agree that better communications affect personal<br />

fulfillment, 66,7% agree that misunderstanding along the<br />

communications channels will decrease. 50% of employees<br />

declare that team working will be improved. Only 8,3% of them<br />

strongly disagree that better communications will improve<br />

personal fulfillment.<br />

6.4 Part 4 - Willingness to Learn<br />

Fourth part of the survey includes 8 questions. The survey data<br />

shows that the majority of the respondents strongly agree to learn<br />

in order to improve their knowledge, skills and competencies. The<br />

respondents agree that knowledge and competencies about new<br />

technologies, tools and web 2.0 will indirectly influence work<br />

efficiency. All respondents agree that they would spend time to<br />

learn, no negative response. Of the total, 16,7% are interested in<br />

learning about technologies, 8,3% are interested in tools, 8,3%<br />

are interested in web 2.0. Most of respondents (58,3%) would<br />

spend 6 hours weekly to learn, 16,7% would spend 2 hours<br />

weekly, 16,7% would spend 10hours, and only 8,3% would<br />

spend more than 10 hours weekly. “In case that you enroll in a<br />

learning course for technology, tools and Web 2.0, who will<br />

benefit from it?” 60% of respondents said that the benefit will be<br />

for him/her personally and the organization, 40% said that the<br />

benefit will be for him/her, organization and services.<br />

7. CONCLUSION<br />

This research paper tried to identify technologies, tools and web<br />

2.0 which support public administration communications, while<br />

focusing on the people in the process (Figure 7). Additionally to<br />

the eAdministration and public administration 2.0 literary review,<br />

an investigation within O*NET database was done. The paper<br />

looks at the key issue that the public administrators need not only<br />

to be knowledgeable, highly qualified, skilled and competent for<br />

doing their job, but much more to be familiar and prepared for<br />

using technologies, tools and mostly web 2.0 applications,<br />

relevant to his/her occupation at workplace.


Figure 7. Public Administration 2.0 workplace communications model<br />

Based on the technologies, tools and web 2.0 investigated in<br />

O*NET, an empirical survey was conducted at “Information<br />

services and technologies” Directorate at Sofia Municipality. The<br />

survey showed that the employees apply in their daily<br />

communications most of the analyzed technologies and tools. But<br />

it is identified a little gap in the knowledge of web 2.0<br />

applications. The employees agree that the efficient<br />

communications are a key gateway to success in their work. One<br />

of the most important conclusions is that there exists a potential<br />

for improving communications and that the staff is willing to learn<br />

in order to acquire new knowledge, new skills and develop<br />

competencies in the field of technologies, tools and web 2.0<br />

related to his/her occupation. The survey results do not tend to be<br />

a representative for all public administration offices. The results<br />

are related only to a particular administrative office, “Information<br />

services and technologies” Directorate at Sofia Municipality,<br />

where it was held, but they are a good base for more complex<br />

study at a district or a national level.<br />

8. ACKNOWLEDGMENTS<br />

Thanks to Research laboratory "Technologies and standards for elearning"<br />

TU-Sofia for support in this research. Thanks to Sofia<br />

Municipality, “Information services and technologies” directorate<br />

for support in the research implementation and respond to the<br />

request to participate in this study.<br />

9. REFERENCES<br />

[1] Batorski, M., D.Hadden, Embracing Government 2.0:<br />

Leading transformative change in the public sector, Grant<br />

Thornton LLP, 2010,<br />

http://grantthornton.com/staticfiles/GTCom/Public%20sector<br />

/Gov20Jan2010.pdf<br />

[2] Berlo, D., Civil Servant 2.0 New ideas and practical tips for<br />

working in government 2.0, Civil Servant 2.0 beta Action<br />

steps towards government 2.0, Programma Ambtenaar 2.0,<br />

2008,<br />

http://api.ning.com/files/j8isrYTD1gKgWBE7i2qmYhTXlW<br />

d45ExM*v7-<br />

308<br />

8uXVfuOMwo8kjaOW9sascpHM*IkbLkhb9KchUvIe5gxyo<br />

GROF-CuU0b*SnPe/CivilServant2.0.pdf<br />

[3] Chui, M., A.Miller, and R.Roberts, McKinsey Quarterly: Six<br />

Ways to Make Web 2.0 Work, 2009,<br />

http://www.scribd.com/doc/12599205/McKinsey-Quarterly-<br />

Six-Ways-to-Make-Web-20-Work-Feb-2009-Issue<br />

[4] Constantinides, E., The Web 2.0 as Marketing Tool:<br />

Opportunities for SMEs, The 16th Annual High Technology<br />

Small Firms Conference, 2008,<br />

http://<strong>proceedings</strong>.utwente.nl/96/1/Constantinides.pdf<br />

[5] Digital Communities, Government 2.0: Building<br />

Communities with Web 2.0 and Social Networking, 2008,<br />

http://media.govtech.net/Digital_Communities/assets/DC08_<br />

PAPER_CIO_TASK_10.27.pdf<br />

[6] Dovey,T., W. Eggers, Deloitte Research – Web 2.0: The<br />

future of collaborative government, Discussion Summary<br />

Washington, DC, 2009,<br />

http://www.deloitte.com/assets/Dcom-<br />

UnitedStates/Local%20Assets/Documents/us_ps_web20gove<br />

rnment_March2009.PDF<br />

[7] eGov4Dev, "eGovernment for Development Information<br />

Exchange" Project, University of Manchester's Institute for<br />

Development Policy and Management,<br />

http://www.egov4dev.org/success/definitions.shtml<br />

[8] Frissen, V., et al., The Future of eGovernment. An<br />

exploration of ICT-driven models of eGovernment for the<br />

EU in 2020, European Communities, Joint Research Centre<br />

Institute for Prospective Technological Studies, 2007,<br />

http://ftp.jrc.es/EURdoc/eur22897en.pdf<br />

[9] Huijboom, N., et al., Public Services 2.0: The Impact of<br />

Social Computing on Public Services, 2009,<br />

http://ftp.jrc.es/EURdoc/JRC54203.pdf<br />

[10] Internal Communications Survey, Brookdale Community<br />

College, 2006,


http://ux.brookdalecc.edu/governance/Governance%20Gazett<br />

e%20Page_files/2005-2006/ColLifeSurv.pdf<br />

[11] Joint Information Systems Committee,<br />

http://www.jisc.ac.uk/whatwedo/themes/eadministration.aspx<br />

[12] Ministry of Transport, Information Technology and<br />

Communications Bulgaria, Available from:<br />

http://www.mtitc.government.bg/page.php?category=454<br />

[13] Miron, L., D.Ţicu, The Communication in Public<br />

Administration in Urban Areas, European Integration -<br />

Realities and Perspectives, 2012,<br />

http://www.<strong>proceedings</strong>.univdanubius.ro/index.php/eirp/article/view/1275/1250<br />

[14] Misuraca, G., A. Reid & M. Deakin, Exploring emerging<br />

ICT-enabled governance models in European cities, Analysis<br />

of the Mapping Survey to identify the key city governance<br />

policy areas most impacted by ICTs, EU European<br />

Commission Joint Research Centre Institute for Prospective<br />

Technological Studies, 2011<br />

[15] Musaraj, A., Communication processes, public<br />

administration and performance evaluation, University<br />

Pavaresia, Albania, Academicus International Scientific<br />

Journal, http://www.academicus.edu.al/nr3/Academicus-<br />

MMXI-3-028-037.pdf<br />

[16] NETCOACH,<br />

http://www.netcoach.eu.com/index.php?id=233<br />

[17] O*NET OnLine,<br />

http://www.onetonline.org/find/career?c=4&g=Go<br />

[18] Occupational Information Network,<br />

https://onetmxdev.rti.org/about.cfm<br />

[19] Osimo, D, Web 2.0 in Government: Why and How?,<br />

European Commission Joint Research Centre Institute for<br />

309<br />

Prospective Technological Studies, © European<br />

Communities, 2008, http://ftp.jrc.es/EURdoc/JRC45269.pdf<br />

[20] Petru, F., The role of communication for the managerial<br />

process effectiveness of public administration, 2007,<br />

http://steconomice.uoradea.ro/anale/volume/2007/v1economics-and-business-administration/64.pdf<br />

[21] Ruskov, P., Groupware, Edited by “UNWE” Sofia, Bulgaria,<br />

ISBN 954-494-324-2, p.16-17, 1998 (in Bulgarian)<br />

[22] Shoikova, E., M.Krumova, O*NET and Competency Based<br />

Education, Annual journal of electronics, ISSN 1313-1842,<br />

p.145-151, 2010<br />

[23] Shoikova, E., M.Krumova, Overview of the Occupational<br />

Information Network, Annual journal of electronics, ISSN<br />

1313-1842, p.152-156, 2010<br />

[24] Sofia Municipality, http://www.sofia.bg/en/index_en.as<br />

[25] Špaèek, D., J. Špalek, Communication and Electronic Public<br />

Administration: Some Issues in the Context of the Czech<br />

System of Public Administration,<br />

http://unpan1.un.org/intradoc/groups/public/documents/nispa<br />

cee/unpan027501.pdf<br />

[26] United Nations E-Government Survey 2012 E-Government<br />

for the People, United Nations, 2012, p.3, p.29, Available<br />

from:<br />

http://unpan1.un.org/intradoc/groups/public/documents/un/un<br />

pan048065.pdf, p.7-8<br />

[27] World Bank,<br />

http://web.worldbank.org/WBSITE/EXTERNAL/TOPICS/E<br />

XTINFORMATIONANDCOMMUNICATIONANDTECH<br />

NOLOGIES/EXTEGOVERNMENT/0,,contentMDK:205071<br />

53~menuPK:702592~pagePK:148956~piPK:216618~theSite<br />

PK:702586,00.html


Transforming City Government: A Case Study of Philly311<br />

Taewoo Nam<br />

Center for Technology in Government<br />

University at Albany, SUNY<br />

187 Wolf Road, Suite 301<br />

Albany, NY12205, United States<br />

+1-518-442-3892<br />

tnam@ctg.albany.edu<br />

ABSTRACT<br />

This paper describes the transformation of a city government led<br />

by a 311 program, which provides a consolidated channel for nonemergency<br />

services and information. The paper first discusses the<br />

concept of “smart city” as a foundation for the examination of the<br />

311 program as a practice of government innovation. The paper<br />

then presents the details of the 311 program as instantiated in the<br />

City of Philadelphia. In-depth interviews with Philadelphia City<br />

government officials and managers responsible for creating and<br />

operating the City’s 311 system (Philly311) offer insights into the<br />

contributions the system is making to a more efficient, effective,<br />

transparent, accountable, and collaborative city government.<br />

Performance data provided by Philly311 enables more efficient<br />

resource allocation and informed decision making. Philly311 is<br />

credited with making the process of service delivery more<br />

transparent to the public, and providing traceability of requested<br />

services which imbues service departments with a sense of<br />

accountability. Service level agreements are providing measurable<br />

standards of municipal services and are used to support<br />

accountability in terms of service status. Regular reviews of<br />

service level agreements and content of the system are also<br />

recognized as promoting interdepartmental collaboration. 311<br />

systems are broadly recognized as powerful tools to engage<br />

residents in improving their neighborhoods. Institutionalizing<br />

interdepartmental collaborations emerged from the interviews as a<br />

critical capability in advancing from the initiation stage of<br />

Philly311-like systems to operations and refinement.<br />

Categories and Subject Descriptors<br />

H.4.2 [Information Systems Applications]: Type of systems —<br />

e-government applications.<br />

General Terms<br />

Management, Performance, Human Factors, Theory.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

310<br />

Theresa A. Pardo<br />

Center for Technology in Government<br />

University at Albany, SUNY<br />

187 Wolf Road, Suite 301<br />

Albany, NY12205, United States<br />

+1-518-442-3892<br />

tpardo@ctg.albany.edu<br />

Keywords<br />

311, Non-emergency service, Contact center, Customer service,<br />

Smart city, Service level agreement, E-government, City<br />

government.<br />

1. INTRODUCTION<br />

The phrase “smart city” is used more and more regularly by<br />

elected officials, civil society, the private sector, and academia.<br />

Regardless of this emerging trend, there is no agreed-upon<br />

description of what “smart” implies in the context of a single city.<br />

Some recent conceptual studies have discussed a city’s smartness<br />

[1,4,6,17,20,21]. In these studies, a smart city is broadly<br />

understood as improvements in city infrastructure including<br />

information and communication infrastructures, and physical<br />

infrastructures such as roads, bridges, and buildings, services such<br />

as utilities, social services, and transportation, and a variety of<br />

resources such as natural resources, financial resources, cultural<br />

resources, and human capital. However, the concept of a smart<br />

city is still abstract and even ambiguous.<br />

There is another reason for the lack of agreement around the<br />

“smart city” concept. A smart city often comes across as a<br />

normative claim. People want the cities they are living in to be<br />

smarter; they want to close the gap between their current status<br />

and their expectations. Smart city strategies—e.g., integrating<br />

critical infrastructures and services, consolidating systems, and<br />

interconnecting networks—are emerging as responses to a variety<br />

of complex problems such as crime, health concerns, pollution,<br />

aging populations, deteriorating infrastructure, and traffic<br />

congestion, that cities are currently facing due to dense<br />

congregations of people in spatially limited areas [24]. The<br />

desirable status of being “smart” is an outcome sought by the<br />

public and city officials alike. In this sense, increasing attention is<br />

being paid to those city governments who are successful in<br />

transforming their cities through “smart city” initiatives.<br />

Discussions of and certainly research about smart cities must pay<br />

attention to the characteristics of the city governments that make<br />

their city smarter. Previous studies of smart cities emphasize<br />

smartness of government, administration, and public management<br />

as core factors in the creation of a smart city [6,20,21].<br />

Adopting the view of a smart city as one that has more innovative,<br />

more efficient, and more effective government, this paper<br />

employs a case study of Philly311, the City of Philadelphia’s 311<br />

non-emergency contact program, among a variety of current and<br />

best practice examples of government efforts to make cities<br />

smarter. The concept of “smart city” is used as a foundation for


the examination of the 311 program as a practice of government<br />

innovation, based on a review of current thinking about the<br />

dimensions and components of smart cities. Philly311 is,<br />

according to the Mayor of Philadelphia, Michael Nutter, one of<br />

his flagship initiatives being carried out to make the City smarter.<br />

A case study based on qualitative data from semi-structured<br />

interviews with the City’s executives, Philly311 staff, and<br />

managers of other related departments allows for a close<br />

examination of how the Philly311 service is helping make<br />

Philadelphia a smarter city.<br />

The remainder of this paper is structured into six sections. Section<br />

2 draws on recent research to outline the characteristics of a smart<br />

city and a smart government. Section 3 presents the methodology<br />

used in the study and introduces the case. Section 4 presents the<br />

case analysis with a particular focus on changes observed in city<br />

management and service delivery in the City of Philadelphia and<br />

considered to be consequences of the implementation of<br />

Philly311. Section 5 discusses challenges the City is facing in<br />

operating Philly311 and also opportunities Philly311 offers.<br />

Section 6 further discusses the impacts made by Philly311 as one<br />

instance of smart city initiatives. Section 7 concludes this paper.<br />

2. CONCEPTUALIZING SMART CITY<br />

AND GOVERNMENT<br />

Since we consider a smart city as transformation and innovation in<br />

city government, we use the “smart city” concept as a foundation<br />

to describe a practice of government innovation—in this paper,<br />

Philly311. This section introduces and discusses a set of working<br />

definitions of a smart city, followed by a review of the core<br />

components constituting the concept of a smart city derived from<br />

both academic and practical research. Finally, we discuss how a<br />

smart government is recognized as one of the core capabilities of<br />

a smart city.<br />

Table 1. Working definitions of a smart city<br />

� “An urban area functioning and articulated by modern<br />

information and communication technologies in its various<br />

verticals, providing ongoing efficient services to its population”<br />

[2].<br />

� “A city well performing in a forward-looking way in economy,<br />

people, governance, mobility, environment, and living, built on<br />

the smart combination of endowments and activities of selfdecisive,<br />

independent and aware citizens” [12: p. 11].<br />

� The foundational concepts are instrumented, interconnected,<br />

and intelligent city. “Instrumented refers to sources of near-realtime<br />

real-world data from both physical and virtual sensors.<br />

Interconnected means the integration of those data into an<br />

enterprise computing platform and the communication of such<br />

information among the various city services. Intelligent refers to<br />

the inclusion of complex analytics, modeling, optimization, and<br />

visualization in the operational business processes to make<br />

better operational decisions” [15: p. 1].<br />

� “A city striving to make itself ‘smarter’ (more efficient,<br />

sustainable, equitable, and livable)” [Natural Resources<br />

Defense Council: smartercities.nrdc.org]<br />

� “The use of Smart Computing technologies to make the critical<br />

infrastructure components and services of a city––which<br />

include city administration, education, healthcare, public safety,<br />

real estate, transportation, and utilities––more intelligent,<br />

interconnected, and efficient” [24: p. 2].<br />

311<br />

Several working definitions of a smart city can be found in the<br />

literature (see Table 1). They share some features as well as have<br />

some unique aspects. For example, while Giffinger et al. [12]<br />

view a smart city as one performing in a “forward-looking” way,<br />

the Natural Resources Defense Council considers “smarter” as<br />

more efficient, sustainable, equitable, and livable. Harrison et al.<br />

[15] conceptualize a smart city in a technological sense as<br />

instrumented, interconnected, and intelligent. Similarly,<br />

Washburn et al. [24] see a smart city as intelligent,<br />

interconnected, and efficient.<br />

The definitions from Anavitarte and Tratz-Ryan [2], Harrison et<br />

al. [9], and Washburn et al. [24] each emphasize the role of<br />

information and communication technologies (ICTs). The<br />

technologies include smart computing [24] and a range of<br />

instruments such as sensors, kiosks, meters, personal devices,<br />

appliances, cameras, and smart phones [15]. In sum, a smart city<br />

is defined with some key elements including meanings of<br />

smartness in the urban context, the role of technologies in making<br />

a city smarter, domains that need to be smart, and infrastructures<br />

and services that are provided to the population.<br />

The definitions taken together provide a roadmap for cities<br />

seeking to become smarter. Washburn et al. [24] highlight seven<br />

key areas where cities are investing in becoming “smarter”<br />

including city administration, education, healthcare, public safety,<br />

real estate, transportation, and utilities. Giffinger et al. [12]<br />

identifies six key aspects of a city where smart cities are seeking<br />

to have an impact from their investments: economy, people,<br />

governance, mobility, environment, and living. Chourabi et al. [6]<br />

put forth eight components of a smart city: technology,<br />

management and organization, governance, policy, people and<br />

communities, economy, built infrastructure, and natural<br />

environment.<br />

The components of a smart city included in the definitions are<br />

further specified in both academic literature and practical reports.<br />

Recent studies discuss definitional components and conceptual<br />

dimensions of a smart city. Nam and Pardo [20] suggest three<br />

conceptual dimensions of a smart city—i.e., technological<br />

artifacts, people and communities, and institutional<br />

arrangements—by exploring a wide array of recent research<br />

focusing on a smart city and/or similar (often interchangeably<br />

used) labels such as an intelligent city, innovative city,<br />

information city, knowledge city, and creative city, among others.<br />

Nam and Pardo [20] consider a smart city as a more<br />

comprehensive concept comprising such diverse similar labels.<br />

Technology is central to defining a smart city, but a smart city<br />

cannot be built simply through the use of technology. Importantly,<br />

technology is a means to enable social, environmental, economic,<br />

and cultural progress. Smart cities thus must be capable of<br />

sustaining such progress across the diversity of components and<br />

conceptual dimensions [1,17]. Along with this view, smart city<br />

initiatives driven by municipal governments can be characterized<br />

as innovation in multiple dimensions—i.e., technology,<br />

management, and policy [21].<br />

Three smart city ranking tools and frameworks merit attention as<br />

comprehensive sets of components of smart cities. The ranking<br />

system to score European medium-sized (population between<br />

100,000 to 500,000) cities (www.smart-cities.eu) includes six<br />

categories of smart city evaluation indicators: economy<br />

(competitiveness), people (social and human capital), governance<br />

(participation, transparent governance, the functioning of the


administration), mobility (transportation and ICT), environment<br />

(natural resources, environmental protection, sustainable resource<br />

management), and living (quality of life, cultural facilities, health,<br />

safety) [12]. IBM’s core city systems are categorized into three<br />

systems: operating systems (city services system comprising<br />

public service management and local government administration),<br />

user systems (citizens system comprising health, education and<br />

public safety, and business system), and infrastructure systems<br />

(transport system, communication system, water system, and<br />

energy system) [8,9]. In IBM’s framework, city governance and<br />

city strategy connect across the seven systems. Forrester<br />

Research’s white paper [24] suggests seven critical infrastructure<br />

components and services of a smart city including city<br />

administration, education, healthcare, public safety, real estate,<br />

transportation, and utilities.<br />

Table 2 compares the comprehensive sets of smart city<br />

components suggested by Chourabi et al. [6], European mid-sized<br />

city evaluation tool [12], IBM [8,9], and Forrester [24]. While<br />

each includes technology and government as components (public<br />

service management and local government administration), each<br />

model also stresses unique components.<br />

Table 2. Components of a smart city<br />

Chourabi et<br />

al. [6]<br />

European<br />

mid-sized<br />

cities [12]<br />

IBM [8,9] Forrester<br />

[24]<br />

Technology √ √ √ √<br />

Management &<br />

administration<br />

√ √ √ √<br />

Governance √ √ √<br />

City services √ √ √<br />

People and<br />

communities<br />

√ √<br />

Economy √ √<br />

Built<br />

environment<br />

√ √<br />

Natural<br />

√ √<br />

environment<br />

Note. City services broadly include transportation, safety, heath, water,<br />

energy, housing, and culture.<br />

As shown in Table 2, one of core components of a smart city is a<br />

smart government because a city government is a central actor<br />

that plays a pivotal role to lead and coordinate smart city<br />

initiatives and efforts. In the IBM core city system that Dirks et al.<br />

[9] suggested, the concept of a smart government comprises<br />

public service management and local government administration<br />

as key components. Thus city management and city services can<br />

be identified as two main dimensions of a smart government.<br />

Some previous conceptual studies defined the dimensions of<br />

management and service in smart city activities. Since a smart city<br />

is considered urban innovation, smart city initiatives can be<br />

characterized as government innovation in management and<br />

services [21]. Nam and Pardo [21] considered a smart city in the<br />

aspect of government management as enhancing efficient,<br />

effective management both in front-office and back-office<br />

operations of city government. They also defined managerial<br />

innovation of a smart government as “a mechanism to create<br />

managerial and organizational capabilities for effective use of<br />

technological tools and conditions” [21: p. 187]. On the other<br />

hand, Dirks et al. [8] defined a city services system as “the<br />

312<br />

operational activities and coordination of service delivery<br />

provided by the city authority” (p. 5). In particular, smart service<br />

means “tailoring services to the needs of individual citizens” and<br />

“using technology to integrate the information systems of<br />

different service delivery agencies to enable better services for<br />

citizens [8: p. 11].<br />

In line to these concepts of management and service as smart<br />

government dimensions, many discussions of a smart government<br />

have been recently made. According to Chourabi et al. [6],<br />

management and organization of a city government and its<br />

governance with other actors are key success factors of smart city<br />

initiatives. The smart city model suggested by Giffinger et al. [12]<br />

underscores smart governance as a larger category including a<br />

smart government. The smart governance component comprises<br />

participation in decision making and transparent governance. In<br />

the model of Giffinger et al. [12], the quantifiable measure of<br />

transparent governance represents citizen satisfaction with<br />

transparency of bureaucracy and with fight against corruption.<br />

Washburn et al. [24] saw efficient management of city operations<br />

and effective delivery of city services as key to smart government:<br />

An efficient city administration that provides services to<br />

its citizens and fosters businesses is essential to<br />

today’s service-based economy. A smart government<br />

service is informed about its city’s condition and is able<br />

to reach its citizens effectively. A core component of<br />

this function is using communication and collaboration<br />

technologies to manage city operations. … Moreover, it<br />

uses data and scientific analysis in all phases of the<br />

decision-making process to improve the economy and<br />

quality of life. (p. 5–6)<br />

Thus smart city administration should contribute to greater<br />

efficiency, effectiveness, and the improvement in decision<br />

making. Dirks et al. [9] identify local government expenditure and<br />

staff as prerequisites of a smart government. Elements of the<br />

smart system for management and operation include coordinated<br />

service delivery, e-government application, and the use of ICT for<br />

service delivery. Outcomes of a smart government appear as<br />

increased efficiency and effectiveness of service delivery [9: p. 5].<br />

To sum, a smart government is expected to increase efficiency,<br />

effectiveness, and transparency in organizational management and<br />

service delivery. A smart government also may promote<br />

coordination and collaboration among city departments and with<br />

other external organizations and citizens. Thus a smart<br />

government can facilitate non-governmental entities’ participation<br />

in decision making and monitoring of service delivery. In this<br />

sense, a smart government should include governance with both<br />

internal (within government) and external actors.<br />

Reflecting on this discussion, we create the metrics of assessing a<br />

smart government and will use it to the case of Philly311, as<br />

exhibited in Table 3.<br />

Efficiency<br />

Table 3. Metrics for assessing a smart government<br />

Effectiveness<br />

Transparency<br />

Governance<br />

Management Service


3. CASE STUDY METHOD<br />

This study uses case study methodology to understand why and<br />

how a social phenomenon of interest occurs [25]. The method<br />

helps develop preliminary understanding. Given the emerging<br />

nature of 311 contact centers and the paucity of academic research<br />

on the service centers, case study methodology is an appropriate<br />

approach to conducting this exploratory research [25]. This study<br />

is also inductive so that it contributes to building new<br />

understanding. This section describes data collection, data<br />

analysis, and the case of Philly311 non-emergency contact center.<br />

3.1 Data Collection<br />

In order to identify the relevant interview participants, purposive<br />

sampling was employed. Because of the relative newness of the<br />

research theme, the sampling technique is needed to identify and<br />

target individuals who could provide important information to<br />

understand the social phenomenon [11]. The director of Philly311<br />

as an initial informant was asked to recommend others who have<br />

sufficient information and knowledge in various aspects of 311<br />

operation. Interview participants were selected to avoid redundant<br />

knowledge and maximize new knowledge. Interviewees from<br />

different levels and functions include executive-level officials (the<br />

mayor, the managing director, and the deputy director), Philly311<br />

staff members (director, operation manager, and technology<br />

expert), and representatives of other service departments<br />

(commissioner and chief of staff) related to 311 operations.<br />

In December 2011, the authors conducted 16 semi-structured<br />

interviews with city government officials and managers with<br />

responsibility for managing and operating the City of<br />

Philadelphia’s 311 service center, Philly311. Each face-to-face<br />

interview lasted approximately one hour, and additional<br />

information was collected through follow-up email<br />

communication.<br />

Data was collected using the protocol jointly developed by the<br />

multinational “Smart Cities Service Integration” research team,<br />

which aims to explore the processes of smart city initiatives and<br />

their impacts on cities, people, and city governments. The study of<br />

Chourabi et al. [6] provides a conceptual background of the<br />

interview protocol. Table 4 presents a summary of interview<br />

questions included in the interview protocol.<br />

Table 4. Sample interview questions<br />

Categories Questions<br />

Case<br />

description<br />

� How did Philly311 start?<br />

� What are the main goals of Philly311?<br />

� What organizations are involved and how?<br />

Smart city � What does it mean for a city to be smart?<br />

� What are characteristics of a smart city?<br />

Management<br />

and<br />

organization<br />

� How is Philly311 organized and managed?<br />

(probes: organizational structure, business<br />

process, workflow, progress tracking, staffing,<br />

training, funding, etc.)<br />

� What organizational challenges is Philly311 facing<br />

in achieving its objectives?<br />

� How are those challenges being overcome?<br />

Technology � How is information and communication technology<br />

being used for Philly311? (probes: service<br />

channels, data analysis tools, system integration,<br />

social media use, etc.)<br />

313<br />

� What are the barriers or challenges to using<br />

technologies for Philly311?<br />

Governance � How is Philly311 governed? (probes: governing<br />

body, governance model, decision making<br />

process, and conflict resolution process)<br />

� What’s the authority and role of staff, partners,<br />

and stakeholders?<br />

� How are citizens and other organizations involved<br />

in Philly311?<br />

Policy � What is the relationship between Philly311 and the<br />

policy environment?<br />

Context � How does the larger environment of Philly311<br />

influence Philly311? (e.g., cultural, social, political,<br />

economic, demographic contexts)<br />

People and<br />

communities<br />

� How does Philly311 affect and is affected by the<br />

population and communities of the City?<br />

Economy � What is the impact of Philly311 on the City’s<br />

economy?<br />

Natural<br />

environment<br />

� How does Philly311 affect the City’s natural<br />

environment?<br />

The team also established criteria for case selection including a<br />

focus on service provision, transportation, and human services and<br />

selected cases must have a service integration component that<br />

crosses the boundaries of agencies within a city. Philly311 as a<br />

direct service delivery project and with a focus on city-level<br />

service integration met the selection criteria.<br />

3.2 Case Analysis<br />

Interviews were transcribed and analyzed following an inductive<br />

logic approach and using grounded theory techniques. Employing<br />

a qualitative analysis software tool (Atals-ti), we did a systematic<br />

iterative process of joint coding and analysis to minimize personal<br />

bias. Grounded theory refers to theory that is developed<br />

inductively from empirical data, and the grounded theory<br />

approach is a method of using empirical data without<br />

preconceived theories to generate or discover a theory [13,22].<br />

For this research, coding refers to a process of labeling,<br />

separating, compiling, categorizing, and organizing qualitative<br />

data [5,7,18]. Descriptive codes are used so that interview<br />

transcripts were coded in sentence or multi-sentence chunks.<br />

Glaser and Strauss [13] suggested the four stages of grounded<br />

theory analysis as follows:<br />

• Codes: identifying anchors that allow the key points of the<br />

data to be gathered<br />

• Concepts: collections of codes of similar content that allows<br />

the data to be grouped<br />

• Categories: broad groups of similar concepts that are used<br />

to generate a theory<br />

• Theory: a collection of explanations that explain the subject<br />

of research<br />

Corresponding to the research logic, Table 5 describes the scheme<br />

of this grounded theory analysis.<br />

Table 5. The scheme for the grounded theory analysis<br />

Categories Concepts Codes emergent from the data


Smart<br />

management<br />

Smart service<br />

delivery<br />

Technological<br />

factors<br />

Organizational<br />

factors<br />

Governance<br />

factors<br />

Efficient<br />

management<br />

Effective<br />

management<br />

Transparent<br />

management<br />

Managerial<br />

governance<br />

Efficient service<br />

delivery<br />

Effective service<br />

delivery<br />

Transparent<br />

service delivery<br />

Governance in<br />

service delivery<br />

Technological<br />

challenges<br />

Technological<br />

opportunities<br />

Organizational<br />

challenges<br />

Technological<br />

opportunities<br />

Governance<br />

challenges<br />

Governance<br />

opportunities<br />

Efficient resource allocation; saving<br />

budget; saving human resource;<br />

business process change<br />

Informed decision making; datadriven<br />

management; performance<br />

management; business process<br />

change<br />

Anti-corruption; integrity;<br />

transparency; open government;<br />

service level agreement<br />

Interdepartmental collaboration;<br />

external partnership; service level<br />

agreement<br />

Service integration; channel<br />

consolidation; shared service<br />

capability<br />

Customer-oriented service;<br />

professionalism; internal customers;<br />

external customers<br />

External accountability; internal<br />

accountability; service level<br />

agreement<br />

Citizen engagement; neighborhood<br />

engagement; community<br />

engagement; neighborhood liaison<br />

Under-equipping; cost of upgrading<br />

back-office technologies; timing of<br />

investment of the right technology at<br />

the right time; the digital divide<br />

Channel diversification; emerging<br />

technologies; smart phone<br />

Limited funding; limited operation;<br />

limited staffing; cultural conflict;<br />

interdepartmental difference<br />

Business process change; datadriven<br />

culture; performance-driven<br />

culture; customer-oriented culture<br />

Interdepartmental conflict; the lack<br />

of a formal governing body; informal<br />

interdepartmental collaboration;<br />

more burden for extensive data<br />

analysis<br />

Relational governance; mutual<br />

understanding; citizen engagement<br />

3.3 Case Description<br />

Philadelphia is one of the last cities of its size to activate a 311<br />

non-emergency toll-free number. On the last day of 2008, the<br />

mayor and the managing director of the City opened Philly311 as<br />

a concrete step toward the administration’s strategic goal of<br />

smarter, faster, and better government through customer service,<br />

government efficiency, and accountability. The basic idea—<br />

giving the public a direct way to request services or complain and<br />

using their feedback to hold government accountable—was not<br />

entirely new to Philadelphia. The City already had customer<br />

hotlines, but there was no single, consolidated contact point. The<br />

new 311 contact center absorbed the City Hall Switchboard, the<br />

Mayor’s Action Center, the Department of Licenses and<br />

Inspections’ customer line, and part of the Department of Streets’<br />

customer line. Philly311 offers various ways to contact the City:<br />

phone, in person (Philadelphia is one of a few cities with a walk-<br />

314<br />

in center), email, short message service (SMS), and social media<br />

(Twitter).<br />

4. PHILLY311 AND TRANSFORMING<br />

GOVERNMENT<br />

This section shares some of the finding from the interviews with<br />

Philly311 officials. Overall we heard about two kinds of changes<br />

in resulting in part from the Philly311 initiative; changes in<br />

management and service delivery. The 311-driven changes<br />

discussed below are expounded first in terms of efficiency,<br />

effectiveness, transparency, and governance (See Table 6).<br />

Table 6. Philly311: driving innovation<br />

Efficiency � Efficient use and<br />

allocation of resources<br />

Effectiveness � Informed decision<br />

making<br />

� Data-driven<br />

management<br />

Transparency � Anti-corruption and<br />

integrity<br />

Governance � Internal collaboration<br />

� External partnership<br />

Management Service Delivery<br />

� Frontline service<br />

integration<br />

� Shared services<br />

� Customer-oriented<br />

service<br />

� Professionalism<br />

� Internal and external<br />

accountability<br />

� Citizen engagement<br />

� Neighborhood<br />

engagement<br />

4.1 311-Driven Changes in Management<br />

The 311 service center is recognized as helping other departments<br />

use their resources more efficiently and effectively. One of<br />

Philly311’s objectives involves allowing agencies and<br />

departments to focus on their core mission and manage their<br />

workload efficiently (see www.phila.gov/311). Just as Baltimore’s<br />

original motive for launching its 311 was to reduce the crush of<br />

calls flooding into 911, Philly311 allows Philadelphia’s 911<br />

center to devote their resources to life-threatening and urgent<br />

situations. Philly311 also enables the City Council (the City’s<br />

legislative body) to use their resources more effectively, by saving<br />

their budget and staff time spent on facilitating constituent<br />

services. According to interviewees, this has freed Council<br />

resources, primarily the time of Council members, to other<br />

important needs of city residents.<br />

Furthermore, the information Philly311 provides to other<br />

departments is driving internal business process changes. One<br />

Philly311staff person gave an example of how Philly311 is<br />

contributing to informed decision making in the departments by<br />

helping them easily find hot spots.<br />

[XX department] had a fairly random process in how<br />

they prioritize replacement of street lights. Once we<br />

provide data, we are able to provide GIS map. That<br />

shows where the calls come from—hot spots. They can<br />

visually see the clusters. Now they have a data source.<br />

The data source actually gave them an opportunity to<br />

say “we need to do this.” Always right places.<br />

Interviewees consider Philly311 as crucial to their larger citywide<br />

performance management efforts. Data pulled from Philly311 can<br />

expose what residents care about most. This data is used to


discuss departmental performance at PhillyStat meetings, where<br />

the mayor, the managing director, relevant deputy mayors, and<br />

representatives from the departments and agencies meet regularly<br />

to track and monitor operational performance. The City’s<br />

performance management program now relies heavily on data<br />

from Philly311 and this type of data-driven management changes<br />

the roles of public managers. With the data provided by Philly311,<br />

they act as data managers and process managers as much as direct<br />

problem solvers.<br />

Philly311’s contribution to a smart government involves raising<br />

transparency and integrity in government processes. “[People]<br />

don’t need to know anybody anymore to get services,” said one of<br />

the executive-level interviewees. “Just call 311!” Other<br />

interviewees also agreed that Philly311 transforms the way the<br />

City does its business. Before 311, many citizens did not know<br />

where they should start to request a service. For service requests,<br />

some took advantages of contacting a council person as a<br />

representative of their community. Philly311 has become an<br />

equalizing strategy. Since its launch, citizens can see more clearly<br />

how their government works through Philly311. One interviewee<br />

said,<br />

People didn’t understand the process. The internal<br />

process was mystery. For example, we got a request—<br />

fix that property. We can say here is the process.<br />

Philly311 does that. That’s transparency. Now people<br />

can see what’s happening in the government.<br />

From a managerial perspective becoming a smarter city involves<br />

interdepartmental collaboration. In the case of Philly311, this<br />

takes the form of written service level agreements that codify each<br />

function of the City’s key service departments (i.e., Streets,<br />

Licenses and Inspections, Police, Water, Parks and Recreation,<br />

and Fairmount Park) with a specific timeframe for completion. A<br />

service level agreement refers to “an agreement between the<br />

provider of a service and its customers which quantifies the<br />

minimum quality of service which meets the business need” [16:<br />

p. 14]. It is also considered a formal contract between a service<br />

provider and its customers [14]. Philly311 staff collaborate on<br />

reviewing, updating, and revising both the formal contracts<br />

between Philly311 and other departments and the knowledgebase<br />

for readily available responses to service and information<br />

requests, through regular meetings with internal partners who are<br />

key to citizen service (the departments on service level<br />

agreements).<br />

The review and revision process allows those departments to learn<br />

about Philly311 operations and in turn allows Philly311 to learn<br />

about other departments’ jobs. Philly311 staff listen to them and<br />

work to understand their concerns. The partnership for the service<br />

level agreements increases transparency across city departments.<br />

“We get everybody’s input. People bring their concerns into the<br />

table,” said one Philly311 staff person. “We own the system and<br />

they own the content.” Hence the partnership of Philly311 with<br />

other departments is built, in part, on the integration of the<br />

departmental knowledge (content) into the 311 system.<br />

The management of Philly311 has been supported by strategic<br />

partnerships with external organizations. In the early stages of<br />

Philly311, private sector partners helped finalize a detailed<br />

strategy and implementation plan. They also contributed to<br />

relieving the burden on Philly311 caused by under-staffing,<br />

providing some of their experienced agents (on-loan call agents).<br />

Philly311 call agents benefited from private sector best practices,<br />

315<br />

and in turn the on-loan agents from private call centers learned<br />

more about how the City works. From the preparation period of<br />

Philly311 through its kick off to the present, the partnerships with<br />

the private sector has offered a mentoring opportunity for<br />

Philly311 agents and supervisors.<br />

4.2 311-Driven Changes in Service Delivery<br />

The 311 service center serves both as a front-line contact center<br />

and as a shared service center. Not only does it integrate frontline<br />

services by providing quick and easy access to non-emergency<br />

municipal services and information through a single, consolidated<br />

channel, but it also creates capabilities for shared service, which<br />

denotes “a generic service that is jointly developed by public<br />

agencies and can be used many times in different business<br />

processes of various government agencies” [19: p. 32]. Services,<br />

including the development costs of such services, can be shared<br />

by multiple agencies to avoid the redundant investments in similar<br />

functionality. Philly311 provides shared services to city<br />

departments through its consolidated channel for service requests<br />

and complaints. Shared services promise chiefly three benefits:<br />

reduced costs, improved quality of services, and fewer distractions<br />

[3,10,23]. One interviewee addressed Philly311’s moderate (but<br />

not as much as expected) effect in saving the City’s administrative<br />

costs.<br />

Shared services strategies are based on service level agreements.<br />

The agreements stipulate service standards that are measurable<br />

and can be used to support accountability (e.g., response times).<br />

For instance, a residential property that is not being maintained<br />

must be investigated by the Department of Licenses and<br />

Inspections within forty-five days. A dead animal must be<br />

removed by the Department of Streets in three days and an<br />

abandoned vehicle within thirty days. Similar to this, if a<br />

department has agreed in its service level agreements to deal with<br />

a citizen’s service task in X number of days, the customer should<br />

be informed of that service standard. The department is held<br />

accountable to complete the service in that amount of time or<br />

provide information back to Philly311 as to why the service could<br />

not be completed in the agreed-upon amount of time. City<br />

agencies perform hundreds of tasks, but Philly311 only handles<br />

the ones for which it can hold an agency accountable to the<br />

previously agreed upon service standard and timing.<br />

The 311 system serves for customers as an effective contact point.<br />

One of executive-level interviewees viewed Philly311 as an<br />

interaction tool, by saying “[Philly311] connects people to<br />

government as much as possible. It is interactive to see what’s on<br />

people’s minds.” Through integration of multiple channels for<br />

municipal services and information, Philly311 serves as a main<br />

gate to residents, businesses, and visitors of the City. As well,<br />

Philly311 becomes a front line of service agents reachable via the<br />

toll-free phone line and often digital media. One of the Philly311<br />

launch project team members said:<br />

311 is a front door. Before 311, Philadelphia had<br />

hundreds of front doors. Most were blocked, not open<br />

at all. The City created the best face of the front door<br />

for the City.<br />

The interviews highlighted the agreement among Philly311 staff<br />

that everybody is their customer—not just citizens, businesses and<br />

visitors to the City but other city departments as well. As evidence<br />

of this commitment, the mayor created a unique position among<br />

311 programs; the Chief Customer Service Officer. This role is


currently filled by Philly311’s Director. Given the Director’s dual<br />

roles, organizational responsibility for Philly311 extends to<br />

inspiring all city government officials to view themselves as city<br />

ambassadors who play a major role in building and maintaining<br />

the relationship with those who live in or do business with the<br />

City. Philly311 as a city agency also invests in building customer<br />

service skills through its Customer Service Leadership Academy,<br />

training customer service agents throughout city government. The<br />

program imbues them with customer service professionalism.<br />

Philly311, according to city officials, also serves an accountability<br />

role. For external accountability, callers, senders of emails and<br />

text messages, and walk-in customers receive a tracking number<br />

for their service request. This number allows requestors to followup<br />

either by calling back to the Philly311 Center or visiting the<br />

311 homepage. One executive-level interviewee said, “People<br />

want to see government working in a more connected through<br />

technology.”<br />

For internal accountability, data collected from Philly311 is used<br />

in conjunction with the PhillyStat process to track, evaluate, and,<br />

if necessary, correct service patterns in the departments. PhillyStat<br />

is the City’s performance review program in which the top<br />

leadership members participate. 1 During each regular meeting for<br />

performance management of PhillyStat, city leaders review<br />

departmental performance metrics and progress toward the<br />

mayor’s strategic goals, and each department has the<br />

responsibility to account for their performance in front of the<br />

City’s executives with respect to service standards put forth in the<br />

service level agreements. The guidelines described in the service<br />

level agreements and their use by departments, Philly311 and the<br />

PhillyStat process create a holistic accountability program that<br />

was noticeably absent before 311.<br />

The consolidated channel for non-emergency service and<br />

information requests enables and empowers people to engage in<br />

their communities. As one Philly311 staff member said “311<br />

enables citizens to become involved in their neighborhood by<br />

reporting a problem they see.” Respondents discussed how<br />

citizens are seeing how reporting a problem can impact the<br />

neighborhood—for example, requests for removing graffiti from a<br />

local park or clearing up a vacant property that can be potentially<br />

a place for crime—they are further inspired to become involved in<br />

improving the neighborhood they live in. They talked about the<br />

relationship between 311 services and citizen engagement in<br />

neighborhood environments around such issues as built<br />

infrastructure, public safety, and public facilities. With Philly311,<br />

according to city officials, citizens are seeing in a new way the<br />

connection between their efforts and the quality of life in their<br />

community.<br />

One of Philly311’s unique characteristics is its neighborhood<br />

liaison program. A neighborhood liaison serves their community<br />

by reporting issues directly to the Philly311 system (oftentimes on<br />

behalf of their neighbors) and provides the community with<br />

progress reports. Becoming a Philly311 liaison is open to any<br />

1 There are two types of PhillyStat meetings. PhillyStat Outcomes a<br />

high-level review of the Mayor’s goals and outcomes. PhillyStat<br />

Ops is an operational review of one department or agency, where<br />

performance targets are assessed in five key areas—operations,<br />

human resources, finance and budget, technology, and customer<br />

service within the individual department.<br />

316<br />

residents willing to participate in a two-hour training session,<br />

through which they are made familiar with various city<br />

departments and the electronic reporting system. Neighborhood<br />

liaisons have become important actors in the community by<br />

combining their new training with what they know about their<br />

neighborhoods and the wants and needs of the community more<br />

and better than outsiders. One Philly311 staff person said:<br />

The liaisons are community leaders. We train them to<br />

use our system. They have ability to put information<br />

directly into our system. That’s our strong connection in<br />

a different way of outreach. Multiple sources of<br />

information are embedded in neighborhoods.<br />

The neighborhood liaisons have become contact points for<br />

capturing and integrating service requests. They are critical to<br />

connecting the 311-enabled integrated services with the service<br />

needy, often poor, technology-illiterate, and living in distressed<br />

neighborhoods.<br />

5. CHALLENGES AND OPPORTUNITIES<br />

Philly311 was established under a very tight timeframe—11<br />

months from February to December in 2008. No other city of<br />

Philadelphia’s size launched a 311 center operation under such<br />

time pressure. The aggressive timeline itself was not a serious<br />

problem alone, but early challenges arose from unexpected global<br />

financial crisis. The subsequent budget crisis experienced by the<br />

whole city meant scaling back or postponing key elements of the<br />

project. The budget gap created two severe challenges: understaffing—six<br />

agents short of the operational goal of 57 agents and<br />

recruitment based on internal transfers of inexperienced agents<br />

from other departments—and under-equipping—the use of old<br />

Customer Relationship Management (CRM) software.<br />

These challenges continued through to the present, but according<br />

to interviewees, the first year of Philly311 still provided a set of<br />

practical lessons about how a city with similar challenges could<br />

launch and operate a 311 system. They spoke of the critical role of<br />

strong executive support, strategic partnership with external<br />

organizations, and adaptation and flexibility in staffing and<br />

equipping in mitigating these challenges. One Philly311 founding<br />

official noted:<br />

We clearly could not move forward with upgrading with<br />

our CRM, and we didn’t change our recruitment<br />

strategies. The budget crisis impacted us in a<br />

significant way, but we were still able to achieve a<br />

majority of outcomes.<br />

These outcomes are the changes made by Philly311 in<br />

management and service delivery, as discussed in the preceding<br />

section. The major challenges and concerns faced in Philadelphia<br />

as they worked to transform their city government through 311 are<br />

introduced and discussed below followed by a discussion of new<br />

opportunities for change being uncovered in the current phase.<br />

5.1 Technology<br />

The technological challenges identified were primarily related to<br />

under-equipping. In particular, Philly311 wanted to upgrade back<br />

office software such as the CRM and database systems for<br />

information sharing. One Philly311 staff claimed, “We need the<br />

right technology at the right time.” Interviewees discussed how<br />

the City is recognizing an increasing number of Internet users<br />

accessing Philly311 through their smart phones instead of desktop


or laptop computers. Internet connection through mobile phones is<br />

increasingly being viewed as a strategy for closing the digital<br />

divide in the City. The extension of the 311 system to smart<br />

phones was considered by interviewees as a way to further<br />

promote citizen engagement and active feedback of 311 services<br />

from citizens, while also reaching out to a new segment of the<br />

community.<br />

5.2 Management and Organization<br />

Budgetary constraints generated organizational challenges in<br />

recruiting qualified call center agents and keeping call center<br />

operations open for 24 hours a day, 7 days a week. While these<br />

staffing challenges have continued since the launch of Philly311,<br />

the interviews revealed a new and related challenge. Philly311 as<br />

a city agency has a unique organizational culture distinguishable<br />

from other departments and agencies, because it serves as a leader<br />

and pioneer of customer services in the City government.<br />

According to one Philly311 staff person, call center agents may<br />

feel that they have to comply with a more rigorous internal<br />

standard for excellence in customer services, which is not required<br />

in other departments.<br />

Philly311 may offer government employees a new opportunity to<br />

see their job differently. The way service departments do their<br />

business changes due to the 311 center. Directors and managers in<br />

the city departments are seeing their job in a more efficient,<br />

effective, and transparent way. For example, one of Philly311’s<br />

missions is to “provide recommendations into ways to improve<br />

City government through accurate, consistent measurement and<br />

analysis of service delivery citywide” (see www.phila.gov/311).<br />

By the measurement and analysis, Philly311 helps city<br />

departments have better understanding of what they are doing and<br />

what others are doing. According to one executive-level<br />

interviewee, Philly311 is driving a cultural change in the whole<br />

city government to data-based, performance-driven, and<br />

customer-oriented culture, but that isn’t coming at a short horizon,<br />

given the interdepartmental differences in organizational culture.<br />

5.3 Internal and External Governance<br />

Internal governance-related and also cross-organizational<br />

challenges mostly lie in interdepartmental or interagency<br />

collaboration. A formal governance body for such collaboration<br />

does not exist, but instead some staff members of Philly311 meet<br />

key people from the departments on the service level agreements<br />

in a regular basis. Philly311 staff identified this process as<br />

informal. The City government considers expanding the scope of<br />

services and information provided by Philly311 by including more<br />

departments in the service level agreements. The process through<br />

which the current service level agreements were created is based<br />

on interdepartmental collaboration. To establish the<br />

interdepartmental agreements, Philly311 staff identified<br />

potentially high volume customers (departments) and contacted<br />

them. Through the meetings, Philly311 staff decided who has<br />

knowledge of city services and information. This process has been<br />

semi-regularized, but not based on a formal process. With this<br />

informal process, there is a challenge in bringing new service<br />

departments into the service level agreements, because Philly311<br />

does not have a formal governance body for organizing new<br />

interdepartmental collaboration and cooperation. The mechanism<br />

for interdepartmental workings on revising and updating the<br />

service level agreements currently relies on relational<br />

governance, which refers to governance by commitment, mutual<br />

317<br />

dependence, trust, and interpersonal relationships [14].<br />

Interviewees agreed the process has worked well so far, but<br />

recognized that the process needs to be formalized for expansion<br />

of the service level agreements and Philly311 functions.<br />

On the other hand, the interdepartmental governance around<br />

Philly311 allows Philly311 and the departments in the service<br />

level agreements to create mutual understandings of their jobs.<br />

The series of informal meetings have provided those city<br />

departments with a valuable opportunity for mutual learning.<br />

Furthermore, some Philly311 staff said the interagency<br />

relationship has shifted from competitive on customer services to<br />

complementary. At the beginning of Philly311, other departments<br />

and agencies had a concern that Philly311 takes their own jobs.<br />

Now the mutual learning has developed an understanding that<br />

Philly311 does help their jobs. In addition, Philly311’s past three<br />

years have changed the City Council’s early perception of the 311<br />

center and other departments as well. The City Council does not<br />

concentrate their energies any more on routine constituent<br />

services that they dealt with before 311 by receiving service<br />

requests and complaints pertinent to Council districts. Philly311<br />

reports to the City Council about the status of customer service<br />

delivery by Council districts, and the Council members appreciate<br />

data and information pulled from 311 as an effective tool to better<br />

understand their constituents.<br />

Another side of governance formed by Philly311 indicates the<br />

increasing interactions with citizens. Philly311 provides a new<br />

way by which citizens are involved in their neighborhood<br />

concerns. Philly311 receives requests for service, which may be<br />

the reports of community problems residents see: for example,<br />

removing graffiti, clearing up a vacant property, moving a vacant<br />

car, replacing a street light, and so on. Among them, some<br />

requests, despite a small portion in call volumes, reflect concerned<br />

citizens’ ideas and suggestions for improving neighborhood<br />

environments beyond reporting immediate problems. This citizen<br />

engagement category of calls to 311 merits attention from city<br />

managers, but inbound calls are currently analyzed in terms of the<br />

two main categories (information requests and service requests).<br />

Categorizing some calls into citizen engagement and further<br />

analyzing those calls in depth needs additional efforts of<br />

Philly311 agents.<br />

6. DISCUSSIONS<br />

While a growing number of conceptual studies are exploring cities<br />

and the meaning of being a “smart city”, relatively few studies are<br />

engaging in empirical investigations of smart city activities. A<br />

variety of existing theories and theoretical models of urban<br />

innovation are being considered by scholars in terms of their<br />

relevancy to city-level initiatives being carried out in the interest<br />

of becoming “smarter”. A challenge to such efforts is that, as of<br />

Table 7. Challenges and opportunities of Philly311<br />

Technology � Timing in upgrading<br />

software and systems<br />

Management<br />

and<br />

organization<br />

Challenges Opportunities<br />

� Limited funding<br />

� Cultural differences<br />

between 311 and other<br />

departments<br />

� New technologies to<br />

bridge the digital divide<br />

� Business process<br />

change<br />

� Change to data-based,<br />

performance-driven,<br />

and customer-oriented<br />

culture


Internal and<br />

external<br />

governance<br />

� Reliance on informal<br />

processes in<br />

interdepartmental<br />

collaboration<br />

� Additional efforts for<br />

analyzing calls for<br />

citizen engagement<br />

� Strengthening relational<br />

governance in<br />

interdepartmental<br />

collaboration<br />

� Providing a new way to<br />

citizen engagement<br />

yet, there is no consensus on what constitutes a “smart city”.<br />

Grounded in rich evidence from semi-structured interviews, this<br />

study considers Philly311 as a smart city initiative that contributes<br />

to making the city of Philadelphia more efficient, effective, and<br />

transparent and facilitating city-level governance. The study also<br />

suggests a model, grounded on empirical evidence without<br />

preconceived theories [13,22], to understand smart city programs.<br />

Figure 1. A smart city program model<br />

Organizational<br />

factors<br />

Technological<br />

factors<br />

Smart City Program<br />

To Make a City Government Smarter Efficiency<br />

Effectiveness<br />

Smart City<br />

Management<br />

Smart City<br />

Service Delivery<br />

Transparency<br />

Governance<br />

Cross-organizational<br />

factors<br />

This study explored impacts of a smart city initiative in the form<br />

of a 311 non-emergency service program. Philly311 as a smart<br />

city program is enabling more effective and efficient management<br />

while also informing service delivery strategies. It is also deeply<br />

embedded in a set of technological, organizational and managerial,<br />

and internal and external governance-related factors.<br />

The Philly311 service center serves residents, business, and<br />

visitors as a convenient front line of municipal services. Tailoring<br />

frontline services to the needs of individual citizens is a key to<br />

smart city service delivery [8]. Philly311’s back-end functions<br />

enable the city to gain more efficiency and effectiveness by<br />

allocating and using managerial and operational resources in a<br />

smarter way, based on performance data. City management<br />

leveraging these smart cities strategies and capabilities is thus<br />

contributing to efficiency, effectiveness, and the improvement in<br />

decision making [24]. Enhancing transparency and accountability<br />

of service delivery through Philly311 is also one of the ways to<br />

Philadelphia is becoming smarter. Enhanced transparency and<br />

accountability of city administration contributes to smart<br />

governance [12]. Externally, Philly311 allows citizens to engage<br />

more easily in their neighborhoods and communities. Internally,<br />

Philly311 enables and promotes interdepartmental collaboration<br />

and cooperation. Based on the practice in Philly311, this study<br />

suggests that a characteristic of a smart city engages various<br />

internal (city agencies) and external (individual citizens and civic<br />

groups) stakeholders in making community-related decisions [12].<br />

Some positive changes made by Philly311 are not without<br />

challenge, especially in terms of technology, management, and<br />

governance. This finding can be extended to practical implications<br />

for smart city initiatives. Budgetary constraints and under-<br />

318<br />

equipped technical conditions have continued since the launch of<br />

Philly311. While some smart city programs such as the 311 nonemergency<br />

contact centers consume capital budget, others may be<br />

conducted in a resource-saving way. The case of Philly311 offers<br />

various lessons for smart city practitioners. With the growing<br />

importance of Philly311 as a smart city program of the city, the<br />

data-driven and customer service-oriented culture is increasingly<br />

being imbued across the whole city government of Philadelphia.<br />

Mitigating inter-organizational tensions and conflicts is also vital<br />

to smart city management. In the case of Philly311, internal<br />

governance enables interdepartmental efforts toward producing<br />

service level agreements. Current informal governance<br />

mechanisms leave much room for improvement. To gain much<br />

attention and guarantee active participation of all related actors, a<br />

smart city program needs to be formalized and institutionalized by<br />

a city government.<br />

Philly311 also offers new ways to engage even more citizens in<br />

neighborhood issues. The challenge for cities is in understanding<br />

how best to create new policies and administrative processes to<br />

ensure as well as leverage such engagement. While the whole city<br />

government obviously takes benefits from Philly311 by making<br />

operational management and service delivery smarter, the 311<br />

service center exposes both challenges and opportunities.<br />

7. CONCLUSION<br />

Philly311 is being used as crucial part of the city administration’s<br />

strategy to transform the city government into a smarter, faster<br />

and better city. Interviews with key actors in the creation and<br />

operation of Philly311 shed light on its contribution to a smart<br />

government and ultimately a smart city. According to the<br />

interviewees, a smart government involves operating in a more<br />

efficient, effective, transparent, and open governance-facilitating<br />

way. In this paper, we suggested preliminary understanding of<br />

smart city initiatives in the context of the City of Philadelphia and<br />

its 311 non-emergency contact center. The understanding should<br />

be extended and generalized to other smart city programs. Further<br />

research will focus on more diverse cases of 311 contact centers.<br />

We will revisit findings from this study and extend them through<br />

comparative analysis with additional 311 service center cases as<br />

well as service integration efforts more generally.<br />

8. ACKNOWLEDGMENTS<br />

We thank the many City of Philadelphia government officials who<br />

spent time with us and openly shared their perspectives and<br />

valuable insights on Philly311, PhillyRising, and PhillyStat<br />

programs. We are also grateful to all members of the multinational<br />

research project titled “Smart Cities Service Integration.”<br />

This study is partially supported by a grant from the Social<br />

Sciences and Humanities Research Council (SSHRC) of Canada<br />

and the home institutions of researchers who jointly work on the<br />

multi-national research project. The views and conclusions<br />

expressed in this paper are those of the authors and do not<br />

necessarily reflect the views of the SSHRC or the home<br />

institutions of other researchers.<br />

9. REFERENCES<br />

[1] Allwinkle, S. and Cruickshank, P. (2011). Creating smart-er<br />

cities: An overview. Journal of Urban Technology, 18(2), 1–<br />

16.


[2] Anavitarte, L. and Tratz-Ryan, B. (2010). Market Insight:<br />

‘Smart Cities’ in Emerging Markets. Gartner. Available at<br />

www.gartner.com/id=1468734.<br />

[3] Bergeron, B. P. (2003). Essentials of Shared Services.<br />

Hoboken, NJ: John Wiley & Sons, Inc.<br />

[4] Boulton, A., Brunn, S. D., and Devriendt, L. (2011).<br />

Cyberinfrastructures and “smart” world cities: Physical,<br />

human, and soft infrastructures. In P. Taylor, B. Derudder,<br />

M. Hoyler & F. Witlox (Eds.), International Handbook of<br />

Globalization and World Cities. Cheltenham, UK: Edward<br />

Elgar.<br />

[5] Charmaz, K. (1983). The grounded theory methods: An<br />

explication and interpretation. In R. M. Emerson (Ed.)<br />

Contemporary Field Research: A Collection of Readings.<br />

Boston: Little, Brown.<br />

[6] Chourabi, H., Nam, T., Walker, S., Gil-Garcia, J. R.,<br />

Mellouli, S., Nahon, K., Pardo, T. A., and Scholl, H. J.<br />

(2012). Understanding smart cities: An integrative<br />

framework. In Proceedings of the 45th Hawaii International<br />

Conference on System Sciences (pp. 2289–2297), January 4–<br />

7, Maui, Hawaii, USA.<br />

[7] Denzin, N. K. (2007). Grounded theory and the politics of<br />

interpretation. In A. Bryant & K. Charmaz (Eds.), The Sage<br />

Handbook of Grounded Theory. London: Sage.<br />

[8] Dirks, S. and Keeling, M. (2009). A Vision of Smarter Cities:<br />

How Cities Can Lead the Way into a Prosperous and<br />

Sustainable Future. Somers, NY: IBM Global Business<br />

Services.<br />

[9] Dirks, S., Keeling, M., and Dencik, J. (2009). How Smart is<br />

Your City?: Helping Cities Measure Progress. Somers, NY:<br />

IBM Global Business Services.<br />

[10] Dollery, B. and Akimov, A. (2008). Are shared services as a<br />

panacea for Australian local government? A critical note on<br />

Australian and international empirical evidence.<br />

International Review of Public Administration, 12(2), 89–99.<br />

[11] Floersch, J., Longhofer, J., Kranke, D., & Townsend, L.<br />

(2010). Integrating thematic, grounded theory and narrative<br />

analysis. Qualitative Social Work, 9(3), 407–425.<br />

[12] Giffinger, R., Fertner, C., Kramar, H., Kalasek, R., Pichler-<br />

Milanović, N., and Meijers, E. (2007). Smart Cities: Ranking<br />

of European Medium-Sized Cities. Vienna, Austria: Centre of<br />

Regional Science (SRF), Vienna University of Technology.<br />

[13] Glaser, B. G., & Strauss, A. L. (1967). The Discovery of<br />

Grounded Theory: Strategies for Qualitative Research.<br />

Chicago: Aldine.<br />

319<br />

[14] Goo, J., Kishore, R., Rao, H. R., and Nam, K. (2009). The<br />

role of service level agreements in relational management of<br />

information technology outsourcing: An empirical study.<br />

MIS Quarterly, 33(1), 119–145.<br />

[15] Harrison, C., Eckman, B., Hamilton, R., Hartswick, P.,<br />

Kalagnanam, J., Paraszczak, J., and Williams, P. (2010).<br />

Foundations for Smarter Cities. IBM Journal of Research<br />

and Development, 54(4), 350–365.<br />

[16] Hiles, A. N. (1994). Service level agreements. The TQM<br />

Magazine, 6(2), 14–16.<br />

[17] Hollands, R. G. (2008). Will the real smart city please stand<br />

up? Intelligent, progressive or entrepreneurial. City, 12(3),<br />

303–320.<br />

[18] Holton, J. A. (2007). The coding process and its challenges.<br />

In A. Bryant & K. Charmaz (Eds.), The Sage Handbook of<br />

Grounded Theory. London: Sage.<br />

[19] Janssen, M. and Wagennar, R. (2004). Developing generic<br />

shared services for e-Government. Electronic Journal of e-<br />

Government, 2(1), 31–38.<br />

[20] Nam, T. and Pardo, T. A. (2011a). Conceptualizing smart<br />

city with dimensions of technology, people, and institutions.<br />

In Proceedings of the 12th Annual International Conference<br />

on Digital Government Research, June 12–15, College Park,<br />

MA, USA.<br />

[21] Nam, T. and Pardo, T. A. (2011b). Smart city as urban<br />

innovation: Focusing on management, policy, and context. In<br />

Proceedings of the 5th International Conference on Theory<br />

and Practice of Electronic Governance, September 26–28,<br />

Tallinn, Estonia.<br />

[22] Strauss, A., & Corbin, J. (1998). Basics of Qualitative<br />

Research: Techniques and Procedures for Developing<br />

Grounded Theory (2nd ed.). Thousand Oaks, CA: Sage.<br />

[23] Walsh, P., McGregor-Lowndes, M., and Newton, C. J.<br />

(2008). Shared services: Lessons from the public and private<br />

sectors for the nonprofit sector. The Australian Journal of<br />

Public Administration, 67(2), 200–212.<br />

[24] Washburn, D., Sindhu, U., Balaouras, S., Dines, R. A.,<br />

Hayes, N. M., and Nelson, L. E. (2010). Helping CIOs<br />

Understand “Smart City” Initiatives: Defining the Smart<br />

City, Its Drivers, and the Role of the CIO. Cambridge, MA:<br />

Forrester Research.<br />

[25] Yin, R. K. (2009). Case Study Research: Design and<br />

methods (4th ed.). Thousands Oaks, CA: Sage.


Session 11<br />

IT Governance & Policy


A Literature Review: IT Governance Guidelines and Areas<br />

Ruben Pereira<br />

Instituto Superior Tecnico<br />

Av. Rovisco Pais, 1049-001 Lisboa<br />

+351 966474901<br />

rubenfspereira@ist.utl.pt<br />

ABSTRACT<br />

Lack of business/IT (BIT) alignment affects e-governance<br />

initiatives success. Information Technology Governance (ITG)<br />

has been recognized as a CIO top-10 issue for more than five<br />

years and has risen in priority between 2007 and 2009. Several<br />

Frameworks exist to help organizations in ITG implementation<br />

but lack scientific viewpoint, are complex, and also overlap each<br />

other. In this paper we make a literature review to leverage the<br />

ITG general guidelines and main ITG areas in order to provide a<br />

scientific viewpoint validation. We also evaluate our artefacts<br />

with expert’s interviews in order to provide practitioner viewpoint<br />

validation, and map our artifact with current theories. Finally, we<br />

conclude our research with main contributions and future work.<br />

Categories and Subject Descriptors<br />

H.1.0 [Models and Principles]: General.<br />

General Terms<br />

Management, Performance, Design, Standardization, Theory.<br />

Keywords<br />

IT, Governance, Management, IT Governance Guidelines,<br />

Literature Review, IT Governance Areas, e-Governance<br />

1. INTRODUCTION<br />

Many organizations have become totally reliant on IT for success<br />

and recognize that IT is becoming one of their main<br />

organizational assets [34][16]. However, government bodies have<br />

limited expertise in IT and are slow to leverage their potential for<br />

improving governance what can be fatal for organizations wishing<br />

to implement e-Governance solutions [31][23]. BIT alignment<br />

becomes crucial and ITG has been identified as an appropriate<br />

solution to deal with increasing IT changes and complexity. The<br />

purpose of this paper is to examine both the previous and the<br />

current research in ITG so a basis for further research and the<br />

identification of the main ITG guidelines and main ITG and<br />

Management (ITG/M) areas based on literature and experts’<br />

knowledge could be provided in order to help organization in<br />

future ITG implementations. Indeed, there are studies that show<br />

the positive effect of good ITG implementation in organizations<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

320<br />

Miguel Mira da Silva<br />

Instituto Superior Tecnico<br />

Av. Rovisco Pais, 1049-001 Lisboa<br />

+351 919671425<br />

mms@ist.utl.pt<br />

[50][27], nevertheless, there are also evidences that IT keep being<br />

badly managed and governed [29][14]. Such fact influences the<br />

success of e-Governance initiatives.<br />

Several Frameworks exist to help organizations in ITG<br />

implementation. However, organizations still prefer to design<br />

their own [5]. Such fact is not surprising since most Frameworks<br />

state that there is no single “best” IT organizational structure or<br />

governance arrangement because IT needs to respond to the<br />

unique environments within which exists [29][2] but don’t specify<br />

the factors that can influence each ITG implementation, are seen<br />

as complex [35], too general [32], lacking a theoretical foundation<br />

from a scientific viewpoint [17], and overlap each other [35].<br />

Such statements reinforce the possibility of improvements in the<br />

existing Frameworks.<br />

2. RESEARCH METHODOLOGY<br />

Few researchers attempted to perform empirical studies on ITG<br />

topic [6]. Hence, we constructed and evaluated new and<br />

innovative artifacts following the design research paradigm [21].<br />

Based on the four design artifacts produced by design science<br />

research in information systems - constructs, models, methods and<br />

instantiations - we will focus on constructs (ITG guidelines and<br />

ITG/M areas). Constructs are necessary to describe certain aspects<br />

of a problem domain [37], they provide the language in which<br />

problems and solutions are defined and communicated.<br />

The methodology applied is divided according to the two<br />

processes of design science research (build and evaluate). The<br />

literature review approach used in this paper follows the conceptcentric<br />

methodology of IS literature reviews as outlined in<br />

Webster and Watson [49]. In this article we evaluated our artifacts<br />

through interviews. In addition, by submitting scientific<br />

publications to respected international conferences, we also used<br />

the appraisal of the scientific community as evaluation criteria.<br />

3. LITERATURE REVIEW<br />

Since the 1990s ITG has been a concern. However, good ITG is<br />

no longer a “nice to have”, but a “must have” and can contribute<br />

to higher returns on assets at a time when business is spending<br />

increasing amounts on technology investment [48]. Indeed,<br />

Gartner states that ITG has been recognized as a CIO top-10 issue<br />

for more than five years and has risen in priority during the past<br />

two [16]. ITG potential is also in the fact that the most significant<br />

IT issues, currently and in the future, are not technology-related,<br />

but governance-related [18].<br />

3.1 IT Governance Guidelines<br />

Guidelines have been designed, used, and adopted in several<br />

domains [21][4][43]. As a result, they should be considered an<br />

instrument that ought not to be underestimated since guidelines


are necessary to obtain a uniformity regarding functionality, as<br />

well as a desired quality level [4]. Reviewing available literature<br />

on the subject under study is an essential part of developing<br />

guidelines which can be based on experience - either practical or<br />

theoretical [45]. We summarize our guidelines in Table 1.<br />

3.2 IT Governance/Management Main Areas<br />

Many frameworks exist and each one calls their processes/areas<br />

with different names which culminate in overlap and contribute to<br />

organization confusion as well as waste of resources [35].<br />

Therefore a formalization of ITG and ITM areas is needed. We<br />

summarize the ITG and ITM areas in Table 2.<br />

4. EVALUATION<br />

In order to validate our artefacts, besides the complete literature<br />

review and despite the little empirical work concerning ITG in the<br />

literature, we also mapped the artefacts with current theories and<br />

Table 2. Main ITG/M Areas summary<br />

Main Area Description Topics/subjects Literature Reference<br />

Strategy<br />

Management<br />

Service<br />

Management<br />

Resource<br />

Management<br />

Risk<br />

Management<br />

Development<br />

Management<br />

Architecture<br />

Management<br />

Project<br />

Management<br />

Quality<br />

Management<br />

Investment<br />

Management<br />

Outsourcing<br />

Management<br />

Support<br />

Management<br />

Compliance<br />

Management<br />

Improvement &<br />

Innovation<br />

Management<br />

Table 1. ITG Guidelines Summary<br />

Guidelines About what? What do we need? Literature Reference<br />

1 Where do we want to be? BIT objectives and vision<br />

BIT strategies<br />

BIT goals<br />

[34][41][27][48][16][12][43]<br />

[38][15][46][33]<br />

2 Where are we now?<br />

BIT alignment, maturity,<br />

BIT strategic plan<br />

Core competences, assess IT department and maturity,<br />

assess enterprise, assess BIT alignment<br />

[34][41][27][48] [16][12][43]<br />

[38][15][46][33]<br />

3 What do we need to get there?<br />

Structures, processes, and<br />

mechanisms<br />

Collect information about contingency factors of the<br />

organization, define the necessary mechanisms<br />

[1][13][9][29] [8][46][33] [2][22]<br />

4 How do we get where we want to be? IT processes Materialize the plan defined in the previous step [41][48][12] [44][43][15] [46][2]<br />

5<br />

How do we know we have arrived<br />

there?<br />

Metrics<br />

Measurements<br />

IT Balance Scorecard<br />

Enterprise Balance Scorecard<br />

[1][41][27][48] [44][8][39]<br />

[46][33][30]<br />

6<br />

Are we following the market’s best<br />

practices?<br />

Best practices<br />

Frameworks<br />

Be aware of best practices frameworks and standards [28][17][12] [8][11]<br />

7<br />

How do we know we are doing it<br />

right?<br />

Compliance<br />

Audit<br />

Audit regularly<br />

Internal and external compliance<br />

[41][36][24]<br />

8 How do we keep it on track?<br />

Improvement<br />

Innovation<br />

Collect information to I&I in order to prepare organization<br />

for current and future challenges<br />

[16][38][15] [2][24][19]<br />

Responsible for business/IT objectives and alignment, contingency<br />

factors, and other reasons pointed out as possible differentiators of ITGI.<br />

Responsible for service definition, service catalogue, service portfolio,<br />

service levels, and other subjects about provided services.<br />

Accountable for the correct management of the organization’s resources,<br />

like people, technology, applications, etc. Training is included.<br />

Responsible for the correct assurance of the business’ continuity by<br />

anticipating and preventing possible risks of the IT department, which are<br />

correlated with business risk.<br />

Responsible for the design and development of software as well as its<br />

maintenance.<br />

Responsible for the design of the necessary architectures for the good<br />

functioning of the IT department.<br />

Accountable for the management of the entire cross IT department<br />

project, all kinds of projects.<br />

Responsible for the assurance of the required procedures to guarantee<br />

functionality and provide services and products with the required quality.<br />

In charge of assuring the correct financial functioning of the IT<br />

department and of providing budget, costs, and financial plans.<br />

Manages all the aspects concerning outsourcers, as contracts, service<br />

levels, relations, etc.<br />

Responsible for user interaction and mainly keeps user satisfaction<br />

Accountable for the control of internal and external regulations, as well as<br />

report and measurement.<br />

Responsible for the management of the improvements and innovations<br />

that can be required or provided by the entire IT department.<br />

321<br />

also used the results of a series of experts interviews.<br />

We used structured interviews covering a diverse sample of<br />

organization types, sizes, and roles. By space limitations we won’t<br />

present interviewees details. The respondents have a lot of<br />

experience in the area. To support the interviews, we designed a<br />

questionnaire to lead the discussion. In the interviews, the<br />

majority of the questions weren’t open-response questions<br />

because of the nature of the information we need to elicit. The<br />

interviews were conducted over a one month period. Each session<br />

lasted from 60 to 90 minutes and was transcribed into digital data.<br />

We performed nine interviews with ITG experts who have<br />

strategic alignment and ITG knowledge in their organizations.<br />

Seven interviews were performed in Portugal and two in Ireland<br />

by Skype. The interviewees were 3 consultant organizations (1, 2<br />

and 7) and 6 non-consultant (3, 4, 5, 6, 8 and 9) organizations.<br />

Table 3 shows a summary of the results. We used “yes/no” to<br />

Demand Management, Market analyze,<br />

IT/Business strategy plan/definition/alignment<br />

Service Level Management<br />

Service Portfolio<br />

Human resource, Hardware, Software, Capacity<br />

and Configuration Mngt., Information Mngt.<br />

Disaster recovery, Backups and security<br />

Management, Business continuity, Identity and<br />

access Management<br />

Application Management<br />

Application maintenance<br />

IT architecture and engineering<br />

Infrastructure Management<br />

Project Portfolio Management<br />

Project Management<br />

Quality control<br />

Product Quality Management<br />

Portfolio and Value Mngt., Define budgets,<br />

Manage costs<br />

Manage contracts<br />

Control outsourcers<br />

Incident and Problem Mngt.<br />

Service desk<br />

[41][28][48][12][47]<br />

[39][15][46][2][11][19]<br />

[30]<br />

[34][24][26]<br />

[13][41][28][47][39][2]<br />

[19][30]<br />

[29][48][15][46][2]<br />

[11][30]<br />

[50][12][2]<br />

[13][41][12][47][39]<br />

[43][15][2]<br />

[13][41][16][12][39]<br />

[15][30]<br />

[42][40][7]<br />

[14][29][48][16][12]<br />

[15][39][46][2][24][30]<br />

[47][39][15][2][24]<br />

[20][3][10][25]<br />

Audit, Policy and Report Mngt., Internal Control [44][15][24]<br />

Analyze reports and options<br />

Prospection, Improvement and Innovation,<br />

Change Mngt<br />

[39][39][15][2][24][19]<br />

[30]


Interviewees<br />

Useful?<br />

Table 3. Interview Results<br />

Guidelines ITG/M Areas<br />

General?<br />

Complete?<br />

Remove step?<br />

Complete?<br />

Remove?<br />

Missing?<br />

1 Yes Yes Yes No No No Yes G G<br />

2 Yes Yes Yes No No No Yes G G<br />

3 Yes Yes No Yes Yes No No G G G G<br />

4 Yes Yes Yes No Yes No No G G<br />

5 No Yes Yes No Yes No No G G G<br />

6 Yes Yes Yes No Yes No No G G<br />

7 Yes Yes Yes No Yes No No G G G<br />

8 Yes Yes Yes No Yes No No G G G<br />

9 Yes Yes Yes No Yes No No G<br />

Strategy<br />

Investment<br />

highlight the positive and negative responses.<br />

The third interviewee was the only one to disagree with the<br />

proposed guidelines. He argued that guidelines 4, 6, and 8 are not<br />

needed and a new one about investment decision making between<br />

guideline 2 and 3 was missing. However, since we have strong<br />

literature support and only one interviewee mentioned this<br />

argument, we decided to keep the guidelines without changes. The<br />

fifth interviewee stated that such guidelines were not useful since<br />

COBIT already has guidelines with such abstraction. However<br />

COBIT has it for each COBIT process and not for general ITG<br />

implementation. Fifth, sixth and seventh interviewees affirmed<br />

that some factors were missing. Fifth, sixth and seventh<br />

interviewees stated that some factors were missing.<br />

Several conclusions could be withdrawn from the interviews:<br />

most of the interviews see the guidelines as useful, compete and<br />

general; Strategy Management and Investment Management are<br />

almost consensual between interviewees as the main ITG areas;<br />

all the areas without any appointment will be assumed as<br />

management areas<br />

This research provided us some important learning in ITG field.<br />

Based on both scientific and practitioner viewpoint with achieved<br />

the formalization of the contingency factors, ITG general<br />

guidelines and ITG/M main areas. Besides the consensual<br />

identification of the Strategy and Investment Management as ITG<br />

areas by practitioners, few other areas still dubiety in<br />

practitioner’s viewpoint.<br />

5. CONCLUSION<br />

Our research provides interesting contributions in a moment<br />

where BIT alignment becomes a crucial issue. The approach<br />

allows for a better understanding of the implementation of ITG in<br />

a corporate environment.<br />

Our artefacts are based on literature review giving them<br />

theoretical foundation. Yet, in order to keep providing practitioner<br />

viewpoint we also performed interviews with ITG experts. Then<br />

we argue that our artefacts were build under both scientific and<br />

practitioner viewpoint.<br />

Since current IT frameworks are complex and lack the correct<br />

initial roadmap with the identification of the general guidelines<br />

that organizations must follow in order to know what must be<br />

implemented or addressed first given the context of each<br />

organization, we argue that our general guidelines add valuable<br />

knowledge to ITG field and community. Moreover, current<br />

frameworks also overlap each other, then the formalization of the<br />

Compliance<br />

Risk<br />

Resource<br />

Architecture<br />

Innovation<br />

322<br />

main ITG/M areas also validated in both scientific and<br />

practitioner viewpoint is added value. Including BIT concerns in<br />

our artefacts we argue that we are proposing important artefacts in<br />

order to increase the e-Governance initiatives success in<br />

organizations.<br />

Future work must pass by the integration of the presented artefacts<br />

in an IT governance framework as well as a research in-deep of<br />

each identified area taking into consideration the most known<br />

frameworks applied in the area. Furthermore, real-world case<br />

studies should be performed.<br />

6. REFERENCES<br />

[1] Adams, C.R., Larson, E.C. and Xia, W. IS/IT Governance<br />

Structure and Alignment: An Apparent Paradox. MISRC,<br />

(2008).<br />

[2] Agarwal, R. and Sambamurthy, V. Principles and Models for<br />

Organizing the IT Function. MISQ 1(1), (2002).<br />

[3] Bartolini, C., Stefanelli, C. and Tortonesi, M. Analysis and<br />

performance improvement of the IT incident management<br />

process. In: TNSM, (2010), 132–144.<br />

[4] Bohl, O., Frankfurth, A., Schelhase, J. and Winand, U.<br />

Guidelines – A Critical Success Factor in the Development<br />

of Web-based Trainings. In: ICCE, (2002), 545–546.<br />

[5] Broussard, F.W. and Tero, V. Configuration and Change<br />

Management for IT Compliance and Risk Management: The<br />

Tripwire Approach. White Paper. IDC, 2007.<br />

[6] Brown, A.E. and Grant, G.G. Framing the Frameworks: A<br />

Review of IT Governance Research. CAIS 15, (2005),696-<br />

712.<br />

[7] Corea, S. and Levy, M. Quality of IT support for corporate<br />

environmental management: A paradigmatic framework. In:<br />

2nd ICDIM, (2007), 424–429.<br />

[8] Dahlberg, T. and Lahdelma, P. IT Governance Maturity and<br />

IT Outsourcing Degree: An Exploratory Study. In: HICSS,<br />

(2007), 236a.<br />

[9] De Haes, S. and Grembergen, W. Analysing the Relationship<br />

between IT Governance and Business/IT Alignment<br />

Maturity. In: 41st HICSS, (2008),428.<br />

[10] Diao, Y., Jamjoom, H. and Loewenstern, D. Rule-Based<br />

Problem Classification in IT Service Management. In:<br />

CLOUD, (2009), 221-228.<br />

[11] Fasanghari, M., NasserEslami, F. and Naghavi, M. IT<br />

Governance Standard Selection Based on Two Phase<br />

Clustering Method. In: 4 th NCM, (2008), 513-518.<br />

[12] Fink, K. and Ploder, K. Decision Support Framework for the<br />

Implementation of IT-Governance. In: HICSS, (2008), 432.<br />

[13] Gallagher, K.P. and Worrel, J.L. Organizing IT to Promote<br />

Agility. Inf. Tech. Manag. 9, 1 (2008),71-88.<br />

[14] Gao, S., Chen, J. and Fang, D. The Influence of IT Capability<br />

on Dimensions of Organization Structure.In: 2 nd FITME,<br />

(2009), 269-273.<br />

[15] Gerrard, M. Defining IT Governance: The Gartner IT<br />

Governance Demand/Supply Model. Gartner ID:G00140091,<br />

2010.<br />

[16] Gerrard, M. IT Governance, a Flawed Concept: It’s Time for<br />

Business Change Governance. GartnerID:G00171658 (2009)


[17] Goeken, M. and Alter, S. Representing IT Governance<br />

Frameworks as Metamodels. In: EEE’08, (2008),48-54.<br />

[18] Guldentops, E., Grembergen V. W. & De Haes, S.: Control<br />

and Governance Maturity Survey: Establishing a Reference<br />

Benchmark and Assessment Tool. ISCJ, 6, (2002), 32-35.<br />

[19] Guney, S. and Cresswell, A.M. IT Governance as<br />

Organizing: Playing the Game. In: 43rd HICSS, (2010), 1-10.<br />

[20] Gupta, R., Prasad, K.H. and Mohania, M. Automating ITSM<br />

Incident Management Process. In: ICAC, (2008), 141-150.<br />

[21] Hevner, A.R., March, S.T., Park, J. and Ram, S. Design<br />

Science in Information Systems Research. MISQ, 2, 1<br />

(2004),75-105.<br />

[22] Hosseinbeig, S., Karimzadgan-Moghadam, D., Vahdat and<br />

D., Moghadam, R.A. IT strategic alignment maturity and IT<br />

governance. In: 4th ICIS, (2011), 67-72.<br />

[23] Iyengar, J. and Gadgil, R. User Centered IT for the Public: A<br />

Corporate Partnership in e-Governance. In: ICTD, (2007), 1-<br />

6.<br />

[24] Jacobson, D.D. Revisiting IT Governance in the Light of<br />

Institutional Theory. In: 42 nd HICSS, (2009), 1-9.<br />

[25] Jun, L., Xiao, Li, L. and Jun, W. A problem classification<br />

approach in business service management. In: ICCASM,<br />

(2010), 354-356.<br />

[26] Lahtela, A., Jantti, M. and Kaukola, J. Implementing an<br />

ITIL-Based IT Service Management Measurement System.<br />

In: 4th ICDS, (2010), 249 - 254.<br />

[27] Lingyu, H., Bingwu, L., Ruiping, Y. and Jianzhang, W. An<br />

IT Governance Framework of ERP System Implementation.<br />

In: CCIE, (2010), 431-434.<br />

[28] Losso, S. and Goeken, M. Application of Best-Practice<br />

Reference Models of IT Governance. In: 18th ECIS (2010).<br />

[29] Lunardi, G.L., Becker, J.L. and Macada, A.C.G. The<br />

Financial Impact of IT Governance Mechanisms' Adoption:<br />

An Empirical Analysis with Brazilian Firms. In: 42 nd HICSS,<br />

(2009).<br />

[30] Maidin, S.S. and Arshad, N.H. IT governance practices<br />

model in IT project approval and implementation in<br />

Malaysian public sector. In: ICEIE, (2010), V1-532 -V1-536.<br />

[31] Marawar, T., Kale, S. and Araspure, K. E-Governance. In:<br />

DSDE, (2010), 183-186.<br />

[32] Morimoto, S. Application of COBIT to Security<br />

Management in Information Systems Development. In: 4 th<br />

FCST, (2009), 625 – 630.<br />

[33] Nabiollahi, A. and Sahibuddin, S. Considering Service<br />

Strategy in ITIL V3 as a Framework for IT Governance. In:<br />

ITSim, (2008), 1-6.<br />

323<br />

[34] Park, H.Y., Jung, S.H., Lee, Y. and Jang, K.C. The Effect of<br />

Improving IT Standard in IT Governance. In: CIMCA,<br />

(2006), 22.<br />

[35] Pereira, R. and Mira da Silva, M. A Maturity Model for<br />

Implementing ITIL V3 in Practice. In: EDOCW, (2011), 259<br />

– 268.<br />

[36] PrinceWaterHouseCoopers. Risk Based Compliance<br />

Monitoring & Compliance Function Effectiveness - A new<br />

approach to managing compliance in the financial services<br />

industry, 2008.<br />

[37] Schermann, M., B¨Ohmann, T. and Krcmar, H. Explicating<br />

Design Theories with Conceptual Models: Towards a<br />

Theoretical Role of Reference Models. In J. Becker, H.<br />

Krcmar & B. Niehaves, (2009).<br />

[38] Shpilberg, D., Berez, S., Puryear, R. and Shah, S. Avoiding<br />

the Alignment Trap in Information Technology. MIT Sloan<br />

Management Review 49, 1(2007), 51-58.<br />

[39] Silva, E. and Chaix, Y. Business and IT Governance<br />

Alignment Simulation Essay on a Business Process and IT<br />

Service Model. In: 41 st HICSS, (2008), 434.<br />

[40] Silva, L.F. and Brito e Abreu, F. An IT Infrastructure<br />

Patterns Approach to Improve IT Service Management<br />

Quality. In: 7 th QUATIC, (2010), 171–176.<br />

[41] Simonsson, M. and Ekstedt, M. Getting the Priorities Right:<br />

Literature vs Practice on IT Governance. In: PICMET,<br />

(2006), 18-26.<br />

[42] Simonsson, M. and Johnson, P. The IT Organization<br />

Modeling and Assessment Tool: Correlating IT Governance<br />

Maturity with the Effect of IT. In: HICSS, pp.431. (2008).<br />

[43] Simonsson, M., Johnson, P. and Ekstedt, M. IT Governance<br />

Decision Support Using the IT Organization Modeling and<br />

Assessment Tool. In: PICMET, (2008), 802-810.<br />

[44] Simonsson, M., Lagerström, R. and Johnson, P. A Bayesian<br />

network for IT governance performance prediction. In:<br />

ICEC, (2008), 1-8.<br />

[45] Smith, S. L. and Mosier, J. N. Guidelines for designing user<br />

interface software. Technical Report ESD-TR-86-278, 1986.<br />

[46] Symons, C.: IT Governance Framework. Forrester (2005).<br />

[47] Tanriverdi, H. Performance Effects of Information<br />

Technology Synergies in Multibusiness Firms. MISQ 30,<br />

1(2006), 57-77.<br />

[48] Webb, P., Pollard, C. and Ridley, G. Attempting to Define IT<br />

Governance: Wisdom or Folly? In: HICSS, (2006), 194a.<br />

[49] Webster, J. and Watson, R.T. Analyzing the Past to Prepare<br />

for the Future: Writing a Literature Review. MISQ, 26,<br />

2(2002), xiii-xxiii.<br />

[50] Weil, P., and Ross J.W. IT Governance: How Top<br />

Performers Manage IT Decision Rights for Superior Result.<br />

Harvard Business School Press, Boston, Massachusetts,2004


Assessment of Success Factors of e-Government Project<br />

Implementation: Challenges for the Kosovo e-Government<br />

Perspective<br />

Artan Rexhepi, Blerim Rexha and Agni Dika<br />

Faculty of Electrical and Computer Engineering<br />

University of Prishtina<br />

10000 Prishtina,KOSOVO<br />

+377 44 115 651, +377 44 627 251, +377 44 500 721<br />

artan.rexhepi@uni-pr.edu, blerim.rexha@uni-pr.edu, agni.dika@uni-pr.edu<br />

ABSTRACT<br />

Among European countries, Kosovo is ranked low with respect to<br />

the provision of on-line e-Government services. The challenges in<br />

the introduction of e-Government in Kosovo were largely related<br />

to launching simple service delivery and integration of<br />

governments back offices. There is still a big disparity between<br />

what is being provided and what citizens’ requirements for the e-<br />

Government services are. This study has conducted a survey<br />

regarding the perception of current on-line e-government services<br />

among Kosovo citizens. By analyzing the current situation from<br />

the view of citizens, this paper analyzes the status, requirements<br />

and prerequisites for the implementation of a sustainable egovernment<br />

portal. The objective of this research is to emphasize<br />

the appropriate factors, ranging from information and<br />

communication services, application of electronic forms and<br />

provision of transaction services, electronic management of<br />

documents to the effective administration processes, which could<br />

significantly increase the likelihood of success of such egovernment<br />

projects. Based on the gathered and analyzed<br />

data, the paper discusses action recommendations for an<br />

acceptable and sustainable portal, which would be utilizable by a<br />

majority of citizens in Kosovo.<br />

Categories and Subject Descriptors<br />

J.1 [Administrative Data Processing]: Government<br />

General Terms<br />

Management, Documentation, Performance, Human Factors<br />

Keywords<br />

E-Government, Assessment, Kosovo, Electronic Government,<br />

Information and Communication Technology, Digital<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

324<br />

Government<br />

1. INTRODUCTION<br />

There is currently no reliable assessment of the e-government<br />

indicators and parameters required for the measurement of the<br />

present e-government development in Kosovo. As per the UN<br />

DPADM E-country report, Kosovo’s progress to e-government<br />

was rated at its beginning, ranking with this Kosovo low with<br />

respect to provision of e-services to the citizens [1]. However,<br />

over the past few years the understanding of governance and egovernance<br />

by the Kosovo government has been continuously<br />

changed. There are growing pressures and expectations from the<br />

citizens to the public administration aiming for governance with a<br />

modern approach for an efficient and effective administration. In<br />

addition, the transition period has shown that the government<br />

needs to be more transparent and accountable to the public. This<br />

and the need for reorganizing many processes within the public<br />

sector, covering a wide range of tasks and work arrangements,<br />

have been understood and it has lead to initiatives, such as the<br />

Kosovo Strategy for E-Government [2]. Nevertheless, there is still<br />

a big gap evident between the political priorities and agenda on<br />

the one hand and the actual implementation and users<br />

expectations on the other hand.<br />

The initial requirements for the government start with a detailed<br />

remodeling of work processes within the public sector and by<br />

translating them into a digitalized e-service format model for<br />

citizens. The existing relationships between the government and<br />

the citizen will be therefore redefined by introducing new<br />

processes at work in the public sector and by opening new<br />

opportunities.<br />

The Kosovo Government’s E-Government Strategy 2009-2015<br />

has identified the major priorities and objectives that need to be<br />

realized. During the past few years, several projects were<br />

identified and fully or partly implemented as a basis for the<br />

provision of e-services, such as the central register of citizens, the<br />

register of economic entities and various registers of cadastre and<br />

immovable properties for land administration. Besides such<br />

important projects, there is now a need for development and<br />

implementation of new projects that will allow the provision of<br />

specific e-services, on the basis of which the ordinary citizens can<br />

experience the expected benefits of e-government and the<br />

information society.


Despite the fact, that the integration of e-government services in<br />

Kosovo through the governmental portal for both citizens and<br />

businesses is still in its initial phase, there are certain<br />

improvements evident, which were made by some institutions<br />

such as certain Ministries and municipal governments. However,<br />

most of them are primarily offering information to citizens, while<br />

the direct citizen interaction with the government is still in its<br />

development stage.<br />

A fully functional governmental e-portal as a one-stop access to<br />

the most important interactive and transactional e-services,<br />

leading to integrated delivery of all government services to<br />

citizens and businesses is one of the most important challenges in<br />

Kosovo. The development of technological, legal and institutional<br />

infrastructure will enable the development of such services to the<br />

level of performing full e-government transactions by citizens.<br />

However, while the ICT infrastructure remains one of the main<br />

pillars of the e-government, the importance of the technology<br />

aspect is regularly weighted more than importance of new or<br />

revised structures and processes within the public sector. The<br />

introduction of e-Government may show its expected benefits<br />

only if it is properly planned and if it owns a full social, cultural<br />

and political support [3] including the acceptance at the user side.<br />

For assessing the effectiveness and ensuring that the frequent<br />

rhetoric of a successful implementation of e-government is also<br />

matched by reality, the performance of the e-government project<br />

implementation needs to be measured [3]. The growing political<br />

interest for e-Government in Kosovo together with the increased<br />

idea that governments should be more accessible to the citizens<br />

through internet shows a big opportunity and a favorable<br />

momentum which needs to be appropriately exploited for<br />

enhancing the current level of e-government performance and for<br />

setting up new e-government projects. In order to prevent such an<br />

opportunity from disappearing, a quick and tangible success is<br />

required in the implementation of e-government projects for<br />

citizens. The success depends heavily on the simplification and<br />

implementation of information, communication and transaction<br />

processes respectively on the quality of administrative services,<br />

especially those which are fully transactional [4].<br />

With the objective of measuring the success of e-government, the<br />

aim of this study is the assessment the current developments of egovernment<br />

project implementation in Kosovo from the<br />

perspective of users at the demand side.<br />

2. E-GOVERNMENT PERSPECTIVE–<br />

BACKGROUND OF THE STUDY<br />

The main challenges faced currently by the public sector in<br />

Kosovo mainly relate to the issues of maintenance of databases of<br />

various organizational units, their processing and communication.<br />

These data are recorded and archived in different locations and<br />

media. The communication between specific institutions in the<br />

organizational view is very deficient, which is consequently<br />

causing delayed or wrong decisions and other mistakes in<br />

managing the processes within government institutions and the<br />

service delivery to citizens. There is a great potential to improve<br />

the information exchange by applying the information technology<br />

and communications, and thus directly increase the efficiency of<br />

the e-Governance.<br />

The Kosovo Government’s E-Government Strategy 2009-2015<br />

was released by the Department of Information Technology of<br />

Ministry for Public Services in September 2008 [2]. This paper<br />

325<br />

reflected the introduction of the Information and Communication<br />

Technologies environment, sets out the intentions of the egovernment<br />

programme by 2015, aims to clarify what are the<br />

goals for the e-government service delivery and confirms the<br />

continues commitment of the government for the development of<br />

standards, interoperability and the government enterprise<br />

architecture for achieving the goals of this strategy. It also briefly<br />

outlines the current activities undertaken across some of the<br />

government bodies for the achievement of these goals.<br />

The main goal is to give access to the citizens to government<br />

information and services, participate in the democracy using the<br />

internet and other technologies. The better service improves the<br />

relationships with citizens by achieving convenience and<br />

satisfaction, with this the internal performance of the government<br />

will be more integrated and efficient and the citizens participatory<br />

role in the decision making process will be increased.<br />

The starting point for this study is the fact that despite<br />

considerable investments and a large number of ongoing and<br />

completed technical assistance projects, the e-Government<br />

services in Kosovo have not experienced the anticipated take-up.<br />

A systematic consideration of e-service delivery arrangements is<br />

required, specifications must be drawn up with great care and<br />

therefore the public administration must ensure that particularly<br />

the requirements of citizens are addressed during the<br />

implementation of the e-Government project [5]. The common<br />

requirement for a successful product development and acceptance<br />

by the clients is the analysis of the needs of users and the concrete<br />

definition and detailed documentation and validation of these<br />

requirements [6], however, according to Horan [7], the e-<br />

Government research arena still suffers from a lack of users<br />

satisfaction measurements.<br />

3. RESEARCH METHODOLOGY AND<br />

DATA COLLECTION<br />

For the e-Government demand side measurement and evaluation<br />

one of the most important questions is the decision what to<br />

measure and how to design the survey. For this reason the most<br />

influencing factors for the success of e-Government are to be<br />

identified.<br />

The first task was to compile the list of factors to be surveyed,<br />

while the success factors have to be determined on an individual<br />

basis [8]. These factors need to be adjusted to the context of this<br />

specific research. The list of factors to be included shall only<br />

consist of qualities, which may have a particular significance for<br />

the information system [9]. It is assumed that there are only a<br />

limited number of success factors that have an impact on the<br />

overall success of information systems [10]. The selected success<br />

factors have to cover various fields of information systems such as<br />

provision of e-services, communication, competence of staff and<br />

the role of the information system [11]. The main objective of the<br />

assessment of success factors is to analyze the contribution of<br />

particular factors and through this to identify the strengths and the<br />

weaknesses in the implementation of ICT systems, which is a<br />

requirement for deriving necessary measures for the improvement<br />

of the overall success and assessment of its urgency [13]. The<br />

selection and evaluation of success factors in this research was<br />

based on the list of success factors and methods defined and used<br />

by Heeks [12], Hoffmann [13] and Salzmann [14].


In view of different theoretical approaches to e-government<br />

demand-side evaluation, a suitable and locally acceptable<br />

evaluation method was to be identified and to be used in this<br />

research for measuring the success of the e-government project<br />

implementation from the users’ point of view. The several egovernment<br />

surveys methods, which are generally used for data<br />

collection for the purpose of reviewing the existing performance<br />

of the e-government implementation, range from direct interviews<br />

with citizens or government officials [15], [16], focus groups [15],<br />

visits to government websites [17] to questionnaire surveys to<br />

citizens [18]. In order to include a large number of respondents<br />

from a broad territory, for practical reasons this survey has<br />

utilized the questionnaire survey method.<br />

An empirical study has been conducted for measuring the success<br />

of the e-Government project implementation. The research<br />

utilized a structured questionnaire used by Hoffmann [13] which<br />

was adjusted to adapt to local conditions. The questionnaire used<br />

for the collection of data included 23 questions classified to<br />

measure the citizens perception of the priority and performance of<br />

selected factors, important for the success of the overall egovernment<br />

information system. Apart from these, the<br />

questionnaire contained additional 20 questions typical to<br />

demographics, internet usage habits, their awareness on the<br />

availability and their expectations for e-government services.<br />

Some questions additionally referred to their opinion regarding<br />

the future development of e-government services. The questions<br />

on the success factors required the responder to assess the priority<br />

of every factor on a scale from 1 (not important) to 4 (most<br />

important) as well as the current performance of the same factor<br />

from 1 (not implemented in practice) to 4 (fully implemented in<br />

practice). (Questionnaire can be provided on request).<br />

The probability method used for the selection of the survey<br />

sample was based on random sampling. A total of 350<br />

questionnaires were used by targeting various citizens and in<br />

order to reflect the entire adult Kosovo population and to ensure a<br />

representative sample in terms of demographic and sociological<br />

structure, the questionnaires were distributed to random citizens<br />

through University students, employers of various private and<br />

public companies and institutions, unemployed and elderly people<br />

throughout 9 different Kosovo municipalities. For practical<br />

reasons the data collection was conducted in only 9 out of 37<br />

Kosovo municipalities. In order to have a adequate statistical<br />

representation of collected data, Prishtina, as the capital city,<br />

together with all six secondary municipalities, where the majority<br />

of the Kosovo population resides, were included in this sample.<br />

Additionally two smaller minority municipalities were also<br />

included of this survey in order to obtain a representative sample<br />

from various municipalities. Out of this number a total of 300<br />

questionnaires were validated and were selected for this empirical<br />

study, representing a sample size with a standard confidence level<br />

of 95% and confidence interval of 5.5%. The data collected<br />

through this survey was digitalized, coded and analyzed using<br />

statistical analysis software for descriptive statistics and<br />

relationships.<br />

The purpose of analyzing success factors is to evaluate the<br />

contribution of specific factors to the overall success of an<br />

information system and with this to determine the specific<br />

strengths and weaknesses in the implementation of information<br />

systems. The direct output is a set of required measures for<br />

326<br />

improvement of the overall success. The results of the study will<br />

be illustrated using available tools for graphical analysis.<br />

The profile diagrams and the portfolio matrix are used for the<br />

graphical evaluation of success factors. The priority and the<br />

perceived implementation of success factors are presented in the<br />

same diagram while their values are marked with corresponding<br />

points on a scale from one to four.<br />

The graphical portfolio matrix is used for the data analysis. This<br />

graphical tool is based on a two dimensional diagram,<br />

which illustrates the research results in a simple and<br />

understandable manner [13]. The portfolio matrix axes show the<br />

features explored, in which the priority/expectation is shown on<br />

the X-axis and the performance/implementation is shown on the<br />

Y-axis. In order to allow a simple evaluation of the results, the<br />

matrix is divided into nine clusters. All factors that are listed in<br />

the portfolio matrix by combining their characteristics fall<br />

into one of these matrix clusters. The clusters are used for<br />

gathering factors with similar characteristics in respective groups,<br />

for which pre-standard recommendations for action will be<br />

defined.<br />

This method is used for analyzing the success of implemented egovernment<br />

projects and to draw specific recommendations<br />

for further action in relation to improvement of the overall success<br />

of specific factors.<br />

4. RESULTS AND DISCUSSION<br />

The target survey population of this study comprised a<br />

representative sample of people residing in various Kosovo<br />

municipalities during 2011. The study population was comprised<br />

of 300 adult persons of various age groups. The Figure 1 outlines<br />

the age groups of the study population by gender: a total of<br />

38.3% of all male and female respondents were under age 25,<br />

31.7% were within the age group interval from 26 through 35,<br />

18% were between 36 through 45, 8.3% between 46 through 55<br />

and 3.7% above 55. In absence of final data from the 2011 census<br />

in Kosovo, for comparison purposes the Figure 2 shows the<br />

estimated population of Kosovo by age groups as assessed<br />

through the results of the 2009 labor force survey conducted by<br />

the Statistical Office of Kosovo.<br />

From the gender perspective, Figure 3 shows that 58.7% of total<br />

respondents were Males and 41.3% were Females and the gender<br />

differences were significant (χ2= 9.01, P=0.03, thus P


Figure 1. The structure of respondents by the age-group and<br />

gender<br />

Figure 2. Estimated Population by age-groups in Kosovo (%),<br />

2009 [19]<br />

Figure 3. The structure of respondents by gender<br />

327<br />

Figure 4. The structure of respondents by their employment<br />

The total percentage of unemployed respondents from this survey<br />

has not exceeded 2%, a figure below the assumed high rate of<br />

unemployment in Kosovo. It is however anticipated that the<br />

responders working in the informal sector have not declared<br />

themselves as on unemployment. As an additional comparison, a<br />

first important labor market indicator is the relative size of the<br />

working age population, e.g., the persons between the ages of 15<br />

and 64, which approximately defines the potential available<br />

manpower. In Kosovo, this figure from the 2009 SOK LFS is<br />

comparatively low with only 64.0%. The reason for this becomes<br />

apparent by looking at the age structure. Kosovo has a relatively<br />

young population, with almost one of the third of age 15 and<br />

under and 7.8% aged 65 or above.<br />

Traditionally the younger generations are more familiar and show<br />

more interest in information technologies and feel more motivated<br />

in using e-government. It shall be noted that such a young<br />

population structure during this survey, with a majority of survey<br />

responders younger than 35, represents a factor which may<br />

heavily shape the results of this study. It is however apparent that<br />

this factor coincides also with the general population structure and<br />

therefore appropriately corresponds to the real situation in the<br />

field.<br />

Table 1. The structure of respondents by education<br />

Level of Education N %<br />

Secondary School 134 44.7<br />

Tertiary/University degree 164 54.7<br />

Total 300 100.0<br />

The Table 1 outlines the structure of respondents by education.<br />

The survey revealed that the general interest in e-government in<br />

Kosovo is very high, since 92% of people questioned have<br />

confirmed that they would prefer to complete all administrative<br />

processes online, while only 7% of them were not interested in<br />

using administrative services online (Figure 4.). The usage<br />

statistics revealed that while 71% of respondents have indicated<br />

that they have visited the Kosovo e-government portal site, the<br />

percentage of internet users who have already used e-services is<br />

low (34%) (Figure 5.). As a comparison, Heeks [20] uses an


approximate figure of 60% of internet users in Europe and other<br />

developed and transition countries that have ever accessed egovernment<br />

e-services, mainly for information purposes, while<br />

only 10-25% of users have undertaken online transactions. On the<br />

other hand, the Kosovo survey revealed that 55% of people<br />

questioned would be interested for the provision of e-government<br />

services at a transaction level (Table 2.).<br />

Figure 5 The results of current use of e-government<br />

Table 2. Preferred level of interaction<br />

N %<br />

Information level 70 23.3<br />

Communication level 63 21.0<br />

Transaction level 167 55.7<br />

Total 300 100.0<br />

Table 3. Statistics of internet access at home<br />

What is the type of your internet access at<br />

home N %<br />

No internet access available 8 3.0<br />

Other modem/other narrow band 57 19.0<br />

Cable modem 230 77.0<br />

No answer 5 2.0<br />

Total 300 100.0<br />

Surprisingly, 95% of respondents have reported to have an<br />

internet access at home (Table 3.). The most reasons for the use of<br />

internet are emailing and communication (80%) and reading news<br />

(62%) while less than 18% of respondents have used the internet<br />

for purchasing products online and lesser for online banking.<br />

328<br />

Table 4. Internet usage statistics<br />

The use of internet N %<br />

Not using or very rarely use 1 0.3<br />

Less than 1 hour/week 15 5.0<br />

1 to 5 hour/week 96 32.0<br />

15 to 40 hours/week 125 41.7<br />

More than 40 hours/week 63 21.0<br />

Total 300 100.0<br />

The Table 4 reveals the current practices on the use of internet,<br />

showing that more than 62% of respondents are intensively using<br />

internet more than 15 hours weekly.<br />

Table 5. Assessment of overall governmental e-services<br />

The overall assessment of the online services<br />

offered by the public administration N %<br />

Nonexistent 65 21.7<br />

Inadequate 191 63.7<br />

Adequate 34 11.3<br />

Excellent 4 1.3<br />

No answer 6 2.0<br />

Total 300 100.0<br />

The Table 5 reveals that the majority of respondents<br />

(21.7%+63.7%) are not satisfied with the current level of<br />

government e-services. This majority’s assessment of e-services<br />

provided by the government is that these do not exist or are<br />

inadequately implemented. This is to some extend consistent with<br />

71% of participants that have visited the governmental portal vs.<br />

85% indicating that the current level of e-services is<br />

unsatisfactory. The individual evaluation of data received from<br />

the questionnaires of the 28% of respondents that have never<br />

visited the e-government portal (Figure 5.) shows that 84.5% of<br />

them have rated the online e-services as unsatisfactory.<br />

Table 6. Main reasons for the use of e-services<br />

N %<br />

Total 300 100.0<br />

Time saving 255 85.0<br />

Performing administrative tasks 243 81.0<br />

from Avoiding home waiting queues 227 75.7<br />

Shorten case processing and<br />

220 73.3<br />

response Immediate time notification about<br />

207 69.0<br />

missing Independence documents from office<br />

132 44.0<br />

working Cost savings hours<br />

130 43.3<br />

Other 4 1.3<br />

The respondents were also asked to provide their most important<br />

reasons for the use of governmental e-services. The main reasons<br />

presented, as shown in Table 6, were related to the time saving<br />

factor (85%), completion of administrative processes from home<br />

(81%), avoiding queuing at administrative offices (75%) and the<br />

quicker response time by the administration (73%). The majority


(69%) has also highlighted the importance of getting personal<br />

feedback from the government in case some documents would be<br />

additionally required during the administrative process.<br />

A more detailed review of the results show that the users are least<br />

satisfied with the communication with public servants by email,<br />

while the visual design, ease of use and navigation scored better<br />

(Figure 6.) (Table 7.). The factor of appointing a public servant as<br />

a contact person appears high in the list of citizens’ requirements<br />

for a successful e-government project implementation. While this<br />

question was unfortunately not detailed further in the<br />

questionnaire, it is most possible that this specific requirement is a<br />

result of the citizens’ overall distrust towards the public<br />

administration and their habits in dealing with the administration<br />

in traditional means through direct contact with the public servant<br />

in the administration office.<br />

The actual requirements for e-government services derive from<br />

the evaluation of citizens’ priorities that were provided for each<br />

success factor listed in the questionnaire. A high priority of a<br />

success factor is a demand for the information system [21].<br />

Figure 6 The average values of the perceived<br />

implementation/performance of success factors (shown in red<br />

color) vs. their priority (shown in blue color)<br />

Table 7. List of success factors that were assessed together<br />

with the calculated difference between their average priority<br />

and implementation values<br />

# Success factor Difference<br />

F-1 Multilingualism 0.3<br />

F-2 Unified appearance 0.8<br />

F-3 Visually attractive design 0.8<br />

329<br />

F-4 Easy to use 1.1<br />

F-5 Easy to navigate 1.2<br />

F-6 Large amount of information 1.3<br />

F-7 Cost saving factor 1.4<br />

F-8 Services supporting specific activities 1.4<br />

F-9 Provision of samples 1.4<br />

F-10 Grouping of services by life situation 1.5<br />

F-11 Client-oriented services 1.5<br />

F-12 Continuously updated content 1.5<br />

F-13 Integration of services between central and local<br />

level<br />

1.5<br />

F-14 Acceptance of digital signatures 1.6<br />

F-15 Large amount of services 1.6<br />

F-16 Support of general processes 1.6<br />

F-17 Simplification of administration processes 1.6<br />

F-18 Time saving factor 1.6<br />

F-19 Support of communication 1.7<br />

F-20 Appointment of a contact person 1.7<br />

F-21 Acceptance of e-mail messages 1.9<br />

F-22 Support for email notifications 1.9<br />

F-23 Rapid response by administration 1.9<br />

The Figure 6 details the average values of assessed<br />

implementation (shown in red color) in a scale from 1 (not<br />

important) to 4 (most important) vs. the average values of their<br />

priorities (shown in blue color) using a similar scale from 1 (not<br />

implemented) to 4 (fully implemented). The Table 7 provides the<br />

list of all measured factors and presents the calculated difference<br />

between the values of assessed implementation and the priority<br />

for each measured factor. The difference figure shows how large<br />

is the discrepancy between the citizens’ priority for a specific<br />

success factor and their assessment of its current implementation<br />

in practice.<br />

Figure 7. Portfolio matrix of implementation/performance vs.<br />

priority of identified success factors<br />

The actual values of success factors implementation and their<br />

priorities are shown with the portfolio matrix (Figure 7),<br />

illustrating that all success factors are located within a grouping<br />

cluster, which requires appropriate adjustment by increasing the<br />

level of their implementation. All success factors are placed just<br />

below the matrix cluster with highest priority and excellent<br />

implementation. Except the success factor F-1 (Multilingualism),<br />

which is considered appropriately implemented due to its slight


difference between its priority and actual implementation and its<br />

location in the edge of the cluster with highest priority and<br />

excellent implementation, all other success factors are located<br />

inside the cluster with high priority and lower implementation<br />

level, requiring immediate adjustment.<br />

5. CONCLUSIONS<br />

The survey conducted with this research presented the citizens’<br />

priorities and perceived performance of the public administration<br />

in the e-government project implementation. The research<br />

concludes with highlighting some key findings and<br />

recommendations as outlined below:<br />

o This study has confirmed that there is a gap between the<br />

citizens’ requirements and interests and the actual<br />

o<br />

implementation of governmental e-services in Kosovo, since<br />

more than two third of respondents, covered in this study,<br />

registered their disappointment that the current online<br />

services offered by the public administration in Kosovo are<br />

deficient and require immediate attention for improvement.<br />

Over 90% of respondents have declared that they regularly<br />

use internet more than 1 hour per week. More than 60% are<br />

using internet for more than 15 hours per week, showing that<br />

in relation to age and gender, the use of internet has rapidly<br />

increased among citizens in Kosovo resulting with a growing<br />

population of possible e-government users, which could<br />

directly benefit from a successful e-government project<br />

implementation.<br />

o The study has shown that the majority of respondents have<br />

expressed their interest for the use of e–services.<br />

o<br />

Remarkably, more than 55% of the respondents would like to<br />

change from the traditional way of dealing with the<br />

administration to a transaction based administration eservices,<br />

in contrast to just downloading or filling the forms<br />

online.<br />

Through the significant discrepancy between the priorities of<br />

citizens and the implementation of e-services in practice, this<br />

study has confirmed that the e-government Kosovo<br />

administration lacks its customer relation in the sense of<br />

tailoring their services towards customers’ needs. It should<br />

be also noted that one of the reasons, why most survey<br />

respondents were classifying the priority of all success<br />

factors fairly high, may be because of the fact that there is<br />

not yet an appropriate e-government practice in Kosovo. It<br />

could be expected that at a later stage the priorities of success<br />

factors may be differently assessed.<br />

o As long the citizens don’t know that e-services are available,<br />

they won’t use them. To deal with this problem, the<br />

government needs to market the available online services<br />

through press releases, flyers, promotional events and public<br />

service announcements [22] in order to approach the<br />

potential users that have not visited the governmental portal<br />

yet.<br />

o It is important to start implementing a generally accepted<br />

online payment modality, which would be accepted by the<br />

public and integrated as a standard tool within all relevant<br />

products developed by the central and local level of the<br />

public administration.<br />

o In absence of its own capacities, the government shall<br />

identify potential partners, who in collaboration with the<br />

330<br />

o<br />

public administration could assist the government in<br />

implementing certain online services for administrative<br />

institutions in the form of a public-private partnership.<br />

However, under a public-private partnership the government<br />

should continue to keep the key driver role for the promotion<br />

of e-government initiatives.<br />

The most critical factors that would contribute to the success<br />

of e-government in Kosovo relate to the change and<br />

simplification of administrative processes and the<br />

establishment of appropriate communication channels<br />

between citizen and administration, which would generate a<br />

sense of accountability and assurance. The political<br />

willingness, an adequate technological infrastructure and an<br />

overall client oriented development strategy remain the most<br />

critical factors for the e-government project implementation.<br />

As a further research it is recommended to conduct such empirical<br />

studies on a regular basis in order to follow up and compare with<br />

different empirical studies addressing comparable success factors.<br />

6. REFERENCES<br />

[1] Public Administration Country Profile for Kosovo, Division<br />

for Public Administration and Development Management,<br />

Department of Economic and Social Affairs, United Nations,<br />

December 2003.<br />

[2] Electronic Government Strategy 2009-2015, Ministry of<br />

Public Services, Department of Information Technology,<br />

October 2008<br />

[3] Asgarkhani M.: The Effectiveness of e-Service in Local<br />

Government: A Case Study, The Electronic Journal of e-<br />

Government Volume 3 Issue 4, 2005, www.ejeg.com<br />

[4] Becker J. et al.: e-Government Success Factors, EGOV<br />

Third International Confererence, Springer, 2004<br />

[5] Leitner C., eGovernment in Europe: The State of Affairs,<br />

EIPA Maastricht, 2004<br />

[6] van der Linden, F., Schmid, K., Rommes, E., Software<br />

Product Lines in Action, Springer Verlag, 2007<br />

[7] Horan, T., Abhichandani, T., Rayalu, R.: Assessing User<br />

Satisfaction of E-Government Services: Development and<br />

Testing of Quality-in-Use Satisfaction with Advanced<br />

Traveller Information Systems, 39th Hawaii International<br />

Conference on System Sciences, 2006<br />

[8] Lehner, F: Die Erfolgsfaktoren Analyse in der Informationsverarbeitung,<br />

Zeitung Betriebs-wirtschaft, 1995<br />

[9] Camp, O. Filipe, J., Hammoudi, S. Piattini, M., Enterprise<br />

Information Systems, Kluwer Academic Publishers, 2004<br />

[10] Krcmar, H., Informationsmanagement, Springler Verlag,<br />

2005<br />

[11] Heinrich L.: Informationsmanagement, Oldenbourg<br />

Wissenschaftsverlag, 2005<br />

[12] Heeks, R. eGovernment for Development: Causes of<br />

eGovernment Success and Failure: Factor Model, IDPM,<br />

University of Manchester, 2003.<br />

[13] Hoffmann, R., Anforderungs- und Erfolgsanalyse von E-<br />

Government Anwendungen, VDM Verlag, 2008


[14] Salzmann, M. e-Government im Kanton Zuerich – Strategie<br />

und Umsetzung, Paul Haupt Verlag, 2004<br />

[15] Agimo.: E-Government Benefits Study. Australian<br />

Government Information Management Office:<br />

http://www.agimo.gov.au/archive/publications_noie/2004/10<br />

/annrep03-04/part_3_-_performance_report.html.<br />

[16] P. Crook, S. J. Rohleder, and A. Simmonds, CRM in<br />

Government: Bridging the Gaps. Atlantic and Europe,<br />

Accenture, 2003.<br />

[17] UNPAN. (2005, July) Global Readiness Report: From<br />

eGovernment to eInclusion.<br />

http://www2.unpan.org/egovkb/global_reports/05report.htm.<br />

[18] A. Dexter and V. Parr, Government Online Study, Taylor<br />

Nelson Sofres, 2003.<br />

331<br />

[19] Ministry of Public Services:, Series 5: Social Statistics,<br />

Results of the labor force survey 2009, Statistical Office of<br />

Kosovo (SOK) 2010,<br />

[20] Heeks, R.: Benchmarking eGovernment: Improving the<br />

National and International Measurement, Evaluation and<br />

Comparison of eGovernment, IDPM, University of<br />

Manchester, 2006<br />

[21] Scheer, A., ARIS Modellierungsmethoden, Metamodele,<br />

Springer Verlag, 1998<br />

[22] Eggers, W., Boosting E-Government Adoption, FTA Annual<br />

Conference, 2004,<br />

http://taxadmin.org/fta/meet/04am_pres/eggers.pdf


Computer Supported Contractor Selection<br />

for Public Administration Ventures<br />

Zbigniew Paszkiewicz<br />

Department of Information Technology<br />

Poznań University of Economics<br />

6 Mansfelda str., 60-854 Poznań, Poland<br />

+48 61 8480549<br />

zpasz@kti.ue.poznan.pl<br />

ABSTRACT<br />

Ventures undertaken by public administration significantly<br />

contribute to development of economy. Such ventures are usually<br />

complex, so they require effective collaboration of a number of<br />

autonomous organizations. To face the challenge of efficient<br />

cooperation, public administration should adopt the model of<br />

Virtual Organizations (VO). A key phase in each VO life-cycle is<br />

selection of partners which in case of public administration takes<br />

a form of public auctions. In this paper a Collaborative<br />

Contractor Selection method, denoted C-CS, is proposed to<br />

support selection of contractors for a portfolio of public ventures.<br />

In the C-CS method a number of requirements are considered<br />

associated with contractor offer properties, contractor<br />

competences, and social relationships among them. The selection<br />

is performed step by step as successive ventures are performed. If<br />

justified, the selection is done in collaboration between<br />

administrative units and potential contractors. The C-CS method<br />

provides an opportunity for better computer support of public<br />

auctions leading to more efficient and effective realization of<br />

public administration ventures.<br />

Categories and Subject Descriptors<br />

J.1 [Computer Applications]: Administrative Data Processing:<br />

Business, Government<br />

K.4.3 [Computers and Society]: Organizational Impacts:<br />

Reengineering, Computer-Supported Collaborative Work<br />

General Terms<br />

Economics, Human Factors, Performance, Design, Algorithms<br />

Keywords<br />

Public Administration, Virtual Organization, Agility, Adaptive<br />

Business Processes, Process Mining<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

332<br />

Wojciech Cellary<br />

Department of Information Technology<br />

Poznań University of Economics<br />

6 Mansfelda str., 60-854 Poznań, Poland<br />

+48 61 8480549<br />

cellary@kti.ue.poznan.pl<br />

1. INTRODUCTION<br />

In every country, public administration is a significant economical<br />

actor, quite often a major one. Ventures undertaken by public<br />

administration are usually complex and cannot be handled by a<br />

single organization but require effective collaboration of a number<br />

of autonomous organizations from both the public and private<br />

sector. Cooperation on complex ventures is usually a challenge for<br />

public administrations. To face this challenge, public<br />

administration should adopt the model of Virtual Organizations<br />

(VO) [1, 2, 3] which permits to deal with complexity, pursuit for<br />

agility, and take advantages of broad use of information<br />

technologies in economic and managerial operations. VO is “a set<br />

of at least two autonomous partners, where at least one of them is<br />

an organization, cooperating within a particular structure of social<br />

and legal relationships in order to carry out a particular venture<br />

due to the demand from virtual organization clients and having a<br />

plan to carry out this venture” [4]. Partners collaborating within a<br />

VO are organizations – enterprises, public administration units,<br />

and non-government organizations – people, and information<br />

systems.<br />

The success of a VO strongly depends on ability of all<br />

participating organizations to efficiently and seamlessly cooperate<br />

via Internet. Good level of cooperation may be achieved by an<br />

appropriate selection of partners. In case of public administration<br />

ventures this selection takes a form of public auctions. In<br />

European Union, approaches to conducting a public auction are<br />

regulated by two main directives 2004/17/EC and 2004/18/EC [5].<br />

Due to importance and complexity of partner selection problem, a<br />

number of computer supported methods has already been<br />

proposed. Modern approaches to modeling cooperation among<br />

organizations are built around the concept of service and the<br />

paradigm of Service-Oriented Architecture (SOA) [2]. Examples<br />

of methods supporting selection of partners and service for VO<br />

have been described in [6, 7]. In some of the proposed<br />

methods [2, 8] existence of Virtual Organization Breeding<br />

Environment VOBE is assumed. Public administration playing a<br />

role of VOBE is presented in [1]. So far, none of the proposed<br />

methods, has been evaluated for the use in public auctions.<br />

Existing methods have the following shortcoming preventing<br />

them from effective application to contractor selection for public<br />

administration ventures: (a) the aspect of past collaboration<br />

between potential contractors is not included; (b) it is assumed<br />

that the process model of a venture is known in advance and that<br />

it does not change; (c) all the partners are selected before a<br />

venture starts, while in practice new partners may be required<br />

when the venture progress, or some initially selected partners may


appear useless so the evolving aspect of the partner selection is<br />

not addressed.<br />

In this paper a C-CS method is presented in which selection of<br />

contractors based on multi-variant analysis is not seen as a single<br />

act, but as a process conducted in parallel to the public<br />

administration ventures. In the C-CS method legal restrictions<br />

following from the public auctions are taken into account. The C-<br />

CS method takes advantage of process mining techniques for<br />

analysis of past contractor selections and provides<br />

recommendations for ongoing and future contractor selections<br />

processes. The above features make the C-CS method well suited<br />

for big public administration ventures.<br />

The remainder of this paper is organized as follows. In Section 2,<br />

the main law regulations concerning public contracts and public<br />

auctions are presented. In Section 3, the approach to selection of<br />

partners to portfolio of projects is justified. In Section 4, the<br />

proposed C-CS method supporting contractor selection is<br />

presented. Finally, Section 4 concludes the paper.<br />

2. PUBLIC AUCTIONS IN EUROPEAN<br />

UNION<br />

The aim of a public auction is to elaborate a public contract<br />

between one or more economic operators and one or more<br />

contracting authorities. Contracting authorities mean here the<br />

state, regional or local authorities, bodies governed by public law<br />

or their groups. An economic operator is understood as any<br />

organization which offers on the market products or services. An<br />

economic operator or a set of economic operators undersigning a<br />

public contract and responsible for its realization is called a<br />

contractor.<br />

European Union directives define five main procedures allowing<br />

contractors to be selected: open procedures, restricted<br />

procedures, competitive dialogue, negotiated procedures, and<br />

design contests. To establish a complex public contract defined as<br />

a one where “the contracting authorities: are not objectively able<br />

to define the technical means, capable of satisfying their needs or<br />

objectives, and/or are not objectively able to specify the legal<br />

and/or financial makeup of a project” competitive dialog or<br />

negotiated procedure procedures are used.<br />

Conduction of the competitive dialog and negotiations is based on<br />

collaboration that takes place on two levels: (1) inside public<br />

administration units, and (2) among public administration and<br />

candidates for contractors. Collaboration inside public<br />

administration units arises during preparation of public auction<br />

and during the interaction with candidate contractors.<br />

Collaboration concerns contractor selection participants<br />

comprising domain experts, public administration unit<br />

representatives, legal and technical advisors, non-government<br />

organizations, etc. Collaboration aims at: (1) definition of the<br />

contract notice content; (2) agreement on the set of economic<br />

contractors invited to take part in selection procedures;<br />

(3) evaluation of offer variants submitted by candidates during<br />

negotiations and dialog. Cooperation on the second level with<br />

economic contractor is the essence of negotiation and competitive<br />

dialog. It relies on exchange of information aiming at<br />

identification and definition of the means best suited to satisfying<br />

the needs of contracting authorities.<br />

333<br />

A basic observation is that public administration usually has to<br />

conduct not just one but a portfolio of projects. A common<br />

approach to management of such projects favored by public<br />

administration is selection of one contractor per project. In this<br />

approach, however, the managerial role of public administration is<br />

reduced to supervision. A contractor manages a network of<br />

specialized organizations executing different tasks comprising the<br />

project. Currently, public administration is focused on selection of<br />

contractors for single ventures in separation from one another,<br />

while paying not enough attention to the holistic view of the<br />

whole portfolio of ventures. As a result, contractor selection for<br />

public administration ventures is not performed effectively and<br />

often leads to non-effective realization of public ventures.<br />

Current approaches to contractor selection for public<br />

administration ventures has the following shortcomings:<br />

(1) limited support for analysis of potential contractors in terms of<br />

relationships existing among them, while these relationships can<br />

have a great impact on efficiency of realization of the portfolio of<br />

projects; (2) limited support for analysis of correlation among<br />

former and ongoing public auctions, while the result or the course<br />

of one public auction should be taken into account during others;<br />

(3) limited support for analysis of sets of economic contractors<br />

involved in many public auctions; (4) limited sharing of good<br />

practices concerning public auctions among public administration<br />

units due to the fact that such practices are difficult to be<br />

identified; such good practices may concern used requirements,<br />

definition of public auction scope, association among auctions and<br />

projects, economic contractors, experts, public administration<br />

units, non-government organizations involved in the selection<br />

process, and invited economic operators for negotiations.<br />

3. CONTRACTOR SELECTION FOR<br />

PORTFOLIO OF VENTURES<br />

To deal with drawbacks of the current selection process, it is<br />

necessary to change the approach to conduction of public auctions<br />

and management of public administration project portfolio. In this<br />

paper we propose to consider a portfolio of projects and apply a<br />

coordinated partner selection process in a number of auctions to<br />

all the projects contained in the portfolio, instead of selecting<br />

independently a contractor per project. The contractors selected<br />

need to be able to mutually communicate, synchronize, and<br />

cooperate to efficiently realize a set of projects. Thus, in the<br />

proposed approach analysis of interrelations among potential<br />

contractors is included. Public administration together with all the<br />

contractors (a contractor per project) constitute a VO within<br />

which they collaborate as partners to conduct a portfolio of<br />

projects. The Collaborative Contractor Selection (C-CS) method<br />

proposed in this paper in Section 4 refers to computer support of<br />

two the most complex cases of public auctions, i.e. competitive<br />

dialog or negotiated procedure.<br />

In the C-CS method the contractor selection for public<br />

administration venture is a process consisting of a set of possibly<br />

overlapping public auctions associated with a set of projects.<br />

These auctions lead to definition of a set of public contracts<br />

associated with the execution of projects comprising project<br />

portfolio. The input for starting a contractor selection process for<br />

public administration is a project portfolio. Contractor selection<br />

process encompasses: (1) definition of a set of public auctions to<br />

be conducted for the project portfolio, relationships existing<br />

among these auctions, and main assumptions of these auctions;


(2) conduction of the public auctions, where each auction is<br />

followed by establishment of a public contract for each project;<br />

(3) if applicable, as contractor selection proceeds (i.e. subsequent<br />

auctions are performed and concluded), redefinition of the set of<br />

auctions, relationships among them, their scope and assumptions.<br />

Step 3 captures the evolving aspect of contractor selection.<br />

Contractor selection is completed when all the projects from the<br />

project portfolio have assigned public contracts.<br />

4. C-CS METHOD<br />

The C-CS method is a refinement of the MAPSS method proposed<br />

in [8]. The refinement of the method encompasses: (1) selection<br />

of contractors for a subset of projects composing a portfolio–<br />

economic operators are not assigned to all the projects at once;<br />

(2) analysis of social relations among contractors selected during<br />

several public auctions; (3) collaborative approach to contractor<br />

selection involving interested parties; (4) support for contractor<br />

selection participant activities by recommendation of good<br />

practices in the form of activity patterns; (5) support for analysis<br />

of various variants of possible assignment of contractors to<br />

projects, where variant evaluation is based on requirements and<br />

preferences of selection process participants including social<br />

aspects.<br />

4.1 C-CS Concept<br />

It is assumed that a contractor selection process consists of a set of<br />

public auctions. he aim of each public auction is to find a<br />

contractor providing the best offer that observes the requirements:<br />

(1) defined in the public notice and (2) imposed on an auction as<br />

a consequence of already completed auctions. Such constraints<br />

usually take a form of social requirements. They follow from a<br />

holistic approach to selection of contractors for a portfolio of<br />

projects. Subsequent auctions may be organized in parallel to<br />

venture proceeding.<br />

A contractor specification is a set of requirements that an<br />

economic operator must satisfy to be assigned to a particular<br />

public contract. An offer specification is a set of requirements that<br />

an offer of an economic operator must satisfy to be assigned to a<br />

particular public contract. Social requirements concern<br />

relationships among contractors. An acceptable contractor is an<br />

economic operator satisfying requirements defined in the<br />

contractor specification. An acceptable offer is an economic<br />

operator offer satisfying requirements defined in the offer<br />

specification.<br />

Public contract specification is a pair: . An acceptable public contract is a pair<br />

. Requirements defined<br />

in a specification may refer to expected experience of contractor,<br />

financial stability, etc. Social requirements express dependencies<br />

among contractors being public auction outputs. Note that each<br />

acceptable contractor can be a VO. Thus, requirements defined in<br />

contractor specification may refer also to internal structure of such<br />

a VO, e.g., a requirement concerning maximum number of<br />

subcontractors. Social relationships may concern: past<br />

cooperation, recognition, former financial exchange, etc.<br />

4.2 Overview of C-CS Phases<br />

In every stage of contractor selection, the C-CS method consists<br />

of four phases and follows the general selection method<br />

334<br />

guidelines presented in [2]: (1) specification of public auctions<br />

envisioned for contractor selection stage – definition of<br />

requirements and associated evaluation criteria (preferences,<br />

fitness function); this phase is performed within public<br />

administration and its output is published in a form of contract<br />

notices; (2) contractor analysis prior negotiations – the set of<br />

acceptable public contracts is created and analyzed internally<br />

within public administration; the aim of the analysis is to define<br />

the best possible contractor group that the public administration<br />

will strive to achieve; such analysis is used for preparation of a set<br />

of economic operators to be invited to participate in negotiations<br />

or a competitive dialog; (3) contractor analysis during<br />

negotiations – the set of acceptable public contracts is created on<br />

the basis of acceptable offers submitted by candidate contractors<br />

during negotiation or competitive dialog; the aim of the analysis is<br />

to identify the group of best acceptable public contracts or<br />

indicate the shortcoming of the acceptable public contracts being<br />

currently negotiated; (4) stage conclusion – selection of the best<br />

acceptable public contract for each public auction envisioned in<br />

this contract selection stage.<br />

All the phases of the C-CS method are performed in a<br />

collaborative manner. Phase 1 assumes collaboration of public<br />

administration units, employees, domain experts and others.<br />

Phases 2-4 include in addition acceptable contractors.<br />

4.3 Information Model and Selection<br />

Technique<br />

The C-CS method is based on the concept of public administration<br />

being a VOBE [1]. It is assumed that public administration<br />

collects information concerning former public auctions and their<br />

results for future reuse. Collected information may include<br />

properly documented former experience of economic operators or<br />

recommendations from former clients. Such information refers<br />

both to single economic operators as well as relationships among<br />

them. Such information is stored in a repository consisting of four<br />

modules: (1) contractor and offer specification module – provides<br />

relevant information concerning economic operators, their<br />

operations and their offers (offer variants) submitted during past<br />

and current public auctions, (2) social network module – provides<br />

information about relationships among contractors and between<br />

contractors and their offers, (3) requirement module – provides<br />

information concerning requirements used in various public<br />

auctions; (4) participant’s activity module – stores information<br />

concerning activities performed by contractor selection process<br />

participants throughout selection processes.<br />

The C-CS method aims at finding a subset of economic<br />

contractors and offers submitted for an ongoing auction and stored<br />

in the repository that are best suited for activities analyzed during<br />

a given contractor selection stage. The contractor selection is<br />

performed on the basis of specification created in Phase 1. As the<br />

result of the specification phase, the formulated public contract<br />

specifications are published in a form of public notices and a set<br />

of requirements concerning social relationships. Requirements<br />

associated with specifications may be selected from the repository<br />

or created for the need of a particular contractor selection stage.<br />

Definition of requirements for contractor selection includes also<br />

definition of: (1) preferred value; (2) fitness functions. In Phase 2<br />

and Phase 3, contractor analysis is divided into two steps: (1)<br />

acceptable public contract analysis, (2) acceptable public contract<br />

group analysis.


In the acceptable public contract analysis step, on the basis of<br />

public contract specifications defined in Phase 1, a set of<br />

acceptable public contracts is created for each public contract<br />

specification. Identified acceptable public contracts are ranked<br />

according to the level of conformance to corresponding<br />

specification. The conformance is calculated on the basis of<br />

preferences and fitness functions defined in Phase 1. Analysis<br />

performed in this step is followed by effective selection of<br />

promising acceptable public contracts and rejection of those that<br />

should be disregarded. The number of potential acceptable public<br />

contract group that may be constituted for the contractor selection<br />

stage with acceptable public contracts identified in the previous<br />

step is usually high. The goal of acceptable public contract group<br />

analysis step is to search for a sorted list of acceptable public<br />

contract group ranked according to a fitness function. This step<br />

takes advantage of technique proposed as a part of the MAPSS<br />

method [8]. Genetic algorithm is used for generation of optimal<br />

acceptable public contract groups ranked according to a fitness<br />

function. In this phase each contractor selection participant may<br />

define his/her own fitness function. Thus, suggestion concerning<br />

best acceptable public contract groups may be different depending<br />

on a participant. In this phase, social relationships among<br />

acceptable contractors are verified and validated.<br />

In the stage conclusion phase, once all public contract<br />

specifications that are defined for contractor selection stage have<br />

assigned acceptable public contracts, this fact is registered in the<br />

repository. If applicable, this stage encompasses redefinition of<br />

the set of planned upcoming auctions, relationships among them,<br />

their scope and assumptions<br />

4.4 Recommendations During Contractor<br />

Selection<br />

Characteristics of a contractor selection process are such that in<br />

general prediction of its full course is impossible. Nevertheless,<br />

identification of its repeatable parts is useful in context of<br />

boosting efficiency of selection execution and promotion of good<br />

practices among selection process participants, especially those<br />

being representatives of public administration.<br />

Mechanism of recommendation in the C-CS method aims to<br />

detect activity patterns in contractor selection process, where<br />

activity pattern is a set of activities that are frequently performed<br />

in a structured way in a particular context by a contractor<br />

selection participant. Identified activity patterns are later<br />

recommended to other selection participants. Identification of<br />

activity patterns is possible due to information stored in<br />

participant’s activity module of the repository. To identify activity<br />

patterns, the approach presented in [4] is used.<br />

5. CONCLUSIONS<br />

The C-CS method contributes to increased efficiency of the<br />

contractor selection process. It is achieved by computer support<br />

for multi-variant automatic analysis of economic operators and<br />

offers submitted by them. A structured approach is proposed to<br />

definition and reuse of requirements, stored in a repository in a<br />

form of contractor or offer specifications. An important aspect of<br />

the C-CS method is an analysis of relationships among candidate<br />

335<br />

contractors from various ongoing or completed public auctions.<br />

Such analysis eliminates the risk of selection of a set of<br />

contractors unable to mutually collaborate which could lead to<br />

one or more project failures. Identification of activity patterns in<br />

every phase of the C-CS method addresses the problem of process<br />

evolution and unpredictability. Activity patterns allow good<br />

practices to be identified and reused. Recommendations generated<br />

on the basis of activity patterns enable more effective execution of<br />

contractor selections.<br />

6. ACKNOWLEDGMENTS<br />

This work has been partially supported by the Polish National<br />

Science Center. Grant no. DEC-2011/01/N/ST6/04205<br />

7. REFERENCES<br />

[1] Cellary, W., Picard, W., Agile and Pro-Active Public<br />

Administration as a Collaborative Networked Organization,<br />

in: Proceedings of the 4th International Conference on<br />

Theory and Practice of Electronic Governance<br />

ICEGOV2010, October 25-28, 2010, Beijing, China, ACM,<br />

2010<br />

[2] Rabelo, R., Gusmeroli, S., The ECOLEAD Collaborative<br />

Business Infrastructure for Networked Organizations, in:<br />

Camarunha-Matos, L.M, Picard, W. (eds), Pervasive<br />

Collaborative Networks, PRO-VE 2008, Springer, 2008<br />

[3] Janowski, T., Pardo, T. A., Davies, J., Government<br />

Information Networks - Mapping Electronic Governance<br />

cases through Public Administration concepts, in:<br />

Government Information Quarterly, vol. 29, Elsevier, 2012<br />

[4] Paszkiewicz, Z., W. Cellary, Computer Supported<br />

Collaborative Processes in Virtual Organizations , in:<br />

Proceedings of the 20th Annual World Business Congress,<br />

Poznań, Poland, pp. 85-94, IMDA Press, 2011,<br />

[5] Directives 2004/17/EC and 2004/18/EC of the European<br />

Parliament and of the Council of 31 March 2004<br />

coordinating the procurement procedures of entities<br />

operating in the water, energy, transport and postal services<br />

sectors<br />

[6] Ermilova E., H. Afsarmanesh: Competency and Profiling<br />

Management in Virtual Organization Breeding<br />

Environments. in: Camarinha-Matos, L.M., Afsarmanesh, H.<br />

Ollus, M. (eds.) Network-Centric Collaboration and<br />

Supporting Frameworks, pp. 131-142. Springer, 2007<br />

[7] Canfora, G., Di Penta, M., Esposito, R., Villani, M.L., An<br />

approach for QoS-aware service composition based on<br />

genetic algorithms, in: Proceedings of the 2005 conference<br />

on Genetic and evolutionary computation, pp. 1069-1075,<br />

2005<br />

[8] Paszkiewicz, Z., Picard, W. MAPSS, a multi-aspect partner<br />

and service selection method. in: L.M., Camarinha-Matos, X.<br />

Boucher, H. Afsarmanesh (Eds.), Collaborative networks for<br />

a sustainable world, 11th IFIP working conference on virtual<br />

enterprises, PRO-VE 2010 Boston, USA: Springer, 2010.


E-Government Success Factors in the Context of an ITenabled<br />

Budget Reform: A Questionnaire Report<br />

ABSTRACT<br />

The adoption of e-government initiatives is not in vacuum. They<br />

are usually adopted in complex settings influenced by not only IT<br />

factors but other factors from different structures, such as<br />

contextual, organizational, collaboration, knowledge, and trust.<br />

These structures come from the context in which the egovernment<br />

project is embedded. The goal of this research is to<br />

explore the multiple factors from various structures involved in egovernment<br />

success using a contemporary case of an IT-enabled<br />

budget reform in Mexico. This study comprises a descriptive<br />

summary of answers from a questionnaire applied over federal<br />

and state government officials who participated in this initiative<br />

who adopted it into their daily practice. Due to the context of the<br />

IT-enabled budget reform, questions about the factors from<br />

different structures including the budgeting structure were<br />

analyzed. General characteristics and potential benefits of the egovernment<br />

initiative were also examined. The main motivation<br />

of this study is to extend our understanding of possible enablers<br />

and inhibitors that public officials face during the adoption of egovernment<br />

projects into work routines and different contexts.<br />

Derived from the questionnaire results, a selection of 11 “practical<br />

advices” were identified as useful for a successful adoption of egovernment<br />

projects.<br />

Categories and Subject Descriptors<br />

J.1 ADMINISTRATIVE DATA PROCESSING [Computer<br />

Applications]: Government – applications, government.<br />

General Terms<br />

Management, Human Factors, Theory.<br />

Keywords<br />

Electronic Government; Success Factors; Questionnaire.<br />

1. INTRODUCTION<br />

Most of e-government projects involve a complexity of the<br />

multiple factors and actors involved in practice [18,19,24,34,38].<br />

In the literature, there are many frameworks that attempt to<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Gabriel Puron-Cid<br />

Centro de Investigacion y Docencia<br />

Economicas (CIDE)<br />

gabriel.puron@cide.edu<br />

336<br />

integrate these multiple factors and actors involved in the<br />

implementation of e-government initiatives [18,19,34]. These<br />

efforts have contributed to our understanding of e-government<br />

mechanisms of success and failure, but neglect other interacting<br />

structures and actors involved in the phenomenon [18,19,24,34].<br />

Depending on the type of e-government, other relevant structures<br />

and factors need to be considered in practice and consequently in<br />

theory [8,18,19,34]. For this paper, structures are analytical<br />

dimensions considered in interaction in the adoption of egovernment,<br />

while factors are particular features of this<br />

interaction. This study accounts for the multiple success structures<br />

and factors, not only from information systems, but from other<br />

disciplinary fields and policy domains that are involved in the<br />

adoption of e-government [18,19,34].<br />

One of the most critical applications of e-government is present in<br />

the field of budgeting [34]. Because of the intensive informational<br />

content and technological use in the budget process, information<br />

systems have become central to budgeting operations in<br />

government, and vice versa [27,28]. As Joyce, Lee, & Johnson<br />

[26: 397] noted “Contemporary approaches to budgeting and<br />

accounting obviously require considerable amounts of information<br />

for decision making and evaluation. Information Systems, then,<br />

constitute an effort to bring about greater coordination of [diverse]<br />

organizational units in the collection, storage, manipulations,<br />

retrieval, and analysis of information.” This paper examines the<br />

multiple factors of e-government success by using an IT-enabled<br />

budget reform in Mexico as a contemporary e-government case in<br />

the field of budgeting. This case not only helps to understand the<br />

traditional structures from information systems and actors such IT<br />

staff members involved in e-government initiatives, but also it<br />

considers other critical structures and actors interacting as well<br />

from other fields and staff areas (i.e. budgeting, planning,<br />

management, evaluation, auditing, etc.). Since late 1980s,<br />

Mexican government has reformed its budget system involving<br />

the adoption of various information systems and managerial<br />

techniques across time. The last of these reforms, known as PbR-<br />

SED for its Spanish abbreviation of “Budgeting based on Results-<br />

Performance Evaluation System”, was recently designed and<br />

enacted in 2008 and its purpose is to transform the way agencies<br />

spend public resources based on results and cost savings, new<br />

information systems, and novel budgetary techniques. The PbR-<br />

SED represents an ongoing and complex transformation and is<br />

expected to condense multiple factors and actors from different<br />

organizations.<br />

This exploratory study comprises a descriptive summary of the<br />

answers of the questionnaire over the PbR-SED adoption. The<br />

questionnaire was applied over federal and state government<br />

officials who participated in the initiative. With a response rate of


14.9% (221 respondents), the goal of the questionnaire was to<br />

evaluate a variety of structures and factors deemed as influential<br />

for a successful adoption of the PbR-SED from the perspective of<br />

the public officials who adopt it. The structures revised were:<br />

general characteristics of the initiative, benefits of the initiative,<br />

contextual factors, budgetary and information systems factors,<br />

collaboration factors, and knowledge and trust factors. The main<br />

motivation of this study is to derive useful evidence for extending<br />

our understanding about possible obstacles and enablers of egovernment.<br />

The purpose is that e-government community of<br />

practitioners and scholars use these findings for advising a<br />

successful adoption of e-government into working routines and<br />

particular contexts. Derived from the analysis of the questionnaire<br />

results, a selection of 11 “practical advices” were identified as<br />

useful for a successful adoption of e-government. The structure of<br />

the paper is organized in six sections including these introductory<br />

remarks. The second reviews the literature about the multiple<br />

factors involved in e-government adoption. The third section<br />

details research design and methods. The fourth section discusses<br />

results of the questionnaire in seven subsections: 1) general<br />

characteristics of the initiative, 2) benefits of the initiative, 3)<br />

contextual factors 4) budgetary and information systems factors,<br />

5) collaboration factors, 6) knowledge factors, and 7) trust factors.<br />

The fifth section discusses 11 "practical advices" resulting from<br />

the analysis of the questionnaire which we believe are useful for a<br />

successful adoption of the e-government. The sixth section makes<br />

some concluding remarks.<br />

2. LITERATURE REVIEW<br />

The literature of the fields of information systems and budgeting<br />

was reviewed by considering that e-government initiatives for<br />

budget reforms engage in practice more than just information<br />

systems and technology components [6,14,23,29,34]. The review<br />

was not exhaustive, but sufficient for the purpose of exploration<br />

of the multiple factors and structures involved in e-government<br />

success. There are multiple disciplinary and paradigmatic<br />

inquiries to understand the compound effects of different<br />

structures and factors involved in the adoption of e-government<br />

initiatives [8,14,18,19,34,40]. This article classifies them in two<br />

categories: benefits of e-government and factors influencing egovernment<br />

success.<br />

In terms of benefits, the literature shares 8 potential benefits:<br />

increase efficiency and cost reduction [17,18,34]; improve public<br />

services [11,19,34]; strengthen accountability [15,34,35]; increase<br />

communication based on performance information [22,34];<br />

improve collaboration between different staffs [3,34]; improve<br />

collaboration between different organizations [3,9,16,34]; and<br />

increase knowledge sharing [31,34].<br />

In the case of factors, the literature can be classified into 5 groups:<br />

contextual, information systems, collaboration, knowledge, and<br />

trust. Because of the particular context of budgeting in which the<br />

e-government initiative is implemented, the literature of budgeting<br />

was revised and budgetary factors were included. Different<br />

authors have identified the role of contextual factors in egovernment<br />

success [5,8,30,34,40]. In particular, it is<br />

acknowledged the relevance of economic, social, political,<br />

institutional, and organizational contexts for e-government<br />

success [14,19,30,34,40]. Economic factors represent the<br />

pressures for resource allocation on IT-related projects [14,19,34].<br />

Social factors involve social challenges influencing e-government<br />

337<br />

adoption such as: security concerns, rapid technological change,<br />

reforms and other social demands [30,34]. Political factors include<br />

political support from top officials, legislators and policy makers<br />

[30,32,34]. Institutional factors refer to the legal framework in<br />

which e-government is embedded [8,14,19,34]. Organizational<br />

factors involve four dimensions: strategic alignment between egovernment<br />

and organization’s mission [6,14,34]; level of<br />

standard setting of government processes and activities [30,34];<br />

level of centralization [5,11,34]; and size and number of<br />

jurisdictions in terms of diversity of users or organizations<br />

involved in the project [8,11,34].<br />

Budget factors include four dimensions: methodology, strategy of<br />

implementation, and procedures. Methodology factors involve the<br />

information format, content and methods for budgeting and<br />

accounting [27,34,39]. Strategy of implementation factors are the<br />

intentions of designers of the reform [12,34,37] and the proposed<br />

direction of this change—top-down or bottom-up- [34,39].<br />

Procedures factors include the roles of budgetary authorities and<br />

their scope of action in the budget process [25,34,37,39].<br />

Information systems factors involve three dimensions of factors<br />

influencing e-government success: characteristics of official<br />

information systems [30,34]; interoperability issues from<br />

participant organizations [34,36]; and data integration as<br />

challenges of information sharing [2,10,34].\<br />

Collaboration factors occupy four structures: authority, leadership,<br />

governance, and resource sharing. Authority factors include the<br />

formal designation of responsible(s) of the project and the<br />

development of effective policies and technical standards<br />

[32,34,37]. Leadership factors consider support mechanisms to a<br />

leader or team as well as guided actions through policies and other<br />

boundary objects [32,34,41]. Governance factors are indicated the<br />

procedures and mechanisms for making and monitoring decisions<br />

regarding e-government such as selection of teams or networks,<br />

and other mechanisms of interaction between participants<br />

[1,33,34]. Resource sharing factors engage the potential inputs<br />

required for coordination and adoption of e-government in<br />

organizations such as financial, staff, technical infrastructure and<br />

training [27,34].<br />

Knowledge factors consider five dimensions: professional<br />

experience, teamwork experience, information systems<br />

knowledge, and budgetary knowledge. Professional experience<br />

considers specific task knowledge and expertise to conduct the job<br />

including professional background, job and operation experience,<br />

and training [11,34]. Teamwork experience implies abilities<br />

learned to work in team such knowledge sharing and previous<br />

experiences working in team [7,34]. Information systems<br />

knowledge suggests the technical expertise required to understand<br />

technology in use, data bases, and other information structures<br />

[31,34]. Budgetary knowledge represents the particular use of<br />

information from the budgetary field [27,34].<br />

Trust factors entail four dimensions: confidence based on<br />

budgetary knowledge; confidence based on information systems<br />

knowledge; clear roles and responsibilities; and motivation.<br />

Building confidence based on knowledge, in this case in the fields<br />

of budgeting and information systems, has been identified in the<br />

literature as crucial [27,30,34]. Clarifying roles and<br />

responsibilities has been also detected as influencial for building<br />

trust among participants in the initiative [13,30,34]. Finally,


creating different incentives and public recognition has also been<br />

influential to e-government success [21,34,37].<br />

3. RESEARCH DESIGN AND METHODS<br />

This research applied a questionnaire to civil servants from<br />

various ministries and government agencies of the federal and<br />

state governments. The data of participants were collected from<br />

the lists of staff who participated in the official training of the<br />

PbR-SED initiative during 2009 and 2010 and contact information<br />

of high officials at the federal and state governments available<br />

online. 2.048 potential participants were first invited to participate<br />

during the month of June 2011. 566 emails were not valid or<br />

rejected by security measures from their organizations’ email<br />

administrators. Only 1,482 emails were sent back and valid. Only<br />

221 questionnaires were completed with a response rate of 14.9%<br />

in general. This rate is considered normal for research via<br />

electronic or online [4]. However, there are sections of the<br />

questionnaire that reported lower rates of response (in particular<br />

the last sections of the questionnaire). The questionnaire was<br />

designed and developed using an electronic tool called<br />

SurveyMonkey. The tool offers a platform that makes the<br />

questionnaire available online for participants. The questionnaire<br />

contains seven sections of questions (see Table 1). The first<br />

section welcomes and provides information about the study. The<br />

second section includes 12 questions of multiple choice about the<br />

general characteristics of the project (it considers an option for<br />

"others" in several questions). The third to the sixth sections, the<br />

questionnaire includes 105 questions using a 7-point Likert scale<br />

(from “totally agree” to “totally disagree” options), asking<br />

“Was… [factor]… influential for PbR-SED success?” or<br />

“Was…[benefit]…derived from the successful adoption of the<br />

PbR-SED?”.<br />

Only 54 questions are reported in this study in blocks of factors (8<br />

for benefits, 12 for contextual, 5 for budgetary, 5 for information<br />

systems, 9 for collaboration, 9 for knowledge, and 6 for trust).<br />

The last section of the questionnaire contains 8 questions about<br />

demographic aspects of respondents (see Table 1 for each<br />

dimension and type of factor). The results are presented in<br />

percents of two modalities of response: agreement and<br />

disagreement. The percent of respondents “agree” coded the<br />

opinions under the categories of "somehow agree", "agree" and<br />

"totally agree". The percent of respondents “disagree” coded the<br />

opinions under the categories from “neutral” to “totally disagree”.<br />

The average, standard deviation, and level of agreement of each of<br />

the 54 questions are reported.<br />

The questionnaire registered the opinion of public officials at<br />

different levels of responsibility in the areas of budget,<br />

management programs, information systems, and other areas. On<br />

average, respondents reported 16.4 years of job experience in<br />

government and 6.5 years of experience in actual position. The<br />

most common levels of education were undergraduate and<br />

graduate level mainly in the fields of accounting, economics,<br />

management, information systems, law and various engineering<br />

fields. The average age of respondents was 45 (with a minimum<br />

of 25 years and a maximum of 69 years). Gender of respondents<br />

was reported as 33.6% women and 66.4% men.<br />

Questions<br />

Table 1. Factors and Questions<br />

338<br />

Benefits<br />

1. Increase efficiency<br />

2. Cost reduction<br />

3. Improve public services<br />

4. Strengthen accountability<br />

5. Increase communication based on performance information<br />

6. Improve collaboration between different staffs<br />

7. Improve collaboration between your organization and others<br />

8. Increase knowledge sharing<br />

Contextual Factors<br />

1. Influence of present economic situation [Economic]<br />

2. New law, crisis or elections [Social]<br />

3. Social demand [Political]<br />

4. Support of top officials in your organization [Political]<br />

5. Support of congress people [Political]<br />

6. Budgetary norms and regulations [Institutional]<br />

7. Public investment norms and regulations [Institutional]<br />

8. Civil service norms and regulations [Institutional]<br />

9. Strategic planning in your organization [Organizational]<br />

10. Standards for processes and tasks in your organization [Organizational]<br />

11. Level of decentralization of decision making in your organization [Organizational]<br />

12. Size and number of jurisdictions in your organization [Organizational]<br />

Budget Factors<br />

1. Budgetary methodology for performance information<br />

2. Top-bottom strategy of implementation from the ministry of finance<br />

3. Strategy of implementation from the ministry of finance<br />

4. Flow for enter, revise, and authorize performance information in the budgetary process<br />

5. Official calendar of activities in the budgetary process<br />

Information Systems Factors<br />

1. Development and use of proprietary systems in your organization<br />

2. Previous experience developing information systems and data bases in your organization<br />

3. Official information system of the ministry of finance<br />

4. Definition of roles and accesses in the official information system<br />

5. Sharing data bases, catalogues, and tables with others<br />

Collaboration Factors<br />

1. Use of memos, internal norms and manuals to set rules in the initiative [Authority]<br />

2. Official designation of a responsible of the initiative in the organization [Authority]<br />

3. Use of official memos, internal norms and manuals to support the leader or team members<br />

responsible of the initiative [Leadership]<br />

4. Leadership of the person in charge or team members responsible of the initiative<br />

[Leadership]<br />

5. Designation of a multi-disciplinary team in the organization as responsible of the initiative<br />

[Governance]<br />

6. Meetings and its documents such as minutes, plans and other material [Governance]<br />

7. Staff assigned in the initiative [Resources]<br />

8. Technical infrastructure assigned in the initiative [Resources]<br />

9. Resources for training [Resources]<br />

Knowledge Factors<br />

1. Professional background [Professional Experience]<br />

2. Job experience [Professional Experience]<br />

3. Management operation experience [Professional Experience]<br />

4. Previous reform experience [Professional Experience]<br />

5. Knowledge sharing with members from different areas [Teamwork]<br />

6. Previous experience working with members from different areas [Teamwork]<br />

7. Budget management experience [Budgetary Knowledge]<br />

8. IS and technology use and experience [IS Knowledge]<br />

9. Official training [Training]<br />

Trust Factors<br />

1. Level of budgetary knowledge created confidence to work in the initiative [Confidence<br />

based on budgetary knowledge]<br />

2. Level of IS and technology created confidence to work in the initiative [Confidence based<br />

on IS knowledge]<br />

3. My role and responsibility in the initiative were clear [Clear roles and responsibilities]<br />

4. The role and responsibilities of other organizations and participants were clear to me [Clear<br />

roles and responsibilities]<br />

5. Attractive incentives to participate in the initiative [Motivation]<br />

6. My effort collaborating in the initiative was publicly recognized [Motivation]<br />

* Note: A 7-points Likert scale was used from “totally agree” to “totally disagree”.<br />

4. ANALYSIS OF RESULTS<br />

4.1 General Characteristics<br />

This section of the survey includes the opinion of respondents<br />

about the following features of the PbR-SED initiative: goals, type<br />

of staffs collaborating, organizations involved, roles and<br />

responsibilities, schemes of governance, and type of resources<br />

assigned to the initiative.


4.1.1 Goals for the e-government initiative. The results of the<br />

questionnaire show that establishing multiple goals for the<br />

initiative creates confusion. Few but well-defined and clear set of<br />

objectives generates certainty and perspective about the adoption<br />

of the initiative in the organization. Figure 1 presents an opinion<br />

from respondents over the perceived goals of the PbR-SED<br />

initiative. Only 35.2% of respondents believed that the main<br />

purpose of the PbR-SED is to develop administrative capacity.<br />

32.8% of respondents believe that the goal of the initiative is to<br />

comply with a legal mandate from the Executive or the ministry<br />

of finance. Only 21.9% of participants agree that the goal of the<br />

PbR-SED is to provide a specific solution for a problem in<br />

government through the use and analysis of performance<br />

information. Approximately 10% of opinions present "other"<br />

goals such as improving the planning, assessment, and budgeting<br />

operations of public spending. The lesson is that the establishment<br />

of multiple objectives for e-government creates confusion among<br />

the participants on the terms, scope and purpose of the initiative in<br />

their organization.<br />

Figure 1. Goals of the initiative (210 responses)<br />

4.1.2 Inter-disciplinary collaboration. Results from the<br />

questionnaire show the presence of collaboration between actors<br />

from different staffs than just information technology. Figure 2<br />

shows that the 22.4% of respondents involved in the adoption of<br />

the PbR-SED belong to budget staffs. However, the vast majority<br />

of participants come from different professional areas or staffs<br />

such as: planning (27.4%), management of public programs<br />

(18.4%), information systems (13.87%), and internal controls and<br />

audits (8.4%). The results of the questionnaire also identify staff<br />

from "other" areas such as evaluation, public investment, public<br />

works management, and other administrative officers. These<br />

results present evidence of the importance of the inter-disciplinary<br />

nature of collaboration among the different staffs involved in the<br />

adoption of the PbR-SED.<br />

This interdisciplinary collaboration also varies along the process<br />

of adoption. Table 2 shows different types of staffs collaborating<br />

across the stages of adoption of the e-government initiative. For<br />

example, staff members of planning areas have a very active role<br />

in all stages of adoption, followed by project leaders and budget &<br />

finance staff members. Members from information systems and<br />

management of programs staffs engage more actively at the stages<br />

of project planning, project design, development of information<br />

systems, and implementation. The results also identified members<br />

from "other" staffs, such as training, evaluation, internal controls,<br />

339<br />

and monitoring. On average, participants of the PbR-SED<br />

initiative spent 34.4% of their weekly time for the adoption of the<br />

PbR-SED. This is an important finding due to the need of<br />

recognition that initiatives like the PbR-SED consume<br />

considerable amounts of time and effort during the different<br />

phases of the project.<br />

Figure 2. Staffs involved in the initiative (206 responses)<br />

Table 2. Number of participants by type of staff and stage of<br />

adoption (204 responses)<br />

4.1.3 Inter-organizational collaboration. The literature has<br />

been predominantly aimed at studying the role of the legislative<br />

branch members and the executive office in e-government success<br />

[18,19,34,39,40]. Figure 3 shows that the first level of<br />

collaboration was given at the interior of the organizations rather<br />

than at the exterior. The first manifestation of collaboration of the<br />

PbR-SED initiative occurs across different staffs within the<br />

organization (inter-disciplinary collaboration). The second layer<br />

of collaboration happens between various organizations from<br />

federal, state or local levels of government (inter-organizational<br />

collaboration). After the internal level of collaboration, the<br />

collaboration between organizations and control agencies was<br />

critical. Our respondents also identified other levels of<br />

collaboration with different levels of government, private<br />

organizations, and international organizations such as the World<br />

Bank, the Inter-American Development Bank (IDB), the<br />

Economic Commission for Latin America (ECLAC), the Latin


American and the Caribbean Institute of Economic and Social<br />

Planning (ILPES). Collaboration with universities was also<br />

reported such as the Autonomous University of Mexico (UNAM)<br />

and the Center for Economic Research and Teaching (CIDE). In<br />

“others” option, respondents considered coordination with certain<br />

agencies specialized in particular policy domains in Mexico like<br />

the National Council of Evaluation for Social Policy<br />

(CONEVAL), the National Commission of Housing (CONAVIS),<br />

the Mexican Youth Institute (IMJUVE), the National Institute of<br />

Women Affairs (INMUJERES), the National Commission on<br />

Human Rights, the Federal Electoral Institute (IFE), and the<br />

Superior Audit Organization. The results of the questionnaire<br />

made evident that inter-organizational collaboration is multilevel<br />

involving different organizations with different missions,<br />

functions and responsibilities.<br />

Figure 3. Types of inter-organizational collaboration in the<br />

initiative (210 responses)<br />

4.1.4 Governance scheme. The literature points out the<br />

predominance of the ministry of finance and other control<br />

agencies in the process of adoption of reforms. This represents a<br />

strong disincentive for implementer agencies to get involved in<br />

the process of adoption of the initiative [34]. Figure 4 provides an<br />

overview of the predominance of federal government in the<br />

governance scheme of the initiative progress. The oversight of<br />

control agencies in the federal government like SHCP, SFP and<br />

CONEVAL is stronger for the adoption of the initiative. However,<br />

there are instances of governance involving state and local levels<br />

of governments and very few cases from other organizations like<br />

the World Bank and the IDB. Puron-Cid [34] suggests that<br />

participatory governance involving organizations other than just<br />

control agencies may enrich the process of adoption and may<br />

ensure more innovation of the project in the organization.<br />

4.1.5 Strategies of resources supporting the initiative.<br />

Governance schemes are predominantly supervised by the federal<br />

government. Strategies of assigning resources to support the<br />

adoption of the initiative primarily come from the federal<br />

government as well. This type of “centralized” support of<br />

resources by control agencies at the federal level has advantages<br />

and disadvantages. The great advantage of this strategy is that<br />

offers a general framework for adoption across organizations<br />

based on incentives and resources. However, this scheme also<br />

suggests a lack of involvement by implementers due to the<br />

imposed structures for adoption, and their low investment and<br />

involvement in the project. Standard models of support may not<br />

340<br />

correspond to the needs of operation of implementer agencies.<br />

The questionnaire identifies five types of resources and source of<br />

support for the adoption of the PbR-SED initiative (see Figure 5):<br />

financial, training, information technology, ICT knowledge and<br />

staff, and experts and consultants.<br />

Figure 4. Types of organizations supervising the initiative (205<br />

responses)<br />

Figure 5. Types of support for the initiative (193 responses)<br />

On average, federal government assists on average 73% of these<br />

supports. In the same way, state governments operate on average<br />

17% of this aid and international organizations such as the World<br />

Bank and the IDB orchestrated on average 24% of this help. It is<br />

important to note that municipal governments presented almost no<br />

participation in these support strategies. Future research should<br />

corroborate if this pattern of support strategy corresponds to a<br />

shortage of resources, a lack of involvement, or a failure in the<br />

centralized design of the project at the federal level.<br />

4.2 Benefits<br />

Table 3 lists the results for the category of benefits of the adopted<br />

e-government initiative. The benefit with higher level of<br />

agreement is knowledge sharing. Respondents agreed that the<br />

PbR-SED helped members from different staffs to share expertise,<br />

knowledge and information across different areas like program


management, budget, and information systems (82.7%). The<br />

second largest benefit perceived by respondents was improving<br />

inter-disciplinary collaboration. Respondents consider that the<br />

PbR-SED makes more effective working relationships between<br />

different internal areas and staffs in the organization such as<br />

planning, budget, program management, and information systems<br />

(78.2%). With regards to the increase in communication,<br />

respondents felt that the PbR-SED generated performance<br />

information useful for decision-making of public programs<br />

(70.4%). Respondents consider more strengthened accountability<br />

between different staffs and areas within the organization as a<br />

benefit as well (69.8%). For the benefit of improving public<br />

services, respondents felt that the PbR-SED gave them rise to a<br />

better delivery of public services based on performance (66.5%).<br />

In terms of improving inter-organizational collaboration, a 64.2%<br />

of respondents consider that the PbR-SED resulted in a better<br />

collaboration between their organizations and other agencies and<br />

ministries. About the benefit of increasing efficiency, respondents<br />

perceived that the PbR-SED improves the organizations efficiency<br />

(60.9%). In contrast to the benefit of cost reduction, respondents<br />

have a divided opinion over whether the PbR-SED really saves or<br />

reduces costs (50.8%).<br />

Table 3. Benefits of e-government (179 responses)<br />

* Note: A 7-points Likert scale was used from “totally agree” to “totally disagree”.<br />

For the % agree, only the categories of "somehow agree", "agree" and "totally agree"<br />

were considered.<br />

These results present areas of improvement. On one hand, the<br />

adoption of PbR-SED has resulted in: better collaboration across<br />

different members within the organization (inter-disciplinary<br />

collaboration); a critical tool to enhance accountability within the<br />

organization; and an instrument to share knowledge and<br />

information among different areas of expertise like program<br />

management, budgeting, and information systems. However, there<br />

are some divided opinions if the PbR-SED has really improved<br />

efficiency in the organization, reduced costs, improved public<br />

services, and enhanced inter-organizational collaboration between<br />

different agencies and organizations involved in the initiative<br />

(inter-organizational collaboration).<br />

4.3 Contextual Factors<br />

Table 4 lists the results for each contextual factor. The contextual<br />

factors more influential in the adoption of the PbR-SED are the<br />

support of top officials (75.6%) and the usefulness of the strategic<br />

planning (75.0%). The first is political and the second is<br />

organizational. Other contextual factors were less influential but<br />

significant such as budgetary norms and regulations (75.0%),<br />

341<br />

level of standardization of processes and tasks (67.4%), level of<br />

centralization (64.5%), and size and number of jurisdiction<br />

(59.9%). The economic factor, social factors and the political<br />

factor of support of congress people present divided opinions<br />

about their influence on the success of the PbR-SED. In sum, the<br />

political factor of top officials support, the institutional factor of<br />

budgetary norms and regulations, and all organizational factors<br />

were considered influential.<br />

Table 4. Contextual factors of e-government (172 responses)<br />

* Note: A 7-points Likert scale was used from “totally agree” to “totally disagree”.<br />

For the % agree, only the categories of "somehow agree", "agree" and "totally agree"<br />

were considered.<br />

4.4 Budget & Information Systems Factors<br />

Table 5 lists the results for the budget and information systems<br />

factors. Three budget factors were considered influential by<br />

respondents: budgetary methodology for performance information<br />

(80.2%), top-bottom strategy of implementation (68.5%), and<br />

strategies of implementation of the ministry of finance (63.6%).<br />

Information systems factors presented lower levels of agreement<br />

about their influence on the adoption of the PbR-SED, but two<br />

factors figured among this battery of questions: development and<br />

use of proprietary information systems in implementer<br />

organizations (60.0%), and definition of roles and accesses in the<br />

official information system (59.9%). There were divided opinions<br />

for two budget factors: the influence of flow of performance<br />

information (54.3%) and official calendar (44.4%). Similarly,<br />

divided opinion was also present for some information systems<br />

factors such as: the official information system (57.4%), previous<br />

experience developing information systems and data bases in the<br />

organization (57.4%), and sharing data bases, catalogues, and<br />

tables (46.3%). In general, budget factors reached higher levels of<br />

agreement than information systems factors.<br />

Table 5. Budget & Information Systems factors of egovernment<br />

(162 responses)


* Note: A 7-points Likert scale was used from “totally agree” to “totally disagree”.<br />

For the % agree, only the categories of "somehow agree", "agree" and "totally agree"<br />

were considered.<br />

4.5 Collaboration Factors<br />

Most of collaboration factors were perceived by respondents as<br />

critical for adoption of the PbR-SED (see Table 6). For authority,<br />

the use of memos, norms and manuals to set rules (74.4%) and the<br />

official designation of a responsible of the initiative in the<br />

organization (69.9%) were considered important. In terms of<br />

leadership, similar use of memos, norms and manuals to support<br />

the people leading the project (76.9%) and the work of the<br />

leader(s) or team in charge of the initiative (67.9%) were<br />

considered influential. Governance presents contrasting results,<br />

while the designation of a multidisciplinary team to coordinate the<br />

initiative presents a considerable level of agreement (69.9%),<br />

mechanisms of governance such as meetings and its boundary<br />

objects such as minutes, plans and other material had lower<br />

percent of agreement (58.3%). Finally, the use of human resources<br />

presented higher level of agreement (64.7%) than the resources<br />

assigned to technical infrastructure (55.8%) and official training<br />

(50.0%). In sum, the role of authority, leadership and certain<br />

aspect of governance were evaluated by respondents as influential<br />

for a successful adoption of the PbR-SED initiative.<br />

Table 6. Collaboration factors of e-government (156<br />

responses)<br />

342<br />

* Note: A 7-points Likert scale was used from “totally agree” to “totally disagree”.<br />

For the % agree, only the categories of "somehow agree", "agree" and "totally agree"<br />

were considered.<br />

4.6 Knowledge Factors<br />

All knowledge factors obtained the highest levels of agreement<br />

across all factors in this study (see Table 7). In particular,<br />

professional experience showed to be highly critical for a<br />

successful adoption of the PbR-SED. Except for previous reforms<br />

experience (71.1%), professional background, job experience, and<br />

management operation experience presented higher levels of<br />

agreement more than 80%. In terms of teamwork, knowledge<br />

sharing across members from different staff areas presented<br />

84.9% level of agreement while previous experience working with<br />

members from other areas obtained 73.7%. These results suggest<br />

that previous experience is critical, but not as much as<br />

professional experience of individuals. Budget management,<br />

information systems experience and technology use also present<br />

important effects on the adoption of the PbR-SED with 75% of<br />

agreement across respondents. These findings are aligned with the<br />

idea that professional experience of participants in the initiative<br />

may be enriched or complemented by disciplines’ knowledge.<br />

Finally, the lowest level of agreement in this battery of questions<br />

for knowledge factors is the official training with 70.4% level of<br />

agreement. This evidence suggests that official mechanisms of<br />

increasing knowledge and experience prescribed by reformers<br />

“centrally” are not adequate for the particular needs and<br />

operations of implementer agencies.<br />

Table 7. Knowledge factors of e-government (152 responses)


* Note: A 7-points Likert scale was used from “totally agree” to “totally disagree”.<br />

For the % agree, only the categories of "somehow agree", "agree" and "totally agree"<br />

were considered.<br />

4.7 Trust Factors<br />

Most of trust factors obtained high levels of agreement about their<br />

influential effects such as (see Table 8): confidence based on<br />

budgetary knowledge (71.7%), confidence based on information<br />

systems knowledge and technology use (71.1%), and clear roles<br />

and responsibilities (78.3% and 69.1%). Only motivation factors<br />

presented low levels of agreement: incentives (39.5%) and public<br />

recognition (37.5%). Building trust is an important enabler for egovernment<br />

success not only by establishing clear roles and<br />

responsibilities, but by enhancing knowledge and expertise of<br />

participants across multiple disciplines (not just IT).<br />

Table 8. Trust factors of e-government (152 responses)<br />

* Note: A 7-points Likert scale was used from “totally agree” to “totally disagree”.<br />

For the % agree, only the categories of "somehow agree", "agree" and "totally agree"<br />

were considered.<br />

5. PRACTICAL ADVISES<br />

These results from the questionnaire allow us to derive 11<br />

“practical advices” for a successful adoption of e-government.<br />

There are five advises taken from the general characteristics<br />

section: (1) Avoid multiple goals for the e-government initiative;<br />

(2) establish inter-disciplinary mechanisms of collaboration<br />

343<br />

among participants from different staffs at the interior of the<br />

organization as first level of coordination of the e-government<br />

initiative; (3) establish inter-organizational mechanisms of<br />

collaboration among participants from different organizations as a<br />

second level of coordination of the e-government initiative; (4)<br />

define better and more complete governance schemes for the<br />

organization by creating channels of participation between key<br />

organizations, not just the traditional reformer agencies; in order<br />

to (5) establish strategies of support of the initiative by sharing<br />

financial, human, technological, training and knowledge<br />

resources. Results from the benefits section suggest that (6)<br />

specifying a clear set of goals and activities helps to direct action<br />

towards achievable plans. For agencies, it was easier to improve<br />

by having a clear set of goals and performance indicators for<br />

improving a particular public service than goals set in general<br />

terms. With the complex goals of the PbR-SED, respondents were<br />

only able to improve knowledge sharing and interdisciplinary<br />

collaboration, but efficiency, cost reduction, and public services.<br />

From the contextual section, (7) the lesson is to consider in<br />

advance potential economic, social, political, institutional, and<br />

organizational risks that may influence the adoption of the<br />

initiative. It was found that economic, social and political factors<br />

cannot be forecasted, but general trends can be detected and<br />

prevented for a better adoption of the initiative. Institutional and<br />

organizational factors may enable or inhibit internal strengths for<br />

e-government success. An analysis of contextual factors provides<br />

a useful map for where the initiative is standing. For budgetary<br />

and information systems’ components, it is critical to consider that<br />

(8) both work together not in isolation. Depending of the context<br />

and necessary fields of expertise required in the project, egovernment<br />

initiatives need to acquire relevant disciplinary<br />

knowledge and experience across participants for a successful<br />

adoption. For collaboration, (9) implementers should preview the<br />

multiple levels of collaboration. It is necessary to exercise clear<br />

mechanisms of collaboration such as authority, leadership,<br />

governance and different types of resources to support potential<br />

interdisciplinary and inter-organizational collaborations during the<br />

adoption of the initiative. In terms of knowledge, (10) reformers<br />

need to provide official training in different disciplines (not just<br />

budgeting) as an incubating step in the process of adoption. It is<br />

critical to pay attention of the professional experience, teamwork<br />

experience, and different disciplinary and areas of knowledge and<br />

expertise of participants, project leaders, members of teams, and<br />

people involved in the e-government initiative. Finally for trust,<br />

(11) there are motivational schemes that build confidence among<br />

participants and motivate participation and collaboration. This<br />

study found influential to build confidence the following<br />

mechanisms: promoting knowledge and expertise on the different<br />

areas or disciplines; setting clear roles and responsibilities; giving<br />

monetary and non-monetary incentives like public recognition.<br />

The lack of these trust builders may act as inhibitors of egovernment<br />

adoption.<br />

6. CONCLUSIONS<br />

This research provides evidence of the multiple structures and<br />

factors involve in e-government adoption. The results also suggest<br />

the multi-dimensional nature of the structures involved in egovernment<br />

success. It is not the intention to suggest that “all<br />

matters”, but to provide a conceptual map for evaluation that<br />

serves to diagnose what components of the initiative require the<br />

attention of both, reformers and implementers, for a successful<br />

process of adoption. The questionnaire as research instrument


showed to be useful, for collecting data from respondents from<br />

their natural settings. Using an online technique to collect<br />

responses was limited, but useful to collect the data across<br />

participants of the PbR-SED dispersed in the territory. This<br />

allowed less expensive and more control process of data<br />

collection. Particular attention of the phrasing of questions needs<br />

to be considered carefully for this type of research method. In<br />

particular, the section of questions valuated by using the 7-point<br />

Likert scale proved to be very useful for capturing the opinion of<br />

respondents. The dispersion of responses shows that the scale<br />

goes from high levels of agreement to low levels of agreement<br />

(disagreement). This dispersion was useful to scale the opinions<br />

about factors influence going from enabling or positive impact to<br />

inhibiting or negative impact over a successful adoption of the<br />

PbR-SED. In other words, the results show that there is a set of<br />

powerful enablers and inhibitors during the adoption of the PbR-<br />

SED initiative. For enablers (equal or higher than 5.0 on average),<br />

this study found some particular political, organizational, and<br />

budgetary factors, but among all collaboration, knowledge and<br />

trust factors obtained the highest levels of agreement about their<br />

influence on e-government success. For inhibitors, several factors<br />

across different structures showed low levels of agreement (less<br />

than 5.0 on average) meaning not necessarily no relation with egovernment<br />

success, but a negative impact on e-government<br />

success. Another important result from this study is that the<br />

connection between the goals of the e-government initiative and<br />

the benefits perceived is weak. This may be resulted from the lack<br />

of clarity about the goals and expected results of the PbR-SED in<br />

organizations creating confusion across participants of the project.<br />

In general, participants share knowledge and information,<br />

collaborate more with others, and are more accountable for what<br />

they do; however, they are unable of clear set of goals and<br />

performance indicators for improving efficiency, cost reduction<br />

and improving public services.<br />

7. REFERENCES<br />

[1] Agranoff, R. and McGuire, M. 2001. "Big questions in<br />

public network management research". Journal of Public<br />

Administration Research and Theory, 11. 295-326.<br />

[2] Ambite, J. L. et al. 2002. Data integration and access. In<br />

William J. McIver and Ahmed K. Elmagarmid. Advances in<br />

digital government technology, human factors, and policy.<br />

Boston, MA: Kluwer Academic Publishers.<br />

[3] Andersen, D. F. and Dawes, S. S. Government information<br />

management. A primer and casebook. Prentice Hall,<br />

Englewood Cliffs, NJ, 1991<br />

[4] Bryman, A. Social Research Methods. Oxford University<br />

Press, 2004.<br />

[5] Cresswell, A.M., Pardo, T.A., and Hassan, S. 2000.<br />

"Assessing Capability for Justice Information Sharing', The<br />

Proceedings of the 8th Annual International Digital<br />

Government Research Conference 2000.<br />

[6] Cresswell, A.M., Pardo, T.A., Canestraro, D.S. and Dawes,<br />

S.S. 2005. Why Assess Information Sharing Capability?<br />

Center for Technology in Government.<br />

[7] Davenport, E. and Hall, H. 2002. "Organizational knowledge<br />

and communities of practice". Annual Review of Information<br />

Science and Technology, 36 171-222.<br />

344<br />

[8] Dawes, S.S. and Eglene, O. 2008. New models of<br />

collaboration for delivering government services: A dynamic<br />

model drawn from multi-national research. CTG Working<br />

Paper No. 01-2008<br />

[9] Dawes, S. S., and Pardo, T. A. 2002. Building collaborative<br />

digital government systems. Systematic constraints and<br />

effective practices. In W. J. McIver and A. K. Elmagarmid<br />

(Eds.), Advances in digital government. Technology, human<br />

factors, and policy (pp. 259-273). Norwell, MA: Kluwer<br />

Academic Publishers.<br />

[10] Dawes, S. S., Helbig, N., and Gil-García, J. R. 2004.<br />

Highlights: Exploring the feasibility of a digital government<br />

journal. Albany, NY: Center for Technology in Government,<br />

University at Albany, SUNY.<br />

[11] Dawes, S. S. 1996. "Interagency information sharing:<br />

Expected benefits, manageable risks". Journal of Policy<br />

Analysis and Management, 15(3), 377-394.<br />

[12] De Lancer Julnes, P., and Holzer, M. 2001. "Promoting the<br />

utilization of performance measures in public organizations:<br />

An empirical study of factors affecting adoption and<br />

implementation". Public Administration Review, 61(6), 693-<br />

708.<br />

[13] Dirks, K. T. and Ferrin, D. L. 2001. "The Role of Trust in<br />

Organizational Settings," Organization Science, vol. 12(4),<br />

pp. 450-467.<br />

[14] Fountain, J. E. 2001. Building the virtual state: Information<br />

technology and institutional change. Washington, D.C.: The<br />

Brookings Institution Press.<br />

[15] Gant, D. B., Gant, J. P., and Johnson, C. L. 2002. State Web<br />

Portals: Delivering and Financing EService. The<br />

PricewaterhouseCoopers Endowment for the Business of<br />

Government, Arlington, VA.<br />

[16] Gant, J. P. 2004. Digital Government and Geographic<br />

Information Systems. In A. Pavlichev and G. D. Garson<br />

(Eds.), Digital Government: Principles and Best Practices.<br />

Hershey, PA: Idea Group Publishing.<br />

[17] Garson, G. D. 2004. The promise of digital government. In<br />

A. Pavlichev and G. D. Garson (Eds.), Digital government:<br />

Principles and best practices (pp. 2-15). Hershey, PA: Idea<br />

Group Publishing.<br />

[18] Gil-Garcia, J. R. and Pardo, T. A. 2005. "E-Government<br />

Success Factors: Mapping Practical Tools to Theoretical<br />

Foundations". Government Information Quarterly, 22(2),<br />

187–216.<br />

[19] Gil-Garcia, J. R. 2005. Enacting state websites: A mixed<br />

method study exploring e-government success in multiorganizational<br />

settings. Unpublished Doctoral Dissertation,<br />

University at Albany, State University of New York, Albany,<br />

NY.<br />

[20] Gil-Garcia, J. R., Pardo, T. A., and Burke, G. B. 2007.<br />

"Government leadership in multi-sector IT-enabled<br />

networks: Lessons from the response to the West Nile Virus<br />

outbreak", Paper presented at “Leading the Future of the<br />

Public Sector” – The Third Transatlantic Dialogue, Newark,<br />

DE, Mon, 02 Jun 2007


[21] Grizzle, G.A. and Pettijohn, C. D. 2002. "Implementing<br />

Performance-Based Program Budgeting: A System-<br />

Dynamics Perspective", Public Administration Review,<br />

January/February 2(X)2, 62(1)<br />

[22] Gurbaxani, V., and Whang, S. 1991. “The impact of<br />

Organizations System on Organizations and Markets,”<br />

Communications of the ACM, Vol. 34, No. 1, January, pp.<br />

59-73<br />

[23] Hall, H. and Andrews, M. 2005. "Reforming Budget Ritual<br />

and Budget Practice: The Case of Performance Management<br />

Implementation in Virginia", International Journal of Public<br />

Administration, 28: 255–272.<br />

[24] Heeks, 2006. Implementing and Managing eGovernment. An<br />

International Text. London: Sage Publications.<br />

[25] Joyce, P. G. 2004. Linking Performance and Budgeting:<br />

Opportunities in the Federal Budget Process, (IBM Center<br />

for the Business of Government, October 2003—2nd<br />

Printing January 2004).<br />

[26] Joyce, P. G., Lee, R. D. and Johnson, R. W. 2004. Public<br />

Budgeting Systems, 7th Edition, Jones and Bartlett<br />

Publishers.<br />

[27] Melkers, J.E. and Willoughby, K.G. 2001. "Budgeters' view<br />

of state performance-budgeting systems: Distinctions across<br />

branches", Public Administration Review, January/February,<br />

Vol. 61(1).<br />

[28] OECD. 2007. Performance Budgeting in OECD Countries,<br />

Paris, France: Organisation for Economic Co-operation and<br />

Development.<br />

[29] Orlikowski, W.J., and Baroudi, J. 1991. "Studying<br />

Information Systems in Organizations: Research Approaches<br />

and Assumptions," Information Systems Research, Vol. 2,<br />

No. 1, pp. 1-28.<br />

[30] Pardo, T.A., Cresswell, A. M., Dawes, S. S. and Burke, G. B.<br />

2004. "Modeling the social and technical processes of<br />

interorganizational information integration". In HICSS2004,<br />

37th Hawaiian International Conference on System Sciences.<br />

[31] Pardo, T. A., Cresswell, A. M., Thompson, F., and Zhang, J.<br />

2006. "Knowledge Sharing in Cross-Boundary Information<br />

Systems Development". Journal of Information Technology<br />

and Management, 7(4).<br />

[32] Pardo, T.A., Gil-Garcia, J.R. and Burke, G.B. 2007. Informal<br />

Leadership and Networks: Lessons from the Response to the<br />

345<br />

West Nile Virus Outbreak, in Paul Cunningham and Miriam<br />

Cunningham (Eds), Expanding the Knowledge Economy:<br />

Issues, Applications, Case Studies, IOS Press, 2007<br />

Amsterdam<br />

[33] Peterson, R. 2004. "Crafting information technology<br />

governance". Information Systems Management, 21(4), 7-22.<br />

[34] Puron-Cid, G. 2010. Extending Structuration Theory: A<br />

Study of an IT-enabled Budget Reform in Mexico. Ph.D.,<br />

University at Albany, State University of New York, Albany,<br />

New York.<br />

[35] Rocheleau, B. 2003. Politics, Accountability, and<br />

Governmental Information Systems. In G. D. Garson (Ed.),<br />

Public Information Technology: Policy and Management<br />

Issues. Hershey, PA: Idea Group Publishing.<br />

[36] Sadri, F., Subramanian, I. N. and Lakshmanan, L. V. S.<br />

1996., "Schema SQL - A language for interoperability in<br />

relational multi-database systems", ACM Symposium on<br />

Principles of Database Systems (PODS), June 1996.<br />

[37] Schick, A. 2008. Getting Performance Budgeting to Perform.<br />

Paper presented at the Conferencia Internacional de<br />

Presupuesto por Resultados, Mexico City.<br />

[38] Scholl, Hans J. 2009. Electronic Government: A Study<br />

Domain Past its Infancy, In Scholl, H.J. (ed.) Electronic<br />

Government: Information, Technology and Transformation,<br />

M.E. Sharpe Armonk.<br />

[39] Van Reeth, W. 2002. The bearable lightness of budgeting.<br />

An explorative research on the uneven implementation of<br />

performance oriented budget reform. Ph.D. Doctoral Degree<br />

Thesis, Catholic University of Leuven, Leuven, Germany.<br />

[40] Van Veenstra, A. F., Marijn, J., & Tan Y. H. 2010. Towards<br />

an Understanding of E-Government Induced Change—<br />

Drawing on Organization and Structuration Theories. In<br />

M.A. Wimmer et al. (eds): EGOV 2010. LCNS 6228,<br />

International Federation for Information Processing, pp. 1-<br />

12.<br />

[41] West, D. M. 2005. Digital Government. Technology and<br />

Public Sector Performance. Princeton, USA: Princeton<br />

University Press.<br />

Zheng, H. Y. 2000. Data warehousing in government agencies:<br />

Conceptual and managerial issues. In G.D. Garson (Ed.),<br />

Handbook of public information systems (pp. 447-462). New<br />

York: Marcel Dekker.


Public CIO, Figurehead or Decision-Maker? The case of<br />

Germany.<br />

Niels Proske<br />

University of Potsdam, Chair of<br />

Business Information Systems and E-<br />

Government<br />

August-Bebel-Str. 89<br />

14482 Potsdam, Germany<br />

+49 331 977 4681<br />

nproske@wi.uni-potsdam.de<br />

ABSTRACT<br />

In this paper, we analyze the position of CIO in the German states.<br />

In Germany, public CIOs range from figureheads to real decisionmakers.<br />

We identified three CIO types: first, the Political CIO,<br />

who has substantial resources but less IT competencies; second,<br />

the Operational CIO, who manages IT primarily close to actual<br />

projects; third, the Decorative CIO, who serves predominantly for<br />

public image. Thus, the institution of CIO moves between<br />

catchphrase and e-government enabler.<br />

Categories and Subject Descriptors<br />

K.6.1 [Project and People Management]: Strategic Information<br />

Systems Planning<br />

General Terms<br />

Management, Human Factors, Theory, Legal Aspects<br />

Keywords<br />

CIO, Leadership in Public Authorities, Empirical Comparison<br />

1. INTRODUCTION<br />

CIOs gladly accept prizes for excellent e-government strategies,<br />

give keynote addresses at fairs or conferences and are interviewed<br />

about the importance of collaboration under public authorities.<br />

But what is their actual impact on shaping and advancing the use<br />

of IT in the public sector? Whereas research has given a lot of<br />

attention to the position of Chief Information Officer in<br />

companies, their equivalents in the public sector however have<br />

been scarcely addressed by research. Given the public sector’s<br />

peculiar determining conditions that are likely to affect the CIO’s<br />

design and functions, findings from both science and practice,<br />

should not be transferred carelessly. Especially since high<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Moreen Heine<br />

University of Potsdam, Chair of<br />

Business Information Systems and E-<br />

Government<br />

August-Bebel-Str. 89<br />

14482 Potsdam, Germany<br />

+49 331 977 4690<br />

mheine@wi.uni-potsdam.de<br />

346<br />

Norbert Gronau<br />

University of Potsdam, Chair of<br />

Business Information Systems and E-<br />

Government<br />

August-Bebel-Str. 89<br />

14482 Potsdam, Germany<br />

+49 331 977 4681 3372<br />

ngronau@wi.uni-potsdam.de<br />

expectations are tied to the introduction of the CIO position.<br />

Leadership failures or even the lack of adequate management is<br />

one of the biggest obstacles of e-government activities, which are<br />

for the most part activities of strategy and organizational change<br />

[2] [5] [10]. A lack of political guidelines and an often too late<br />

integration of crucial decision makers are constraining egovernment<br />

progress in general. As a mean to address these<br />

shortcomings, the concept of a Chief Information Officer, inspired<br />

by private sector, emerged in public sector.<br />

Introducing CIOs in the public sector indicates a shift towards<br />

greater centralization as well as recognition that in order to<br />

succeed in e-government a more holistic, inter-agency approach is<br />

necessary [7] [8]. Thought to bridge the gap between IT and<br />

highest-level executives [2], the position of CIO is also<br />

understood as institutionalization of the organization’s egovernment-strategy<br />

[6]. The rise of the CIO concept underlines<br />

in particular the strategic importance of e-government for<br />

organizational change in the public sector overcoming it’s<br />

limitation to merely technical means [4].<br />

CIOs in public sector are exposed to a particular environment,<br />

with political implications, directly affecting their working<br />

conditions. This leads to certain CIO models that often reflect<br />

both power structures and relevance attached to e-government.<br />

The objective of this paper is to explore and describe roles and<br />

functions of CIOs in German federal state governments and to<br />

assess whether this so gloriously titled position is actually more<br />

than just symbolic.<br />

2. DEFINITION OF TERMS<br />

The term Chief Information Officer firstly appeared in the early<br />

1980s in the private sector [1]. For W. R. Synnott the CIO is “the<br />

highest ranking executive with primary responsibility for<br />

information management. The CIO is responsible for the planning<br />

and architecture of the firm’s information resources, for<br />

promoting information technology throughout the firm, and for<br />

looking after the corporation’s investment in technology” [9]. The<br />

implementation is a visible expression of a changed view on<br />

information and information systems that had become a<br />

substantial production factor [12] and "can increase productivity<br />

and provide better management support" and hence created a new<br />

management dimension [11]. Focussing on hierarchy Boyle and<br />

Burbridge define the CIO position as "an executive with broad


esponsibility for information technology [...] who reports to a<br />

high-level corporate officer (e.g. president or CEO) [13]. Hence,<br />

the CIO is part of the organisation’s top management or at least<br />

directly tied to it. A clear definition of CIO position is almost<br />

impossible to give [1], which is predominantly due to the various<br />

roles and in the manifold modification of the CIO's<br />

responsibilities. Generally in public sector the concept of a CIO is<br />

well established for now almost two decades [5] [14]. Often their<br />

introduction is part of broader e-government initiatives such as egovernment<br />

strategies or similar action plans (e.g. in the state of<br />

Mecklenburg-Vorpommern), coalition agreements (e.g. in the<br />

state of Baden-Württemberg) or even by law (e.g. planned in the<br />

state of Berlin; Clinger-Cohen Act in the U.S.).<br />

However, it is hardly feasible to determine the specific date, when<br />

the first CIO position was created in a German state. In 2003 the<br />

German state of Hessen was the very first state, which has<br />

established a so titled CIO position. However, a similar position<br />

was already set up in 1996 by the German state of Hamburg,<br />

albeit as a department on a lower hierarchical level and not<br />

denominated as Chief Information Office. And even since 1985<br />

there is a so-called Federal Commissioner for ICT<br />

(Landessystembeauftragter) in the state of Baden-Württemberg, a<br />

position clearly assigned with CIO functions and a dedicated<br />

administrative body. Introducing a CIO position does not<br />

necessarily mean adopting an innovation but often merely<br />

establishing a prominent title, as will be shown later [2]. Today 13<br />

out of 16 federal states have established corresponding positions,<br />

even if the denomination is used rather rare.<br />

3. STUDY DESIGN<br />

We explore the design of CIO positions in public authorities by<br />

comparing the German states. The data collection is mainly based<br />

on content analysis. We used organization charts, schedules of<br />

responsibilities, coalition agreements and online presences of the<br />

16 states. Further, we conducted three expert interviews about the<br />

design and intentions of CIO positions in three German states.<br />

The following characteristics were collected:<br />

o Placing<br />

o Function<br />

o Level of separate resources<br />

o Relationship to other departments<br />

o Representation in the Federal IT committee<br />

The placing of the CIO concerns both vertical and horizontal<br />

dimension. The higher he is positioned in the hierarchy the more<br />

assertiveness can be assumed. However, in such a case he is most<br />

likely not involved in concrete IT affairs, because he has to direct<br />

several departments which may be far away from IT subjects.<br />

CIOs that are not on the level of a state secretary are actually able<br />

to operate as IT managers even though they are not authorized to<br />

issue directives. With a view to the horizontal placing it is crucial<br />

but not always in fact, that the CIO is positioned in that<br />

department that is in charge of statewide IT topics.<br />

CIOs fulfill several functions such as planning, governance and<br />

controlling of IT issues focusing on strategic tasks [1]. In our<br />

study the functional range of the CIOs is documented for every<br />

state and finally accounts for the identification of special CIO<br />

types.<br />

347<br />

To unfold full impact and to operate independently, the CIO<br />

should be equipped with resources, for example directly dedicated<br />

organisational units as well as budgetary means to initiate<br />

projects, assign studies and drive agenda setting. The importance<br />

of the CIO position should also be reflected in the crossdepartmental<br />

IT committees over which he has to preside. In this<br />

regard, there should be clarity about the relationship to the heads<br />

of IT on lower hierarchical levels within the specific departments.<br />

Every German state delegates a high-ranking representative (state<br />

secretary) to the Federal CIO council (IT Planungsrat), so do the<br />

the fereral government and representatives of the municipalities.<br />

The council is responsible for an overall IT steering. For the<br />

efficiency of each CIO position it is relevant whether the CIO is<br />

also member of the Federal CIO council. If not, it can be supposed<br />

that there is a lack of capacity to act at the interface of the own<br />

and the overall IT strategy.<br />

4. EMPIRICAL FINDINGS<br />

Altogether 13 federal states possess a CIO, which is not to say that<br />

among the remaining states CIO functions are not implemented.<br />

The word CIO seems to be a kind of catchphrase. Some federal<br />

states are afraid to use it, but actually have implemented an<br />

analogous position but put the phrase in brackets. Another<br />

symptom of this near-hype is that some states entitle a state<br />

secretary, who is busy being in charge of several sections, to a<br />

CIO. Under these circumstances the position is called Decorative<br />

CIO, who has in addition mostly no own resources. Otherwise,<br />

state secretaries are actually able to fulfil the CIO mission,<br />

provided that they have any resources they need, which are time,<br />

money, qualification and staff. In this case it is a Political CIO.<br />

The third type focuses on IT qualification and more operative<br />

tasks without neglecting strategic issues and is called Operative<br />

CIO. In the majority of cases our three CIO types are hard to<br />

distinguish from each other. Thus, the cases are assigned to the<br />

types by concentrating on the main points.<br />

4.1 Political CIO<br />

As a state secretary the Political CIO performs primarily strategic<br />

tasks. As its name implies, he distinguishes himself in his<br />

commitment to political offices. He is provided with authority to<br />

impact the IT governance, ideally cross-departmental. In the case<br />

of federal states, he is the head of IT for the whole state<br />

administration. The Political CIO has the budget responsibility. In<br />

collaboration with other federal states and face to face with local<br />

authorities he acts with the necessary power of representation.<br />

This CIO type is almost completely observable in the Free State of<br />

Bavaria. At first glance the state of Hessen possesses a similar<br />

CIO position, but actually it seems to be a position for special IT<br />

tasks (first, Digital Mobile Radio Network for emergency services<br />

& government agencies; and second, the activities in the Federal<br />

IT Council). The basic e-government department is not under his<br />

command. Without fixed coordination operations this situation<br />

tends to result in isolated CIO offices with a very decorative<br />

character. On the surface he appears as virtual head of IT. It is a<br />

peculiarity that the CIO is associated to two ministries, the<br />

Ministry of Interior and the Ministry of Finance. This is due to<br />

budget requirements. Requiring high spending but then enabling<br />

high savings, IT projects have strong financial impacts. Hence, it<br />

will be very advantageous, if CIOs have well-established and<br />

formal relations to both professional and financial departments.


4.2 Operative CIO<br />

The Operative CIO is characterized by his IT competence.<br />

Political CIOs are more often than not almost laymen in IT issues.<br />

The Operative CIO is head of the IT department without further<br />

engagements. Thus, he is able to concentrate on his root tasks. On<br />

management level the Operative CIO is involved in projects.<br />

Requests from other authorities like local communities or other<br />

federal states are addressed to him, even though he is not entitled<br />

to make binding decisions.<br />

The federal city state of Hamburg has an Operative CIO as<br />

described above. Hamburg provides both a global fund for IT<br />

projects and a pool with specialized staff. IT specialists are<br />

delegated to work on projects within the operating department. All<br />

in all Hamburg has a powerful CIO organization. The state of<br />

Saarland has also an Operative CIO, but not as ideal as Hamburg.<br />

Introducing a CIO organization means always a certain need of<br />

concentration. That did not succeed, because there are still two<br />

departments which handle statewide important IT issues. The CIO<br />

of the state of Saarland is positioned as a staff unit at the Ministry<br />

of Finance and is completely oriented on the project “IT reengineering”<br />

with the aim to consolidate. It seems that the CIO<br />

day-to-day business is not included.<br />

4.3 Decorative CIO<br />

Missing adequate resources Decorative CIOs are not able to reach<br />

significant results. They only serve for image brightening.<br />

Decorative CIOs have little or no managerial function. The state<br />

of Brandenburg has a CIO with only representative functions. The<br />

CIO is positioned deep within a department of the Ministry of<br />

Interior and he is ancillary to the head of this department, which is<br />

in charge of e-government and IT. Thus, Brandenburg has a CIO<br />

but nothing else. The state of Lower Saxony also holds a CIO with<br />

questionable reliability performance. Initially they recruited a CIO<br />

from the private sector. This year the position was upgraded. The<br />

state secretary took over additional task. To the present this is not<br />

communicated in detail, which indicates that this CIO design is<br />

located along the border to decorativeness.<br />

4.4 Synopsis<br />

Political CIOs are most common, seven german states have a CIO<br />

that predominantly serve political purposes. That may be because<br />

of their role in the federal IT council. The states seek to delegate<br />

representatives who are able to speak on equal terms (two out of<br />

three Decorative are also in the position of state secretaries).<br />

Another three states’ CIO positon can be classified as Operational<br />

CIO, three as Decorative CIO. Three German states have no CIO<br />

position so far.<br />

A further aspect is the department, in which the CIO performs.<br />

Traditionally IT issues are handled in the Ministry of Finance.<br />

That is because the first data possessing systems were introduced<br />

for the tax authorities. Six German CIOs are employed at financial<br />

departments. Another six CIOs are at the Ministry of Interior,<br />

which is as a rule in charge of Public Service Modernization.<br />

Possessing the CIO in the Ministry of Justice and Europe, Saxony<br />

is an outliner.<br />

Deriving from the localization of the state CIO in a certain<br />

ministry is the hegemony over priorities and aims associated to<br />

the use of technology [18] [19]. One can expect that a CIO<br />

employed at financial departments is more likely to stress the<br />

348<br />

potential of ICT to strengthen efficiency in order to save money,<br />

whereas a CIO at Ministry of Justice is more likely to focus on<br />

subjects such as data protection or the restriction of crossauthority<br />

exchange of data.<br />

5. EXPLANATION APPROACH<br />

One of the most fundamental lessons learned from evaluations of<br />

the New Public Management is to take into account the public<br />

sector’s specific conditions before transferring concepts from<br />

private sector, as both sectors differ in a couple of basic<br />

dimensions [15]. Although they clearly affect the CIO position in<br />

the public sector, we do not want to elaborate on these basic<br />

characteristics (such as stakeholder structure, orientation to the<br />

common good or administrative culture) but to stress those<br />

principles and conditions, which are directly tied to CIO’s<br />

capacity to act and might explain our findings.<br />

Probably as the most important difference, it starts with the<br />

position in organisation hierarchy. Whereas in private sector the<br />

CIO is member of the executive board or at least closely tied to it,<br />

there is no comparable body in state governments. Unlike the<br />

municipal level, where a central management body can be<br />

identified (albeit with significant differences to private sector), a<br />

state government’s cabinet combines the state ministers who lead<br />

their respective departments independently and under their own<br />

responsibility (departmental principle). It falls to the ministers, to<br />

decide whether, where and how tasks are to be administrated.<br />

For the CIO’s capacity to act consensus must exist on his crossdepartmental<br />

responsibilities, and his respective remit clearly<br />

defined, in particular if establishing the CIO function is<br />

accompanied by the delegation of hitherto decentralised functions.<br />

Some states and countries describe responsibilities, authority and<br />

the allocation of dedicated resources by specific legislation.<br />

Each type of CIO in public sector can be seen as an expression of<br />

certain political conditions, thus as the result of intense<br />

negotiations. Consensus is yet needed on where to establish the<br />

prominent position, a question that might easily become subject of<br />

envy, taking into account the idealistic understanding of<br />

technology as a metaphor for progress and innovation. And<br />

ministries are likely to seek being recognized as progressive and<br />

innovative. Willingness on to abandon and cede once owned<br />

responsibilities by delegating functions, capabilities or staff can be<br />

seen as huge challenge. Thus, public sector CIO is also always a<br />

moderator between the respective departments (and their IT<br />

managers) likewise towards politics.<br />

Considering constantly changing political power structures, hence<br />

changing policies and priorities, the need for consensus is a steady<br />

companion. For instance strategic and organisation wide planning,<br />

which is without doubt one of the CIO’s key field of activity, is<br />

subject to particular challenges specific to the public sector [3].<br />

But what if consensus is reached neither on where to establish a<br />

CIO function nor on its responsibilities or authority? A weak, thus<br />

rather decorative CIO is likely to be the result. If departments<br />

insist on keeping staff, capabilities or activities, if comprehensive<br />

planning is not wanted, the CIO’s room for manoeuvre will dry<br />

out. In case of Decorative CIOs a gap between the glorious title<br />

and the actual rather slight capacity to act is self-evident.<br />

But why do they introduce CIO-positions anyhow? From the<br />

perspective of sociological new institutionalism [17] [16] they do<br />

precisely because there is a need for decoration, in terms of a


substantial demand for highlighting ICT as metaphor for<br />

effectiveness, efficiency and performance, or just to be state-ofthe-art.<br />

Stakeholders demand public sector to be efficient, with<br />

sophisticated e-government as a catchy expression. Introducing a<br />

CIO appears to be a plausible response, even more if other states<br />

do. Even in case of insufficient political will, reluctance to agree<br />

on to delegate responsibilities and resources or political costs,<br />

estimated as too high, the subject of e-government appears well<br />

addressed when a CIO position is established.<br />

New institutionalism emphasises the role of legitimacy in order to<br />

ensure support and secure the organisation’s survival. By<br />

establishing a CIO position, as a significant institutional rule, that<br />

organisations incorporate, illegitimacy can be avoided. John W.<br />

Meyer and Brian Rowan describe a gap between the formal<br />

structure and actual work as decoupling, as a mean of dealing with<br />

conflicts. "Decoupling enables organizations to maintain<br />

standardized, legitimating, formal structures while their activities<br />

vary in response to practical considerations." [17] The type of<br />

Decorative CIO may be interpreted as a response to the<br />

simultaneousness of environmental demands and differing<br />

understandings of rational organizations but also to political costs<br />

that do not match the actual priority.<br />

6. FUTURE PROSPECTS<br />

This paper’s aim was to assess and describe the CIO position in<br />

German state governments and to point out the potential impact<br />

on e-government. Being still ongoing work, the paper sets a<br />

starting point to unfold a rich field of future research work. One<br />

subject of further research is to assess the actual impact,<br />

regardless of available resources or position in hierarchy, as<br />

personal attributes may outweigh shortcomings, such as the lack<br />

of a dedicated administrative body. Describing requirements for a<br />

full-spectrum CIO position [1] is stressing especially leadership<br />

competencies, networking abilities as well as being an innovator.<br />

Another desideratum of research is the assumption that<br />

establishing a merely Decorative CIO refers to differing<br />

estimations of a CIO’s impact on organizational goals and<br />

performance. Moreover the assumed link between the statewide<br />

policy of the Chief Information Officer and the determining basic<br />

priorities of the ministry he is assigned to is posing another<br />

interesting research question, in order to assess the impact of a<br />

CIO in the public sector.<br />

7. REFERENCES<br />

[1] Krcmar, H.: Informationsmanagement, Springer, Berlin,<br />

Heidelberg, New York, 2005.<br />

[2] Heine, M.: Transfer von E-Government-Lösungen, Gito,<br />

Berlin, 2010.<br />

[3] OECD: OECD E-Government Studies. e-Government for<br />

better Government. OECD Publishing, 2005.<br />

[4] Mehlich, H.: Electronic Government. Die elektronische<br />

Verwaltungsreform, Gabler, Wiesbaden, 2002.<br />

349<br />

[5] Eynon, R. and Margetts, H.: Organisational Solutions for<br />

Overcoming Barriers to eGovernment. European Journal of<br />

ePractice 1 (November 2007), 73-85.<br />

[6] OECD: Bessere Rechtsetzung in Europa. Deutschland.<br />

OECD Publishing, 2010.<br />

[7] Jupp, V.: Realizing the Vision of eGovernment, Journal of<br />

Political Marketing, 2:3-4, 128-145, 2003.<br />

[8] Borins, S.: A Holistic View of Public Sector Information<br />

Technology, Journal of E-Government, 1:2, 3-29, 2005.<br />

[9] Synnot, W.R.: The Information Weapon: Winning Customers<br />

and Markets with Technology. John Wiley & Sons, 1987.<br />

[10] Abele, J.: Methoden für Strategie und Organisation. In:<br />

Zechner, A. (ed.): Handbuch E-Government, Deutschland<br />

Online and Fraunhofer eGovernment Zentrum, 197-211,<br />

2007.<br />

[11] Declan O'Riordan, P.: The CIO: MIS Makes Its Move into the<br />

Executive Suite, Journal of Information Systems<br />

Management, 4:3, 54-56, 1987.<br />

[12] Buhl, H.U.; Kreyer, N. and Wolfersberger, P.: Die Rolle des<br />

Chief Information Officer (CIO) im Management.<br />

Wirtschaftsinformatik, 43(4), 408, 2001.<br />

[13] Boyle, R.D. and Burbridge, J.J.: Who needs a CIO?<br />

Information Strategy. The Executive's Journal, 7:12-18,<br />

1991.<br />

[14] McClure, C.R. and Bertot, J.C.: The chief information officer<br />

(CIO): assessing its impact, Government Information<br />

Quartely, 17:1, 7-12, 2000.<br />

[15] Reichard, C.: Zur Naivität aktueller Konzepttransfers im<br />

deutschen Public Management, in: Edeling, T., Jann, W. and<br />

Wagner, D. (eds.): Öffentliches und privates Management.<br />

Fundamentally Alike in All Unimportant Respects?, Leske +<br />

Budrich, Opladen, 53–70, 1998.<br />

[16] DiMaggio, P.J. and Powell, W.W.: The iron Cage Revisited.<br />

Institutional Isomorphism and Collective Rationality in<br />

Organizational Field, in: Powell, W.W. and DiMaggio, P.J.,<br />

(eds.): The New Institutionalism in Organizational Analysis,<br />

University of Chicago Press, Chicago, London, 1991.<br />

[17] Meyer, J.W. and Rowan, B.: Instituationalized<br />

Organizations: Formal Structure as Myth and Ceremony. In:<br />

American Journal for Sociology 83, 1977.<br />

[18] Killian, W. and Wind, M.: Verwaltung und Vernetzung.<br />

Technische Integration bei organisatorischer Vielfalt am<br />

Beispiel von Agrar- und Umweltverwaltungen, Opladen,<br />

Leske + Budrich, 1997.<br />

[19] Pollitt, C.: Technological Change: A Central yet Neglected<br />

Feature of Public Administration. The NISPAcee Journal of<br />

Public Administration and Policy, III (2), 31-53, 2010


Session 12<br />

Implementation & Impact


Design and Implementation of a Public School<br />

Government-to-Employee System<br />

Carl Strang a<br />

a Capital Region BOCES<br />

900 Watervliet Shaker Road<br />

Albany, NY 12205<br />

+1 518 862 5300<br />

ABSTRACT<br />

In this paper, we describe NERIC Connect, a Government-to-<br />

Employee (G2E) system for public schools, which is a work in<br />

progress. NERIC Connect provides teachers and administrators<br />

with timely, contextually meaningful information and automated<br />

alerts, which can be used to catch students before they fall through<br />

institutional cracks. The system addresses the missed benefit<br />

resulting from islands of data contained in disparate, independent<br />

computer systems. Relying on any single view of the data is not<br />

sufficient for effective data-driven decision making. NERIC<br />

Connect provides a unified view that results in school district<br />

employees having actionable information that can be used to<br />

improve instruction.<br />

Categories and Subject Descriptors<br />

J.1 [Administrative Data Processing]: Administrative Data<br />

Processing – Government, Education; K.6.1 [Management of<br />

Computing and Information Systems]: Project and People<br />

Management – Strategic Information Systems Planning<br />

General Terms<br />

Management, Measurement, Performance, Human Factors<br />

Keywords<br />

E-government, Education, Government-to-Employee, Data-<br />

Driven Decision Making, Portal<br />

1. INTRODUCTION<br />

If children are our future, then ensuring that they receive a proper<br />

education is of critical concern to everyone. In the United States,<br />

the No Child Left Behind Act of 2001 (NCLB) [1] attempts to do<br />

just that by making states and local school districts accountable<br />

for student outcomes via standardized assessments that are aligned<br />

with state and federal academic standards. Under NCLB, teachers<br />

are encouraged to provide instruction to ensure that each student<br />

meets or exceeds the assessed standards, and administrators are<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

{carl.strang, ira.goldstein}@neric.org<br />

350<br />

Ira Goldstein ab<br />

b University at Albany: SUNY<br />

1400 Washington Avenue<br />

Albany, NY 12222<br />

+1 518 442 4687<br />

provided with data to monitor student progress and to make datadriven<br />

decisions. This paper addresses one approach to the open<br />

question of how best to provide teachers and administrators with<br />

meaningful access to disparate student data in order to make<br />

informed data-driven instructional decisions.<br />

Relying solely upon standardized assessments is not sufficient for<br />

effective data-driven decision making. In addition to standardized<br />

assessment results, various types of data, such as attendance, final<br />

examination results, and data acquired on intake can collectively<br />

form a comprehensive view that may be used to help improve<br />

education. The data can be used for curricula implementation,<br />

development of differentiated instruction, encouraging selfdirected<br />

learning, and professional development. Using<br />

educational theory as our lens, we find that teachers and<br />

administrators should base their decisions on the evidence<br />

provided by multiple data sources [2, 3]. For example, while<br />

standardized assessments can be used to inform a teacher about a<br />

given student’s level of mastery of a topic, this information needs<br />

to be put into context based upon the student’s attendance and<br />

performance in other classes, as well as the performance of other<br />

students working on the same topic [4]. Even though schools<br />

collect a large amount of data [5], simply collecting data is not<br />

enough to lead to instructional improvement or to effectively<br />

monitor key indicators of student success. Schools need systems<br />

that present data to teachers and administrators in the context of<br />

actionable information, but often do not have the means to<br />

implement complex data mining tools.<br />

According to Ackoff [6], data can be considered collections of<br />

raw facts or symbols. Information is data that has been processed<br />

to help answer “who,” “what,” “when,” and “where” questions.<br />

Knowledge is a collection of information that can answer “how”<br />

questions. Wisdom requires judgment and enables looking at what<br />

could be. Ideally, a G2E system should help teachers and<br />

administrators move from collecting data to acquiring wisdom.<br />

The New York State Education Department (NYSED) may not<br />

mandate any particular management software for functions such<br />

as payroll, accounting, or student information. It is the<br />

responsibility of each local school district to select the individual<br />

systems that best meet their needs. In the absence of mandated<br />

systems, islands of information often form within a given school<br />

district. It is not unusual to find that student information is stored<br />

redundantly in a school district’s student information, library,<br />

transportation, cafeteria management, and special education<br />

systems. Compounding the problem, neighboring school districts<br />

often adopt disparate systems, impeding the sharing of<br />

information and region wide data analysis.


NYSED is responsible for collecting, processing, and reporting<br />

the data needed to meet state and federal accountability<br />

requirements. As a result of NCLB, NYSED has mandated the<br />

electronic transmission of data for accountability reporting<br />

through a statewide network of reporting centers. This collection<br />

of data provides, in part, an opportunity for the standardization of<br />

data for purposes other than accountability reporting.<br />

The New York State Legislature created Boards of Cooperative<br />

Educational Services (BOCES), consortia referred to as<br />

intermediate service units, “for the purpose of carrying out a<br />

program of shared educational services” [7] to school districts<br />

within the state. School districts within New York State are able<br />

to acquire services from BOCES that a given district may be not<br />

be able to afford on their own. As of 2012, there were 37 BOCES<br />

that provided shared services to 688 school districts [8]. While a<br />

BOCES can offer services, it may not mandate adoption by the<br />

school districts in their catchment area.<br />

The BOCES’ have established 13 Regional Information Centers<br />

(RICs) to provide computing and networking services. One of<br />

these is the Northeastern Regional Information Center (NERIC),<br />

which has provided a variety of computer services to school<br />

districts for over 40 years. These services include payroll,<br />

accounting, student information, school lunch, and special<br />

education systems. NERIC serves 136 school districts and 7<br />

BOCES in a 17 county area in the northeastern corner of New<br />

York. This service area is home to districts located both in the<br />

northern part of the Appalachians and most of New York’s<br />

Adirondack State Park, two of the least populated areas of the<br />

state, as well as in small cities such as Schenectady and Albany.<br />

We describe one approach to address the missed benefits caused<br />

by of islands of data contained in disparate, independent computer<br />

systems. We begin with the premise that relying on any single<br />

view of the data is not sufficient for effective data-driven decision<br />

making. We create an extensible Operational Data Store (ODS)<br />

which draws the disparate data together. We provide a user<br />

friendly data dashboard that contextualizes the data and creates<br />

actionable information.<br />

2. GOVERNMENT TO EMPLOYEE<br />

SYSTEMS<br />

There are four main areas of e-government, government-tocustomer<br />

(G2C), government-to-business (G2B), government-togovernment<br />

(G2G), and government-to-employee (G2E) [9]. The<br />

objective of G2E is to improve internal efficiencies and<br />

effectiveness needed by government employees. Typical G2E<br />

services include payroll, benefits, travel, and training [9, 10].<br />

G2E systems should act as a foundation for the user experience,<br />

offer flexibility to users while adhering to governance tenets,<br />

include person-centric (e.g., social networking) components, and<br />

be based on an architecture which allows for a rapid response to<br />

changes in demand [11]. Given that the desired data is often<br />

stored in many different locations, a robust G2E system must have<br />

the ability to "mash-up" data from various sources [12]. Mash-ups<br />

take data from multiple sources and create a new service with a<br />

new purpose [13]. To assist in their adoption, G2E systems should<br />

meet the specific needs of employees [14].<br />

351<br />

3. NERIC CONNECT<br />

Relying exclusively on the results from standardized assessments<br />

is not sufficient for effective data-driven decision making. NERIC<br />

determined that teachers and administrators needed a way to bring<br />

together their disparate data in order to process, analyze and apply<br />

the data to the mission of educating students. Since 2006 NERIC<br />

has been working with the emerging technologies of data mining<br />

in order to develop a means for teachers and administrators to<br />

actively investigate the relationship between various data<br />

elements and student achievement scores on state exams. The first<br />

set of technologies NERIC published, referred to as NERIC IQ,<br />

provided an interactive interface that allowed the teachers and<br />

administrators to pivot on a variety of data elements as they<br />

related to one another. While a handful of districts adopted this<br />

system, the technologies never reached the hoped for level of<br />

utilization.<br />

Current research indicates that schools are challenged with finding<br />

the resources required to provide data analysts and data coaches<br />

who can help teachers learn to use the tools to mine data and to<br />

analyze the data once it has been mined [15, 16]. Specific<br />

recommendations include the development of user friendly data<br />

dashboards to help teachers contextualize data. In addition, it was<br />

recommended that this data be refreshed in a manner to provide<br />

timely and meaningful access [15].<br />

Districts do not make use of all their collected data [16]. Merely<br />

collecting the data necessary to create actionable information is<br />

insufficient. However, most school districts have no systems in<br />

place that present data in the context of actionable information.<br />

Furthermore, the development of systems that present actionable<br />

information takes time, money, and knowledge.<br />

Due to its role as a provider of integrated information technology<br />

related services to school districts, and having custody of the<br />

districts’ authoritative data, NERIC is uniquely positioned to<br />

address this void. NERIC Connect is envisioned as a G2E system<br />

that meets the goal of providing a single point of access for<br />

actionable information. This actionable information can be used to<br />

monitor student progress, helping to ensure that student<br />

intervention and new curricula better coincide with the needs of<br />

each student. Such a system will not, and can not, replace the<br />

teachers’ and administrators’ relationships with students. The<br />

intent is to help ensure that no student falls between the cracks by<br />

tracking and reporting key indicators of student success.<br />

3.1 Challenges<br />

School districts often implement separate computer systems for<br />

managing different aspects of student information. This results in<br />

information stored independently, and redundantly, in a school<br />

district’s various data systems. In addition, school districts in the<br />

same region often adopt disparate systems. Given a high rate of<br />

student transiency, the use of these disparate systems makes it<br />

difficult to transfer information when students move from district<br />

to district. Even when two districts adopt the same software,<br />

creative usage of the system can impede the sharing of<br />

information. For example, the authors are aware of one district<br />

that uses an asterisk in the “Tuition” field in order to indicate that<br />

the student completed their foreign language requirement.<br />

Teachers and administrators need to make informed, data-driven,<br />

instructional decision. Storing data in disparate systems can be<br />

considered the primary inhibitor to providing such access.


The United States Department of Education [17] found that only<br />

25% of all teachers reported having access to the prior year’s<br />

assessments for their current students and fewer than 11%<br />

reported having access to multiyear assessments. Teachers are<br />

increasingly using computer systems to input attendance, course<br />

scores, and interim assessment information. However, it may well<br />

be that teachers are accessing the system only for reporting<br />

purposes [15] and not for actionable information. This is not to<br />

say that the individual existing systems cannot produce reports.<br />

The mature and well-understood reports available from existing<br />

systems were developed for purposes other than programmatic<br />

and instructional interventions, and only include data from their<br />

one source. While these systems may excel at managing the data<br />

for a given function, they were not developed for the purpose of<br />

providing actionable information to teachers and administrators.<br />

At issue is the need to provide contextually meaningful reports<br />

which can be used to improve instruction. If existing systems<br />

cannot combine data from multiple systems, then alternatives<br />

must be considered. However, individual schools often do not<br />

have the development resources needed to implement solutions,<br />

even when the tools are available.<br />

The frequency with which data are refreshed is important in any<br />

decision making environment. The data refresh rate needs to<br />

reflect the speed or frequency of change. Data that are refreshed<br />

on a timely basis, and include school process related information,<br />

are exceptionally helpful. The process of refreshing data presented<br />

to teachers and administrators cannot be delayed in order to<br />

accommodate existing information processing cycles. Some data<br />

types, such as period-by-period student attendance, may need to<br />

be updated several times a day. It has been shown that refreshing<br />

data on a cycle greater than two weeks may be too long a period<br />

to effect meaningful interventions [18].<br />

3.2 Design<br />

NERIC Connect is built on Microsoft’s SharePoint environment.<br />

The SharePoint platform provides a secure environment to<br />

leverage Microsoft’s SQL (MSSQL) server technologies. MSSQL<br />

technologies are used extensively to provide role based, user<br />

specific contextualized and interactive data displays. SharePoint<br />

provides a simple, uncluttered, consistent user experience. NERIC<br />

Connect can run on any Web-enabled computer, offers automated<br />

workflow processes, integrates Microsoft Office products, and<br />

provides a centralized location for documents and collaboration.<br />

Built-in functionality allows for easy access to surveys, document<br />

management, and virtual meeting workspaces. NERIC Connect<br />

enables teachers and administrators to make better informed<br />

decisions by securely presenting critical information about their<br />

students from one central location, at anytime, from anywhere.<br />

NERIC Connect creates a mash-up of the data from multiple<br />

sources. It presents a customized user friendly data dashboard to<br />

help teachers and administrators contextualize their data. Each<br />

dashboard is generated in real-time, is specific to the user, and<br />

limits the data presented based on their role and responsibility. In<br />

other words, each user views their own customized dashboard that<br />

contains up to date information, that is specific to their needs, and<br />

that merges redundant data into a consistent presentation. The<br />

dashboard takes disparate data and provides actionable<br />

information that can be used to alert teachers to situations that<br />

may need their attention. For example, if a student skips their<br />

352<br />

math class, all of their teachers, not just the math teacher, become<br />

immediately aware of this change in behavior.<br />

In order to aid adoption, NERIC Connect offers several features<br />

which meet the needs of teachers and administrators. In addition<br />

to a contextually relevant dashboard, the system provides a<br />

dynamic collection of frequently used tools and documents. It also<br />

will provide a virtual classroom for safe, controlled collaboration<br />

between and among teachers and students.<br />

An extensive and extensible ODS (see Figure 1) was developed to<br />

provide a canonical model for data elements required for<br />

reporting. NYSED maintains a data warehouse, which is driven<br />

by NCLB and is primarily used for storing data for enrollment and<br />

assessment reporting purposes. However, the underlying data<br />

model is insufficient to provide the data required for producing<br />

actionable information to assist teachers and administrators in<br />

improving student performance. The ODS draws not only from<br />

the NYSED data warehouse; it also draws from student<br />

information, employee payroll, special education systems, as well<br />

as any district based data that contain key indicators of when a<br />

student may need intervention.<br />

Operational<br />

Data Store<br />

Employee<br />

Data<br />

Enrollment &<br />

Assessment<br />

Query<br />

Reply<br />

Application<br />

Server<br />

Extract<br />

Transformatio<br />

n Load<br />

Student<br />

Information<br />

Systems<br />

Figure 1- Logical Data Flow<br />

Web Front<br />

End<br />

District<br />

District<br />

Based<br />

Based Data<br />

Data<br />

Special<br />

Education<br />

The NERIC Connect system has a governance group and a<br />

development advisory committee comprised of chief school<br />

officers and other district administrators, as well as NERIC<br />

administrators and staff. Their purpose is to identify desired<br />

modification to the existing system and to plan for major updates<br />

and rewrites of the system that can lead to improving student<br />

achievement. These groups have already focused on the<br />

development of key indicators of student success.<br />

While performing data analysis of standardized assessments can<br />

reveal specific instructional gaps and provide accountability<br />

information, such analysis takes time to produce. In order to<br />

empower teachers so that they can provide timely interventions,<br />

school districts need to rely on more than just assessments. The<br />

governance group helps to develop, and to fine tune, the key<br />

indicators of student success, such as attendance information or<br />

even if the student has overdue library books. Key indicators do<br />

not need to imply causation; it is up to teachers and administrators<br />

to look at root causes. Key indicators of student success can be


considered markers that are able to draw attention to a potential<br />

problem and provide actionable information. Once the key<br />

indicators of success have been agreed to, “at risk” algorithms can<br />

be developed. If a student exceeds a predetermined threshold, then<br />

automated alerts are initiated. Multiple thresholds, or pools of<br />

thresholds, can be developed so that combinations of key<br />

indicators can be used to ensure that no student falls through the<br />

cracks. Specific “at risk” algorithms can be localized for a given<br />

district. One of the open tasks in this in-progress work is to<br />

determine if there are any best practices that can be used as the<br />

initial threshold(s).<br />

Unique to the BOCES/RIC model is the capability to provide<br />

application developers who work under the supervision of<br />

education administrators to evolve applications of information<br />

technology that meet more than just the needs of public education.<br />

They can evolve them to assist teachers and administrators in<br />

doing the work they are inspired to do.<br />

Representatives from the subscribing school districts and NERIC<br />

leadership and developers meet monthly to identify enhancements<br />

and modifications that integrate NERIC Connect technologies into<br />

the daily process of progress review and planning. These<br />

enhancements will help teachers make the best use of their time<br />

by providing a digital snapshot of student progress in their class,<br />

as well as throughout the school.<br />

4. CONCLUSIONS AND NEXT STEPS<br />

School districts maintain independent systems that accumulate<br />

data for a specific function (e.g., bus routing or grade reporting).<br />

Each of these systems provides only a partial view of the available<br />

data, and does not enable data-driven decision making. Driven by<br />

the educational theory that instructional decisions should be based<br />

on the evidence provided by multiple data sources, NERIC<br />

Connect addresses the open question of how best to provide<br />

meaningful access to disparate student data in order to make<br />

informed data-driven instructional decisions. NERIC Connect is a<br />

G2E system that mashes-up data from multiple sources and<br />

creates a new service with a new purpose. It helps teachers and<br />

administrators move from merely collecting data to having access<br />

to actionable information.<br />

NERIC Connect use is growing and evolving, and will be rolled<br />

out to additional school districts. Once these additional school<br />

districts are on board, the system will then begin to provide crossdistrict<br />

and region wide access to the data. Other plans include<br />

providing virtual classrooms to offer state of the art technologies<br />

to support constructivist learning pedagogy and collaboration<br />

capabilities from a myriad of internet enabled devices.<br />

5. ACKNOWLEDGMENTS<br />

The authors wish to thank the NERIC Regional Advisory<br />

Committee for their support of NERIC Connect.<br />

6. REFERENCES<br />

[1] An act to close the achievement gap with accountability,<br />

flexibility, and choice, so that no child is left behind. Pub L<br />

107-110, 115 Stat 1425. United States 2001.<br />

[2] Bernhardt V. L. Data tools for school improvement.<br />

Educational Leadership. 62,5 (2005), 66-9.<br />

353<br />

[3] Schildkamp K. and Kuiper, W. Data-informed curriculum<br />

reform: Which data, what purposes, and promoting and<br />

hindering factors. Teaching & Teacher Education. 26,3<br />

(2010), 482-96.<br />

[4] Black P. and Wiliam, D. Assessment and classroom learning.<br />

Assessment in Education: Principles, Policy & Practice. 5,1<br />

(1998), 7.<br />

[5] Stecker P. M., Fuchs, L. S., Fuchs, D. Using curriculumbased<br />

measurement to improve student achievement.<br />

Psychology in the Schools. 42,8 (2005), 795-819.<br />

[6] Ackoff R. L. From data to wisdom. Journal of Applied<br />

Systems Analysis. 16, (1989), 3-9.<br />

[7] Establishment of boards of cooperative educational services.<br />

NYS Ed Law §1950 1948.<br />

[8] New York State Education Department. Boards of<br />

Cooperative Educational Services (BOCES). 2011 [cited 9<br />

March 2012]; Available from:<br />

http://www.p12/nysed.gov/mgtserv/boces/<br />

[9] Siau K. and Long, Y. Synthesizing e-government stage<br />

models - a meta-synthesis based on meta-ethnography<br />

approach. Industrial Management & Data Systems. 105,4<br />

(2005), 443-58.<br />

[10] Evans D. and Yen, D. C. E-government: Evolving<br />

relationship of citizens and government, domestic, and<br />

international development. Government Information<br />

Quarterly. 23,2 (2006), 207-35.<br />

[11] Murphy J. Build an enduring portal strategy for a wave of<br />

change on the web.: Gartner; 2011. No.: G00213225.<br />

[12] Meng J. and Chen, J. A mashup model for distributed data<br />

integration. In Proceedings of International Conference on<br />

Management of e-Commerce and e-Government (ICMECG),<br />

Nanchang, China, 2009.<br />

[13] Di Lorenzo G., Hacid, H., Paik, H.-Y., Benatallah, B. Data<br />

integration in mashups. SIGMOD. 38,1 (2009), 59-66.<br />

[14] Ebrahim Z. and Irani, Z. E-government adoption:<br />

Architecture and barriers. Business Process Management<br />

Journal. 11,5 (2005), 589-611.<br />

[15] Means B., Padilla, C., DeBarger, A., Bakia, M., Department<br />

of Education Office of Planning Evaluation & Policy<br />

Development. Implementing data-informed decision making<br />

in schools: Teacher access, supports and use: US Department<br />

of Education; 2009.<br />

[16] Strang C. F. The systemic use of data to inform improvement<br />

in student achievement: A qualitative study of six school<br />

districts [Doctoral dissertation]. Albany, NY: The Sage<br />

Colleges; 2011.<br />

[17] Bakia M., Yang, E., Mitchell, K., Office of Planning<br />

Evaluation and Policy Development Policy and Program<br />

Studies Service. National educational technology trends<br />

study: Local-level data summary: US Department of<br />

Education; 2008.<br />

[18] Deno S. L., Reschly, A. L., Lembke, E. S., Magnusson, D.,<br />

Callender, S. A., Windram, H., et al. Developing a schoolwide<br />

progress-monitoring system. Psychology in the<br />

Schools. 46,1 (2009), 44-55.


E-Governance and Millennium Development Goals:<br />

Sustainable Development Perspective in Rural India<br />

ABSTRACT<br />

The year 2015 is fast approaching for the countries and the United<br />

Nations pursuing Millennium Development Goals (MDG). In the<br />

United Nation (UN) Millennium Summit 2000, 191 countries<br />

adopted the Millennium declaration. Information and<br />

Communication Technology (ICT) supported E-Governance is a<br />

critical element in achieving MDGs. National E-Governance<br />

strategies have hastened ICT interventions. Recent global<br />

assessments on MDGs suggest that though many countries have<br />

shown noticeable results in meeting MDGs with scope for<br />

supporting sustainable development strategies. In this paper, it is<br />

posited that efforts to meet MDGs in India need to have<br />

converged efforts at the village levels. This is desired because<br />

local development processes are likely to influence the national<br />

agenda. Village households being units of development processes<br />

need to understand the contours of MDGs and its effects in lives<br />

of the household. Use of E-governance supported services by<br />

these units for meeting MDGs has influences to meet sustainable<br />

development of the households. This paper includes studies in<br />

some sample villages in the state of Gujarat to examine the effects<br />

of E-Governance in meeting MDGs and sustainable development.<br />

It discusses the process of convergence and contributions of E-<br />

Governance services to meet MDG agenda and overall sustainable<br />

development.<br />

Categories and Subject Descriptors<br />

H5.2. [Information Systems]: Information Interfaces and<br />

Presentation- User Interfaces Evaluation/Methodology, Theory<br />

and Methods.D4.8. [Software Engineering Performance]:<br />

Measurement, Modeling and Prediction.<br />

General Terms<br />

Management, Measurement, Documentation, Performance,<br />

Design, Experimentation, Human Factors, Theory, Verification.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Harekrishna Misra<br />

Institute of Rural Management Anand<br />

Anand, Gujarat, India<br />

91-2692-221612<br />

hkmishra@irma.ac.in<br />

354<br />

Keywords<br />

ICT for Development, E-Governance, Millennium Development<br />

Goals, Modeling Convergence, Sustainable Development, Citizen<br />

Centered Services<br />

1. INTRODUCTION<br />

MDG is considered as an important agenda for the United Nations<br />

(UN) with the aim to address poverty reduction globally. UN, in<br />

its Millennium Summit in the year 2000, resolved to acknowledge<br />

poverty as a global phenomenon. MDG having a set of eight goals<br />

aims to achieve targeted objectives by the year 2015 and<br />

recognizes inter-twined relationships among all these goals in<br />

order to foster sustainable development. UN, in its declaration,<br />

aims to address two major dimensions. One of the dimensions is<br />

to have commitment of developed nations to extend increased<br />

Official Development Assistance (ODA) with better export<br />

market for developing nations. The second dimension is to ensure<br />

that each developing nation has its own national policy with the<br />

objective to reduce the gap between goals and achievements<br />

[41],[42],[43],[33]. While the deadline for achieving MDG is fast<br />

approaching, the results of the planned activities under UN’s<br />

mandate are found to be discouraging and all the member<br />

countries are showing mixed results across all the eight goals.<br />

ODA has reduced over the years and the assistance has so far been<br />

0.31 percent of the Gross National Income against the UN’s target<br />

of 0.7 percent [44],[40],[39]. As regards role of E-Governance for<br />

development with specific reference to MDG, goal 8F suggests<br />

effective inclusion of ICT as component for the development<br />

process. While recognizing the progress in embracing E-<br />

Governance among all participating nations, UN acknowledges<br />

the persistence of digital divides in the form of affordability,<br />

access to technology, usage and usability of the services rendered.<br />

However, most of the countries have shown considerable progress<br />

in establishing ICT infrastructure and services to implement E-<br />

Governance strategies. World Summit on the Information Society<br />

(WSIS) have acknowledged the impact of E-Governance on the<br />

development and suggested a ten-point agenda for ICT related<br />

interventions for supporting sustainable development and achieve<br />

committed targets by the year 2015 [14],[15],[37],[38],[36]. In<br />

real terms MDG has not been able to focus on the role of ICT to<br />

ensure that all the goals are inter-twined for a converged effect on<br />

sustainable development.<br />

ICT for development globally has shown mixed results despite<br />

wider deployment and acceptance of E-Governance services[4].<br />

The core area of successful ICT enabled development processes<br />

has been limited to E-Governance efforts with direct support to


many of the MDGs. The direct impact has been in the form of<br />

establishing ICT infrastructure, networks among governments and<br />

access to telephony, television and other modes of<br />

communication. Despite mixed results, most of the countries have<br />

incubated E-Governance projects with the active participation of<br />

entrepreneurs from public, private and civil society organizations<br />

[3],[28],[14]. E-Governance projects are quite complex in nature<br />

due to the inherent characteristics of the development process<br />

involving government, society, citizen, market and business<br />

issues. Thus there is a need for understanding this complex<br />

phenomenon of convergence among various stakeholders<br />

involved in the development process so that citizens accept this<br />

new environment for fostering the development of their own life<br />

and the society as envisaged in MDGs and meeting sustainable<br />

development challenges.<br />

The paper is organized with the objectives of understanding the<br />

reasons for having mixed results despite clearly defined MDGs,<br />

and growth in E-Governance services. It also explores the effects<br />

of e-readiness for each of the MDGs based on primary surveys,<br />

their influences on overall sustainable development indicators.<br />

Organization of the paper is as follows. In section two, MDGs and<br />

E-Governance are discussed in order to establish proposed<br />

causality in achieving MDGs with support of E-Governance. In<br />

this section global perspectives are presented with specific<br />

references to Indian scenarios. This section includes discussions<br />

on sustainable development and possible roles of E-Governance<br />

and MDGs. In section three, research motivations are discussed to<br />

present the contributions of E-Governance services to achieve<br />

MDGs and overall sustainable development in local context. In<br />

section four, research methods are discussed to establish the<br />

proposed causality among various contributors to the overall<br />

success of MDGs. A research model is also developed to assess<br />

the contributing factors of E-Governance to achieve MDGs and<br />

overall sustainable development. Hypotheses are developed in this<br />

section to present various dimensions of the causality including<br />

the approach for their validations. In section five, data collection<br />

processes are discussed and analyses are presented. In section six,<br />

conclusions are discussed. In section seven limitations of the work<br />

and scope for further studies in this area are discussed.<br />

2. RESEARCH MOTIVATION<br />

As discussed in the introduction section, MDGs are now<br />

embedded in the policies of the member countries. Goal 8F of<br />

MDG recognizes the importance of E-Governance in meeting<br />

various objectives set in the MDG. In order to bring in more<br />

clarity in adopting E-Governance strategies for development<br />

WSIS has provided ten goals for the member countries<br />

[33],[10],[15]. In this section a link between MDG and E-<br />

Governance with WSIS agenda in the backdrop is discussed. In<br />

table 1 below agenda of WSIS and MDG goals with E-<br />

Governance focus are presented.<br />

Table 1. MDG and E-Governance Deliveries [15],[19],[26]<br />

MDG Goals Expected E-Governance Interventions<br />

1.Eradicate<br />

extreme<br />

poverty and<br />

hunger<br />

2.Achieve<br />

universal<br />

WSIS MDGs<br />

Connect Villages with<br />

e-services and establish<br />

access points<br />

Connect Universities,<br />

Colleges, Secondary<br />

Rise in individual<br />

income with eservices<br />

Increase supply of<br />

e-services of<br />

355<br />

MDG Goals Expected E-Governance Interventions<br />

primary<br />

education<br />

3.Promote<br />

gender<br />

equality and<br />

empower<br />

women<br />

4.Reduce<br />

child<br />

mortality<br />

5.Improve<br />

maternal<br />

health<br />

6.Combat<br />

HIV/AIDS,<br />

malaria, and<br />

other diseases<br />

7.Ensure<br />

environmental<br />

sustainability<br />

8.Develop a<br />

global<br />

partnership<br />

for<br />

development<br />

WSIS MDGs<br />

and Primary Schools,<br />

Public Libraries,<br />

Scientific and Research<br />

Centres<br />

World’s population<br />

should have access to<br />

Television and Radio,<br />

facilitate use of eservices<br />

to have<br />

information on internet<br />

in local languages<br />

trained teachers,<br />

establish networks<br />

among teachers,<br />

internet<br />

connectivity in<br />

schools, improved<br />

student/computer<br />

ratio; distance<br />

learning<br />

Focus on e-literacy<br />

among girls, adopt<br />

e-communication<br />

to encourage<br />

women to<br />

contribute to the<br />

society<br />

Increase in use of e-services by Health<br />

Workers, increase in awareness<br />

Enhance accessibility to specialists by village<br />

health workers through remote access, training<br />

through e-services<br />

Increase in use of e-services by Health<br />

Workers, increase in awareness<br />

Use of GIS and Remote Sensing Technologies<br />

enabled e-services, maintain transparency<br />

Ensure that World’s<br />

population have<br />

access to ICT<br />

Currency in<br />

databases, networks<br />

WSIS though has not been specific in setting the agenda for ICT<br />

interventions for implementing the MDGs (Goals 4,5,6,7), there<br />

are continued efforts in these areas. As per the predictions of<br />

WSIS, ICT interventions would be quite significant in the areas of<br />

mobile communications, basic radio and television services by the<br />

year 2015. Progress in the areas related to e-governments has also<br />

been quite reasonable as per WSIS study. But as per WSIS, the<br />

barriers for larger use ICT would be in the form of availability of<br />

electricity and internet. UN’s MDG report for the year 2010<br />

indicates that due to targeted interventions with sustained effort<br />

through political and administrative (including funding) support,<br />

there are significant progresses in achieving MDGs. However,<br />

many important goals are still unmet for the poor, living in remote<br />

areas, and the progress has been uneven. More importantly the<br />

report recognizes that gender inequality and women<br />

empowerment concerns are not adequately addressed which are<br />

preconditions for overcoming poverty, hunger and disease<br />

[1],[31],[30],[29].<br />

Linking E-Governance services to achieve MDGs is not a new<br />

approach [1],[29],[11]. While addressing the challenges for<br />

linking E-Governance with MDGs, UN has accepted various<br />

dimensions related to measurements including impact, policy<br />

development, resource mobilization, global alliance and initiatives


[43],[44]. E-governance at the national level has now progressed<br />

for supporting MDGs either directly or indirectly. Every nation<br />

now has adequate plans to display its e-readiness and has<br />

strategies to support the MDGs effectively [32]. It is thus<br />

imperative that each MDG needs to be assessed in terms of the<br />

contributions of E-Governance in meeting the agenda across all<br />

the levels of governance with adequate focus at the local level. In<br />

Indian context, this is more relevant as part of the development<br />

process because of the fact that local development has larger<br />

ramifications in meeting the national goals [29].<br />

Sustainable development strategies are constantly focusing on<br />

MDGs [12],[10]. E-Governance strategies are also being termed<br />

as effective contributors to sustainable development.<br />

Measurements of sustainable development and assessment of<br />

critical success factors of MDGs provide common base for<br />

understanding readiness of a nation to address sustainable<br />

development with social, economic and ecological dimensions. In<br />

this paper assessment of causality for achieving successful MDGs<br />

through E-Governance is explored. It considers dimensions<br />

related to sustainable development as important contributors. In<br />

Table 2 below the stated dimensions are related to the E-<br />

Governance readiness indicators with specific relationships with<br />

MDGs[19].<br />

Table 2. MDG and E-Governance Readiness<br />

MDG Goals E-Governance Readiness<br />

Indicators<br />

1.Eradicate<br />

extreme<br />

poverty and<br />

hunger<br />

2.Achieve<br />

universal<br />

primary<br />

education<br />

3.Promote<br />

gender<br />

equality and<br />

empower<br />

women<br />

4.Reduce<br />

child<br />

mortality<br />

5.Improve<br />

maternal<br />

health<br />

6.Combat<br />

HIV/AIDS,<br />

malaria, and<br />

other diseases<br />

7.Ensure<br />

environmental<br />

sustainability<br />

8.Develop a<br />

global<br />

partnership<br />

for<br />

development<br />

Government E-Readiness to<br />

provide support for<br />

economic issues at the local<br />

level. This readiness<br />

indicates citizens’ readiness<br />

to achieve higher income<br />

through better education,<br />

skills, reduction in<br />

information asymmetry,<br />

information on market<br />

Government E-Readiness to<br />

socially network the<br />

community, enhance<br />

awareness among women<br />

with multi-media services<br />

Government E-Readiness to<br />

network the community,<br />

enhance awareness and<br />

provide inputs to the citizens<br />

to use natural resources<br />

effectively with holistic<br />

environmental considerations<br />

Sustainable<br />

Development<br />

Dimensions<br />

Economic<br />

Social<br />

Environmental<br />

356<br />

Global readiness reports on E-Governance have maintained that<br />

national E-Governance efforts are likely to bring in the desired<br />

effects in achieving sustainable development indicators [25],[23].<br />

2.1 Research Model and Hypotheses<br />

Sustainable development is a complex and multifaceted issue that<br />

has been challenging each and every nation [12]. Various attempts<br />

are made to attain this through MDGs and there are various<br />

instruments used to assess the level of attainment of these goals.<br />

National E-Governance readiness for each nation has been a<br />

routine phenomenon that showcases readiness of each nation with<br />

benchmarking to provide insights to the efforts being made for<br />

attaining sustainable development goals though ICT interventions<br />

[14],[15]. These efforts, especially in the context of India, need to<br />

examine the causal relations among E-Governance readiness and<br />

sustainable development.<br />

This research includes assessment of following relationships:<br />

1. Contributions of E-Governance services in the village can be<br />

used for assessment of e-readiness to meet the MDGs.<br />

It is argued that e-readiness (excluding ICT infrastructure<br />

readiness which is a subset of overall e-readiness) is made<br />

available through E-Governance services. Such services need to<br />

be designed with active collaborations of citizens.<br />

2. E-readiness to support MDGs is likely to contribute to the<br />

empowerment of the village households for meeting sustainable<br />

development indicators in the village.<br />

It is argued that MDGs need to direct E-Governance services at all<br />

levels of the nation. This would facilitate creation of success<br />

factors for the E-Governance services provided. In absence of<br />

such directed efforts e-readiness may get limited to establishment<br />

of IT infrastructures.<br />

In order to answer the research questions some research<br />

hypotheses are proposed as discussed below. These hypotheses<br />

are leveled in three tiers.<br />

Tier-I Hypothesis: In Figure 1 the first hypothesis is presented. It<br />

posits that every goal under MDG at the local level is influenced<br />

collectively by the citizens, community groups and government<br />

agencies.<br />

H1<br />

Household<br />

Affinity<br />

Community<br />

Affinity<br />

Government<br />

Support<br />

MDG #<br />

Figure 1. MDG and Stakeholders<br />

Tier-I includes collective contributions from the local level<br />

citizens, community groups to successfully meet the MDGs. It is


strongly believed that local governance has far reaching effects at<br />

the national level in terms of sustainable development [21]. This<br />

is quite significant because of the local self governance in India<br />

has provided the rights to use and develop local resources for<br />

development. Government agencies are responsible to these local<br />

empowered agencies and extend support in terms of awareness,<br />

expertise and finance development interventions. Collective effort<br />

is therefore, essential to attain MDGs. It is because successful<br />

development process needs collective efforts from the planners<br />

and mediating agencies and the citizens [20],[42]. In such<br />

scenarios, the contributions are multilevel oriented and therefore,<br />

predictability of their contributions will be influenced by<br />

collective participation [20],[1].<br />

Hypothesis H1. Citizens, Community Groups, Government<br />

Agencies contribute collectively to the success of MDGs<br />

Tier-II Hypotheses: E-governance readiness is a major contributor<br />

to each and every MDG due to the enormous benefits of ICT<br />

envisaged in the MDG agenda. E-Governance aims to bring<br />

appropriate services closer to the citizens with optimized cost,<br />

time and relevance [1], [19], [3]. Thus it is important to find the<br />

causal effects of E-Governance efforts and their contributions to<br />

the MDGs. In order to measure this effect, it is posited that E-<br />

Governance supported efforts for MDGs are reflected through<br />

display of readiness across all the dimensions of sustainable<br />

development. It is also considered important that group of MDGs<br />

are likely to support a particular dimension of readiness for<br />

sustainable development. There is a continuous process adopted<br />

by World Bank, World Economic Forum through INSEAD and<br />

ITU etc. to look at the progress done in the areas of e-readiness. In<br />

Figure 2 below India’s position on e-readiness (reports of<br />

INSEAD are used here) is presented [2],[35]. This e-readiness<br />

exercise provides comprehensive analyses on various metrics<br />

driven performance assessment (termed as indices) of various<br />

countries participating in the process. Major indices which are<br />

presented in Figure 2 reflect the ICT adoption behaviour in India<br />

vis-à-vis global scenarios [6],[7],[8],[9]. Indices used in this<br />

assessment provide a percentile score. A higher percentile<br />

provides better status for the country. The percentiles are<br />

presented longitudinally by using data of INSEAD since the year<br />

2002. It may be noted that these e-readiness assessment<br />

indicators are useful to evaluate the role of E-Governance in<br />

meeting MDGs.<br />

Figure 2. ICT Indices for India [2]<br />

Eight MDGs envisaged for improving the quality of life of people<br />

in member countries are grouped as presented in Figure 2 and in<br />

the following manner. MDG#1 and MDG#2 are related to ereadiness<br />

for rendering services related information, optimizing<br />

cost and time of availing information on income generation<br />

opportunities, enhancing skills through education, government’s<br />

effort to use ICTs for providing networks among wage earners,<br />

357<br />

schemes for income opportunities and providing transparency in<br />

such processes. In India there are many E-Governance initiates<br />

aimed at all these defined areas of interventions including Unique<br />

Identification Authority of India (UIDAI) [35]. MDGs# 3,4,5,6<br />

relate to social issues which reflect in gender inequity, women<br />

health, HIV etc. In India, this is quite challenging because of<br />

various social, cultural and infrastructural issues [31]. It is noted<br />

that despite improvements in health services including National<br />

Aids Control Programme, National Rural Health Mission, rural<br />

India in particular is not recording encouraging results as per<br />

MDG reports [27],[29]. It is thus posited that social empowerment<br />

can be measured through e-readiness to support MDG#3,4,5,6.<br />

MDG<br />

#8<br />

MDG #7<br />

MDG #6<br />

MDG #5<br />

MDG #4<br />

MDG #3<br />

MDG #2<br />

MDG #1<br />

Figure 3. MDG and E-Readiness<br />

MDGs#7,8 encompass larger issues related to environment. In<br />

India e-readiness to support this cause needs active interfaces with<br />

networks, and awareness among the rural citizens. It is posited<br />

that role of E-Governance in these areas is expected to enhance<br />

the e-readiness in managing environment. In Table 3 various E-<br />

Governance programs are planned to meet the MDG agenda.<br />

Table 3: E-Governance Programmes in India [5],[6],[7]<br />

MMP Level Description of the Service<br />

Central Government Income Tax, Central Excise,<br />

Passports/Visa & Immigration, MCA<br />

21, National ID, Pensions, Banking,<br />

Insurance<br />

State Governments<br />

H23<br />

H22<br />

H21<br />

E-Readiness -<br />

Environment<br />

E-Readiness -<br />

Social<br />

Empowerment<br />

E-Readiness -<br />

Economic<br />

Empowerment<br />

H3<br />

Sustainable<br />

Developmen<br />

t<br />

Agriculture, Land Records, Transport,<br />

Treasuries, Commercial Taxes, Gram<br />

Panchayats, e-Health, Registration,<br />

Police, Employment Exchange, e-<br />

Districts (State can add 5 MMPs as


MMP Level Description of the Service<br />

Integrated<br />

per their choice)<br />

e-Business, Electronic Data<br />

Interchange, India Portal, Electronic<br />

Government Gateway, E-Courts, E-<br />

Office, E Procurement<br />

Hypotheses H2 in Tier-II includes e-readiness assessment of three<br />

dimensions of sustainable development with the considerations<br />

that MDGs need to harness the goals with active support of ICTs<br />

and E-Governance services in order to attain the objectives of<br />

sustainable development [6],[7],[8],[13]. Sustainable development<br />

requires holistic approach and thus there is a need to assess the<br />

strengths of E-Governance in meeting social, economic and<br />

environmental needs [19]. In the process, H2 posits three subhypotheses<br />

as follows:<br />

Hypothesis H21: E-Governance services available for MDG#1<br />

and MDG#2 collectively contribute to E-Readiness for Economic<br />

Empowerment<br />

Hypothesis H22: E-Governance services available for MDG#3,<br />

MDG#4, MDG#5, MDG#6 collectively contribute to E-Readiness<br />

for Social Empowerment<br />

Hypothesis H23: E-Governance services available for MDG#7,<br />

MDG#8 collectively contribute to E-Readiness for Environment<br />

In these hypotheses E-Readiness for Economic Empowerment,<br />

Social Empowerment and Environment are the latent variables<br />

which are measured through the contributions of the ICT enabled<br />

services for MDGs.<br />

Lastly in these Tier II hypotheses, it is posited that MDGs need to<br />

contribute to the overall sustainable goals in India and this is<br />

possible because of the sustainable development at the local levels<br />

[11],[12].<br />

Hypothesis H3: E-Readiness for Economic Empowerment,<br />

Social Empowerment and Environment collectively contribute to<br />

Sustainable Development.<br />

3. EMPIRICAL VALIDATION OF THE<br />

MODELLING<br />

This study involved primary survey among rural citizens, rural<br />

communities and government agencies who are major<br />

stakeholders in supporting MDGs. For the purpose some villages<br />

in the state of Gujarat were considered for pilot studies. The<br />

sample size was 194. This includes 24 government<br />

representatives, 52 village community members and 118 village<br />

citizens in eight sample villages in the district of Panchmahals in<br />

the state of Gujarat. This number was arrived during visits to eight<br />

villages where access could be possible due to the support from<br />

government officials and intervening agencies. In Figure 4<br />

sampling frame is presented.<br />

358<br />

Figure 4. Sampling Frame<br />

3.1 Validation of Tier-I Hypothesis<br />

The sampling indicates that samples are multi leveled and thus<br />

their collective orientation in assessing MDGs would be<br />

beneficial. In reality villagers, village community groups and<br />

government representatives are not same in numbers and their<br />

strength varies in the shape of a pyramid. Due to this structure of<br />

population, stratified layering of the sample respondents and<br />

divergence in their objectives in contributing to MDGs, dummy<br />

coding principle was chosen to validate the collective<br />

contributions [24]. In dummy coding one of the major<br />

considerations is to identify the controlling variable in the<br />

stratified layers. In this case, citizens are considered as the<br />

controlling variables because their contributions are deterministic<br />

for the success of MDGs. Communities and government<br />

representatives are mostly characterized as service provisioning<br />

and supporting agencies for overall progress of the citizens.<br />

Besides, citizen empowerment is quite critical in managing<br />

MDGs. Validations for H1 include dummy coding and ANOVA<br />

to predict the overall contributions through Dunnet values which<br />

is used for dummy coding [18]. For each MDG this validation<br />

procedure is adopted and in Table 4, variables and related<br />

measurement instruments are presented.<br />

Table 4: Variable Descriptions, Measurement Instruments<br />

Goal Variables Measurements<br />

1<br />

N=194<br />

Community<br />

Affinity<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

Community groups are using ICT to<br />

share information on Income generation<br />

Community groups are using ICT for<br />

networks<br />

Community groups have influence on<br />

Individuals<br />

Government representatives are using<br />

ICT to share information on Income<br />

generation<br />

ICT has enhanced transparency in<br />

getting wages<br />

Internet is available in village<br />

Information is useful<br />

Information is available on Mobile<br />

ICT has enhanced transparency in


Goal Variables Measurements<br />

2<br />

3<br />

Community<br />

Affinity<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

Community<br />

Affinity<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

4 Community<br />

Affinity<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

5 Community<br />

Support<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

6 Community<br />

Affinity<br />

getting wages<br />

Possibility has increased to enhance<br />

skill through ICT<br />

Parents are sending children to schools<br />

Community groups are using ICT to<br />

share information<br />

Community groups influence child<br />

education<br />

Availability of computers in schools<br />

Availability of internet in schools<br />

Teachers get support from teachers<br />

from other schools through computers<br />

Teachers get support for using library<br />

through internet<br />

Students are using computers<br />

Government representatives are using<br />

ICT to share information<br />

Availability of Teachers in the Schools<br />

Teachers are trained to teach ICT<br />

based courses<br />

Households are interested in ICT based<br />

education<br />

Community groups are using ICT to<br />

share information<br />

Volunteers are using ICT to share<br />

information<br />

Computers have local language<br />

interfaces<br />

Government representatives/volunteers<br />

are using ICT to share information<br />

Girls are using computers<br />

Broadcast media are used for<br />

disseminating information<br />

Community groups are using ICT to<br />

share information<br />

Health workers are using ICT to<br />

network with doctors and other<br />

agencies<br />

Government representatives/volunteers<br />

are using ICT to share information<br />

Information on child care is available<br />

Broadcast media are used for<br />

disseminating information<br />

Community groups are using ICT to<br />

share information<br />

Health workers are using ICT to<br />

network with doctors and other<br />

agencies<br />

Government representatives/volunteers<br />

are using ICT to share information<br />

Information on maternal care is<br />

available<br />

Broadcast media are used for<br />

disseminating information<br />

Community groups are using ICT to<br />

share information<br />

359<br />

Goal Variables Measurements<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

7 Community<br />

Affinity<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

8 Community<br />

Affinity<br />

E-<br />

Governance<br />

Support<br />

Household<br />

Affinity<br />

Health workers are using ICT to<br />

network with doctors and other<br />

agencies<br />

Government representatives/volunteers<br />

are using ICT to share information<br />

Information on HIV/AIDS care is<br />

available<br />

Broadcast media are used for<br />

disseminating information<br />

Community groups are using ICT to<br />

share information<br />

Government Representatives/<br />

volunteers are using ICT to share<br />

information<br />

Households are using ICT to remain<br />

aware of environmental issues<br />

Broadcast media are used for<br />

disseminating information<br />

ICT enabled Library and information<br />

services are available in the village<br />

Community groups are using ICT to<br />

share information<br />

Government representatives/volunteers<br />

are using ICT to share information<br />

Village has ICT enabled networks with<br />

other villages<br />

Broadcast media are used for<br />

disseminating information<br />

The measurement instruments are used with the help of Likert<br />

Scales in a five point scale (1- strongly unsatisfactory…., 5strongly<br />

satisfactory) [22]. In Table 5 below, a generic example of<br />

dummy coding structure is presented as applicable to MDG#1.<br />

Explanation of the Table is as follows. It is argued that households<br />

(citizens) control the overall objectives of MDGs. MDG#1 as<br />

explained in Table 5 below is the mean of the responses obtained<br />

from the subjects through Likert scale. This summative nature of<br />

Likert scale is used since all the independent items are proved to<br />

be reliable and are not mostly non-dimensional (Nunnally,1978).<br />

The purpose of dummy coding is to understand whether<br />

collectively respondents across the three layers (strategic, tactical<br />

and operational) do collectively display their holistic<br />

understanding in projecting preparedness as hypothesized as<br />

MDG#1. D1 and D2 are two dummy coded vectors associated<br />

with each group. In this case there are three independent groups<br />

for predicting validations of MDG#1 i.e. MDG#1Community Affinity,<br />

MDG#1Governmnet Support and MDG#1Household Affinity. As per dummy<br />

coding procedures, vectors are to be identified which is n-1 (i.e., if<br />

number of groups are 3, number of vectors would be 2). In this<br />

case number of groups are 3. Out of two vectors one vector in a<br />

group is assigned “1” whereas other vector is assigned “0”. All the<br />

vectors in one group are assigned with “0” which is termed as<br />

control group. For example, MDG#1Household Affinity, (MDG# 1) has<br />

three contributors i.e, Community Affinity (with 2 instruments (j))<br />

and position in the dummy table is 1 (i). Thus MDG#1 is thus<br />

∑MDG1ij /n where n=2 in this case. Likert values will have their<br />

mean which is dependent on number of measurement instruments<br />

used. MDG#1 will have sample response mean.


Stratified<br />

Layers<br />

Community<br />

Affinity<br />

E-Governance<br />

Support<br />

Household<br />

Affinity<br />

(Control)<br />

Table 5: Dummy Table for MDG#1 (sample data)<br />

Sample<br />

Size*<br />

(n)<br />

MDG# 1<br />

Objectives<br />

52 (Mean<br />

3.16, SD<br />

0.81,<br />

Cronbach<br />

Alpha<br />

0.719)<br />

24 (Mean<br />

3.14, SD<br />

0.86,<br />

Cronbach<br />

Alpha<br />

0.716)<br />

118 (Mean<br />

3.11, SD<br />

0.76,<br />

Cronbach<br />

Alpha 0.65)<br />

Dummy<br />

Code<br />

(D1)<br />

Dummy<br />

Code<br />

(D2)<br />

Remarks<br />

1 0 MDG1 =<br />

∑MDG1ij<br />

/n; i=1, j=n<br />

0 1 MDG1 =<br />

∑MDG1ij<br />

/n; i=1, j=n<br />

0 0 MDG1 =<br />

∑MDG1ij/n;<br />

i=1, j=n<br />

*N=194<br />

In Table 6 below the F-Test and other relevant results for MDG#1 are<br />

presented.<br />

Table 6: F-Statistics for MDG#1 through Dummy Coding (ANOVA)<br />

Sum of df Mean Square F- Sig.<br />

Squares<br />

Statistics<br />

a<br />

Regression 1.304 2 .652 3.194 .046<br />

Residual 19.193 191 .204<br />

Total 20.497 193<br />

N=194<br />

The major contributor for this regression is the F-Statistics which is<br />

observed as 3.914 and is above the desired value of 2.3 [18]. Thus the<br />

hypothesis H1 for MDG#1 is validated in favour of collectively predicting<br />

contributions of E-Governance in achieving MDG#1. In Table 7 below<br />

results for all the MDGs are presented.<br />

Table 7: F-Statistics for al MDGS through Dummy Coding<br />

MDG# F-Statistics<br />

(Observed)<br />

F-Statistics<br />

(Expected)<br />

1 3.194 2.3 .046<br />

2 6.574 2.3 .002<br />

3 25.925 2.3 .000<br />

4 8.524 2.3 .000<br />

5 10.694 2.3 .000<br />

6 4.807 2.3 .010<br />

7 18.516 2.3 .000<br />

8 10.053 2.3 .002<br />

N=194<br />

Significance<br />

(P-Value)<br />

360<br />

It may be noted here that results available through F-Statistics for all the<br />

MDGs supported hypothesis H1. Barring MDG#1 and MDG#6 where pvalues<br />

were statistically significant with more than 1 percent, all other<br />

MDGs predicted affirmatively the collective contributions of E-<br />

Governance services. It implies that households, community groups and<br />

government representatives collectively contribute to meet the MDGs with<br />

E-Governance support.<br />

3.2 Validation of Tier-II Hypotheses<br />

Hypotheses defined in Tier II i.e., H2 and H3; deal with latent<br />

variables in order to validate contributions of MDGs for attaining<br />

overall sustainable development. Dealing with latent variables to<br />

predict complex phenomena requires careful theoretical modeling.<br />

Theoretical models and their validations are restricted to depict<br />

behavior of the constructs through approximations. Virtually in all<br />

cases we do not expect to have a completely accurate description<br />

of reality. If the model helps us to understand the relations<br />

between variables matching (fitting) the data, we may judge it (the<br />

model) as validated [16],[17]. It is known that model tries to<br />

approximate the reality. During the validation process it is<br />

essential to understand the relationship among the variables<br />

governing the outcome of the proposed model. Adequacy of a<br />

model is typically determined using conceptual definitions of the<br />

unobserved (endogenous) variables, along with observed variables<br />

(exogenous). Increasingly, model-to-data fit and parameter<br />

estimates form measurement models that utilize structural<br />

equation analysis are being pursued. Model-to-data fit and<br />

parameter estimates are derived from the hypotheses and from<br />

structural models utilizing structural equation analysis. For<br />

theoretical model testing researchers tend to agree that specifying<br />

and testing models using unobserved variables with multiple item<br />

measures of these unobserved variables (endogenous) and survey<br />

data involves: i) defining model constructs, ii) stating<br />

relationships among these constructs, iii) developing appropriate<br />

measures of these constructs, iv) gathering data using these<br />

measures, v) validating these measures, and vi) validating the<br />

model (i.e., testing the stated relationships among the constructs)<br />

[16].<br />

In the case of validating Tier-II hypotheses, Structural Equation<br />

Modelling (SEM) is adopted using LISEL 8.8[17]. In Table 8<br />

constructs are presented with their role on the model proposed in<br />

Figure 3.<br />

Table 8. Variables Used for the Model<br />

Hypothesis Variables<br />

Endogenous Exogenous<br />

H21 MDG#1 E-Readiness -<br />

MDG#2<br />

Economic<br />

Empowerment(ErEco)<br />

H22 MDG#3 E-Readiness - Social<br />

MDG#4<br />

MDG#5<br />

MDG#6<br />

Empowerment(ErSoc)<br />

H23 MDG#7 E-Readiness -<br />

MDG#8<br />

Environment(ErEnv)<br />

H3 E-Readiness - Economic Sustainable<br />

Empowerment (ErEco) Development<br />

E-Readiness - Social<br />

Empowerment(ErSoc)<br />

E-Readiness –<br />

Environment(ErEnv)<br />

(MDG_Ready)


Hypothesis Variables<br />

Endogenous Exogenous<br />

H3 Social Development Sustainable<br />

Economic Development<br />

Environmental<br />

Sustainability<br />

Development<br />

(MDG_Ready)<br />

The model considered H3 as an important contributor to assess<br />

successful E-Governance services adoption for achieving MDGs.<br />

Figure 5. The Observed Model (Path Diagram using LISREL 8.8)<br />

It is posited that sustainable development needs to be pursued<br />

notwithstanding the adoption of MDGs listed in national agenda.<br />

Sustainable development is argued to have three major<br />

dimensions and rural India needs careful interventions to achieve<br />

them. In this research work, hypothesis H3 therefore, considers it<br />

important to include empowerment of citizens through economic,<br />

social and environmental dimensions.<br />

Table 9: Testing of Hypotheses proposed through the Model<br />

Hypothesis Path<br />

Coefficient<br />

T-<br />

Statistics*<br />

Remarks<br />

H21 0.35 16.27 Path coefficient is positive<br />

and t-statistics is<br />

0.35 16.37<br />

significant, Hypothesis<br />

H21 is validated<br />

H22 0.22 9.02 Path coefficient is positive<br />

and t-statistics is<br />

0.24 10.34 significant, Hypothesis<br />

H22 is validated<br />

0.31 11.94<br />

0.25 10.25<br />

H23 0.13 2.62 Path coefficient is positive<br />

and t-statistics is<br />

0.19 2.83 significant, Hypothesis<br />

H23 is validated<br />

H3 0.92 0.38 Path coefficient is positive<br />

-0.25 0.22<br />

except in the case of<br />

Environment where the<br />

0.36 1.61<br />

coefficient is negative and<br />

t-statistics is significant,<br />

0.48 13.91 Hypothesis H3 is not<br />

validated<br />

0.46 19.06<br />

361<br />

Hypothesis Path<br />

* p < 0.05<br />

Coefficient<br />

T-<br />

Statistics*<br />

0.48 20.82<br />

Remarks<br />

It may be noted here that H3 has been negatively influenced by<br />

the environmental factors. It means that e-readiness is not<br />

encouraging in the areas of environmental empowerment in the<br />

levels of households, communities and government agencies.<br />

Other hypotheses in Tier-II have shown positive contributors for<br />

attaining overall sustainable development. The overall model<br />

fitness exercise has generated following structural equation:<br />

MDG_Ready = 0.36*ErSoc -0.25*ErEnv+0.92*ErEco,<br />

Errorvariance = 0.033, R² = 0.97 ----------------------------(1)<br />

This equation (1) explains the relationship between Dependent<br />

Exogenous Variable “MDG_Ready” (Overall e-Readiness of<br />

MDG) and the Endogenous Variables “ErSoc”(contributions of<br />

e-Readiness to Social empowerment), “ErEco”(contributions of<br />

e-Readiness to Economic empowerment) and<br />

“ErEnv”(contributions of e-Readiness to support Environmental<br />

empowerment). This structural equation with R 2 of 0.97 has<br />

indicated a “good fit” [16],[34] and with less error variance of<br />

0.033. It implies that MDG readiness with E-Governance as a<br />

component is influenced by the E-Governance services aimed at<br />

social, economic and environmental issues. It is important to note<br />

that the structural equation showed a negative contributions of E-<br />

Governance services for ensuring environmental sustainability.<br />

This denotes that there is enough scope for policy makers to<br />

prioritize E-Governance efforts in this direction. As regards<br />

contributions of E-Governance services in other two dimensions<br />

of sustainable development, most of the contributions are towards<br />

economic empowerment (0.92) followed by social empowerment<br />

(0.36).<br />

Further analysis on overall readiness of MDG driven sustainable<br />

development “MDG_Ready” indicates that respondents have<br />

indicated almost equal concerns for e-Readiness across all the<br />

three sustainable development dimensions (Economic 0.48, Social<br />

0.46 and environmnet0.48). This implies there is scope for<br />

establishing ever increasing role of E-Governance services in<br />

attaining MDGs for sustainable development.<br />

4. CONCLUSION AND FURTHER<br />

RESEARCH<br />

MDGs are expected to achieve its targets with active<br />

collaborations of the citizens, government agencies and other<br />

stakeholders. E-Governance services are aimed at providing the<br />

basis of networking among stakeholders, and providing desired<br />

information and services to the citizens. This scenario, particularly<br />

in the rural environment and in developing countries, is a<br />

necessity in which E-Governance services are made available with<br />

optimized cost, time, and latency. In this research, it is posited and<br />

proved that collaborative efforts are possible through ICT enabled<br />

E-Governance services. It is also shown that E-Readiness needs to<br />

be assessed at the local level to achieve MDGs in a nation like<br />

India. Besides, MDGs need to extend its purviews to support<br />

sustainable development and thus overall effort is to be made to<br />

empower local level entities including citizens to contribute to this<br />

cause.


Global perspectives in providing E-Governance services for<br />

development indicate that e-readiness for India is of great concern<br />

and needs improvement in order to enhance its effectiveness.<br />

Most of e-readiness parameters assessed by the INSEAD indicate<br />

that the digital divide continues to exist despite improvements in<br />

many areas including individual readiness. However, analyses of<br />

the survey conducted in the sample eight villages in the district of<br />

Panchmahals in the state of Gujarat suggest that most people<br />

living in rural areas are yet to gain access to such services. Rural<br />

teledensity too is a prime concern in India despite mobile<br />

penetration having gone up. As regards services’ usage in India<br />

vis-à-vis global contexts as per INSEAD, India has not shown an<br />

encouraging performance and has been ranked low in all the areas<br />

including broadband services, bandwidth availability and network<br />

coverage etc. Thus it is important to note that there is a designreality<br />

gap in all the parameters that may be used to assess the role<br />

of E-Governance to support MDGs and sustainable development<br />

in Indian context. It is worth mentioning following statements<br />

that are relevant for Indian E-Governance and its role in<br />

supporting MDGs.<br />

“India lives in Villages”<br />

“ You must be the change you wish to see in the world”<br />

- Mahatma Gandhi<br />

“You have to decide whether development means affluence or<br />

whether development means peace, prosperity and happiness. “<br />

-Sunderlal Bahuguna<br />

“While the distribution of wealth and income need not be equal, it<br />

must be to everyone’s advantage, and at the same time, positions<br />

of authority must be accessible to all.”[27]<br />

It is imperative that MDGs in India need to ensure its<br />

contributions to sustainable development while making efforts to<br />

make quantifiable progress in achieving the goals. Role of E-<br />

Governance services needs to concentrate on bringing in<br />

transparency in government and governance while ensuring<br />

adequate measures in optimizing the costs and time for the<br />

citizens dwelling in the access layer of the governance. In India,<br />

people in this access layer form the core of the development<br />

process and they are poor. These people are still affected by the<br />

digital divides. In absence of an appropriate strategy to enforce<br />

convergence among E-Governance services and with an aim to<br />

empower people in access layer to collaborate, it would be<br />

difficult for India to have sustainable development despite<br />

improvements in MDGs.<br />

4.1 Limitations<br />

This research has several limitations. First, the research has been<br />

limited to a homogeneous sample of respondents in a particular<br />

district which does away with the scope for generalization. A<br />

larger number of samples need to be included covering diverge<br />

demographic areas with heterogeneity. Secondly, E-Governance<br />

services considered for the study are limited to government webaccess<br />

alone. Other sources like civil society and business<br />

organizations providing such services need to be included in order<br />

to make the analyses broad-based. Thirdly, User Centered Designs<br />

(UCD) are quite relevant in such studies to assess Quality of<br />

Services (QoS), cost and latency. These could not be assessed as<br />

most of these services are yet to be availed by the sample<br />

respondents. There is scope to include these dimensions while<br />

362<br />

validating the model (especially in capturing information needs of<br />

uses and their intentions to use E-Governance services).<br />

5. ACKNOWLEDGEMENTS<br />

The author acknowledges the support of the SDTT, Panchmahals<br />

District Collectorate and Panchmahals District Milk Cooperative<br />

Union for the successful conduct of the study.<br />

6. REFERENCES<br />

[1] Aisha Ghaus-Pasha, 2007, Governance for The Millennium<br />

Development Goals, International Journal of Information<br />

Technology and Knowledge Management, Volume 4, No. 1,<br />

pp. 119-124<br />

[2] Dutta, Soumitra, and Mia, Irene, 2011, The Global<br />

Information Technology Report, 2010-2011, INSEAD,<br />

World Economic Forum, Geneva.<br />

[3] European Union (EU),2007, “Inclusive e-Government:<br />

Survey of status and baseline activities”, European<br />

Commission, DG Information Society and Media, e-<br />

Government unit, December<br />

[4] Gilhooly, Denis, 2004, Mainstreaming Information &<br />

Communication Technologies for the Achievement of the<br />

Millennium Development Goals, Report UN ICT Task<br />

Force, Berlin, 18-20 November.<br />

[5] Government of Gujarat,2011, Gujarat Informatics Limited,<br />

Enabling e-Governance. url: www.gujaratinformatics.com.<br />

Accessed on 15.07.2011.<br />

[6] Government of India, 2007, Country Strategy Paper, 2007-<br />

2013, Planning Commission, New Delhi.<br />

[7] Government of India,2011, Agmarknet, A Step towards<br />

Globalization of Indian Agriculture, Ministry of Agriculture,<br />

New Delhi. url: www.agmarknet.nic.in accessed on<br />

15.07.2011.<br />

[8] Government of India,2011, National Informatics Center. url:<br />

ww.nic.in accessed on 15.07.2011<br />

[9] Government of India,2011, Saaransh, A Compendium of<br />

Mission Mode Projects under NeGP, Ministry of IT, New<br />

Delhi. url: http://www.mit.gov.in/content/mission-modeprojects<br />

accessed on 17.07.2011;<br />

http://www.mit.gov.in/sites/upload_files/dit/files/Compendiu<br />

m_FINAL_Version_220211.pdf accessed on. 14. 07.2011.<br />

[10] Heeks, R. and A. Molla,2009, “Impact Assessment of ICTfor-Development<br />

Projects: A Compendium of Approaches”,<br />

Working Paper 36, Institute for Development, Policy and<br />

Management (IDPM), University of Manchester.<br />

[11] IBRD, 2011, Improving the Odds of Achieving the MDGs<br />

Heterogeneity, Gaps, and Challenges, Global Monitoring<br />

Report, 1818 H Street NW Washington DC 20433<br />

[12] IISD, 1997, Assessing Sustainable Development, Principles<br />

in Practice, The International Institute for Sustainable<br />

Development, December, ISBN 1-895536-07-3<br />

[13] India Statistics , 2011, Revealing India Statically. url:<br />

www.indiastat.com. accessed on 14.07.2011.<br />

[14] International Telecommunication Union (ITU), 2010, World<br />

Telecommunication/ICT Development Report 2010,<br />

Monitoring the WSIS Target: A Mid Term Review, Geneva,<br />

Switzerland.<br />

[15] International Telecommunication Union, 2010. World<br />

Telecommunication/ICT Development Report 2010,<br />

Monitoring the WSIS Target: A Mid Term Review, Geneva,<br />

Switzerland.


[16] Joreskog, K.G., and Sorbom, D., (1989), LISREL 8:<br />

Structural Equation Modelling with SIMPLIS command<br />

Language, Hillsdale, NJ: Lwarence Associates.<br />

[17] Kline, R. B. (1998), Principles and Practice of Structural<br />

Equation Modeling, New York: The Guilford Press.<br />

[18] Mcliver, John P., and Carmines, Edward G., 1994,<br />

Unidimensional Scaling, International Handbook of<br />

Quantitative Applications in the Social Sciences, Volume 4,<br />

Sage Publications, London, UK,<br />

[19] Misra, H. K. 2012, Understanding ICT Enabled<br />

Development Interventions With MDG Perspectives in<br />

Indian Context : A Study in Panchmahal District, Working<br />

Paper 230, IRMA.<br />

[20] Misra, H. K., 2011. Information Kiosk Based Indian Rural E-<br />

Governance Service Delivery, Value Chain Based<br />

Measurement and Acceptance Modelling. The 5th<br />

International Conference on Theory and Practice of<br />

Electronic Governance (ICEGOV2011), Tallin, Estonia, 26-<br />

28 September.<br />

[21] Misra, H.K. 2010, “Citizen-Centric Service Dimensions of<br />

Indian Rural E-Governance Systems: An Evaluation”, in<br />

Hakikur Rahman (ed.) Cases on Adoption, Diffusion, and<br />

Evaluation of Global E-Governance Systems: Impact at the<br />

Grass Roots. Hershey, USA: IGI Global Publishing.<br />

[22] Nunnally, J C., 1978, Psychometric Theory, New York,<br />

McGraw-Hill.<br />

[23] OECD, 2004, Measuring Sustainable Development,<br />

Integrated Economic, Environmental and Social<br />

Frameworks.<br />

[24] Pedhazur, E. J., 1997, Multiple Regression in Behavioral<br />

Research (Third Edition), Harcourt Brace College Publishers,<br />

New York.<br />

[25] Peter Hardi and Terrence Zdan, 1997, Assessing Sustainable<br />

Development, Principles in Practice, 161 Portage Avenue<br />

East - 6th Floor Winnipeg, Manitoba, R3B 0Y4, ISBN 1-<br />

895536-07-3<br />

[26] Rahman Naimur, 2010, MDGS, Inclusive Growth and<br />

Governance, One World Foundation India, New Delhi.<br />

[27] Rawls, J. (1971). A theory of justice. Cambridge, MA:<br />

Harvard University Press<br />

[28] Richard Gerster And Sonja Zimmermann, 2005, Up-Scaling<br />

Pro-Poor ICT-Policies and Practices: A Review of<br />

Experience with Emphasis on Low Income Countries In Asia<br />

And Africa, Swiss Agency for Development and Cooperation<br />

(SDC), Gerster Consulting, CH–8805 Richterswil,<br />

Switzerland<br />

[29] Roman Mogilevsky and Anara Omorova, 2011, Assessing<br />

Development Strategies to Achieve MDGs in Asia<br />

Macroeconomic Strategies of MDG Achievement in the<br />

Kyrgyz Republic, Center for Social and Economic Research,<br />

Warsaw, CASE Network Report No.95<br />

[30] Sakiko Fukuda-Parr, 2008, Are the MDGs Priority in<br />

Development Strategies and Aid Programmes? Only Few<br />

Are!, Working Paper number 48, October, The New School<br />

University, New York. http://www.ipcundp.org/pub/IPCWorkingPaper48.pdf<br />

accessed on<br />

02.03.2012<br />

[31] Sanjay Jamwal, 2011, Project Proposal on Impact<br />

Assessment Of Village Resource Centres (VRC) In<br />

Achieving Millennium Development Goals<br />

[32] Satterthwaite, David (Ed.), 2003, The Millennium<br />

Development Goals and Local Processes, Hitting the target<br />

363<br />

or missing the point? IIed, 3 Endsleigh Street, London,<br />

WC1H 0DD, UK<br />

[33] Tomasz, J. et al. ,2011, ICEGOV 2011. Tallinn, Estonia:<br />

Tutorial on Electronic Governance for Development.<br />

[34] Spector, P E., (1988), “Development of the Work Locus of<br />

Control Scale”. Journal of Operational Psychology, 61,<br />

pp.335-340.<br />

[35] UIDAI, 2010, Unique Identification Authority of India<br />

Strategic Overview, Unique Identification Authority of India,<br />

Planning Commission, Government of India, New Delhi.<br />

[36] UN, 2007, Development Goals: Core Issues And Good<br />

Practices, 7th Global Forum on Reinventing Government<br />

Building Trust in Government, 26-29 June , Vienna, Austria<br />

[37] UN, 2008, UN E-Government Survey, From E-Government<br />

to Connected E-Governance, New York UN, 2011,<br />

Measuring Impacts of Information and Communication<br />

Technologies for Development, Geneva.<br />

[38] UN,2010, Current Strategies on MDGs Monitoring and<br />

Evaluation: The MDG Africa Group Cluster on Statistics,<br />

Second Meeting of the Statistical Commission for Africa<br />

(StatCom Africa - II), 17 – 22 January, Addis Ababa,<br />

Ethiopia<br />

[39] UNCTAD,2011. Measuring Impacts for Information and<br />

Communication Technologies for Development, United<br />

Nations Conference on Trade and Development, New York<br />

and Geneva.<br />

[40] UNDP, 2010, What Will It Take to Achieve the Millennium<br />

Development Goals? An International Assessment, United<br />

Nations Development Programme, One United Nations<br />

Plaza, New York, NY 10017, USA<br />

[41] United Nations, (UN),2008, UN E-Government Survey, New<br />

York: E-Government to Connected E-Governance. url:<br />

http://www.indiatelecomonline.com accessed on 14.07.2011.<br />

[42] United Nations,2001, Road map towards the implementation<br />

of the United Nations Millennium Declaration, United<br />

Nations, New York.<br />

[43] United Nations,2010, The Global Partnership for<br />

Development at a Critical Juncture. MDG Gap Taskforce<br />

Report, United Nations, New York.<br />

[44] United Nations,2011, Millennium Development Goals<br />

Report, New York.


Harnessing Renewable Energy Technologies for ICT and<br />

e-Governance Services in Un-Electrified Communities in Rural Nepal<br />

Mona Sharma<br />

Winrock International<br />

P.O.Box 4927<br />

Kathmandu, Nepal<br />

977 1-4467087; 977 9851146002<br />

msharma@winrock.org.np; mona33sharma@gmail.com<br />

ABSTRACT<br />

The Government of Nepal’s electronic-governance initiatives<br />

remain beyond the access of the majority of Nepal’s population.<br />

Many are not even aware that such services exist. This is because<br />

due to Nepal’s difficult terrain, two vital vehicles for egovernance<br />

services -access to energy/the national electricity grid<br />

and internet penetration - are both negligible. Rural populations<br />

stand to benefit the most from e-governance services, yet they<br />

continue to be overlooked by government and non-government<br />

information and communications (ICT)-based development<br />

activities largely on grounds of lack of access to energy sources.<br />

A recently completed ICT project funded by Intel Corporation and<br />

implemented by Winrock International challenged this bottleneck<br />

to efficient rollout of e-governance services, and has demonstrated<br />

a successful shift in the national rural ICT paradigm. This paper<br />

communicates the experience of a pioneering community-based<br />

activity to extend electronic services, including e-governance, in<br />

remote un-electrified communities in Nepal. This public-private<br />

partnership between rural communities, local and national<br />

governments, and a non-government organization harnessed<br />

energy generated from small solar photovoltaic and micro-hydro<br />

systems to operate power-efficient ICT and e-services. The ICT<br />

infrastructure is housed in local government schools, and has<br />

enabled rural communities to access multifaceted e-services<br />

beyond the electricity grid network.<br />

Categories and Subject Descriptors<br />

K.6.1 [Management of Computing and Information Systems]:<br />

– Project and People Management – System Analysis and Designs<br />

General Terms<br />

Management, Documentation, Performance, Design, Reliability,<br />

Human Factors<br />

Keywords<br />

Renewable Energy Technologies; Nepal; Program Management<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

364<br />

1. INTRODUCTION<br />

The Government of Nepal (GoN) has introduced numerous ICT<br />

interventions for development and poverty alleviation over the<br />

past five years. An E-Governance Master Plan has also been<br />

rigorously researched and developed. The focus of government<br />

and non-government ICT initiatives to date has been on rollout of<br />

infrastructure, hardware, software packages, online applications<br />

such as e-governance services, and capacity building of human<br />

resources. While all these aspects are crucial for effective<br />

implementation of ICTs nationwide, a major challenge continues<br />

to be largely overlooked: access to electricity to power equipment<br />

and deliver services. This paper chronicles the experiences and<br />

findings of a pioneering attempt to break this barrier by<br />

introducing power-efficient computing and electronic public<br />

services based on alternative energy sources. This pilot project has<br />

demonstrated to all stakeholders that ICT services and<br />

applications can be taken to the 60 percent of rural communities<br />

that currently remain beyond the national electricity grid (see<br />

Figure 1). The pilot was carried out in conjunction with GoN’s<br />

Alternative Energy Promotion Project (AEPC) and the High Level<br />

Commission for Information Technology (HLCIT) at the Ministry<br />

of Environment (MoE). AEPC has since incorporated the model<br />

in the national renewable energy technology (RET) expansion<br />

program, and replicated the community-based model in over<br />

twenty additional locations.<br />

2. BACKGROUND<br />

Nepal’s difficult topography has long challenged extension of<br />

basic services and infrastructure across the country. Road<br />

networks are limited; the national electricity grid currently serves<br />

only 40% of the population as illustrated in Figure 1 below. Even<br />

today, many communities walk days to district headquarters to<br />

access governance services such as birth registrations and transfer<br />

of deeds. Such communities would benefit immensely from<br />

access to E-governance and other online services in their own<br />

villages.<br />

Figure 1. National Electricity Grid of Nepal


GoN has addressed the challenge to nation-wide electrification by<br />

expanding access to RETs for electrification in rural areas. This<br />

government initiative promotes domestic and institutional<br />

electrification based on locally-available sources of renewable<br />

energy, including micro hydro and solar photovoltaic (solar pv)<br />

systems. Even where it is available, RET-based rural<br />

electrification systems are very limited as they are designed for<br />

lighting for a set number of households. They generally cannot<br />

support the power requirements of appliances, and basic ICT<br />

equipment. These compounded factors have resulted in limited<br />

access to, and expansion of ICT applications and electronicservices<br />

beyond urban and peri-urban areas. Nepal’s terrain has<br />

also impeded expansion of the internet backbone. Internet service<br />

providers are gradually extending connectivity through vertical<br />

spurs from the backbone, yet terrestrial systems are feasible only<br />

along the plains area. The majority of the country relies on<br />

wireless and satellite-based connectivity, which is expensive.<br />

Consequently, remote communities needing vital access to<br />

information and communications services, the potential key<br />

beneficiaries of the national E-Governance initiatives, remain<br />

deprived of electronic and ICT services. Public access services do<br />

not exist, and ICTs have been unable to be integrated into rural<br />

governance and education systems.<br />

2.1 Challenges to Rural ICT<br />

o Limited access to grid electricity<br />

o Limited power from RET-based power systems<br />

o Limited penetration of information ICT infrastructure<br />

o High power consumption of conventional computers<br />

o Inadequate integration of ICTs into rural tapestry<br />

o Inadequate rural-appropriate online-based applications<br />

3. APPROACH<br />

In this scenario, Winrock International has pioneered an approach<br />

to introduce and establish locally appropriate electronic services<br />

based on RET-power. Basic details are presented in Table 1; the<br />

geographic diversity of the pilot sites is presented in Figure 2.<br />

Name<br />

Table 1. Project Details<br />

Rural Livelihood Enhancement<br />

through Increased Access to<br />

Information and Communication<br />

Technologies project<br />

Location Four remote communities in rural<br />

Nepal<br />

365<br />

Timeline April 2009- February 2012<br />

The primary focus of the approach:<br />

o Increase public access to rural electronic and ICT services<br />

o Increase awareness of power-efficient options<br />

o Foster the right to information<br />

o Internet-based services to local communities<br />

o Renewable energy, rural ICT, and education services through<br />

partnerships<br />

o Ensure sustainability through partner networks<br />

o Computer and internet literacy<br />

− E-services, applications and services for MDGs<br />

− Poverty alleviation and overall development through<br />

access to information and communication on health,<br />

agriculture, and education<br />

3.1 Innovative Model<br />

The project has leveraged Intel funding to demonstrate maximum<br />

impacts on rural development by establishing the last mile of<br />

connectivity, and using the internet to enhance lives. Multistakeholder<br />

partnerships have been forged with government as<br />

well as non-government bodies to deliver appropriate internetbased<br />

services to local communities. Partners contributing to the<br />

project activities at various levels have contributed additional<br />

funds, forging a sense of ownership of the activity across sectors,<br />

and enabling multiple activities to be carried out towards the<br />

single common goal of sustainable rural development. The model<br />

is illustrated in Figure 3.<br />

Figure 2. Topographic map of Nepal indicating project<br />

districts


Figure 3. The Project Model<br />

Simultaneously, this has also strengthened the sustainability of<br />

services, as well as replication potential through the diverse<br />

networks of each contributing partner. The project facilitated<br />

access to electronic and ICT services in rural Nepal by mobilizing<br />

partnerships to provide a package for holistic rural development<br />

package, from installation of RETs; infrastructure for access to the<br />

internet; low-power hardware; to development of locally<br />

appropriate online products and internet-based services; and<br />

capacity building of locally-based internet service providers to<br />

ensure sustainable internet services.<br />

Figure 4 (L). Solar photovoltaic for ICT center<br />

Figure 5 (R). Microhydro powerhouse<br />

3.2 What We Did<br />

a) Power-efficient ICT facilities<br />

o Isolated micro hydro stations; solar photo voltaic<br />

systems<br />

o Low power equipment at school labs and telecenters,<br />

including Netbooks, Rural Connectivity Platforms<br />

(RCP) and other wireless media<br />

o Enabling environment and vehicle for e-governance in<br />

off-grid areas<br />

b) Dual purpose services<br />

o ICT labs school hours; rural telecenter non-school hours<br />

o Online and offline locally appropriate services<br />

366<br />

o Enhance poverty alleviation, attainment of Millennium<br />

Development Goals, and overall development through<br />

access to information and communication, and eservices<br />

c) Enabling rural E-services<br />

o Strengthening ICT service providers<br />

o Locally appropriate ICT-based applications<br />

o Channel for information dissemination for government<br />

initiatives across sectors, including health, agriculture,<br />

and e-governance<br />

o Rural access to government e-governance initiatives<br />

o Digital content and complete e-curriculum for six<br />

grades as part of the formal school curriculum<br />

o E-Granary type servers to house content for schools and<br />

public for offline use<br />

d) Multi-sector Public Private partnerships<br />

o Government Renewable energy, rural ICT, rural<br />

development Ministries<br />

o Rural schools and communities<br />

o Private ICT service providers and vendors, including<br />

internet service providers and equipment importers<br />

o Non-government agencies, including Open Learning<br />

Exchange and local community-based organizations<br />

(CBO)<br />

3.3 How We Did It<br />

The approach was two-pronged. First, the project leveraged ties<br />

between AEPC, communities and schools to establish computer<br />

labs and ICT service centers based on RET. Second, the project<br />

demonstrated the use of locally available micro hydro and solar<br />

photovoltaic, expanding the reach of electronic services to<br />

deprived rural areas. Figures 4 and 5 illustrate the power sources<br />

for two of the solar and micro hydro pilot sites.<br />

The internet facilities were housed in government schools for<br />

maximum development impact. Placement of these facilities in<br />

the schools is a deliberate attempt to avail children from deprived<br />

communities that may not have access to modern forms of energy<br />

to the benefits of electricity at least during school hours. The<br />

school children have used computer facilities as a computer<br />

laboratory in structured sessions during school hours. Before and<br />

after school hours, as well as during school breaks, the computer<br />

facilities have served as community-based rural ICT centers. By<br />

serving as rural ICT centers, the labs have provided wider<br />

communities reliable communication through the internet, and<br />

locally-appropriate internet based services. Figures 6 and 7, and 8<br />

and 9 illustrate both sets of services at the pilot schools. This has<br />

included information on health, education rights awareness, and<br />

agriculture among others. Facilities such as e-governance<br />

services, search for employment opportunities, and promotion of<br />

products for livelihood enhancement etc have also been provided.<br />

A structured tariff system for these services will support<br />

maintenance costs.


Figures 6 and 7. Computer classes at schools<br />

Figures 8 and 9. Public access services at telecenters<br />

4. THE OUTCOME<br />

a) Created enabling environment for rural ICT<br />

o Demonstrated use of low-power pcs in rural areas<br />

to the government and other stakeholders.<br />

b) Promoted government endorsement of ICT for rural<br />

development through cross-sector use of ICTs for<br />

education, e-governance, and agriculture.<br />

c) Fostered delivery channel for GoN E-governance and<br />

other electronic services.<br />

d) Demonstrated mainstream computer education through<br />

low-power computer labs in government schools.<br />

e) Incorporated ICT facilities for rural access in GoN RET<br />

extension strategy. This will contribute to the overall<br />

rural development, and attainment of MDGs resulting<br />

from access to power.<br />

f) Leveraged local development<br />

g) Service provider training for schools/rural ICT centers<br />

o Integrating E-teaching in schools<br />

o Providing public ICT services<br />

o Hardware and software fundamentals<br />

h) E-content and applications<br />

o Updating online platform for rural users<br />

o ICT-enabled full-year curriculum in Nepali,<br />

English, and Science Grades 6, 7, 8, 9, and 10<br />

Table 2. Impacts from four community-based pilot sites<br />

Beneficiary Group Direct Beneficiaries<br />

Schoolchildren 3200<br />

Individuals 5500<br />

Rural households 1100<br />

367<br />

5. SUSTAINABILITY<br />

5.1 Localized Services<br />

This approach is unique in that it presents a holistic approach in<br />

installing and using RET, and wireless technology to bring about<br />

direct economic impacts upon vulnerable communities. The<br />

project has been integrated into the local community to ensure<br />

optimum development impact, and respond to demand-based<br />

online resources and applications. Offline services and products<br />

have been integrated along with online services. Offline services<br />

have strengthened the business plan of the entrepreneurs as they<br />

cost much less to provide in terms of investment cost, but deliver<br />

constant fees for services. Offline services are integral in the<br />

initial phase to encourage rural clientele not used to online<br />

resources to enter the service facilities and gradually build<br />

comfort in using technology.<br />

Activity sustainability has been ensured by:<br />

1) Offsetting the access to energy, and upfront and operating<br />

cost barriers through multi-sector linkages<br />

2) Providing diversified use of the ICT center facilities to the<br />

local population as public access services<br />

3) Localizing content to meet needs at rural schools, including<br />

E-granary server and E-curriculum<br />

4) Creating ownership and demand for ICT services through<br />

partial subsidy towards local commitment to deliver Egovernance<br />

and other services<br />

5.1 Contributing to the National Agenda<br />

This initiative has addressed major barriers to national expansion<br />

of electronic services. This project has precipitated synergy<br />

between multi-sectoral activities, and mobilized financial and<br />

human resource investments from multiple players at the local as<br />

well as national level in order to translate technological scopes<br />

into direct impacts upon rural lives. Winrock International's<br />

previous efforts in rural information and communication activities<br />

strongly indicate that public-private-partnerships are a pivotal<br />

aspect of sustainability following project completion. Impacts on<br />

direct beneficiaries, the children from grades six through ten, and<br />

households in the vicinity in the four pilot sites alone has been<br />

immense, as indicated in Table 2. With the initiation of public<br />

access ICT services and computer classes using just 14 Netbooks<br />

per site in villages averaging 300 households, schools report<br />

enhanced enrollment in the pilot government schools, and better<br />

student retention and attendance rates as students are more regular<br />

in coming to school. Successful demonstration has made this<br />

model universally replicable in partner networks: MoE has<br />

delivered project-developed capacity building trainings in<br />

government rural ICT initiatives; AEPC has replicated the project<br />

model in their microhydro communities as ICTs enable access to<br />

crucial public services, and make productive use of the electricity<br />

generated. The project-developed curriculum has also been<br />

adopted as a locally-appropriate resource by many schools<br />

nationally. This level of commitment from the national to<br />

grassroots players is anticipated to continue to foster strong<br />

ownership of the approach, thereby supporting the development of<br />

locally-appropriate online electronic services and applications.


5.2 Challenges Remain<br />

a) Lobby with central and district governments for:<br />

− Integration into Computer Science curriculum<br />

− Qualified human resources<br />

− Rural development initiatives<br />

b) Inadequate human resources for ICT-aided teaching<br />

c) Communities not adequately e-ready<br />

d) High cost of bandwidth<br />

e) Keyboard issues with Netbooks<br />

− Dust infiltration<br />

368<br />

− Loose keys following constant use<br />

f) Frequent power fluctuations affecting power supply and<br />

connectivity<br />

6. ACKNOWLEDGMENTS<br />

Our thanks to ACM SIGCHI for allowing us to modify templates<br />

they had developed.<br />

7. REFERENCES<br />

[1] Nepal Living Standards Survey 2011. Central Bureau of<br />

Statistics, Kathmandu, 2012.<br />

[2] GoN E-Governance Master Plan and ICT Policies, 2011.


ICT-enabled Delivery of Maternal Health Services<br />

ABSTRACT<br />

Fresh opportunities are being created daily for the deployment of<br />

Information and Communication Technologies (ICT) [42]<br />

particularly in the area of poverty alleviation and sustainable<br />

economic growth in developing countries in particular. Therefore,<br />

the adoption of mobile telephones as service and information<br />

delivery tools and platform is expected to foster partnership and<br />

efficiency in improving health through dissemination of health<br />

information and data and supporting communication and<br />

collaboration within the entire health sector.<br />

This paper examines the integration of a sectoral policy and<br />

strategy in the area of health and national ICT Policy in the<br />

developmental context. Specifically, it investigates if a mobiletelephony<br />

based e-Health strategy has proven sustainable,<br />

stimulated acceptance of mobile phone-based health information<br />

or awareness of stakeholders on the benefits of mobile phonebased<br />

health information and services, thus accelerating the pace<br />

of reduction in maternal mortality in Ghana. The analysis<br />

presented in the paper is based on secondary material collected<br />

from government website and data directly obtained from<br />

policymakers and users involved in the initiative.<br />

Categories and Subject Descriptors<br />

Computers and Society, General<br />

General Terms<br />

Human Factors, Public Policy<br />

Keywords<br />

Mobile Phones, ICT4D, e-Governance, Development, Maternal<br />

Mortality, Ghana<br />

1. INTRODUCTION<br />

Nine years ago, the UN General Assembly endorsed the World<br />

Smmit on the Information Society, held in two phases, in Geneva<br />

003 and Tunis 2005. In particular, it encouraged governments, as<br />

part of their implementation of the Tunis Agenda for the<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Johanna E. Awotwi<br />

Centre for e-Governance<br />

P.O. Box MP 270<br />

Mamprobi- Accra, GHANA<br />

+233 (0) 243 408 047<br />

jeawotwi@ghanaceg.org<br />

369<br />

Information Society, to establish before 2010, “ comprehensive,<br />

forward –looking and sustainable national e-strategies, including<br />

ICT strategies and sectoral e-strategies, as integral parts of<br />

national development plans and poverty reduction strategies.”<br />

Responding to this call, most countries have met the WSIS target<br />

of developing national e-strategies by 2010. At least 84% of all<br />

economies have a national e-strategy in place, and at least 14<br />

economies are in the process of developing such a strategy [33].<br />

Ghana met the WSIS target for developing national e-strategies<br />

with, two policies which are driving ICT developments – ICT for<br />

Accelerated Development Policy (ICT4AD) and National<br />

Telecom Policy (NTP). The ICT4AD Policy has the overall<br />

objective of supporting an ICT-led socio-economic development<br />

process aimed at transforming Ghana into a middle income,<br />

information-rich, and knowledge-based society [24]. On the other<br />

hand, says the policy, the goal of the NTP is to establish market<br />

structures that will be most beneficial to Ghana’s citizens and<br />

businesses, and to set in motion the procedures and incentives that<br />

will boost the market’s development.<br />

Efforts have been made to implement some of the strategies<br />

enunciated in these two policy documents [20]. One such<br />

important e-strategy is the Health Sector ICT Policy and Strategy,<br />

2005 which underlining vision is to significantly enhance and<br />

improve all areas of health delivery. The strategy is specifically,<br />

meant to provide quality primary healthcare services that are<br />

affordable, sustainable and meet the needs of patients, by<br />

overcoming geographical barriers through ICTs [24]. For a lowincome<br />

country such as Ghana, the policy is welfare –oriented.<br />

It is instructive to note that ICT4AD Policy (2003) is currently<br />

under review after a review forum in May 2011. New thematic<br />

areas are being added to the policy including cyber security,<br />

climate control and green ICTs, Broadband Strategy and<br />

Geospatial policies [50].<br />

The main objective of this paper is to lay emphasis on integration<br />

of a sectoral policy and strategy on health in the developmental<br />

context; and to investigate if a mobile–telephony based<br />

intervention has proven sustainable, stimulated acceptance or been<br />

able to create awareness on benefits of mobile health information<br />

and services and the consequent impact on maternal mortality and<br />

governance in Ghana. The availability of up-to-date and accurate<br />

information, created and disseminated by ICTs, has decisive<br />

impact on peoples’ lives and on the socioeconomic development<br />

of a country as a whole says [53]. Further, “countries that have<br />

created an enabling environment are experiencing revolutionary<br />

effects especially in the governance, education, health and<br />

business sectors, as its citizens are now more empowered, can<br />

change the equilibrium of power and start creating choices and<br />

opportunities for themselves.” “Yet,” it continued, ‘there are


countries in Africa where people are not able to make informed<br />

decisions on their daily lives because of lack of access to ICTs,<br />

information and knowledge.”<br />

Ghana’s response to the above realities especially in the health<br />

sector is the focus of this paper with the recognition of the<br />

positive potential of mobile phones. The background of this paper<br />

will review ICT integration at both practice and policy levels in<br />

general and investigate attempts by Ghana, to initiate, formulate<br />

and implement national e-strategies with a view to achieving<br />

development goals. Section, 2 will focus on a short history of<br />

ICTs under eHealth. The analysis in this section will be on how<br />

developing countries disadvantaged due to lack of capital and<br />

knowledge of the internet and Information Technology [42] could<br />

carve out solutions which harness ICTs to improve internal<br />

administrations, with the potential for interactions with<br />

stakeholders to attain improved political representation,<br />

institutional effectiveness and economic management. Sections 3<br />

and 4 outline the general framework for analyzing the solutions or<br />

interventions through mobile telephony, with Ghana country data<br />

used, Section 5 dwells on acceptance, sustainability and<br />

acceptance impacts. Section 6 focuses on a review of the results,<br />

their implications, and concludes on possible future research<br />

directions.<br />

2. BACKGROUND<br />

[52] stresses that response to considerable challenges in providing<br />

high quality, affordable and universally accessible care have led to<br />

policymakers, donors and program implementers to search for<br />

innovative approaches, to eliminate the geographical and financial<br />

barriers to health. Consequently, lately, there has been an<br />

increasing interest in the potential of ICTs in resolving these<br />

issues. The use of mobile technology or m-health, a subset of ehealth,<br />

is growing in the low- and – middle income or developing<br />

countries.<br />

There is also the recognition that National e-strategies act as<br />

fundamental preconditions for bridging the digital divide, that is,<br />

the gap between people with access to ICT and those with limited<br />

or no access to them [30]; [36]. Further, e-strategies are believed<br />

to enable socio-economic development. The WSIS outcomes,<br />

according to the ITU, encourage countries to incorporate ICT into<br />

their national development plans and, in the particular case of<br />

lower income economies, to integrate national e-strategies into<br />

their poverty reduction plans. It defines for a better understanding<br />

of the concepts; ‘ICT strategy is a general plan on how to bring a<br />

society and its economy forward through the use of ICT; sectoral<br />

e-strategies, on the other hand, break down the general ICT<br />

strategy into policies for specific sectors, such as health, education<br />

or administration. Sectoral strategies are called “e” for electronic,<br />

followed by the name of the area the strategy applies to, for<br />

instance, e-health, e-learning or e-government. Together, ICT<br />

strategies and sectoral e-strategies constitute national e-strategies,<br />

which is the super-ordinate concept.’ As of April 2010, 163<br />

countries and territories, that is, 85.3 percent of all ITU Member<br />

States, already had a national e-strategy in place, while another 13<br />

countries and territories (6.8%) are currently formulating and<br />

adopting one. Six countries (3.2%) do not have a national estrategy<br />

in place, and the status of ICT strategy formulation in the<br />

remaining 9 economies (4.7%) is unknown, due to lack of<br />

information, the report declares. It is possible, however, that some<br />

of the economies in the latter group have also formulated an ICT<br />

370<br />

strategy or are in the preparatory process. In general, Africa is the<br />

continent with the lowest penetration of ICT, continued [30], as<br />

well as the region where the formulation of ICT strategies has<br />

taken place at the slowest pace. By the first phase of WSIS in<br />

2003, only 17 African countries had developed ICT strategies.<br />

According to a recent ECA survey however, 90 percent of the<br />

African countries consider ICT as their national priority. As<br />

suggested by the ITU, “Several ICT strategies are still lacking a<br />

real strategic approach. Despite the existence of numerous good<br />

practices and innovative and forward-looking strategies, some<br />

plans are merely a collection of initiatives and projects.<br />

Governments, societies and economies would benefit from an<br />

overarching strategic direction and from the formulation of a<br />

long-term vision. Further, sectoral e-strategies should be rooted in<br />

these overarching national e-strategies in order to unleash the full<br />

potential of ICT in each sector, making best use of existing<br />

synergies.” For instance, there should be coherence between a<br />

country’s health sectoral strategy and the National ICT Policy.<br />

The ICT4AD which was approved by the Ghanaian Parliament<br />

and Cabinet in early 2004 fully takes into account the aspirations<br />

and provisions of key socio-economic development framework<br />

documents including: The Vision 2020 Socio-Economic<br />

Development Framework; the Ghana Poverty Reduction Strategy<br />

(GPRS) (2002-2004) and the Co-ordinated Programme for<br />

Economic and Social Development of Ghana [18]. “The e-Health<br />

Strategy means application of the Internet and other related<br />

technologies in the healthcare industry to improve the access,<br />

efficiency, effectiveness and quality of clinical and business<br />

processes utilized by healthcare organizations, practitioners,<br />

patients and consumers to improve the health status of patients”<br />

[8].<br />

Several other governments have developed e-health strategies.<br />

The World Health Organization (WHO) defines e-Health as “...the<br />

use, in the health sector, of digital data - transmitted, stored and<br />

retrieved electronically- in support of health care, both at the local<br />

site and at a distance.” eHealth technologies are essential when<br />

they are integrated into health services that meet basic needs, have<br />

been proven to be cost-efficient and are evidence-based. They are<br />

evidence-based when they meet well-defined specifications and<br />

have been validated through controlled clinical studies or rest on a<br />

widely accepted consensus by experts. Some of the benefits of ehealth<br />

include faster and easier access to medical data; improved<br />

delivery of healthcare services, in particular in rural and remote<br />

areas, and the reduction of costs for healthcare services.<br />

Many ICT strategies include approaches for the adoption of egovernment<br />

which are the most common type of sectoral estrategies.<br />

Many of these sectoral strategies focus on improving<br />

the effectiveness and transparency of public administration<br />

activities by making use of ICT in government-to-government,<br />

government-to-citizen and government-to business. With its ICT<br />

strategies in place, Ghana’s Minister of Communications reported<br />

in October 2011 that, “in 2010, Ghana’s GDP expanded by 5.9%,<br />

with the Services Sector (dominated by ICT) contributing 32.8%<br />

and surpassing traditional agriculture.<br />

The ICT/Telecom industry is therefore playing significant and<br />

vital role in driving wider economic growth across the country<br />

and contributing substantially to the government kitty” [40].


3. E-HEALTH<br />

3.1 ICTs and Health Communication<br />

[26] suggests; there has been abundant anecdotal evidence that<br />

ICTs could be applied to livelihood enhancement and thus directly<br />

address financial poverty, but it was not at all clear that these<br />

applications were reproducible, scalable and sustainable. There<br />

has been significant focus on using ICTs to actually deliver<br />

healthcare (telemedicine) and as a way of educating people on<br />

health issues. Health is vital to development he adds and “the lack<br />

of adequate healthcare is one of the most onerous aspects of<br />

poverty” and in developing countries especially Sub-Saharan<br />

Africa, poverty has deepened the crisis in health-care delivery and<br />

the mass exodus of professionals to the developed world have<br />

further worsened this problem.<br />

The 2008 UN report on progress toward meeting the Millennium<br />

Development Goals (MDGs) indicates continuing dire conditions<br />

in crucial public health areas. Reliable information about the rates<br />

and trends in maternal mortality is essential for resource<br />

mobilization, and for planning and assessment of progress<br />

towards Millennium Development Goal 5 (MDG 5), the target for<br />

which is a 75% reduction in the maternal mortality ratio (MMR)<br />

from 1990 to 2015 [38].<br />

Ghana has an estimated population of 23.48 million accounting<br />

for 2.97% of the African population [62]; 49% of the population<br />

lives in urban areas (regional average 37%). Ghana has relatively<br />

better health system indicators in the region. In 2007, life<br />

expectancy was 57 years (52 years in the WHO African region<br />

and 57 years in low-income countries), maternal mortality ratio<br />

was 560 per 100,000 live births (900 in the region and 650 in low<br />

income countries), infant mortality rate was 73 per 1,000 live<br />

births (88 in the region and 80 in low income countries, antenatal<br />

care (at least 4 visits) coverage was 69% (45% in the region and<br />

38% in low-income countries) and proportion of births attended<br />

by skilled health personnel was 50% (46% in the region and 41%<br />

in low-income countries).<br />

[43] state there are a few concerns though. Ghana’s human<br />

development index (HDI) worsened from 0.563 in 2001 to 0.520<br />

in 2005 [23]. Similarly, infant mortality rate rose from 71 in 2000<br />

to 73 in 2007 [62].<br />

The level of health spending is low at 5.1% of GDP with<br />

household out-of-pocket spending accounting for 51.2% of it says<br />

[56]. It is therefore, worthwhile to find out whether access to<br />

proven and powerful ICTs can improve health indicators which<br />

also happen to be an ongoing debate. Does the process of social<br />

change through ICTs enhance positive health outcomes in low and<br />

middle income countries such as Ghana? A growing number of<br />

people are searching to understand the meaning of empowerment<br />

and ways it can be used to change their settings and lives. Most of<br />

the literature associates empowerment with personal control.<br />

[45] points out that "by empowerment I mean our aim should be<br />

to enhance the possibilities for people to control their own lives."<br />

The Ottawa Charter for Health Promotion notes that "people<br />

cannot achieve their fullest health potential unless they are able<br />

take control of those things which determine their health" [60]. It<br />

is obvious that lack of empowerment leads to poverty which also<br />

has an important informational dimension [19].<br />

371<br />

Poor people often lack access to information that is vital to their<br />

lives and livelihoods, including weather reports, market prices,<br />

healthcare information and income-earning opportunities. Such<br />

lack of information or empowerment, adds to the vulnerability of<br />

the people concerned. Infact, in terms of livelihood strategies,<br />

information plays a dual role: informing and strengthening the<br />

short-term decision-making capacity of the poor themselves, and<br />

informing and strengthening the longer-term decision-making<br />

capacity of intermediaries that facilitate, assist, or represent the<br />

poor. The contribution of ICT to poverty reduction through<br />

enterprise lies in its power to give poor women especially, and<br />

men access to improved information and better communications<br />

to help them build assets for better living conditions [19]. There<br />

has been considerable international discussion about the potential<br />

of ICTs to make major impacts in improving the health and well<br />

being of poor and marginalized populations, combating poverty,<br />

and encouraging sustainable development and governance [63].<br />

Used effectively ICTs have enormous potential as tools to<br />

increase information flows and the dissemination of evidencebased<br />

knowledge, and to empower citizens. However, despite all<br />

its potential, a major challenge is that ICTs have not been widely<br />

used as tools that advance equitable health care access.<br />

A critical mass of professional and community users of ICTs in<br />

health has not yet been reached in developing countries. Many of<br />

the approaches being used are still at a relatively new stage of<br />

implementation, with insufficient studies to establish their<br />

relevance, applicability or cost effectiveness [63]. This makes it<br />

difficult for governments of developing countries to determine<br />

their investment priorities.<br />

The topic of e-government and e-governance has become<br />

increasingly acknowledged over the last few years, and many<br />

governments desire for online services. However developing<br />

countries are disadvantaged due to lack of capital and knowledge<br />

of the internet and Information Technology.<br />

[42], while acknowledging what ICT brings through improved<br />

effectiveness & efficiency in governance, improved customer<br />

satisfaction and enhanced public participation in Government’s<br />

policies / decision and making processes and provision of quality<br />

services; said there are difficulties in bringing components that<br />

make these a reality. Reality involves a clear, well planned and<br />

easy to implement strategy, connectivity infrastructure such as<br />

broadband technologies, database management, and enabling<br />

technologies such as those for pervasive/mobile access amongst<br />

others [4].<br />

E-Governance in an implementation sense is restricted primarily<br />

to the use of computer based internet access to deliver services. In<br />

countries where the penetration of computers and internet is<br />

relatively low, such as in Ghana, there is an apprehension that the<br />

reach of e-Governance may be limited. Such limited reach of e-<br />

Governance has made governments think of new technologies,<br />

such as mobile phones, to reach the residents and to deliver public<br />

services.<br />

The use of mobile phones in healthcare settings can potentially<br />

deliver important benefits, because of their ability to provide and<br />

improve access to communication and information resources [13].<br />

Mobile phones have tremendous potential to expand the access to<br />

and reach of public services in developing economies. The<br />

relevance of mobile platform as a medium for delivery of public


services in Ghana is also evident from the subscriber base of<br />

mobile phones as seen in Chart 1.<br />

The use of mobile and wireless technologies to support the<br />

achievement of health objectives (m-Health) has the potential to<br />

transform the face of health service delivery across the globe and<br />

a powerful combination of factors is driving this change, [13]<br />

stresses. These include rapid advances in mobile technologies and<br />

applications, a rise in new opportunities for the integration of<br />

mobile health into existing eHealth services, and the continued<br />

growth in coverage of mobile cellular networks.<br />

According to the International Telecommunication Union (ITU),<br />

there are now over 5 billion wireless subscribers; over 70% of<br />

them reside in low- and middle income countries. The GSM<br />

Association reports commercial wireless signals cover over 85%<br />

of the world’s population, extending far beyond the reach of the<br />

electrical grid [59].<br />

A multitude of m-Health solutions have emerged over the years in<br />

countries such as Ethiopia, Kenya, Nigeria and South Africa,<br />

which are leading the way in using mobile health services,<br />

according to the Global Observatory for e-Health at the World<br />

Health Organization (WHO). Getachew Sahlu of the WHO<br />

identified the convergence of the following factors as the driving<br />

force behind the current rapid m-Health growth in developing<br />

countries: (1) a record growth of mobile phone users, (2) rapid<br />

expansion of mobile networks, (3) the decline in mobile phone<br />

costs, and (4) the innovation in mobile technology [36].<br />

Mobile connects four times as many people as landline telephony<br />

because of its better reach, convenience, and functionality and its<br />

lower costs [31];[32]. Mobile telephony also surpasses the<br />

landline Internet by more than 3.5 billion users, reports [29],<br />

while driving economic growth and important societal benefits, as<br />

documented in the World Economic Forum’s Global Information<br />

Technology Report 2008–2009: Mobility in a Networked World<br />

and other research.<br />

At the recent Mobile World Congress held this year in Barcelona,<br />

Mr. H. Toure, Secretary-General of ITU confirmed, ‘Over the past<br />

twenty years or so we have seen an extraordinary transition from a<br />

world where most people did not have access to even basic<br />

telecommunications, to a world where we have six billion mobile<br />

cellular subscriptions, and where 2.3 billion people use the<br />

Internet. The key to this extraordinary communications miracle,<br />

he added, has of course been mobile, which has conquered the<br />

globe and brought ICTs within reach of virtually all of the world’s<br />

people [51].<br />

Mobile health solutions—whether used to automate electronic<br />

health records or treat chronic diseases—enable governments to<br />

more easily, quickly, and cost-effectively bring the benefits<br />

associated with access to comprehensive healthcare services to<br />

their citizens. Mobile remote monitoring devices and services that<br />

transmit information about the condition of patients and<br />

applications that remind patients when to take their medications<br />

will allow many more people to lead healthier, more independent<br />

lives[15]. Accordingly, a recent Juniper Research study forecasted<br />

remote patient monitoring using mobile networks to be a US$1.9<br />

billion market by 2013 [35].<br />

Table 1. Justifying mHealth<br />

372<br />

CHALLENGES EXPLANATION<br />

Infrastructure Absence of electricity in rural areas<br />

and low bandwidth<br />

Cultural attitudes Superstitions due to illiteracy<br />

Sustainability Lack of financial capability after<br />

initial donor assistance. Therefore,<br />

inability to afford technology<br />

upgrades<br />

Environmental Dusty regions affect equipment<br />

Human Resource Lack of ICT skilled personnel<br />

(Author)<br />

m-Health represents a cost-effective technology solution to many<br />

of these challenges if implemented correctly and brought to scale.<br />

The costs of mobile handsets and usage are declining as demand<br />

for mobile services increases and mobile networks are being<br />

rapidly expanded [36]. The use of mobile phones has been noted<br />

in the area of prevention and monitoring for pregnant women, to<br />

reduce infant and maternal mortality through treatment, and<br />

provide post-natal follow-up healthcare support [34].<br />

The discipline of m-Health has been gaining ground as mobile<br />

device penetration rates grow rapidly, increasingly prompted by<br />

plunging hardware and usage costs, as developing world<br />

consumers adopt this accessible communication technology<br />

[16];[28];[47];[27]. Case studies have been recorded in the<br />

instances of using Short Message Service (SMS) for HIV/AIDS<br />

prevention and control, and for treatment of tuberculosis in South<br />

Africa [46]; consultation services and dissemination of critical<br />

health information in rural communities in India [48]; [5]; and<br />

using Personal Digital Assistants (PDAs) to collect data and teach<br />

medical students in Ghana and Uganda respectively 12].<br />

4. GHANA-CASE STUDY<br />

4.1 E-Health in Ghana context<br />

[49] state, “similar to Rwanda, Kenya and Ghana, in 93rd and<br />

97th position, respectively, suffer from low levels of ICT<br />

readiness due to the underdevelopment of ICT infrastructure and<br />

the lack of a widespread skill base that would enable society to<br />

make an optimal use of technology.<br />

However, according to [2], the services sector in Ghana recorded<br />

a 6.1% growth in 2010 compared with 5.9% in 2009. Financial<br />

services and expansion in the telecommunications industry<br />

continued to spearhead growth of the sector in 2010. The<br />

telecommunications sub-sector expanded by 10.8% in 2010<br />

raising total telephone access lines to about 17 million in 2010<br />

from 15.2 million in 2009. In 2010 Ghana achieved telephone<br />

penetration rate of nearly 74%, with mobile telephony accounting<br />

for about 98% of the total access lines. As at July 2011 the total<br />

telephone subscriptions in Ghana stood at 19,805,896 yielding a<br />

tele-density of 80.2%.<br />

This chart is distributed by Market Share as follows:-


Chart 1 [40] GHANA – Total Telephone Subscription<br />

The growth in penetration and use of mobile phones presents<br />

unprecedented opportunities to communicate with rural audiences,<br />

and may soon be the largest media opportunity in rural Ghana,<br />

especially for enhancing healthcare delivery.<br />

[50] informed in personal communication with the author that “as<br />

at the last count on March 2nd, 2012 the National Communication<br />

Authority (NCA) had registered over 25 million SIM cards and<br />

assuming 20 percent double or triple SIM registrations, we are<br />

likely to have over 80% of Ghanaians owning phones including<br />

citizens in the rural areas. This phenomenon has obviously made<br />

communication across the country very efficient and brought great<br />

relief to rural folks,” he added.<br />

Ghana’s health sector reforms were guided by five principles:<br />

integration, decentralization, partnerships, ownership, and<br />

common financing. During the process of decentralization,<br />

decision making authority and management of health care services<br />

was transferred from the national level to the regional and district<br />

levels [23]. With the unprecedented opportunities offered by<br />

mobile phones to communicate with rural audiences, Ghana’s<br />

Health Sector reforms made room for the maximum use of ICTs.<br />

The Ghana Health Service (GHS) intends to coordinate and<br />

mainstream all m-Health projects in Ghana to derive the<br />

maximum benefit for the people, ensure sustainability and<br />

ownership after the pilots by the current implementing<br />

organizations for the project to survive beyond the donor-funded<br />

period.<br />

4.1.1 Health Sector Strategies in Ghana<br />

Poor people often lack access to services, because of physical and<br />

financial barriers, lack of information, unavailability of care, and<br />

other factors [9].<br />

[14] adds, “Although developed-world newsflashes tell us that<br />

the whole world is “wired” and that people in the farthest reaches<br />

globally are able to surf the ’net, the reality is that the poorest of<br />

the poor do not have access to even the most basic of health<br />

information.<br />

A recent analysis showed that young women from the poorest<br />

households in 12 low and middle income countries were more<br />

likely to enter in early marriages, to have given birth at an early<br />

age, and to be less likely to be using maternal health services [54].<br />

It must be noted that the response to exploitation of ICTs in the<br />

health sector in Ghana has been only modest, what with continued<br />

low bandwidth problems causing a digital divide between the<br />

health headquarters in the capital and the various regions. The<br />

promise of mobile technology is what could speed up the<br />

transformation process- recognized by that part of the sector ICT<br />

373<br />

Policy and Strategy’s plan of work which states the wish to,”<br />

improve efficiency of health delivery by improving both<br />

management and technical efficiency of the sector through<br />

reliable information dissemination systems and by supporting the<br />

decision –making process through the prompt availability of<br />

information for all decision-makers” [24].<br />

The Mobile Technology for Community Health (MoTeCH)<br />

initiative recognized Ghana Government’s desire according to its<br />

ICT Policy to, “improve ICT infrastructure in the health sector by<br />

networking all health facilities and by providing adequate ICT<br />

tools and service delivery management.’’, albeit on a smaller pilot<br />

scale as a beginning. In 2007, strategies and priorities were<br />

articulated [21] within the context of Government’s development<br />

agenda as spelt out in the GPRS and of the three priority areas for<br />

transforming Ghana into a Middle Income Country by 2015<br />

include, Private Sector Development, Good Governance and<br />

Human Resource Development. The Ghana Reproductive Health<br />

Strategic Plan (2007-2011) includes six high-level objectives<br />

under its Safe Motherhood Policy, the first of which is to “reduce<br />

maternal morbidity and mortality.”<br />

In the author’s consultation with Ghana’s Head of Monitoring and<br />

Evaluation Department of the Ministry of Health Dr. A. Ofosu, he<br />

emphasized that ‘the use of mobile devices in the health sector in<br />

Ghana, has been increasing over the past five years. There are<br />

various pilot projects in Ghana where mobile devices are being<br />

used to; collect health data, facilitate Telemedicine, provide health<br />

messages to clients, follow-up children and women to reduce<br />

drop-out from service, manage logistics to reduce stock-outs,<br />

conduct Health Surveys and conduct facilitative supervision.’<br />

The mobile devices in use range from Pocket digital Assistants to<br />

simple phones and smart phones. Some of the initial pilots, using<br />

mobile devices, used pocket digital assistants, due to the low<br />

telephone network coverage. With the increase in availability of<br />

mobile communication service providers, phones of varying<br />

complexity have become the choice tool for use in various fields<br />

in health. Mobile technology holds immense potential for<br />

addressing health delivery bottlenecks. Indeed mobile devices will<br />

become as important as the stethoscope in the years ahead, Dr.<br />

Ofosu added.<br />

4.1.1.1 The Mobile Technologies for Community<br />

Health (MoTeCH) Initiative<br />

Improved maternal health, as is well known, is a major indicator<br />

for development and global initiatives to intensify policy<br />

intervention for maternal mortality began with the Safe<br />

Motherhood Initiative in 1987, a response to growing recognition<br />

that primary health-care programmes in many developing<br />

countries were not adequately focused on maternal health [10]. In<br />

an article by Rosemary Ardayfio titled ‘Improved Maternal<br />

Health. An Indicator of Development,’ reference was made to<br />

health delivery in the Northern Region ‘which is beset with<br />

several challenges including poor road networks, lack of<br />

electricity and inadequate community health workers’ [3].<br />

[1] in a paper, also discussing obstacles challenging maternal<br />

health in Ghana, listed them as limited geographical access by<br />

some clients, limited human resources; ageing midwives, and their<br />

numbers, inadequate funding, inadequate collaboration among


Ministries, Departments and Agencies (MDAs) and between<br />

MDAs and the Private sector, Socio-economic challenges, Lower<br />

literacy rate among females leading to low empowerment level,<br />

high poverty levels and poor health-seeking behaviours. Low risk<br />

perception. Service availability is also low and where available<br />

utilization is generally low especially in the rural and peri-urban<br />

areas, not forgetting harmful traditional practices.<br />

When ICTs are integrated into donor strategies implementation of<br />

programmes in developing countries produce effective results; the<br />

degree of corruption is reduced and democracy heightened.<br />

Within this context, the Ghana MoTeCH initiative which begun<br />

May 2010, aims to determine whether mobile phones can be an<br />

effective tool in managing healthcare data and transmitting health<br />

information to remote populations, with the ultimate goal of<br />

empowering rural folks by improving maternal and child health<br />

outcomes in rural Ghana. The project is led by the Ghana Health<br />

Services, in partnership with Columbia University’s Mailman<br />

School of Public Health and the Grameen Foundation. It is funded<br />

by the Bill and Melinda Gates Foundation. MoTeCH is currently<br />

in its pilot phase, with plans to expand throughout Ghana in the<br />

future. The Upper East is one of the smallest and least urbanized<br />

regions in Ghana, with 85 percent of the population living in<br />

dispersed communities throughout the rural areas [58].<br />

The low population density and infrastructure barriers create a<br />

challenge for health care delivery, necessitating a communitybased<br />

approach. Over the past decade or so, Ghana has been<br />

operating its Community Health Planning and Services (CHPS)<br />

program, which utilizes traditional institutions and social<br />

networks with support from outreach nurses employed by the<br />

Ministry of Health to reach as many people in the rural areas as<br />

possible. It is on these CHPS centers and the nurses who work<br />

there, in particular, that MoTeCH focuses its efforts [[58] informs.<br />

The local communities’ aspect of the project investigates the<br />

question, “Can mobile phones be utilized to meaningfully answer<br />

questions and provide information to individuals in impoverished<br />

rural communities in a way that promotes better health<br />

practices[11];[6] evaluates the project as designed to answer<br />

policy questions regarding possible health service benefits of<br />

information technology. It is expected to build upon the promising<br />

healthcare reform efforts underway in Ghana by examining the<br />

feasibility of utilizing mobile phone technology for reforming<br />

routine health information operations and improving community<br />

healthcare worker efficiency and health service effectiveness. The<br />

project is working toward this goal by: reviewing existing health<br />

information systems and assessing community health service<br />

information needs, designing standardized registers for client<br />

information for community-based nurses; developing a<br />

community service delivery system for testing mobile phonebased<br />

information systems for improving maternal, newborn, and<br />

early childhood care; developing the district health management<br />

system software needed to accommodate mobile phonetransmitted<br />

service information; eavaluating the impact of mobile<br />

phone technology introduction on health service volume and<br />

delivery, and disseminating lessons learned about mobile phone<br />

applications to key stakeholders, policy makers, and health system<br />

managers so that, if effective, this type of data gathering can be<br />

replicated in similar settings [7].<br />

374<br />

Figure 1. Main Flows of Client and Reporting for MoTeCH<br />

Information Source: (Grameen Foundation, March, 2011)<br />

Figure 2. MoTeCH Impact (Author)<br />

are increasingly using mobile phones to create new livelihoods to<br />

enhance their lifestyles, while governments are using them to<br />

improve service delivery and citizen feedback mechanisms<br />

5. IMPACT ASSESSMENT<br />

5.1 Acceptance<br />

Mobile phones, are opening up a powerful new avenue of<br />

ommunication and information‐sharing for the population, and a<br />

alberg Global Development Advisors study, commissioned by the<br />

UN Foundation and Vodafone Foundation Technology<br />

Partnership notes that monitoring and evaluation efforts can face<br />

critical challenges in the short term, particularly with limited<br />

budgets to fund such activities such as the MoTeCH initiative<br />

[55]. As mHealth applications improve the process of data<br />

collection and the incorporation of data into decision making, will<br />

provide a foundation upon which to conduct long-term impact<br />

evaluations.<br />

In the MoTeCH context, one could safely say the target<br />

population has developed the capabilities for effective use of the<br />

mobile phone since the women feel less afraid and are more<br />

confident because the information conveyed is coming from<br />

health professionals. The messages are also helping them to


change their behaviour, improve their diet, seek care when they<br />

need it, and convince their husbands and families that many<br />

traditional beliefs and practices may not be good for the mother or<br />

baby [25].<br />

Nurses meanwhile are reporting that women are indeed coming to<br />

the health facility because of information received through the<br />

mobile phone. Additionally, the time that nurses save in not<br />

having to aggregate their monthly data returns manually, due to<br />

the electronic reports MoTeCH generates, means significantly<br />

more time can be spent on patient care. Efficiency and<br />

effectiveness are illustrated here.<br />

The Upper East Regional Director of Health Services, Dr Koku<br />

Awoonor-Williams, has said MoTeCH has improved health care<br />

delivery after its inception in some districts in the region There<br />

are improvements in deliveries from 45 percent to 52 percent and<br />

postnatal registrants from 26.9 percent to 63 percent [6]. This<br />

makes it possible to assert that MoTeCH has empowered pregnant<br />

women and new mothers to make the right choices concerning<br />

their conditions or even protected their human rights.<br />

5.2 Sustainability<br />

[28], in focusing on sustainable mobile Health or m-Health in<br />

developing countries, has noted that Health projects are far more<br />

likely to be sustainable in cases where buy-in from governmental<br />

or public bodies is secured. In this way, the project is<br />

institutionalized into existing government health programs and<br />

can receive budget attention. It is very important that a mobile<br />

Health project have the support of government. Ghana has done<br />

this through its Health Sector reforms which have made room for<br />

the maximum use of ICTs. The majority of m-Health projects are<br />

currently funded by international agencies or corporate social<br />

responsibility (CSR) initiatives of companies. For every m-Health<br />

project, therefore, it is critical to ensure that the program is<br />

aligned with the strategic goals of the national health system.<br />

Even though health sector funding has gradually increased over<br />

the years, the percentage that goes into actual service delivery<br />

remains low. About 90% of the health sector budget is spent on<br />

salaries and wages; since 2006 the share allocated to capital<br />

spending has dropped [41] continued. Current policy<br />

environments, business models and funding schemes around m-<br />

Health have fuelled the proliferation of pilot projects without<br />

enabling them to scale up in a meaningful, replicable way. An<br />

additional, and perhaps most significant, obstacle to improving<br />

and scaling the implementation of m-Health initiatives is the lack<br />

of monitoring and evaluation (M&E) and use of meaningful,<br />

consistent indicators and rigorous evaluation methods [36]<br />

laments. Additionally, [39] point out, “to overcome these<br />

obstacles around cost, access, and standards, healthcare systems<br />

must be highly innovative and inventive in their approach to<br />

delivering services. One way is to leverage the experience of other<br />

sectors that have used technology to improve their processes’ To<br />

avoid implementations such as MoTeCH being seen as a<br />

temporary project, visible ownership by the local implementation<br />

partner needs to be built in from the outset. Involvement of the<br />

375<br />

local partner needs to be not only in decision-making at the top<br />

but also in day-to-day management in the field [25].<br />

While these have been possible with the project, there is the need<br />

to step up future plans and actions of participants which could be<br />

used to customize future like-minded programs. As is well known,<br />

mobile phone usage in whatever field whether agriculture,<br />

banking and so on, derive from livelihood needs.<br />

The MoTeCH initiative recognized Ghana Government’s desire<br />

to, “improve ICT infrastructure in the health sector by networking<br />

all health facilities and by providing adequate ICT tools and<br />

service delivery management’’[24].<br />

The subject of long term sustainability is however in doubt. [25]<br />

believes that for MoTeCH system to survive beyond the life of the<br />

grant, ‘A broader country strategy for m-Health will help with<br />

sustainability.’<br />

This means if the Ministry of Health and Ghana Health Service<br />

could develop a comprehensive strategy for how m-Health will be<br />

approached, it should facilitate NGOs and other stakeholders<br />

coming together to design programs that fit together; a measure<br />

for continuous evaluation of systems, as one passes through<br />

various stages of implementation. Its framework too, can be tested<br />

on real or simulated environment to prove its worthiness the<br />

Foundation emphasizes.<br />

5.3 Awareness<br />

By mobilizing supply and demand, MoTeCH manages to deploy<br />

important and relevant messages to the target population.<br />

Community Health Workers (CHOs) transmit information<br />

obtained through the mobile phone to the patient database which<br />

in turn gets automatic reporting to the Ghana Health Service.<br />

Alerts and reminders are sent to CHO from patient database which<br />

facilitate scheduling of home visits in communities, ensure that<br />

services to pregnant women are provided in a timely manner.<br />

These include reminders on vaccinations for children. These<br />

reminders serve as awareness channels for the target population.<br />

There is broad agreement therefore, that access to communication<br />

is one of several essential components to enhance improvement in<br />

maternal health services. Here, the use of mobile phones has much<br />

potential. However, there is a need for robust evidence on<br />

constraints and impacts, especially when financial and human<br />

resources will be invested say [37].<br />

5.4 Implications of Mobile Phone Usage<br />

This paper believes in the suggestion that human capital is created<br />

by changing persons so as to give them skills and capabilities that<br />

make them able to act in new and improved ways. Development<br />

of the capabilities for effective use of a mobile phone also leads to<br />

enhancement of social capital or empowerment as noted<br />

elsewhere in this paper. Malcolm Gladwell said “poverty is not<br />

deprivation. It is isolation.” Often the “smallest technological<br />

advances create the largest social impacts” [22].<br />

Communication is important and universal and this paper affirms<br />

that mobile technology helps provide a cure against the isolation.<br />

6. DISCUSSION<br />

While the benefits are undeniable, mobility comes at its own<br />

price. It is imperative to plan extensively before deployment and


continue monitoring after implementation to prevent issues and<br />

maintain an optimal user experience. The benefits of mobile<br />

technology, combined with the improvement that mobile phones<br />

offer over PDA's in terms of data loss and uploading difficulties,<br />

make mobile phones a feasible method of data collection that<br />

needs to be further explored. Mobile-phone based technology for<br />

health is an emerging field in addressing health problems in the<br />

developing world declares [14], but it is imperative to note that<br />

most of the world –wide initiatives are disease specific and<br />

importantly, they are not integrated into health strategies, as<br />

Ghana is doing. Without integration into national ICT Policies,<br />

inefficiencies in this m-Health system remain unaddressed. For<br />

example, MoTeCH would have failed if PDAs and smart phones<br />

were used because they are expensive; this obviously makes<br />

impact of these initiatives more often than not “methodologically<br />

unsound”. MoTeCH is not disease-specific. Its focus is to improve<br />

access to a broad range of essential health services with special<br />

emphasis on pregnant women and infants.<br />

eHealth technologies according to [61] are essential when they are<br />

firstly, integrated into health services that meet basic needs,<br />

secondly, have been proven to be cost-efficient and also, when<br />

they meet well-defined specifications and have been validated<br />

through controlled clinical studies or rest on a widely accepted<br />

consensus by experts.<br />

The Head of Monitoring and Evaluation of the Ministry of Health<br />

in Ghana Dr Ofosu has admitted, during the author’s<br />

consultations, that the MoTeCH innovation was possible because<br />

of a mixture of factors including the significant health gaps,<br />

targeted private and public funding, and most important of all, the<br />

flourishing mobile markets. With the use of Mobile phones it is<br />

easy to track health outcomes and deviations may improve the<br />

healthcare system's ability to assess population health. Similarly,<br />

mobile applications could be used to track health trends as an<br />

early indicator of emerging health issues.<br />

On the question of trends that have developed as a result of the<br />

use of mobile technology, Dr. Ofosu mentioned that, the effect<br />

has been ‘huge’ in his words, ‘increase demand for services that<br />

makes service adjust to accommodate the increase contributes to<br />

improvement in quality of care.’ In other words, there is improved<br />

access to data for generating information for decision making.<br />

This definitely leads to an improvement in post-treatment<br />

understanding. Mobile technology gives pregnant women and the<br />

Community Health workers, a convenient medium to monitor ante<br />

and post natal instructions and double check prescriptions.<br />

Medication accuracy, a huge patient safety issue, could improve<br />

as a result. One can therefore, safely assume that MoTeCH mainly<br />

addresses information gap in pregnant women and the population<br />

- a way to advance the use of mobile telephony to support the<br />

achievement of the Millennium Development Goals for health.<br />

Research has revealed the beneficial outcome of savings of<br />

transportation costs, time and also the ability to reallocate the<br />

saved income from travel to other important activities. Overall,<br />

however, there is lack of empirical data and research concerning<br />

how the poor absorb the costs of mobile phones, and uncertainty<br />

about possible negative outcomes associated with the reallocation<br />

of cash resources such as between male and female household<br />

members [17]. Evaluation is part of a process that can determine<br />

cost-effectiveness, and involves educating the public about the<br />

benefits of m-Health, and leads to government policy – all of<br />

which were reported as among the most important barriers to m-<br />

376<br />

Health adoption by Member States [59]. Despite the need for<br />

evaluation, a survey found that results-based evaluation of m-<br />

Health implementations is not routinely conducted. Only 12% of<br />

Member States reported evaluating m-Health services. This may<br />

be because short term challenges of limited funding are faced by<br />

the implementing agencies. m-Health applications improve the<br />

process of data collection and the incorporation of data into<br />

decision making, Thus providing a foundation upon which to<br />

conduct long-term impact evaluations [57]. The use of mobile<br />

phones in the health sector as confirmed by [33] and, necessarily<br />

leads to; quick, timely high quality affordable healthcare for all,<br />

everywhere, at any time; overcomes shortage of healthcare staff<br />

and funding and optimization of patient care; Enhances preventive<br />

care; Protects human rights; and educates and thus empowers<br />

citizens, and so on.<br />

7. CONCLUSIONS<br />

Currently, there has been a proliferation of multiple approaches to<br />

thinking about health systems and there are many ways in which<br />

the term “health system strengthening” is used [37]. The<br />

penetration of mobile phone networks in many low- and middleincome<br />

countries surpasses other infrastructure such as paved<br />

roads and electricity, and dwarfs fixed Internet deployment. The<br />

growing sophistication of these networks – offering higher and<br />

higher speeds of data transmission alongside cheaper and more<br />

powerful handsets – are transforming the way health services and<br />

information are accessed, delivered, and managed. With increased<br />

accessibility comes the possibility of greater personalization and<br />

citizen-focused public health and medical care [59].<br />

Universally speaking, cellular technology has six main intrinsic<br />

features appropriate for its adoption in developing countries: low<br />

infrastructure investment, ease of use, low energy consumption,<br />

affordability of services and devices, surpassing unfavorable<br />

geographic structures and less vulnerability to vandalism and<br />

natural disasters than other technologies. With a myriad of<br />

obstacles preventing low-income countries from increasing their<br />

ICT uptake, this paper shows that Ghana’s MoTeCH project is<br />

truly cutting-edge. It fills critical knowledge gaps about the<br />

feasibility of using mobile phone technology to improve routine<br />

maternal health information operations, and demonstrates the<br />

possibility of using information systems as a tool to deliver<br />

community healthcare more efficiently and effectively [7].<br />

However, still in its infancy, mHealth runs the risk of not realizing<br />

full potential due to small‐scale implementations and pilot<br />

projects with limited reach. [37] has insisted in research work on<br />

the topic with others. The Ghana Health Service admits that little<br />

research has been done on the feasibility of utilizing mobile phone<br />

technology for reforming routine health information operations<br />

and improving community health care worker efficiency and<br />

health service effectiveness. Also, few studies have investigated<br />

the use of mobile phones as a data collection tool in low income<br />

countries. [46] suggests; with the increasing application of ICT<br />

and e-networks within countries, the concept of e-governance has<br />

arisen. E-governance deals with the whole spectrum of the<br />

relationships and networks within government that involve the use<br />

and application of ICTs as shown in Chart 1 of the MoTeCH<br />

initiative. Similarly, the advent of global ICT networks and<br />

globalization is challenging these recent concepts, and global ehealth<br />

governance is emerging as a major issue, Scott continued.<br />

A concluding question for future research is how to control


activities such as the MoTeCH partnership (health related and<br />

otherwise) that increasingly reside in the hands of globally<br />

distributed entities.<br />

8. REFERENCES<br />

[1] Aboagye, D. (2005). Achieving MDGs 4 & 5. WHO.<br />

[2] African Economic Outlook. (2011). Ghana. AfDB, OECD,<br />

UNDP, UNECA.<br />

[3] Ardayfio, R. (2012, March 26th). Improved Maternal Health.<br />

Major indicator of development. Daily Graphic , p. 11.<br />

[4] Arora, S. Strategies in e-Governance.<br />

http://www.mgsipap.org/egov-conference.<br />

[5] Asheeta Bhavnani, R. W.-W. (June, 2008). The role of<br />

Mobile Phones in Sustainable Rural Poverty Reduction .<br />

Washington, DC: UN ICT Policy Division (GICT).<br />

[6] Awoonor-Williams, D. J. (2012). MoTeCH - Population and<br />

Family Health. NY: Colombia University.<br />

[7] Awoonor-Williams, J. K. (2012). Mobile Technology for<br />

Community Health. Population and Family Health .<br />

[8] Boateng, V. (2009). E-Government and e-Health Strategies.<br />

ECOSOC Africa Regional Ministerial Meeting on e-Health :<br />

E-Government and E-Health Strategies. Accra: ECOSOC.<br />

[9] Bos, E. (2008). Improving Maternal Health:The need to<br />

focus on reaching the poor. The World Bank.<br />

[10] Campbell, O. M. What Are Maternal Health Policies in<br />

Developing Countries and Who Drives Them? A Review of<br />

the Last Half-century. London: UK DID -JSI Europe.<br />

[11] Center, D. P. (August 2009). MOTECH: m-Health<br />

Ethnography Report. Grameen Foundation.<br />

[12] Chetley, A. (2006). Improving Health, Connecting people:<br />

the role of ICTs in the health sector of developing countries.<br />

INFODEV.<br />

[13] Chib, A. (20-21 May, 2009). The Aceh Besar Midwives with<br />

Mobile Phones Program: Design and Evaluation Perspectives<br />

using the Information and Communication Technologies for<br />

Healthcare Model. Pre-conference workshop at the<br />

International Communication Association (ICA)<br />

Conference“Mobile 2.0: Beyond Voice?”. Chicago, Illinois:<br />

International Communication Association (ICA).<br />

[14] Columbia University Mailman School of Public Health.<br />

Ghana Health Service. Grameen Foundation. (n.d.).<br />

MoTeCH: A Comprehensive Overview. Mobile Technology<br />

for Community Health .<br />

[15] Davidson, W. B. (2012). The GIT Report- Mobile<br />

Broadband:Redefining Internet Access and Empowering<br />

Individuals. GENEVA: WEF/INSEAD.<br />

[16] Donner, J. (7-8 June 2004). Innovations in Mobile-Based<br />

Public Health Information Systems in the Developing<br />

World:An example from Rwanda. Mobile Technologies and<br />

Health: Benefits and Risks. Udine (Italy): The Center for<br />

Global Health and Economic Development The Mailman<br />

School of Public Health The Earth Institute at Columbia<br />

University.<br />

377<br />

[17] Duncombe, R. (2012). Understanding Mobile Phone Imact<br />

on Livlihoods in Developing Countries: A New Research<br />

Framework. Manchester: University of Manchester.<br />

[18] Dzidonu, P. C. (2005). Ministerial ICT Policy- Opening<br />

statement. Accra, Ghana: Ministry of Communications -<br />

Government of Ghana.<br />

[19] Fredriksson, T. (2010). The Growing Possibilities of<br />

Information and Communication Technologies for Reducing<br />

Poverty. Geneva: The Global Information Technology<br />

Report 2010–2011 © 2011 World Economic Forum.<br />

[20] Frempong, G. (2010). Ghana ICT Sector Performance<br />

Review Performance Review.2009/2010 . Towards Evidence<br />

-based ICT Policy and Regulation. ResearchICTAfrica.net ,<br />

Volume 2 Policy Paper 8.<br />

[21] Ghana Health Service. (May 2009). Ghana Maternal Health<br />

Survey 2007. Accra: Ghana Statistical Service,Ghana Health<br />

Service,Macro International Inc.<br />

[22] Gladwell, M. (2009). The Tipping Point. Social Implications<br />

of Mobile Technology in Developing Worlds .<br />

[24] GoG. (2007). National health policy: Creating wealth<br />

through health. Accra: Government of Ghana- MInistry of<br />

Health.<br />

[25] Government of Ghana. (2005). Ghana ICT4AD Policy.<br />

Retrieved April 6th, 2012, from<br />

http://www.ict.gov.gh/pdf/Ghana%20ICT4AD%20Policy.pdf<br />

[26] Grameen Foundation. (March, 2011). Mobile Technology for<br />

Community Health in Ghana- Early Lessons Learned.<br />

Grameen Foundation.<br />

[27] Greenberg, A. (2005). ICTs for Poverty Alleviation:Basic<br />

Tool and Enabling Sector. Montreal: SIDA.<br />

[28] Harry McConnell, w. P. (2008). Leapfrog technologies for<br />

health and development . Global Forum Update on Research<br />

for Health Volume 5- Technological Innovations.<br />

[29] Iluyemi, A. (2007). Mobile eHealth for health workers in<br />

developing countires:impacts on organisational process, and<br />

users' behaviour-Research in progress. Portsmouth, UK:<br />

University of Portsmouth.<br />

[30] Internet World Statistics. (2001-2012, April 1). Internet<br />

World Stats- Usage and Poulation Statistics. Retrieved April<br />

7th, 2012, from Internet World Stats.<br />

[31] ITU. (2010). National e-Strategies for Development. Global<br />

Status and Perspectives 2010. GENEVA: ITU.<br />

[32] ITU. (2012). Report of the Partnership on Measuring<br />

Information and Communication Technology for<br />

Development. UNSTATS.<br />

[33] ITU. (2011). The World in 2011-ICT Facts and Figures.<br />

Geneva: ITU.<br />

[34] ITU-D. (2010). Mobile eHealth Solutions for Developing<br />

Countries- qUESTION 14 2-2. Geneva: ITU.<br />

[35] Jayanthy Maniam, C. C. (2007). Mobile Phone based<br />

Pregnancy Support System . Washington DC USA: UNPAN.


[36] Juniper Research. (2011, April 13). The Mobile Healthcare<br />

Opportunity-Monitoring, Applications & mHealth Strategies<br />

2010 - 2014. Juniper Research Reports , p. 83 pages.<br />

[37] Lemaire, J. (December 2011). Scaling up Mobile<br />

health:Elements necessary for the successful scale up of<br />

mHealth in developing countries. Advanced Development<br />

for Africa.<br />

[38] Marchal B, C. A. (2009). Global Health Actors Claim To<br />

Support Health System. PLoS Medicine Volume 6 | Issue 4,.<br />

[39] Margaret C Hogan, K. J. (April 12, 2010). Maternal mortality<br />

for 181 countries, 1980–2008:. The Lancet .<br />

[40] McKinsey and Company and GSMA. (2010). mHealth a new<br />

vision for healthcare. London, Milan and Gurgaon Haryana:<br />

United Nations Foundation.<br />

[41] NCA- Ghana. (2011, October). Broadband Wireless Access<br />

(BWA)Licences in the 2500MHz – 2690MHz Band. Accra,<br />

Ghana.<br />

[43] OAU. (2001). Abuja Declaration on HIV/AIDS,Tuberculosis<br />

and other Related Infectious Diseases. African Summit on<br />

HIV/AIDS, Tuberculosis and other Related Infectious<br />

Diseases (pp. 1-8). Abuja: OAU.<br />

[44] OECD. (2003). Integrating Information and Communication<br />

Technologies in Development Programmes. OECD Policy<br />

Brief .<br />

[45] Osei, D. A. (2007). Implementation of the National Health<br />

Insurance Scheme (NHIS) in Ghana: experience sharing.<br />

Cape Town.<br />

[46] Rappaport, J. (1985). The power of empowerment language.<br />

Social Policy, 16(2), , 15-21.<br />

[47] Rifat A. Atun, S. R. (2005). Uses and Benefits of SMS in<br />

Healthcare Delivery. Centre for Health Management, Tanaka<br />

Business School. Imperial College London , V21.1.<br />

[48] Scott, R. E. (2009). Global e-health policy: from concept to<br />

strategy. canada: IDRC.<br />

[49] Sheila Kinkade, K. V. (2008). Wireless Technology for<br />

Social Change:Trends in Mobile Use by NGOs. Washington,<br />

DC / Newbury, UK: United Nations Foundation: Vodafone<br />

Group Foundation.<br />

[50] Singh, B. a. (2007).<br />

[52] Soumitra Dutta, B. B.-O. (2012). The GITREPORT 2012-The<br />

Networked Index 2012. GENEVA: WEF/INSEAD.<br />

[53] Tevie, M. W. (2012, February 12). Director-Generalof<br />

National IT Authority (NITA). (J. E. Awotwi, Interviewer)<br />

378<br />

[54] Touré, D. H. (2012). Mobile Broadband Vision and The<br />

Broadband Commission. Mobile World Congress (MWC<br />

2012)-Government Mobile Forum . Barcelona, Spain: ITU.<br />

[55] Trevor Lewis, C. S. (2012). E-Health in Low-and-middle -<br />

income countries:findings from the Center for Health Market<br />

Innovations. Bull World Health Organization , 332-340.<br />

[56] UNESC & ECA. (2003). Report on e-Strategies in<br />

Africa:National, Sectoral and Regional ICT Policies, Plans<br />

and Strategies. Addis Ababa, Ethiopia: UN Economic and<br />

Social Council and Economic Commission of Africa.<br />

[57] UNFPA. (2009). UNFPA's Contribution To The Joint UN<br />

Accelerated Support to Countries in Maternal and Newborn<br />

Health. UNFPA.<br />

[58] United Nations Foundation & Vodafone Foundation<br />

Technology Partnership. (2011, February). Health<br />

Informationas Healthcare - The Roleof Mobiles in unlocking<br />

Health Data and WellnessS. Washington,D.C.: United<br />

Nations Foundation & Vodafone Foundation Technology<br />

Partnership.<br />

[59] Varatharajan Durairaj, S. D. (2010). Ghana's Approach to<br />

Social Health Protection-World Health Report<br />

(2010).Background Paper, 2. Geneva: WHO.<br />

[60] Vital Wave Consulting. (2009). mHealth for Development-<br />

The Opportunity of Mobile Technology for Healthcare in the<br />

Developing World. Washington D.C. USA and Newbury,<br />

Berkshire, UK: United Nations Foundation and Vodafone<br />

Foundation.<br />

[61] Weinstein, J. (2011, June Wednesday 8th). MoTeCH's<br />

Mobile Apps Bridging Rural Gap for Pregnant Women.<br />

Retrieved April Saturday 7th, 2012, from NextBillion.net.<br />

[62] WHO. (2011). mHealth- New Horizons for health through<br />

mobile technologies. Global Observatory for eHealth Series ,<br />

Volume 3.<br />

[63] WHO. (1986). Ottawa Charter for Health Promotion.<br />

International Conference on Health Promotion. Ottawa:<br />

Health and Welfare Canada, Canadian Public Health<br />

organization.<br />

[64] WHO. (2004). STRATEGY 2004-2007. eHealth for Healthcare<br />

Delivery. Taking basic health solutions to countries.<br />

Geneva: WHO.<br />

[65] WHO. (2009). World Health Statistics, 2009. Geneva: World<br />

Health Organisation.<br />

[66] Wikihealth. (n.d.). ICT in Health care delivery system: A<br />

Framework for developing nations. Retrieved April 5th,<br />

2012, from ICT for Health.


If We Build it Will They Come? A Mixed-Method<br />

Exploration of High Speed Broadband Access and<br />

Economic Development<br />

ABSTRACT<br />

High speed broadband internet is often heralded as an effective<br />

economic development tool. To realize the purported benefits of<br />

broadband services, federal, state and local governments are<br />

investing in its expansion. However, the relationship between high<br />

speed broadband and the economic health of North Carolina<br />

communities is unknown. Using quantitative and qualitative<br />

methods, this study explores the relationship between high speed<br />

broadband and the economic health and economic development<br />

activities in North Carolina.<br />

Categories and Subject Descriptors<br />

B.4.3[INPUT/OUTPUT AND DATA COMMUNICATIONS]:<br />

Interconnections (Subsystems) - Fiber Optics; C.2.5<br />

[COMPUTER-COMMUNICATION NETWORKS]: Local and<br />

Wide-Area Networks - High Speed (Fiber), Internet; G.3<br />

[MATHEMATICS OF COMPUTING]: Probability and Statistics<br />

- Correlation and Regression Analysis, Multivariate Statistics;<br />

K.4.2 [COMPUTERS AND SOCIETY]: Social Issues -<br />

Employment<br />

General Terms<br />

Measurement, Economics, Theory<br />

Keywords<br />

High Speed Broadband, Economic Development, ICT, North<br />

Carolina<br />

1. INTRODUCTION<br />

1.1 Background<br />

High speed broadband internet (hereafter referred to as<br />

broadband), defined by the FCC as a connection of at least 768<br />

kbps downstream and greater than 200 kbps upstream at the time<br />

of this analysis, is often heralded as an effective economic<br />

development tool. Proponents argue it should enhance<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Amy Huffman<br />

Center for Public Technology<br />

CB #3330<br />

Chapel Hill, NC 27599<br />

arhuffman7@gmail.com<br />

379<br />

communities’ ability to attract new businesses and industries<br />

while retaining and improving their existing businesses [6]. To<br />

realize broadband’s projected economic and social benefits,<br />

federal, state and local governments are investing in its expansion<br />

[9]. In North Carolina, several governmental agencies and nonprofits<br />

such as the Golden LEAF Foundation, MCNC, and local<br />

governments invested in building a broadband infrastructure with<br />

hopes of positive results [16]. However, the literature on the<br />

relationship between broadband and economic growth is mixed<br />

and little research on its impact on NC communities has been<br />

conducted to date.<br />

1.2. Literature Review<br />

While ample research on broadband’s overall impact on society<br />

exists, few studies focus exclusively on its impact on the<br />

economic health of local economies and their economic<br />

development efforts. However, several studies measure and<br />

analyze the relationship between broadband infrastructure and<br />

economic growth. Czernick et. al, argue an increase in broadband<br />

availability positively impacts economic growth at a macro-level<br />

as their data from 25 OECD countries over eleven years (1996-<br />

2007) to draw these conclusions [2]. Koutroumpis also studied 22<br />

OECD countries from 2002-2007 to measure broadband’s impact<br />

on economic growth using a structural econometric model<br />

measuring the supply of and demand for broadband infrastructure<br />

[10]. He found evidence for a significant causal positive link<br />

between broadband infrastructure and economic growth [10]. Lehr<br />

et al. found broadband access positively impacts economic growth<br />

through statistical analysis of broadband penetration at the state<br />

level nationwide, individual communities, and a matched sample<br />

analysis of residential and small businesses broadband use [11].<br />

Kolko found similar results in California [9]. Kolko’s research,<br />

however, questioned whether a causal relationship between<br />

broadband infrastructure and economic growth exists [9]. He<br />

noted it is unclear whether there indeed is a causal relationship or<br />

if the correlation is a function of advancements in other areas [9].<br />

Kolko also suggested that while broadband expansion offers some<br />

economic benefits, the economic benefits to individual citizens<br />

are limited [9].<br />

Ford & Koutsky studied the impact municipal investment in<br />

broadband expansion has on economic growth [6]. They used an<br />

econometric model to compare one county, Lake County, who<br />

possessed an extensive municipally-owned broadband network, in<br />

comparison to other counties in Florida [6]. The authors found<br />

Lake County’s economic activity doubled relative to comparable<br />

Florida counties [6]. In addition, the authors also argued<br />

municipal broadband infrastructure is more successful than


private broadband infrastructure in improving economic growth<br />

[6].<br />

Other studies focused on geography and demographics and their<br />

relationship to broadband’s economic impact. Horrigan et al.<br />

found that broadband use increases in larger cities, cities with<br />

large telecommunications-intensive economic sectors and other<br />

demographics heavily influence broadband use [7]. Kandilov and<br />

Renkow question whether an investment made by the US<br />

Broadband Loan Program or sheer proximity to urban areas is a<br />

better predictor of economic growth [8]. They used quantitative<br />

data and an econometric model to measure the impact the US<br />

Broadband Loan Program has had on increasing economic vitality<br />

in rural areas [8]. Their findings suggest the positive outcomes are<br />

not a result of the loan program, but of a specific location’s<br />

proximity to other urban areas [8].<br />

The FCC’s National Broadband Plan suggests the absence of<br />

broadband infrastructure is more important in a business’s<br />

location decision than the presence of broadband. The report<br />

predicts, “Communities without broadband infrastructure will find<br />

it more difficult to attract investment,” [4]. Similarly, in a survey<br />

conducted by the International Economic Development Council,<br />

broadband was determined to be one of many factors that<br />

influence business’s location decisions [14].<br />

Thus, while some studies suggest broadband is important in<br />

stimulating economic growth still others argue proximity to urban<br />

areas is more influential than broadband in increasing economic<br />

growth, indicating the disagreement among scholars on<br />

broadband’s influence on economic health in local communities<br />

[2, 6, 8, 10, 11]. To date, research also suggests businesses<br />

consider broadband during the location decision process, although<br />

the absence of broadband is more important than its presence in<br />

their decision [4, 14]. NC specific research is limited, and the<br />

relationship between broadband and economic growth and<br />

broadband and economic development efforts in NC communities<br />

is currently unknown.<br />

2. RESEARCH QUESTIONS<br />

As long as these gaps in the literature and empirical research<br />

remain, North Carolina local governments have little information<br />

on how their current broadband infrastructure impacts their local<br />

economy and even less information to guide their use of<br />

broadband to improve economic development efforts. This study<br />

seeks to understand the impact broadband has on the economic<br />

health of North Carolina counties and what some communities are<br />

doing to utilize broadband to improve their economic well-being<br />

through economic development efforts. To inform local<br />

governments how to best leverage broadband as an economic<br />

development tool while addressing the gap in the existing<br />

literature on broadband access and economic development this<br />

study addresses the following research questions:<br />

How has access to high speed broadband internet affected North<br />

Carolina communities’ 1 economic health?<br />

1<br />

For the purposes of this study, community(ies) is defined as a<br />

county or a municipality.<br />

380<br />

How are some North Carolina communities’ using high speed<br />

broadband internet to support their economic development<br />

efforts?<br />

3. METHODOLOGY<br />

3.1. Overview<br />

To understand the county level impact and the strategic<br />

implications of broadband on NC communities’ economies and<br />

their economic development efforts, a mixed-method, two phased<br />

approach was employed. North Carolina was chosen because of<br />

the author’s affiliation with the state as a North Carolina native. In<br />

addition, this study focuses on North Carolina as a complement to<br />

the current “Rural Broadband Initiative Evaluation,” of<br />

broadband’s impact in North Carolina being conducted by the<br />

UNC-School of Government’s Center for Public Technology [16].<br />

The county was the primary unit of analysis for phase one, while<br />

the level of analysis in phase two was the community, which<br />

includes two counties and one municipality.<br />

In phase one, a series of correlations were performed to first<br />

determine if a relationship between broadband and the economic<br />

health of communities existed. After a significant relationship was<br />

found, a multivariate regression was performed to determine the<br />

level of impact broadband has on employment growth in North<br />

Carolina’s 100 counties. Employment growth rate, a proxy for the<br />

health or performance of a local economy, from 2005 to 2010 was<br />

chosen as the dependent variable [1, 15]. Data were collected for<br />

the model’s seven independent variables: broadband penetration,<br />

proximity to urban county, projected education level, population<br />

density, median household income, annual average temperature<br />

(a proxy for climate as an influential factor in location decisions),<br />

and average unemployment rate. Each independent variable was<br />

chosen to represent different factors traditionally considered to<br />

impact employment growth rate [1, 15].<br />

In phase two, comparative case studies of three communities<br />

provide an in-depth understanding of broadband’s impact on<br />

economic development efforts at the community level,<br />

specifically addressing the second research question.<br />

Communities with known investments in high-speed connectivity<br />

were explicitly chosen so lessons on how to best use broadband as<br />

an economic development tool could be gained. Experts in the<br />

field identified several communities satisfying this requirement,<br />

after which a standardized selection method considering<br />

geography, jurisdictional type, economic tier level, as defined by<br />

the North Carolina Department of Commerce, and broadband<br />

ownership further narrowed the list of qualified communities [13].<br />

Catawba County, Rutherford County and the City of Wilson were<br />

selected based on their fulfillment of the selection criteria. Data<br />

were gathered through eleven semi-structured interviews with<br />

local government officials 2 and other experts identified through<br />

expert selection and snowball sampling. The interviews consisted<br />

of a standard set of fifteen pre-tested interview questions. Content<br />

analysis was performed then coded for theme development.<br />

3.2. Limitations<br />

2 Interviewees identities are anonymous and confidential, thus any<br />

identifier such as their position or title is not listed to further<br />

ensure their anonymity.


The methodology contains inherent limitations. The standard data<br />

available for measuring broadband penetration in the United<br />

States is a scaled measure rather than an exact number of<br />

households subscribing to broadband services, or the penetration<br />

rate. 3 The scaled measure is inherently a weak measure because<br />

of its inability to account for slight differences in the penetration<br />

rate. It only encapsulates large differences, thus a granular<br />

investigation of broadband’s impact on employment growth is not<br />

possible with the available data. However, until more granular<br />

data is made more widely available to researchers, the use of this<br />

data is standard. In addition, data for the penetration rate is not<br />

available at the county level prior to December of 2008 [5]. By<br />

2008, much of the broadband infrastructure had been installed in<br />

North Carolina, thus determining the precise economic effect<br />

broadband has on economic growth is not possible with the<br />

current data.<br />

The employment growth rate and unemployment rate data were<br />

skewed due to the financial recession between 2008 and 2010. As<br />

such, employment and unemployment growth rates were<br />

calculated from 2005-2010 to account for any variance the<br />

recession may have caused. The interviews were subject to<br />

respondent induced biases as most interviewees had a vested<br />

interest in their community’s high-speed broadband infrastructure<br />

and thus strongly believe it improves their economic development<br />

efforts. Finally, due to time and resource constraints,<br />

representatives of the business communities were not included in<br />

the interview sample. As such, secondary sources provide<br />

information on broadband’s effect on business’ location decisions.<br />

4. ANALYSIS<br />

4.1 Quantitative Analysis<br />

Understanding how broadband currently affects the local<br />

economy fosters the design of policies and strategies that more<br />

comprehensively address issues facing broadband expansion and<br />

its relationship to the local economy and economic development<br />

efforts. For this reason, a quantitative analysis, consisting of<br />

correlations and a multivariate regression, was undertaken to<br />

explore the relationship between broadband and the overall<br />

economic health of North Carolina counties.<br />

The correlation for broadband penetration and employment<br />

growth was .327, demonstrating a relationship between broadband<br />

and employment growth rate exists. The multivariate regression<br />

model, which controls for variables that typically influence<br />

employment growth, indicates broadband availability does not<br />

significantly influence the employment growth rate between 2005<br />

3 FCC Form 477 measures Residential Fixed High-Speed<br />

Connections at least 768 kbps downstream and greater than 200<br />

kbps upstream per 1000 Households (BTOP/BIP Definition) on<br />

a scale of zero to five on the following scale: 1=Greater than<br />

0 and less than/equal to 200 households connected per 1000<br />

households 2=Greater than 200 and less than/equal to 400<br />

households connected per 1000 households 3=Greater than 400<br />

and less than/equal to 600 households connected per 1000<br />

households 4=Greater than 600 and less than/equal to 800<br />

households connected per 1000 households 5=Greater than 800<br />

households connected per 1000 households<br />

381<br />

and 2010. As shown in Figure 1, the model’s adjusted r squared<br />

was .364, however, broadband penetration’s significance was<br />

.266, indicating it has no influence on the employment growth rate<br />

between 2005 and 2010.<br />

Model Summary<br />

Model R R Square Adjusted<br />

R Square<br />

Std. Error<br />

of the<br />

Estimate<br />

1 .639 .409 .364 5.19031<br />

Figure 1. Regression Model Summary<br />

Many factors could cause broadband’s lack of significance in<br />

influencing the employment growth rate. However, its lack of<br />

significance in the current model is at least in part due to the high<br />

level of penetration in North Carolina by 2008. For example, a<br />

2007 e-NC Authority report found that at that time broadband was<br />

available to 79.64 % of residents in rural counties and 86.98% of<br />

residents in urban counties [3]. As access increases, the relative<br />

level of its impact on economic growth diminishes or decreases<br />

[12]. Thus, it is likely North Carolina has already realized the<br />

majority of the possible economic gains broadband, as it is<br />

currently measured, fosters. Henceforth it is likely broadband’s<br />

impact on economic growth will be more localized, occurring at<br />

an individual community or even sub-community level; which<br />

may not hold significance at the county level if economic gains<br />

are not widespread.<br />

4.2 Qualitative Analysis<br />

The qualitative analysis’s primary goal is to provide an in-depth<br />

understanding of how broadband affects economic development<br />

efforts at the community level. The case studies were compared<br />

and contrasted on the following dimensions: background and<br />

contextual information, broadband’s use in supporting business<br />

recruitment, retention and expansion, and its use in other<br />

economic development efforts.<br />

4.2.1 Catawba County<br />

Catawba County’s broadband infrastructure was primarily<br />

installed by private providers who continue to provide services to<br />

both citizens and businesses. Between 400 and 600 residents per<br />

1000 residents have access to broadband in Catawba County. 4<br />

Catawba County primarily uses broadband to recruit, retain and<br />

expand businesses, specifically high-tech data centers. One<br />

interviewee explained broadband’s importance in the process in<br />

the following way: “Well, certainly with our focus on data<br />

centers, the broadband is not simply a requirement it is one of the<br />

most important priorities. Behind power, broadband availability<br />

with redundancies is the most important issue. That’s one of our<br />

three primary target markets. And so, the access to broadband is<br />

mandatory to be able to target that sector, and we’re counting on<br />

that sector as a strong component of our future economy.”<br />

Interviewees indicated without Catawba County’s broadband<br />

infrastructure Apple would not have located there. One<br />

interviewee said, “Let’s just say, the world’s largest technology<br />

4 As of December 2010. From FCC Form 477. The date is the<br />

same for Rutherford County and the Wilson.


company is now located in Catawba county and in North Carolina<br />

only as a result of having broadband capabilities. Every iPhone<br />

and iPad application is being shipped through Catawba County<br />

and North Carolina now. So that’s a pretty dramatic reality that<br />

we would have missed had broadband infrastructure not been in<br />

place.” While another interviewee described broadband to be as<br />

important as other utilities in terms of economic development<br />

when they said, “It’s a utility that’s expected.” In addition, the<br />

county experiences direct economic benefits in the form of jobs<br />

and capital investments as several firms responsible for fiber<br />

production are located in Catawba County.<br />

Catawba County also uses broadband to improve the citizens’<br />

quality of life and enable businesses to offer employees the option<br />

to telecommute, and to attract employees wishing to telecommute.<br />

As one interviewee explained, broadband enables people who<br />

want to relocate to Catawba County to do so even if their job is<br />

not located in the county. The interviewee said, “We’re finding at<br />

this point there’s a number of people relocating to Catawba<br />

County. And they’re relocating there because their job is actually<br />

giving them enough flexibility that they can work anywhere.”<br />

4.2.2 Rutherford County<br />

The primary broadband infrastructure in Rutherford County was<br />

funded and installed through a partnership with the county, the<br />

Golden Leaf Foundation and other funders, and local non-profits<br />

Polk Area Network for Government Academic and Enterprise<br />

Activities, PANGAEA, and Foothills Connect. Based out of Polk<br />

County, PANGAEA provides and sells fiber fostered broadband<br />

services to local government agencies, education facilities,<br />

healthcare providers, first responders and other non-profits [17].<br />

The broadband infrastructure serves between 200 and 400<br />

residential connections per 1000 households.<br />

Like Catawba County, Rutherford County uses their broadband<br />

network to recruit and retain high-tech firms. Rutherford County<br />

recruited Facebook and the State Data Center, two large<br />

organizations that interviewees said would not have located there<br />

but for their broadband network. As one interviewee said,<br />

“Indirectly I can definitely say Facebook would not have located<br />

one of their server farms in Rutherford County had there not been<br />

adequate broadband infrastructure in the county. The same can be<br />

said of the state data center which is also located in Rutherford<br />

County.”<br />

Rutherford County also uses broadband to support entrepreneurial<br />

development. A non-profit, Foothills Connect, used broadband to<br />

set up a website for local farmers to sell their produce to regional<br />

buyers. The program enables farmers to sell to customers and<br />

markets they would not have access to without the broadband<br />

facilitated program. An interviewee described the program as a<br />

place, “Where people will go online, they’ll register as customers<br />

and clients and they will order online directly from the farmers.<br />

And it all comes through the Foothills Connect Farmer’s Fresh<br />

Market website program. And this allows farmers who ordinarily<br />

would not have had access; you know easy convenience access, to<br />

these markets and these people and buying clubs, so that they can<br />

sell their produce. And what the Farmer’s Fresh Market Program<br />

does is it connects these clients with these farmers.”<br />

4.2.3 The City of Wilson<br />

Private providers and Greenlight, the city-owned broadband<br />

network established in 2008 by the City of Wilson, built Wilson’s<br />

infrastructure. As one of the only city-owned broadband providers<br />

382<br />

in North Carolina, Greenlight competes with private companies<br />

such as Time Warner and Century Link in selling broadband<br />

internet as well as television and phone services to Wilson’s<br />

citizens and businesses. Between 400 and 600 per 1000 residents<br />

have access to broadband in Wilson.<br />

Similar to Catawba and Rutherford Counties, Wilson also uses<br />

broadband to attract businesses, particularly high-tech firms.<br />

However, among the three communities, Wilson is the most<br />

proactive in using broadband to retain, expand, and support<br />

existing businesses. Wilson prides itself in providing high-quality<br />

products at a low cost, competitive with private providers, through<br />

Greenlight. Interviewees indicated local businesses subscribing to<br />

Greenlight’s services realize significant monetary savings, which<br />

can then be reinvested into their businesses. In addition, Wilson<br />

also uses their network to improve the quality of life their<br />

community offers citizens. One interviewee explained the network<br />

improves quality of life in the following way, “When you’re<br />

trying to attract pharmaceutical companies, high end technical<br />

companies, their employees and their staff are going to want very<br />

good connectivity at home as well so that they can telecommute<br />

when necessary or when that’s available to them. And we can do<br />

that through our broadband network.”<br />

5. FINDINGS<br />

5.1 Broadband Does Not Significantly Impact<br />

Employment Growth<br />

Similar to other studies, the quantitative analysis suggests a strong<br />

relationship between broadband and economic health does not<br />

exist. However, some studies have found it may impact some<br />

industry sectors, such as information technology, more than others<br />

[15]. Thus, analyzing broadband’s impact on each industrial<br />

sector could yield different results. In addition, as employment<br />

growth has been used as a proxy for the economic health of a<br />

community in this and other studies, and results have not been<br />

found, it is possible that employment growth rate is too broad or<br />

rough as a measure of economic health. Thus the use of a different<br />

dependent variable, such as the number of new business startups,<br />

could yield different results. Indeed, the qualitative analysis<br />

suggests there is a stronger relationship between broadband and a<br />

community’s economic health than the quantitative analysis<br />

demonstrates.<br />

5.2 Broadband is Important in Attracting and<br />

Retaining Businesses<br />

The qualitative analysis’s most significant finding is that<br />

broadband is used as a business attraction and retention tool by<br />

local government leaders involved in the business recruitment and<br />

retention process. Similar to findings from the literature, the case<br />

studies’ findings suggest broadband ranks as important as water,<br />

sewer and electricity to communities as they work to attract and<br />

retain businesses [6]. As one interviewee said, “…honestly I think<br />

that everyone needs to look at it as basic infrastructure like a<br />

water line or a sewer line because in the last few years that is<br />

basically what it has become.” The remaining ten interviewees<br />

echoed this sentiment, saying they viewed broadband as a utility<br />

or an essential part of their basic infrastructure in their<br />

communities. They also all said they use broadband to recruit<br />

businesses, especially high-tech data centers and firms. They do<br />

so through a variety of means, but primarily by providing


information about their broadband system’s speeds, rates and<br />

access. Each community stressed the importance of a high-quality<br />

broadband system with the capacity for high-speed uploads and<br />

downloads in attracting high-tech industries.<br />

All three communities also use broadband as a tool in aiding<br />

business retention and expansion, albeit less so than it is for<br />

business attraction. Interviewees from Catawba and Rutherford<br />

indicated the proliferation of broadband contributes to business<br />

satisfaction and enables expansion, thus improving business<br />

retention and expansion efforts.<br />

While it is evident broadband is important in business recruitment,<br />

retention and expansion, its importance relative to other factors<br />

influential in business location and expansion decisions is unclear.<br />

Some respondents indicated broadband was the most important<br />

factor in recruiting certain businesses while others believed it was<br />

important to have, but was not the most important factor. As one<br />

respondent stated, “I’ve had some other industries who have said<br />

it was not a significant factor or deciding factor, but was among<br />

the factors that led to their decision to locate.” Conversely,<br />

interviewees from Catawba and Rutherford County indicated that<br />

without their broadband infrastructure neither Apple nor<br />

Facebook, respectively, would have located in their communities.<br />

While it is unclear whether broadband is more important than<br />

other business location decision factors, it may create a serious<br />

disadvantage for communities without an existing adequate<br />

infrastructure. As one respondent noted, “Despite the economic<br />

downturn that we have been experiencing, not one person or<br />

business is using less data than they were using before the<br />

downturn. Every one of us expects to have more power,<br />

computing power, and communications power in our hands or on<br />

our desk despite the downturn. And so a community that doesn’t<br />

realize their future is tied to communications facilitated by<br />

broadband, they’re probably missing the biggest opportunity<br />

coming down the pipes.” Similarly, another respondent said, “If it<br />

(broadband infrastructure) is not there, they (businesses) won’t<br />

locate there.” Similar to findings in the literature, the negative<br />

impact of not having broadband seems it may be more significant<br />

than the positive impact of having broadband available in one’s<br />

community [4]. Through this study, it is evident some businesses<br />

view broadband as an essential utility or piece of infrastructure<br />

that needs to be present if they are to locate there. Thus, as the<br />

FCC’s National Broadband Plan predicted, it is possible<br />

broadband’s absence may be more significant as a deterrent than<br />

its presence is as an attraction for businesses [4].<br />

5.3 Broadband Can Support Other Economic<br />

Development Activities<br />

The qualitative analysis suggests broadband also affects nontraditional<br />

economic development activities or strategies such as<br />

entrepreneurial development and attracting quality employees<br />

improving citizens’ quality of life. Several interviewees noted<br />

broadband improved their citizens’ quality of life through the<br />

provision of faster internet access, and the provision of the<br />

opportunity to telecommute. As an interviewee from Wilson<br />

explained, the opportunity to telecommute is particularly<br />

important in attracting pharmaceutical and high-tech firms<br />

because their employees want and expect to be able to<br />

telecommute if permitted.<br />

383<br />

6. RECOMMENDATIONS FOR FUTURE<br />

RESEARCH AND CONCLUSION<br />

6.1. Recommendations for Future Research<br />

Although this study’s findings add to the existing literature on<br />

broadband’s impact on the economic health of local communities<br />

and its relation to economic development activities in some<br />

communities, many questions surrounding broadband and<br />

economic development remain. More research is needed to<br />

determine broadband’s importance relative to other business<br />

location decision factors, whether the lack of broadband indeed<br />

disadvantages communities and if so how it does so. In addition,<br />

more research is needed to determine whether the lack of<br />

broadband indeed is more significant as a disadvantage than its<br />

presence is as an advantage for communities. Future research<br />

should also focus on businesses and how different types of<br />

businesses use and view broadband.<br />

6.2. Conclusion<br />

While many questions remain, this study explores the relationship<br />

between broadband and the economic health and economic<br />

development activities in North Carolina, using quantitative and<br />

qualitative methods. The quantitative data shows there is no<br />

significant correlation between employment growth rate and<br />

broadband in North Carolina’s counties, however, the case studies<br />

indicate there is more to the story. Broadband may not impact<br />

total employment growth at the county level, but at a more local<br />

level, it is influential. As an interviewee said, “It particularly<br />

matters to those who either do not have an existing broadband<br />

network, or whose network does not meet the community’s<br />

needs.” Understanding broadband’s utility as a business<br />

recruitment, retention and expansion tool, as well as its ability to<br />

serve as an economic development tool in other ways can aid<br />

North Carolina communities in improving their overall economic<br />

health and become a competitive player in the local, state, national<br />

and global economies.<br />

7. ACKNOWLEDGMENTS<br />

I would like to recognize and thank my committee members:<br />

Shannon H. Tufts (chair), William Lambe, and Jonathan Morgan.<br />

8. REFERENCES<br />

[1] Coomes, Paul. A. “Economic Performance Measures for<br />

Metropolitan Areas,” Journal of Economic and Social<br />

Measurement, 24, 1998, 157-179.<br />

[2] Czernich, N., Falck, O., Kretschmer T., and Woessmann., L.,<br />

Broadband Infrastructure and Economic Growth. The<br />

Economic Journal, Vol. 121(552), 2011, 505-532.<br />

[3] E-NC Authority. High Speed Internet Access in North<br />

Carolina. 2007. Accessed on 2/24/12.<br />

http://ncbroadband.gov/baller_footnotes/34.html<br />

[4] Federal Communications Commission. (2010). Connecting<br />

America: The National Broadband Plan. Washington, DC:<br />

US Government Printing Office. 2010. p291.<br />

[5] Federal Communications Commission. Form 477 website.<br />

Retrieved on 10/20/12.<br />

http://transition.fcc.gov/wcb/iatd/comp.html


[6] Ford, G. S., & Koutsky, T.M. Broadband and Economic<br />

Development: A Municipal Case Study from Florida. Review<br />

of Urban & Regional Development Studies, Vol. 17(3), 2005,<br />

219-229.<br />

[7] Horrigan, J. B., Stolp, C., & Wilson, R. H. Broadband<br />

Utilization in Space: Effects of Population and Economic<br />

Structure. The Information Society, Vol. 22(5), 2006, 341-<br />

354.<br />

[8] Kandilov, I. T., & Renkow, M. Infrastructure Investment and<br />

Rural Economic Development: An Evaluation of USDA’s<br />

Broadband Loan Program. Growth and Change, Vol. 41(2),<br />

2010, 165-191.<br />

[9] Kolko, Jed. “Does Broadband Boost Local Economic<br />

Development? Public Policy Institute of California,” January<br />

2010. 1-34.<br />

[10] Koutroumpis, P. The Economic Impact of Broadband on<br />

Growth: A Simultaneous Approach. Telecommunications<br />

Policy, 33, 2009, 471-485.<br />

[11] Lehr, W.H., Osorio, C.A., Gillett, S.E, & Sirbu, M.A.<br />

Measuring broadband’s economic impact. Tepper School of<br />

384<br />

Business. Paper 457, 2005.<br />

http://repository.cmu.edu/tepper/457.<br />

[12] Mankiw, G. The Principles of Economics, 4 th Edition.<br />

Thomas-South-Western. 2007.<br />

[13] North Carolina Department of Commerce website. Retrieved<br />

on 9/1/11. http://www.nccommerce.com/researchpublications/incentive-reports/2011-county-tier-designations.<br />

[14] Settles, Craig. Community Broadband Snapshot Report,<br />

“Broadband’s Impact on Economic Development: The Real<br />

Deal,” International Economic Development Council, Sept.<br />

2010.<br />

[15] Shideler, D., Badasyan, N. and Taylor, L. “The Economic<br />

Impact of Broadband Deployment in Kentucky,” Federal<br />

Reserve Bank of St. Louis Regional Economic Development,<br />

2007, 3(2), pp. 90.<br />

[16] Tufts, Shannon. “Golden LEAF Rural Broadband Initiative<br />

Annual Evaluation Report,” December 2011. p26.<br />

[17] PANGAEA website. Retrieved on 12/12/2011.<br />

http://www.pangaea.us/company/history.php.


Session 13<br />

E-democracy & Participation 2


An e-Democracy experience: Digital Cabinet Office of Rio<br />

Grande do Sul State (Brazil)<br />

Marie Anne Macadar<br />

Pontifical Catholic University of<br />

Rio Grande do Sul<br />

Av. Ipiranga, 6681, Prédio 50<br />

Zip Code: 90.619-900<br />

Porto Alegre – RS - Brazil<br />

Phone: (55) (51) (3320-3524)<br />

marie.macadar@pucrs.br<br />

ABSTRACT<br />

This paper aims to identify the influence of institutional factors in<br />

implementing e-Democracy practices at the Digital Cabinet Office<br />

of Rio Grande do Sul State (Brazil). Institutional theory is used as<br />

the theoretical framework in this case study and supported the<br />

construction of the conceptual model based on some propositions.<br />

This is a research in progress and, therefore, just a few initial<br />

issues are pointed out. However, they show that the researchers<br />

must continue working in this case study in order to bring some<br />

contributions to e-Government theory.<br />

Categories and Subject Descriptors<br />

K.4.1 [Computers and Society]: Public Policy Issues - Use/abuse<br />

of power<br />

General Terms<br />

Management, Theory<br />

Keywords:<br />

e-Government, e-Democracy, Participation<br />

1. INTRODUCTION<br />

In the last decades, the social setting of human life has been<br />

remodeled by the technological revolution produced by<br />

Information and Communication Technologies [4]. Considering<br />

current technological changes, one feels the need for an effective<br />

ICT management in government. The Brazilian reform in public<br />

management idealized in 1995 has emphasized such a need. The<br />

term electronic government (e-Gov) has been introduced to refer<br />

to the use of ICT in public management for improving<br />

administration, for delivering government information and<br />

services, and also for introducing citizen engagement and<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Gabriela Viale Pereira<br />

Pontifical Catholic University of<br />

Rio Grande do Sul<br />

Av. Ipiranga, 6681, Prédio 50<br />

Zip Code: 90.619-900<br />

Porto Alegre – RS - Brazil<br />

Phone: (55) (51) (3320-3524)<br />

gabiviale@terra.com.br<br />

385<br />

participation in government [5][10].<br />

Vanessa Marques Daniel<br />

Pontifical Catholic University of<br />

Rio Grande do Sul<br />

Av. Ipiranga, 6681, Prédio 50<br />

Zip Code: 90.619-900<br />

Porto Alegre – RS - Brazil<br />

Phone: (55) (51) (3320-3524)<br />

nessa.daniel@gmail.com<br />

Heeks and Bailur [11] regard the acknowledgement of contextual<br />

factors - besides technological ones - as a positive aspect in e-<br />

Government research. This study is, therefore, relevant since it<br />

aims to analyze the relation between institutional factors and the<br />

implementation of e-Democracy practices in Brazil.<br />

This research is in the context of IT government adoption and<br />

management for widening communication channels between these<br />

organizations and society by means of web portals for citizen<br />

participation. Our goal is to identify the influence of institutional<br />

factors in the implementation of e-democracy practices. The<br />

theoretical framework used here is institutional theory, which<br />

postulates that organizations tend to adopt similar structures<br />

forming a homogeneous field in order to get the recognition in the<br />

environment they are inserted. Institutional theory has constructs<br />

which allow the analysis of the organizational environment of<br />

public management and the influence of institutional factors in the<br />

adoption of technology in organizations.<br />

This paper is an early study about the Digital Cabinet in Rio<br />

Grande do Sul (Brazil) and, as pointed out before, institutional<br />

theory will provide our theoretical basis, briefly presented in<br />

sections 2 and 3 below. Section 4 shows the methodological<br />

aspects of the research and the propositions to be tested. The case<br />

study is then introduced in section 5 and final considerations are<br />

made in section 6.<br />

2. THE INSTITUTIONAL PERSPECTIVE<br />

AND GOVERNANCE<br />

There is a consensus that influential organizations have the power<br />

to legitimate others in their social environment and the ability to<br />

influence their decision-making process. In this context,<br />

governments are regarded as the organizations with more power<br />

to intervene in others [14]. However, King et al. [12] argue that<br />

institutional factors are essential components to understand the<br />

adoption of innovations in IT that cross-organizational borders.<br />

According to Scott [16], regulative, normative and cognitive<br />

factors exert influence on the adoption of IS in public<br />

administration. Regulative factors "involve the capacity to<br />

establish rules, inspect others' conformity to them, and, as<br />

necessary, manipulate sanctions-rewards or punishments-in


attempt to influence future behavior" (p.52)[15]. Processes<br />

attached to laws, norms or sanctions bring about pressure for<br />

adjustment in the organizational field. The normative pillar is<br />

conditioned to certification and accreditation. As pointed out by<br />

Scott: “These beliefs are not simply anticipations or predictions,<br />

but prescriptions-normative expectations of how specified actors<br />

are supposed to behave” (p.55)[15]. Last but not least, the<br />

cognitive system is related to common beliefs and shared logic<br />

and is supported by culture.<br />

Thus, institutional theory is concerned with aspects of social<br />

structure, reflecting on the processes by which structures –<br />

schemes, rules, norms and routines – are set as guidelines for<br />

social behavior [15]. Avgerou [1] suggested that new<br />

institutionalism provides a conceptual platform to analyze actions<br />

resulting from cultural processes and from the power underlying<br />

organizations and their social environment.<br />

2.1 Institutions and Organizations<br />

DiMaggio and Powell [6] questioned what makes organizations so<br />

similar to one another. For them, institutions in a given<br />

organizational field become homogenous in an effort to get<br />

legitimacy through isomorphism. The authors identified three<br />

mechanisms from which isomorphical institutional changes take<br />

place: coercive isomorphism, mimetic isomorphism, and<br />

normative isomorphism. As far as the adoption of technology is<br />

concerned, there is a tendency for similarity through different<br />

isomorphisms.<br />

One of the main propositions in institutional analysis is that<br />

organizations tend to be grouped together in fields and each field<br />

tend to develop similar structures and processes [1]. DiMaggio<br />

and Powell [6] define organizational field in institutional analysis<br />

as organizations which form a recognized area and undergo a<br />

process of homogeneity through isomorphism in order to become<br />

legitimate. This is a strong tendency for public organizations,<br />

which need to be legitimate to remain active in government, to<br />

share some similarities in structures and services.<br />

As pointed out before, DiMaggio and Powell [6] identified three<br />

mechanisms according to which institutional isomorphic changes<br />

occur: coercive isomorphism, which derives from political<br />

influences, mimetic isomorphism, which results from models of<br />

other organizations, and normative isomorphism, associated with<br />

professionalization.<br />

According to the authors, coercive isomorphism results from<br />

formal and informal pressures by organizations on which others in<br />

the same field depend, providing legitimacy to organizational<br />

structures, to their processes and results. Avgerou [1] adds that<br />

government mandates and legal systems in regional, national and<br />

international organizational contexts constitute forms of coercive<br />

pressure, and rules are the mechanism which determines<br />

structures and processes in the public sector.<br />

Avgerou [1] states that normative pressures refer to the effects of<br />

professional practice. DiMaggio and Powell [6] point out that an<br />

important aspect of professionalization, which provides<br />

isomorphism, is the support to formal education and the<br />

legitimacy provided by a cognitive basis coming from university<br />

specialists. They argue that normative mechanisms generate<br />

groups that occupy a similar position in the organization and share<br />

similarities in terms of orientation and control [6].<br />

386<br />

Mimetic mechanisms are defined by Avgerou [1] as the<br />

acquisition of structural and process characteristics from<br />

successful organization models. DiMaggio and Powel [6] believe<br />

that mimetic mechanisms can arise due to uncertainties resulting<br />

from the lack of understanding of organizational technologies<br />

taking other organizations as models. The authors claim that<br />

homogeneity in organizational structures derives from active<br />

search for models like the ones belonging to older organizations.<br />

2.2 Governance<br />

Following Bresser-Pereira [3], managerial public administration<br />

has come to existence at the end of the 20th century with the<br />

challenge to make the public sector more efficient and transparent<br />

to society. According to Diniz et al. [7], the use of IT has made a<br />

change in the model of public management possible with the<br />

arising of e-Government. This challenge for public organizations<br />

to remain in a complex and dynamic environment has driven<br />

organizations to adopt models focused on governance principles<br />

that ensure a more transparent result based management. The need<br />

for transparency and for results has emerged from environment<br />

pressure that public organizations should consider issues like<br />

efficiency, efficacy, transparency, and mechanisms of control and<br />

accounts of government. In order to do so, it is necessary for such<br />

organizations to adopt ICT resources as essential tools to<br />

strengthen governance and transparency in public organizations<br />

[2].<br />

2.3 Electronic Governance<br />

The use of ICT in the public sector, which used to be called<br />

electronic government in 1990, is now referred to as electronic<br />

governance or e-Government since it encompasses broader<br />

concepts like, for example, the application of ICT in public<br />

governance [5; 2]. According to Barbosa et al. [2], there are<br />

currently other IT applications to be considered besides the access<br />

to public services on the internet like, for instance, improvement<br />

of administrative processes, increase in efficiency, control of<br />

public policies, integration between governments and electronic<br />

democracy.<br />

Electronic governance comprises the use of IT not only for<br />

improving management of resources and governmental processes<br />

(public e-Administration) but also for upgrading citizens e-<br />

Services and for increasing citizens democratic participation in<br />

governments practices (e-Democracy) [5].<br />

2.3.1 Electronic Democracy<br />

Electronic democracy is concerned with a more interactive<br />

environment, creating opportunities for cooperation between<br />

citizens and social groups and, therefore, increasing political<br />

participation in decision-making processes [10]. For Frey [10], the<br />

governmental sector must have an active role in devising<br />

electronic governance practices meant to freshen up democracy.<br />

Furthermore, discussion forums should approach topics related to<br />

citizens' real life problems in order to make them engage in<br />

democratic practice.<br />

Digital forms of participation are mapped by Pell [14], who<br />

relates electronic democracy practices with information, enquiries<br />

and deliberation baselines. As far as baseline information is


concerned, Pell [14] makes reference to web sites, search engines,<br />

data bases and online discussion forums. On web search queries<br />

there are e-mails, referendums, electronic enquiries and electronic<br />

petitions. As for baseline deliberation, there are discussion groups,<br />

teleconferences, and community pages on the web. According to<br />

Pell, digital technologies can increase the number and the mode of<br />

such participation methods even further.<br />

3. METHODOLOGY<br />

This is a qualitative research which aims to understand an issue by<br />

examining a case study. Flick [9] states that in qualitative research<br />

there is a mutual interdependence of isolated parts in the process<br />

and, therefore, it is not possible to regard research stages as linear<br />

but rather continuous and related to one another.<br />

The research strategy chosen here is case study since it is our goal to<br />

focus on the study of a specific phenomenon, as pointed out by<br />

Eisenhardt [8]. The case was selected following Flick [9]’s criteria in<br />

the sense that a particularly typical single instance was chosen and<br />

analyzed consistently before any comparative analysis was carried<br />

out.<br />

Primary data will be collected during field research for<br />

investigating different facets of the case study. Then semistructured<br />

interviews with different stakeholders and the main<br />

actors involved in the implementation of the web portal will be<br />

conducted. Another research tool that will be used is document<br />

analysis since documents can provide important information to<br />

corroborate research results.<br />

The current research is still getting under way. A preliminary<br />

theoretical study has been made and an interview with the<br />

executive coordinator of the Digital Cabinet was conducted in<br />

December 2011.<br />

Proposition<br />

P1:<br />

Proposition<br />

P1a:<br />

Proposition<br />

P2:<br />

Proposition<br />

P2a:<br />

Proposition<br />

P3:<br />

Proposition<br />

P3a:<br />

Public organizations dependent on<br />

funding and on political influence are<br />

coerced into implementing e-Democracy<br />

practices due to coercive pressures<br />

Political influence and retention of<br />

funds by dominant organizations have<br />

an impact on coercive pressure for the<br />

implementation of e-Democracy<br />

practices by dependent public<br />

organizations.<br />

Public organizations which need<br />

acceptance in their organizational field<br />

tend to implement e-Democracy<br />

practices due to normative pressure.<br />

The existence of a desired behavior in<br />

the organizational environment reflects<br />

in normative pressure for the<br />

implementation of e-Democracy<br />

practices in public organizations.<br />

Public organizations that need<br />

legitimacy tend to use successful models<br />

in the implementation of e-Democracy<br />

practices due to mimetic pressure.<br />

The existence of successful models of e-<br />

Democracy practices in organizational<br />

environment result in mimetic pressure<br />

on the implementation of such practices<br />

by public organizations.<br />

387<br />

4. CONCEPTUAL MODEL<br />

On the basis of the theoretical framework adopted in this research,<br />

a conceptual model and some propositions were defined with the<br />

aim to analyze the influence of institutional pressures on the<br />

implementation of e-democracy.<br />

Figure 1: Conceptual model<br />

Table 1: Theoretical propositions<br />

5. THE DIGITAL CABINET: AN<br />

INTRODUCTION TO THE CASE<br />

The Digital Cabinet is the web portal to the State Government of<br />

Rio Grande do Sul (Brazil). It follows the concept of e-<br />

Democracy since it is characterized as a means of citizen<br />

engagement and participation. It is, as stated in the web portal<br />

(2011), "a space for participation which aims to encourage a new<br />

culture of governance in the public sector by creating new<br />

channels of communication and cooperation with society through<br />

the use of digital tools". It started operating in 2011 and has four<br />

tools: "Governor listens", “Collaborative Agenda”, "Governor<br />

answers" and "Governor asks".<br />

The tool "Governor listens" offers public hearings on the Internet<br />

for citizens to participate and chat with the government. The<br />

"Collaborative Agenda” consists in contributions from citizen<br />

members to bring issues forward and help make the governor's<br />

agenda on his visits to the countryside. The tool "Governor<br />

answers" constitute an environment in which members of the<br />

public can ask questions to the Governor and choose by vote a<br />

question they want to have answered on a video at the end of each<br />

month. Finally, “Governor asks” is a tool through which the<br />

Governor puts forward a given topic and citizens are asked to<br />

discuss it and give their contribution to the discussion of<br />

important local issues. The authors of the most voted<br />

contributions meet the governor personally and debate the topics<br />

with him.<br />

5.1 The Institutional Perspective of the Digital<br />

Cabinet<br />

The initiative of creating the Digital Cabinet, according to its<br />

executive coordinator, Mr. Fabricio Solagno, follows similar<br />

experiences around the world, especially in Obama's government<br />

in the US and in Canada. There are also reports of a similar<br />

experience by the Secretary for Communications in Ceará, Brazil.<br />

One of the main differences between the Digital Cabinet in Rio<br />

Grande do Sul (RS) and similar initiatives in Brazil is that<br />

participation tools are managed by Secretaries for<br />

Communications, which is not the case in RS. As pointed out by<br />

Solagno, "we are inside the Governor's cabinet and that's where all<br />

decision-making comes from".


Evidence shows that cognitive factors affect the implementation<br />

of e-Democracy practices. The cognitive pillar can be observed in<br />

the existence of a common sense on the benefits of creating a web<br />

portal for organized public participation in view of the legitimate<br />

experience of other successful web portals. The influence of web<br />

portals from other countries, for instance, the USA, was thus<br />

identified as a positive model to be followed and adapted to<br />

different demands.<br />

6. CONCLUDING REMARKS<br />

Considering the present situation of web collaboration, e-<br />

Democracy practices tend to be a requirement for new forms of<br />

government in order to meet the demands of contemporary<br />

society. Collaboration in e-Democracy digital environments can<br />

be seen as a gain not only for the population, which looks for<br />

ways of effective participation, but also for governments that<br />

expect to achieve legitimacy and recognition in the web.<br />

This paper reports a research in progress and, therefore, it is not<br />

meant to present an analysis of the case. It has been possible,<br />

however, to establish directives for further reflections on the<br />

matter. The first directive refers to the peculiarity of this case<br />

study, in special to its structuring (being inside the Governor's<br />

Cabinet), which being examined in the light of Institutional<br />

Theory, can shed light into important questions. A second aspect<br />

to be explored concerns the limitations of national and<br />

international cases of collaboration in government virtual<br />

environments and the effective participation of citizen in public<br />

decision-making. Limited experiences entail a specific and<br />

peculiar outlining to cultural, social, and political conditions.<br />

Once again Institutional Theory can be proved useful as a<br />

guideline to analysis. In the analysis of the only interview that<br />

has been carried out so far, it is possible to identify some<br />

influence of mimetic pressures in the implementation of e-<br />

Democracy practices which will be corroborated in a further stage<br />

of this research.<br />

7. ACKNOWLEDGMENTS<br />

Our thanks to CNPq and FAPERGS for partial support for this<br />

research. The authors also want to thank CAPES for the financial<br />

support given to take part in ICEGOV 2012.<br />

8. REFERENCES<br />

[1] Avgerou, C. 2002. Information systems and global diversity.<br />

Oxford University Press, New York.<br />

[2] Barbosa, A. F.; Faria, F. I.; Pinto, S. L. 2007. Governança<br />

eletrônica no setor público. In: Knight, P. T.; Fernandes, C.<br />

C. C.; Cunha, M. A. (Orgs). e-Desenvolvimento no Brasil e<br />

no mundo: subsídios e Programa e-Brasil. São Caetano do<br />

Sul: Yendis Editora.<br />

[3] Bresser-Pereira, L. C. B. 2002. Reforma da nova gestão<br />

pública: agora na agenda da América Latina, no entanto...<br />

Revista do Serviço Público, 53,1.<br />

[4] Castells, M. 2000. A The Rise of the Network Society: The<br />

Information Age: Economy, Society, and Culture Volume I<br />

(Information Age Series), Wiley-Blackwell; 2nd edition.<br />

[5] Cunha, M. A.; Annenberg, D.; Agune, R. M. (Prestação de<br />

serviços públicos eletrônicos ao cidadão. In: Knight, P. T.;<br />

Fernandes, C. C. C.; Cunha, M. A. (Orgs). 2007. e-<br />

Desenvolvimento no Brasil e no mundo: subsídios e<br />

Programa e-Brasil. São Caetano do Sul: Yendis Editora.<br />

388<br />

[6] Dimaggio, P. J.; Powell, W. W. 1983. The iron cage<br />

revisited: Institutional isomorphism and collective rationality<br />

in organizational fields. American Sociological Review, 48,<br />

2, p.147-160.<br />

[7] Diniz, E. H.; Barbosa, A. F.; Junqueira, A. R. B.; Prado, O.<br />

2009. O governo eletrônico no Brasil: perspectiva histórica a<br />

partir de um modelo estruturado de análise. Revista de<br />

Administração Pública (RAP), Rio de Janeiro, 43, 1, p.23-<br />

48.<br />

[8] Eisenhardt, K. M. 1989. Building Theories from Case Study<br />

Research. Academy of Management Review, 14, 4, p.532-<br />

550.<br />

[9] Flick, U. 1998. An introduction to qualitative research.<br />

London: Sage.<br />

[10] Frey, K. 2009. Perspectivas da democracia local na era<br />

digital. In: Cunha, M. A. V. C.; Frey, K.; Duarte, F. (Orgs.).<br />

Governança local e tecnologias da informação e<br />

comunicação. 1. ed. Curitiba: Champagnat.<br />

[11] Gil-Garcia, J. & Luana-Reyes, L. 2006. Encyclopedia of E-<br />

Commerce, E-Government and Mobile Commerce. IDEA<br />

Group Reference.<br />

[12] Heeks, R.; Bailur, S. 2007. Analyzing e-government<br />

research: Perspectives, philosophies, theories, methods, and<br />

practice. Government Information Quarterly, 24, p.243-265.<br />

[13] King, J. L.; Gurbaxani, V.; Kraemer, K. L.; McFarlan, F. W.,<br />

Raman, K. S.; Yap, C. S. 1994. Institutional Factors in<br />

Information Technology Innovation. Information Systems<br />

Research, 5, 2, p.139-169.<br />

[14] Peel, D. 2009. Utilizando tecnologias digitais para a<br />

ampliação da participação pública no planejamento. In:<br />

Cunha, M. A. V. C.; Frey, K.; Duarte, F. (Orgs.).<br />

Governança local e tecnologias da informação e<br />

comunicação. 1. ed. Curitiba: Champagnat.<br />

[15] Rodriguez, C. L.; Diniz, E. H.; Ferrer, F. 2007. Influência<br />

governamental e estratégias institucionais na difusão de<br />

inovações em economias emergentes. Revista de<br />

Administração de Empresas (RAE), 47, 1, p.10-21.<br />

[16] Scott, W. R. Institutional theory P408-14 In: Encyclopedia of<br />

Social Theory, George Ritzer, ed. Thousand Oaks, CA: Sage,<br />

2004.<br />

[17] Scott, W. R. 2008. Institutions and organizations: ideas and<br />

interests. 3. ed. Thousand Oaks: Sage.


Social Inclusion and Digital Divide: eParticipation<br />

dilemmas in municipalities<br />

Lukasz Porwol<br />

DERI, NUI Galway, Ireland<br />

lukasz.porwol@deri.org<br />

John Breslin<br />

DERI, NUI Galway, Ireland<br />

john.breslin@deri.org<br />

ABSTRACT<br />

Citizen-participation faces a large number of obstacles.<br />

eParticipation is considered to be one of the key tools to ensure<br />

effective state-to-citizen communication. A number of initiatives<br />

have led to the creation of eParticipation platforms, enabling<br />

digital participation online via ICT technologies. Even though<br />

these solutions have been introduced, the overall citizen<br />

participation remains at a relatively low level, and in general<br />

eParticipation objectives have not been fully met. One of the main<br />

reasons identified, why the initiatives fall short on participation, is<br />

the problem of digital divide and social exclusion. We present a<br />

study on eParticipation in municipalities, based on an opinionmining<br />

project in an Irish city. We provide preliminary results and<br />

our conclusions after conducting a specific initiative. We identify<br />

key factors and decisions that have led towards a promising<br />

initiative in the field of eParticipation.<br />

Categories and Subject Descriptors<br />

H.4 [Information Systems Applications]: Miscellaneous<br />

General Terms<br />

Management, Design, Human Factors, Theory<br />

Keywords<br />

public participation, public forum, eParticipation, digital divide<br />

1. INTRODUCTION<br />

Citizen participation is an imperative in every modern<br />

Democracy. For much of the last century, individuals relied very<br />

much on the government regarding policy-making. However, in<br />

the latter part of the twentieth century, citizens’ expectations have<br />

grown such that they could influence more directly government<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Chris Coughlan<br />

Hewlett Packard, Galway, Ireland<br />

chris.coughlan@hp.com<br />

389<br />

Padraic O’Donoghue<br />

Civil Engineering, NUI Galway, Ireland<br />

padraic.odonoghue@nuigalway.ie<br />

Brendan Mulligan<br />

Udaras na Gaeltachta, Ireland<br />

b.omaolagain@udaras.ie<br />

decisions, particularly those that affect their everyday lives [19].<br />

The well-known democracy models such as Liberal, Republican<br />

or classic Aggregative are not sufficient anymore [12].<br />

The Deliberative model, focused on the opinion-formation process<br />

and built over ICT technologies (eParticipation), is considered<br />

possibly the best solution for future policy making. Studies show<br />

that the most effective eParticipation has been performed at the<br />

local government level, especially in municipalities [3].<br />

eParticipation tackles participation challenges and barriers to<br />

support greater citizen engagement [15]. eParticipation provides a<br />

technology-mediated interaction between citizens and the<br />

political/administrative elements of government expected to<br />

influence the decision-making processes [21].<br />

While the development of eParticipation has been rapid in recent<br />

years, it seems that overall citizen participation remains at a<br />

relatively low level, and in general eParticipation objectives are<br />

not fully met. The emphasis mainly on technology excellence<br />

without much attention to greater social inclusion and citizen<br />

engagement resulted in very minor improvements in participation.<br />

According to an OECD report [18], 78% of individuals have a low<br />

interest in policy and/or politics and 48% have a low level of trust<br />

in how the government uses its citizens’ input. Charalabidis [2]<br />

shows that the information dissemination aspect remains a weak<br />

point of most of the participation solutions so that eParticipation<br />

outcomes remain largely unknown to public. A nationwide survey<br />

on eDemocracy among US local governments [4] identified a<br />

number of barriers to eParticipation. The limitations refer mainly<br />

to social inclusion (small and not diverse enough shareholders set,<br />

educational and resources barrier) and digital divide<br />

(unrepresented groups, missing knowledge of technology and no<br />

support). The digital divide and social inclusion problem is<br />

mentioned many times in literature [6, 7, 24]. Multiple studies<br />

show that, in fact, some ICT-based government systems may raise<br />

barriers and create inequalities between digitally-included and<br />

digitally-excluded (who have limited or no access to computers or<br />

to the Internet, or find it difficult to use) citizens. The latter group<br />

is not offered appropriate alternatives and appropriate assistance<br />

to actively contribute to participation. That applies mostly to older<br />

generations and people from rural areas. Studies reveal that in<br />

some instances the use of new technologies does not lead to<br />

greater participation but rather increases the low-value and chaotic<br />

informal communication amongst individuals [9]. Considering the<br />

eParticipation barriers, the literature identifies a number of


success factors for eParticipation[22, 23, 8]: (I) Combining online<br />

with offline channels, (II) Promotion, (III) Usability, (IV) Security<br />

and Privacy, (V) Quality of participation, (VI) Broad stakeholders<br />

set, (VII) Topic and participation complexity, (VIII)Commitment<br />

by the government. The success factors clearly refer to digital<br />

divide (I , V, VI, VII) and social inclusion (II, III, IV, VI, VIII)<br />

identified as the main issues of modern participation.<br />

In this paper, we present a solution that attempts to overcome<br />

many of the eParticipation barriers, following the best practices<br />

and the success factors defined. We focus our approach on the<br />

proper communication channel alignment between citizens and<br />

decision makers. We propose a particular combinationof digital<br />

and non-digital solutions in order to achieve engaged and<br />

sustained participation.<br />

2. CITIZEN OPINION MINING SOLUTION<br />

Galway City has developed a national reputation as ”Grid-lock<br />

City” 1 . The traffic congestion that exists currently in the city has<br />

a negative impact on all those living and working in the city, and<br />

also on the economy of the city and region in terms of attracting<br />

industry, tourism and commercial activity. The Galway Transport<br />

Forum (GalwayTF) has been established as a volunteer initiative<br />

in order to identify a range of implementable short-term traffic<br />

measures that will help alleviate some of the current difficulties.<br />

The core idea behind the innovative solution was to face the<br />

participation barriers, especially in context of social inclusion and<br />

digital divide in order to provide broad and engaged participation.<br />

A diverse set of stakeholders set is one of the key elements<br />

associated with social inclusion. In order to ensure balanced<br />

policy-making process, it is very important to involve major<br />

stakeholder groups, ranging from government officials to ordinary<br />

citizens, at every stage of the eParticipation project [20]. The<br />

visibility and prominent participation of at least one stakeholder<br />

group at many different phases of the initiative is necessary for<br />

successful eParticipation [22]. According to the stakeholder<br />

theory [5], relationships with the stakeholders should be<br />

constantly, and carefully evaluated so the communities who are<br />

participating will engage appropriately. To ensure relevant input<br />

from a broad range of stakeholders, we have assembled a very<br />

diverse initiative group that includes: the Mayor of Galway (2011-<br />

12), Galway Chamber of Commerce, Engineers Ireland - West<br />

Region, representatives of the enterprise sector, academia<br />

(especially civil engineering, social science and computer<br />

science), along with independent volunteers. The need to address<br />

all citizen groups and decision-makers concerned with transport in<br />

Galway has been has reflected in the architecture of our<br />

eParticipation solution.<br />

GalwayTF has been designed to reach possibly wide range<br />

stakeholders and engage diverse groups of citizens. In order to<br />

maximize social inclusion and avoid digital divide, the<br />

architecture of the solution (Fig. 1) follows strictly the<br />

eParticipation best practices such as: ”Combining online with<br />

offline channels”, ”Promotion” and ”Quality of participation”.<br />

Citizens should not be limited or discriminated by any means in<br />

contributing to the initiative, whether it refers to availability of the<br />

technology, their education or resources. Many of citizens are still<br />

in the so-called digitally excluded group, therefore the<br />

1 Galway City Gridlock (24.01.2012): http://bit.ly/zc0LTu<br />

390<br />

eParticipation initiative should involve both online and offline<br />

actions [23]. The online suggestions should be reflected in real<br />

life and the whole process should run in a seamless loop between<br />

the real and online world. At every stage, all the stakeholders<br />

should feel rewarded for their contributions. To achieve this, we<br />

have implemented a digital forum supported by traditional paper<br />

exchange and mainstream media so that none of the citizens<br />

would be missed, especially those not digitally included. Digital<br />

technologies significantly increase access to and the availability of<br />

participation. Moving participation online increases the<br />

confidence of users and in general helps to avoid many of the<br />

common negative feelings that occur in real-life communication<br />

[10]. Online channels work favorably towards the young,<br />

educated and ’tech-skilled’ sector of the population. Solutions are<br />

perceived by this group as much more attractive if they are<br />

advertised online [2, 23, 22]. The digital channels we have been<br />

using include standard approaches such as online surveying and email<br />

in addition to social media frameworks like a discussion<br />

forum and a commenting facility. To ensure high quality input,<br />

the online survey has been specifically prepared and developed by<br />

social scientists and academics from the civil engineering domain<br />

and contains a total of sixteen questions. This survey was intended<br />

to be more detailed than the paper equivalent since online<br />

surveying offers less time pressure. The digitally-included society<br />

represents a high variety of users with different technological<br />

skills, and a significant portion still favors e-mail as their primary<br />

communication channel. The main input apart from the survey<br />

and email has been provided through forum and comments. While<br />

the survey is in principle a one-way communication tool, the other<br />

digital channels are bidirectional providing a wider<br />

communication bus between citizens and decision makers. The<br />

forum has been designed according to ”open, non restricted<br />

discussion” principle highlighted in the literature as crucial for<br />

proper, unlimited and not biased flow of discussions [20]. The<br />

forum has been realized as a blog where everyone is free to post<br />

an idea or a complaint on transportation or post a comment. Each<br />

idea can be voted, also a ranking of most popular contributions<br />

has been provided for greater information browsing capabilities.<br />

Figure 1 GalwayTF solution architecture<br />

Following the ”Usability” principle, the wide Social Media<br />

experience has been expanded by the specially created Facebook<br />

page and a Twitter stream that is synchronized with the forum. All<br />

the posts published on the forum are automatically forwarded to<br />

both social media accounts and the blog streams from both


networks are embedded on the central website. The usefulness and<br />

simplicity of Social Networking Platforms (SNS??P?) interfaces<br />

enabled people to integrate these sites into their daily practices [1]<br />

[14]. The SNS such as Facebook or Twitter have shown a<br />

significant contribution to public life, especially spreading<br />

information about disasters [13] as well as political events [17].<br />

It is argued that these technologies have great potential to provide<br />

on-line information and proper interaction with citizens<br />

Despite, the digital information technologies have been proven to<br />

be superior in many aspects over traditional information channels,<br />

a large group of citizens refrain from contributing in a digital<br />

form. Thus, it is important to ensure that all the individuals have<br />

the capability to participate [16]. This can be referred both to<br />

availability of the information about participation solutions but<br />

also barriers introduced by modern eParticipation tools, limiting<br />

the participation to the ”tech-skilled”. Information dissemination<br />

remains a weak point of most participation solutions. The nondigital<br />

communication channels applied in GalwayTF include<br />

paper surveys and classic media. The classic channels, unlike the<br />

digital, are mainly mono directional with the feedback coming<br />

from the target group. The mainstream media i.e. two local<br />

newspapers and a local radio station were the main dissemination<br />

channels for the initiative. Volunteers were assigned to collect<br />

surveys in some of the key public locations in the city over a four<br />

week timespan. The number of questions of the street survey has<br />

been limited to five so as to not to discourage potential<br />

contributors given that they may be under time constraints.<br />

Social inclusion is very important at the design and development<br />

stage but is also crucial at the maintenance stage of an<br />

eParticipation initiative. It is important to bring all the diverse<br />

stakeholders groups and keep them engaged while running the<br />

initiative. This guarantees sustainability and less biased, more<br />

constructive deliberation. There is a need for a government entity<br />

to remain constantly involved in communication with citizens<br />

[11]. The Mayor of Galway, representing local government, has<br />

been one of the key drivers of the initiative and contributed<br />

towards maintaining the participation and ensuring longer term<br />

viability of the initiative. The ”Topic and Participation<br />

Complexity” is very important both from the social inclusion and<br />

digital divide perspective as the contribution interface should not<br />

introduce a barrier to any citizen regardless the level of education<br />

or personal capabilities to deal with complex in- formation. The<br />

basic assumption of the project was that it should empower<br />

citizens to raise new topics relating to the everyday transportation<br />

problems. Citizens who are well informed via multiple channels<br />

and are aware of the mission of the forum have been able to focus<br />

their inputs to very constructive and informative suggestions. The<br />

interface has been modified and simplified over time to ensure<br />

clarity and functionality. The forum provides an on-line help<br />

section and guidelines facilitating the contributions. The ’contact<br />

us’ section includes technical support links for those experiencing<br />

problems with the interface. The maintenance level tackles also<br />

the ”Privacy and Security” concerns. To encourage citizens to<br />

contribute, multiple digital channels offer different levels of<br />

privacy and security. The surveys are being recorded anonymous<br />

and are specially encoded for greater security. Users while<br />

commenting are asked to provide the email so they can be notified<br />

when someone responds for their message. Posting on the forum<br />

has been reserved only for registered users to facilitate moderation<br />

and spam control. In any case, users are not obliged to provide<br />

their real credentials apart from a valid e-mail address. This<br />

391<br />

ensures a high level of privacy and while not limiting the<br />

participation.<br />

3. RESULTS<br />

The assessment of the results, captured while running the project<br />

from 21 Nov 2011 until 31 Jan 2012, indicates that the expected<br />

range of audience has been reached. In addition, there was<br />

significant engagement with local government officials (the<br />

Galway Transport Unit), the Gardai (Irish police) and public<br />

transport providers. Given the clear objectives and the opportunity<br />

to make a tangible impact, citizens have been actively encouraged<br />

to contribute [20] [8]. This also served to enhance the quality and<br />

relevance of the discussions and attracted people from many key<br />

businesses and organizations in the city. The combination of<br />

digital and non-digital project tools brought satisfactory feedback.<br />

The dissemination process, composed of 6 public announcements,<br />

through mainstream media brought around 2,500 people to the<br />

digital forum and spawned about 1300 contributions. After<br />

detailed semi-automatic (n-gram based), and manual verification<br />

of the results, we have identified almost 40 short term traffic<br />

enhancement measures which, if implemented, will have an<br />

immediate and positive effect on the city traffic. These numbers<br />

certainly show the success of the initiative, taking into<br />

consideration that Galway Urban Area counts only 76,000 people.<br />

The digital part of the initiative benefited significantly from nondigital<br />

dissemination methods. Data logs show great increases in<br />

online participation following each public announcement. The<br />

Social Media reach has been boosted by mainstream media<br />

publishing directly on Facebook and Twitter. In total Facebook<br />

generated over 78,000 impressions referring to our service. The<br />

ratio of 258 digital surveys to 120 paper surveys confirmed the<br />

assumption that more complex online version should not stop<br />

people from detailed contribution. The average time spent online<br />

at level of 10 min confirms also that people tend to sacrifice more<br />

time while contributing online. As expected the digital surveys<br />

were submitted rather by younger audience while the paper<br />

version represents the full spectrum of age groups. The welldisseminated<br />

and effective participation brought broader,<br />

international audience to the forum. We have recorded several<br />

contributions from UK, US and Germany. Recently, the<br />

University of St Andrews in Scotland has expressed their interest<br />

in GalwayTF project and sent a group of students to investigate<br />

our initiative.<br />

4. FUTURE WORK<br />

The possible outcome of the research presented, can be a<br />

multichannel framework for eParticipation that could be easily<br />

applied by local authorities and organizations. Most of the current<br />

eParticipation platforms suffer from over-structured and<br />

controlled discussions which introduce a form of censorship [20].<br />

The framework we propose assumes open discussions, with no<br />

particular constraints on structure (comment can be applied to a<br />

post or other comment). Citizens are free to post their own ideas<br />

and are not limited to discussion topics provided by decision<br />

makers or platform coordinator. Posts are rated and so citizens<br />

are empowered to select key issues and best solutions. In order to<br />

be sustainable, an eParticipation initiative needs to be constantly<br />

maintained and improved, following the best practice suggestions<br />

in the literature [20]. The enhancements are focused on<br />

simplification of the interface, hence providing easier access to<br />

participation. The improvements will be made both to the


structure of the forum as well as the look and feel and some of the<br />

Social Media technologies. The next stage of the project will<br />

bring better integration with Facebook and Twitter (Facebook app<br />

and dedicated Twitter web app). The Semantic Web technologies<br />

will be applied in order to enable easy deliberation data exchange,<br />

more effective discussion data browsing and transparency. We<br />

consider developing a mobile app for greater social inclusion and<br />

live transport reports. We plan to investigate further the impact of<br />

non-digital dissemination methods on the digital part of the<br />

initiative. Ideally we hope to get a dedicated column in a local<br />

newspaper where we could publish the results on a regular basis.<br />

This will help to make the non-digital dissemination more<br />

sustainable. We also consider the use of popular paper leaflets<br />

enriched with QR codes pointing to the relevant sections of the<br />

portal. This way the paper medium can be linked directly to the<br />

digital equivalent.<br />

5. CONCLUSION<br />

Modern digital participation tools, due to sociological<br />

circumstances and dependencies, are not yet an effective<br />

substitutefor the classic solutions and, to the date, are not able to<br />

replace them completely. Instead, the modern digital and nondigital<br />

solutions should be complementary in a seamless loop.<br />

eParticipation, in order to be successful, needs to take what is best<br />

from the traditional communication channels and enrich it with<br />

modern technologies for greater efficiency and range. This<br />

research shows that broad social inclusion is crucial for successful<br />

participation. The presence of key stakeholders from local<br />

government, business, and organizations guarantees constructive<br />

and engaged participation. The multichannel citizen-to-decisionmaker<br />

communication ensures richer and less biased deliberation<br />

where citizens feel rewarded for their contributions and are<br />

willing to participate more.<br />

6. ACKNOWLEDGMENTS<br />

The work supported by SFI under grant number SFI/08/CE/I1380<br />

(Lion 2) and the Cloud4SOA Project under grant 257953.<br />

7. REFERENCES<br />

[1] D. M. Boyd and N. B. Ellison. Social network sites:<br />

Definition, history, and scholarship. Journal of Computer-<br />

Mediated Communication, 13(1), 2008.<br />

[2] Y. Charalabidis, G. Gionis, E. Ferro, and E. Loukis. Towards<br />

a Systematic Exploitation of Web 2 . 0 and Simulation<br />

Modeling Tools in Public Policy Process. Ifip International<br />

Federation For Information Processing, pages 1–12, 2010.<br />

[3] C. Colombo. e-Participation Experiences and Local<br />

Government in Catalonia : An Explanatory Analysis. Ifip<br />

International Federation For Information Processing, pages<br />

82–94, 2010.<br />

[4] Department of Economic and Social Affairs Division for<br />

Public Administration and Development Management. E-<br />

Participation and E-Government: Understanding the Present<br />

and Creating the Future. Group, (July 2006), 2007.<br />

[5] R. E Freeman. Strategic management: A stakeholder<br />

approach, volume 1. Pitman, 1984.<br />

[6] eEurope Advisory Group. e-Inclusion:New challenges and<br />

policy recommendations. Current, 2005.<br />

392<br />

[7] J. B. Horrigan. On Demand Citizens: e-government at high<br />

speed. Pew Internet & American Life Project, 2005.<br />

[8] Z. Huang and L. Brooks. Evaluating Usability of Web-Based<br />

Electronic Government : Users Perspective. pages 456–465,<br />

2011.<br />

[9] M. S. Islam and S. Business. Towards a sustainable e-<br />

Participation implementation model. October, (October):1–<br />

12, 2008.<br />

[10] A. Joinson. The Oxford handbook of Internet psychology.<br />

Oxford handbooks. Oxford University Press, 2007.<br />

[11] M. M. Kamal. An analysis of e-Participation research:<br />

moving from theoretical to pragmatic viewpoint.<br />

Transforming Government: People, Process and Policy,<br />

3(4):340–354, 2009.<br />

[12] R. Kies. Promises and Limits of Web-deliberation. Palgrave<br />

Macmillan, 2010.<br />

[13] J. Kuzma. Asian government usage of web 2.0 social media.<br />

European Journal of ePractice (9). pp. 1-13. ISSN 1988-<br />

625X, 2010.<br />

[14] M. Lane and P. Coleman. Technology ease of use through<br />

social networking media. Journal of Technology Research,<br />

2010.<br />

[15] A. Macintosh. Characterizing e-participation in policymaking.<br />

Annual Hawaii International Conference on System<br />

Sciences (HICSS’04) - Track 5 - Volume 5, Washington,<br />

DC, USA, 2004. IEEE Computer Society.<br />

[16] A. Macintosh. Challenges and barriers of eParticipation in<br />

Europe? 2007.<br />

[17] E. Monte Lutz, SVP-Digital Public Affairs. The social pulpit.<br />

Edelman, 2009.<br />

[18] Public engagement for Better Policy and Services. OECD<br />

Studies on Public Engagement, 2009.<br />

[19] N. Roberts. Public Deliberation in an Age of Direct Citizen<br />

Participation. The American Review of Public<br />

Administration, 34(4):315–353, Dec. 2004.<br />

[20] J. Rose and O. y. Sæ bø. Designing Deliberation Systems.<br />

The Information Society, 26(3):228–240, May 2010.<br />

[21] O. Sabo, J. Rose, and L. Skiftenesflak. The shape of<br />

eParticipation: Characterizing an emerging research area.<br />

Government Information Quarterly, 25(3):400–428, July<br />

2008.<br />

[22] O. y. Sæ bø, L. S. Flak, and M. K. Sein. Understanding the<br />

dynamics in e-Participation initiatives: Looking through the<br />

genre and stakeholder lenses. Government Information<br />

Quarterly, 28(3):416–425, July 2011.<br />

[23] S. Scherer and M. A. Wimmer. A Regional Model for E-<br />

Participation in the EU : Evaluation and Lessons Learned<br />

from VoicE. Ifip International Federation For Information<br />

Processing, pages 162–173, 2010.<br />

[24] Carnegie UK Trust. Futures for civil society, 2007.


Studying Chinese Government Microblogs: Content and<br />

Interactions<br />

Tuo Zheng<br />

Department of Public Administration, Fudan University<br />

619 Wenke Building, 220 Handan Road, 2000433<br />

Shanghai, China<br />

+86 13917687422<br />

10110170039@fudan.edu.cn<br />

ABSTRACT<br />

This paper selects ten Chinese government microblogs at different<br />

levels, in different regions and different departments for studying<br />

their content and interactions. Specifically, it observes and<br />

analyzes messages’ number, message content, message types,<br />

message forms, message sources, directing, language styles,<br />

relevant stakeholders, and associated levels, attitude of comments,<br />

commenter’s types, and government responses. Based on the<br />

research findings, the paper provides some policy<br />

recommendations for government.<br />

Categories and Subject Descriptors<br />

C.2.3 Network Operations<br />

General Terms<br />

Management, Measurement, Performance<br />

Keywords<br />

Government institution microblog; Content; Interaction<br />

1. INTRODUCTION<br />

Microblogs is a network community based on huge grassroots netusers,<br />

which is also one of the social media tools. Many<br />

researches show that government can improve its transparency,<br />

enhance the interaction with citizens, keep on tracking with public<br />

opinions and so on by using microblogs.<br />

Statistical analysis and case study are used in this paper, which<br />

selects ten different Chinese government institutional microblogs<br />

at different levels, in different regions, and in different<br />

departments as the research objects.<br />

First, this paper will review the literature about social media.<br />

Second, the paper will introduce research methods and findings.<br />

Finally, based on the findings, we will provide some advices and<br />

recommendations for government.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

393<br />

Lei Zheng<br />

Department of Public Administration, Fudan University<br />

619 Wenke Building, 220 Handan Road, 200433<br />

Shanghai, China<br />

+86 13501838298<br />

zhengl@fudan.edu.cn<br />

2. LITERATURE RIEVIEW<br />

2.1 Defining Social Media<br />

Social Media has been defined in a number of ways; some are<br />

more technology oriented, and others are more about what they<br />

can enable.<br />

Hansen (2011) points put the social media is a set of online tools<br />

that are designed for and centered around social interaction. In<br />

practice, social media serves as a catchall phrase for a<br />

conglomeration of web-based technologies and services such as<br />

blogs, microblogs (i.e., Twitter), social sharing services (e.g.,<br />

YouTube, Flickr, StumbleUpon, Last.fm), text messaging,<br />

discussion forums, collaborative editing tools (e.g., wikis), virtual<br />

worlds (e.g., Second Life), and social networking services (e.g.<br />

Facebook, MySpace) [8]. Besides, Kaplan (2010) defines social<br />

media as a social structure in which technology puts power in<br />

communities, not institutions, as well as a set of open, web-based<br />

and user-friendly applications that enable users to network, share<br />

data, collaborate and co-produce content [12].<br />

In an attempt to delimit a set of characteristics of based on<br />

properties, Spannerworks outlines some defining characteristics of<br />

social media [17]:<br />

(1) Participation: Social media encourage contributions and<br />

feedback from everyone interested, blurring the line between<br />

media and audience.<br />

(2) Openness: Most social media services are open to feedback<br />

and participation. They encourage voting, comments, and sharing<br />

of information. There are rarely any barriers to accessing and<br />

making use of content.<br />

(3) Conversation: Whereas traditional media is about broadcast,<br />

content transmitted or distributed to an audience, social media are<br />

better seen as conversational, two-way interaction channels.<br />

(4) Community: Social media allow communities to be formed<br />

quickly and communicate effectively around common interests.<br />

(5) Connectedness: Most kinds of social media thrive in their<br />

connectedness, exploiting hyperlinks and combining different<br />

kinds of media in one place.<br />

2.2 Government and Social Media<br />

Social media can be considered a disruptive technology for<br />

government, creating “disruptive innovation” in the digital


government as well as augmenting digital government with better<br />

services and management [10].<br />

These social network systems allow large scale distributed<br />

collaboration, information sharing and creation of collective<br />

intelligence in government areas at all levels from local to federal.<br />

Governments are facing unprecedented transparency requirements<br />

and openness, further encouraged through electronic grassroots<br />

mobilizations using social technology [15]. In U.S., Andrew<br />

Krzmarzick (2012) identified five levels of social use in Federal<br />

Government; 1) Informed Decision Making, 2)Communicate with<br />

Citizens and Other Agencies, 3) Internal Collaboration, 4)<br />

Research/Information Gathering and 5) Marketing and Promotion<br />

[16].<br />

NASCIO investigated the challenges of the state government<br />

using the social media in 2010. The outcome shows the main<br />

challenges are as follow: terms of service, privacy, records<br />

management, legal issue and so on. Meanwhile, Center for<br />

Technology in Government (CTG, State University of New York<br />

at Albany) conclude the value of social media for the government:<br />

greater competitiveness in employee recruiting, enhanced access<br />

for the disabled, creation of virtual communities, instantaneous<br />

information sharing, enhanced collaboration, enhanced public<br />

safety, information dissemination and exchange, “Coolness”<br />

factor, improved training capabilities, cost saving and so on.<br />

Meanwhile, they also conclude issues and concerns with using<br />

social media: legal and regulatory ramifications, security,<br />

accessibility, information overload, and so on [3]. Through<br />

empirical research, CTG also conclude eight essential elements to<br />

help the government to design social media policies: employee<br />

access, account management, acceptable use, employee conduct<br />

and so on [9].<br />

A paper named “Twitter Use by the U.S. Congress” focuses on<br />

how the government uses Twitter as a social media tool to interact<br />

with citizens, and the main object of study is the message issued<br />

by U.S. Congressman [11]. The research shows that the<br />

congressman using Twitter as a tool to issue the information and<br />

daily activities about themselves. Although, using of Twitter<br />

provides a channel to let the congressman and citizen<br />

communicate directly, it can't improve the government and<br />

legislative processes' transparent. From another view, Wigand<br />

(2010) demonstrated that government organizations in the U.S.<br />

promote their policies by using Twitter, suggesting that Twitter<br />

can help organizations to share essential information with the<br />

public effectively and induce the public (the ultimate beneficiaries)<br />

to participate in new projects [19].<br />

2.3 Opportunities for using Social Media in<br />

Government<br />

Web 2.0 technologies exploit Internet connectivity to support<br />

networking of people and information [13]. The impact of social<br />

media use in governments includes increased transparency and<br />

participation of citizens in decision-making and more<br />

collaboration between agencies [4].<br />

The ideas that democratic governments should be open, accessible,<br />

and transparent to the governed are not new ones, but they are<br />

receiving renewed emphasis through the combination of<br />

government reform efforts and the emergence of Web 2.0 social<br />

media tools that promote information sharing, integration, and<br />

public discourse [5].<br />

394<br />

In the broader domain of technology use in government social<br />

media bring forward a sense of modernization through the<br />

innovative interaction patterns they enable, and thus indeed<br />

challenge existing ways of work. The adoption and use of social<br />

media are overcoming a number of barriers at the level of<br />

technology, organizations as well as culture [6].<br />

2.4 Government’s Institutional Microblogs in<br />

China<br />

In China, a great number of government microblog accounts have<br />

been opened and run by Chinese government agencies to foster<br />

government information disclosure, public service and citizen<br />

participation after 2010. According to the Chinese Government<br />

Microblogs Assessment Report of 2011, published by the China<br />

National School of Administration, by the end of 2011, the total<br />

numbers of Chinese government microblog accounts exceeded<br />

50,000.<br />

A report named "Research of China Government's Institutional<br />

Microblogs" was issued in April 2011 by Public Topic Net<br />

(www.pubtopic.org) and Fudan University Public Opinion and<br />

Communication Research Lab. The report's data show the number<br />

of microblogs owned by non-government organizations is more<br />

than that of government officials' individual microblogs;<br />

governments in the south area of China has a stronger motivation<br />

to open a microblog account; the microblogs of police agencies<br />

are more service oriented. Furthermore, the report summarizes<br />

that microblogs have a significant effectiveness in promoting<br />

information sharing, collecting public opinions, improving public<br />

service and so on [14].<br />

Several scholars focus on studying on the use status and<br />

characteristics of government institutional microblogs. Bin Wang<br />

(2011) used the comparative study method to compare foreign and<br />

Chinese government's institutional microblogs. Chinese<br />

government is much more hesitant on developing institutional<br />

microblogs, and lack strategic development planning.[1]<br />

Yingxuan Dong (2011) concludes the features of government<br />

institutional microblogs are effectiveness, authority, convenience,<br />

grassroots, humanity, interactive, and inclusiveness. He thinks the<br />

institutional microblogs have important effect on information<br />

disclosure; public-service delivery; responding to citizens'<br />

questions and so on [22]. Several scholars studied several cases<br />

with an emphasis on the effect of microblogs in emergencies . The<br />

microblogs can improve the efficiency of information sharing,<br />

disseminate information to the public immediately, which has<br />

significant effect during emergency events [2][20][21]. Wanbao<br />

Gui (2011) used the Sina Weibo as a case, and collected 584<br />

messages from government institutional microblogs in a particular<br />

time period. He found that east-area governments are more<br />

positive on developing microblogs than the west; the higher of the<br />

government level, the fewer institutional microblogs exist; the<br />

majority of institutional microblogs belong to judicial departments<br />

[18].<br />

2.5 Research Gap<br />

According to the literature, many governments in the western<br />

countries take initiatives to use social media as the tools to<br />

communicate with the citizens and improve the governance<br />

ability. The experiences they gained could provide useful lessons<br />

for the Chinese government. In China, the governments also<br />

realize the importance of social media. Many Chinese scholars


also focus on the research of social media and government. Due to<br />

the research<br />

of government institutional microblogs, most of the papers in<br />

China have just conducted descriptive study, and we did not found<br />

any papers that study in-depth the content and interactions on<br />

government microblogs as well as their implications. This paper<br />

attempts to fill up this gap.<br />

3. RESEARCH METHOD<br />

The study explores the applications of government institutional<br />

microblogs, focusing on the interaction between government and<br />

citizens. The main methods are case study, observation, and<br />

content analysis.<br />

3.1 Cases Selected<br />

Government institutional microblogs for study are selected from<br />

the government category of the most influential microblog<br />

operator in China, which are called Sina Weibo. Various<br />

microblogs are selected to include microblogs run by police<br />

department, transportation department, municipal department and<br />

other government agencies, and to cover different levels of<br />

government, different regions, and different departments.<br />

“Influence” and "the number of followers" are also considered in<br />

choosing these microblogs.<br />

At last, ten different government institutional microblogs are<br />

selected, "Weibo Yunan", "Weibo Hebei", "Weibo Yinchuan",<br />

"Jinshan Communication", "The People's Government of Taoyuan<br />

County", "Weibo Ninghai", "Sichuan Transportation", "Civilized<br />

Hefei", "The People's Procuratorate of Hubei" and "Peace<br />

Southern-Guangdong". Two of them are provincial government<br />

microblogs, two are municipal government microblogs, two are<br />

county government microblogs, and four are government<br />

department microblogs, which covers the east, middle and west<br />

regions of China.<br />

3.2 Data Analysis Methods<br />

All messages posted during May 30, 2011 (0:00 AM) to June 5,<br />

2011 (0:00 PM) are collected from the ten selected government<br />

institutional microblogs. At last, 206 messages are studied. The<br />

coding and analytical framework of this study is designed after<br />

conducting four focus-group discussions with 80 government<br />

employess who work at different levels in Shanghai Municipal<br />

Government. Specific aspects are analyzed and coded such as<br />

messages’ number, message content, message types, message<br />

forms, message sources, directing, language styles, relevant<br />

stakeholders, associated levels, attitudes of comments,<br />

commenter’s types, and government responses (See Table 1). The<br />

processed data are then analyzed with descriptive statistics and<br />

cross-tab methods by using the software of SPSS.<br />

4. FINDINGS:STATISTICAL RESULTS<br />

4.1 Messages’ Number<br />

The table 2 shows the number of messages issued by each<br />

government institutional microblogs in the selected seven days.<br />

The number of “Weibo Yinchuan”’s messages are 60, accounting<br />

for 29.1% of all the messages. The least number of messages are<br />

2, which are issued by “The People's Government of Taoyuan<br />

County”.<br />

395<br />

Table 2: Messages’ number<br />

4.2 Message Content<br />

The message contents can be divided into four categories,<br />

Name Quantity Percentage<br />

Weibo Yinchuan 60 29.1<br />

Peace Southern-Guangdong 29 14.1<br />

Sichuan Transportation 25 12.1<br />

Weibo Ninghai 18 8.7<br />

Weibo Yunan 17 8.3<br />

Weibo Hebei 15 7.3<br />

The People's Procuratorate of<br />

Hubei<br />

14 6.8<br />

Jinshan Communication 13 6.3<br />

Civilized Hefei 13 6.3<br />

The People's Government of<br />

Taoyuan County<br />

2 1.0<br />

Total 206 100.0<br />

including Government Message; Public Service Message;<br />

News and Interaction Message. This categorization is nonexclusive,<br />

which means one message could be categorized into<br />

several categories. Specifically, the Government Message refers<br />

to messages for the internal purposes of government; the Public<br />

Service Message mainly contains the news like weather forecast,<br />

healthy advices and so on. The "News" covers the generic field<br />

and all recent events in society are included. Interaction Message<br />

is divided into four different levels, including Question<br />

Answering Message, Explaining Message, Comments Message<br />

and Advices Collecting Message. There are 88 Government<br />

Messages in the collected data, accounting for 42.7%; There are<br />

76, 50 and 40 News, Public Service Messages and Interaction<br />

Message respectively, accounting for 36.9%, 24.3% and 19.4%.<br />

The data show that most of the messages issued by government<br />

institutional microblogs mainly focus on the government’s<br />

internal business rather than on the public services and<br />

interactions with citizens.<br />

As mentioned above, the Interaction Message is divided into<br />

Question Answering Message, Explaining Message, Comments<br />

Message and Advices Collecting Message. The “Question<br />

Answering Message” means the government can answer citizens’<br />

questions through the Microblogs’ platform directly; The<br />

“Explaining Message” means the government can explain some<br />

specific questions; The “Comments” means the microblog site is<br />

also a platform for the government to make comments on some<br />

social events; The “Advices Collecting Message” means the<br />

government uses the microblog platform to collect comments and<br />

advices from the citizens. In the 40 Interaction Messages, the<br />

Comments Message accounts for 20 messages of all the<br />

Interaction Messages. The following is the “Question Answering<br />

Message”, the “Advices Collecting Message”, and the<br />

“Explaining Message”, occupied for 5, 3 and 2 messages. We can<br />

obviously find that the government doesn’t fully use the<br />

microblog’s available features to interact with citizens.


Figure 1: Message content<br />

4.3 Message Types<br />

Message types are divided into “Routine Message”, “Live<br />

Message” and “Emergency Message”. “Routine Message” means<br />

the regularly news published by the government, like the<br />

government's recent work, the news of government's projects.<br />

"Live Message" is the live webcast message concerned about the<br />

government's activities. "Emergency Message" is about the<br />

emergency events issued by the government, such as floods,<br />

hurricane. According to the collected data, the most number is<br />

“Routine Message”, 164, accounting to 79.6%. The least number<br />

is “Emergency Message”, accounting to 1.5%.<br />

Table 3: Message types<br />

Type Quantity Percentage<br />

Routine Message 164 79.6<br />

Live Message 39 18.9<br />

Emergency Message 3 1.5<br />

Total 206 100.0<br />

4.4 Message Forms<br />

During the observation, Message Forms are composed as<br />

following: "text", "picture", "music", "video", "link", "cartoon".<br />

Sometime, one Message is composed by several forms. The 203<br />

message contains the form of “text”, accounting for 98.5%. The<br />

message contains the forms of "picture", "cartoon", "link", and<br />

"video" separately accounting for 51, 46, 35, and 6. There is no<br />

message using the form of “music”.<br />

396<br />

Figure 2: Message forms<br />

4.5 Message Sources<br />

Message Sources is divided into three categories, “Spontaneous<br />

Message” means the message is issued by the government;<br />

“Forwarding Message with Comments” means the message is<br />

forward from other’s microblog with the government’s comment;<br />

“Forwarding Message without Comments” means the message is<br />

forward from other’s microblog without the government’s<br />

comment;. According to the collected data, the most number is the<br />

“Spontaneous Message”, 150, accounting for 72.8%. “Forwarding<br />

Message with Comments” and “Forwarding Message without<br />

Comments” just has 39 and 17.<br />

Figure 3: Message sources<br />

4.6 Directing<br />

The one of application of Sina Weibo is to use the “@” function<br />

to push the message to particular user directly, which could<br />

enhance the efficiency of information sharing. From the data,<br />

there are just two messages using the function.<br />

Table 4: Directing<br />

Yes or No Quantity Percentage<br />

Yes 2 1.0<br />

No 204 99.0<br />

Total 206 100.0


Facets Codes/categories<br />

Table 1. Multifaceted Coding Schema<br />

Messages’ Number The Total Number of Messages’ posted within 7 days<br />

Message Content Government Message; Public Service Message; News; Interaction Message<br />

Message Types Routine Message; Emergency Message; Live Message<br />

Message Forms Text; Picture; Music; Video; Links; Cartoon<br />

Message Sources Spontaneous Message; Forwarding Message with Comments; Forwarding Message without Comments<br />

Directing<br />

Language Styles<br />

Yes or No. It refers to the use of directing with the function of @ to direct a message to a specific<br />

individual or institution<br />

Formality, Humanity. The former refers to formal, official and rigid language styles, and the latter refers to<br />

lively, sentient and human expressions<br />

Relevant Stakeholders Government; Enterprise; Social Organizations; Medias; Society; Individuals<br />

Associated Levels<br />

Attitude of comments<br />

Message related to higher jurisdictions, governments and departments; Message related to local<br />

jurisdictions, governments and departments; Message related to other jurisdictions , governments and<br />

departments at the same level; Message related to lower jurisdictions, governments and departments;<br />

Message for generic levels<br />

Positive, Negative or Neutral. It refers to the attitude and manner indicated in the comments made by<br />

readers<br />

Commenter ‘s Types Individuals; Organizations<br />

Government Responses Yes or No. It refers to whether government responses to comments made by readers<br />

4.7 Language Styles<br />

According to the styles of the language, the message is divided<br />

into "Humanity" and "Formality". According to the data, the<br />

“Formality” style message is 166, accounting for 80.6%, which<br />

means the “Humanity” style message accounting for 19.4%. The<br />

data shows that the government institutional microblogs' message<br />

language style is too formal, which maybe lack of the humanity.<br />

Figure 4: Language styles<br />

4.8 Relevant Stakeholders<br />

According to the observation, the message is related to different<br />

stakeholders, like the government, the enterprise, the individuals,<br />

and some of the message is related several stakeholders at one<br />

time. From the data, 144 of message are related to the government,<br />

and 80 related to the society, 22 to the individuals, 13 to the<br />

enterprise, and 10 to the media.<br />

397<br />

Figure 5: Relevant stakeholders<br />

4.9 Associated Levels<br />

From the observation, the associated levels are divided into<br />

“higher jurisdictions, governments and departments”, “local<br />

jurisdictions, governments and departments”, “other jurisdictions,<br />

governments and departments at the same level”, “lower<br />

jurisdictions, governments and departments”, “generic levels”.<br />

According to the data, the 177 of message are related to “local<br />

jurisdictions, governments and departments” level, accounting for<br />

56.8%; the message related to “lower jurisdictions, governments<br />

and departments” level is 54, accounting for 26.2%; the message<br />

related to “generic levels” is 31, accounting for 15%; No message<br />

is related to the “other jurisdictions, governments and departments<br />

at the same level” level.


Figure 6: Associated levels<br />

4.10 Attitude of Citizens’ Comments<br />

Among 206 messages, 174 of them were commented by the netusers,<br />

accounting for 84.5%. According to the observation of each<br />

comment, 11 comments are negative, accounting for 5.3% in the<br />

174. 144 comments are positive, accounting for 68%.<br />

Table 5: Attitude of comments<br />

Positive or Negative Quantity Percentage<br />

Positive 11 5.3<br />

Negative 140 68.0<br />

Neutral 23 11.2<br />

Total 174 84.5<br />

4.11 Commenter’s Types<br />

In the 174 comments, 173 comments are issued only by individual<br />

users, 47 comments are issued only by organizations. Some of the<br />

comments are issued by the individuals and organizations both.<br />

Figure 7: Commenter’s types<br />

398<br />

4.12 Government Responses<br />

We also observe whether the government explain or response the<br />

users’ question, criticism and comment or not. Among the 206<br />

messages, 45 messages received government responses,<br />

accounting for 21.8%, and all responses are positive to explain the<br />

net-users’ question.<br />

Table 6: Government responses<br />

Government Responses Quantity Percentage<br />

Yes 45 21.8<br />

No 161 78.2<br />

Total 206 100.0<br />

5. FINDINGS:THE CROSS-TAB<br />

ANALYSIS RESULTS<br />

5.1 Crossed-tab Analysis between Message<br />

Sources and Message Types<br />

From the outcome of crossed-tab analysis between Message<br />

Sources and Message Types, the “Routine message” and “Live<br />

message” account for most part of the three message sources. The<br />

only three “Emergency messages” just issued by the government’s<br />

“Spontaneous message”.<br />

Figure 8: Crossed-tab analysis between message sources and<br />

message types<br />

5.2 Crossed-tab Analysis between Message<br />

Sources and Associated Levels<br />

From the outcome of crossed-tab analysis between Message<br />

Sources and associated levels, the message related to the “Local<br />

jurisdictions, governments and departments” level are extremely<br />

obvious in the governments’ “Spontaneous Message”, which<br />

means the governments are more active in dealing with the local<br />

information.


Figure 9: Crossed-tab analysis between message sources and<br />

associated levels<br />

5.3 Crossed-tab Analysis between Message<br />

Sources and Message Contents<br />

From the outcome of the crossed-tab analysis between Message<br />

Sources and Message Contents, in the “Spontaneous message”<br />

category, the “Government message” and “News” are obviously<br />

accounted the most part, accounting for 80%, and the “Interaction<br />

message” is accounted the least part; in the “Forwarding message<br />

with Comments” category, “the Interaction message” is accounted<br />

the most part, and the “Government message” is accounted the<br />

least part; in the “Forwarding message without Comments”<br />

category, the “Public Service message” is accounted the most part,<br />

accounting for 44%.<br />

Figure 10: Crossed-tab analysis between message sources and<br />

message contents<br />

5.4 Crossed-tab Analysis between Message<br />

Types and Relevant Stakeholders<br />

The Figure 11 shows the relationship between Message Types and<br />

Relevant Stakeholders. According to the analysis, the “Routine<br />

Message” related to the “government” is obvious higher than other<br />

groups. But the message related the “Society” is higher than others<br />

in the “Emergency Message” and “Live Message”. In a word, the<br />

“Routine Message” pays more attention to the “Government”, and<br />

the “Emergency Message” and “Live Message” pays more<br />

attention to the “Society”.<br />

399<br />

Figure 11: Crossed-tab analysis between message types and<br />

relevant stakeholders<br />

5.5 Crossed-tab Analysis between Message<br />

Types and Message Content<br />

From the outcome of crossed-tab analysis between Message Types<br />

and Message Content, the “Government Message” and “News” are<br />

the most in the “Routine Message”. But the “News” is the most in<br />

the “Live Message”.<br />

Figure 12: Crossed-tab analysis between message types and<br />

message content<br />

6. DISCUSSIONS AND IMPLICATIONS<br />

We will discuss possible reasons and effects of findings in this<br />

section. Furthermore, based on above findings, we wil provide a<br />

number of suggestions to the Chinese government agencies as<br />

follow:<br />

6.1 Improve the Interaction with Citizens<br />

Government institutional microblogs could improve the speed of<br />

government information, and provide new channels for the<br />

interaction between government and citizens. The citizens can ask<br />

questions to the government through the microblogs directly,<br />

meanwhile the government also can answer and reply to the<br />

citizens immediately in the microblogs platforms, which can


improve the government management efficiency, reduce the<br />

administrative costs and provide more convenience to the citizens.<br />

From the practice effect and data, the interactions in the Chinese<br />

government institutional microblogs are still in the insufficient<br />

level. In the all collected 206 message, only 45 of message got the<br />

response from the government. There are also some defects in the<br />

area of improving the communication efficiency on the<br />

government institutional microblogs, for example, just two<br />

messages use the function of directing, which can improve the<br />

speed of information sharing and point to point information<br />

forwarding. In addition, compared with the "spontaneous<br />

message", most of them are "government message", and the<br />

"interaction message" accounts a little. In the "interaction<br />

message", the total number of "question answering message",<br />

"explaining message" and "advices collecting message" are ten,<br />

accounting for 0.05%. There is more "interaction message" in the<br />

"forward message" category.<br />

Through the number of "spontaneous message", it seems that<br />

Chinese government agencies hope to use microblogs to enhance<br />

the publicity effect. But during the process of interaction, most of<br />

the government chooses to keep silence in order to avoiding the<br />

possible misunderstanding. However, the government agencies<br />

add more comments on the "forward message", which are less<br />

relevant with their own department. In addition, although it's not<br />

yet the mainstream way to interact with citizens though<br />

microblogs, the influence of microblogs will be more and more<br />

important with the number of users' rising.<br />

6.2 Increase the Transparency<br />

For the citizens, the government institutional microblogs play an<br />

important role on the area of improving the government<br />

information transparency. According to the data, the government<br />

institutional should enhance the ability of government information<br />

transparency.<br />

Before exploring the issue of government transparency, there are<br />

two conceptions needed to be clearly defined, which are<br />

“Government Transparency” and “Government Outreach”.<br />

Government Outreach means the government provides specific<br />

information to particular groups. However, government<br />

transparency is the government provides more transparent<br />

information to the citizens and enhance citizens’ the ability to<br />

question government. One scholar mentioned(Felten,2009):<br />

“Outreach means government telling us what it wants us to<br />

hear; transparency means giving us the information that we, the<br />

citizens, want to get.”[7]<br />

According to the different nature of messages, the research divided<br />

the message contents into four categories, including Government<br />

Message; Public Service Message; News and Interaction Message.<br />

Government Message and News account for most of the numbers<br />

in the all 206 messages. As we have analyzed, Government<br />

Message and News are more related to government outreach, and<br />

can’t improve the government transparency directly and<br />

effectively. Public Service Message and Interaction Message are<br />

the information what the citizens hope to be provided, but account<br />

for lower percentage in practice according to our study.<br />

6.3 Enhance the Public Services<br />

The data also shows that the government institutional microblogs<br />

pay much attention to the inner government issues and ignore<br />

400<br />

services to the outside public. According to the date analysis on<br />

the topic of "Relevant Stakeholders ", messages related to the<br />

government itself is more than 114, and the number related to the<br />

outside Enterprise, Media and Individuals is less than 30. In other<br />

words, the function of government to serve the citizens are<br />

seemingly ignored, and obviously this approach won’t improve<br />

effectively the interaction between government and citizens.<br />

From the analysis on "Message Content", Chinese government<br />

institutional microblogs issued more Government Messages and<br />

News and less Public Service Messages and Interaction Messages.<br />

In terms of "Message Types", the Daily Messages are more than<br />

Live Messages and Emergency Messages. Thus, it seems that<br />

current Chinese government institutional microblogs are used<br />

more for issuing daily government Messages and news through the<br />

new technical platform, and doesn't fully utilize other functions of<br />

microblogs, such as instant interaction to provide public services.<br />

6.4 Prevent Microblogs from Becoming a<br />

"Mini Government Websites"<br />

From the analysis on the type of "Message Forms" and "Language<br />

Style", most of the messages and interactions are too formal and<br />

has too much "Text". Many Chinese government institutional<br />

microblogs are used more like “a mini government websites”, and<br />

doesn’t fully take advantage of some unique features of<br />

microblogs as a Web 2.0 tools to interact with citizens. Therefore,<br />

we would like suggest Chinese government agencies to understand<br />

and utilize microblogs more comprehensively and interactively to<br />

enhance public services.<br />

7. CONCLUSION AND FUTURE STUDY<br />

This research studies the government institutional microblogs run<br />

on Sina Weibo, the most influential microblog operator in China,<br />

and ten government institutional microblogs at different levels, in<br />

different regions and different departments are selected for<br />

studying their content and interactions. The study indicates that<br />

government microblogs indeed provide a new interactive platform<br />

to the government and citizens. However, the study also finds that<br />

most messages on government microblogs are Government<br />

Messages and News, and only a few of them are Public Service<br />

Messages and Interactive Messages, which means that the<br />

government institutional microblogs are still used more as a<br />

government outreach platform rather than a service and interaction<br />

platform. Meanwhile, the study finds that government doesn't fully<br />

use the functions of microblog to post Emergency Messages and<br />

Live Messages. Most citizens have positive attitude towards<br />

government institutional microblogs. But compared with their<br />

attitude, government's responses are scarce and have only low<br />

level interactions with citizens, especially when facing questions<br />

and criticism from citizens.<br />

The paper has also some limitations. This paper only selected ten<br />

representative government institutional microblogs as case study,<br />

and the future research could further expand the same sizes and do<br />

more in-depth studies.<br />

8. REFERENCES<br />

[1] Bin. W, Government Communication 2.0: the Application and<br />

Conception of Microblogs, New Media, 2011:4, 47


[2] Bing. Z. and Jinhua. Z, How the Government response during<br />

the Crisis as the View of Microblpgs' Features, News World,<br />

2010:9(1), 151<br />

[3] Center for Technology in Government, Exploratory Social<br />

Media Project, 2009, 14<br />

[4] D. Osimo, Web 2.0 in Government: Why and How? Institute<br />

for Prospective Technological Studies, European Commission,<br />

JRC Scientific and Technical Report, 2008<br />

[5] Dawes, S. S, Information Policy Meta-Principles: Stewardship<br />

and Usefulness. Paper presented at the 43rd Hawaii International<br />

Conference on System Sciences (HICSS-43), Koloa, Kauai, HI,<br />

2010: 5-8 January<br />

[6] Eleni. R. S. and Dimitris. G., Socializing E-governance: A<br />

Parallel Study of Participatory E-governance and Emerging Social<br />

Media, Comparative E-government, Integrated Series in<br />

Information Systems, 2010, Volume 25, Part 3, 543-<br />

559, DOI: 10.1007/978-1-4419-6536-3_28<br />

[7] Felten, E, Government online: Outreach vs. transparency,<br />

http://freedom-to-tinker.com/blog/felten/government-onlineoutreach-vs-transparency,<br />

Retrieved 2010-3-25<br />

[8] Hansen, D. L., Shneiderman, B., & Smith, M. A., Analyzing<br />

social media networks with NodeXL: Insights from a connected<br />

world. Burlington, MA: Morgan Kaufmann, 2011<br />

[9] Jana. H. Natalie.H. and Catherine. S. P, Designing social media<br />

policy for government: Eight essential elements, Center for<br />

Technology in Government,<br />

http://www.ctg.albany.edu/publications/guides/social_media_polic<br />

y/social_media_policy.pdf, Retrieved 2011-2-3<br />

[10] Joseph. L. B. and Clayton. M. C., Disruptive Technologies:<br />

Catching the Wave, Harvard Business Review, January February<br />

1995<br />

[11] Jennifer. G., Justin M. G., and Anthony R. Twitter Use by the<br />

U.S. Congress, Journal of the American society for information<br />

science and technology, 2010:61(8),1612-1621<br />

[12] Kaplan. Andreas M. and Michael. H, Users of the world,<br />

unite! The challenges and opportunities of Social Media, Business<br />

Horizons, 2010:53 (1): 59–68. ISSN 0007-6813<br />

[13] Luis. M. C. and Hamideh. A., A Modeling Framework for<br />

Collaborative Networked Organizations”, IFIP International<br />

Federation for Information Processing, 2006:3(14)<br />

[14] Public Topic Net (www.pubtopic.org) and Fudan University<br />

Public Opinion and Communication Research Lab, Research of<br />

401<br />

China Government's Institutional Microblogs,<br />

http://www.hudong.com/wiki/%E3%80%8A%E4%B8%AD%E5<br />

%9B%BD%E6%94%BF%E5%8A%A1%E5%BE%AE%E5%8D<br />

%9A%E7%A0%94%E7%A9%B6%E6%8A%A5%E5%91%8A%<br />

E3%80%8B, Retrieved 2011-6-3<br />

[15] Soon, A.C., Stuart, S., Rodrigo, S., and Eduard, H.,<br />

Government 2.0: Making connections between citizens, data and<br />

government, Information Polity 15, 2010: 1–9,DOI 10.3233/IP-<br />

2010-0205 IOS Press<br />

[16] Slids Share, The State of Social Media in Government,<br />

http://www.slideshare.net/govloop/the-state-of-social-media-infederal-government-april-2012,<br />

Retrieved 2012-4-29<br />

[17] Spannerworks, What is social media?<br />

http://www.spannerworks.com/ebooks, Retrieved 2009-5-10<br />

[18] Wanbao, G. the Analysis of Government Institutional<br />

Microblogs Characteristics--Based on Sina Weibo, New Media,<br />

2011:176(3), 159<br />

[19] Wigand, F. D. L., Twitter in government: Building<br />

relationships one tweet at time. Presented in Information<br />

Technology: New Generations (ITNG), 7th International<br />

Conference at Las Vegas, NV(pp. 563–567). 2010:4,12–14<br />

[20] Xiaoting. C, the Microblogs' Effect in Emergency Events,<br />

News,2010:9(1), 78<br />

[21] Xin. Y. and Wen. Z, the Microblogs' Effect in Catastrophic<br />

Events: "414" Earthquake in Yushu, Emerging Media, 2010:5, 61<br />

[22] Yingxuan. D., Microblog: the New Voice Channel for<br />

Government, News Front, 2011:7, 68


Session 14<br />

Information Structure


CRHIS: Cloud based Rural Healthcare Information System<br />

Manas Ranjan Patra<br />

Berhampur University<br />

Berhampur 760 007, India<br />

+91 – 94371-45430<br />

mrpatra12@gmail.com<br />

ABSTRACT<br />

Healthcare in developing countries has always been a major issue.<br />

In the Indian subcontinent the healthcare facilities are quite<br />

diverse as one travels from major cities to remote locations and to<br />

the rural areas. Whatever little healthcare has been possible in<br />

rural India is only because of the initiative of the Government or<br />

NGOs. No private player is interested to invest in the rural areas<br />

because of the possible poor return on investment. In this paper<br />

we study how modern ICT in general and cloud computing in<br />

particular can be used in the healthcare sector in order to facilitate<br />

improved medical services in the rural areas at reduced costs. We<br />

argue that cloud services stand as a potential alternative to<br />

facilitate rural healthcare information management in terms of<br />

cost reduction and resource utilization. At the same time it can<br />

improve maintainability and use of up-to-date technologies in the<br />

healthcare sector. The main objective of a Cloud based<br />

information system is to create secure and state-of-the-art facility<br />

to store patient data which can be accessed by the medical<br />

professionals and policy makers for disease diagnosis and control.<br />

A cloud based information repository system can offer new<br />

possibilities, such as easy and ubiquitous access to medical data,<br />

and opportunities to utilize the services of medical experts which<br />

are otherwise unavailable in rural areas. Here, we propose a cloud<br />

based model for building a rural healthcare information system.<br />

Design of an overall system along with the functional components<br />

is presented and the advantages, open issues and prospects for<br />

further improvement of this model is also highlighted.<br />

Categories and Subject Descriptors<br />

H.3.5 [Information Systems]: Information Storage and Retrieval<br />

- Online Information Services, data sharing, web- based services.<br />

General Terms<br />

Management, Design, Experimentation<br />

Keywords<br />

Cloud computing, Rural Healthcare, Information Services, IaaS.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Rama Krushna Das<br />

National Informatics Centre<br />

Berhampur 760 004, India<br />

+91 – 94370-64536<br />

ramdash@yahoo.com<br />

402<br />

Rabi Prasad Padhy<br />

Oracle Corporation<br />

Bangalore, 560029, India<br />

+91-98862-86444<br />

rabi.padhy@gmail.com<br />

1. INTRODUCTION<br />

Rural healthcare has been the primary mandate of different<br />

political parties in India. Attempts have been made to extend<br />

modern healthcare facilities to the large population living in the<br />

rural areas of the Indian subcontinent. But the ground realities are<br />

far from expectation. The major impediments are due to the<br />

inaccessibility of the remote locations and unavailability of<br />

facilities. Because of this even doctors are not interested to serve<br />

in those remote and underdeveloped areas of the country. As a<br />

result the patients travel long distances and spend a lot of money<br />

in order to get treatment. But those who cannot afford leave it to<br />

their fate and simply depend on the treatment they receive from<br />

the local health workers. Moreover, the rural people are deprived<br />

of modern healthcare facilities like regular health checkups,<br />

clinical tests, proper diagnosis, expert advices etc. This poses a<br />

major challenge even before the scientists and technocrats to<br />

provide affordable solution towards healthcare for the people<br />

living in rural areas. Now with the proliferation of computers and<br />

internet connectivity it is possible to think of ICT enabled<br />

solutions to the healthcare related problems in rural India. Of late,<br />

even in developing countries cloud based services have been<br />

explored as a possible technological solution to large scale<br />

information management though there have been implementation<br />

challenges and cost based issues [1]. In spite of criticisms with<br />

respect to ownership, cost benefit, risk and security issues [2]<br />

several initiatives are already underway to adopt cloud based<br />

solutions to a myriad of applications. The opportunities to<br />

improve healthcare services using cloud infrastructure has been<br />

envisaged in [3]. Cloud based patient record keeping system<br />

proposed in [4][5] is an innovative area in the field of healthcare<br />

which can enable doctors to view patient health records from<br />

anywhere and at any time in order to provide expert advises and<br />

monitor treatment. Some advanced applications like management<br />

of medical image data in a cloud computing environment which<br />

can be accessed through handheld mobile devices has been<br />

proposed in [6]. The possibility of real time health monitoring and<br />

analysis of patient data has been propounded in [7] for ECG data.<br />

The use of sensors to gather patient data and uploading to a cloud<br />

environment for further analysis has been introduced in [8].<br />

Similarly, a smart card enabled patient record keeping system has<br />

been proposed in [9].<br />

In this paper, we investigate how cloudy computing can provided<br />

affordable solution to many of the problems encountered in rural<br />

healthcare services. Several dimensions of rural healthcare are<br />

investigated and the prospects of sharing resources in term of<br />

infrastructure, software and applications to facilitate healthcare<br />

related data processing is explored.


2. HEALTHCARE IN RURAL INDIA<br />

Healthcare system in India is still in a nascent stage. Though the<br />

urban population have some access to healthcare at a higher cost<br />

but studies indicate that healthcare in rural India is still a<br />

neglected sector. This is largely due to lack of infrastructure and<br />

specialist doctors in the rural areas. Even the ones who study<br />

medicine prefer to work in cities rather than going back to their<br />

own villages to serve the rural people. Private players have<br />

succeeded in providing the best of the medical facilities in cities<br />

but they have shown little interest to invest in the rural areas. This<br />

is because the private investors are skeptical about their return on<br />

investment as the rural people have limited paying capacity.<br />

Therefore, whatever healthcare is available in the rural areas is<br />

only because of the government initiatives.<br />

There is a great demand for healthcare in the rural areas. Patients<br />

need to be treated for malaria, polio and other typical diseases<br />

normally seen in rural areas because of lack of proper sanitation<br />

and unhealthy environment. Leave aside the treatment; even there<br />

is little facility to diagnose dreaded diseases like AIDS, cancer,<br />

and tuberculosis. Child care and regular checkups during<br />

pregnancy is again a neglected subject in the rural areas. Of<br />

course, over the years the Government of India has focused on<br />

reducing the burden of illness and mortality among women and<br />

children through a number of development and public health<br />

programs such as the Integrated Child Development Services<br />

(ICDS). Awareness generation among the rural mass,<br />

infrastructure development and evolving mechanism to ensure<br />

that various healthcare programs introduced by the Government<br />

are implemented to perfection is of paramount importance.<br />

A typical healthcare system infrastructure in India is depicted in<br />

figure 1.<br />

NATIONAL LEVEL<br />

Ministry of Health & Family Welfare<br />

PROVINCIAL LEVEL<br />

Department of Health & Family Welfare<br />

RURAL AREAS<br />

Community Health Centre<br />

Primary Health Centre<br />

Sub-Centre<br />

Village Health Guides<br />

DISTRICT LEVEL<br />

District Hospitals<br />

URBAN AREAS<br />

Hospitals<br />

Dispensary<br />

Figure 1. Healthcare System Infrastructure in India<br />

The doctors in the primary/community health centers in the rural<br />

areas are mostly inexperienced. Therefore, when a patient arrives<br />

for treatment the doctors try to diagnose the disease and carry out<br />

preliminary investigations. If the disease is minor doctors treat the<br />

patient but if it is beyond their capability they send the patient to the<br />

nearest district hospital. Depending on the seriousness of the disease<br />

and availability of facilities to treat the patient the case is further<br />

referred to the next higher level hospital with better medical<br />

facilities. In such cases, whenever a serious patient is taken to<br />

another hospital, invariably the same medical tests are conducted<br />

403<br />

due to unavailability of proper reports and patient history from the<br />

lower level hospitals. Therefore, there is an obvious delay in starting<br />

proper treatment and in many cases there is further deterioration of<br />

the patient and in some cases even the patient succumbs to death. If<br />

the required information would have been available at the right time<br />

proper diagnosis could have been possible and treatment could have<br />

been initiated immediately.<br />

2.1 Patient Information Management<br />

Information management in hospitals, dispensaries and healthcare<br />

centers particularly in rural areas is a difficult task. Today High<br />

quality healthcare depends on extensive and carefully planned<br />

patient information processing. Many of the rural healthcare units<br />

still depend on paper-based record-keeping system wherein<br />

patient information is maintained in pen and paper. This results in<br />

difficulty in accessing patient information.<br />

2.2 Medical Infrastructure<br />

The quality of medical infrastructure deteriorates as one move<br />

down the hierarchy in figure 1. Even if certain medical<br />

instruments are available but in many cases those are not<br />

operational for lack of maintenance. This becomes a hurdle for<br />

proper diagnosis. Moreover, there is no way to analyze patient<br />

data both due to unavailability of expert doctors and necessary<br />

computer-aided diagnostic tools in the rural healthcare centers.<br />

2.3 Disease Control and Monitoring<br />

Certain rural areas are prone to specific type of diseases, for<br />

example malaria, filariasis etc. Similarly, there is seasonal<br />

outbreak of epidemics, flu or diarrhea because of certain local<br />

factors. Such cases are to be monitored carefully and must be<br />

brought under control at the earliest. Unless the Government gets<br />

the right information at the right time about the affected areas,<br />

remedial measures cannot be initiated immediately to deal with<br />

the situation. Many-a-times lack of communication of the ground<br />

realities becomes a bottleneck for the Government to respond<br />

quickly.<br />

3. PROPOSED CLOUD BASED SYSTEM<br />

3.1 Cloud based System<br />

Cloud based systems are being developed to deliver hosted<br />

services over the Internet. These services are broadly divided into<br />

three categories, namely, Infrastructure-as-a-Service (IaaS),<br />

Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).<br />

The basic aim here is to provide a virtualized environment so that<br />

a client can make use of state-of-the-art resources such as servers,<br />

software, storage etc. instead of buying those resources rather pay<br />

based on usage. Such a notion is quite appropriate for developing<br />

healthcare system for the rural community. This is because it is<br />

not possible to build infrastructure at each and every primary<br />

health centre considering the cost, unavailability of experts to<br />

operate the equipment and even from the maintenance point of<br />

view. Thus cloud can provide an innovative and cost effective<br />

solution to modernize healthcare information management in rural<br />

areas. Once patient data is collected and stored in a cloud it can be<br />

easily accessed by expert doctors for analysis and further action.<br />

Thus medical staff from one institution can monitor patients<br />

located at another distantly located hospital.


3.2 Design Requirements<br />

There are certain basic requirements that must be addressed in the<br />

design of a rural healthcare information system.<br />

3.2.1 Patient data collection<br />

Whenever a patient visits a Primary Health Centre(PHC), the PHC<br />

doctor performs certain preliminary investigation which may<br />

involve pathological and clinical tests. Such data need to be<br />

maintained in proper format to facilitate diagnosis and future<br />

reference. Thus there is need for suitable methods to collect,<br />

process and transmit patient data to specific locations. The<br />

penetration of desk top/laptops computers in rural India can easily<br />

address this concern.<br />

3.2.2 Data transmission<br />

If patient data need to be transmitted to other locations for further<br />

analysis and for expert views then there must be facility for<br />

secured transmission over a communication network. National<br />

Informatics Centre (NIC), which is the largest public sector unit<br />

of government of India has already extended network connectivity<br />

to block levels and even to many of the rural areas in the form of<br />

IT kiosks managed by NGOs. Therefore the NIC network is the<br />

best way to be used for data transmission.<br />

3.2.3 Storage and distribution of data<br />

NIC has already started providing IaaS for data storage. Once data<br />

is loaded to the cloud it can be accessed by authorized doctors and<br />

other stakeholders.<br />

3.2.4 Availability of medical equipment<br />

Patient data is not enough but one would require sophisticated<br />

medical equipment for diagnosis and data analysis. To create such<br />

facilities in rural areas is a difficult proposition. But such facilities<br />

are available either in the hospitals at the provincial level or in<br />

national level or in designated national level medical research<br />

institutes. Such centers can be integrated with the cloud<br />

infrastructure to take advantage of the facilities. Thus, the system<br />

should be flexible and extensible so that heterogeneous equipment<br />

can be added to the system.<br />

3.2.5 Scalability<br />

The system should be scalable so that more and more rural<br />

healthcare units can be integrated to make use of common<br />

facilities.<br />

3.2.6 Security and reliability<br />

The system must guarantee confidentiality and integrity of patient<br />

data. Only authorized doctors/persons should have access to data.<br />

Whenever needed the required medical data must be available in<br />

spite of operational problems.<br />

3.3 Proof-of-Concept Design<br />

The proposed high level design model is depicted in figure 2.<br />

Patient data is collected at different PHCs and entered into a local<br />

database. Data is then sent to a database server maintained at the<br />

district/provincial level where it can be organized and suitably<br />

indexed so that it can be accessed through user-friendly interfaces.<br />

Specialist doctors available at the district/provincial level can<br />

access the data for diagnosis and can guide the treatment to be<br />

404<br />

administered to the patients. The data is then filtered and loaded to<br />

the cloud services which can be later shared by experts and<br />

authorized stakeholders for taking decision at a higher level. The<br />

filtering process can involve aggregation of patient data (in case<br />

tests have been conducted at different places) and preliminary<br />

analysis, before the data can be loaded to the cloud. The stored<br />

data can be delivered to authorized medical professionals/users<br />

after proper authentication using suitable content delivery<br />

services.<br />

Expert analysis, Disease<br />

control, Planning<br />

Diagnosis by experts,<br />

data analysis, filtering<br />

(Provincial medical centers)<br />

Further test inputs,<br />

specialist views, data<br />

indexing<br />

Patient Data<br />

(<br />

collection at<br />

Rural Health Centers<br />

Figure 2. Rural Healthcare Information System<br />

4. CLOUD SERVICE PROVISIONING<br />

4.1 Cloud connectivity<br />

The connectivity and configuration of the cloud based rural<br />

healthcare Information system is based on the service provider<br />

policy and location (i.e., cloud data center location). Internet is the<br />

main communication link between the service provider and a rural<br />

healthcare center. Users access cloud services using networked<br />

client devices, such as desktop computers, laptops, tablets and<br />

smartphones. Many of the cloud applications do not require<br />

specific software on the client so that cloud applications can be<br />

accessed through web browsers. A typical connectivity between<br />

cloud data center and rural healthcare centers is depicted in figure<br />

3.<br />

4.2 Authenticated Access<br />

As patient data is vital, access to such data requires proper<br />

authentication. Only the concerned medical personnel should be<br />

allowed to access patient data and for specific use. One must<br />

enforce well-defined access policies to ensure that only authentic<br />

doctors, nurses or other concerned users access the patient data.<br />

This is achieved by deploying an authentication server which can<br />

authenticate each and every access request to use the cloud<br />

resources.


Cloud<br />

Data<br />

Center<br />

Internet<br />

Service<br />

Provider<br />

(A)<br />

Link Load Balancer<br />

Physical<br />

Link<br />

VPN Link<br />

Link Load Balancer<br />

Physical Link<br />

VPN Link<br />

Link Load Balancer<br />

Internet<br />

Service<br />

Provider<br />

(B)<br />

Rural Healthcare<br />

Center – 1<br />

LAN<br />

Database<br />

Server<br />

Application<br />

Server<br />

Rural Healthcare<br />

Center – 2<br />

LAN<br />

Database<br />

Server<br />

Application<br />

Server<br />

Figure 3. Connectivity between cloud data center and rural<br />

healthcare centers<br />

4.3 Use of Open Source Software<br />

Different modules responsible for storing and processing patient<br />

data are being implemented using MySQL, PHP, Apache, running<br />

on virtual machines managed by Open Nebula [10]. We are also<br />

considering ANEKA as the middleware for cloud computing [11].<br />

5. CONCLUSIONS<br />

In this work the need for an information system to facilitate rural<br />

healthcare has been highlighted. The proposed cloud based<br />

solution is aimed at providing a cost effective way of dealing with<br />

the patient information for remotely located areas in India. The<br />

practical advantages of this solution are cost-effectiveness, ease of<br />

deployment, availability of data for analysis anywhere on the<br />

globe. Since availability of doctors with different expertise in a<br />

single location, that to in rural areas, is not practicable; now with<br />

the proposed cloud based solution it is possible to provide medical<br />

assistance to remote patients without actually moving to those<br />

locations. Further, doctors of established hospitals with better<br />

facilities can remotely monitor critical patients, thus helping to<br />

improve the quality of medical service even in rural areas. From<br />

the software engineering perspective, the proposed design<br />

promotes re-usability of services which are deployed at different<br />

locations and has the capability to leverage different medical<br />

institutes and research centres to use services through a SaaS<br />

model. This also reduces investment on hardware and expensive<br />

medical equipment and software licensing costs. Further the<br />

patient data collected over a period of time can be used to build a<br />

knowledge base of different diseases, affected areas, their causes<br />

which can facilitate policy makers and researchers to take<br />

remedial measures and plan for disease control.<br />

405<br />

In this work we have not addressed the issue of data security and<br />

quality of service which is a challenging area of research in cloud<br />

computing. We shall look into these aspects in future to improve<br />

the performance and trustworthiness of the proposed healthcare<br />

system. Further, as our next research agenda we shall explore the<br />

use of mobile phones (which has a greater penetration in rural<br />

India) to transmit data to database servers managed at the<br />

provincial level. Further wherever possible, recording patient data<br />

using sensors is yet another alternative to reduce the amount of<br />

manual error during data entry. This can enable faster and direct<br />

transfer of data to the cloud infrastructure for diagnosis and expert<br />

advice in case of critical patients.<br />

6. REFERENCES<br />

[1] Greengard, S., Cloud Computing and Developing Nations.<br />

Communications of the ACM, 53, 5, 2010, 18-20.<br />

[2] White, J., Cloud Computing for Healthcare Organizations: Is<br />

there a Silver Lining? ASPEN Report, December 2010,1-8.<br />

[3] Mu-Hsing Kuo, A., Opportunities and Challenges of Cloud<br />

Computing to Improve Healthcare Services, Journal of<br />

Medical Internet Research, 13, 3, 2011.<br />

[4] Binczewski, A., Kurowski, K., Mazurek, C., and Stroinski,<br />

M., A Concept of a Patient-centered Healthcare System<br />

Based on the Virtualized Networking and Information<br />

Infrastructure. In Proceedings of the eTELEMED 2011 : The<br />

Third International Conference on eHealth, Telemedicine,<br />

and Social Medicine, IARIA, 2011, 51-58.<br />

[5] Pardamean, B., Rumanda, R.R., Integrated Model of Cloud-<br />

Based E-Medical Record for Health Care Organizations,<br />

Recent Researches in E-Activities, 157-162.<br />

[6] Somasundaram, M., Gitanjali, I.S. Govardhani, T.C., et al.<br />

Medical Image Data Management System in Mobile Cloud<br />

Computing Environment, Proc. of the International<br />

Conference on Signal, Image Processing and Applications<br />

IPCSIT 21 IACSIT Press, Singapore, 2011, 11-15.<br />

[7] Pandey, S., Voorsluys W., Niu, S., An autonomic cloud<br />

environment for hosting ECG data analysis services, Future<br />

Generation Computer Systems 28, 2012, 147–154.<br />

[8] Suresh, R., Robin, C.R.R., An Efficient VOIP Enabled<br />

Health Monitoring System using Cloud Computing, Proc.<br />

International Conference on Emerging Technology Trends,<br />

2011, 6-14.<br />

[9] Karthikeyan, N., Sukanesh, R., Case Study on Software as a<br />

Service Based Emergency Healthcare in India, European<br />

Journal of Scientific Research, 69, 3, 2012, 461-472.<br />

[10] Erdogmus, H., Cloud Computing: Does Nirvana Hide behind<br />

the Nebula? IEEE Software, 26, 2, 2009, 4-6.<br />

[11] Chu, X., Nadiminti, K., Jin, C., Venugopal, S., and Buyya,<br />

R., Aneka: Next Generation Enterprise Grid Platform for e-<br />

Science and e-Business Applications. Proc. of the 3rd IEEE<br />

International Conference on e-Science and Grid Computing,<br />

IEEE CS Press, Los Alamitos, CA, USA, 2007, 10–13.


Data collection in a degraded network: case of<br />

developing countries or countries in crisis<br />

Fidèl Jiomekong Azanzi<br />

Université de Yaoundé<br />

jiofidelus@yahoo.fr<br />

ABSTRACT<br />

An essential component in public administration (health systems<br />

management, municipality management, environmental<br />

protection, agriculture etc.) is the data collection service. Data<br />

collected concerns key information that can improve the living<br />

conditions of populations (epidemiological data, environmental<br />

data, weather data etc.). This collection is difficult in developing<br />

countries or in situations of crisis (notably natural<br />

disasters). Current solutions are inadequate, for they assume the<br />

availability of client terminals, the presence of outstanding<br />

(Internet) communication networks, or they provide a service<br />

based on a primitive communication via SMS and data furnishing<br />

through mobile phones which are prone to data entry errors. In<br />

this paper, we propose a compromise between these<br />

approaches. A dedicated language allows the definition of input<br />

masks with which are generated (i) HTML forms enabling a<br />

reliable entering of data from a computer (ii) in which formats of<br />

SMS messages have to be exchanged between the input terminal<br />

and the data processing server. The implementation of this<br />

approach is based on a Model-Driven Architecture (MDA)<br />

technology, and it has been applied to Health Information Systems<br />

(HIS).<br />

General Terms<br />

Management, Documentation, Performance, Reliability, Security,<br />

Languages.<br />

Keywords<br />

E-governance, network architecture, GSM, SMS, degraded<br />

networks, Health Information System.<br />

1. INTRODUCTION<br />

Knowledge and information are essential to meet the opportunities<br />

and challenges related to health, social, economic and<br />

technological transformations. However, their usefulness depends<br />

on their effective communication to the public and public<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Laurent Broto<br />

Université de Toulouse<br />

broto@irit.fr<br />

Maurice Tchuente<br />

Université de Yaoundé<br />

Maurice.Tchuente@ens-lyon.fr<br />

406<br />

Daniel Hagimont<br />

Université de Toulouse<br />

hagimont@enseeiht.fr<br />

authorities. In the context of public administration, information is<br />

all relevant data whose collection, processing, interpretation and<br />

use contribute to the achievement of a governmental<br />

mission. Such data may be environmental data, health data,<br />

etc. To be disseminated, information passes through transport<br />

networks (land way, air way, naval route) or by Computer<br />

network (Intranet or Internet). But, because of their states or<br />

nonexistence, these different means of communication do not<br />

always ensure the transmission of information to the extended<br />

territory. In developing countries or countries affected by<br />

disasters, they are usually combined to meet the needs. A<br />

multimodal network is a network that combines multiple modes of<br />

transportation in the exchange of information. Indeed, the Internet<br />

is often damaged or non-existent surface communication<br />

channels, air or water are not always suitable, making it difficult<br />

to exchange information with some rural areas, causing timeliness<br />

problems and difficulties in their check up. This can have serious<br />

consequences, for example, in the health sector, a late declaration<br />

of an epidemic may be fatal to the population. However, to serve<br />

citizens effectively, engage stakeholders in decision-making,<br />

governments must establish a robust, secure and efficient system<br />

for data exchange. E-governance can help to build this system by<br />

providing a solution to the problem of data collection.<br />

E-governance is the use by the public sector of Information and<br />

Communication Technology (ICT) to improve the exchange of<br />

information and services and to encourage citizen participation in<br />

the process of decision-making and make government more<br />

responsible, transparent and efficient[1]. Our approach is<br />

therefore the usage of e-governance to improve the exchange of<br />

data in developing countries or countries in crisis. It will rely on a<br />

media that is fast and efficient (GSM) for data transmission.<br />

In this paper, we present rapid state of the art architectures and<br />

existing technologies, their characteristics, their limits; then we<br />

propose an approach to combine the modern technology based on<br />

degraded telecommunication networks; finally, we conclude with<br />

some perspectives.<br />

2. EXISTING ARCHITECTURES<br />

To provide governments with useful information, data collection<br />

must meet a number of criteria:<br />

Completeness: The data supplied must contain all necessary<br />

information;<br />

Readiness: the data must arrive on time to decision makers;


Reliability of data: data collected must be reliable, they must not<br />

contain erroneous or inconsistent data;<br />

Security: Data must be accessible only by authorize persons;<br />

Versatility: it must be adapted to the type of data collected;<br />

Robustness should be able to use the system in degraded<br />

conditions (crisis countries, developing countries).<br />

In a broad sense, this data collection is generally established<br />

according to the client-server model:<br />

o The client uses a data collection terminal that can be a sheet<br />

of paper, a computer or mobile phone. The client is the data<br />

collector. This is usually a staff in a public service (doctor<br />

who treats local populations, secretary, municipal agent,<br />

agricultural agents etc.).<br />

o A medium that connects the customer's terminal to the server<br />

from the center of decisions. This medium may be the Internet<br />

or mobile phone through computer network or a USB key into<br />

a car, in case of transmission by surface or aerial (roads,<br />

rivers, airplanes);<br />

o Multiple protocols can be used to route data collected at the<br />

client to the server: SMS, MMS, HTML, WML, i-HTML, text<br />

file or data collection sheets. The protocols are generally<br />

dependent on the transmission medium;<br />

Once in the server at the center of decision, the data is stored in a<br />

database to be further processed.<br />

Below we give details the three main implementation of this<br />

client-server architecture.<br />

2.1. Computer-Internet-Server (CIS)<br />

We are here as part of a standard web application: the client is a<br />

computer (or smartphone) and the communication medium is<br />

Internet. The protocol for data exchange is usually the HTML<br />

language or assimilated. This architecture is commonly<br />

implemented in industrialized countries in almost all sectors<br />

(banks, municipalities, health, politics etc.). It has been used in<br />

France in 2010 for the prevention and monitoring of diabetes [6]<br />

and described in [11] as a good tool for e-democracy.<br />

This architecture ensures the timeliness of data because the data<br />

transmission medium, the Internet is fast enough in terms of time<br />

required by health systems. With data exchange protocols used,<br />

the chances of obtaining reliable data are large. Indeed,<br />

information gathered can be typed and verified (entered in a<br />

form), the controls (either automatically by the web servers) and<br />

transmission errors prevented by TCP/IP protocol. These<br />

protocols will also help ensure a high level of security by<br />

encrypting data. This system is also versatile: only the server<br />

needs to be updated in case of modification of the application.<br />

However, this architecture can be deployed in a context in which<br />

the Internet is degraded or nonexistent as in countries in crisis<br />

(war, natural disaster) or the developing countries. It does not<br />

answer our criteria for robustness.<br />

2.2. Mobile-GSM-Server (MGS)<br />

This architecture consists of a cell phone as a client. The person<br />

responsible for collecting the data types of SMS or MMS<br />

containing data to be transmitted. SMS or MMS messages are<br />

then transmitted via the Global System for Mobile communication<br />

407<br />

(GSM) to the server. The GSM network is the most common<br />

worldwide, it is often used in the management of health crises in<br />

developing countries or countries hit by natural disasters that see<br />

their wire line telecommunications infrastructure destroyed. It was<br />

used in China in 2005 after the earthquake [16], in Cameroon in<br />

2010 during the cholera outbreak [8], and in many other countries<br />

in Africa [2, 4, 5, 10, 15].<br />

This solution ensures the timeliness of data as SMS and MMS<br />

messages are sent immediately. But completeness is not always<br />

guaranteed because the data being entered into SMS or MMS, it is<br />

possible that the data collectors forget to enter some data which<br />

are confused (inverted data, invalid data). Security is not<br />

guaranteed because the data are difficult to quantify. Finally, it is<br />

not versatile because the change in one component can affect the<br />

data collector and require a new formation of the latter. It is robust<br />

against GSM networks as well resist natural disasters and are<br />

present in most countries.<br />

2.3. Human-Route-Server (HRS)<br />

For this architecture, the client is a person who collects the data<br />

with a data collection sheet paper or a computer for data capture<br />

and recording in file that can be stored on removable media. Note<br />

cards or removable media are then transmitted via the road, air or<br />

river. This system is one that is most prevalent in developing<br />

countries with no electronic system of data collection or in areas<br />

where Internet and GSM networks are absent. It is used in most<br />

countries south of Sahara in Africa [7, 12, 14].<br />

This increases the chances of obtaining reliable and complete data<br />

because the information collected may be typed (with spread<br />

sheets in the case of computerized data input or when integrating<br />

data in the case of data input on papers). Meanwhile, timeliness of<br />

data is not always guaranteed because the distance between the<br />

server and the client is often far apart and roads are bad. Data<br />

security can be ensured through file (encryption) but more<br />

difficult in the context of paper records. This system is not as<br />

versatile an update paper forms or entry program on a computer<br />

disconnected from the network is a difficult operation. For against<br />

this approach is robust: it can use on a multitude of medium (road,<br />

air, sea).<br />

2.4. Synthesis<br />

Given the table 1, no approach satisfies all the criteria of data<br />

collection systems of NHIS simultaneously. The next section<br />

presents our approach which opens way for the simultaneous<br />

consideration of all these criteria.<br />

Table 1. The different architectures<br />

architecture completeness promptness reliability<br />

CIS Good Good Good<br />

MGS Bad Good Bad<br />

HRS Good Bad Good<br />

architecture security versatility robustness<br />

CIS Good Good No<br />

MGS Bad Bad Yes<br />

HRS Bad Bad Yes


3. OUR APPROACH<br />

3.1. Descriptions<br />

In our approach (the architecture is presented on figure 1), we<br />

distinguish three types of stakeholders:<br />

Data collector who is responsible for entering data. He uses on<br />

his client station a web browser and enters data through HTML<br />

forms;<br />

Administrator who builds masks seized to be used by the data<br />

collector (forms of epidemiological data collection, record to<br />

establish the birth certificates etc..). It uses a layout editor<br />

WYSIWYG (What You See Is What You Get);<br />

Engineer who built widgets used in the mask editing tool.<br />

A widget describes how this entry will be made on a form<br />

(HTML) and how it will be controlled on the client side<br />

(JavaScript).<br />

In order to satisfy all criteria simultaneously, we chose a hybrid<br />

approach based on the following design choices: to ensure the<br />

readiness and robustness, we rely on a rapid and widespread<br />

media: the GSM network to ensure reliability and data<br />

completeness, we rely on standard forms (which check the data<br />

entered) to ensure the safety and versatility we rely on proxies<br />

(mandatory servers) in which can be adapted and specialize<br />

different treatments of the data entered.<br />

In this architecture, the administrator builds input masks<br />

according to its data needs and the available widgets. These entry<br />

forms are sent to proxies to generate two entities:<br />

the HTML form, generated by proxies on client machines,<br />

equivalent to the input mask set. These forms allow HTML in a<br />

browser input data by the data collector. Instrumented by Java<br />

Script scripts, they provide a upstream check of the validity of<br />

data; a format representation of the messages exchanged on the<br />

network. These message formats are used by proxies to set the<br />

construction of messages sent from clients to the server (data<br />

entered in the spread sheets). These messages should be as small<br />

as possible to limit the number of SMS sent and format of ASCII<br />

characters.<br />

For example, the administrator can define a mask form that will<br />

contain two fields: a person's sex and age. From this form and the<br />

definition of widgets, the following HTML code can be generated<br />

to the destination browser data collector:<br />

<br />

<br />

function validate()<br />

{<br />

if(document.form1.age.value99)<br />

{<br />

alert("age must be between 0 and 99 years");<br />

}<br />

}<br />

<br />

<br />

<br />

Age : <br />

Sexe : Homme<br />

Femme<br />

<br />

<br />

<br />

This generation is local and does not cost anything in terms of<br />

network. The message containing the mask (message sent via<br />

SMS) may contain: S, A. where A is the name given to the age<br />

fields and S is the name given to the Gender field. The description<br />

408<br />

of widgets is already known by proxies, the network cost is<br />

negligible (1 SMS) to send this mask.<br />

Figure 1. Our approach architecture.<br />

3.2. Implementation<br />

In the following, we present the field in which we chose to<br />

implement our approach and methodology that we used to<br />

implement it.<br />

3.2.1. Methodology<br />

We chose to use model Driven Architecture (MDA). These<br />

methods rely on the use of meta-models (Domain Specific<br />

Language or DSL), consistent with these models and DSL tools.<br />

DSLs are languages specific to a particular area. A DSL is a<br />

language and like all languages it has syntax. This syntax is<br />

divided into two parts: the set of domain elements (abstract<br />

syntax) and the representation (concrete syntax) that can be either<br />

graphical or textual, knowing that an element can have several<br />

different representations (corresponding to an abstract<br />

syntax several concrete syntax). These DSLs are used to build<br />

tools that allow entry of a conforming model in DSL.<br />

The engineer has at his disposal a tool to describe the widgets<br />

used in the masks. Each widget has a name and a description<br />

HTML and Java Script. All of these widgets from the abstract<br />

syntax.<br />

By giving the HTML and Java Script code verification, it gives a<br />

first concrete syntax that will be the HTML form with the<br />

verification code JavaScript. Once the DSL defined, description of<br />

new widgets is sent via SMS to proxies and a second concrete<br />

syntax is generated: the representation format masks. Finally the<br />

tool used by the administrator is automatically generated. When<br />

adding or editing a mask, this mask is sent to new proxies.<br />

Finally, when the data collector completes and submits a form, the<br />

proxies marshaling unmarshalling and the arguments for sending<br />

SMS to the server. In the following, we present the scope of our<br />

approach.<br />

3.2.2. Health Information System<br />

A health system is a set of organizations, institutions, resources<br />

and people whose main objective is to improve health [9]. Only<br />

accurate and reliable can help to develop a policy based on<br />

evidence that can lead the optimal management of health<br />

programs and, especially, to trigger actions that can improve wellbeing<br />

of the population. Thus, the performance of health systems<br />

depends critically on the performance of National Health


Information System (NHIS). A National Health Information<br />

system (NHIS) is a set of people, procedures and materials<br />

organized to provide timely information, in an appropriate health<br />

program and the systems international exchange of health<br />

information. This information must be complete, accurate and not<br />

outdated (at a given time). In addition, security in this area is<br />

essential. The information should therefore be granted only to<br />

authorized persons [3, 13].<br />

We have implemented our approach in the NHIS data<br />

collection. Data collection is to transmit the epidemiological data<br />

of physicians treating patients to centers of decision. This part is<br />

particularly important in developing countries or in countries in<br />

crisis. Indeed, the technologies used in industrialized nations are<br />

not generalizable to developing countries (lack of reliable<br />

communications networks) or countries in crisis (destruction of<br />

these networks).<br />

To validate our approach, we implemented the data collection<br />

sheet to mandatory reporting of diseases and epidemic-prone<br />

diseases in Cameroon. Generally, the data collected in the NHIS<br />

in Cameroon is collected in paper format and transmitted by<br />

road to the Ministry of Public Health [7].<br />

We propose an implementation of electronic data collection that<br />

use the Internet when it is available and use our approach when<br />

Internet is not available. The proxy has been implemented with<br />

XML (to build our DSL), XSLT (for transformation to XML to<br />

HTML and HTML to the text); data is entered by the client in<br />

HTML format. Data is check up (for example, the number of<br />

cases of disease must be greater than or equal to the<br />

number of deaths). They are converted into text by XSLT and<br />

transmitted to the server via the GSM network. Once in the<br />

server, the SMS data is retrieved at the level of the modem server<br />

and forwarded to the proxy server. The proxy server transforms<br />

and interprets the data, performs the necessary treatment and<br />

records in the database. At the server, other checks are performed<br />

(eg, data consistency compared to the size of the population).<br />

Information such as the date of data transmission is generated at<br />

the server level and stored in the database.<br />

4. CONCLUSION<br />

Data collection in developing countries or in situations of crisis<br />

requires solutions to constraints such as reliability and seized<br />

communications. Current solutions are based on primitive entry<br />

services (entry SMS from mobile phones) or Web applications<br />

making unrealistic assumptions about the available networks and<br />

terminals.<br />

In this paper, we proposed a solution based on GSM<br />

communications, network easily deployed in developing countries<br />

or counties in crisis, and on entry forms deployed to proxies to<br />

ensure consistency of data entered. This approach reduces the<br />

volume of data exchanged and was implemented by leveraging<br />

technology in the field of MDA. The implementation of a<br />

prototype of this data collection service and its assessments<br />

regarding the gain in message size are in progress.<br />

Our approach can be deployed in any type of administrative or<br />

public service, in contact with the public (front office) or not<br />

(back office). For users, whatever their place of residence (city or<br />

country), the information service and/or online approach may be<br />

open 7 days on 7, 24 hours on 24. Our solution is better and more<br />

comfortable to use (no queues) and quality (information sourced<br />

409<br />

and sometimes more accurate, simplified procedures, with less<br />

paperwork and less effort to provide data to fill in the form), also<br />

transparency (the user can find out the processing of his<br />

application, etc.).<br />

The main perspective of this work concerns the implementation to<br />

other environments or constraints. We made the assumption based<br />

GSM communications. Our solution should allow for adaptation<br />

to other communication networks. Similarly, we have assumed an<br />

input from the terminal web and it should be possible to adapt to<br />

other modes of data entry.<br />

5. REFERENCES<br />

[1] Grönlund, Å. Horan, T. INTRODUCING e-GOV: HISTO-<br />

RY, DEFINITIONS, AND ISSUES. Communications of the<br />

Association for Information Systems. 15, (2004), 713-729.<br />

[2] Tatem, A. Qiu, Y. Smith, D. Sabot, O. Ali, A. Moonen, B.<br />

The use of mobile phone data for the estimation of the travel<br />

patterns and imported Plasmodium falciparum rates among<br />

Zanzibar residents. BioMed Central. 8, (2009), 287-289.<br />

[3] HMN. The need for strong health information systems,<br />

(2010).<br />

[4] Khatry-Chhetry Mukund Bahadur, Peter J. Murrayb. Cell<br />

phone short messaging service (SMS) for HIV/AIDS in<br />

South Africa: a literature review. PMID. 10, (2010) 31-39.<br />

[5] Randrianasolo, L. Raoelina, Y. Sentinel surveillance system<br />

for early outbreak detection in Madagascar. BMC Public<br />

Health. 10, (2010), 31-39.<br />

[6] MEDES. Imogene. http://code.google.com/p/imogene/, 2010.<br />

[7] Ministère de la Santé Publique, Cameroun. Système National<br />

d'Information Sanitaire, formulaire de recueil de données<br />

pour le rapport mensuel d'activités dans les hôpitaux centraux.<br />

2010.<br />

[8] OMS. Capital Santé. N° 3, (2010).<br />

[9] OMS. A propos des systèmes de santé.<br />

http://www.who.int/healthsystems/about/fr/, (2010).<br />

[10] Okoro, E. Sholagberu, H. Kolo, P. Mobile phone ownership<br />

among Nigerians with diabetes. African Health Sciences. 10,<br />

(2010) 183-186.<br />

[11] Waller, P. Livesey, P. Edin, K. e-GOVERNMENT IN THE<br />

SERVICE OF DEMOCRACY UK. ICA Information. N° 74,<br />

(June 2001).<br />

[12] Réseau de métrologie sanitaire au Cameroun. Cellules des<br />

informations sanitaires, Cameroun, 2007.<br />

[13] UNHCR. Manuel de référence du Système d'information<br />

sanitaire (SIS), 2010.<br />

[14] UNHCR. La boîte à outils du Système d'information sanitaire<br />

(SIS). http://www.unhcr.fr/4b5dc5ae9.html, 2010.<br />

[15] UNICEF. RapidSMS. http://www.rapidsms.org/, 2006.<br />

[16] Yang, C. Jun, Y. Xiangshu, L. Use of mobile phones in an<br />

emergency reporting system for infectious disease surveillance<br />

after the Sichuan earthquake in China. Bull World<br />

Health Organ. 7, (2010) 619-623.


The Secure Platform Problem<br />

Taxonomy and Analysis of Existing Proposals to Address<br />

this Problem<br />

Michael Schläpfer<br />

ETH Zurich<br />

Universitätsstrasse 6<br />

CH-8092 Zurich<br />

+41 44 632 91 96<br />

michschl@inf.ethz.ch<br />

ABSTRACT<br />

One of the main open issues in electronic government is the fact<br />

that the individual users’ multi-purpose computing platforms are<br />

used. In terms of security, no guarantee is given since these<br />

platforms are not under the government authority’s control. Even<br />

worse, the number of malware infected computing platforms<br />

increases. This so-called Secure Platform Problem and approaches<br />

aiming to solve it are objects of investigation in this work. We<br />

define criteria that need to be ensured to address this problem.<br />

Furthermore, we propose a taxonomy to classify existing<br />

approaches. Based on the classification and the criteria, we<br />

analyze the different types of approaches by providing concrete<br />

examples. Hereby, we show that none of the existing approaches<br />

fully meets our criteria. Thereby, we focus on the most security<br />

critical class of electronic government services, namely electronic<br />

voting over the Internet. However, most of the discussed<br />

approaches as well as the criteria and classification can also be<br />

applied to other governmental applications.<br />

Categories and Subject Descriptors<br />

K.6.5 [MANAGEMENT OF COMPUTING AND<br />

INFORMATION SYSTEMS]: Security and Protection –<br />

authentication, invasive software, physical security, unauthorized<br />

access.<br />

General Terms<br />

Security, Human Factors, Design, Reliability, Verification<br />

Keywords<br />

Electronic Government, Internet voting, Secure Platform Problem,<br />

Insecure Client Problem, Untrusted Terminal Problem<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

410<br />

Melanie Volkamer<br />

Technische Universität Darmstadt<br />

Hochschulstrasse 10<br />

64289 Darmstadt, Germany<br />

+49 6151 16 5422<br />

melanie.volkamer@cased.de<br />

1. INTRODUCTION<br />

Web applications become more and more important and a<br />

growing number of security-critical services are provided over the<br />

Internet. The latest advances are, to provide citizens with<br />

governmental services over the Internet, even with online voting<br />

techniques for political elections and referenda what we refer to as<br />

internet voting throughout this paper. One of the main open issues<br />

of electronic government is that the individual user’s multipurpose<br />

computing platform is used as the interface to the service.<br />

Since this platform is not under the authority’s control, no security<br />

guarantees can be given. Even worse, the increasing complexity<br />

of the operating systems leads to a growing number of malware<br />

indicating that it is reasonable to not trust any user’s personal<br />

computer at all. The same applies to mobile computing platforms<br />

such as mobile phones and tablet computers. In the context of<br />

internet voting, this so-called Secure Platform Problem was first<br />

mentioned by Ron Rivest [24]. The problem is also known as the<br />

Untrusted Terminal Problem or the Insecure Client Problem and<br />

is not voting specific but applies to any electronic communication<br />

application. However, compared to other domains, the problem<br />

appears to be most influential in electronic government services<br />

and especially in internet voting. Vulnerabilities in voting systems<br />

endanger democracy in its entirety. Furthermore, compared to<br />

other applications, voters have to be anonymous in order to ensure<br />

ballot secrecy.<br />

Many voting protocols, such as [5], [15], and [7] have been<br />

proposed in the last thirty years and some have already been used<br />

for legally binding elections on different levels. Examples include<br />

Estonia, Switzerland, and the Netherlands (compare to [28] for an<br />

overview of all three elections). But most of these voting<br />

protocols and systems in use do not even mention the Secure<br />

Platform Problem, while others trivially assume the voter’s<br />

equipment to be trustworthy, arguing “up-to-date” operating<br />

systems and anti-virus programs, as well as vote updating being<br />

viable solutions to address the problem.<br />

However, there exist few publications proposing solutions to<br />

(partially) address the Secure Platform Problem in internet voting<br />

[19][32]. In addition, several solutions for user and transaction<br />

authentication in e-banking are available which can be adapted for<br />

governmental web services like internet voting as we will show.<br />

The fact that these proposed and existing techniques are rarely<br />

applied in governmental web services, yields that the people in


charge are either not aware of the Secure Platform Problem or the<br />

approaches are not known enough, yet. This is not surprising as<br />

there is no comprehensive document describing the different<br />

concepts including their advantages and disadvantages as well as<br />

the remaining risks.<br />

This work aims to narrow this gap. We present a taxonomy to<br />

categorize existing approaches and define criteria, an adequate<br />

solution for the Secure Platform Problem should meet.<br />

Furthermore, we provide an overview of existing proposals to<br />

address the Secure Platform Problem proposed for different<br />

applications and analyze them according to the previously defined<br />

criteria.<br />

Furthermore, we intend to raise awareness for this problem that is<br />

mostly neglected and to support decision makers in electronic<br />

government projects with an overview of the currently most<br />

relevant approaches to meet the Secure Platform Problem<br />

including their limitations. Additionally it should encourage<br />

developers to integrate one or more of these approaches in their<br />

products, and researchers to find more adequate solutions.<br />

1.1 Related Work<br />

To our knowledge, no comprehensive overview and discussion of<br />

solution approaches for the Secure Platform Problem exists.<br />

However there are few works addressing subsets of existing<br />

approaches.<br />

The author of [32] describes and compares five different<br />

approaches to address the problem. The discussion is brief and<br />

does only address a fraction of the approaches discussed in this<br />

work.<br />

[19] provides a good introduction and overview of the Secure<br />

Platform Problem. The author classifies some meaningful<br />

approaches and concludes that dedicated hardware devices can<br />

provide the highest security level against the Secure Platform<br />

Problem while he does not analyze this branch of solutions in any<br />

detail due to the expected costs for development, distribution and<br />

maintenance.<br />

The common conclusion of the above authors is that none of the<br />

existing approaches is applicable for large-scale elections.<br />

1.2 Structure of this Work<br />

Section 2 provides an overview of the Secure Platform Problem.<br />

We introduce a new informal adversary model and express the<br />

adversary’s capabilities. In Sect. 3 we formulate the criteria we<br />

used to discuss the different existing solution approaches as well<br />

as a simple taxonomy, which serves to classify the approaches in<br />

Sects. 4 – 6. Section 7 concludes this work and summarizes some<br />

open issues for future work.<br />

2. PROBLEM DESCRIPTION<br />

In this section, we explain the Secure Platform Problem and<br />

define a new adequate adversary model.<br />

In the context of security critical communication an adversary’s<br />

ultimate goal is to violate confidentiality and/or integrity of<br />

messages sent and received by users. For the purpose of this paper<br />

we define a powerful adversary capable of entirely controlling the<br />

platform of the user. Thus, the adversary does not only control the<br />

network between the user’s computing platform and the<br />

411<br />

authority’s trusted server, but also acts as the user’s interface to<br />

the network. We abstract from the untrusted platform and assume<br />

it to be part of the adversary-controlled network. Communication<br />

takes place between the user and the adversary as well as between<br />

the server and the adversary. Hence, all communication between<br />

the user and the server is sent through the adversary. Note that the<br />

user is not a machine but human and thus is very limited in terms<br />

of computation power and memory. Fig. 1 depicts our adversary<br />

model. This model extends the common formal protocol analysis<br />

models based on the well-known Dolev-Yao-style adversary [8].<br />

User<br />

Trust-base<br />

Untrusted<br />

Platform<br />

Adversary<br />

Server<br />

Figure 1. Secure Platform Problem Adversary Model<br />

We add a trust-base to our model, in order to address those<br />

approaches, which introduce techniques to execute certain<br />

trustworthy functionality outside the influence of the adversary.<br />

The functionality and especially the communication capabilities<br />

of the trust-base depend on the individual approaches as well as<br />

on the respective implementation details.<br />

Since we focus on the client-side Secure Platform Problem only,<br />

we assume the server-side as well as the user to be trustworthy.<br />

More specifically, we do not consider the case where users intend<br />

to collaborate with the adversary as it would be the case for vote<br />

selling in internet voting. Furthermore we do not take into account<br />

the adversary to be physically present to influence the user.<br />

Our adversary model yields the following capabilities. We recap<br />

the fundamental capabilities of the Dolev-Yao adversary and<br />

extend them with human capabilities. In particular we assume that<br />

the adversary:<br />

o can learn messages sent from the user to the untrusted<br />

platform;<br />

o can learn messages sent from the server to the network and<br />

further to an untrusted platform;<br />

o can learn messages sent from the trust-base to an untrusted<br />

platform or directly to the network;<br />

o can drop messages to replace them with own messages 1 ;<br />

o can manipulate and fabricate arbitrary messages according to<br />

publicly known knowledge and previously sent messages;<br />

o can perform every publicly known function;<br />

o knows all implementation details of all used systems;<br />

o can act as a human 2 .<br />

1 We do not consider denial-of-service attacks in this work.<br />

2 Note, for example, that strategies against Completely Automated<br />

Public Turing tests to tell Computers and Humans Apart<br />

(CAPTCHAs) exist.


Although the above assumptions describe a powerful adversary,<br />

the capabilities are limited. In particular, the adversary:<br />

o cannot break cryptography;<br />

o cannot overhear or manipulate communication between the<br />

user and the trust-base;<br />

o cannot access knowledge dedicated to the user, the trust-base<br />

or the server;<br />

o cannot manipulate the trust-base.<br />

3. EXISTING APPROACHES<br />

In this section, we introduce the properties that will be used to<br />

later on discuss and compare existing approaches. While we are<br />

mainly interested in confidentiality and integrity of messages, we<br />

settle for the following more precise definitions and describe how<br />

they are related. Note that the following criteria and taxonomy<br />

hold for security-critical systems in general. However, we will<br />

take internet voting and corresponding solutions as an example to<br />

discuss the different approach classes in Sects. 4 – 6.<br />

3.1 Criteria<br />

While we are mainly interested in confidentiality and integrity of<br />

messages, we settle for the following more precise definitions and<br />

describe how they are related.<br />

3.1.1 Confidentiality<br />

An approach supports user-to-server-secrecy if it is not possible<br />

for the adversary to learn a secret that the user submitted to server.<br />

This means that the user has the opportunity to submit a message<br />

secretly to the authority’s server and hence privacy holds.<br />

3.1.2 Integrity<br />

If it is possible for the server to verify the integrity and<br />

authenticity of a received message with respect to the user-sent<br />

message, we say the approach supports user-to-server-integrity.<br />

Note that individual verifiability in internet voting allows the<br />

voter to verify that the server correctly received the voter’s ballot.<br />

But this is not enough to ensure vote integrity since the voter must<br />

also be given the possibility to complain in the case the<br />

verification fails. Moreover, individual verifiability also requires<br />

integrity and authenticity of messages sent from the server to the<br />

user in order for the user to be able to verify what message the<br />

server actually received. From the authority’s perspective, vote<br />

integrity is then given by the fact that the user did not complain.<br />

3.1.3 Further Criteria<br />

Especially but not exclusively in internet voting, an application<br />

should provide anonymity. We say an approach supports useranonymity<br />

if it is not possible for the adversary to reveal the<br />

origin of a message sent to the server. Note that it is possible for a<br />

user to send messages that are not secret but cannot be linked to<br />

the sender and thus privacy holds too.<br />

Beside security properties other non-functional properties such as<br />

user-friendliness, cost-efficiency, and practicality for large-scale<br />

settings must be considered as well. Although we focus on<br />

security, we also discuss these properties where it applies but we<br />

do not define any measurement for that.<br />

412<br />

3.2 Taxonomy of Approaches<br />

Following, we propose a taxonomy to give an overview and to<br />

classify the different approaches. In scientific literature mainly<br />

two different classes of solutions for the Secure Platform Problem<br />

can be found. While one class aims to make the platform<br />

trustworthy, the other class of approaches assumes the user’s<br />

platform to be insecure. See Fig. 2 for an overview of the classes<br />

that are covered in this work.<br />

In the following sections we refer to this taxonomy, summarize<br />

concrete examples, and discuss them according to the above<br />

criteria. Particularly, Sect. 4 examines approaches to make the<br />

platform trustworthy. Approaches distrusting the user’s platform<br />

are discussed in Sect. 5, where we summarize approaches without<br />

trusted devices and Sect. 6, where we discuss solutions based on<br />

dedicated trusted devices.<br />

Trusted<br />

Computing<br />

Bootable<br />

Clean OS<br />

Trustworthy<br />

Platform<br />

(Sect. 4)<br />

Humancomputer<br />

Crypto<br />

Guidelines and<br />

Education<br />

Solution<br />

Approaches<br />

Codebook<br />

Crypto<br />

Distrusted<br />

Platform<br />

w/o Trusted<br />

Devices<br />

(Sect. 5)<br />

Trusted<br />

Devices<br />

(Sect. 6)<br />

Procedural Standalone Connected<br />

Figure 2. Taxonomy of Analyzed Approaches<br />

4. TRUSTWORTHY PLATFORM<br />

Approaches in this category aim to improve the user’s platform<br />

integrity in a way that it becomes trustworthy. These approaches<br />

lead to the situation where the platform becomes the trust-base<br />

and users no longer access the communication interface to the<br />

adversary.<br />

4.1 Trusted Computing<br />

The key idea of applying Trusted Computing [29] techniques to<br />

overcome the Secure Platform Problem is to use an appropriate<br />

security architecture based on a security kernel and special<br />

Trusted Computing hardware. [1] and [33] discuss the application<br />

of this approach for internet voting in detail.<br />

Trusted Computing efficiently overcomes malicious software on<br />

the user’s computing platform because an eligible message can<br />

only be created after successful verification of the system’s<br />

integrity. However, there are still open problems with Trusted<br />

Computing, such as in remote attestation [31]. Moreover, the<br />

concept is not widespread enough, users might already have a<br />

personal computer with integrated Trusted Platform Module but<br />

the security architecture and security kernel are still missing. It is<br />

questionable whether or not this technique will be applied on a<br />

large scale in near future. However, the approach would allow<br />

convenient and user-friendly solutions for secure services, even<br />

for internet voting as this would all run in the background.<br />

4.2 Bootable Clean Operating System<br />

Otten [22] recommended developing a special voting operating<br />

system based on an open-source operating system that boots and<br />

runs directly from a read-only data medium such as a CD or<br />

DVD. This medium would then be distributed to all users. After<br />

having received, users need to configure their computer to boot


from this medium. Additional security checks and secure<br />

distribution are required to overcome the risk of getting a<br />

malicious medium that, for example, communicates with a<br />

malicious server.<br />

While this approach overcomes many Secure Platform Problem<br />

related issues, it does not meet the particular problem of a<br />

manipulated BIOS. Such an attack allows the adversary to load a<br />

malicious environment in which the secure operating system is<br />

virtually executed without the user or the authority noticing it.<br />

Avoiding this kind of attack is only possible by applying Trusted<br />

Computing hardware as described before. Therefore, it does not<br />

ensure secrecy, nor integrity in our adversary model. However<br />

one has to keep in mind that developing such low-level attacks is<br />

not a trivial task and an adversary would have to cope with a<br />

variety of different hardware settings to successfully mount a<br />

large-scale attack in such a setting. Challenges include developing<br />

a CD or DVD that boots from all the different hardware and<br />

software settings around and that all necessary drivers are<br />

provided to be able to automatically connect to the Internet. This<br />

may lead to high development, distribution, and maintenance<br />

costs. Another difficulty for the authority is to verify that users<br />

really used the clean operating system and that it was running on<br />

hardware, not in a virtual machine potentially under the<br />

adversary’s control.<br />

4.3 Guidelines and Education<br />

A simple approach to address the Secure Platform Problem is the<br />

provision of special guidelines and the education of users in how<br />

to protect their own computer systems from malware. Examples<br />

include the guidelines provided for the student elections in Austria<br />

[30] and those developed by the German society of computer<br />

scientists [11]. They include information about software updating,<br />

firewall-settings and how to verify SSL certificates.<br />

This approach claims to reduce the probability that malware<br />

infects a user’s system. However, only standard and well-known<br />

attacks can be prevented and it is questionable whether a<br />

sufficient fraction of users are able to follow the guidelines and to<br />

really protect their systems. In addition, users cannot be forced to<br />

apply the security guidelines. Regarding user-friendliness, it is<br />

likely that many users would not follow the instructions because<br />

of additional work. Note that in contrast to e-banking the laziness<br />

of an individual user in e-voting not only impacts herself but the<br />

outcome of the election, i.e., the entirety of the participating users<br />

is affected. Furthermore, an adversary could distribute modified<br />

guidelines to mislead inexperienced users to behave incorrectly<br />

and thus to put themselves at risk.<br />

5. WITHOUT TRUSTED DEVICES<br />

Distrusting the user’s computing platform leads to the need of<br />

establishing a secure channel directly between the user and the<br />

server. This channel can either be established using cryptography<br />

or by an out-of-band channel that is not under the adversary’s<br />

control.<br />

5.1 Human-Computer Cryptography<br />

Human-computer or paper-and-pencil cryptography has a long<br />

history and given enough time, pencils, and paper, humans may<br />

theoretically perform every computation a computer can do. In<br />

terms of our model, such approaches aim to provide the user with<br />

413<br />

the capabilities to encrypt and authenticate messages directly.<br />

Hence, a trust-base is not needed and all the defined security<br />

properties can be achieved. However, the vast majority of humans<br />

lack sufficient memory and computation power to perform strong<br />

cryptographic operations in a reasonable amount of time.<br />

Nevertheless, some interesting approaches such as [16] and<br />

Schneier’s Solitaire algorithm [27] were proposed. For example,<br />

in Solitaire the randomness in a shuffled deck of playing cards is<br />

used for the encryption of messages but the approach has some<br />

weaknesses.<br />

Bertà examined in [3] the human limitations with respect to<br />

encrypting and authenticating sufficiently large messages in<br />

practical settings. He concludes that no sufficiently strong<br />

cryptographic protocol to encrypt or authenticate messages exists<br />

such that humans could apply it.<br />

Because of the obvious lack of user-friendliness we do not<br />

consider human-computer cryptography as a practical solution for<br />

the Secure Platform Problem.<br />

5.2 Codebook Cryptography<br />

Although humans are not good in performing reasonably strong<br />

cryptographic operations, they are considerably strong in<br />

comparing patterns. This fact is exploited by the concept of<br />

codebook cryptography. The idea is that prior to the<br />

communication, the trusted server encrypts all possible messages<br />

and then distributes the corresponding codebook, i.e., the cleartext<br />

/ cipher-text mapping, over an out-of-band channel 3 to the<br />

user. The user chooses a clear-text message and looks up the<br />

corresponding cipher-text (code) to be entered into the untrusted<br />

platform. The platform then sends the cipher-text to the server.<br />

Hence, the adversary does not learn the clear-text message and<br />

since not in possession of the codebook, the adversary cannot<br />

replace the message with another one that is accepted by the<br />

server. Thus, this approach is resilient against the Secure Platform<br />

Problem but needs a secure out-of-band channel for distribution.<br />

Following we present some widely discussed examples of this<br />

approach for electronic voting.<br />

5.2.1 Code Voting<br />

Chaum was the first who applied this concept to internet voting<br />

[5]. The key idea of Code Voting is that the user gets a code sheet<br />

together with the general election information via mail. The code<br />

sheet links each candidate or party to a random alphanumeric<br />

code. In order to cast a vote for a specific candidate, the user<br />

enters the corresponding code into a text-field. This code is<br />

submitted to the authority that is able to derive the user’s choice<br />

by mapping the code back to the candidate. Since not in<br />

possession of the code sheet, the untrusted platform (i.e., the<br />

adversary) can neither derive the user’s choice nor change the<br />

ballot’s content to another meaningful choice. Helbach and<br />

Schwenk [14] as well as Oppliger et al. [20] proposed different<br />

improvements like additional verification codes that are sent back<br />

from the server for individual verifiability. To overcome the votebuying<br />

problem the authors in [21] introduced an additional<br />

finalization code. Ryan et al. recently suggested in [26] and [13]<br />

to use Code Voting in combination with Prêt-à-Voter in order to<br />

3 In this case the trust-base represents the out-of-band channel that<br />

provides confidentiality and integrity of the received codebook.


allow individual verifiability. In this approach, the server can only<br />

send a valid confirmation code to the user if a majority of trustees<br />

confirm the correct recording of the voting code that was sent by<br />

the user. The main disadvantage of the Code Voting approach<br />

concerns user-friendliness, which decreases in particular for<br />

implementing complex ballots with multiple candidates to choose<br />

from. In addition, a trusted procedure to generate and distribute<br />

the code sheets is required what introduces additional complexity<br />

and costs.<br />

5.2.2 Prêt-à-Voter<br />

Another elegant implementation of codebook cryptography can be<br />

found in Prêt-à-Voter [25], where the candidate list is permuted<br />

and the permutation is encrypted. While Prêt-à-Voter was<br />

proposed for poll-site-based settings, it could be adapted for<br />

internet voting too. The user receives the ballot paper with the<br />

permuted list of candidates and the encryption of the permutation<br />

via mail. Then, she enters the index of the chosen candidate<br />

together with the encryption of the permutation (which could also<br />

serve as a ballot sequence number). The permutation is decrypted<br />

by the authority’s server and is used to derive the user’s choice.<br />

However, since using a permuted list of valid choices, the<br />

platform, although not able to learn the user’s choice, can mount a<br />

randomization attack by choosing a different index and therefore<br />

user-to-server-integrity is not provided while secrecy holds.<br />

5.2.3 CAPTCHA<br />

In [21] the authors propose the application of visual CAPTCHAs<br />

(Completely Automated Public Turing test to tell Computers and<br />

Humans Apart) to overcome the Secure Platform Problem.<br />

Candidates are displayed in a random order and represented by<br />

visual CAPTCHAs. This approach is simple to be integrated in<br />

any internet voting system. Its user-friendliness is questionable.<br />

While people might know this kind of images from other<br />

applications, it is often difficult to figure out what is displayed.<br />

Besides the fact that our model assumes an adversary with human<br />

capabilities, who is able to solve CAPTCHAs, it is particularly<br />

easy for the adversary to perform a randomization attack by just<br />

randomly choose a CAPTCHA different from the user-chosen<br />

one. A more advanced approach is discussed in [23]. Here,<br />

arbitrary CAPTCHAs, which are not related to the candidates’<br />

names, appear next to the actual candidate’s name, while the<br />

candidate order can stay as it is. The user decodes the CAPTCHA<br />

related to her favorite candidate and enters the resulting code into<br />

a text-field. Automated breaking of these CAPTCHAs becomes<br />

more difficult because of the fact that the adversary does not<br />

know the encoded clear-text in advance. However, it still does not<br />

solve the Secure Platform Problem in our adversary model.<br />

5.3 Procedural Approaches<br />

Some approaches suggest adapting the voting process in order to<br />

overcome various problems in internet voting. Some of the<br />

proposals can even be applied to mitigate the Secure Platform<br />

Problem and are therefore discussed here.<br />

5.3.1 Vote-Updating<br />

The general idea of vote-updating is that the user can update the<br />

electronic vote as often as she wants, ideally from different<br />

devices. In hybrid systems, the user can even replace the<br />

electronic vote on election day by a traditional paper ballot at the<br />

414<br />

polling station. There are several different approaches to enable<br />

vote-updating, while they have different advantages and<br />

disadvantages as shown in [12].<br />

Enabling vote-updating, the adversary looses certainty about how<br />

the user really voted since she may have used another device or<br />

went to the polling station on election day to cast a different vote.<br />

Correspondingly, the adversary will not know for sure whether the<br />

modifications will influence the result or not. Of course, this only<br />

applies if the votes cannot be linked to the users.<br />

Vote-updating helps particularly in the case where users distrust<br />

the voting system after casting their vote. For instance, this is the<br />

case when they misinterpret information presented to them, detect<br />

malware on their computers, or if they are not convinced that the<br />

ballot was properly sent and stored. However, statistics in Estonia,<br />

where internet voting, is used for political elections since 2007,<br />

indicate that only few people update their vote [9]. It might be the<br />

case that very few incidents happen but more likely most users are<br />

simply not able to notice manipulations and blindly trust their<br />

systems.<br />

Vote-updating is easy to implement and to understand by users.<br />

However, a challenge is to ensure that only one vote is counted<br />

and no problems with replay-attacks or delays on the network can<br />

cause that an earlier cast valid vote is counted. Opponents of voteupdating<br />

argue that this approach influences the value and<br />

character of an election. They argue that the act of casting a vote<br />

is something special and should not be repeatable because<br />

otherwise it might get the character of a game.<br />

5.3.2 Anonymous Voting<br />

Anonymous voting allows the user to cast a ballot without the<br />

adversary being able to link the ballot to its origin. The following<br />

protocol serves as simple example for anonymous voting. Prior to<br />

the election the user gets an official letter from the election<br />

authority, containing credentials that allow the person in<br />

possession of these credentials to cast exactly one eligible ballot<br />

and the authority does not know who got what credential. Now the<br />

user uses a public computer in an internet cafe that cannot be<br />

associated to her and enters the received credentials to prove<br />

eligibility. Then she enters the favorite candidate and submits the<br />

vote together with the credentials to the election authority’s<br />

server. The adversary learns the candidate whom was voted for<br />

but does not learn who voted. Hence, voter privacy holds. It is<br />

obvious that in this simple example neither secrecy nor integrity<br />

holds, unless combined with other approaches. A more advanced<br />

example for this category is based on blind signature schemes that<br />

have been proposed for the first time in [10] and was later used in<br />

many other protocol proposals. While this approach is more<br />

sophisticated from a cryptographic point of view, it does address<br />

the Secure Platform Problem to the same extent as the simple<br />

protocol above. Under the assumption that the untrusted system<br />

does not know the identity of the user who is using it, useranonymity<br />

is given but neither secrecy, nor integrity.<br />

5.3.3 Test Ballots<br />

Test ballots are dedicated ballots the adversary cannot distinguish<br />

from real ones. The user casts one real ballot and some test ballots<br />

in random order. Since the adversary does not know the real ballot<br />

he may manipulate one or more test ballots. After the election, the<br />

processing of all test ballots is made fully transparent to a group<br />

of auditors or even to the public for verification. Successful


attacks require the adversary to manipulate a large number of<br />

votes and therefore it is likely to detect at least a fraction of the<br />

manipulations. The approach does not provide integrity of the real<br />

vote itself but strongly indicates possible manipulations by<br />

analyzing the proper handling of the test ballots. To detect<br />

manipulations in the context of the Secure Platform Problem, the<br />

test ballots must be individually verifiable by the user. Hence, the<br />

test ballots are exposed after the election’s vote casting phase and<br />

the adversary learns the real ballot.<br />

6. TRUSTED DEVICES<br />

In the context of e-banking, a variety of technical solutions for<br />

user and transaction authentication have been presented and even<br />

deployed on a large scale. In the following we will analyze these<br />

approaches regarding the security criteria that we defined and give<br />

some hints on how such approaches could be adapted to internet<br />

voting.<br />

Solutions based on trusted devices can be classified into<br />

standalone approaches, where the trusted device (TD) is not<br />

attached to the user’s untrusted platform, and connected<br />

approaches, where the trusted device is connected to the<br />

adversary, for example, to the user’s platform. The term trusted<br />

indicates that users must trust the devices to offer trustworthy<br />

functionalities and that they securely store confidential data. If the<br />

device additionally stores a specific user’s secret information,<br />

such as cryptographic keys, we call the device a personal trusted<br />

device (PTD). Examples of personal trusted devices are smart<br />

cards. They can perform certain cryptographic operations and<br />

store individual secret information, i.e., the user’s secret key.<br />

Since additional devices are required to access the smart cards,<br />

users need to trust these devices too. Hence, in smart card based<br />

approaches the card readers are also part of the trusted device. In<br />

our model, the trust-base is the user’s smart card including the<br />

reader that is used to access the card.<br />

6.1 Standalone Trusted Devices<br />

Standalone trusted devices could be seen as calculators. The user<br />

communicates directly with the device and no communication<br />

takes place between the trusted device and any other party than<br />

the user.<br />

Challenge-response authentication protocols for e-banking<br />

solutions that use a smart card reader with a pin pad and a display<br />

are an example for this category of approaches. The bank first<br />

sends a challenge code through the user’s untrusted platform to<br />

the user who in turn enters this code into the card reader together<br />

with the bankcard’s PIN (personal identification number) for<br />

accessing the card. The card then computes a MAC (message<br />

authentication code) 4 of the challenge code and secret information<br />

stored on the card. This MAC is displayed to the user through the<br />

reader’s display. Finally, the user enters the MAC into the<br />

untrusted platform and submits it back to the bank. If the response<br />

code corresponds to a valid MAC, the bank is convinced that the<br />

correct card (containing the secret information) as well as a person<br />

who knows the correct PIN to access the card are involved in the<br />

protocol run.<br />

4 Other cryptographic operations can be used and in practice,<br />

asymmetric cryptography is often applied, where the challenge<br />

code is signed using the secret key stored on the card.<br />

415<br />

To adapt this approach to internet voting, such a device could be<br />

used to encrypt and authenticate the ballot. The user enters the<br />

candidate choice directly into the PTD and gets back an encrypted<br />

ballot, for example, represented as an alphanumeric code. The<br />

user enters the encrypted ballot into her untrusted platform and<br />

submits it to the server. Such an approach can be used to provide<br />

“digital” code voting without a separated out-of-band channel.<br />

The initial vote codes are digitally provided to the users via their<br />

untrusted platforms. The vote codes are then used like the<br />

challenges in the above described challenge-response authentica-<br />

tion example. The user enters the MAC of a secret key and the<br />

vote code that corresponds to her choice into the untrusted<br />

platform to submit this vote to the server. The authority in<br />

possession of the same secret key computes the MACs for all<br />

candidate codes and compares them with the received MAC to<br />

derive the user’s choice. Furthermore, the server could again<br />

compute the MAC of the received MAC and send it back to the<br />

user as a confirmation code that can be verified by the user when<br />

again performing the same operation using the PTD. In practice a<br />

more sophisticated scheme is required to prevent the authority<br />

from learning individual users’ votes.<br />

Since no clear-text referring to a user’s choice is submitted to the<br />

adversary, the approach supports user-to-server-secrecy. The other<br />

way round the user can use the trust-base to decrypt messages<br />

encrypted by the server. The setting provides user-to-serverintegrity<br />

if combined with a verifiable confirmation code as<br />

described above. However, user-friendliness is questionable since<br />

the user must relay all encrypted communication between the<br />

trust-base and the server. In the case of a few short codes, this<br />

may be applicable but not necessarily in complex elections where<br />

the user must choose multiple candidates.<br />

6.2 Connected Trusted Devices<br />

In contrast to standalone TDs, connected TDs are attached to the<br />

adversary, in most cases to the user’s untrusted platform, thus<br />

there is a communication channel between the adversary and the<br />

trust-base. Simple approaches offer specific functionalities to the<br />

platform they are attached to such as securely storing secret<br />

information. More sophisticated networked devices are able to<br />

directly communicate with the remote server. Generally, the more<br />

functionalities a TD offers, the more vulnerabilities may occur.<br />

However, in our model we limited the adversary’s capabilities by<br />

assuming that the adversary cannot manipulate the trust-base.<br />

The communication interfaces of a connected TD directly affect<br />

the possible security guarantees of any protocol making use of it.<br />

To make this clear, we will summarize the possible<br />

communication capabilities of the trust-base, provide examples,<br />

and discuss the properties of each setting.<br />

6.2.1 No Communication Between User and Trust-<br />

Base<br />

The trust-base has no interface to communicate with the user and<br />

all communication is based on the untrusted platform (which is<br />

part of the adversary). Particularly the user can only communicate<br />

with the adversary and neither secrecy nor integrity can be<br />

achieved with respect to our model. The only guarantee in this<br />

setting is that during the protocol run, the TD is attached to a<br />

computer, which is reachable by the adversary.


Widely deployed examples for this setting are smart cards in<br />

combination with class 1 card readers directly attached to the<br />

platform via USB. Unfortunately, the adversary immediately<br />

learns every message sent by the user, particularly the PIN that<br />

protects access to the card. Hence, after the first time the user<br />

enters the PIN, the adversary may arbitrarily use the card and<br />

perform whatever cryptographic operation the smart card offers,<br />

as long as it is attached to the untrusted platform. Applying this to<br />

internet voting the user does not know what is being processed by<br />

the TD and in a setting where vote updating is allowed, the user<br />

does not even notice that the smart card is being used at a later<br />

time to replace a vote. Another example are hardware tokens like<br />

the mIDentity developed by Kobil [17] for e-banking and other<br />

sensitive applications where a browser runs in a “secure”<br />

environment on the TD. However, as there is no communication<br />

between the trust-base and the user none of the defined security<br />

properties are guaranteed with respect to our model.<br />

6.2.2 Unidirectional Communication from the User<br />

to the Trust-Base<br />

The TD provides an input interface to the user such as a pin pad<br />

and the user can send clear-text messages to the TD, which are<br />

encrypted afterwards. Hence, such approaches provide user-toserver-secrecy<br />

as well as user-to-server-integrity. Depending on<br />

the protocol, the user can even verify the correct reception of the<br />

message (individual verifiability). To do so, the user enters her<br />

choice together with a random number into the TD, which in turn<br />

encrypts these messages with a secret key as well as a hash value<br />

thereof. The secret key is shared between the server and the TD.<br />

The TD sends the encrypted values to the adversary for submitting<br />

them to the server. After reception, the server first decrypts them<br />

and verifies their integrity before sending the random number<br />

back to the adversary as confirmation. The adversary provides this<br />

confirmation to the user and the user is convinced that the server<br />

received the correct message if and only if the confirmation<br />

corresponds to the previously entered random number. Since the<br />

adversary cannot break cryptography, the best strategy would be<br />

to guess the random number, which is not feasible for large<br />

enough numbers. In this setting the server cannot send any secret<br />

or authentic message to the user because the TD is not able to<br />

communicate with the user differently than through the adversary.<br />

Examples include smart cards in combination with class 2 readers.<br />

These readers provide a pin pad to prevent the platform from<br />

learning the PIN since it is directly entered into the trusted card<br />

reader. Because the adversary does not learn the PIN, unnoticed<br />

access to the smart card’s functionality is prevented.<br />

6.2.3 Unidirectional Communication from the Trust-<br />

Base to the User<br />

The TD has an output interface such as a display or a speaker. The<br />

adversary learns every message sent by the user. Therefore A can<br />

learn every message sent by the user and again the adversary may<br />

learn the PIN to access TD’s functionality. It is possible to avoid<br />

this, for example, by displaying a randomly permuted pin pad on<br />

the untrusted platform’s display on which the user has to enter the<br />

PIN [4]. The corresponding permutation is displayed on the TD’s<br />

display. Every time the TD is accessed it challenges the user,<br />

using the output interface. Moreover, the TD’s output interface<br />

can be used to verify that the server received the correct message.<br />

To do so, the server sends confirmation messages, which the trust-<br />

416<br />

base is able to decrypt and verify. The verification result is then<br />

provided to the user. Hence, depending on the concrete<br />

implementation, secrecy and integrity from the user to the server<br />

as well as vice versa can be achieved. Thus, it overcomes the<br />

Secure Platform Problem but requires sophisticated user interfaces<br />

to assure secrecy and therefore lacks user-friendliness for practical<br />

applications. User-to-server-integrity can conveniently be<br />

achieved by individual verifiability. More specifically, the PTD’s<br />

trustworthy output interface can be used to verify information<br />

received by the server.<br />

Examples are smart cards and readers with only a confirmation<br />

display. The display can be used to verify data that will be<br />

processed by the smart card. Another example. Which is already<br />

widely applied in e-banking is transaction authentication.<br />

Confirmation information of every transaction entered by the user<br />

is sent over a dedicated channel to the user. The user verifies the<br />

correctness and authorizes the transaction. One concrete<br />

implementation is based on short messages and mobile phones as<br />

TDs. The user enters the desired transaction into the untrusted<br />

platform and sends it to the bank’s server. The server generates a<br />

transaction authentication number (TAN) and sends a short<br />

message containing the beneficiary’s account number, the<br />

amount, and the TAN to the user’s mobile phone. Now, the user<br />

verifies the correctness of the transaction information. If verifica-<br />

tion is successful, the user authorizes the transaction by entering<br />

the TAN into the untrusted platform to send it to the server. The<br />

server compares the received TAN with the expected TAN and<br />

accepts the transaction if they are equal. This concept could be<br />

used for internet voting to allow individual verification but it is<br />

only secure as long as the adversary cannot break confidentiality<br />

and integrity of the short messages sent by the authority’s server.<br />

Unfortunately today’s implementations cannot prevent either.<br />

Moreover, it is questionable whether it is reasonable to assume<br />

mobile phones to be trustworthy. In near future communication<br />

platforms may conflate and voting as well as short messaging may<br />

be performed using the same platform, which introduces the<br />

Secure Platform Problem again.<br />

6.2.4 Bidirectional Communication between the<br />

Trust-Base and the User<br />

The trust-base provides an input as well as an output interface to<br />

communicate with the user. In this setting the user may enter<br />

confidential messages directly into the TD. In contrast to the<br />

setting where communication exclusively takes place from the TD<br />

to the user, user-friendliness is improved because of the fact, that<br />

security-critical messages can directly be entered, thereby<br />

conveniently enabling user-to-server-secrecy. User-to-serverintegrity<br />

is based on the ability of the TD to encrypt (and sign)<br />

messages. This setting also allows individual verifiability based<br />

on the TD’s trustworthy output interface to the user.<br />

Examples are smart cards in combination with class 3 readers.<br />

These devices offer a high degree of security and a convenient<br />

way for the user to securely communicate with the trusted server.<br />

More complex solutions allow the TD to directly communicate<br />

with the server using standard network communication protocols.<br />

The Zone Trusted Information Channel (ZTIC) [2][34] was<br />

recently developed by IBM and is widely deployed by a popular<br />

Swiss bank. The ZTIC is a networked USB-attached smart card<br />

reader for application and transaction authentication in e-banking.<br />

The device consists of a small display and a few buttons. Trans-


actions with yet unknown recipients have to be verified by the<br />

payer using the device’s display and authorized by pressing a<br />

respective button on the device. The device communicates<br />

directly with the bank’s server using the untrusted platform as a<br />

network proxy only. Adapting such a solution for internet voting<br />

offers a high degree of security while being convenient with<br />

respect to user-friendliness.<br />

Borchert et al. propose the use of camera-equipped mobile phones<br />

for user and transaction authentication in e-banking. They provide<br />

a variety of ideas and implementations [4]. However, we do not<br />

consider mobile phones to be trustworthy for internet voting<br />

applications.<br />

7. CONCLUSION AND FUTURE WORK<br />

The Secure Platform Problem is one of the most serious problems<br />

in any online application and thus needs to be addressed in<br />

particular if it comes to e-governmental and internet voting<br />

applications. We introduced in this paper an adversary model that<br />

reflects the Secure Platform Problem as well as criteria which<br />

needs to be ensured in this model. We provided a taxonomy of<br />

approaches. We classified these approaches into those that aim to<br />

improve the trustworthiness of the user’s platform and those that<br />

distrust the user’s platform completely. We described and<br />

analyzed existing approaches to address the Secure Platform<br />

Problem in the context of remote electronic voting. The results<br />

can be summarized as followed:<br />

Distrusting the platform requires a secure channel directly from<br />

the user to the election authority’s server. This channel can be<br />

established either without or with trusted devices. We pointed out<br />

that approaches without trusted devices are more cost-efficient,<br />

while they also lack user-friendliness.<br />

Trusted Computing offers convenient options for highly security<br />

critical applications such as internet voting. However, it is unclear<br />

whether corresponding operating systems and software will be<br />

available and used by a sufficiently large group of users in the<br />

foreseeable future. We noted that one must still trust the various<br />

manufacturers to have properly implemented the Trusted<br />

Computing hardware and software. For political systems where<br />

users participate only every couple of years, e.g., in elections,<br />

codebook cryptography seems to offer the most promising<br />

solution approaches. Trusted devices without communication<br />

interface to the user are useless regarding the Secure Platform<br />

Problem, more sophisticated solutions have great advantages with<br />

respect to user-friendliness as well as concerning the level of<br />

security obtainable. The high operational costs for maintenance,<br />

distribution, and support may not be in due proportion to the<br />

benefits for many voting settings unless the devices can be used<br />

for other applications too (e.g., e-banking or other frequently used<br />

e-government services). However, in countries like Switzerland<br />

where all citizens participate at political decisions several times a<br />

year, the use of special-purpose trusted devices might be<br />

applicable.<br />

Thereby, we believe to raise awareness for the Secure Platform<br />

Problem that has been mostly neglected in past. We further<br />

believe that the results of this paper support decision makers in<br />

electronic government projects with an overview of the currently<br />

most relevant approaches to meet the Secure Platform Problem<br />

including their limitations. Additionally, we strongly believe that<br />

this paper encourage developers to integrate one or more of these<br />

417<br />

approaches in their products, and researchers to find more<br />

adequate solutions.<br />

Combinations of the discussed approaches may have effects on<br />

the security properties as well as on user-friendliness. An example<br />

is the combination of vote updating with codebook cryptography<br />

in internet voting as it is implemented in the Norwegian system<br />

[18]. Therefore, as future work we plan to analyze different<br />

combinations of existing approaches.<br />

We exclusively focused on the client-side Secure Platform<br />

Problem and assumed the voter to be trustworthy. In specific<br />

settings like in internet voting this assumption does not<br />

necessarily hold. Therefore, we plan to examine existing<br />

approaches in the context of the entire voting system.<br />

Furthermore, it needs to be examined whether particular<br />

approaches impact verifiability or other important requirements<br />

which needs to be ensured in the context of internet voting. For<br />

instance, Code Voting requires a secure process for generating<br />

and distributing the code sheets since voter privacy must also hold<br />

against the authority. This will be part of future investigations,<br />

too.<br />

8. ACKNOWLEDGEMENTS<br />

We would like to thank Rolf Oppliger and the members of the<br />

Swiss E-Voting Competence Center for the fruitful discussions<br />

and valuable inputs. This research is partly supported by the Swiss<br />

Federal Chancellery.<br />

9. REFERENCES<br />

[1] A. Alkassar, A.R. Sadeghi, S. Schulz, and M. Volkamer.<br />

Towards Trustworthy Online Voting. In Proceedings of the<br />

1st Benelux Workshop on Information and System Security–<br />

WISSec, 2006.<br />

[2] M. Baentsch, P. Buhler, R. Hermann, F. Höring, T. Kramp,<br />

and T. Weigold. A Banking Server’s Display on Your Key<br />

Chain. ERCIM News, pages 44–45, 2008.<br />

[3] I.Z. Berta and I. Vajda. Limitations of humans when using<br />

malicious terminals. Tatra Mountains Mathematical<br />

Publications, 29:1–16, 2004.<br />

[4] B. Borchert. Trojanersichere Online Accounts. http://wwwti.informatik.uni-tuebingen.de/~borchert/Troja/.<br />

[5] David Chaum: Untraceable Electronic Mail, Return<br />

Addresses, and Digital Pseudonyms. Commun. ACM 24(2):<br />

pages 84-88. 1981.<br />

[6] D. Chaum. Surevote: technical overview. In Proceedings of<br />

the Workshop on Trustworthy Elections (WOTE’01), 2001.<br />

[7] M. R. Clarkson, S. Chong, and A. C. Myers. Civitas: Toward<br />

a secure voting system. IEEE Symposium on Security and<br />

Privacy, pages 354–368, May 2008.<br />

[8] D. Dolev and A. Yao. On the Security of Public Key<br />

Protocols. IEEE Transactions on Information Theory,<br />

29(2):198-208, 1983<br />

[9] Estonia. Statistics of Internet Elections in Estonia.<br />

http://www.vvk.ee/ voting-methods-inestonia/engindex/statistics.


[10] A. Fujioka, T. Okamoto, and K. Ohta. A practical secret<br />

voting scheme for large scale elections. In Proceedings of the<br />

Workshop on the Theory and Application of Cryptographic<br />

Techniques: Advances in Cryptology, ASIACRYPT ’92, pages<br />

244– 251, London, UK, Springer, 1993.<br />

[11] Gesellschaft für Informatik. Information für GI-Mitglieder zu<br />

möglichen Sicherheitsproblemen auf Client-seite bei<br />

Vorstands- und Präsidiumswahlen mit dem<br />

Onlinewahlverfahren. Technical report, https://www.giev.de/fileadmin/redaktion/Wahlen/handreichungen_gi_online<br />

wahlen.pdf, 2007.<br />

[12] R. Grimm and M. Volkamer. Multiple Cast in Online Voting<br />

- Analyzing Chances. In R. Krimmer, editor, Electronic<br />

Voting 2006 - 2nd International Conference, volume 86 of<br />

LNI, pages 97–106, Bonn, 2006.<br />

[13] J. Heather, P. Y. A. Ryan, and V. Teague. Pretty good<br />

democracy for more expressive voting schemes. In<br />

ESORICS, pages 405–423, 2010.<br />

[14] J. Helbach and J. Schwenk. Secure Internet Voting with<br />

Code Sheets. In VOTE-ID, pages 166–177. Springer, 2007.<br />

[15] M. Hirt and K. Sako. Efficient receipt-free voting based on<br />

homomorphic encryption. 19th international conference on<br />

Theory and application of cryptographic techniques, pages<br />

539–556, 2000.<br />

[16] T. Matsumoto. Human-computer cryptography: An attempt.<br />

In Proceedings of the 3rd ACM Conference on Computer<br />

and Communications Security, pages 68–75. ACM, 1996.<br />

[17] mIDentity from KOBIL.<br />

http://www.kobil.com/index.php?id=49&L=0.<br />

[18] H. Nore. Open source remote electronic voting in norway.<br />

Presentation at the Council of Europe, Strasbourg 16/11-<br />

2010, 2010.<br />

[19] R. Oppliger. How to address the secure platform problem for<br />

remote internetvoting. SIS, 2:153–173.<br />

[20] R. Oppliger, J. Schwenk, and J. Helbach. Protecting Code<br />

Voting Against Vote Selling. In Sicherheit, pages 193–204,<br />

2008.<br />

[21] R. Oppliger, J. Schwenk, and C. Löhr. Captcha-based code<br />

voting. In R. Krimmer and R. Grimm, editors, Electronic<br />

Voting, volume 131 of LNI, pages 223–222. GI, 2008.<br />

[22] D. Otten. Mehr Demokratie durch Internetwahlen?<br />

Presentation at Nixdorf Forum, Paderborn, 2005.<br />

418<br />

[23] S. Popoveniuc and P. L. Vora. Remote ballot casting with<br />

captchas.<br />

http://www.seas.gwu.edu/~poorvi/RemoteBallotCasting.pdf,<br />

2008.<br />

[24] R.L. Rivest. Electronic voting. In Proceedings of Financial<br />

Cryptography 01, pages 243–268. Springer, 2001.<br />

[25] P. Ryan and S. Schneider. Prêt à Voter with Re-encryption<br />

Mixes. In Proceedings of Computer Security, ESORICS<br />

2006, pages 313–326. Springer, 2006.<br />

[26] P.Y.A. Ryan and V. Teague. Pretty good democracy. In<br />

Proceedings of the 17th International Workshop on Security<br />

Protocols, Cambridge, UK, 2009.<br />

[27] B. Schneier. The solitaire encryption algorithm,<br />

http://www.schneier.com/solitaire.html, 1999.<br />

[28] G. Schryen and E. Rich. Security in Large-Scale Internet<br />

Elections: A Retrospective Analysis of Elections in Estonia,<br />

the Netherlands, and Switzerland. Trans. Info. For. Sec.,<br />

4:729–744, December 2009.<br />

[29] Trusted Computing Group.<br />

http://www.trustedcomputinggroup.org/.<br />

[30] Team of oeh-wahl.gv.at. Sicherheitsempfehlung für<br />

Endbenutzer. Technical report, http://www.oehwahl.gv.at/Content.Node/E-<br />

Voting_Sicherheitsempfehlung.pdf, 2009.<br />

[31] L. van Doorn. Trusted computing challenges. In Proceedings<br />

of the 2007 ACM Workshop on Scalable Trusted Computing,<br />

STC ’07, pages 1–1, New York, NY, USA, 2007. ACM.<br />

[32] M. Volkamer. Evaluation of Electronic Voting -<br />

Requirements and Evaluation Procedures to Support<br />

Responsible Election Authorities, Volume 30 of LNBIP.<br />

Springer, 2009.<br />

[33] M. Volkamer, A. Alkassar, A.R. Sadeghi, and S. Schulz.<br />

Enabling the Application of Open Systems Like PCs for<br />

Online Voting. In Proceedings of Workshop on Frontiers in<br />

Electronic Elections. Citeseer, 2006.<br />

[34] T. Weigold, T. Kramp, R. Hermann, F. Höring, P. Buhler,<br />

and M. Baentsch. The Zurich Trusted Information Channel –<br />

An Efficient Defence Against Man-in-the-middle and<br />

Malicious Software Attacks. Trusted Computing-Challenges<br />

and Applications, pages 75–91, 2008.


Session 15<br />

Measurement 2


Anti-Corruption Online Monitoring Systems in Brazil<br />

Ricardo Matheus<br />

University of São Paulo<br />

Araújo street, 124. São<br />

Paulo – SP – Brazil<br />

+55(11) 7227-7521<br />

ricardomatheus<br />

@gmail.com<br />

Manuella M Ribeiro<br />

Fundação Getúlio Vargas<br />

Araújo street, 124. São<br />

Paulo – SP – Brazil<br />

+55(11) 7633-1678<br />

maiamanuella<br />

@gmail.com<br />

ABSTRACT<br />

Since the development of electronic government, the main area<br />

using information and communication technologies in<br />

governments were financial control and tax payment. However,<br />

recently, this scenario has been changing and new forms of ICT<br />

have been used. One of this new form is the anti-corruption online<br />

monitoring systems. It is a new channel where all of information<br />

about governments is published on transparency portals and there<br />

is a complex system to receive inquires and charges, kind of<br />

ombudsman through the Internet. It was conducted an exploratory<br />

study of sub-national initiatives from Court of Accounts to find<br />

initiatives and a structured review of websites. The States Courts<br />

of Accounts are the entity responsible to control State<br />

Governments in Brazil. The final considerations reveals what are<br />

the limits and challenges of anti-corruption online monitoring<br />

systems have in terms of technological use, as web 2.0, social<br />

networks and others innovations perceived on the international<br />

literature review.<br />

Categories and Subject Descriptors<br />

J.1 [Computer Applications]: Administrative Data Processing –<br />

government<br />

General Terms<br />

Management, Theory.<br />

Keywords<br />

Anti-Corruption, Electronic Government, Electronic Governance,<br />

Latin America, Brazil.<br />

1. INTRODUCTION AND<br />

CONTEXTUALIZATION<br />

The Federative Republic of Brazil is the biggest country in South<br />

America, with around 190 million of habitants spread in<br />

8.514.876 km2 [1]. Brazil is also the first economy of South<br />

America and the 7th of the world [2]. The capital is Brasilia,<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

419<br />

José Carlos Vaz<br />

University of São Paulo<br />

Araújo street, 124. São<br />

Paulo – SP – Brazil<br />

+55(11) 2174-6800<br />

vaz<br />

@usp.br<br />

Cesar A de Souza<br />

University of São Paulo<br />

Araújo street, 124. São<br />

Paulo – SP – Brazil<br />

+55 (11) 3091-5892<br />

calesou<br />

@usp.br<br />

situated at the very center of the country, but the biggest and most<br />

economically dynamic city is São Paulo, at the Southeast. The<br />

country is divided in 26 States and 5.565 cities [1], which are<br />

federative units – which mean they are autonomous and have their<br />

own Legislative and Executive powers. The cities became<br />

autonomous after the Constitution of 1988, which marked the end<br />

of military dictatorship in the country, after 21 years. It is<br />

interesting to notice that, during the design of the same<br />

Constitution, it was tried to establish a parliamentary system, but<br />

the population, through a plebiscite held in 1993, chose the<br />

Presidential system of government.<br />

Recently, the Association of Brazilian Magistrates, pointed out at<br />

"Confidence Barometer in the Brazilian Institutions", that two of<br />

the three institutions with the worst ratings are linked to the<br />

Legislature [3]. This fact shows how necessary is to open<br />

Legislative Power and produce better governance of this actions<br />

and, recently, several public policies towards the idea of social<br />

control are reconfiguring relationships between state, society and<br />

market [4, 5]. The State is not seen anymore in Brazil as a<br />

promoter of policies top-down approach, but a mediator of social<br />

relations, with policies built collectively [5]. The society is called<br />

to be responsible also for the policies pursued by the government,<br />

and this space is that the concept of governance is gaining<br />

strength, the possibility of connectivity and transparency in<br />

government.<br />

Some of these innovations are from the use o ICTs in public<br />

administration, the e-government, and close impact of the<br />

government bureaucracy re-engineered during the State Reform in<br />

the 80’s and 90’s. On the Legislative Power, the wave of<br />

modernization came through the 'Interlegis Program' [6] focused<br />

on modernization and integration of Legislature at federal, state<br />

and municipal levels. Its modernization improved public policies<br />

to promote more transparency and interaction of that Power with<br />

society. With the ICTs on the legislative power, the scenario<br />

changed some States Courts of Accounts (SCAs), where computer<br />

applications and software were created and offered to citizens the<br />

possibility of social control improvements of government actions,<br />

increasing chances of corruption combating. Our goal in this<br />

article is to find the limits and challenges of anti-corruption online<br />

monitoring systems have in terms of technological use, as web<br />

2.0, social networks and others innovations perceived on the<br />

international literature review.


2. LITERATURE REVIEW<br />

2.1 Electronic Government<br />

First we must point out that the E-Government is a concept still<br />

under construction often being confused with e-governance and<br />

computerization and use of ICTs by the government [7]. This<br />

means that no concept is widely accepted or rejected. Our study<br />

finds that electronic government is defined largely by the use of<br />

ICTs, especially the computerization of the public sector and<br />

using the Internet as a communication medium, but also uses<br />

other means of communication, not only focus on the use of<br />

computers [4]. Nevertheless, there is a consensus that the main<br />

medium used in e-government is the Internet, especially due to<br />

technological factors. Others point out that this trend will diminish<br />

over time, with the development of new information technologies<br />

[8, 9]. Moreover, it is noted that the overall e-government<br />

initiatives have always been a feature in common: the use of ICTs<br />

by government [10, 11, 12, 13].<br />

As in most Latin American countries [14], Brazil, e-gov had her<br />

embryo with the computerization of the federal state apparatus in<br />

the 70s [15, 16]. During the 90s, we had the spread of commercial<br />

Internet in Brazil, with the emergence of a National Research<br />

Network and the early government websites in 1995 [17], and in<br />

1998 the Brazil already had a good network of services through<br />

the use of ICTs, such as electronic commerce [18], the delivery of<br />

income tax, access to government information [7] and a host of<br />

other services online [19, 20, 21, 22].<br />

2.2 Electronic Governance<br />

From the electronic government concept being understood as a<br />

promoter of the rights of citizenship, such as social control,<br />

combating corruption and citizen participation, the State may<br />

extend the use of traditional e-government, based on process<br />

improvement and fiscal revenue economic, to expand the dialogue<br />

and meeting public expectations. This is when we went to egovernance,<br />

another concept that also is still no consensus<br />

prevailing in academia [9]. One of the issues found in the<br />

literature on the topic of e-governance are the possibilities and<br />

limits they have in making changes in the relationship between<br />

civil society and governmental sphere [23]. Among authors who<br />

believe in e-governance as a promoter of socioeconomic<br />

development, public management, increasing transparency and<br />

combating corruption, especially by means of citizen participation<br />

[24, 25, 26]. In Latin America we also found a similar trend of<br />

global research. Although some authors point to certain spots,<br />

such as transparency, and fighting corruption, and citizen<br />

participation, all authors who deal with Latin America point to a<br />

certain optimism about the e-governance, especially for<br />

socioeconomic development, public management, increasing<br />

transparency and combating corruption, especially by means of<br />

citizen participation [10, 27, 28, 29].<br />

In Brazil, e-Governance, according to [30, 31], is related to<br />

improved quality, efficiency, effectiveness, transparency and<br />

oversight of government entities. [25] points out that egovernance<br />

can go beyond the availability of government<br />

information. It can universalize the provision of public services<br />

and serving as an information channel and uninterrupted<br />

communication between the remote and public administration and<br />

population, with the advantage of promoting transparency,<br />

especially in the accounting area, as occurs in the portal of the<br />

420<br />

Federal Government Transparency. And that e-governance was<br />

characterized as the promise of wider interaction with citizens,<br />

and always focused on delivering services, which leads us to<br />

believe that we will inevitably develop a so-called electronic<br />

democracy [32]. However, our concept shows that e-governance<br />

is one of the impacts of the introduction of e-government<br />

successful, public management and offer a channel for dialogue of<br />

the population's demands and actions of government, with greater<br />

legitimacy, notably through the dissemination of information from<br />

all areas of public administration, with full public access to<br />

services provided by the Internet, cell phones, television and<br />

interact seamlessly and remotely, to promote substantial increase<br />

transparency, not only of the accounting reports of the<br />

Administration, but also the actions taken by all branches of<br />

government and administrative spheres of government.<br />

2.2.1 Electronic Governance and the promotion of<br />

rights of social control of public management<br />

The right to social control of public management refers to<br />

monitoring the formulation of policies and government initiatives<br />

by citizens and their organizations. This category of rights creates<br />

conditions for the establishment of trust between rulers and ruled,<br />

and gives legitimacy to the actions of the latter [7]. The initiatives<br />

are related to these rights are the checks and balances and the<br />

disclosure of government activities. The right to social control<br />

depends crucially on access and availability of government<br />

information, or is directly related to the right to public<br />

information. The experiences found in this category can monitor,<br />

assess and monitor government performance. For example, the<br />

publication of financial statements, reports on activities of public<br />

institutions, progress of works and dissemination of bidding. With<br />

the use of ICTs the right to social control of government can be<br />

promoted by the possibility of facilitating access to information,<br />

especially using the Internet. The Internet is a fast, relatively<br />

inexpensive and easy to use that enhances the promotion of this<br />

right. Examples of using ICTs to promote this right may be cited:<br />

the dissemination of government information over the Internet,<br />

sending through the provision of listed phone via text message,<br />

the complaint online, among others.<br />

1.1.1 Combating Corruption, Transparency,<br />

Accountability and Social Control<br />

The theme of fighting corruption, transparency, oversight and<br />

accountability are closely linked. No doubt that transparency can<br />

generate a significant increase in social control by citizens, thus<br />

hindering some deviations and biases of Public Management, such<br />

as corruption and ‘clientelism’, the political patronage [33]. Thus,<br />

through social control easier, the citizen would exercise more and<br />

better their right of participation and accountability of actions and<br />

accounts of government [34]. Although we believe that these<br />

concepts are inseparable, this article divides the four concepts into<br />

smaller, more detailed chapters, entitled Anti-corruption,<br />

transparency, accountability and social control, trying to get better<br />

division of the references and definitions of the concepts proposed<br />

and studied.<br />

Combating corruption in Brazil has gained great prominence<br />

through increased surveillance of domestic institutions of<br />

government as the comptroller General's Office and the Audit<br />

Courts throughout Brazil. Despite evolution of fighting corruption<br />

in these instances, the authors describe that popular participation


is essential to curbing corruption, a concept which we believe is<br />

also in line with our expectations, as no social control and<br />

accountability, there is no really diminish the maximum all the<br />

deviations and acts of corruption within the country. ICTs,<br />

particularly the Internet, may increase the potential for<br />

transparency in basic processes made by e-gov. According to [35],<br />

the proper use of information is the best vaccine to combat<br />

corruption. So there is no doubt that the Anti-Corruption Tools<br />

Online does not resolve the problem of corruption, but will<br />

certainly fight them. We reaffirm the role of other institutions<br />

such as the TCEs and the Comptroller General's Office and the<br />

Court of Audit, as major allied agencies to promote the fight<br />

against corruption through their respective legal and<br />

administrative. [36] recommends the wide dissemination of these<br />

tools online that can provide the empowerment of political<br />

decisions, and we anticipate that the online public consultation<br />

can perform this role of offering space and 'voice' in public policy<br />

debates subnational and even national As exemplified with<br />

regulatory agencies and ministries of Brazil.<br />

This article will understand how the concept of social control the<br />

way in which the company directly control the state, adding<br />

branches and alternative institutions such as the comptroller and<br />

internal Audit Courts. Brazil recently drafted a law called the<br />

Statute of the City (Law 10257) that projects the population<br />

participate in the decision of public administration, according to<br />

the guidelines of the City Master Plan. However, we should point<br />

out that there is still a difficulty to implement systems of citizen<br />

participation due to bureaucracy and lack of culture of citizen<br />

participation in the country, but internationally recognized as the<br />

Digital Participatory Budget in Belo Horizonte [37, 38]. Exactly<br />

what pointed [39] two decades ago, wondering when Brazil could<br />

actually have citizen participation to promote social control and<br />

accountability. We also question the public administrators about<br />

his actions, as we point accountability, referring to the provision<br />

of accounts and definitions of the objects of actions. However,<br />

this action a citizen needs information, to question their leaders.<br />

[40] emphasizes the interdependence between social control and<br />

accountability, being essential to the transparency of decisions of<br />

public officials. Nevertheless, it is shown that the administration<br />

acted with economy, efficiency and honesty.<br />

The concept of transparency can be understood in two aspects<br />

according to [25]. The first indicates the concept of transparency<br />

as a synonym for publicity, and the second as transparency and<br />

the availability of data, considering the transparency with data<br />

access, digital inclusion and availability of data, particularly<br />

regarding the frequency and timeliness of information contained<br />

portals and government sites, according to the words mentioned<br />

by [7], recognizing the information as a public right of every<br />

citizen. Furthermore, some authors suggest there is no reason why<br />

public managers do not have their acts, accounts and information<br />

content without confidentiality are not available for the population<br />

[41]. Obviously, there is a rule on publicizing for acts of<br />

administration, provided for in the Constitution that allow for<br />

confidentiality of certain information especially essential to the<br />

security of society and the state, such as cases of national security,<br />

law enforcement investigations or interests of the Directors.<br />

Therefore, we believe that the true meaning of transparency is the<br />

opening of the supply of information, free and universal access,<br />

constant update, posted to a single channel of communication and<br />

interaction with citizens and with search tool to help citizens find<br />

the theme you want fast.<br />

421<br />

1.1.1.1 Citizen Participation and Electronic<br />

Democracy<br />

According to some authors [7, 42, 43], we can point suggests that<br />

the public's right to be heard by governments. That we would<br />

characterize as more collaborative democracy, listening and, of<br />

course, filtering the demands of society. However, the tool online<br />

public consultation is one element that can indeed improve society<br />

participation in the development of programs, laws and various<br />

other matters that the Brazilian government has historically done<br />

without consulting the public [42]. [8] suggests that ICTs have<br />

come so that citizens could come together and form groups to<br />

discuss public policy forums and legitimizing and facilitating<br />

interaction within communities, especially in sub-areas. [27]<br />

points to several international examples of good use of public<br />

consultations online, online forums and other tools for citizen<br />

participation through a model of electronic democracy.<br />

3. METHODOLOGY<br />

The first step of the research was an exploratory search on the<br />

Internet of 27 Court of Accounts, looking for portals of<br />

transparency and anti-corruption online systems. This paper<br />

considered to the search that anti-corruption online systems are<br />

online delivery of information via electronic forms or through<br />

electronic mail, to combat corruption as Latin American literature<br />

review considers [27, 44]. The complaint in this online survey is<br />

being perceived as sending the complaint to the government via<br />

electronic form or through an online based web platform. In Latin<br />

America the most common kind of form is via electronic mail,<br />

however, several let through telephone and mail.<br />

Further, the second step was a structured analysis of websites<br />

portals of SCAs in Brazil during 2 months of 2011 – May, June.<br />

The search reveals four web platform for anti-corruption; Mato<br />

Grosso, Paraíba, Piauí and Paraná. The third step was to compare<br />

what have been finding on international literature review about<br />

web 2.0 usage and new ICTs for anti-corruption and transparency<br />

that we pointed out in our literature review. Every finding about<br />

ICT usage on the website was noted and them checked to a list<br />

from literature review. The results reveals limits and challenges of<br />

anti-corruption online systems and some recommendations were<br />

purposed for problems we found in the exploratory and structured<br />

analysis of website, several in according with our literature<br />

research in the area.<br />

4. RESULTS AND ANALYSES<br />

Several concepts among the possibilities of ITC usage by<br />

governments, transparency, civil participation and combating<br />

corruption are evidently limited in Brazil. For example, is noted in<br />

all websites that the notion of transparency is limited to offer for<br />

citizen the counts of Public Administration. It is like “we gave the<br />

numbers, now you are by yourselves”. Regardless of Federal<br />

Constitution previse the definition and several laws about<br />

transparency in Brazilian governments, the notion is around the<br />

idea of advertising data by the government. There is no action<br />

toward a development of infra-structure or even web 2.0 usage,<br />

following civil society step, as the use of social networks, blogs<br />

and others web tools. The majority of them of five anti-corruption<br />

online systems showed that there is more challenges than good<br />

perspectives in relation what literature review recommends.


Among the main limitations and challenges to improving Tools<br />

Online Anticorruption state courts of auditors can highlight the<br />

lack of integration of technology platforms and systems, such as<br />

photographs, interactive maps, PDF documents, spreadsheets and<br />

easy access to e-mail or phone number and address of the<br />

ombudsman, which could further enhance the work of these tools<br />

installed in some of Brazil TCEs. Among the universe of TCEs<br />

studied, the state of Mato Grosso is one of the most complete<br />

systems studied, as it enables the citizen can have the information<br />

easily deployed platform solutions.<br />

The challenges of improving the Anti-Corruption Online Tools of<br />

TCEs are based on the production of programs that can<br />

increasingly expand their database, since the ideas are being<br />

implemented, fitting for the near future, to reconcile more<br />

databases have not included in the system for the production of<br />

thematic maps, graphs and other models to attract non-traditional<br />

society to control the public sector and the actions of government.<br />

As an example of this database can highlight the transparency of<br />

the Portal, which has all the information about large projects such<br />

as the Bolsa Familia – biggest social policy in Brazil that aims the<br />

poverty reduction. However there is still no trace of these public<br />

policies georeferenced and can be pursued. Who undertake a<br />

project to that effect, have an anti-corruption online increasingly<br />

transparent and probably more efficient. By means of social<br />

control held by the citizen through more transparent information,<br />

the TEC will be helped and can probably find more irregularities<br />

and improves the use of public money thus preventing fraud,<br />

embezzlement and corruption within the public administration.<br />

Despite some improvements in certain uses of the Internet-based<br />

technologies, we have not seen an intensive practices already<br />

adopted by society and the general market, such as social media<br />

(Twitter, for example), channels like blogs and discussion forums<br />

on certain situations or cases that come to the fore by the<br />

company, use of mobile technologies, such as sending text<br />

messages and videos and pictures messages (SMS and MMS), and<br />

the use of Web 2.0 technologies, increasing the interaction<br />

between citizen and government, called e-governance. The short<br />

results are above.<br />

4.1 Structured Review of State Court of<br />

Accounts Websites<br />

The SAS of Mato Grosso is one of Supreme Audit most advanced<br />

in the area of promoting the transparency of data from the<br />

municipalities and the state, especially in the area of the industry<br />

works. Introducing an anti-corruption online innovator in public<br />

works, the SAS of Mato Grosso available to its citizens GEO-<br />

Obras, a promising system in social control and fighting<br />

corruption as it provides public notices, photographs, maps,<br />

search option by type of work, city and state of the work. Another<br />

positive point is the tool found in this section called the<br />

ombudsman, which can be triggered by citizen participation,<br />

controlling the actions of public administration in the state. To<br />

learn more about this tool TEC Mato Grosso [45].<br />

The SAS Paraíba is one of the Courts of Auditors, which achieved<br />

a good level of transparency of data and information from the<br />

State and the Municipalities of Paraíba. The anti-corruption tool<br />

called SAGRES online [46] is one of the innovations in TEC of<br />

Paraiba and provides citizens with information of revenues,<br />

expenditures, commitments and lenders at a single site, and also a<br />

422<br />

search tool that can be done through data as the year, Municipality<br />

and other categories, showing the complexity of the tool online.<br />

Standing out in the National scene, the SAS of Piaui [47], is a<br />

court of Auditors has also advanced in the area of transparency of<br />

information and use of ICTs, emerging standards and outdated<br />

static pages with no interactivity or search system to the citizen.<br />

The anti-corruption OBRAS-WEB tool is a breakthrough in the<br />

area of transparency, together with other programs studied in this<br />

work. For example, there is a search engine that can find work<br />

throughout the state, reporting data, the individual nature of the<br />

works, the value of the contract and even state of the work. As a<br />

challenge to improve the tool, which is worth to highlight the<br />

inclusion of an area of ombudsman, thus offering the power of<br />

citizen participation, channeling complaints in one place and<br />

instructing citizens to contribute in combating corruption in public<br />

administration State and municipalities.<br />

The SAS is one of Parana [48] of Supreme Audit Brazilians who<br />

valued the use of ICTs to promote transparency of data and<br />

information concerning their works done by the government. This<br />

appreciation led to the creation of anti-corruption tool called the<br />

Public Works, where the citizen can know the status of state and<br />

municipal works, made from the use of public money in the state.<br />

As challenges to improve this tool, we highlight the lack of an<br />

ombudsman for easy access to the tool, as in other TCEs and also<br />

a section in which there is photographic record, proving that the<br />

works were made and according to the notices, deadlines and<br />

guidelines established by the rules and laws of the State.<br />

4.2 Anti-Corruption Online Monitoring<br />

Systems of State Court Accounts of Brazil<br />

Pros Cons<br />

ñ� Use of Geocoding;<br />

ñ� Tracking public policies<br />

and public works;<br />

ñ� Possibility to increase<br />

transparency of data for social<br />

control citizen<br />

ñ� Use ICT to promote citizen<br />

participation: Extension of<br />

models of tools aimed at helping<br />

citizens' participation in external<br />

control conducted by the SAS;<br />

ñ� Although in its infancy, the<br />

use of new social technologies<br />

and multimodal to combat<br />

corruption, such as:<br />

ñ� Web Radio;<br />

ñ� Twitter;<br />

ñ� SMS to complaints and<br />

grievances;<br />

ñ� Ombudsmen Online;<br />

ñ� Multimodal channels of<br />

information;<br />

ñ� Cadastral surveys of<br />

municipalities and processes that<br />

are being judged;<br />

ñ� Provision of informational<br />

ñ� Database of<br />

Online Tools Anti-<br />

Corruption is incipient. Not<br />

envision the integration of<br />

information and<br />

georeferencing of these data<br />

are already collected by the<br />

Courts of Auditors, as<br />

studied in LRF and other<br />

laws;<br />

ñ� Works and<br />

services can be easily<br />

cataloged (photos, files,<br />

digital purchases and<br />

procurement) and broadcast<br />

channel does not exist for<br />

this purpose, only the ECA<br />

MT;<br />

ñ� Withdrawn use of<br />

mobile technologies<br />

(although there is deep use<br />

of complaints, grievances<br />

and so on. via text<br />

messaging services and<br />

video messages and images;<br />

ñ� Poor use of social<br />

technologies, such as<br />

twitter, only the TEC has a


feedback regarding complaints;<br />

ñ� Providing information<br />

about the tax situation before the<br />

TBI of all municipalities in the<br />

state;<br />

ñ� Use of WEB TV online<br />

assistance for plenary sessions of<br />

TCEs<br />

ñ� Proposed establishment of<br />

the National Council of Supreme<br />

Audit: Standardization of<br />

decision making, evaluation and<br />

trials of accounts and processes,<br />

ultimately, who controls the<br />

controllers?<br />

profile of Piaui in such<br />

communication portal;<br />

ñ� Use bit-depth<br />

technology forums and<br />

blogs online, with<br />

discussion of controversial<br />

issues and cases of raised<br />

public interest, such as<br />

complaints made by media<br />

and so on;<br />

ñ� Infrequent use of<br />

electronic media<br />

technologies, such as radio<br />

web system, RSS 'feeds' and<br />

also other technologies that<br />

have already been<br />

assimilated by society.<br />

5. LIMITS AND CHALLENGES OF<br />

ONLINE MONITORING SYSTEMS IN<br />

LATIN AMERICA<br />

From the understanding by the public administration that the<br />

information is a civil right [7], the search for greater transparency<br />

must be the greatest extent possible. This means that the<br />

information in the case of electronic shopping, should not be<br />

played anyway in the Portal of the government only as "goodwill"<br />

or even because the legislation requires and therefore was<br />

considered as an example of transparency in government<br />

procurement. Even if a citizen does not want to see this<br />

information at any given time, it should be there by chance might<br />

be challenged at any time for all concerned.<br />

The initiatives of Transparency Portal appear to cover this concept<br />

of transparency than the principle of publicity. To determine the<br />

degree of transparency in the different public entities by the use of<br />

e-government would be interesting for a future study to construct<br />

an assessment tool to check the possibilities of increasing<br />

transparency, ie the construction of indexes that measure the<br />

different levels transparency which are government agencies.<br />

Should be cataloged the existing features and adding others in<br />

order to create a possibility of further increasing transparency in<br />

public sites.<br />

ICTs, particularly the Internet, can increase the possibilities for<br />

increased transparency for government services in basic processes<br />

such as procurement and disbursement of resources, the facility<br />

can be accessed by anyone and anywhere. The benefits of<br />

increased transparency in the gates shown, for example, are as<br />

diverse as the promotion of citizenship rights, such as the right to<br />

social control of public administration.<br />

However there are limitations, including the digital divide. Even if<br />

the government makes available all the site information about the<br />

different governments in a clear and accessible if the company<br />

does not have access to technology or field to use the same<br />

capabilities to fight corruption will be invalid and the path to full<br />

citizenship digital will be missed .<br />

Information should be available to society. Not only by the<br />

provision in the law, which requires publicity of the acts of<br />

government, but by allowing the participation and citizen control:<br />

"The participation and social control over the government depends<br />

on the flow of information" (VAZ 2005).<br />

423<br />

If the information is not available or is insufficient, the possibility<br />

of e-Government to facilitate the right to information and<br />

therefore the fight against corruption, is drastically reduced.<br />

Information technology and communication will not be<br />

promoting the rights of citizenship itself, but also depends on a<br />

culture of transparency in both the society is prepared to control<br />

and understand the Public as this act for the access to information.<br />

Although the Audit Courts are traditional entities, currently<br />

undergo significant changes, either in their legal frameworks as<br />

well as in its modernization and intensive use of modern<br />

management techniques and ICT. These changes have opened<br />

opportunities for the setting of efficiency, transparency, social<br />

control and fighting corruption were propitiated by SASs.<br />

Regarding the most recent innovations in the structure of CT, this<br />

study examined further the computerized systems of control<br />

online. Through a search of the portals of all courts found some<br />

modernization initiatives using ICTs to promote social control and<br />

transparency of accounts and other public policies. The result<br />

proved that some courts have innovations that tend to incorporate,<br />

as well as geo-referenced information, pictures and even channels<br />

of complaint online. But the fact is that some courts have gone<br />

further than others in this requirement of creating a simple and<br />

direct channel for transparency and combating corruption through<br />

social control made directly by the population.<br />

Importantly, previous studies on state courts of accounts have<br />

pointed to certain inequalities between the organs. While some<br />

state courts of auditors had a more modern apparatus, with the<br />

bureaucracy of higher education, others had no such institutional<br />

framework, favoring the incompatibility of operational capacity<br />

and meet the new requirements imposed by law and even civil<br />

society. Therefore, despite the efforts of PROMOEX, still<br />

recognize a great imbalance of staff and equipment that public can<br />

not get results in the area of combating corruption and promoting<br />

transparency in this institutional problem, not by failure of law<br />

enforcement or political incompatibility of the state.<br />

As already highlighted in the text, it was possible to establish<br />

connections between changes in constitutions imposed and even<br />

assignments of SASs. These legislative changes such as Law of<br />

Fiscal Responsibility, brought new demands on SASs. Especially<br />

when blamed for overseeing all the organs and instruments of<br />

state government and municipal levels, ie, a challenge that is<br />

being improved each year and as projects such as the Anti-<br />

Corruption Online Tools and the growing trend of building chat<br />

channels to promote transparency and social control made by the<br />

citizen are being built. This is due to the importance that SASs<br />

were essentially the same after these revolutions in the legislation<br />

for monitoring and assessment of Brazil's public accounts.<br />

Further study of the object, which were the tools of the Anti-<br />

Corruption Online SASs, electronic government and electronic<br />

governance and another series of studies on could not be left out<br />

because they were fundamental to building the theoretical<br />

framework, allowing a accurate observation that the e-government<br />

can influence the model of public administration we have in the<br />

future, as beyond saving, agility and other goodies coming from<br />

the introduction of e-government in other areas of public<br />

management, we can also improve service delivery public and the<br />

creation of a full and legitimate channel of communication<br />

between government and citizens for transparency and combating<br />

corruption.


Furthermore, our study demonstrates the promotion of change in<br />

perspective of social control and transparency and ease of<br />

inclusion of some political actors who do not currently have a<br />

"voice" to participate in decisions of public administration and<br />

also promote social control. It is recalled that some tools may<br />

often have a low level of demand on citizens, however, we must<br />

consider is that citizens have a right to information anytime you<br />

want, ie access to information should be universal and free entire<br />

population, regardless of their demand be higher or lower.<br />

Another problem that must be overcome is the content of the<br />

information and data that should always be expanded and also<br />

have a constant update. Outdated sites can not offer some depth to<br />

the information that citizens may be controlling constantly the<br />

Public Administration.<br />

Therefore, we can state that the initiatives studied here can, and<br />

should be an inspiration to all states and municipalities to produce<br />

from its peculiarities, models similar Tool Online Anti-Corruption<br />

and single channels for receiving complaints of corruption by<br />

society and providing information on government by promoting<br />

transparency of information and government actions.<br />

Finally, we should acknowledge the contribution of this work,<br />

though more descriptive, for a better understanding of the Anti-<br />

Corruption Online tools and issues related to the processes of<br />

social control and transparency of public data, such as accounts<br />

and policies public works, etc.. Furthe, we must credit the advance<br />

of research in the modernization of courts of auditors state in<br />

Brazil. Because it is a very recent case, this work served to<br />

consolidate some data, find the State of the Art these online tools<br />

and also some data on the structure of the courts that are currently<br />

being implemented.<br />

In fact, this study examined in more detail the technical and<br />

managerial aspects of the modernization process and timing issues<br />

gave less weight to the political aspects. Future work can proceed<br />

on this job, trying to measure the impacts of Anti-Corruption<br />

Online tools or even what the state of the art of all SASs on the<br />

issue of transparency, social control and promote practices that<br />

promote citizen participation to combating corruption,<br />

embezzlement and improper spending in public administration.<br />

2007.<br />

6. REFERENCES<br />

[1] IBGE (Brazilian Institute of Geography and Statistics).<br />

Census 2010. Brasilia: IBGE, 2010.<br />

[2] IMF (International Monetary Fund). World Economic<br />

Outlook (WEO) 2011 – Slowing Growth, Rising Risks.<br />

Washington: IMF, 2011.<br />

[3] AMB (Association of Brazilian Magistrates). Confidence<br />

Barometer in the Brazilian Institutions. Brasilia: AMB,<br />

2008.<br />

[4] Chadwick, A. & May, C. Interaction between States and<br />

Citizens in the Age of the Internet: “e-Government” in the<br />

United States, Britain, and the European Union. In:<br />

Governance: An International Journal of Policy,<br />

Administration and Institutions, Vol. 16, No 2, April 2003<br />

(pp271-300). 2003.<br />

424<br />

[5] Kissler, L & Heidemann, F.G.. Public Governance: New<br />

regulatory model for relations between state, market and<br />

society? In: Rev Adm Públ. 2006, 40 (3): 479-99.<br />

[6] Matheus, R., Crantschaninov, T. I. & Nerling, M. A..<br />

Interlegis Program in Brazil; Use of Web 2.0, Collaborative<br />

Tools and Free Software. In: V International Conference on<br />

Theory and Practice of Electronic Governance - V ICEGOV,<br />

2011, Tallinn. V ICEGOV, 2011.<br />

[7] Vaz, J.C. Prospects and challenges for the expansion of<br />

electronic government in the Brazilian municipalities. In:<br />

International Seminar on Electronic Government and Local<br />

Government. Brasília, 2003<br />

[8] Davies, P. B. Models for e-government. Accessed at:<br />

www.emeraldinsight.com/1750-6166.htm. 2007.<br />

[9] Grant, G. & Chau, D. Developing a generic framework for egovernment.<br />

In: Journal of Global Information Management,<br />

v. 13, n. 1, Jan./Mar. 2005.<br />

[10] Basu, S. E-Government and Developing Countries: An<br />

Overview. In: International Review of Law Computers &<br />

Technology, 18, 1, 109–132. 2004.<br />

[11] Ndou, V. E-government for developing countries:<br />

opportunities and challenges. The Electronic Journal on<br />

Information Systems in Developing Countries (EJISDC). 18,<br />

1, 1-24. 2008.<br />

[12] World Bank. Definition of E-Government. Introduction to e-<br />

Government: Overview of key concepts.<br />

. 2010.<br />

[13] Unpan. United Nations e-Government Survey 2008: From e-<br />

Government to Connected Governance. United Nations<br />

Publications. . 2008.<br />

[14] Lau, T. Y.; Aboulhoson, M. & Lin, C. Adoption of egovernment<br />

in three Latin American countries: Argentina,<br />

Brazil and Mexico. Telecommunications Policy. Volume 32,<br />

Issue 2, March 2008, Pages 88-100.<br />

doi:10.1016/j.telpol.2007.07.007. 2008.<br />

[15] Garcia, T. et al. Democracy in the Age of Electronic<br />

Government. In: International Symposium on Intellectual<br />

Property, Information and Ethics. 2003.<br />

[16] Diniz, E. H. E-Government in Brazil: a historical perspective<br />

from a structured model analysis. Journal of Public<br />

Administration, Rio de Janeiro, v. 43, No 1, Feb. 2009.<br />

[17] Marcondes, C. H. & Jardim, J. M. Government Information<br />

Policies: building eGovernment in the Federal<br />

Administration of Brazil. DataGramaZero - Journal of<br />

Information Science. v. 4, n. 2. April 2003. Accessed:<br />

www.dgzero.org/out00/Art_02.html. 2003.<br />

[18] Diniz, E. H. (2000). Use of electronic commerce in<br />

government. Report 18/2000 NPP. EAESP / FGV, in May<br />

2000.<br />

[19] [Coelho, S. M. eGovernment and its impacts on the structure<br />

and workforce of public organizations. In: Public Service<br />

Journal, Year 52, No. 2, abrjun 2001, p. 111-136. 2001


[20] Ferrer, F. & Santos, P. (Orgs.). E-government: electronic<br />

government in Brazil. São Paulo: Saraiva, 2004.<br />

[21] Reinhard, N. & Dias, I. Categorization of E-Gov Initiatives:<br />

a comparison of three perspectives. In: X International<br />

Congress of CLAD on State Reform and Public<br />

Administration, Santiago, Chile, 18 to 21 October 2005.<br />

[22] Fugini, M.G., Maggiolini, P., Pagamaci, B. Why is it<br />

difficult to make a true "electronic government". Production<br />

Journal, v. 15, nº 3, p. 303-309, Sept./Dec. 2005.<br />

[23] SILVA, S. P. da.. Levels of democratic participation in the<br />

use of Internet by governments. Public Opinion [online].<br />

2005, vol.11, n.2, pp. 450-468. ISSN 0104-6276.<br />

[24] Rothberg, Danilo. For a research agenda on electronic<br />

democracy. Public Opinion [online]., v. 14, n. 1, pp. 149-<br />

172. ISSN 0104-6276. 2008.<br />

[25] Matheus, R. ; Ribeiro, M. M. . Models for Citizen<br />

engagement in Latin American Case studies of Public Digital<br />

Budgeting. In: III International Conference on Electronic<br />

Governance, 2009.<br />

[26] Frey, Klaus. Electronic Governance: Experiences of<br />

European cities and some lessons for developing countries. I<br />

Electronic Conference of the Virtual Centre for Policy<br />

Studies (CEVEP). 2000.<br />

[27] Frick, María M.. Electronic Participation Towards Open<br />

Government in Latin America. E-democracy Centre --<br />

Université de Genève -- Faculte de Droit, 40, bd Du Pont-<br />

D'Arve CH-1211 Genève 4 -- Switzerland. 2005.<br />

[28] WELP, Y.. (2010). ICT’s for Democracy in Latin America?.<br />

In: TAMBOURIS, E.; MACINTOSH, A.; GLASSEY, O.<br />

(ORGs): ePart 2010, LNCS 6229, pp. 42-53, 2010.<br />

[29] PEEL, D.. Using digital technologies to broaden public<br />

participation in planning. In: Cunha, M. A.; FREY,<br />

K. & DUARTE, F.. (Ed.). Local governance and information<br />

technology and communication. Champagnat, 2009.<br />

[30] Teixeira, A. Internet transparency in municipal governance:<br />

the experience of the state of Ceara. Fortaleza: Konrad<br />

Adenauer Foundation, 2004.<br />

[31] Teixeira, A. Guide to the transparency of citizenship: to<br />

prevent corruption. Ceará: Konrad Adenauer Foundation,<br />

2006.<br />

[32] Junior, Hélio Santiago Ramos & Rover, Aires José.<br />

Electronic Democracy in the Information Society. 2007.<br />

[33] Nunes, Edson. The political grammar of Brazil: patronage<br />

and bureaucratic insulation. Rio de Janeiro: Zahar, 2003.<br />

[34] Miguel, L. F.. Acountability impasses: dilemmas and<br />

alternatives of political representation. Sociology and Politics<br />

Journal, v. 25, p. 25-38, 2005.<br />

425<br />

[35] Camerer, M.. Measuring Public Integrity. Journal of<br />

Democracy (Volume 17, Number 1, January 2006, pp. 152-<br />

165). 2006.<br />

[36] Kaufmann, D.. Transparency, Incentives and Prevention<br />

(TIP) for Corruption Control and Good Governance.<br />

Conference on Economic Reform and Good Governance:<br />

Fighting Corruption in Transition Economies, Beijing, April<br />

11-12th, 2002.<br />

[37] Peixoto, T.. e-Participatory Budgeting: e-Democracy from<br />

theory to success?. E-democracy Center - e-Working Papers<br />

2008.<br />

[38] Peixoto, T.. Beyond Theory: e-Participatory Budgeting and<br />

its Promises for eParticipation. European Journal of<br />

ePractice - www.epracticejournal.eu 1 Nº 7 - March 2009 -<br />

ISSN: 1988-625X.<br />

[39] Campos, Anna Maria. Accountability: When can we translate<br />

it to Portuguese. Revista de Administração Pública, Rio de<br />

Janeiro, v. 24, n. 2, p. 30-50, fev./abr. 1990.<br />

[40] Akutsu, L.. Government Portals in Brazil: accountability and<br />

delegative democracy. In: X International Congress of<br />

CLAD on State Reform and Public Administration, Santiago,<br />

Chile, 18 to 21 October 2005.<br />

[41] Speck, B. W.. Paths of Transparency. University of<br />

Campinas Press. 2004.<br />

[42] Pinho, José antonio Gomes de. Investigating e-government<br />

portals of states in Brazil: a lot of technology, poor<br />

democracy. Public Administration Journal – Rio de Janeiro<br />

42(3):471-93, May/June. 2008.<br />

[43] Vale, Paulo H. M. Electronic government in the dimensions<br />

and capacity-management, e-participation and etransparent:<br />

identifying aspects of electronic governance in<br />

64 municipalities in the metropolitan area of Belo Horizonte.<br />

PhD Thesis. Belo Horizonte: Fundação João Pinheiro. 2006.<br />

[44] MATHEUS, R. ; RIBEIRO, M. M.. Anti-corruption online<br />

tools in Latin America. In: III International Conference on<br />

Electronic Governance, 2009.<br />

[45] MATO GROSSO, State Court of Accounts Portals of<br />

Transparency: http://geoobras.tce.mt.gov.br/cidadao/.<br />

Accessed at: 12 May, 2011.<br />

[46] PARAIBA, State Court of Accounts Portals of Transparency:<br />

http://sagres.tce.pb.gov.br/estado_empenhos01.php.<br />

Accessed at: 18 May, 2011.<br />

[47] PARANA, State Court of Accounts Portals of Transparency:<br />

www.controlesocial.pr.gov.br/ObrasPublicasConsultar.asp.<br />

Acessed at: 24 May, 2011.<br />

[48] PIAUÍ, State Court of Accounts Portals of Transparency:<br />

srvapp.tce.pi.gov.br/obrasweb/. Accessed at: 08 June, 2011.


E-Government Portals in Central America: A Preliminary<br />

Evaluation and Ranking (2011-2012)<br />

Rodrigo Sandoval-Almazan<br />

Universidad Autónoma del<br />

Estado de México<br />

rsandovala@uaemex.mx<br />

ABSTRACT<br />

Developing e-government strategies and particularly Internet<br />

portals could be considered an important trend for public<br />

administrations worldwide. These government-wide websites<br />

could potentially provide useful information and services and, at<br />

the same time, become the gateways for citizen participation and<br />

collaboration with government. However, the development of<br />

these tools and their potential impacts are not the same for<br />

developed and developing countries and there is not enough<br />

research about less developed nations. This paper applies a<br />

multi-dimensional evaluation model to the national portals of<br />

Central American countries (2011-2012) and starts providing<br />

some of the necessary knowledge about this particular reality.<br />

The model was first used in 2005 for evaluating Mexican state<br />

portals and has been systematically refined during the last 7<br />

years. The results clearly identify important gaps and<br />

opportunities for improvement in most Central American<br />

countries.<br />

General Terms<br />

Measurement, Performance, Reliability, Human Factors,<br />

Standardization, Theory, Legal Aspects, Verification<br />

Keywords<br />

Central America, e-government portals, metrics, e-government,<br />

assessment<br />

1. INTRODUCTION<br />

E-government has become an important strategy for<br />

governments around the world. E-government implementation<br />

has reached all levels of government. However the development<br />

and potential impacts of these tools and applications have not<br />

happened equally in all countries. For instance, Central<br />

American nations have lower levels of interaction with ICT and<br />

technology caused by infrastructure limitations, budget<br />

limitations or lack of knowledge about these technologies<br />

[23][8]. The problem of e-government implementation has been<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

J. Ramon Gil-Garcia<br />

Centro de Investigación y Docencia<br />

Económicas<br />

joseramon.gil@cide.edu<br />

426<br />

Nancy Karina Saucedo Leyva<br />

Universidad Autónoma del<br />

Estado de México<br />

nancykarinasl@hotmail.com<br />

studied in several ways, from the e-readiness perspective to the<br />

ranking or evaluation of several issues – e-participation,<br />

interoperability or organizational – leading this to an egovernment<br />

divide, that reflects e-government gaps among the<br />

countries of a region [3]. On the other hand, Central American<br />

countries are the ones that need the most the advantages of egovernment<br />

technologies in order to share information,<br />

collaborate with other countries, save costs, and improve their<br />

organizational capabilities on issues such as border control,<br />

terrorism, migration, and drug trafficking. This transnational<br />

information sharing is another e-government trend that will be<br />

achieve in other countries, pushing the Central America region<br />

to achieve this challenge [24][16].<br />

A new kind of electronic governance is reaching the Latin<br />

American region and several scholars are now doing research on<br />

the institutional impact of e-government [13], as well as on the<br />

adoption of e-government [10] on some Latin American<br />

countries such as Mexico, Argentina, Dominican Republic, and<br />

Brazil, among others [7][14]. However, there is not enough<br />

research to measure and evaluate e-government in Central<br />

American nations, and to provide practical recommendations to<br />

improve these countries’ level of e-government and the<br />

functionality of their portals. This paper presents preliminary<br />

results of an ongoing research that measures the national portals<br />

of Central American countries using a multidimensional<br />

evaluation model based on the evolutionary approach and<br />

initially developed in 2005 for the Mexican e-government state<br />

portals.<br />

We evaluated the portals of Central American countries in 2011<br />

and 2012 and this paper presents the preliminary results of this<br />

assessment effort. The paper is divided in five sections,<br />

including these introductory comments. Section two presents a<br />

review of recent literature on assessment models and presents<br />

some advantages and limitation of the evaluation model we<br />

propose. Section three describes the research design and<br />

methods for the two-year evaluation. Section four summarizes<br />

the main findings and compares the results of 2011 and 2012.<br />

Finally, section five provides ideas for future research and<br />

highlights some practical recommendations for Central<br />

American countries.<br />

2. LITERATURE REVIEW<br />

State websites can be considered government-citizen<br />

communication systems via a computer and the Internet [18].<br />

There are different models that explain the processes of


development and evolution of Internet sites [11]. In recent years,<br />

different approaches to understand and evaluate e-government<br />

have also been proposed (for reviews see [15], [17] and [25]).<br />

One of the most frequently used approaches is the evolutionary<br />

perspective, which creates stages and analyzes e-government<br />

initiatives according to the characteristics and technical features<br />

found in each of these stages (i.e., presence, information,<br />

integration).<br />

This approach has the assumption that there is an evolution<br />

towards electronic government [4, 11]. Some authors contend<br />

that each one of the stages is already electronic government.<br />

Others delimit in which phases a government can be considered<br />

truly electronic. Recent research demonstrates that evolutionary<br />

approaches are useful to understand and evaluate e-government<br />

phenomena, but they also have important limitations [6, 17]. The<br />

evolutionary approach is useful for the evaluation of web portals<br />

because it attempts to measure the degree of innovation and<br />

provides clear guidance for the development and improvement<br />

of current government websites [21].<br />

However, evaluating e-government initiatives, including web<br />

portals, is more difficult because they can have characteristics<br />

and features identified with multiple stages and different degrees<br />

of maturity. There are several limitations identified for the<br />

evolutionary approach. For instance, Bannister states the<br />

question if the benchmark promotes the advances of egovernment?<br />

What is the purpose of the benchmarking? [1].<br />

Similarly, Goldkuhl and Persson address directly to the stage<br />

model: Are higher stages inherently better than lower stages?<br />

[5]. Finally, Kunstelj and Vintar propose a different way to<br />

assess e-government development based on reasonable holistic<br />

principles rather than a stage model [9]. However, models based<br />

on the evolutionary approach could be multidimensional and<br />

relatively comprehensive. The evaluation model used in this<br />

paper considers multiple elements as complementary<br />

components rather than consecutive stages [12][19, 20].<br />

Information, Interaction, Transaction, Integration, and<br />

Participation are proposed as complementary components,<br />

which can be used to characterize the development of<br />

government websites [20].<br />

3. METHOD<br />

Based on seven years of experience using and refining an<br />

assessment model for government portals, we evaluated the<br />

Central American countries in 2011 [22]. For this paper, we<br />

evaluated the portals again in 2012 in order to compare<br />

differences and similarities between 2011 and 2012. In this way,<br />

the 26 Central American national web portals were evaluated on<br />

August 2011 and February-March 2012. Following the original<br />

assessment tool, the features and content of the portals were<br />

measured using 143 questions clustered into five components.<br />

Each government portal was evaluated in a 60-minute session.<br />

We made a pilot review of potential portals, collecting different<br />

URL’s, and make sure that for each country we obtain the<br />

official government website and not a tourism-related or other<br />

kind of website. As mentioned before, our model is based on<br />

five main components (see Table 1).<br />

Table 1. Components of the Evaluation Model<br />

Component Description<br />

427<br />

Information Greater number of web pages: Statewide portal<br />

as the entry point with links to most of the state<br />

pages. More dynamic information (frequent<br />

updates).<br />

Interaction Forms that can be downloaded<br />

Two-way communication through electronic<br />

mail<br />

Use of search engines<br />

Use of chats, forums or other forms of<br />

interactive communication (service related)<br />

Transaction On-line services (secure and completely online),<br />

including electronic payments (e.g., credit<br />

cards).<br />

More customization (use of passwords, citizen<br />

profiles, etc.)<br />

Portal organized according to people’s needs<br />

instead of government structures.<br />

Integration Portal with a single point of checkout (multiple<br />

agencies, different functions, different levels of<br />

Political<br />

Participation<br />

Style and<br />

Design<br />

government).<br />

Electronic Vote, online participation.<br />

Format, usability, downloading speed, etc.<br />

4. PRELIMINARY FINDINGS<br />

This section describes the main findings and a comparison of the<br />

results of the evaluation performed to the Central American<br />

countries in 2011 and 2012. There are some clear changes in the<br />

evaluation when comparing the results from the two years. In<br />

2012, the websites of Jamaica and Turks and Caicos Islands<br />

could not be measured because they were not available during<br />

the time this research took place. Only one country kept about<br />

the same level of functionality (El Salvador). Sixteen countries<br />

(61.5%) obtained a lower score and, consequently, a lower<br />

position in the ranking in comparison to 2011. In contrast, seven<br />

countries (27%) increased their score in 2012 (see Table 2).<br />

Table 2. Ranking of Central American Countries<br />

RANKIN<br />

PAÍS TOTA TOTA<br />

G<br />

L 2011 L 2012<br />

1 Bahamas 19.85 31.19<br />

2 Puerto Rico 29.03 23.65<br />

3 Martinique 11.76 23.42<br />

4 Trinidad and Tobago 21.79 22.86<br />

5 Honduras 13.39 22.10<br />

6 Panamá 24.72 21.63<br />

7 Costa Rica 14.78 21.58<br />

8 El Salvador 18.49 18.41<br />

9 Granada 22.99 17.64<br />

10 Dominica 17.76 17.49<br />

11 Antigua y Barbuda 17.75 17.06<br />

12 Guatemala 12.25 15.88


13 Guadaloupe 31.74 14.19<br />

14 Aruba 14.92 12.65<br />

15 St. Vincent and the<br />

Grenadines<br />

17.35 12.60<br />

16 República Dominicana 16.83 11.88<br />

17 Saint Lucia 12.60 11.38<br />

18 Belice 13.88 10.78<br />

19 Cayman Islands 16.93 10.64<br />

20 St. Kittis and Nevis 19.52 9.60<br />

21 Virgin Islands 8.11 8.99<br />

22 Nicaragua 4.98 8.19<br />

23 Cuba 12.24 7.65<br />

24 Barbados 15.21 6.79<br />

25 Jamaica 11.89 0.00<br />

26 Turks and Caicos Islands 11.90 0.00<br />

Most of the changes from 2011 to 2012 are small; a few points<br />

below, except for Guadaloupe, St Kittis and Nevis and Barbados<br />

which dropped significantly. Similarly, Guadaloupe was in the<br />

first place and fall to the tenth position of the ranking. A<br />

potential explanation is that these three countries did well in<br />

some of the components of the ranking but did not do well in<br />

others. For instance, these three countries are very low in the<br />

transaction and participation components.<br />

The global average of the ranking 2012 is 14.55 two points less<br />

than the previous ranking (16.64 points). In terms of each<br />

component, most of them present lower average scores in<br />

comparison with 2011. The exception is the Participation<br />

component that has an important increase (see Table 3).<br />

Table 3. Average Points by Component - Central America E-<br />

Government Websites Ranking (2011 and 2012)<br />

2011 2012 Difference<br />

Information 27.94 23.98 -3.96<br />

Interaction 15.88 15.68 -0.2<br />

Transaction 3.35 2.52 -0.83<br />

Integration 31.96 24.91 -7.05<br />

Participation 4.06 5.65 1.59<br />

Total Rank 16.64 14.55 -2.09<br />

In addition, the changes on every component of the egovernment<br />

ranking are diverse. Table 4 shows the countries<br />

that showed an important change in each of the components.<br />

Only 11 percent of the countries have an important change in all<br />

components. In contrast, most countries changed on style and<br />

design component.<br />

Table 4. Central America E-government websites ranking<br />

2012<br />

COMPONENT 2011 2012<br />

INFORMATION Guadaloupe Bahamas<br />

428<br />

INTERACTION<br />

TRANSACTION<br />

INTEGRATION<br />

PARTICIPATION<br />

STYLE AND<br />

DESIGN<br />

Granada<br />

St. Kittis and Nevis<br />

Panama<br />

Granada<br />

Guadaulope<br />

Puerto Rico<br />

Guadaulope<br />

Guadaloupe<br />

Puerto Rico<br />

Trinidad and Tobago<br />

Panama<br />

Granada<br />

Republica<br />

Dominicana<br />

Bahamas<br />

Dominica<br />

Trinidad and Tobago<br />

Granada<br />

Costa Rica<br />

St. Vincent and the<br />

Grenadines<br />

Barbados<br />

Jamaica<br />

Trinidad and Tobago<br />

Panama<br />

Honduras<br />

Bahamas<br />

Trinidad and Tobago<br />

Puerto Rico<br />

Bahamas<br />

Martinique<br />

Bahamas<br />

Martinique<br />

Costa Rica<br />

El Salvador<br />

Panama<br />

Honduras<br />

Bahamas<br />

Dominica<br />

El Salvador<br />

Guatemala<br />

Puerto Rico<br />

Trinidad and Tobago<br />

5. FINAL COMMENTS<br />

The purpose of this paper is to present preliminary results from<br />

our evaluation of government portals in Central America. A<br />

multi-dimensional evaluation instrument was applied to 26<br />

Central American countries in 2011 and 2012. According to our<br />

findings, there is little progress towards more sophisticated egovernment<br />

in the region. In fact, most of the components<br />

included in the evaluation obtained lower average scores in<br />

comparison with 2011. In addition, it seems clear that certain<br />

countries have eliminated some information and applications,<br />

leading them to fall in the ranking (such as the Guadaloupe case)<br />

Other countries such as Bahamas climbed six positions in the<br />

ranking and obtained the first place. In contrast, St. Kittis and<br />

Nevis fell down 13 positions in 2012 in comparison with 2011.<br />

This country obtained a lower score in the information,<br />

integration and participation components in comparison with<br />

previous year. The recommendations for cases like this are to (1)<br />

review the information flow, dynamic information, updated<br />

information; (2) integrate the information with other internal<br />

websites, and (3) to recover their participation channels from<br />

previous years and to introduce new ones.<br />

This kind of feedback could be produced for every country on<br />

the ranking, and could potentially help to identify strengths &<br />

weaknesses within each component. This could also help to<br />

understand the country’s status and evolution in terms of egovernment<br />

implementation in general and Internet portal<br />

functionality in particular. In general terms, there are some<br />

important differences between 2011 and 2012 and these<br />

differences could be related to unequal knowledge about egovernment<br />

implementation, but also to political, economic, or<br />

social conditions currently affecting particular countries.<br />

These preliminary findings are part of an ongoing research effort<br />

that attempts to understand e-government in the Central America<br />

region. Further research is needed to understand the potential<br />

causes of the differences and similarities identified in the two<br />

evaluation efforts. A quantitative approach that correlates


multiple organizational, institutional and contextual variables<br />

with the general score and each individual component of the<br />

ranking could be very useful. In depth case studies, using a<br />

qualitative approach could also help to understand some details<br />

in the countries that improved or obtained a lower score in 2012.<br />

E-government metrics and evaluation is an important field of<br />

research to understand the status and evolution of e-government<br />

around the world. It could also help countries to foster egovernment<br />

implementation with practical recommendations.<br />

There could be many evaluation models and we are not arguing<br />

that this is the best one. However, we think that evaluating<br />

government portals in Central America could be considered an<br />

important and necessary first step towards more sophisticated<br />

studies on e-government implementation in the region. This<br />

paper represents one of the first attempts to understand this<br />

phenomenon in Central America and hopefully will start a<br />

dialog about how information technologies could improve the<br />

information, communication and sevices between governments,<br />

citizens, businesses and other stakeholders.<br />

6. ACKNOWLEDGMENTS<br />

This work is partially supported by “Diálogo Regional sobre la<br />

Sociedad de la Información (DIRSI)”, Lima, Perú.<br />

7. REFERENCES<br />

[1] Bannister, F. 2007. The Curse of the Benchmark: An<br />

Assessment of the Validity and Value of E-Government<br />

Comparisons. International Review of Administrative<br />

Sciences. 73, 2 (Jun. 2007), 171-188.<br />

[2] Bannister, F. and Connolly, R. 2011. Trust and<br />

transformational government: A proposed framework for<br />

research. Government Information Quarterly. 28, 2<br />

(2011), 137-147.<br />

[3] Gasco, M. 2005. Exploring the E-Government Gap in<br />

South America. International Journal of Public<br />

Administration. 28, 7,8 (2005), 683-701.<br />

[4] Gil-Garcia, J.R. and Martinez-Moyano, I.J. 2007.<br />

Understanding the evolution of e-government: The<br />

influence of systems of rules on public sector dynamics.<br />

Government Information Quarterly. 24, 2 (2007), 266-<br />

290.<br />

[5] Goldkuhl, G. and Persson, A. 2006. From e-ladder to ediamond<br />

– re--conceptualising models for public eservices.<br />

ECIS 2006 Proceedings (Göteborg, Sweden,<br />

Jan. 2006).<br />

[6] Gottschalk, P. 2009. Maturity levels for interoperability<br />

in digital government. Government Information<br />

Quarterly. 26, 1 (2009), 75-81.<br />

[7] Grullon, M. and Tavarez, D. 2009. Progress and<br />

challenges for e-government in the Dominican Republic.<br />

Proceedings of the 3rd International Conference on<br />

Theory and Practice of Electronic Governance ICEGOV<br />

09. 328 (2009), 411.<br />

[8] Gutierrez, M.A. 2004. Latin America and the digital<br />

economy challenge. foresight. 6, 3 (2004), 163-172.<br />

[9] Kunstelj, M. and Vintar, M. 2004. Evaluating the<br />

progress of e-government development: A critical<br />

analysis. Info. Pol. 9, 3,4 (Diciembre. 2004), 131–148.<br />

[10] Lau, T.Y. et al. 2008. Adoption of e-government in three<br />

Latin American Countries: Argentina, Brazil and Mexico.<br />

Telecommunications Policy. 32, 2 (2008), 88-100.<br />

429<br />

[11] Layne, K. and Lee, J.W. 2001. Developing fully<br />

functional E-government: A four stage model.<br />

Government Information Quarterly. 18, 2 (2001), 122-<br />

136.<br />

[12] Luna-Reyes, L.F. et al. 2009. Ranking Estatal 2009 de<br />

Portales .gob. Politica Digital. 51 (Agosto. 2009), 10-12.<br />

[13] Luna-Reyes, L.F. et al. 2008. The Impact of Institutions<br />

on Interorganizational IT Projects in the Mexican Federal<br />

Government. International Journal of Electronic<br />

Government Research. 4, 2 (2008), 27-42.<br />

[14] Ngwenyama, O. and Morawczynski, O. 2009. Factors<br />

affecting ICT expansion in emerging economies: An<br />

analysis of ICT infrastructure expansion in five Latin<br />

American countries. Information Technology for<br />

Development. 15, 4 (2009), 237-258.<br />

[15] Rorissa, A. et al. 2011. Benchmarking e-Government: A<br />

comparison of frameworks for computing e-Government<br />

index and ranking. Government Information Quarterly.<br />

28, 3 (Jul. 2011), 354-362.<br />

[16] Rubino-Hallman, S. and Hanna, N.K. 2006. New<br />

technologies for public sector transformation: A critical<br />

analysis of e-government initiatives in Latin America and<br />

the Caribbean. Journal of EGovernment. 3, 3 (2006), 3-<br />

39.<br />

[17] Sandoval, R. and Gil-García, J.R. 2008. Limitations of<br />

Evolutionary Approaches to E-government. Handbook of<br />

Research on Public Information Technology. D. Garson<br />

and M. Khosrow-Pour, eds. IGI-Group. 22-30.<br />

[18] Sandoval-Almazan, R. 2010. Ranking de Portales de<br />

Transparencia: La medición 2010. Política Digital.<br />

[19] Sandoval-Almazán, R. et al. 2007. Ranking de portales<br />

estatales, la medición 2007. Política Digital. 38 (2007),<br />

30-32.<br />

[20] Sandoval-Almazán, R. et al. 2008. Ranking estatal 2008<br />

de portales .gob. Política Digital. 7, 45 (2008), 50-58.<br />

[21] Sandoval-Almazan, R. and García, J.R.G. 2006. A<br />

examen, los portales .gob estatales. Política Digital. 29<br />

(May. 2006), 30 - 32.<br />

[22] Sandoval-Almazan, R. and Gil-Garcia, J.R. 2011.<br />

Gobierno Electrónico, Apertura y Transparencia en<br />

Centro América. Dialogo Regional sobre la Sociedad de<br />

la Información.<br />

[23] Silvana, Rubino-Hallman 2002. E-Government In Latin<br />

America And The Caribbean . Reinventing Governance<br />

In The Information Age. Information Age (Caracas,<br />

Venezuela, 2002), 1-19.<br />

[24] Su, S. 2005. Transnational Information Sharing, Event<br />

Notification, Rule Enforcement and Process<br />

Coordination. International Journal of Electronic<br />

Government Research. 1, 2 (2005), 1-26.<br />

[25] Yildiz, M. 2007. E-government research: Reviewing the<br />

literature, limitations, and ways forward. Government<br />

Information Quarterly,. 24, 3 (2007), 646-665.


Evolving e-Government Benchmarking to Better Cover<br />

Technology Development and Emerging Societal Needs<br />

Kim Andreasson<br />

DAKA Advisory<br />

Alvgatan 3<br />

432 38 Varberg, Sweden<br />

+1 646 845 9782<br />

kim@dakaadvisory.com<br />

ABSTRACT<br />

Many international e-government benchmarks seek to measure<br />

progress towards various versions of a digital society, and in this<br />

endeavor include a component of e-government. But because<br />

comparable international e-government data are scarce, most<br />

reports rely on the United Nations E-Government Development<br />

Index, specifically its Online Service Index as a benchmark.<br />

However, this assessment only captures national level initiatives<br />

at a broad level and does not link evaluation to outcomes and<br />

impacts, i.e. e-government performance relative to investment.<br />

This paper briefly reviews the current UN framework and assesses<br />

how it can evolve to meet new demands, such as calls to better<br />

connect investments to policy goals, and evolving user behavior.<br />

It also places this in the context of new technology trends, like<br />

mobile and social media which have not yet been fully embraced<br />

by e-government but which are likely to become increasingly<br />

important. Similarly, important trends in benchmarking and in<br />

benchmarking tools are surveyed.<br />

For example, is it possible to measure outcomes in a cost effective<br />

manner? What might be the role of non-UN data and of web<br />

metrics and social media analytics? How could relevant data and<br />

other information be better presented to countries and decisionmakers<br />

in order to strengthen the goal of using the UN survey to<br />

support learning and improvement? In this context, the paper<br />

outlines the next feasible steps which the UN and similar<br />

benchmarks might adopt, including how the framework might be<br />

applied to local level assessments.<br />

Categories and Subject Descriptors<br />

K.4.1 [Public Policy Issues]<br />

General Terms<br />

Measurement, Documentation, Performance, Design<br />

Keywords<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Jeremy Millard<br />

Danish Technological Institute<br />

Kongsvangs Allé 20<br />

2000 Aarhus C, Denmark<br />

+45 72 20 14 17<br />

jrm@teknologisk.dk<br />

430<br />

Mikael Snaprud<br />

Tingtun & University of Agder<br />

N-4791 Lillesand, Norway<br />

+47 91 862 892<br />

mikael.snaprud@tingtun.no<br />

E-Government, United Nations, Technology Trends,<br />

Benchmarking Trends, Benchmarking Tools, Benchmarking<br />

Framework<br />

1. INTRODUCTION<br />

Benchmarking the information society is important in order for<br />

policy-makers to understand it and how to achieve better<br />

outcomes from additional investment.<br />

The benefits of a digital society are everywhere: the 2011 Future<br />

of the Internet Economy report from the OECD says that between<br />

2000 and 2009 investments in ICT contributed more to GDP<br />

growth than all non-ICT investments in a majority of its Member<br />

States. [1] Also in 2011, the McKinsey Global Institute, a<br />

consultancy research arm, estimated the Internet's share of GDP to<br />

be greater than many traditional industries. [2] Currently, the<br />

report said, the Internet contributes 3.4% across the G8 countries,<br />

South Korea, Sweden, Brazil, China, and India. Among mature<br />

economies, 21% of growth in the last five years has come from<br />

the Internet.<br />

The potential benefits also increase as more people take part in the<br />

digital society. One example of how rapidly people are coming<br />

online is in Europe where 34% of individuals were regularly using<br />

the Internet in 2003; in 2011, the number stood at 68%, according<br />

to Eurostat the European statistics office. [3] The rise is also<br />

global in nature. According to the International<br />

Telecommunications Union (ITU), a specialized agency of the<br />

United Nations (UN), the number of Internet users globally has<br />

increased from 6.4 per 100 people in 2000 to 29.7 in 2010. The<br />

agency predicts that the world will go from two billion Internet<br />

users in 2010 to five billion in 2015. [4]<br />

Because of the potential benefits, understanding and measuring<br />

the factors behind the digital society are increasingly important as<br />

countries become more connected and interconnected. Prominent<br />

examples of research reports that use international benchmarks to<br />

measure progress towards various aspects of a digital society<br />

include the World Economic Forum’s Global Information<br />

Technology Report, the Economist Intelligence Unit’s Digital<br />

Economy Rankings, the Nokia Siemens Networks Connectivity<br />

Scorecard, and the Partnership on Measuring ICT for<br />

Development, coordinated and funded by the International<br />

Telecommunications (ITU), a specialized agency of the UN, the<br />

European Commission and Waseda University.<br />

One commonality between such efforts to measure digital<br />

progress is that they include a component of electronic<br />

government (e-government). The development of e-government<br />

has also been rapid by any measure but a commonly cited


example is online tax filing. According to the Internal Revenue<br />

Service about 4m people filed electronically in the United States<br />

in 1990, the first year such method was available. [5] In 2000, the<br />

number had reached 35m. Two years ago, nearly 100m people<br />

used e-file. One reason for the rapid rise is the fact that<br />

government realizes its potential: “Governments are increasingly<br />

becoming aware of the importance of employing e-government to<br />

improve the delivery of public services to the people,” said the<br />

2003 UN World Public Sector Report. [6]<br />

The potential benefits of e-government extend beyond service<br />

delivery as it can also improve accountability and performance<br />

assuming it can increase usage and security. But measuring egovernment<br />

across the world is difficult and because comparable<br />

international e-government data are scarce, many prominent<br />

benchmarks, such as those cited above, all rely on the United<br />

Nations (UN) E-Government Development Index, in particular its<br />

Online Service Index subset as a benchmark. However, this<br />

assessment only captures national level initiatives at a broad level<br />

and does not link evaluation to outcomes or impacts, i.e. egovernment<br />

performance relative to investment.<br />

This paper reviews the UN approach, introduces current egovernment<br />

trends that affect measurement and explains how a<br />

revised framework can be developed to meet these new<br />

developments. Because of the demand for measurement at all<br />

levels, the paper ends with a brief discussion of the revised<br />

framework’s applicability to local level assessments.<br />

2. THE UNITED NATIONS<br />

E-GOVERNMENT SURVEY<br />

2.1 Objectives<br />

The global rise of e-government and its importance to<br />

development broadly and the information society specifically has<br />

been illustrated in numerous reports, but in none more so than the<br />

biennial Global E-Government Development Reports from the<br />

UN, published in 2003, 2004, 2005, 2008, 2010, and 2012 (plus a<br />

2001 pilot report or a predecessor of the reports, depending on<br />

how you view it).<br />

The objective of the reports is to assess trends in e-government in<br />

order to “inform and improve the understanding of policy makers’<br />

choices to shape their e-government programs,” according to the<br />

2004 report. [7] More recently, according to the 2010 report, the<br />

survey measures “the willingness and capacity of countries to use<br />

online and mobile technology in the execution of government<br />

functions,” and compares the performance of the 193 UN member<br />

states relative to each other. [8]<br />

Given its worthwhile objective and the fact that comparable<br />

international data are scarce, the UN reports have become the de<br />

facto e-government benchmark used in numerous reports<br />

measuring the digital society. However, relatively little attention<br />

has been has been paid to the UN methodology. The following<br />

section introduces the current framework based on publicly<br />

available information.<br />

2.2 Methodology<br />

The E-Government Development Index is a composite index<br />

based on three indicators, which are weighted equally. First, the<br />

Online Service Index (OSI), which measures a country’s<br />

availability of e-government information and services through<br />

original research. Second, the human capital index, which is<br />

431<br />

derived from data primarily from the United Nations Educational,<br />

Scientific and Cultural Organization (UNESCO) with additional<br />

data from the United Nations Development Programme’s (UNDP)<br />

Human Development Report, most recently the 2009 version.<br />

Third, the telecommunications index, which is provided by the<br />

ITU.<br />

The human capital and telecommunications infrastructure indices<br />

are less relevant for the purposes of this paper because they are<br />

provided by third parties. Instead, this paper focuses on the OSI,<br />

which is the most prominent component of the overall index and<br />

what makes the UN assessment unique.<br />

To measure e-government, the OSI employs a supply-side<br />

measurement technique, which means quantitatively evaluating<br />

websites through content analysis. It is a common approach to<br />

measure e-government as researchers take a pre-defined survey<br />

questionnaire and examine which information and services are<br />

available on various websites and, to some extent, their<br />

sophistication. For example, how many national government<br />

websites around the world have a feature that offers to send alerts<br />

to mobile phones? (In 2010, the answer was 25 out of 192.) Once<br />

the entire survey questionnaire is completed, scores are simply<br />

tallied up.<br />

From the abridged UN methodology in the most recent report, and<br />

the reports from the expert group meetings, a biennial exercise in<br />

which select experts gather to discuss the UN survey and its<br />

methodology, 1 one can deduce the following about the UN egovernment<br />

supply-side approach: [9]<br />

o Every UN member state, currently 193, is assessed. This<br />

provides a broad international comparison.<br />

o A ‘national portal’ or other official website of each UN<br />

member state is selected for assessment, as well as associated<br />

ministry websites (e.g., education, health, labor, social<br />

welfare and finance). Where more than one national website<br />

or associated portal exists, the features on relevant sites for<br />

which links are provided are also assessed. This offers a<br />

defined set of websites for assessment.<br />

o A large number of e-government features and services are<br />

assessed, each allocated to a four stage model: emerging,<br />

enhanced, transactional and connected. In addition, eparticipation<br />

features are assessed and the results calculated<br />

as a separate index.<br />

o A set of researchers visits the websites, survey in hand, and<br />

assesses whether the features in the survey exist or not. The<br />

team is instructed to take a citizen approach: if an item can’t<br />

be found within a reasonable period of time, then it is<br />

deemed not to exist (as an ordinary citizen would also give<br />

up and instead call the government). This is important<br />

because the UN survey is not based on whether features<br />

actually exist but rather whether researchers can find them.<br />

o Almost all questions in the survey call for a binary response<br />

of yes or no, with “yes” given one point and “no” zero.” In<br />

theory at least, this gives a quantifiable objective assessment.<br />

Either a feature is findable or it is not, and no value<br />

1 For the methodology, please refer to pages 119-125 of the most<br />

recent report (UN 2012); the report from the EGM can be found<br />

at http://www2.unpan.org/egovkb/


judgments are made about the quality or sophistication of the<br />

feature itself.<br />

While the underlying survey questionnaire has been adjusted and<br />

updated over time, the overall supply-side approach has remained<br />

consistent.<br />

3. THE TECHNOLOGY MARCHES ON<br />

Over the next five to ten years there are important technology<br />

trends which e-government is, or should be, well placed to address<br />

or benefit from and which any evaluation framework must take<br />

into account. These include the increased power of data, network<br />

developments and the cloud, mobility and social media.<br />

3.1 Big Data, Open Data<br />

Public sector data, also enhanced by compatible data from<br />

companies and communities, are set to become a prime resource<br />

for e-government development. Such data include trade, business<br />

development, health, education, environment, care, transport,<br />

crime and public order, as well as user and behavioral data when<br />

aggregated so that individuals cannot be identified.<br />

The ‘big data’ resources now available in some countries are<br />

being used for policy modeling, visualization and simulation, as<br />

well as data mining and pattern recognition using ICT and<br />

semantic web applications. Combining these tools with analytical<br />

methods (statistical, contextual, quantitative, predictive, cognitive,<br />

etc.) leads to the new discipline of ‘analytics’ which some<br />

governments are already starting to employ to dramatically<br />

increase their operational efficiency and effectiveness. For<br />

example, Singapore’s government addresses policy issues through<br />

joined-up government to support broader desired outcomes, such<br />

as economic vitality and foreign investment. [10] Its Land<br />

Transport Authority (LTA) deployed the world’s first congestion<br />

charging system and has since innovated elements of its business<br />

model. LTA has seen an 80% reduction in revenue leakage from<br />

“lost transactions”, while tripling its performance capacity to 20<br />

million fare transactions per day. At the same time, its ability to<br />

look holistically across the network to help manage current<br />

demand allows it to predict future needs and sustainable solutions<br />

to accommodate a growing population.<br />

Many public sector data in aggregated form are now also being<br />

made publicly available in machine-readable and linked formats<br />

for use by companies, social entrepreneurs, communities, hackers,<br />

etc. 2 This is not solely about encouraging a better informed and<br />

more transparent society. It can also lead to economic gains, as a<br />

result of re-use or recombination of these data in creative ways.<br />

Government, with minimal cost to itself, can make large amounts<br />

of data available so others can build innovative apps and eservices.<br />

This makes sense since governments are often not best positioned<br />

to extract commercial value from their own data. According to the<br />

European Commission [11] open government data policies will<br />

increase direct business activity in Europe by up to €40 billion per<br />

year, which translates into adding 0.3% of GDP. The same study<br />

showed overall benefits, including direct and indirect effects,<br />

could be up to €200 billion per year, or 1.7% of GDP. An<br />

Australian study in September 2011 [12] found that open data<br />

2 For example: the US (data.gov), UK (data.gov.uk), France<br />

(data.gouv.fr) and Australia (data.gov.au).<br />

432<br />

unlocked value equal to 5 times the cost of opening the data.<br />

Specifically, the estimated value of new economic activity plus<br />

cost savings was AU$25 million/year after bearing a cost of $4.6<br />

million/year.<br />

An important premise in many, though not all, of these initiatives<br />

is that tech communities are better able to make government data<br />

useful than the governments themselves. For example, in 2009 the<br />

‘Apps for Democracy’ competition in Washington DC awarded<br />

$20,000 in prizes for developers and yielded 47 web, iPhone and<br />

Facebook apps in 30 days with a value to the city of $2,300,000. 3<br />

Peter Corbett, CEO for iStrategyLabs and organiser of the<br />

competition said "I think the government realises that they don't<br />

have all of the money to do things people want them to<br />

do……government forgot that the biggest asset that they have are<br />

actual citizens… [and] many developers work free.."<br />

To encourage government data owners to publish their data, Tim<br />

Berners-Lee, also called the father of the world wide web, has<br />

proposed a five star scheme to rate Linked Open Data (LOD).<br />

LOD are data designed for linking with other data which are<br />

released under an open license and do not impede free reuse. Stars<br />

are awarded for the online availability, properties of the data<br />

format to facilitate re-use and linking to non-government data.<br />

3.2 Network Developments and the Cloud<br />

ICT is being increasingly seen as a utility in the same way other<br />

basic infrastructures like electricity and transport systems already<br />

are. Thus, who provides it and how will not be important for many<br />

users, although its quality, resilience, reliability and price will be.<br />

ICT will soon become an ambient technology, i.e. systems and<br />

services which are everywhere, fully interoperable and truly<br />

convergent (in both technical and non-technical terms).<br />

An evolution has already started towards wide-scale ubiquitous<br />

seamless networks, networked and distributed computing, open<br />

semantic web, large scale distributed databases and artificial<br />

intelligence. According to Tim Berners-Lee, we are indeed on the<br />

verge of the age of the semantic web which exploits the Internet<br />

of data rather than the Internet of documents we now have. This is<br />

built on a new RDF (Resource Description Framework) standard<br />

for metadata in the same way as document standards currently use<br />

HTML or XML. This will enable intelligent uses of the Internet<br />

like asking questions rather than simply searching for key words,<br />

as well as more automatic data exchanges between databases and<br />

the Internet of things and places. It is noteworthy, however, that<br />

the implementation of RDF still remains largely unrealized. [28]<br />

The dramatic growth of cloud computing is part of these<br />

developments, i.e. whereby shared resources, software, and data<br />

are provided to computers and other devices on demand. The<br />

fundamental concept of cloud computing is that the processing<br />

and the related data are not in a specified or known location.<br />

Generally, cloud computing users do not own the physical<br />

infrastructure, thereby avoiding capital expenditure by renting<br />

usage from a third-party provider. They consume resources as a<br />

service and pay only for resources that they actually use.<br />

In the UK sharing data across new internal cloud computing<br />

systems is part of a radical plan that it claims could save up to<br />

£3.2bn a year from an annual bill of at least £16bn. The key part<br />

3<br />

http://www.appsfordemocracy.org/ (accessed 28 November<br />

2009)


of the new strategy will be the concentration of government<br />

computing power into a series of about a dozen highly secure data<br />

centers, each costing up to £250m to build. These are replacing<br />

more than 500 presently used by central government, police forces<br />

and local authorities which are frequently run at far below their<br />

capacity because they are dedicated to one department.[13]<br />

The cloud is not only about data storage, however, but<br />

increasingly about the ubiquitous availability of services, content,<br />

and platforms for any type of ICT-based activity. The European<br />

Commission is already sponsoring research [14] into the benefits<br />

of public cloud services based, for example, on service component<br />

building block modules which can be shared across silos<br />

(ministries and other government agencies), so that each module<br />

only needs to be developed once. In turn, this opens the possibility<br />

for non-public sector actors to also develop and contribute their<br />

own modules. In future, therefore, users are likely to be able to<br />

ask specific and personal questions of the government cloud<br />

resources, as well as put together their own unique combination of<br />

public services and content.<br />

3.3 The Mobile Miracle<br />

A particularly exciting development in e-government is the rise of<br />

mobile devices, which are increasing access rates. The ITU<br />

estimates that 5.3 billion people around the world have a mobile<br />

phone subscription, with 3.8 billion in the developing world. [15]<br />

The combination of 3G networks and smart phones also means a<br />

growing portion of them will have Internet access through their<br />

mobile devices.<br />

Mobile government, or m-government, has consequently<br />

increased in importance as an alternative form of access to public<br />

sector information and services globally. In the developing world<br />

it provides an avenue through which countries can leapfrog<br />

traditional infrastructure development and their constituents can<br />

get online quickly. In the developed world, it has also proven<br />

useful in enhancing convenience, flexibility, and productivity and<br />

governments are offering mobile specific services to constituents.<br />

Globally, m-government is not simply changing the scale of egovernment<br />

but is also set to fundamentally change its nature:<br />

o Mobiles are highly convenient, carried around everywhere,<br />

always on and relatively cheap;<br />

o Mobiles provide service personalization and precision with a<br />

huge and growing user base;<br />

o Mobiles add ‘where, when and who I am’ to services:<br />

precisely targeted, location and context based whenever you<br />

want them.<br />

o Mobile apps based on open public data and citizen-generated<br />

data and knowledge are democratizing service design and<br />

delivery ─ all can participate as both suppliers and users.<br />

The Singaporean m-government portal 4 offers more than 100<br />

services specifically designed for mobile phones.<br />

3.4 Social Media and Web 2.0<br />

Social media as the main set of tools riding on the Web 2.0<br />

revolution, allow users to do more than just retrieve information<br />

but also contribute data as well as exercise some control over<br />

4<br />

http://www.ida.gov.sg/Programmes/20060419144029.aspx?getP<br />

agetype=34<br />

433<br />

these data. Web 2.0 sites typically have an ‘architecture of<br />

participation’ that encourages users to add value to the application<br />

as they use it. A Web 2.0 site, like Facebook, Twitter and<br />

YouTube, gives its users the choice to interact or collaborate with<br />

other users as well as service providers in a social media dialogue<br />

around user-generated content in a virtual community. This is in<br />

contrast to Web 1.0 websites where users are limited to the active<br />

viewing of content created and controlled by others.<br />

In the context of e-government, this means that citizens and<br />

businesses are able to change from passive consumers of services<br />

and content to active (co-) producers. On the one hand,<br />

governments can set up a personal two-way dialogue with<br />

individuals or groups of citizens, and potentially use the ‘wisdom<br />

of the user crowd’ to ‘crowdsource’ content and service inputs.<br />

On the other hand and independently of government, citizens are<br />

also starting to dialogue and share more with each other than the<br />

public authorities, increasingly relying on this ‘social signal’ to<br />

get what they need, potentially by-passing and usurping the role<br />

of government. For example, ‘patients know best’ 5 is the world's<br />

first patient-controlled medical records system, based in the UK<br />

and also integrated into its National Health Service secure<br />

network. It allows patients to dialogue with each other, as well as<br />

work closely with clinicians and managers to better manage their<br />

own health. This is co-production and partnership in action.<br />

Very few governments are currently exploiting the benefits of<br />

social media. They are often seen as a risky and costly alternative<br />

to existing channels. However, one such is the Office of Children<br />

and Family Services in New York State (OCFS) 6 , which at the<br />

end of 2009 adopted several social media tools, namely Twitter<br />

and Facebook, to communicate directly with the public, external<br />

media and between regional offices within the agency about all<br />

issues related to OCFS’ policies, services and activities. In 2010,<br />

the Public Information Officer stated that he was able to show<br />

“direct significant cost savings” because the social media are<br />

essentially free and easy to use compared to other less effective<br />

channels which were then closed.<br />

There are, however, emerging concerns regarding the impact on<br />

privacy from using some of these free services. The French<br />

national data privacy authority (CNIL) has recently sent 69<br />

questions to clarify the consequences of a new privacy policy for<br />

Google’s users: whether they have a Google Account, are non<br />

authenticated users, or are passive users of Google’s services on<br />

other websites (advertising, analytics, etc.). These questions were<br />

sent on behalf of and in cooperation with the Article 29 Working<br />

Party that gathers EU data protection authorities. 7 Some<br />

governments have also started to prepare guidelines for the use of<br />

social media in government, such as Difi in Norway. 8<br />

4. THE E-GOVERNMENT E-EVOLUTION<br />

An increasing amount of public sector information and services is<br />

finding its way online. In the EU15, which has long tracked the<br />

5 http://www.patientsknowbest.com/<br />

6 http://www.ocfs.state.ny.us<br />

7 http://www.cnil.fr/english/news-andevents/news/article/googles-new-privacy-policy-cnil-sends-adetailed-questionnaire-to-google/<br />

(Accessed 15. April 2012)<br />

8 http://www.difi.no/filearchive/veileder-i-sosiale-medier-forforvaltningen-pdf-.pdf<br />

(Norwegian only, Accessed 15. April<br />

2012)


percentage of online availability of 20 specific public services, the<br />

number has risen from 20% in 2001 to 90% in 2010. [16] Around<br />

the world, according to the 2012 UN report, only three countries<br />

did not have a government website: Central African Republic,<br />

Guinea and Libya.<br />

However, e-government also extends beyond delivery of services<br />

and is key to the broader efficiency and effectiveness of public<br />

sector operations through joined-up governance, as well as to<br />

societal development issues generally and the information society<br />

specifically. “Reliable and relevant e-government measurement<br />

can offer crucial signposts to point policy makers and<br />

practitioners in the right direction,” said the 2010 UN report.<br />

4.1 A Lack of Usage<br />

Despite an increase in online and mobile users, one of the greatest<br />

challenges to more effective e-government is for people to use it.<br />

If nobody uses them, it doesn’t matter how many services are put<br />

online or how good they are.<br />

Currently there is a gap between the availability of government<br />

information, i.e. the supply of services, and the demand for them.<br />

In the EU15, the percentage of people who used the Internet for<br />

interaction with public authorities increased from 26% in 2005,<br />

the first year of measurement, to 35% in 2010; far below the<br />

growth in the availability of online services. [17] Even in South<br />

Korea, the number one country in the 2010 UN survey, only 47%<br />

of constituents use e-government according to a 2010 report,<br />

though 73% of them are aware of it. [18]<br />

In part in order to highlight lack of demand, many benchmarking<br />

reports have added, or enhanced, a measure of usage. The<br />

Economist Intelligence Unit, for example, called its 2009 report<br />

The usage imperative and added three “usage” indicators, scored<br />

by the company’s country analysts, including the use of online<br />

public services by both businesses and citizens for which it looked<br />

at the extent to which they use services such as tax filings and<br />

online procurement. [19]<br />

4.2 Opening up Government<br />

Open government initiatives are meant to enhance transparency,<br />

improve accountability while providing public sector data, such as<br />

budgets, to users in formats that permit data mashing, i.e. finding<br />

new ways to use and correlate data with other factors and in the<br />

process stimulate innovation.<br />

Such initiatives are increasingly common at all levels and across<br />

the world. In the European Union (EU), the 2010 European<br />

eGovernment Action Plan to 2015, for example, looked to<br />

enhance online transparency in order to promote both<br />

accountability and trust in government. [20] In the United States<br />

(U.S) president Barack Obama has promised “an unprecedented<br />

level of openness in government” to increase transparency,<br />

participation and collaboration through portals such as data.gov.<br />

[21]<br />

In Kenya, President Mwai Kibaki announced the Kenya Open<br />

Government Data Portal in 2011, the first of its kind in sub<br />

Saharan Africa. Recognizing the need to make information<br />

publicly available, President Kibaki said he hoped that<br />

constituents will use the government website as a way to hold<br />

government accountable for its use of public resources. [22]<br />

434<br />

Open government is being looked at in various ways but perhaps<br />

the most important is transparency in assessment and allowing<br />

users to use the data collected. The World Economic Forum<br />

(WEF), which continues to measure digital progress primarily<br />

through its Networked Readiness Index (NRI) as presented in The<br />

Global Information Technology Report, announced in 2010 a new<br />

data sharing platform to “provide users with a set of tools to<br />

explore the impact of information and data technology on a range<br />

of socio-economic areas.”<br />

4.3 The Need for Trust and Security<br />

An unintended consequence of reliance on e-government,<br />

increased online participation and enhanced transparency is the<br />

greater need for trust and security. If a distributed denial of<br />

service (DDoS) attack shuts down government websites or<br />

malicious software (malware) is installed to steal users identity<br />

when using online services, trust will erode, as will the full<br />

potential of e-government.<br />

This is already a problem: only 12% of European users feel<br />

completely safe in making transactions online, making trust and<br />

security one of seven key initiatives in the Digital Agenda,<br />

Europe’s strategy for a successful digital economy by 2020. [23]<br />

To date, cyber security has been largely neglected in international<br />

benchmarks but this may be changing. The European Commission<br />

has identified trust and security as a priority area.<br />

4.4 Delivering on its Promise<br />

Fundamentally, e-government is about improving public sector<br />

efficiency and performance, potentially saving time, effort and<br />

money for government and constituents alike.<br />

It starts in the (back) office. Government needs to transform itself<br />

and enhance horizontal (across agencies) and vertical (higher or<br />

lower levels of government) integration across a host of issues in<br />

order to meet the demands of the digital era. Constituents should<br />

not need to know what government entity is providing the services<br />

they are looking for but rather they should just be able to go to a<br />

single website, such as a national portal, from which they should<br />

find all services from multiple government agencies on any topic,<br />

hence the national portal concept. Many countries, such as the<br />

U.S. with its usa.gov domain, have established a central<br />

government portal which would supposedly make it a one-stopshop<br />

for constituents to find information online.<br />

But there is also a greater need to better link e-government<br />

evaluation and investment to e-government policy and<br />

development outcomes, i.e. performance. In fact, the 2010 UN<br />

report acknowledges that “Ultimately, the challenge is to assess<br />

impact. A few studies exist about the utility citizens derive from<br />

e-government, mostly relating to the performance of government<br />

in developed countries, but even less is known about the impact of<br />

e-government programmes on national development goals.”<br />

However, efforts to better link investment to outcomes are gaining<br />

traction. In 2009, the European Commission presented the i2010<br />

High Level Group: Benchmarking Digital Europe 2011-2015 a<br />

conceptual framework, which suggested that a measure of ICT<br />

impact be added to the current framework of supply while<br />

acknowledging that “Linking surveys to measure ICT impacts is<br />

one of the main statistical challenges ahead.” [24]


5. BENCHMARKING TRENDS AND<br />

TOOLS<br />

A number of global trends in benchmarking, as well as in the tools<br />

available, can be seen both in e-government but also more broadly<br />

in information society and related areas.<br />

5.1 Three Main Benchmarking Trends<br />

Three core shifts of relevance to eGovernment benchmarking can<br />

be observed: up the value chain, down the hierarchy, and across<br />

and out of government, as illustrated in Figure 1. [25] 9<br />

Figure 1: main trends in benchmark<br />

5.1.1 Up the Value Chain<br />

Benchmarking is increasingly focusing on measures which are<br />

higher up the value chain. Historically, e-government<br />

benchmarking has encompassed only inputs and outputs on the<br />

supply side, such as the resources used by government and the<br />

number and sophistication of services put online, regardless of<br />

whether they were used or not. Many benchmarks are now<br />

focusing more and more on outcomes and impacts. On the supply<br />

side these include back-office process re-engineering, as well as<br />

productivity and efficiency measures, such as the number of cases<br />

dealt with. On the demand side, they include e-service take-up,<br />

the user experience, life events, user satisfaction, as well as<br />

impacts like job creation, economic growth, competitiveness,<br />

inclusion and cohesion.<br />

5.1.2 Down the Government Hierarchy<br />

The policy focus is shifting down the government hierarchy to<br />

regional and local governments, to front line staff and even to<br />

users and their intermediaries. Benchmarks have often neglected<br />

to address and capture developments at the local level and at the<br />

user interface where design, standards and outcomes might be<br />

difficult to capture. Thus, rather than relying solely on surveys of<br />

central government administrators, benchmarks should also<br />

examine feasible ways to include assessments of local<br />

administrations, staff and users (family, community, civil<br />

9 Also based on unpublished work undertaken for the European<br />

Commission in 2012 in preparation for the 2012 European egovernment<br />

benchmarking survey, together with Gwendolyn<br />

Carpenter of the Danish Technological Institute and Helen<br />

Rebecca Schindler of RAND Europe.<br />

435<br />

organizations) and panels. The development of user-centric<br />

measures across the main areas of service provision at local level<br />

will be needed, for example in care, housing, education, crime,<br />

transport, environment and health. For the transformation<br />

potential of e-government to become noticeable to users,<br />

frequency of use, local context and the specificity of service to<br />

everyday life situations all matter.<br />

5.1.3 Out of the Government Institution<br />

The third main benchmarking trend is moving beyond only<br />

government measures. There is a host of other actors at different<br />

levels becoming increasingly involved in e-government. Thus, an<br />

attempt should be made to take account of these different<br />

stakeholder groups in designing and implementing the<br />

benchmarking survey. This might necessitate using new diverse<br />

sources of data, many of which are likely to emanate from these<br />

groups themselves, and other knowledge and resource inputs. For<br />

example, how to capture local and especially location-specific eservices<br />

used frequently, even everyday, in addition to the more<br />

familiar national, centralized administrative services which are<br />

used just once or twice a year. Both are important, but to date only<br />

the latter have been captured.<br />

5.2 New Benchmarking Tools<br />

Much of the technology driving e-government, including the<br />

trends identified in section 3 above, is also being used to develop<br />

new tools for benchmarking and evaluation. Some of the most<br />

important are as follows.<br />

5.2.1 Analyzing Transformation in the Back-Office<br />

Most governments make use of internal monitoring tools to<br />

provide accurate metrics on the use of e-services. At the most<br />

basic level, every web server keeps configurable log files<br />

containing records of all its transactions. In addition, web log<br />

analysis software can provide a variety of statistics, highlight<br />

trends and projections, as well as provide reports and export result<br />

files. Take-up data are vitally important as efficiency and<br />

effectiveness objectives can only be achieved if governments<br />

manage the transition from paper-based to electronic procedures<br />

properly. The administrations already delivering e-government<br />

services are potentially the best and most accurate source of data<br />

on take-up. Their web administrators could routinely register data<br />

on a wide range of web metrics concerning traffic, visitors,<br />

activities performed, transactions, etc. These are objective and<br />

comprehensive data, while the usage metrics measured through<br />

user and supplier surveys suffer from accuracy and reliability<br />

problems, caused by lack of understanding by users of service<br />

definitions and subjective bias issues. Of course, web metrics also<br />

have their pitfalls.<br />

o They have little meaning unless they are aggregated,<br />

analyzed and evaluated (for example assessing their<br />

evolution in time and the achievement of predefined targets<br />

and benchmarks).<br />

o Administrations generate and collect differing data on service<br />

usage and performance. In other words, there is no umbrella<br />

approach to data collection, so that comparability across<br />

administrations and domains (not to mention countries) is<br />

extremely low.<br />

o Whilst most administrations monitor these data at least<br />

occasionally, few assess them with an appropriate evaluation


methodology, and few national governments collect and<br />

compare these data at the national level.<br />

There is clearly a high potential value in the development of<br />

collaborative methods of collection, measurement and monitoring<br />

of e-government administrative data, leveraging web metrics and<br />

other performance data generated by e-government service<br />

providers. These data can be collected in direct contact with web<br />

administrators and lead to the analysis of usage statistics<br />

alongside life events for example. Use of web analytics is ideal for<br />

organizations and individuals who do not host websites on their<br />

own web servers and are mostly concerned with human activity<br />

on their websites. Most web analytics services are available for a<br />

monthly fee based on volume, although there are some available<br />

free of charge such as Google Analytics or Alexa.com. Web<br />

analytics can be used to supplement data collected by<br />

governments to provide insight into e-government usage.<br />

5.2.2 New Ways to Capture User Experience –<br />

Social Media Analytics and Crowd sourcing<br />

With the increasing digitalization of everyday life, much<br />

information on the experiences and satisfaction with egovernment<br />

services and the main barriers encountered could be<br />

found through the use of social media analytics and/or<br />

crowdsourcing. There is a variety of tools available – generally<br />

referred to as listening tools – including sentiment analysis, which<br />

allow the analysis of online conversations on websites such as<br />

Facebook, LinkedIn, Twitter, blogging sites and wikis.<br />

Governments can use sentiment analysis to assess positive or<br />

negative sentiment trends for selected topics over time. More indepth<br />

sentiment analysis can also shed light on relative sentiment,<br />

i.e. differentiated by service/life-events, administration or web<br />

site, as well as highlight hot-words and similar.<br />

However, the potential scope of social media analytics can be<br />

much broader and potentially also cover emerging and perceived<br />

issues; top influences in terms of authors, blogs, forums, etc.; key<br />

themes driving customer sentiment over time; top sites by selected<br />

types and concepts; high level affinity analytics; top channels; a<br />

drill down into key ‘hot spots’ or sentiment areas via an in-depth<br />

affinity matrix; social media image versus competitors; hot-word<br />

distribution (percentage of conversations associated with a<br />

particular hot-word); insight into sub facets, products or features<br />

driving positive and negative sentiment; and key themes that are<br />

opportunities to enhance customer perception.<br />

All these in turn can be used to define specific action items to tap<br />

into social media opportunities and mitigate potential risks, define<br />

top social media priorities and even draw up a detailed social<br />

media roadmap or strategy with clear milestones. Although, tools<br />

like these which can cope with large numbers of countries with<br />

different languages, and to guarantee statistical validity, are still<br />

immature, rapid progress is being made in this area. Such tools<br />

could potentially complement or replace traditional user surveys<br />

and allow for much more frequent monitoring or thematic<br />

monitoring, and potentially at considerably lower cost.<br />

5.2.3 Software-Powered Evaluation of e-Government<br />

Service Availability<br />

The second generation of web-crawlers, such as used in Norway’s<br />

eGovMonitoring project, offer an automated way to assess the<br />

availability of online services and thus could be a major building<br />

436<br />

block in the review of key e-government websites. The eGovMon<br />

project was established to create new open source tools to help<br />

improve the quality of public web sites. Twenty-two pilot<br />

municipalities have participated in the design and testing of the<br />

tools. eGovMon consists of a tool for running automated tests at<br />

regular intervals and combines two approaches:<br />

o The deterministic approach checks for distinct features which<br />

can be detected programmatically. For example, checking for<br />

the presence of RSS feeds, links to Facebook/Twitter within<br />

a web page or web site. Provided that the boundaries of the<br />

web site can be clearly defined, this approach is<br />

straightforward to apply and gives very reliable results.<br />

o The learning algorithm approach checks for features which<br />

cannot be programmatically determined. An example of this<br />

is checking whether a local government web-site has a help<br />

page assisting citizens in the use of social media. In contrast<br />

to for example an RSS link, a help page is not formally<br />

defined and a crawler can therefore not immediately<br />

determine whether a given page is a help page or not. A<br />

learning algorithm will find online services based on the<br />

features extracted from a set of manually selected examples<br />

of help pages. Such features can be the presence of words<br />

like ‘help’ and ‘question’. The frequency of the words in the<br />

data from these example pages (the training data), together<br />

with other features, are subsequently used to determine<br />

whether the pages being assessed are help pages or not.<br />

Learning algorithms cannot guarantee 100% correct results<br />

and additional manual quality assurance is required. As<br />

opposed to manual assessment, however, the effort needed to<br />

carry out the learning approach is almost independent of how<br />

many web sites are checked, which enables large scale<br />

monitoring.<br />

The results from the eGovMon project have been used to produce<br />

data on accessibility for mobile users and for people with<br />

disabilities as presented in the 2012 UN report. Some of these<br />

tools are also freely available as online services to provide<br />

evaluation results on demand. They currently support the<br />

identification of barriers for people with disabilities in web pages<br />

and in PDF documents. 10<br />

5.2.4 Smart Data Visualization<br />

The web is not just social but has also become more visual. There<br />

are plenty of examples of new mapping tools, like Andy Lintner<br />

on Beowulfe.com who responded to the 2011 BP oil spill – the<br />

Deepwater disaster in the Gulf of Mexico – with a map mash-up<br />

that compares the size of the slick to others elsewhere in the<br />

world. Or the OECD which in key policy areas has launched<br />

progress maps that feed off global indicators and are updated<br />

regularly. This initiative is called wikiprogress. The core mission<br />

of wikiprogress is to create a global information tool supported by<br />

a worldwide partnership of organizations and individuals wishing<br />

to develop new, smarter measures of progress. Wikiprogress aims<br />

to provide a health check for all societies that enable every citizen<br />

to better understand the economic, social and environmental<br />

factors that determine whether or not their lives are getting better.<br />

Wikiprogress is powered by an OECD indicator framework and<br />

clearly defined taxonomies. The tool empowers local partners to<br />

discuss and contribute.<br />

10 http://accessibility.egovmon.no/ (Accessed 15 April 2012)


These developments show that there is a growing expectation that<br />

data will be available, not only in paper format, but also online in<br />

open mashable formats, for example as maps, or data tables<br />

comparing one country against other countries of choice. In<br />

future, countries are likely to wish to create and update their own<br />

website or data dashboard to plot and manage their own progress<br />

in e-government by manipulating and presenting data in their own<br />

way but which also has international comparability. Data are<br />

likely to have their provenance in a variety of sources, including<br />

universities, research institutions and even responsible companies<br />

and civic institutions which could become actively involved in the<br />

benchmarking process.<br />

6. AN ENHANCED FRAMEWORK<br />

Several international benchmarks cite a need for major revisions<br />

to their models and one even changed its name to reflect this<br />

trend, as the EIU’s e-readiness rankings became the digital<br />

economy rankings. While a case can be made for a completely<br />

different methodology, most reports also recognize the need to<br />

balance progress with a measure of consistency over time,<br />

allowing them to retain their particular focus and strength. For<br />

example, the UN survey has always been unique because it<br />

combines a worldwide measure through a supply-side approach.<br />

The UN framework has worked remarkably well over time and is<br />

a welcome endeavor in measuring the movement of information<br />

and services online. However, most countries have now largely<br />

accomplished this task and as a result, such a framework needs to<br />

adapt to meet new measurement trends – and at all levels. The<br />

following are first step suggestions, to be seen in the context of<br />

the new trends and tools discussed in section 5 above, for<br />

developing e-government frameworks, some of which are also<br />

relevant for the UN survey.<br />

6.1 Increase the Transparency of Survey<br />

Methods and Data<br />

Beyond conducting a survey, why not also release the data? Many<br />

international reports (though certainly not all!) publish data in<br />

either an appendix or on a website. The open government trend is<br />

undeniable: opening up raw data to the world will allow<br />

organizations to use the data in new and innovative ways,<br />

hopefully mashing it into benefits far beyond a supply-side<br />

survey, such as linking the data to performance (see section 4.4).<br />

Releasing the full methodology and the questionnaire will allow<br />

stakeholders to review, comment, and contribute to enhancing the<br />

survey. It would also provide the opportunity to replicate the<br />

results, enhancing the rigor of the whole process.<br />

That organizations might try to ‘game’ the survey by<br />

implementing specific indicators is a potential down-side of this<br />

endeavor, but who has the most to lose by doing so? The survey<br />

by ranking them one point higher, the agency by expending the<br />

effort to put one more item online or the constituent receiving one<br />

more service? If the survey indicators were indeed transparent and<br />

agreed upon, it is likely to become a win-win-win.<br />

6.2 Encourage Governments to Supply Data<br />

When the UN survey began in earnest in 2003, even countries<br />

with advanced e-government programs had a finite number of<br />

websites associated with a specific topic. But the numbers of egovernment<br />

websites have grown and their sophistication has<br />

increased too. To spend hours looking for a specific indicator<br />

437<br />

across complex e-government websites, some of which will now<br />

require authentication, is possible, but increasingly implausible.<br />

This necessitates a fundamental shift in the supply side approach<br />

away from having researchers manually look for each indicator to<br />

preferably having governments provide them and verify their<br />

existence.<br />

A platform should be established where surveyed countries could<br />

input data on what they offer constituents in order to ease the<br />

survey process and enhance rigor. If the survey questionnaire and<br />

data were public (see section 6.1) it would also strengthen<br />

transparency and accountability while offering stakeholders the<br />

opportunity to benchmark themselves – what do I offer according<br />

to the list provided? – and come up with creative new ways of<br />

measurement. It would also create a platform where changes<br />

could be reported – and verified – in near real-time, helping<br />

policy-makers understand where they are and where they need to<br />

go instantly.<br />

This should be part of a mixed approach given that not all<br />

countries will be in a position nor wish to provide all relevant<br />

data. So, survey work is likely to still be required, especially for<br />

the UN survey where one of its strengths is that all countries are<br />

covered. But participation would be in countries’ interest.<br />

6.3 Automate and Innovate<br />

While an effort to encourage governments to supply their data is<br />

necessary, it is unrealistic to expect all to do so. But because the<br />

supply-side undertaking is increasingly a growing burden to<br />

researchers, innovation is also needed. One idea is to increasingly<br />

use automation to assess e-government indicators (another is<br />

search, see below).<br />

Automated assessments have grown in sophistication and while<br />

they may not be perfect, they will at least be consistently<br />

imperfect. (See also section 5.2.3) Finding various tools to<br />

automate surveys, or customizing one for the purpose, may have a<br />

cost but it will pay dividends over time as – eventually – the<br />

numbers of e-government websites will be insurmountable to<br />

research manually.<br />

One particular area in which automation is important is whether<br />

websites are accessible by mobile devices. The increasing<br />

numbers mean they are crucial to delivering services in a channel<br />

people use. For example, one can use automated supply-side<br />

assessment to verify that the websites on which government<br />

services are found meet the most basic mobile standards.<br />

6.4 Search for it<br />

In order to make it easier for constituents to find the information,<br />

data, and services they are likely to want, many governments<br />

around the world have integrated information on central<br />

government portals. Prominent examples of this approach include<br />

usa.gov, direct.gov.uk, and australia.gov. Theoretically this would<br />

make it easier to find government information; however, in<br />

practice usage of such portals may not even have led to higher<br />

usage. In the UK, for example, 40% of individuals used the<br />

Internet in 2010 to engage the public sector. In Sweden, a country<br />

without a central government portal, the equivalent number was<br />

62%. [26]<br />

While there are always exceptions, the question is whether such<br />

portals work? More important, is the amount of money spent on


integrating them worth it? Because a lack of measurement to<br />

performance (see below), we don’t know. But what we do know is<br />

that one of the biggest trends in e-government will be the move<br />

away from specific websites to search. Indeed, already in 2010<br />

only a small minority of UK users came in through the direct.gov<br />

portal (12%) with the majority arriving at their service of choice<br />

from search (52%) or via an external link (43%). 11 A constituent<br />

will no longer go to a central government portal to look for<br />

something but rather use Google, or another search engine, to<br />

simply search for the service or information desired.<br />

The current common approach is in effect not a measure of<br />

‘supply’ as a feature may exist in theory but if it is not found on<br />

websites then it is not counted. Adding searching for a service<br />

anywhere in a country’s e-government ecosystem to the arsenal of<br />

locating items from a supply-side perspective is an obvious<br />

addition considering the often meager usage numbers of portals<br />

and the high usage numbers for search engines. An updated<br />

survey should thus also cover assessments of search relevance.<br />

6.5 Link Survey to Performance<br />

Linking e-government performance as measured by the supplyside<br />

efforts to outcome, i.e. performance, is increasingly<br />

important. To date, however, such efforts have been minimal due<br />

to the difficulty in execution at all levels.<br />

“Just as there is tremendous complexity in public performance<br />

measurement in general, so too are there substantial definitional<br />

and methodological challenges in monitoring and evaluating the<br />

efficiency and effectiveness of public service delivery through<br />

online media,” says the UN 2010 report. But desk research can<br />

supplement online supply-side efforts in linking a survey to<br />

performance, a key measure of e-government. For example, a<br />

2009 book chapter used traditional supply-side analysis of the 239<br />

largest U.S. cities correlated with U.S. Census data to show that<br />

large cities, on average, have better e-government than small ones,<br />

likely an effect of the fact that there is often a fixed cost of system<br />

implementation, which decreases cost per user. [27] Qualitative<br />

analysis can also be linked to quantitative estimates using web<br />

analytics (see section 5.2.1) which, although biased and<br />

incomplete, tend to be consistently so thereby enabling relatively<br />

good country and longitudinal comparisons.<br />

In this way, it is possible to begin to answer the most fundamental<br />

of questions: is the money being spent on e-government worth it?<br />

Which organizations are spending the appropriate amounts? Are<br />

there organizations that spend less but achieve more? This<br />

exercise will entail asking those surveyed for their e-government<br />

budgets, usage statistics, satisfactions surveys, and data on cyber<br />

security, among others (also see section 6.2). If organizations do<br />

not provide such information, then their e-government website<br />

can be evaluated to see whether they do. Or search can be used to<br />

see whether any such data are available. If all else fails, so should<br />

the organization in this area: if money is being spent on egovernment<br />

but the results are not transparent or the benefits not<br />

being measured, why do it in the first place?<br />

6.6 Measurement at All Levels<br />

The UN survey fulfills an important international role in<br />

benchmarking the supply of e-government services across<br />

11 http://www.cabinetoffice.gov.uk/news/digital-default-proposed-<br />

government-services<br />

438<br />

countries. But there is also great demand for e-government<br />

measurement surveys at all levels. This paper has outlined recent<br />

e-government, technology and benchmarking trends, and<br />

proposed a revised measurement framework to meet the demand<br />

at all levels.<br />

All politics is local as Tip O’Neill, the former speaker of the U.S.<br />

House of Representatives, used to say. Indeed, many public sector<br />

services are offered at the local level, which means that egovernment<br />

too needs to offer them locally. However, many local<br />

services are also increasingly integrated into national level<br />

websites – again, the user should not need to know who is<br />

offering them or at what level, but rather just how to find them.<br />

For example, South Korea’s national portal includes links to both<br />

national and local government services. 12 The Canadian national<br />

portal goes one step further and provides a ‘close to your home’<br />

feature through which one can locate services by postal code, city<br />

or province/territory. 13 The Australian national portal, meanwhile,<br />

offers an advanced search feature that filters results by, among<br />

others, local government services. 14 Australia’s portal also<br />

explains how constituents can file a complaint through a number<br />

of channels, including via email, fax, post or – in the most<br />

traditional way – by hand. 15<br />

Every case will be slightly different depending on the scope,<br />

specific measurement objectives and intended level of<br />

sophistication, all equations of time, money and effort. However,<br />

the basic approach will remain the same: to use a robust supplyside<br />

approach, which is customized for cultural and local needs<br />

and takes into account emerging trends in order to support the<br />

larger endeavor of linking survey performance to government<br />

performance.<br />

7. CONCLUSION<br />

As illustrated through the UN survey, supply side analysis<br />

remains a useful way of comparing relative development in the<br />

digital era. However, to fully capture the modern complexities of<br />

e-government across various levels, a revised framework is<br />

necessary, one that is sustainable into the future by having<br />

government supply the data for verification, providing policymakers<br />

with near real-time data, while supplementing the<br />

traditional efforts with additional automation and search. In this<br />

effort, additional improvements can be made in regards to adding<br />

measures of transparency, usage, security, and performance.<br />

E-government must be achieved through sustainable development,<br />

illustrating how investment is connected to outcome and how it is<br />

reflective, and supports an organization’s broader development<br />

goals. The UN approach is a good framework to start from. When<br />

we customize it, we can support the goal of linking the survey to<br />

performance.<br />

12<br />

http://www.korea.go.kr/new_eng/main/index.do<br />

13<br />

http://www.servicecanada.gc.ca/cgi-bin/hrsearch.cgi?app=hme&ln=eng<br />

14<br />

Select “search” and then “advanced search” on the portal to try:<br />

http://australia.gov.au<br />

15<br />

http://australia.gov.au/service/privacy-complaint-to-the-officeof-the-australian-information-commissioner


8. REFERENCES<br />

[1] OECD. Future of the Internet Economy: A statistical profile.<br />

June 2011 update<br />

[2] McKinsey Global Institute. Internet matters, the net’s<br />

sweeping impact on growth, jobs, and prosperity. May 2011<br />

[3] Eurostat. Individuals regularly using the Internet: Percentage<br />

of individuals aged 16 to 74 (Code tin00091):<br />

http://epp.eurostat.ec.europa.eu/tgm/table.do?tab=table&init<br />

=1&language=en&pcode=tin00091&plugin=1<br />

[4] International Telecommunications Union website.<br />

http://www.itu.int<br />

[5] Internal Revenue Service website. http://www.irs.gov<br />

[6] United Nations. World Public Sector Report 2003: E-<br />

Government at the Crossroads. Department of Economic and<br />

Social Affairs, New York, 2003.<br />

[7] United Nations. Global E-Government Readiness Report:<br />

Towards Access for Opportunity. UNDESA, New York,<br />

2004.<br />

[8] United Nations. Global E-Government Survey: Leveraging<br />

E-government at a Time of Financial and Economic Crisis.<br />

UNDESA, New York, 2010<br />

[9] United Nations. Global E-Government Survey: E-<br />

Government for the People, UNDESA, New York, 2012<br />

[10] Government of Singapore (2010) “New Singapore e-<br />

Government Masterplan to Connect with the People.”<br />

Government of Singapore. June 14, 2010.<br />

http://www.thegovmonitor.com/world_news/asia/newsingap<br />

ore- e-government-masterplan-to-connect-with-the people-<br />

33531.HTML (accessed March 2011).<br />

[11] European Commission (2011) ” Proposal for Amending<br />

Directive 2003/98/EC on re-use of public sector information”<br />

COM(2011) 877 final, Brussels, 12.12.2011<br />

[12] Government of Australia (2011) “Guidelines for open data in<br />

Australia”, September 2011: http://www.data.gov.au.<br />

[13] Government of UK (2011) “The G-Cloud Programme”,<br />

available from: http://gcloud.civilservice.gov.uk/<br />

[14] Junger (2010), “Future eGovernment: towards the cloud of<br />

public services”, <strong>proceedings</strong> of Eastern European<br />

eGovernment Days, 21-23 April 2010, Jean-François Junger<br />

of DG INFSO, European Commission.<br />

[15] International Telecommunications Union. October 19, 2010:.<br />

www.itu.int/net/pressoffice/press_releases/2010/39.aspx#url<br />

[16] Eurostat. E-government on-line availability: Percentage of<br />

online availability of 20 basic public services (Code:<br />

tsiir120).<br />

http://epp.eurostat.ec.europa.eu/tgm/table.do?tab=table&init<br />

=1&language=en&pcode=tsiir120&plugin=1<br />

439<br />

[17] Eurostat. E-government usage by individuals by gender:<br />

Percentage of individuals aged 16 to 74 using the Internet for<br />

interaction with public authorities (Code: tsiir130).<br />

http://epp.eurostat.ec.europa.eu/tgm/table.do?tab=table&init<br />

=1&language=en&pcode=tsiir130&plugin=1<br />

[18] Do Je-hae. The Korea Times. “E-Government Web Sites<br />

Underutilized,” February, 19, 2010:<br />

http://www.koreatimes.co.kr/www/news/nation/2010/02/117<br />

_61097.HTML<br />

[19] Economist Intelligence Unit. E-readiness rankings 2009: The<br />

usage imperative.<br />

[20] European Commission, eGovernment Action Plan 2011-<br />

2015, online at: http://ec.europa.eu/information_society/<br />

activities/egovernment/action_plan_2011_2015/index_en.ht<br />

m, last retrieved 13/03/2012.<br />

[21] Obama, Barack. Memorandum for the Heads of Executive<br />

Departments and Agencies: Transparency and Open<br />

Government. 2009:<br />

http://www.whitehouse.gov/the_press_office/Transparencyan<br />

dOpenGovernment/<br />

[22] The Kenya Open Data Initiative website.<br />

https://opendata.go.ke<br />

[23] European Commission. Digital Agenda website.:<br />

http://ec.europa.eu/information_society/digitalagenda/index_en.htm<br />

[24] European Commission. i2010 High Level Group:<br />

Benchmarking Digital Europe 2011-2015 a conceptual<br />

framework. 2009:<br />

http://ec.europa.eu/information_society/eeurope/i2010/docs/b<br />

enchmarking/benchmarking_digital_europe_2011-2015.pdf<br />

[25] Millard, J (2008) “eGovernment measurement for policy<br />

makers”, European Journal of ePractice, No. 4 Efficiency and<br />

Effectiveness, June 2008, European Commission, DG<br />

INFSO: http://www.epractice.eu<br />

[26] Eurostat. E-government usage by individuals by gender:<br />

Percentage of individuals aged 16 to 74 using the Internet for<br />

interaction with public authorities (Code: tsiir130).<br />

http://epp.eurostat.ec.europa.eu/tgm/table.do?tab=table&init<br />

=1&language=en&pcode=tsiir130&plugin=1<br />

[27] Reece, Bryan, and Kim Andreasson. Institutional E-<br />

Government Development. Handbook of Research on<br />

Strategies for Local E-Government Adoption and<br />

Implementation: Comparative Studies. Edited by Christopher<br />

G. Reddick. IGI Global 2009, pp. 137-162<br />

[28] Nigel Shadbolt, Wendy Hall, Tim Berners-Lee (2006). "The<br />

Semantic Web Revisited". IEEE Intelligent Systems.<br />

http://eprints.ecs.soton.ac.uk/12614/1/Semantic_Web_Revist<br />

ed.pdf Retrieved April 15, 2010.


Impacts of the Public Procurement Reform in Chile on the<br />

Municipal Level<br />

Gastón Concha<br />

University of Santo Tomás<br />

Vergara 301, Piso 3<br />

Santiago, Chile<br />

562.938.4609<br />

gconcha@santotomas.cl<br />

ABSTRACT<br />

This study measures the impact that the Reform of the System of<br />

Public Procurement, driven by Chile’s central government, had in<br />

the municipalities. Traditionally, local governments present<br />

unequal development, at least in terms of the level of resources<br />

and the size of population looked after. Moreover, many studies<br />

show that municipalities have lead the ranking in the perception of<br />

corruption in Chile. Two hypotheses were proposed. The first is<br />

that the impacts and benefits, that the Information and<br />

Communication Technologies (ICTs)-driven reform have had on<br />

public procurement tend to be less than desired. The second<br />

affirms that an e-procurement system can significantly augment<br />

the level of transparency; however, an automatic reduction in the<br />

level of corruption will not be apparent. The study was based on<br />

two surveys conducted with municipality buyers and vendors.<br />

Corruption and transparency were chosen as the primary focus.<br />

Other impacts measured include the efficiency of the internal<br />

processes, cultural aspects and normative and institutional aspects.<br />

The most relevant conclusions were two - the reform of public<br />

procurement in Chile increased the level of transparency; and the<br />

greatest transparency perceived in purchasing processes has not<br />

shown a lessening in the level of corruption.<br />

Categories and Subject Descriptors<br />

H.4.0 [Information System Applications]: General; C 4.0<br />

[Performance System]: Measurement techniques<br />

General Terms<br />

Management, Masurement, Performance, Human Factors,<br />

Standardization, Legal Aspects<br />

Keywords<br />

E-Procurement; Municipalities; ICT; Impact<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

440<br />

Roberto Anrique<br />

Business Technology Group<br />

Apoquindo 6410, Of. 212<br />

Las Condes, Santiago, Chile<br />

569.9318.3918<br />

roberto@btg.cl<br />

1. INTRODUCTION<br />

Public procurement mobilizes millions of dollars annually and<br />

fosters the development of private enterprises and public<br />

organizations. It approves large budgets that are sometimes spent<br />

on initiatives of questionable value. It awards big bids on public<br />

works to companies that are regularly questioned by the public<br />

opinion. In particular, it appears that a sense of “false<br />

transparency” persists in the processes of purchases and awards<br />

and in the quality of concrete results.<br />

To the extent that the public procurement is more transparent to<br />

the community, the sensitivity and the critical mindset grows, so<br />

is the case of the municipalities.<br />

According to the portal of the System of Procurement in Chile, the<br />

total amount of the procurement generated by the municipalities<br />

in Chile during 2009 corresponded to approximately 21% of the<br />

total compromised 1 . In the year 2009 the total sum of the ordered<br />

procurement reached $6,200,000 US dollars. That corresponds to<br />

$1,630,000 in purchasing orders.<br />

In the particular case of Chile, there has been a profound change<br />

in the processes of public procurement. New institutions have<br />

been created. These include the Dirección de Compras y<br />

Contrataciones Públicas and the Tribune of Public Contracting. A<br />

unique registry of state vendors has also been created. The register<br />

is administered by a private entity (Chileproveedores).<br />

Information technologies have been introduced to the processes of<br />

procurement, electronic catalogues for products and convenient<br />

frameworks agreements have been generated, and new vendors<br />

have been incorporated and trained. At the same time there exists<br />

a very significant advance in the transparency of public<br />

procurement. However, doubts persist with respect to the true<br />

impact of the reduction of corruption and the use of privileged<br />

information in the processes of acquisition, as well as the<br />

continuation of “favorite vendors” that make it difficult to have an<br />

environment of truly free competition. In the same sense the<br />

results of various surveys about technical organizations such as<br />

the CERC, CEP and the Instituto de Libertad y Desarrollo are<br />

worrying, as they show these institutions are among the most<br />

corrupt in the country.<br />

Confusion exists in many cases with respect to the impact on<br />

small-scale vendors. There are those who indicate that<br />

opportunities are opened for the SME (small and medium-sized<br />

1 Source:Chilecompra, 2009.


enterprises); however, there are others that indicate that the danger<br />

increases for the small companies due to the threat of much bigger<br />

providers with the economies of scale in costs and distribution.<br />

There is too controversy with respect to the politics of<br />

procurement and the System of Public Procurement in terms of<br />

whether they should or should not be neutral with respect to<br />

SMEs. In Chile, it can still be affirmed that there exists a relative<br />

neutrality in this aspect, 30% of the companies that sell through<br />

ChileCompra are SME and 67% are micro-companies.<br />

The manner in which the annual budget is inefficiently and<br />

perhaps “incomprehensibly” spent is too in discussion. With the<br />

introduction of electronic systems and their obligatory use, a<br />

centralization of information of the major part of the public<br />

spending has been achieved, detecting in many cases that more<br />

than 2/3 of the annual budget is spent in the last third of the year,<br />

generating an extreme concentration of spending and man-hours<br />

inverted towards the end of the year. As well as an inefficient<br />

consequence of the processes of restricted spending through the<br />

tight times for specification, analysis and the urgency to “spend<br />

the budget” in order to avoid asking for it in the next annual<br />

budget.<br />

This study aspires to put itself in charge of these perceptions, but<br />

focused on the reality for local government, specifically<br />

municipalities with their community of influence, by means of a<br />

search for facts and concrete fundamentals that permit a<br />

recounting of an objective description of the impacts and results<br />

of the modernization efforts of procurement on a national level.<br />

2. LITERATURE REVIEW<br />

There are two studies that we believe will help illustrate the<br />

objects of the present work and they will be briefly reviewed. The<br />

first of these is a report of the Aberdeen Group [1] that covers the<br />

best practices of e-procurement and the second is “The Evaluation<br />

of the Levels of Digitalization of Municipalities” developed by<br />

CETUC [5].<br />

Aberdeen Group highlights the following good and best practices:<br />

To elevate the acquisitions from traditional tactical transactional<br />

management, to a more strategic level. This implies that important<br />

changes need to be made to the politics inside of the institution,<br />

for example, the improvement of the personal profile that carries<br />

out acquisitions.<br />

Electronic catalogues of products should be managed by the<br />

vendors rather than internally.<br />

Reinforcement of the use of the key performance indicators (KPI)<br />

to measure costs, processes and to definitively know the greater or<br />

lesser success of the electronic procurement system. This should<br />

be accompanied by a system of selected incentives aligned with<br />

the objectives of business and the functions of acquisitions.<br />

In review of the three best practices listed above, the importance<br />

that the emergence of ICTs in the world of acquisitions and public<br />

institutions has had is confirmed. Traditionally, this was an<br />

activity of lesser importance; however, an awareness of the<br />

strategic relevance of obtaining the best value for money has<br />

developed, especially if it is public money. Consequently, society<br />

today is demanding a greater transparency and accountability;<br />

from there the impacts of the development of adequate measures<br />

can be seen. Without a doubt, the ICTs have had a significant<br />

contribution in the use of portals of procurement each time is the<br />

441<br />

portal more interactive and better integrated with the budget<br />

system. The portals have facilitated the processes of procurement<br />

and have obtained important savings in the transaction costs and<br />

in the prices of the goods and services provided. The saving has<br />

produced the effect of amplifying the traditional base of providers,<br />

contributing too to a better equality in the relationship with them.<br />

Also, it is interesting to reinforce as well that nowadays the<br />

modern vision of acquisitions is directed to buying solutions and<br />

services more than on a focus towards acquiring products itself or<br />

towards internal developments. For this reason the important<br />

change is explained in the externalization of services traditionally<br />

realized by an internal hand, for example, the internal<br />

developments of software, nutrition services, security etc.<br />

Aberdeen Group shows the benefits of the use of e-procurement in<br />

public and private institutions.<br />

Table 1. The benefit of e-procurement<br />

Area Before After<br />

Percentage of extracontractual<br />

procurement<br />

Duration of the cycle of<br />

purchasing<br />

Cost of the operation of<br />

purchasing<br />

Reduction in the price of<br />

Purchasing<br />

Percentage of procurement<br />

beneath the management of<br />

the Group of Purchasing<br />

38% 14,2<br />

20,4 days 3,8 days<br />

US$56 US$23<br />

- 7,3%<br />

56% 69%<br />

In Table 1, the significant impacts that have been achieved in the<br />

reduction of the cycle of purchasing can be seen. The same goes<br />

for the whole operation of the procurement, and in reducing the<br />

costs of the transaction. Additionally, it emphasizes the indicator<br />

of the percentage of spending that is under the control of the unity<br />

of acquisitions. This increase implies a better level of negotiation,<br />

better prices and a better investigation of what the market has to<br />

offer.<br />

The second study, CETUC [5], points specifically to the focus of<br />

our work: the municipalities of Chile. In this regard, the most<br />

relevant discoveries to the present study about the municipalities<br />

are highlighted below:<br />

Only one third of the municipalities have an area of information<br />

technology. These areas have as their principal function the<br />

maintenance of the applications and computers that operate in the<br />

municipality.<br />

A high participation in the instances of association concerning the<br />

ICTs is observed, like the Association of Municipalities, it<br />

indicates a high degree of interest in promoting the use of ICT by<br />

the majority of the municipalities 2 .<br />

The study shows that there are two factors that permit the<br />

segmentation of municipalities: the communal population and the<br />

level of poverty. Also, it is shown that the level of development of<br />

the ICTs is significantly different in correlation with these two<br />

factors.<br />

2 http://www.clubdelaexcelencia.cl


Not all the municipalities have the same technological needs.<br />

Recognizing this fact, this study affirms that it is key, as much in<br />

the moment of defining public politics as in the definition of the<br />

directions, to better the level of automation in each municipality<br />

in particular.<br />

One of the principal motivators of the incorporation of technology<br />

has been to better the internal municipal management. The study<br />

recognizes that most of the proposals for technological improving<br />

have been oriented towards providing satisfactory service to the<br />

citizens, whom are the principal beneficiaries of municipal work.<br />

The next section the study will analyze a few bibliographic<br />

references that are related to the impacts that a system of<br />

electronic procurement will produce in both public and private<br />

institutions. This information will help us to better understand the<br />

results in the application of the survey, improve its analysis,<br />

identify bias, make comparisons etc.<br />

2.1 Critical Success Factors<br />

In this section, we examine the literature to help identify the<br />

critical elements or factors that help to explain the process of<br />

adoption of public procurement reforms in a way that has a<br />

positive impact in fulfilling the stated objectives. These objectives<br />

can be extremely varied, for example: from widespread use to<br />

improved efficiency in its use, better access to information,<br />

increasing opportunities for the SMEs, improving transparency<br />

and decreasing corruption.<br />

One interesting impact for all of the governments is that of the<br />

SMEs, that is, to know what the factors are that help to the<br />

strengthen them. The goal is to make them more competitive by<br />

increasing the volume of the business to which they have access,<br />

though eventual positive externalities for example, access to<br />

training of their personnel, a greater use of the ICTs, etc.<br />

A few critical factors that are seen in the literature are delineated<br />

in the following:<br />

To make flexible the size of the orders dividing them along the<br />

time, so that they can adequate themselves to the generally limited<br />

production capacity of SMEs. The study of Arozamena and F.<br />

Weinschelbaum deepens this point [3]. Always and when the<br />

bigger division does not make prejudice the levels of transparency<br />

nor the eventual economies of scale that can occur. Therefore, the<br />

normative should proceed with prudence in these aspects.<br />

To facilitate the association between companies to add offering<br />

and to confront with better success the bidding of high volume.<br />

To establish financial measures that are less burdensome to<br />

facilitate participation, for example, the cost of the documentation<br />

for bids (access should be free in all senses), guarantees that are<br />

too high, to avoid delay in payments to seem as though it is an<br />

extended practice in the public sector.<br />

It is interesting to highlight the participation of SMEs in the<br />

Public Market of ChileCompra [23], given that its participation in<br />

business that reaches 38% of what is positively compare with 18%<br />

on the national level. The mechanisms that support the SMEs<br />

(included as well the named micro-businesses) that ChileCompra<br />

possesses are the following:<br />

Entrepreneurship Centers: They correspond to an infrastructure so<br />

that the users have free access to computers connected to the<br />

442<br />

Internet, to meeting rooms with clients or providers, to technical<br />

consultancy and training in order to acquire knowledge in relevant<br />

materials to the access of this market. The Management of<br />

ChileCompra counts 30 Entrepreneurship Centers in the country<br />

as a whole.<br />

Confirming or Advanced of the Payments to the Vendors: Permits<br />

the providers of the State to be paid in cash their invoices;<br />

advancing its payments through agreements with distinct financial<br />

institutions (the project recently finds itself in its first phase of<br />

implementation, because of which there are, as yet, no significant<br />

results).<br />

Ordering or credit against the order of purchase: ChileCompra,<br />

through its agreements with financial institutions, offers financing<br />

to cover resource necessities for the orders of purchases awarded<br />

through the system of the Public Market Portal to micro and small<br />

businesses providers of the State.<br />

Training: ChileCompra possesses a permanent and free offer of<br />

training and technical assistance services in these sectors.<br />

In agreement with the study on the implementation of eprocurement<br />

in Sweden [6], one critical element that is<br />

emphasized is not to lose focus on the people that are involved in<br />

the implementation of e-procurement and how they are affected.<br />

In this sense, the study concludes the importance of assigning<br />

resources for the education of people and not solely focusing on<br />

the possible savings that could result from the process of<br />

implementation.<br />

Another critical factor that the Swedish study highlights is that the<br />

key for an increase in the adoption of the activities of eprocurement<br />

through the public institutions are the regulations<br />

emanated by the central organization responsible for the<br />

acquisitions (Swedish National Financial Management Authority)<br />

that obligates institutions to use the system of acquisitions (for<br />

example the use of electronic invoices starting July 1, 2008).<br />

In general, this study shows that the users perceive benefits, such<br />

as savings in time, savings in cost, increase in the fulfillment of<br />

contracts with providers and a better control of spending due to<br />

the use of the system. Other notable benefits have to do with<br />

better access to information and in arranging a process of<br />

procurement more simplified and standardized. Additionally, the<br />

study identified benefits in coordination with deliveries. In<br />

summary, the use of electronic means in procurement is perceived<br />

as an increase in the efficiency process.<br />

2.2 Pending Challenges<br />

In the study carried out in Sweden for the public sector it shown<br />

that in general, in spite of the greater intensity in the use of the<br />

system and the greater cost realized, the system is still not used to<br />

its full potential.<br />

In the same study it is confirmed that new challenges are arising<br />

in relation with the introduction to e-procurement, as to the<br />

incorporation of new criteria for selection to interact with the<br />

proposals and procurement orders received.<br />

In agreement with Horwath’s study [11], where a few<br />

municipalities are present 3 , it is shown that due to the Information<br />

3 Municipalities of Santiago, Puerto Montt, Valparaíso y<br />

Talcahuano.


of the System of Public Acquisitions of the Direction of Public<br />

Procurement and Contracting and the administrative and financial<br />

systems accountable to the institutions that do not find themselves<br />

integrated, the institutions should digitize the information in two<br />

systems that function in parallel with each other.<br />

In agreement with the same study, it is made evident that there do<br />

not exist standardized models of contracts, nor are there<br />

standardized models of procurement documents.<br />

Another challenge that appears to be mentioned in the literature is<br />

the collaboration between colleagues in different agencies (IBM<br />

[12]). At the same time, to foster and encourage this cooperation,<br />

respecting the autonomy of the individual organisms seems to be a<br />

key challenge in this study.<br />

Additionally, we present a summary of the challenges that the<br />

World Bank [15] presents for electronic government procurement<br />

(e-GP).<br />

The Implementation of Reforms. Elements such as leadership,<br />

political agreements, global vision versus a system view,<br />

strategies based on phases versus achieving quick impacts (Quick<br />

Win), the obligatory use of the e-GP systems, the use of change<br />

management.<br />

To Increase the Benefits. The impacts are still low, because of this<br />

greater efforts and an establishment of better metrics are required.<br />

Likewise, it is necessary to adequately manage expectations;<br />

greater transparency translates into lesser rates of corruption, to<br />

reduce the barriers to increase the efficiency of the processes and<br />

to manage all the information in electronic formats.<br />

Integration of e-GP with other systems. There is a lack of<br />

integration throughout the whole cycle of procurement that<br />

includes other systems as well, such as: the budget and finances,<br />

the management of inventories, system of intelligence and<br />

business etc.<br />

Globalization of Public Procurement. At this point, the<br />

mechanisms of interoperability are very important in connection<br />

with other agencies within the country as well as foreign agencies,<br />

because of which, the use of international standards is a critical<br />

element.<br />

2.3 Cultural Factors<br />

One of the discoveries that this field offers us is the study of the<br />

implementation of e-procurement in Sweden [6], referring to the<br />

fact that it tends to minimize and underestimate the resistance to<br />

change of the employees. Another interesting aspect is that the<br />

technology is seen as a panacea that will resolve a large part of the<br />

problems; this is obviously a conceptual error, but in accordance<br />

with our experience, it is a vision that is still accepted by many<br />

sectors of the public world. Technology could be a general<br />

facilitator that, adequately managed, could produce an impact<br />

with respect to the work Jane Fountain and others have carried out<br />

[7]. The study realized by IBM [12] for the local government in<br />

Dublin signals very clearly that the experience indicates the<br />

initiatives to modernize the acquisitions and should be based on<br />

the processes, in an appropriate organizational structure and on a<br />

model of acquisitions before being incorporating a technology.<br />

2.4 Transparency and Corruption<br />

The international banks of development such as the World Bank,<br />

the Bank of Inter-American Development, The Asian Bank of<br />

443<br />

Development and institutions such as the OAS and the OCDE<br />

have been conducive to electronic procurement system in their<br />

countries, for a greater transparency of information and eventually<br />

less corruption, among other reasons. With this they will take the<br />

necessary precautions to better the transfers of resources in the<br />

countries that receive loans from them.<br />

With the goal of contrasting our hypothesis that the reform on<br />

procurement has not had a significant effect on the lessening of<br />

corruption of the municipalities, we have drawn upon a study<br />

conducted by the Instituto Libertad y Desarrollo. It is the annual<br />

survey of corruption [22] that this institution has been doing for<br />

years, where executives of the enterprises who interact with public<br />

services are consulted. In this study a scale from 0 to 10 measures<br />

the perception of corruption, where 10 indicated a maximum level<br />

of corruption and 0 the minimum. The evolution of the results<br />

from the year 2002 to 2008 is shown in Figure 1.<br />

Figure 1. The evolution of the perceived level of corruption in<br />

Chile.<br />

Observing Figure 1, a clear tendency of diminishing does not<br />

appear starting from the year 2005, the year that marks the start of<br />

the use of ChileCompra in the municipalities.<br />

In this same study perception of corruption by institutions, in<br />

municipalities, the rate of perception of corruption rises from 5.7<br />

to 6.0 between the years 2007 and 2008.<br />

With respect to the knowledge of the cases, the municipalities’<br />

increase from 20.6% to 26.6% between the years 2007 and 2008.<br />

Finally, the institutions that are most mentioned as “winning a<br />

bidding” by illegal measures the municipalities appear in second<br />

place in the ranking, but with a clear tendency to rise with the year<br />

2006 obtaining 13%; the year 2007 a 15% and 2008 a 21%<br />

From the previous analysis, it can be concluded that, in Chile at<br />

least, there has effectively been no impact to the levels of<br />

corruption because of the practices of better transparency in the<br />

acquisitions as a consequence of the reforms on procurement. The<br />

ease with which they should be able to realize the audits and a<br />

supposed better citizen control apparently has had no effect, at<br />

least in relation to the perception of corruption that this survey has<br />

determined.


3. HYPHOTESIS AND RELEVANT<br />

QUESTIONS<br />

We venture two hypotheses that we would like to validate in this<br />

study:<br />

The first one is that, in general, of impacts and benefits that the<br />

processes of reform to public procurement tend to have, those<br />

involving an intensive use of the ICTs, are less than that expected.<br />

At least, the expected results are not seen in the pre-defined time<br />

span, although there are effects that could potentially be seen in<br />

the future.<br />

The second one is that the effects of obtaining a greater<br />

transparency in procurement as a consequence of arranging a<br />

system of procurement based on the internet will not significantly<br />

change the perception of the level of corruption in the<br />

organization unless a profound cultural change is simultaneously<br />

exercised.<br />

The questions this investigation endeavors to respond to are:<br />

What are the critical elements that determine the success of a<br />

change on the practices of procurement in an organization as<br />

complicated as a municipality? What are the pending challenges<br />

on the municipal level with an end goal of taking advantage of the<br />

all the benefits that the reform to the System of Procurement<br />

would ultimately have? What are the factors of the culture of the<br />

organization that favor or reduce the impacts of a reform on<br />

public procurement accompanied by the introduction of<br />

information technologies? In what way and to what degree would<br />

greater transparency and citizen control involving a reform on<br />

public procurement would have on dissuading the practice of<br />

corruption in the municipalities?.<br />

4. METHODOLOGY AND RESEARCH<br />

PLANNING<br />

The present work of investigation is based fundamentally on the<br />

design and application of two surveys, one of the usual buyers of<br />

the municipality and the other towards the providers that<br />

habitually do business with them. To support the elaboration these<br />

two surveys, many diverse resources were consulted: relevant<br />

actors of the reform of procurement such as the General<br />

Comptroller of the Republic, the Director of Procurement and<br />

Contracting, institutions of investigation such as the Instituto<br />

Libertad y Desarrollo among others. Additionally, the survey was<br />

tested with a group of users and with ChileCompra, who<br />

moreover, supported the distribution of the survey and is a shown<br />

representative sample of the users. In complementary form, a<br />

bibliographical analysis was realized to ask for background and to<br />

support the design of the study and its posterior conclusions and<br />

analysis.<br />

5. THE MUNICIPALITIES IN CHILE<br />

As is known, the Municipalities are the public entity most close to<br />

the people and that have the greatest relevance to their daily life.<br />

For this reason, their management has a high impact and visibility<br />

to the citizen.<br />

5.1 Participation in Spending<br />

Nowadays there exist 345 municipalities that represent 21% of the<br />

total spending of the public sector, which represent the third type<br />

of public organization with the most spending, exceeding the $1<br />

444<br />

billion dollars annually. The spending of the municipalities<br />

represent 30% of purchasing orders (PO) from the public sector,<br />

with more than 55,000 PO annually, making this the type of<br />

public organization that realizes the most spending transactions 4 .<br />

5.2 Segmentation<br />

The municipalities have been segmented into three groups<br />

according to the amount of spending realized. Segment A consists<br />

of 11 municipalities with the most spending, representing 3% of<br />

municipalities, but 19% of the spending. Segment B consists of<br />

42 municipalities that represent 12% of municipalities and 29% of<br />

spending. Finally, Segment C consists of the 292 municipalities<br />

that represent in quantity 85% and 52% in the amount spending. 5<br />

Table 2. Segmentation of municipalities by amount of<br />

spending (2009)<br />

Segment<br />

Number of<br />

Municipalities<br />

Total Spending<br />

(Thousands USD)<br />

Average<br />

Spending<br />

(Thousands<br />

US$)<br />

A 11 3% 204.108 19% 18.555<br />

B 42 12% 318.480 29% 7.583<br />

C 292 85% 570.530 52% 1.927<br />

Total 345 100% 1.093.119 100% 28.066<br />

5.3 Complaints against Agencies<br />

The municipalities are the public organization with the greatest<br />

number of complaints. An analysis of the complaints presented<br />

through the platform of ChileCompra against the public<br />

organizations, indicates that complaints are associated with late<br />

payments (more than 30 days) and with irregularities in the<br />

processes of procurement. In case of municipalities, 71% of<br />

complaints are for late payments and 29% for denouncements of<br />

irregularities in the processes of procurements.<br />

Additionally, the municipalities are the ones with the biggest<br />

quantity of complaints that are still pending responses (66% of<br />

total pending complaints, see Figure 2).<br />

4 http://analiza.mercadopublico.cl<br />

5 Source: Business Intelligent Platform of Chilecompra, 2010.


Figure 2. Number of pending complaints by sector.<br />

6. SURVEYS OF THE MUNICIPALITIES<br />

Within the principal elements of the present investigation, a<br />

survey was of all buyers of the municipalities was carried out, as<br />

well as a survey of the all active vendors who had sold to the<br />

municipalities.<br />

6.1 Characterization of the Surveys<br />

In both surveys, an electronic data base supplied by ChileCompra<br />

was utilized. In the case of the buyers, the sample size was<br />

defined with the total of buyers from all municipalities (4.037<br />

buyers). In the case of vendors, the sample was selected from<br />

those who have been an active participant in business negotiations<br />

with the municipalities in the last two years (3.080 vendors).<br />

In Table 3 the quantity of active providers with municipalities<br />

between January and May of 2010 is presented, segmented by size<br />

of enterprise<br />

Table 3. Quantity of Providers of Municipalities by Size<br />

Segmentation by Annual<br />

Sales (UF)*<br />

Companies<br />

Trading with<br />

Municipalities**<br />

Participation<br />

(%)<br />

Large Over a 100,000 1.145 4.5%<br />

Medium 25,001 to 100,000 1.605 6.4%<br />

Small 2,400 to 25,000 5.817 23.7%<br />

Micro 0.1 to 2,399 16.538 65.8%<br />

Total general 25.105 100%<br />

Note: 1 UF is equivalent to 39.42 USD in June 30, 2010<br />

6.2 Validation of the Survey of the Buyers<br />

As part of the methodology, the survey of the buyers was<br />

validated by a group of users before its launch. The objective was<br />

to obtain feedback that would permit validation of the instrument<br />

in terms of the scope and coverage, as well as validate interest in<br />

responding.<br />

Once the survey was constructed, it was validated in three forms:<br />

It was turned by the person responsible of the spending of an<br />

445<br />

important municipality in Santiago; he was asked to respond and<br />

make some observations to improve the survey. A test of the<br />

survey was realized in electronic form to a group of buyers; the<br />

survey was turned into the Department of Study of ChileCompra<br />

for its commentaries and observations.<br />

6.3 Results of the Surveys<br />

6.3.1 Survey of Buyers<br />

147 responses were received from a total of 4037 sent (3.6%) that<br />

correspond to 112 municipalities within the whole country of 346<br />

(32.4%).<br />

To segment the municipalities by level of poverty 6 of the<br />

associated population, the below presents the distribution in Table<br />

4.<br />

Table 4. Segmentation of the responses by level of poverty of<br />

the commune<br />

Segmentation of sample Distribution Total<br />

by level of poverty<br />

of<br />

the responses<br />

Distribution<br />

Group of least poor (9,5% y 21,2% poor)<br />

31,3% 24%<br />

The comparison with the total of municipalities is presented in<br />

Table 4. Additionally, the sample is segmented by the size of the<br />

municipality. For this the volume of annual money spent was used<br />

as an indicator. Its comparison with the total distribution of<br />

municipalities is shown in Table 5<br />

Table 5. The Segmentation of the responses by volume of<br />

spending by municipality<br />

Segmentation by<br />

Volume of Spending<br />

Distribution<br />

of<br />

Responses<br />

Universal<br />

Distribution<br />

Small (US$2.873.652) 47% 52%<br />

In the following the most relevant results of the survey of the<br />

buyers is presented:<br />

67% of the surveys indicate more delays in the processing of<br />

awards using Chilecompra platform. In 2009, the municipalities<br />

received an average of 5.5 offerings for bidding. This response<br />

varies depending on the level of resources of the municipality.<br />

The responses of the more well off municipalities in this point<br />

decreased some 53.3% in contrast with the poorer municipalities<br />

where the percentage rose some 78.6%.<br />

6 Casen Clasification: Is a national survey periodically carry out<br />

by the Secretary of Planning of Chile to evaluate the socioeconomic<br />

state of the country and its impact to the social<br />

programs (http://www.mideplan.cl/casen)


58% of the buyers believe that the vendors are satisfied with the<br />

use of ChileCompra, while 20% perceive that they are not.<br />

79% of buyers say that they feel satisfied (or very satisfied) with<br />

ChileCompra.<br />

64% show satisfaction with ChileCompra Express (the use of<br />

Electronic catalogues of framework agreements); however, 18%<br />

do not use it. It seems interesting to emphasize that this response<br />

rose 31% in the case of municipalities with a less poor population.<br />

The benefit most mentioned by the use of ChileCompra Express<br />

(67%) is the reduction in time dedicated to purchase. The second<br />

benefit most mentioned (12%) is the reduction in the times of<br />

delivery by the vendors. However, the benefit of the reduction of<br />

prices only appears in third place with 11%. This percentage<br />

reduces to 5% in the less poor municipalities.<br />

47% say they do not use the files for the preparation of the Annual<br />

Spending Plan. In the case of the poorest municipalities, that<br />

percentage rises to 54%.<br />

The biggest difficulty mentioned in the use of ChileCompra is the<br />

failings in the system (70%). In second place, the change in<br />

platform is mentioned (37%). It is fitting to mention that a<br />

significant percentage (37%) identify the lack of access to the<br />

Internet as a significant problem. It is noted, too, that the failings<br />

in the system are perceived in a distinct form depending on the<br />

size of the municipality. In large municipalities this problem is<br />

reduced to 61% while in middle-sized municipalities it reaches<br />

83%<br />

With respect to the impact that the Law of Public Procurement has<br />

had on the process of purchasing, the following is highlighted: an<br />

increase in transparency (80%) and more precise rules for<br />

developing of awards and procurement documents (40%).<br />

20% of those surveyed declare that they have contracts in force<br />

that are governed by the old Law of Procurement.<br />

75% of those surveyed affirm that the use of ChileCompra has<br />

signified an increase in the use of the ICTs. In the case of the<br />

municipalities with the most resources at their disposal, only 3.4%<br />

mention that there has been no increase in the use of the ICTs.<br />

This percentage has risen to 15% for the smaller municipalities.<br />

63% declare that there has been no increase in the training<br />

programs as a consequence of the use of ChileCompra.<br />

31% declare that there has been an increase in the number of<br />

people who work in the area of spending as a consequence of the<br />

use of ChileCompra.<br />

67% indicate that they obtain savings by the lowering of prices. It<br />

is useful to highlight that 15% of those surveyed affirm that the<br />

savings surpass 6%. However, 33% declare that they have not<br />

obtained any savings.<br />

The biggest positive impact derived from the use of ChileCompra<br />

has been the increase in transparency (92%), as shown in Table 6<br />

Table 6. Processes positively impacted by the use of<br />

ChileCompra<br />

Impacted Processes<br />

% Importance<br />

Better transparency 92%<br />

Auditing and control 28%<br />

446<br />

Application of requests or final user<br />

requirements<br />

27%<br />

Reception of products 23%<br />

Budget process 17%<br />

Generation of reports 16%<br />

Management of plan of spending 16%<br />

Quality control 13%<br />

Administration of warehouse 11%<br />

50% declare they are satisfied with the system of codification of<br />

items and products and while 50% are not satisfied<br />

38% of those surveyed declare that the reform of public<br />

procurement, has contributed to an increase in the level of<br />

collaboration with other municipalities.<br />

The group of those surveyed confirms an increase in the level of<br />

collaboration with other municipalities, thanks to ChileCompra. It<br />

is highlighted that 73% of them have been able to share<br />

knowledge and 58% to share information with the vendors.<br />

6.3.2 Survey to the Vendors<br />

312 responses were received from a total of 3,980 providing<br />

companies (7.8%). This survey was given to those vendors who<br />

have had an active participation in business negotiations with the<br />

municipalities; this being that they have at least awarded some<br />

sort of bidding in the last 2 years.<br />

The distribution of the answers by the size of the vendors and the<br />

comparison with the universal distribution is shown in Table 7.<br />

Table 7. Distribution of responses by size of vendor<br />

Size of company<br />

in conjunction with annual<br />

sales of 2009<br />

% of<br />

distribution<br />

of responses<br />

Universal<br />

responses<br />

In conjunction<br />

with SII (%)<br />

Micro (less than 2.400 UF) 41,25 42,8<br />

Small (between 2.400 UF<br />

and 25.000 UF)<br />

34,32 37,7<br />

Medium (between 25.001<br />

UF and 100.000 UF)<br />

17,82 9,9<br />

Big (Greater than 100.000<br />

UF)<br />

6,60 9,6<br />

In the following, the most relevant results of the survey of sellers<br />

are presented:<br />

60% of those surveyed declare that there has been an increase in<br />

the use of ICTs as a consequence of the use of ChileCompra.<br />

72% declare that there has not been a significant change in the<br />

increase of training as a consequence of the use of ChileCompra.<br />

14.3% declare that sales have increased thanks to the framework<br />

agreements.<br />

50% indicate to be satisfied with the classification system of items<br />

and products.<br />

Within the positive impacts indicated by the providers, the<br />

management of the sales plan appears as the most mentioned.


49% of the providers indicate that the new Law of Public<br />

Procurements has facilitated their work in sales in the public<br />

sector. However, 18% of respondents indicate they are not<br />

familiar with said law. In the big companies, the percentage of<br />

respondents who are not familiar with the law is 18% and in<br />

medium-sized companies it is 31%.<br />

The greatest transparency and increase in the level of sales to the<br />

state appear as the two impacts most mentioned as a consequence<br />

of the reforms to the system of public procurement (please see<br />

Table 8).<br />

Table 8. Impacts of the improvements to the system of public<br />

spending<br />

Impacts of the improvements to<br />

the System of Public Spending<br />

% Mentioned<br />

Greater transparency 45%<br />

Greater sales and public organizations in general 45%<br />

Greater sales to municipalities 36%<br />

Better information 34%<br />

Agility in the process 30%<br />

Increase in equality in the process of spending 18%<br />

Reduction in costs 12%<br />

In response to the question, “Do you consider ChileCompra an<br />

effective tool to control possible irregularities in biddings<br />

originated in the municipalities?” 58% of those surveyed indicated<br />

that ChileCompra is not an effective tool.<br />

51% of those surveyed indicated that there does not exist<br />

sufficient channel to realize denunciations and/or complaints of<br />

regulators in the process of procurement of the state. However,<br />

31% declare that they do not know if such channels even exist.<br />

49% of those surveyed indicate that they have witnessed<br />

irregularities in the case of the biddings originating in the<br />

municipalities (with participation in the last 2 years).<br />

Of those who have witnessed irregularities in the municipalities,<br />

only 33% have denounced them.<br />

Of those who have denounced said irregularities, 97% carried this<br />

out through the mechanism of complaints of ChileCompra and<br />

16% through the Tribunal of Public Procurement (they are<br />

complementary mechanisms).<br />

Table 9 shows the reasons that are mentioned with respect to the<br />

decision not to denounce for irregularities in the processes of<br />

procurement of the municipalities.<br />

Table 9. Reasons for not denouncing irregularities<br />

Reason for not denouncing<br />

irregularities<br />

% Mentioned<br />

Denouncements have no effect 49%<br />

Scared of reprisal 45%<br />

Procedure is too tedious 38%<br />

“I don’t know how to make a denouncement” 25%<br />

Lack of proof 21%<br />

447<br />

7. CONCLUSIONS AND<br />

RECOMMENDATIONS<br />

In the following the principal conclusions of the study in relation<br />

with our hypotheses and the questions of the investigation are<br />

presented:<br />

It is observed that, in general, the objectives of the Reform to<br />

Public Procurement have been fulfilled. In particular, with<br />

rference to the increase in the levels of transparency and agility of<br />

the processes of procurement, along with contributing to saving<br />

and the efficiency of public expenses. The statements above are<br />

evidenced by the following results:<br />

An increase in transparency (80%) and more precise rules for<br />

developing bid documents and awarding (40%).<br />

67% of the surveyed buyers declare that the principal benefit of<br />

the use of feedback agreements (ChileCompra Express) has been<br />

the reduction in the time dedicated to spending.<br />

67% of the buyers indicate that they obtain savings by the<br />

lowering of prices, and 15% affirm that the savings surpass 6%. In<br />

this same way, is it interesting to emphasize that 75% of those<br />

surveyed affirm that the use of ChileCompra has signified an<br />

increased use of the ICTs.<br />

With respect to the impact in the market on the companies that<br />

sell to the municipalities it is highlighted that 60% of those<br />

surveyed declare having increased the use of the ICTs as a<br />

consequence of the use of ChileCompra.<br />

There appears to be no correlation between the increase in<br />

transparency and the significant reduction of the levels of<br />

corruption. The annual surveys realized by the Instituto Libertad y<br />

Desarrollo shows that the perception of corruption has not<br />

lessened in the last years, in spite of the results of the survey of<br />

the providers, where half declare that they have witnessed<br />

irregularities in biddings with municipalities.<br />

We conclude that, the critical elements that determine the success<br />

of a change in the practices of procurements in the municipalities<br />

are as follow:<br />

The reform should invoke a systemic model where all the actors<br />

involved are coordinated (technological, normative, cultural, and<br />

institutional).<br />

There should exist a wide, consistent, clear, and sufficiently<br />

specific legal framework, that gives incentive to the use of<br />

electronic commerce, such as the mechanism of purchasing. This<br />

framework should incorporate several institutions (Procurement<br />

Management Agency, Tribunal of Procurement, and Registry of<br />

Providers) and especially a governing organization that exercises<br />

a role of leadership and regulation.<br />

Mandatory use of the electronic systems by law.<br />

Continuing training in the use of the ICTs as a central driving<br />

force of the processes of change of the electronic procurement<br />

(processes, people, technology and implementation).<br />

Provision of a basic infrastructure of access to the Internet for the<br />

providing enterprises and public services.<br />

A plan of incorporation of buyers and vendors to use the system.


A strategy of evolution of the market of electronic spending from<br />

a simple transactional model to an integrated model to other<br />

systems with functionalities and services with additional value.<br />

In the following, the pending challenges on the municipal level<br />

are presented with a final goal to take advantage of all the benefits<br />

that a reform on the system of spending would have:<br />

To fulfill the promised payments with the vendors. This was a<br />

recurring problem in our survey and in the registered complaints<br />

in ChileCompra.<br />

To increase the uptime in the public marketplace platform, which<br />

are mentioned in a recurring manner in both surveys.<br />

To reduce the cycle time of the procurement process through<br />

specific features in the electronic platform of Chilecompra. It is<br />

observed that the offers through ChileCompra have doubled from<br />

3 to 6 (on average) by the process of procurement. This has<br />

produced an increase in the time of award, that in the survey was<br />

reflected in that 67% of those surveyed declared longer delay than<br />

before and in the cause of the poorest municipalities the<br />

perception of increased delay reached almost 80%. This, as a<br />

consequence, produces that this process does not form part of the<br />

current features of ChileCompra; therefore, it should be done with<br />

external systems. Naturally, the poor municipalities find<br />

themselves with fewer resources of support with respect to how<br />

this result would be explained. Consequently, the providers accuse<br />

with difficulty the non-fulfillment of the awarding period by the<br />

part of the municipalities.<br />

To carry out the publication on the Annual Plan of Spending, just<br />

as it is established in the Procurement Law (Nr. 19.886, article<br />

12), given that, according to the results that the survey obtained,<br />

only slightly more than half the municipalities realize. We believe<br />

that one possible cause that explains the situation is due to the<br />

system of the administration of the budget, which should include a<br />

plan of spending that, currently, is not integrated with<br />

ChileCompra.<br />

To increase the levels of training in the use of the ICTs, in<br />

particular in the poorest municipalities.<br />

To reinforce the diffusion and the use of the channels of<br />

complaints of irregularities in the community of the providers. It<br />

is appreciated that a significant percentage of providers (31%) are<br />

not familiar with the existing channels to realize denouncements<br />

of irregularities in the processes of procurement. However,<br />

ChileCompra has formal mechanisms of complaint and moreover<br />

there is the Tribunal of Public Procurement. The communication<br />

should consider the principle identifying motives for not<br />

denouncing irregularities among which could be the sense that the<br />

denouncement will have no effect, and the fear of reprisal.<br />

In the following, the factors of the organizational cultures are<br />

presented that favor or reduce the impacts in public procurement<br />

accompanied by the introduction of ICTs would have:<br />

One positive aspect that is the level of collaboration between<br />

municipalities (to share knowledge, information of providers and<br />

good practices) declared by the buyers (38%). We believe that this<br />

has produced as a consequence of activities of support and<br />

training coordination principally by ChileCompra, The<br />

Association of Municipalities and SUBDERE (diplomats,<br />

trainings, Programs of the Bettering of Management, among<br />

448<br />

other), of which have introduced a generating in the instances of<br />

collaboration.<br />

It is observed that, as both with buyers and vendors, there does not<br />

exist a correlation between the use of ChileCompra and the<br />

increase in the levels of training in ICTs.<br />

The most relevant conclusion of this study has been to<br />

demonstrate that the Process of the Reform of Public Procurement<br />

in Chile, in particular in the municipalities, has brought as<br />

consequence an increase in the level of transparency in the<br />

processes. However, it cannot be concluded that there has been a<br />

significant lessening in the level of apparent corruption. The<br />

previous leads to say that to produce an impact in the reduction of<br />

corruption; it is not enough to solely better the processes and the<br />

technologies of information. What is additionally requires are<br />

initiatives that point explicitly to modify the cultural standard<br />

associated with the involved actors.<br />

Another important impact generated by the use of the Public<br />

Market is the increase in the utilization of the ICT by the<br />

municipalities and their providers. This fact, due to its<br />

massiveness and multiplying effect, should too have an impact on<br />

a national level, given the closeness of the municipalities and its<br />

citizens.<br />

As the next steps of this study, we recommend the development of<br />

similar projects in different counties of the region too including<br />

other sectors that have been affected by the process of the reform<br />

of Spending (at least in Chile): State Universities, Public<br />

Hospitals and the Armed Forces<br />

8. ACKNOWLEDGMENTS<br />

This work was funded by IDRC 7 (International Development<br />

Research Center) with collaboration of National University of San<br />

Martín (Argentina) who authorized the preparation of this paper.<br />

This work is part of the ICT4GP (Information Communication<br />

Technology for Government Procurement) program.<br />

We would like to thank all those who collaborated to make this<br />

study possible. We would especially like to gives thanks to the<br />

support of ChileCompra, which provided key information and<br />

assisted in the distribution of the survey. In particular, we would<br />

like to emphasize the support and work of Guillermo Burr of the<br />

Department of Studies of ChileCompra for his assistance in the<br />

entire process related to the survey of buyers and vendors.<br />

9. REFERENCES<br />

[1] Aberdeen Group, The E-procurement Benchmark Report,<br />

December 2004.<br />

[2] Albornoz, M.B.B y M Rivero, Experiencias Andinas de<br />

Gobierno Electrónico, 2007.<br />

[3] Arozamena L. and F. Weinschelbaum, Compras Públicas:<br />

Aspectos Conceptuales y Buenas Prácticas, Programa<br />

ICT4GP, Documento de Trabajo Nº1, Buenos Aires, Mayo<br />

de 2010.<br />

7 (http://www.idrc.ca/EN/Pages/default.aspx)


[4] Campos, J.E. and Pradhan, S., The Many Faces of<br />

Corruption: Tracking Vulnerabilities at the Sector Level,<br />

2007.<br />

[5] CETUC, Evaluación de los Niveles de Digitalización de los<br />

Municipios, July, 2008.<br />

[6] Engström, Å., Wallström and Salehi-Sangari, E.,<br />

Implementation of Public e-Procurement in Swedish<br />

Government Entities, Proceedings of the International<br />

Multiconference on Computer Science and Information<br />

Technology, pp. 315 – 319, Volume 4, 2009.<br />

[7] Fountain, J.E., Building The Virtual State, 2001.<br />

[8] Gascó-Hernández, M., Latin America on Line: Cases,<br />

Successes and Pitfalls, 2007.<br />

[9] Horst, B., Una Mirada a Fondo a Nuestros Municipios, Serie<br />

Informe Económico Nº 196, Instituto Libertad y Desarrollo,<br />

december, 2008.<br />

[10] Horst, B., Cumplimiento de las Nuevas Normas De<br />

Transparencia en Municipalidades, Instituto Libertad y<br />

Desarrollo, april, 2009.<br />

[11] Horwath HB Auditores Consultores, Análisis del Marco<br />

Institucional y Capacidad de Gestión del Sistema de<br />

Adquisiciones Públicas en Relación con la Evaluación del<br />

Sistema de Contrataciones Públicas, Santiago, October,<br />

2008.<br />

[12] IBM, Local Government e-Procurement Strategy Report,<br />

Cork County Council, Cork City Council, Dublin City<br />

Council, Kerry County Council in conjunction with staff<br />

from the Department of Environment and Local<br />

Government., April, 2003.<br />

449<br />

[13] Katz, J.M. Los Caminos hacia una Sociedad de la<br />

Información en América Latina y el Caribe, 2003.<br />

[14] Katz, J.M. El Papel de las TIC en el Desarrollo, 2009.<br />

[15] Knut L., Electronic Government Procurement: a New Era<br />

Key Advances & New Challenges, World Bank.<br />

Presentation in III Conference in Government Procurement,<br />

Washington, November, 2009.<br />

[16] OAS (Organization of American State), Perfiles de Sistemas<br />

Electrónicos de Compras Gubernamentales, Best<br />

Gubernamental Practices, Interamerican Agencies for<br />

Cooperation and Development, 2003.<br />

[17] Rivera, E., Nueva Economía, Gobierno Electrónico y<br />

Reforma del Estado: Chile a la Luz de la Experiencia<br />

Internacional, 2003.<br />

[18] Rose-Ackerman, S. La Corrupción y los Gobiernos: Causas,<br />

Consecuencias y Reforma, 2001.<br />

[19] Senge, P. et al., The Dance of Change, The Challenges of<br />

Sustaining Momentum in Learning Organization, 1999.<br />

[20] Singer, M et al., Does e-Procurement Save the State Money?<br />

Journal of Public Procurement, Volume 9, Issue 1, 58-78,<br />

2009.<br />

[21] Talero, E., Design Considerations for an Electronic<br />

Government Procurement Program, World Bank, 2001.<br />

[22] Von Baer E and Igor, O; Encuesta de Corrupción 2009: “Una<br />

Señal de Alerta”; Serie Informe Sociedad y Política Nº 113,<br />

Instituto Libertad y Desarrollo, april 2009.<br />

[23] Chilecompra, http://www.chilecompra.cl


Posters


A Crowdsourcing Model for Public Consultations on Draft<br />

Laws<br />

Vasiliy Burov<br />

WikiVote!<br />

125047, Phadeyeva street, 7/1<br />

Moscow, Russia<br />

+79255024064<br />

burov@wikivote.ru<br />

ABSTRACT<br />

The paper discusses an innovative approach to lawmaking. In the<br />

proposed model a draft law is split into segments and improved by<br />

a network community which members can vote for the segments<br />

and suggest their own versions. Several cases of public<br />

consultations of Russian Laws based on Wikivote approach are<br />

presented and analyzed.<br />

Categories and Subject Descriptors<br />

K.4.3 [Organizational Impacts]: Computer-Supported<br />

Collaborative Work<br />

General Terms<br />

Management, Design, Human Factors<br />

Keywords<br />

Lawmaking, Wiki, Collaboration, Crowdsourcing<br />

1. INTRODUCTION<br />

In this paper we suggest a new collaboration strategy, aimed at<br />

emergence and development of network object centered<br />

communities and ecosystems. Within those ecosystems the most<br />

community supported document components are selected and the<br />

most productive and constructive collaboration participants are<br />

defined. With this strategy we can build various structured textual<br />

activities in the areas of legislation, business and society. To<br />

implement this strategy we designed methodological and software<br />

tools, based on combining idea management and wiki technology.<br />

Those tools are actively used in e-Government and Massively<br />

Distributed Collaboration.<br />

2. PRINCIPLES OF COLLABORATIVE<br />

LAWMAKING<br />

This model of participatory democracy suggests a transition from<br />

a culture of political rhetoric to a participatory culture built on<br />

crowdsourcing principles. Such a culture is based on attracting the<br />

open network community to participate in creative and<br />

collaborative problem solving. There have been several<br />

unsuccessful attempts to engage the network community in the<br />

lawmaking process. Those attempts have often been based on a<br />

naïve belief that publishing draft laws on the Web and inviting<br />

everybody to come and comment will automatically aggregate<br />

knowledge and improve the quality of the document. To the great<br />

disappointment of both organizers and participants this generally<br />

results in thousands of comments that cannot be aggregated in any<br />

way. Only very few of the comments and editing are actually<br />

valuable, and even those drown in the information noise [1].<br />

Evgeny Patarakin<br />

WikiVote!<br />

125047, Phadeyeva street, 7/1<br />

Moscow, Russia<br />

+79103880718<br />

patarakin@ wikivote.ru<br />

450<br />

Boris Yarmakhov<br />

WikiVote!<br />

125047, Phadeyeva street, 7/1<br />

Moscow, Russia<br />

+7215-6263616<br />

yarmakhov@ wikivote.ru<br />

Soliciting citizens’ expertise in law and regulation making<br />

processes requires special efforts towards network community<br />

building and the use of technologies that allow aggregating<br />

socially dispersed knowledge. To implement this idea we used<br />

Wikivote, our platform for collective improvement of structured<br />

legislative documents and building an expert community in the<br />

Democracy 2.0 framework. A number of collaborative projects<br />

aiming consensus construction and based on IBIS methodology<br />

were accomplished in the last 5 years [2]. We aim to create a<br />

collaborative environment for collaborative drafting, improvement<br />

and promoting draft laws within public and legislative projects.<br />

We have built a collaborative environment for collaborative<br />

creation, improvement and promoting bills within public and<br />

legislative projects on the crowdexpert.ru platform. Enacting a<br />

new law means that a community devises new rules which help it<br />

to become more efficient. Below are the principles on which<br />

legislative collaboration is based:<br />

1) Collaborative document creation and voting has a priority<br />

over document discussion. Our technology allows<br />

2)<br />

collaborators to create their own text versions, that could be<br />

voted for by other participants. The value of discussion is<br />

less than the value of collaboration. Contemporary<br />

collaboration does not always need discussions.<br />

The process of selecting text segments is based on the<br />

participants’ voting. All the votes should be counted but the<br />

weight of each vote depends on the participant’s impact and<br />

the estimation of this impact by the community. The more is<br />

the participant’s impact and its estimation, the more is the<br />

participant’s vote weight.<br />

3) Public document construction aiming at complex cloud<br />

issues has high educational value. The practice helps not<br />

only produce a quality document and build a community of<br />

people interested in its implementation, but promote an<br />

innovative document, maintain a new level of its<br />

understanding and perception by the society.<br />

The main direction of this practice may be defined not only as<br />

document improvement but also as a form of public attitude and<br />

support to innovations. Citizens are not only provided with<br />

educational innovations but are involved in collaborative<br />

innovations promotion.<br />

3. CASE STUDIES<br />

Participatory law-making sounds like a pretty radical direction for<br />

Open Government, and it is surprising to see that it has been<br />

establishing an especially strong foothold in Russia. Starting in<br />

2010, a number of collaborative projects for the improvement of


Russian Federation legislative proposals have taken place,<br />

including work on proposals for education, a very controversial<br />

fisheries bill, and Social Services Laws. These projects have<br />

attracted up to 6000 collaborators each, and represent very<br />

successful initiatives in citizen participation in legislative process.<br />

3.1 Collaborative Improvement of the<br />

Russian Law on Education<br />

A recent case of the described strategy is the Russian Law on<br />

Education improvement implemented at<br />

http://edu.crowdexpert.ru/ The project is supervised by the<br />

Russian Ministry of Education with the support of Wikivote! and<br />

the Public Opinion Foundation. The Web site contains a complete<br />

text of the draft law, which chapters and items were split in small<br />

segments. The project participants can create their own segment<br />

versions and vote for segments created by other participants. The<br />

site contains an additional section “The Law novels” with items<br />

which the new law brings into practice. The section “Critical<br />

questions” contains sharp issues of Russian education which the<br />

new law is supposed to solve. Initially the section contained<br />

questions posed by the Ministry of Education employees. The<br />

participants could post and vote for suggestions on the issues<br />

which they consider important and which require solution by the<br />

Law. This section was very important for evaluating expectations<br />

of the society. Totally more than 5700 Russian citizens joined the<br />

project. They created more than 2 000 comments, 170 solutions of<br />

critical questions and 400 versions of the Law items. The<br />

collaboration process was maintained and supported by project<br />

facilitators. Besides it was backed up by experts in legislation who<br />

monitored the consistency of the suggestions with the law. The<br />

collaborative process is a long term activity and consists of<br />

several steps. First the Ministry of Education put together the first<br />

draft of the Law. It was decomposed into segments and introduced<br />

to the network community for evaluation and improvement.<br />

Project designers drafted the second version of the draft law based<br />

on the improvements and suggestions. The process has been<br />

repeated and the third version of the law was drafted. The<br />

mechanism reminds of relationships between a consumer<br />

community and a software product testers. Developers create the<br />

first document version and introduce it to the community,<br />

consisting of different groups of the document consumers. Its<br />

participants test items of the document and suggest their<br />

improvements and edits. The most supported versions are<br />

reviewed by the developer and included onto the new document<br />

release which is enacted till the new release. The developer<br />

publishes the new release and makes explanations of the changes<br />

that have been made. Similarities between participants and testers<br />

in the Law on Education case could be traced even in titles and<br />

wordings of documents. We did not set any limitations on the size<br />

of the community, and social status, age or position of our<br />

participants. Still the project format allowed participants to selfogranize,<br />

make decisions and defend them.<br />

3.2 Collaborative Improvement of the<br />

Russian Law on Fisheries<br />

In July 18 – September 19 2011 we organized public consultations<br />

on the new Russian Bill on Fisheries (http://r.zakon-fom.ru/). It<br />

451<br />

attracted more than 5 300 Russian Citizens, who made more than<br />

2 000 comments and created about 300 versions of the Law items.<br />

The text of the bill was not large, so we did not have to break it<br />

into very detailed pieces. Some bill chapters were represented as<br />

final blocks and participants could build their own versions, which<br />

made navigation and orientation it the participant’s personal<br />

workspace much easier. On the other hand the bill attracted a lot<br />

of public attention and some participants acted destructively. The<br />

project administration had to take additional security measures<br />

and premoderate new items versions and comments. The project<br />

was supported by the Russian agency on Fisheries, which experts<br />

drafted the first version of the bill and monitored the participants<br />

suggestions. The experts made the second draft of the bill on<br />

Fisheries based on the public consultations on the bill made on the<br />

project Web site. After the edits were made, the new draft was<br />

posted on the Web site and the project participants reviewed and<br />

revised the draft items. The second draft attracted less attention of<br />

the community and received much less comments and<br />

suggestions.<br />

We also observed formation of groups, that supported only one<br />

suggestion and voted against all the other versions. We concluded<br />

that some participants join the project just to support a suggestion<br />

proposed by a particular group and important for a part of<br />

stakeholders, such as social groups, businessmen or the Ministry<br />

officials. This type of group behavior does not affect the version<br />

rating, as it depends on the level of community support given to<br />

the version. If a participant does not create their own version but<br />

just votes for and against other participants’ versions, their<br />

influence on the final result will be insignificant.<br />

4. CONCLUSION<br />

Described collaboration strategy, its methods and instruments can<br />

become the basis for new e-Work solutions aiming at creating<br />

structured documents. As an example the work of technical<br />

writers drafting product documentation can be totally transformed<br />

after involving in the process the product consumers. Another area<br />

of the public selection technology implication is education.<br />

5. ACKNOWLEDGMENTS<br />

The work reported here was supported by The Ministry of<br />

Education and Science of the Russian Federation.<br />

6. REFERENCES<br />

[1] M. Lips и A. Rapson, «Exploring Public Recordkeeping<br />

Behaviors in Wiki-Supported Public Consultation Activities<br />

in the New Zealand Public Sector», in Proceedings of the<br />

2010 43rd Hawaii International Conference on System<br />

Sciences, Washington, DC, USA, 2010, с. 1–10.<br />

[2] G. Anadiotis, K. Kafentzis, I. Pavlopoulos, и A. Westerski,<br />

«Building consensus via a semantic web collaborative<br />

space», in Proceedings of the 21st international conference<br />

companion on World Wide Web, New York, NY, USA,<br />

2012, с. 1097–1106.


A Novel Scheme of Government Information Sharing<br />

System for Implementing Paperless Government in Korea<br />

John (Jong Uk) Choi,<br />

JooWon Cho<br />

Sangmyung University<br />

juchoi@markany.com<br />

ABSTRACT<br />

Secure integration and interoperability are key issues in<br />

implementing ‘paperless’ digital government, and PKI scheme has<br />

been recommended for secure delivery of the document between<br />

government organizations. However, when requested documents<br />

safely arrive at other organizations, there are no ways to prevent<br />

illegal modification, editing using authoring tools, or transferring<br />

to the third parties.<br />

In this paper, we suggest a novel approach to implementing a<br />

government information sharing system: PKI, access control and<br />

forgery prevention which were employed in implementing<br />

Government Information Sharing (GIS) Center in Korea.<br />

Categories and Subject Descriptors<br />

D. 2.11 [Software Engineering]: Software Architectures –<br />

Domain-specific architectures.<br />

General Terms<br />

Security<br />

Keywords<br />

DRM, Forgery prevention, Access control, Public service<br />

1. INTRODUCTION<br />

Even if PKI scheme can provide very secure mechanism of<br />

authentication, confidentiality, and non-repudiation for sharing<br />

information between government organizations, still there remain<br />

several problems and potential risks. What PKI scheme can<br />

provide is to guarantee secure delivery of documents between two<br />

parties. However, even though the document has been delivered to<br />

the right person without any modification has been made, there<br />

remain a couple of potential risks: it can be modified at right<br />

person’s devices after delivery, or easily screen copied into a new<br />

file and transferred to the third parties. In other words, PKI<br />

scheme provides a secure delivery of a document between two<br />

parties or multi parties, but cannot guarantee secure ‘use’ of the<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Dong Hwa Kim<br />

MarkAny<br />

dhkim@markny.com<br />

452<br />

Chang Hun Yoo<br />

MarkAny<br />

chyoo@markany.com<br />

document, protecting from misuse when it is delivered. Even<br />

though PKI procedures and certificates employed in GIS service<br />

can deliver requested documents safely to applicants, still there<br />

can be serious concerns: data leakage and illegal modification. In<br />

other words, even though PKI can provide user authentication,<br />

confidentiality, and non-repudiation in the process of document<br />

delivery, there are worries of illegal leakage to the third parties<br />

and possible forgery after it was safely received by the applicant.<br />

Because the data and documents delivered to the applicants are in<br />

digital form, they can be easily manipulated with authoring tools<br />

at applicant’s devices and copied on storage devices for transfer to<br />

third parties.<br />

In this paper, a novel approach for building an information<br />

sharing system is suggested, based on PKI infrastructure, access<br />

control technology, and forgery prevention technology. This<br />

approach was implemented in ‘Government Information Sharing<br />

Center’ in Korea. We provided this novel technology to the GIS<br />

(Government Information Sharing) center to make secure delivery<br />

and secure use of the documents.<br />

2. GOVERNMENT INFORMATION<br />

SHARING (GIS) CENTER<br />

Government Information Sharing (GIS) center in Korea was<br />

designed to increase productivity and efficiency of public service<br />

by decreasing time spent in manual delivery of documents and<br />

also by decreasing errors caused by manual input and delivery. In<br />

designing GIS center, employed were three components: PKI for<br />

authentication and authorization, E-DRM (Enterprise DRM) for<br />

preventing illegal access and information leakage, and 2D<br />

Barcode for preventing illegal modification of the data.<br />

2.1 e-Container<br />

When a user of GIS system sends request to the center using web<br />

application form with PKI certificates through web, an e-container<br />

is automatically generated. The request specifies the document,<br />

purpose, department and person, requested operations (‘read’,<br />

‘print’), and expire_ date. Currently, two operations are possible:<br />

‘read ’, and ‘print’ documents at applicant terminal. When the econtainer<br />

arrives at GIS center from applicant, validity of the<br />

request is checked with retrieval of employee (requester)<br />

information from database. Based on position, department, and<br />

job assignment, GIS system creates a ‘E-DRM right’ package<br />

which is included in the e-container. Then, the e-container is<br />

delivered to document source in which requested document<br />

resides.


Figure 1. Document Flow and E-DRM Package.<br />

After the server system at document source finishes review of the<br />

request package, requested document shall be sent to the applicant<br />

through GIS center delivery module, arriving at the terminal of<br />

applicants. E-DRM agent program resides at applicant’s terminal<br />

to control activities of applicant, according to the access right<br />

information. For example, the applicant does not have access<br />

right ‘to print document’, but tries to print document using<br />

network printer or virtual printer. In that case, printing should be<br />

blocked and in extreme case, the document should be erased from<br />

the applicant’s terminal or device.<br />

After establishing access right of the applicant, DRM server in<br />

GIS system encrypts document and right object (access control<br />

information) using first encryption key, and then delivers it to<br />

DRM distribution management unit. This process is very similar<br />

to the job of Right Object server in traditional DRM systems<br />

which creates a list of access control for a user and then encrypts<br />

before transferring control function to DRM agent at user side. In<br />

this stage, time stamp is used to prevent possible disputes over<br />

authenticity of the request and feedback.<br />

2.2 Enforcement of ‘Access Control’ at User<br />

Side<br />

When a document arrives at government officer’s device, PC or<br />

mobile devices, it should be decrypted at first, and controlled by<br />

E-DRM agent. Because e-container is encrypted with user’s<br />

public key and delivered to the applicant, the package can be<br />

decrypted only by right person who has a private key. When an<br />

applicant successfully decrypts the package and open the package,<br />

he/she can use it according to the predefined access right. First of<br />

all, if the user who receives the document package is not eligible<br />

for e-container, he/she cannot open the package in normal way<br />

and thus cannot read them. Even when the user opens the<br />

document in normal way but does not have the right of ‘save on<br />

the user devices’, he/she cannot save the document on the<br />

computer or other devices. Also, if the user does not have right of<br />

‘edit’, he/she cannot edit the document. Control of ‘print’ function<br />

can be enforced in the same way of the other functions, ‘save’,<br />

‘read’, and ‘edit’. Screen capture function at user PC can be<br />

.<br />

453<br />

deactivated when the user does not have right of ‘screen capture’.<br />

As there are available so many capture programs in internet sites,<br />

users can create a new file by capturing each page of the<br />

decrypted documents and by editing them into a file. However,<br />

the screen capture function is completely blocked by the E-DRM<br />

agent and thus no other ways are possible to go around it.<br />

2.3 Forgery Prevention Technology<br />

Forgery prevention technology has been employed in certificate<br />

printing in Korea for the past 10 years. Many government-issued<br />

certificates can be printed at home or office using normal printers.<br />

In order to prevent illegal modification of the certificate, used is<br />

2-D barcode which contains data in the certificates with format<br />

information and content data. 2-D barcode of the certificates is<br />

generated by converting paper certificates in the following way.<br />

In the first step, contents of the certificates with form information<br />

should be collected for conversion. Second, hash value is<br />

generated from the content data. Then, content data and hash<br />

value are encrypted and converted into 2-D high density barcode.<br />

Error-correction code (ECC) is included in the conversion<br />

process. This 2-D barcode can compress 442 bytes into the area of<br />

1 cm 2 . One of the advantages of this 2-D barcode is that any file<br />

format can be used in this scheme, including XML, HTML, Tiff<br />

Image, and others.<br />

3. CONCLUSION AND FUTURE<br />

RESEARCH<br />

In this paper, an access control and forgery prevention mechanism<br />

which is employed in Government Information Sharing (GIS)<br />

system is described. This description might be usefully employed<br />

in building paperless government systems in other countries.<br />

References<br />

[1] Arnab, A., and Hutchison A., Requirement Analysis of<br />

Enterprise DRM Systems, Proceedings Information Security<br />

South Africa, (Sandton, Johannesburg, 2005), available at<br />

http://pubs.cs.uct.ac.za/archive/00000205/.<br />

[2] Bajaj, A., Ram, S. IAIS: A Methodology to Enable Inter-<br />

Agency Information Sharing in eGovernment, Journal of<br />

Database Management, 14, 4, 2003, pp.59-80<br />

[3] Casey, T., Harbitter, A., Leary, M., and Martin, I. , Secure<br />

Information Sharing for the US Government, White Papers,<br />

Nortel Technical Journal (2008).<br />

[4] Chongthammakun, R., and Jackson, S.J. Boundary Objects,<br />

Agents, and Organizations: Lessons from E-Document<br />

Systems Development in Thailand, Proceedings of 2012<br />

45 th Hawaii International Conference on Systems Sciences,<br />

(Hawaii, 2012).


A structure oriented evaluation model for readiness of egovernance<br />

Uranchimeg Tudevdagva<br />

Mongolian University of Science and Technology<br />

Ulaanbaatar-46<br />

976-11-323579<br />

uranchimeg@must.edu.mn<br />

ABSTRACT<br />

This paper deals with a measure theoretical method for evaluation<br />

of logically describable target structures.<br />

The presented evaluation approach includes the following steps:<br />

key targets definition , sub targets description, general target<br />

structure formulation, selection of fitting assessment instrument,<br />

development of an adapted questionnaire or check list, data<br />

collection, data processing in sense of our general<br />

evaluation model and report of results.<br />

The advantage of presented model is that it is very versatile for<br />

applications where the target can be described by a logical target<br />

structure. By the measure theoretical background the evaluation is<br />

very objective. The scoring method in the whole becomes open,<br />

comprehensible and traceable.<br />

Categories and Subject Descriptors<br />

K.3.2 [COMPUTERS AND EDUCATION]: Computer and<br />

Information Science Education – Self-assessment.<br />

General Terms<br />

Management, Measurement, Performance, Standardization,<br />

Verification.<br />

Keywords<br />

Evaluation, evaluation model, evaluation theory, e-governance, egovernance<br />

assessment, logical target structure, scoring method,<br />

assessment method.<br />

1. INTRODUCTION<br />

E-governance is a complex topic which covers very different<br />

fields with own characteristics and special aims. If we want to<br />

score or to evaluate how a special sector of e-governance is<br />

achieving the given aims, corresponding or adapted evaluation<br />

approaches are required.<br />

Each consistent formulated aim possesses a logical inner<br />

structure. Hence, basic property of any evaluation approach<br />

should be that the method is compatible to logical structure of<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

454<br />

Uyanga Sambuu<br />

National University of Mongolia<br />

Ulaanbaatar-46<br />

976-11-320159<br />

uyanga@magicnet.mn<br />

aims which we want to achieve. In this sense each evaluation<br />

begins with an analysis of the logical structure of key aims under<br />

consideration. If the logical structure of key aims is clear we can<br />

try to score how the aim has been achieved by measurement<br />

methods as they are applied in natural sciences, technique and<br />

other fields, too. Theoretical background or basis of<br />

corresponding methods of measurement is the general measure<br />

theory (see e.g. [1]).<br />

This paper presents a measure theoretical evaluation model which<br />

is oriented at the logical structure of key aims for scoring<br />

readiness of e-governance.<br />

The frequently applied additive models do not include an<br />

adequate reference to the logical structure of target. Readiness<br />

assessments provide important information to policy and decision<br />

makers for strategic planning of e-governance and its<br />

implementation [5].<br />

2. LOGICAL STRUCTURE AND<br />

EVALUTAION MODEL<br />

To evaluate how a special aim has been achieved we have to<br />

analyse the logical structure of considered target. We have to<br />

think about, what are the key targets, what are sub targets, what<br />

we want to evaluate or to check, how the key and sub targets are<br />

logically connected with each other.<br />

For instance, we want to score how successful the targets in sense<br />

of the online service index have been reached. This index is one<br />

of the three basic indices which is included into the calculation of<br />

the E-Government-Readiness-Index. Then we have first to find<br />

out the key targets. For this we assume, we have six key targets.<br />

We denote these targets by B1, B2, B3, B4, B5 and B6 and we<br />

suppose that our main target C is reached if all of our six key<br />

targets are reached.<br />

B1 B2 B3 B4 B5 B6<br />

Figure 1. Logical structure of key targets<br />

The target C is not reached if at least one of key targets is not<br />

reached. Then the main target C can be described as the logical<br />

intersection of key targets B1, B2, B3, B4, B5, B6 and we have<br />

!<br />

𝐶 = 𝐵 ! ∩ 𝐵 ! ∩ 𝐵 ! ∩ 𝐵 ! ∩ 𝐵 ! ∩ 𝐵 ! = !!! 𝐵 ! .<br />

This is visualized by Figure 1 via a series circuit.


We further assume that each key target can consist of sub targets<br />

or sub ordered targets where the key target is reached if at least<br />

one of the assigned sub targets is reached. This can be described<br />

by a logical union over the corresponding sub targets. For<br />

instance, if we assume, that our key target B1 is generated by five<br />

sub targets A11, ..., A15 then we have<br />

!<br />

𝐵 ! = 𝐴 !! ∪ 𝐴 !" ∪ 𝐴 !" ∪ 𝐴 !" ∪ 𝐴 !" = !!! 𝐴 !! . (1)<br />

The key targets B2,…, B6 can consist of further sub target, too.<br />

Figure 2 presents an example for a corresponding logical<br />

structure.<br />

A11<br />

A12<br />

A13<br />

A14<br />

A15<br />

A21<br />

A22<br />

A23<br />

Figure 2. Logical structure of main target<br />

In [3] a measure theoretical evaluation model is considered for<br />

evaluation of e-learning programs. Key idea of this model is that<br />

the target to be reached can be described via an adapted logical<br />

structure into which the key and sub targets under consideration<br />

are embedded. This approach is applied here to evaluation of<br />

readiness of e-governance.<br />

!<br />

Then a target structure 𝐶 = !!! 𝐵 !<br />

, defined by disjoint key<br />

! !<br />

targets 𝐵 ! ∈ 𝐴, i=1,…,r with 𝐵 ! = !!! 𝐴 !" , 1≤ 𝑠 ! ≤ 𝑠,<br />

!<br />

!!! 𝑠 ! ≤ 𝑠, where 𝐴 !" are corresponding sub targets of 𝐵 ! with<br />

𝑄 !" 𝐴 !" = 𝑞 !", can be scored by<br />

See Formula (7) in [4].<br />

A31<br />

A32<br />

B1 B2 B3 B4 B5 B6<br />

!<br />

! ! !<br />

𝑄 𝐶 = 𝑄 !!! 𝐵 ! = 𝑄 !!! !!! 𝐴 !"<br />

!<br />

!!<br />

= 1 − 1 − 𝑞 !"<br />

!!!<br />

!!!<br />

. (2)<br />

According to this formula the score of a target structure C can be<br />

reduced to the scores qij of included sub targets Aij. Unfortunately,<br />

these scores are not given a-priori and we need corresponding<br />

sample based estimation methods for these scores.<br />

There exist several possibilities obtaining corresponding sampling<br />

data. We can get samples by adapted checklists or questionnaires,<br />

by face to face or phone interviews, via online or web based tests.<br />

The result of such a questionnaire is a data vector<br />

𝑥 = 𝑥 !!, … , 𝑥 !!! , … , 𝑥 !!, … , 𝑥 !!! . Here denotes xij the result or<br />

answer to the question w.r.t. the sub target 𝐴 !". We assume that<br />

(!) (!) (!) (!) (!)<br />

𝑥 !" ≤ 𝑥!" ≤ 𝑥 !" holds to any given bounds 𝑥!" and 𝑥!" , 𝑥!" <<br />

(!)<br />

𝑥 !" . Then an estimation for 𝑞!" = 𝑄 𝐴 !" is given by<br />

∗ (!)<br />

𝑞 !" = 𝑥!" − 𝑥 !"<br />

A41<br />

(!) (!)<br />

𝑥 !" − 𝑥!"<br />

A51<br />

A52<br />

A53<br />

A61<br />

A62<br />

A63<br />

A64<br />

. (3)<br />

455<br />

If we have a sample of size n to our data vector 𝑥, then according<br />

relation (2) we get n estimation values 𝑄 ∗ ! 𝐶 , … , 𝑄 ∗ ! 𝐶 for<br />

∗(!)<br />

𝑄 𝐶 . Let 𝑞 !" be the estimation value for 𝑞!" according to (3) for<br />

the k th sample element then it holds<br />

!<br />

𝑄 ∗ ! 𝐶 = !!! 1 − !!! 1 − 𝑞 !"<br />

! !<br />

∗(!)<br />

By the method of moments we get then as estimation value 𝑄 ∗ 𝐶<br />

for 𝑄 𝐶 .<br />

𝑄 ∗ 𝐶 = 1<br />

𝑛<br />

!<br />

!<br />

!!! !!!<br />

! !<br />

∗(!)<br />

1 − 1 − 𝑞 !"<br />

!!!<br />

.<br />

. (4)<br />

If we calculate periodically such scores we obtain time series<br />

which describe the development of readiness of e-governance, for<br />

instance. Or, we can use the score values for a comparative<br />

consideration to recognize differences, developments or trends.<br />

3. CONCLUSIONS<br />

The presented at logical structure of a target oriented evaluation<br />

method is an alternative to today frequently applied linear<br />

evaluation models. The advantage of our method is that in<br />

contrast to additive evaluation approaches no weighting factors<br />

are needed.<br />

The method can be applied to a periodical evaluation of egovernance<br />

development or readiness of e-governance<br />

recognizing corresponding trends, developments or weak sectors.<br />

Based on adapted and open target structures this method could be<br />

a methodical base for the development of an open national or<br />

international assessment or self-assessment framework.<br />

ACKNOWLEDGEMENT<br />

This study has been supported by a Grant of Schlumberger<br />

Foundation.<br />

4. REFERENCES<br />

[1] Bauer, H. (2001). Measure and Integration Theory. Gruyter<br />

– de Gruyter Studies in Mathematics, Berlin.<br />

[2] Peter, H. R., Howard, E. F.(1993): Evaluation a systematic<br />

approach. 5 th ed., SAGE Publications, Thousand Oaks,<br />

California.<br />

[3] Uranchimeg, T., Hardt, W. (2011): A new evaluation model<br />

for eLearning programs. Technical Report CSR-11-03,<br />

Chemnitz University of Technology, Chemnitz, Germany.<br />

[4] Uranchimeg, T., Hardt, W. (2012): A measure theoretical<br />

evaluation model for e-learning programs. In Proceedings of<br />

the IADIS on e-Society 2012, March 10-13, 2012, Berlin, pp.<br />

44-52.<br />

[5] Zamira, D., Mohamed, Sh., Adegboyega, O. & Tomasz, J.<br />

(2010): Methodology for e-Government Readiness<br />

Assessment. Models Instruments and Implementation. April<br />

6-10, 2010, Orlando, Florida.


An Initial Exploration of Hyperlinks of African Government<br />

Portal Websites<br />

Abebe Rorissa<br />

Department of Information Studies, University at Albany, State University of New York<br />

Draper 113, 135 Western Avenue, Albany, NY 12222<br />

arorissa@albany.edu<br />

ABSTRACT<br />

This paper presents preliminary results of an exploratory analysis<br />

of hyperlinks from (outlinks) and to (inlinks) government portal<br />

Websites of African countries. Analyses of the data revealed the<br />

nature of the portal Websites and the countries in terms of their<br />

online presence and visibility.<br />

Categories and Subject Descriptors<br />

K.4.1. Public Policy Issues; K.4.3. Organizational Impacts; K.5.2.<br />

Governmental Issues<br />

General Terms<br />

Management, Measurement, Documentation, Performance,<br />

Design<br />

Keywords<br />

Government Portal Websites; Africa; Hyperlink Analysis<br />

1. INTRODUCTION<br />

African governments have fully embraced the Web over the last<br />

two decades to provide e-government services [2] and by the turn<br />

of the last decade of the new millennium, every African country<br />

had at least one e-government Website albeit at various levels of<br />

e-government service development [4]. During this same period,<br />

more and more African countries also recognized the power of<br />

government portal Websites as one-stop shops to promote and<br />

publicize their activities as well as provide essential information<br />

and government services.<br />

In order to interconnect various resources and provide easy access<br />

to information sources contained within their Web pages,<br />

government portal Websites use hyperlinks. The ability to<br />

interconnect a large number of Web pages, via hyperlinks,<br />

enabled us to organize information and knowledge in distributed<br />

environments. In addition, hyperlinks contain information that is<br />

implicit. For instance, a hyperlink could be “regarded as an<br />

endorsement of the target page” ([7], p. 27) and the more useful<br />

and informative pages are often those that attract more hyperlinks<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

456<br />

pointing to them. The fact that the number of Web pages that link<br />

to a particular page is an indication of its importance has been<br />

long established. For instance, Google’s<br />

PageRank algorithm [1], which works based on the premise that<br />

hyperlinks to a web page or inlinks are “trust votes”, takes this<br />

fact into account and ranks Websites accordingly.<br />

As part of an exploratory study, the current work is the first to<br />

look into hyperlinks of African government portal Websites and<br />

attempts to answer the questions: What is the nature of the<br />

hyperlinks of African government portal Websites? Does the<br />

nature of the hyperlinks vary by region and population size?<br />

2. RESEARCH DESIGN AND METHODS<br />

A single official government portal Website for each country was<br />

identified through an extensive Web search during a one month<br />

period in March and April 2012. A search over the same four<br />

week period produced no legitimate Websites that could be<br />

considered government portals for Guinea, Guinea-Bissau,<br />

Somalia, and Tunisia. Of the 50 remaining African countries,<br />

33(66%) had portals while 9(18%) Websites of presidencies,<br />

5(10%) Websites of Ministries of Foreign Affairs, 1(2%) Website<br />

of a Ministry of Information, 1(2%) Website of a Prime Minister,<br />

1(2%) Website of a National Transitional Council were identified<br />

and considered for analysis. The numbers of outlinks and inlinks<br />

were determined using a combination of online tools such as Web<br />

crawlers (e.g., SocSciBot4 [6]) and methods. Care was taken in<br />

order to avoid counting internal links on the portal Website,<br />

sometimes included on a Web page for navigational purposes [5].<br />

3. RESULTS AND DISCUSSION<br />

The 50 African countries were divided into five groups matching<br />

the UN’s five regions of Africa. Northern Africa and Southern<br />

Africa, respectively, were regions with the least (Total=189,<br />

Median=25) and most (Total=1484, Median=67) number of Web<br />

pages on government portal Websites. It should be noted that<br />

because Tunisia’s portal was not available during data collection,<br />

its counts could not be added to the total for Northern Africa. A<br />

contributing factor for Southern Africa’s large number and<br />

median count of the number of Web pages could have also been<br />

Botswana’s contribution, with a portal Website that had by far the<br />

highest on the continent and 79.45% of the total number of Web<br />

pages on government portal Websites for Southern African<br />

countries. The median number of Web pages on a government<br />

portal Website for the continent was 38. Each region had median<br />

number of Web pages closer to the median number of Web pages<br />

on portal Websites for the entire continent (except, perhaps,<br />

Southern Africa due to, once again, Botswana’s count). The


egion that is more representative of the continent with respect to<br />

median number of Web pages is Eastern Africa.<br />

Once again, Eastern Africa, together with Northern Africa<br />

(Median=38) was more representative of the continent<br />

(Median=31) in terms of the median number of inlinks to<br />

government portal Websites whereas central African government<br />

portal Websites attracted the least number of inlinks (Median=10).<br />

Government portal Websites for Southern African countries<br />

attracted the most inlinks (Median=78), although Western African<br />

government portal Websites (with more countries, 14 versus 5)<br />

attracted the most number of inlinks (Total=12,811).<br />

The number of outlink counts, although understandably far greater<br />

than inlink counts, follow a similar pattern. The number of<br />

outlinks that point to domains and those that point to full URLs<br />

for the whole continent are close in terms of both total counts<br />

(216,525 for Domains versus 207,231 for URLs) and median<br />

values (852 for Domains versus 528 for URLs). The combined<br />

numbers of outlinks (Domain + URL) for two of the five regions,<br />

Southern and Western Africa (with 19 countries), are about three<br />

times as large as those for the other three regions and their median<br />

counts are larger as well. Southern Africa’s figures for outlinks<br />

are parallel to the total number of Web pages. It could be<br />

explained by the fact that the large number of pages is perhaps an<br />

indication of the varieties of information sources provided by the<br />

government portal Websites because they have to point to a lot<br />

more number of resources. The figures for Web impact factor<br />

show that regions with smaller number of Web Pages and outlinks<br />

on their government portal Websites have relatively less online<br />

impact, although the median Web impact factor values do not<br />

vary a whole lot among the regions (ranging from 0.39 to 2.08).<br />

In addition to the number of Web pages as well as the number of<br />

outlinks and inlinks for African government portal Websites as a<br />

continent, in order to see the effect of population size, further<br />

analyses were conducted. Five groups of the 50 countries were<br />

formed (with 10 countries in each group) due to the huge range of<br />

the population size (Min=89,188; Max=155,215,573). Forming<br />

groups of the countries based on range of population size with<br />

equal width (i.e., total range divided by the number of groups)<br />

would have created a group of one or two countries in some<br />

cases.The numbers of Web pages on government portal Websites<br />

for the five regions were, on average, not that different than each<br />

other. In fact, the least populous countries had, on average<br />

(Median=37), only seven fewer web pages on their government<br />

portal Websites than the most populous nations (Median=44). In<br />

actual fact, the government portal Websites for the least populous<br />

countries attracted a lot more hyperlinks or inlinks (Median=56)<br />

than the government portal Websites of the most populous nations<br />

attracted (Median=38). A bit of an anomaly in the figures for the<br />

median number of inlinks is the one for the second least populous<br />

countries with 13. The least populous countries, however, had<br />

government portal Websites with much more outlinks (Domain +<br />

URL), on average, than the most populous ones (Median=2,722<br />

versus Median=903). While the impressive figures for the least<br />

populous countries were due to the large number of outlinks from<br />

government portal Websites for Swaziland, the weak number of<br />

457<br />

total outlinks for Kenya (whose portal was not often accessible to<br />

the crawlers and tools used for the study), Tanzania, and DR<br />

Congo reduced that average for the most populous countries.<br />

When it comes to the Web impact factor, population doesn’t seem<br />

to be a huge factor with both the least and most populous<br />

countries having similar values.<br />

4. CONCLUDING REMARKS<br />

One sign that, in the last decade, there was a tremendous<br />

information and communication technology expansion in Africa is<br />

the rate of increase in the number of Internet users. Whereas the<br />

population of the continent's 50 countries considered for analysis<br />

in the current study in 2010 was a little under a billion, in a year,<br />

it grew to over a billion, an increase of a mere 1.5% [3]. During<br />

the same time period of one year, the number of Internet users for<br />

the same 50 countries grew by an impressive percentage of<br />

3080% [3]. With this increase in capacity and infrastructure<br />

comes increased e-participation and demand for e-services by the<br />

citizens in all aspects of their lives, including in their dealings<br />

with government. This is precisely one of the reasons why a study<br />

of African government portal Websites and the nature of their<br />

hyperlinks is necessary to measure their effectiveness as means of<br />

communication as well as information and service delivery tools<br />

that could boost a country's online visibility and effectiveness in<br />

online e-government service delivery. The current work is one of<br />

very few such studies. Although hyperlinks provide some<br />

information as to a Website's impact, value, and utility, contents<br />

of such Websites need to be investigated to give a fuller picture of<br />

the progress the continent made in terms of e-government<br />

development and service delivery.<br />

5. REFERENCES<br />

[1] Brin, S., & Page, L. (1998). The anatomy of a large-scale<br />

hypertextual Web search engine. Computer Networks and<br />

ISDN Systems, 30, 107–117.<br />

[2] Heeks, R. (2002). E-Government in Africa: Promise and<br />

practice. Information Polity: The International Journal of<br />

Government & Democracy in the Information Age, 7(2/3),<br />

97-114.<br />

[3] Miniwatts Marketing Group. (2012). Internet World stats:<br />

Usage and population statistics. Retrieved from<br />

http://www.internetworldstats.com/stats1.htm.<br />

[4] Rorissa, a., & Demissie, D. (2010). An analysis of African e-<br />

Government service websites. Government Information<br />

Quarterly, 27(2), 161–169.<br />

[5] Tang, R. & Thelwall, M. (2008). A hyperlink analysis of US<br />

public and academic libraries' Web sites. Library Quarterly,<br />

78(4).<br />

[6] Thelwall, M. (2001). A web crawler design for data mining,<br />

Journal of Information Science, 27(5), 319-325.<br />

[7] Thelwall, M. (2009). Introduction to Webometrics:<br />

Quantitative Web research for the social sciences. San<br />

Rafael, CA: Morgan & Claypool.


C-DAC Pan India Strategy in High Performance Computing<br />

For Human Advancement<br />

Kapil Mathur, Sandeep Agrawal, Sucheta Pawar, Abhishek Das, Goldi Misra<br />

High Performance Computing (HPC) Solutions Group<br />

Centre for Development of Advanced Computing<br />

Agriculture College Campus, Near District Industries Centre, Shivajinagar, Pune 411005, India<br />

+91-20-25520112<br />

{kmathur, sandeepa, suchetap, abhishekd, goldi}@cdac.in<br />

ABSTRACT<br />

In this paper, we explore the role of High Performance Computing<br />

(HPC) in India’s critical sectors viz. Agriculture, Industries,<br />

Education, Energy and Power, Defence, Water, Healthcare,<br />

Banking and Finance services, Science and Technology etc. Paper<br />

introduces strategies, efforts and initiative interjected by Centre<br />

for Development of Advanced Computing (C-DAC) in<br />

strengthening proliferation of HPC in leading Government<br />

organizations, premier R&D laboratories, missions, programmes<br />

and Educational institutes across the nation. In addition, a brief<br />

insight is been provided regarding the HPC trends across the<br />

globe viz. USA, China, Japan, Europe etc. Furthermore, paper<br />

describes the HPC policies and initiatives undertaken by<br />

Government of India (GOI) for propagating HPC across scientific<br />

and research community and introduce nation’s presence on the<br />

global supercomputing landscape.<br />

Keywords<br />

C-DAC, HPC, R&D<br />

1. GLOBAL TRENDS<br />

Thirty countries have supercomputers listed in the TOP500 as on<br />

June 2012, USA (252), China (68), Japan (35), UK (25), France<br />

(22) and Germany (20) constitute 422 of the top 500<br />

supercomputers and have gone past the Petascale barrier alongwith<br />

Italy. Such huge computational assistance has strengthened<br />

the application areas from exploring of universe to molecular<br />

interaction and dynamics at very nanoscale.<br />

Energy efficiency and floor space are increasingly becoming<br />

important factors in the realization of huge systems, giving rise to<br />

hybrid systems such as CPU and GPGPU. While research on<br />

exascale computing is at a nascent stage, huge investments and<br />

initiatives in this direction are being considered by countries.<br />

New/improvised hardware and software technologies/algorithms<br />

are being explored by countries to address the future challenge.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

458<br />

Developments will require wide international collaborations along<br />

with initiatives such as International Exascale Software Project<br />

(IESP) and the European Exascale Software Initiative (EESI) have<br />

been taken. Similarly, “Interdisciplinary Programme on<br />

Application Software towards Exascale Computing for Global<br />

Scale Issues” with 10 M€ funding is a G8 Research Councils<br />

Initiative on multilateral research.<br />

2. SUPERCOMPUTING IN INDIA<br />

Indian Government’s initiative in supercomputing regime started<br />

in late 1980s with C-DAC developing India’s first supercomputer<br />

“PARAM 8000” in 1990, subsequently GOI is funding a range of<br />

small to midrange HPC centres across nation. In past 25 years C-<br />

DAC has delivered PARAM series of supercomputers and has<br />

taken many initiatives in widening the HPC accessibility and<br />

knowledge. For ensuring the broad accessibility of HPC resources<br />

across nation C-DAC has deployed the nation-wide Grid<br />

Computing infrastructure named as Grid “GARUDA (Global<br />

Access to Resources Using Distributed Architecture)”, it connects<br />

17 cities with the aim of promoting collaboration among<br />

Research, Industry, Academia, and Government through<br />

“National Knowledge Network” (NKN). C-DAC is widening the<br />

HPC knowledge through workshops, symposium, and training<br />

programmes for scientific R&D labs and Academic institutes.<br />

Making a gradual progress, in Nov 2007 India made a remarkable<br />

entry with Tata CRL's “Eka” rank #4 in top500 used for CFD,<br />

Atmospheric sciences, subsequently C-DAC's “Param Yuva”<br />

ranked #68 in Nov 2008, the latest June 2012 top500 list has 5<br />

HPC systems from India, CSIR C-MMACS, Bangalore; VSSC<br />

ISRO, Thiruvananthapuram are two systems in top 100 list with<br />

rank #58 and #86 respectively. GOI is investing around 1 billion<br />

dollar for establishing supercomputing infrastructure to address<br />

the critical sectors.<br />

2.1 HPC initiatives and strategies<br />

Planning Commission of India through its Five Year Plan<br />

implements various policies in different sectors of economic and<br />

scientific interest. GOI is developing the next generation<br />

supercomputer facility under its 12th five-year plan period.<br />

Planning Commission of India has set up a “National Council on<br />

Supercomputing” which has proposed the cloud-based<br />

supercomputing model with governing committee formulating<br />

strategies.


2.2 C-DAC<br />

C-DAC’s PARAM series of Supercomputers has shown its<br />

competency not only in developing capability in HPC but also<br />

delivering state-of-the-art technology systems in a time bound<br />

manner. For executing the supercomputing plan C-DAC has<br />

established two national supercomputing centres in India: 1)<br />

National PARAM Supercomputing Facility (NPSF) at Pune; 2) C-<br />

DAC’s Terascale Supercomputing Facility (CTSF) at Bangalore.<br />

These facilities provide access to Advance Computing<br />

infrastructure to various R&D organizations, industries and<br />

institutes. C-DAC has developed wide range of indigenous<br />

Hardware and Software HPC solutions viz Hardware accelerator<br />

like Reconfigurable Computing (RC) system, high performance<br />

network interconnection switch PARAMNet-3, GARUDA grid,<br />

Algorithm and solution development in different application<br />

areas, system software and tools development, end-to-end<br />

clientele HPC solutions.<br />

2.2.1 C-DAC in Academia<br />

C-DAC has taken national level initiatives in setting up state-ofart<br />

HPC facility and conducting Workshops, Training programs<br />

and Symposiums for Academic Institutes. C-DAC has started a<br />

certification course “C-DAC Certified HPC Professional<br />

(CCHPCP)” with the primary objective of standardizing HPC<br />

scale to map the HPC skill sets to both current and aspiring<br />

professionals in this domain, such initiative would help in creating<br />

huge pool of skilled HPC work force.<br />

2.2.2 C-DAC National/International level R&D<br />

Collaboration<br />

C-DAC addresses many important areas of national interest<br />

through R&D collaborations. Collaboration with NCMRWF<br />

helped the operational weather forecast cycle on PARAM system,<br />

development of Seismic data processing solutions for ONGC on<br />

PARAM system, providing turnkey consultancy to Bhabha<br />

Atomic Research Centre’s (BARC) fracture analysis code used in<br />

reactor safety analysis. C-DAC is collaborating in mission based<br />

projects with research organization like IITM under National<br />

Monsoon Mission (NMM) through concerted efforts by various<br />

research and academic institutes (both public and private) in India<br />

and abroad, aims to develop/improve the current generation of<br />

dynamical models to improve prediction of Indian monsoon<br />

rainfall. C-DAC provides consultancy for the establishment of<br />

National Agricultural Bioinformatics Grid (NABG) with a view of<br />

increasing the Agricultural yield.<br />

C-DAC’s international collaborations cover technical affiliations,<br />

joint research projects, scientists exchange programs & research<br />

initiatives. C-DAC has setup 50+ PARAM based systems till date<br />

in India and abroad, like in Russia, Singapore, Germany and<br />

Canada. Collaboration with ICAD; Moscow under Indo-Russian<br />

Long Term Program (ILTP) covering use of PARAM<br />

supercomputers, the joint research R&D venture was in the area<br />

of CFD and Climate Modelling. The Russian–Indian centre for<br />

Advanced Computing Research (RICCR) and C-DAC pursue<br />

joint research in the areas of Weather Forecasting, SDP, CFD and<br />

Parallel compiler. C-DAC on behest of MEA, GOI has setup HPC<br />

centres at Vietnam, Tanzania, Armenia and Ghana.<br />

459<br />

3. INDIA’S HPC ROADMAP<br />

GOI encouragement in developing the next generation<br />

supercomputer facility during 12th five-year plan period; this will<br />

conform to the advanced computing needs of various Government<br />

organizations, premier R&D labs and educational institutes. The<br />

cloud-based supercomputing network will be categorized into<br />

three different layers. The first layer will have 6-8 centers in<br />

petaflop range. The second layer will have 20 different centers in<br />

200-500 teraflops range. The third layer will have 50-75 centers in<br />

the 1-10 teraflop range. Indian Government is trying to build<br />

Supercomputing R&D platform by the coordinated efforts of HPC<br />

research scientists and the application domain expertise, as it<br />

would assist in development of comprehensive scalable<br />

application software utilizing the HPC systems very efficiently,<br />

many of the projects are been initialized with public and private<br />

collaborations.<br />

C-DAC in collaboration is establishing a HPC Academia<br />

Innovation Centre to enable the open sciences research<br />

community to take advantage of emerging technologies in HPC.<br />

HPC Academic Innovation Centre is first-of-its-kind initiative for<br />

accelerating adoption of HPC as tool in R&D at academic level.<br />

4. CONCLUSION<br />

For India to be second to none in the scientific and engineering<br />

R&D, it must be able to address all the driving forces through<br />

national initiatives and international collaboration. The initiative<br />

taken up by GOI will provide a quantum leap in establishing a<br />

firm HPC infrastructure across the nation. These initiatives for<br />

enhancing the capacity and capability building in HPC will<br />

require a conglomerated effort by both private and public sector<br />

alliances to address critical sectors. In addition to this, R&D<br />

through various international collaborations needs to be realized<br />

to remain abreast with the growing technological trends.<br />

C-DAC is focused on design and deployment of HPC solutions<br />

for premier R&D organizations along with enablement of<br />

advanced computational skills among scientists. Besides, to cater<br />

to the dire need of skilled HPC manpower C-DAC has been<br />

instrumental in proliferation of HPC in educational institutes<br />

through deployment of HPC facilities, conducting training<br />

programs, providing tailored made solutions and conducting HPC<br />

certification course. Today HPC has become an integral part in<br />

the development of products across many industry verticals, such<br />

proliferation will help in bridging the gap between students and<br />

industry professionals.<br />

5. REFERENCES<br />

[1] http://cdac.in/index.aspx?id=about<br />

[2] http://india.gov.in/sector.php<br />

[3] http://www.mea.gov.in/<br />

[4] http://planningcommission.nic.in/<br />

[5] http://top500.org


Crowdsourcing as Data Sharing: A Regional Web-based<br />

Real Estate Development Database<br />

Robert Goodspeed<br />

MIT Department of Urban Studies and<br />

Planning<br />

77 Massachusetts Avenue<br />

Room 9-415<br />

Cambridge, MA 02139<br />

+1 202-321-2743<br />

rgoodspe@mit.edu<br />

ABSTRACT<br />

The paper describes a web-based database of residential and<br />

commercial real estate development projects, created by a<br />

regional urban planning agency in Metropolitan Boston. In Phase<br />

I, now complete, the tool is used to facilitate inter-agency<br />

information sharing, demonstrating the ability of web-base data<br />

collection tools to increase information sharing between<br />

government agencies by reducing transaction costs. Phase II, now<br />

under development, will expand the functionality of the website to<br />

allow the general public to contribute information to the database,<br />

as well as view and download its contents. The project is unusual<br />

in its integration of a crowdsourcing paradigm with traditional<br />

methods of spatial information sharing. The project demonstrates<br />

the potential for technology to facilitate data sharing in favorable<br />

contexts where interorganizational relationships and sharing<br />

norms exist.<br />

Categories and Subject Descriptors<br />

H.4.2 [Information Systems Applications] – Types of Systems –<br />

database, spatial information. J.1 [Administrative Data<br />

Processing]: Government – urban planning.<br />

General Terms<br />

Management, Design, Theory.<br />

Keywords<br />

Crowdsourcing, spatial data sharing, urban development, Web<br />

2.0.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that<br />

copies bear this notice and the full citation on the first page. Copyrights<br />

for components of this work owned by others than ACM must be<br />

honored. Abstracting with credit is permitted. To copy otherwise, to<br />

republish, to post on servers or to redistribute to lists, requires prior<br />

specific permission and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Christian Spanring<br />

Metropolitan Area Planning Council<br />

60 Temple Place<br />

Boston, MA 02111<br />

+1 617-451-2770<br />

cspanring@mapc.org<br />

460<br />

1. INTRODUCTION<br />

Timothy Reardon<br />

Metropolitan Area Planning Council<br />

60 Temple Place<br />

Boston, MA 02111<br />

+1 617-451-2770<br />

treardon@mapc.org<br />

1.1 The problem<br />

Urban planners and policymakers in Metropolitan Boston often<br />

want to answer simple questions about the urban region, such as:<br />

how is the region growing? Where are new housing and office<br />

buildings being built? Is this growth harming sensitive<br />

environmental resources, like forest and wetlands? Is affordable<br />

housing being constructed near jobs and public services?<br />

Until recently, accurate data did not readily exist to answer any of<br />

these questions. Only large projects are permitted by the state, and<br />

the metropolitan region’s 101 independent municipalities makes<br />

tracking small projects difficult. Most importantly, it is difficult to<br />

discover the development “pipeline” – project proposals known to<br />

local authorities but not yet under construction. If available, this<br />

information could be used to for a wide variety of policy and<br />

planning purposes, including anticipating transportation<br />

bottlenecks and evaluating existing regulations.<br />

Sharing spatial information about cities is increasingly important<br />

given the accelerated pace of urban change, the need for<br />

monitoring to enable smart cities, and the public’s demands for<br />

greater transparency and open data. Set in a fragmented<br />

metropolitan area, this paper describes a data-sharing project<br />

designed to combine crowdsourcing methods with traditional data<br />

sharing approaches to improve sharing of real estate development<br />

project information among government agencies and the general<br />

public. The resulting database and web-based interface will be<br />

referred to as the “development database,” and a prototype is<br />

available online at http://dd.mapc.org.<br />

Metropolitan Boston includes 101 incorporated cities and towns,<br />

which range widely in population and government size and<br />

capacity. Municipal record-keeping practices vary widely, and<br />

include paper records, spreadsheets, and some digital permitting<br />

systems. Where digital data exists, municipalities have developed<br />

varied database schema that correspond with local land use<br />

regulations making data integration difficult. Other data sources,<br />

such as U.S. Census datasets or the database of large-scale<br />

projects subject to the Massachusetts Environmental Policy Act<br />

are incomplete, infrequently updated, and lack information about<br />

proposed projects still in early planning phases.


The Metropolitan Area Planning Council (MAPC) is an<br />

independent government agency charged with fostering regional<br />

planning and collaboration for 101 municipalities in Metropolitan<br />

Boston, a mission which includes developing and sharing<br />

information. However, the agency’s limited budget prohibits<br />

ongoing large-scale manual data collection. There are also many<br />

public agencies, advocacy organizations, researchers, and other<br />

stakeholders who would benefit from more accessible and<br />

accurate information about planned and proposed development<br />

projects in the region. MAPC developed this tool not only for<br />

specific organizational purposes, but to also create a new public<br />

resource fitting its broad mission of fostering collaboration and<br />

discussion.<br />

2. THEORY AND PREVIOUS WORK<br />

2.1 Theory<br />

The development database was initially developed to facilitate<br />

inter-agency spatial information sharing. Phase I demonstrated the<br />

usefulness of tools that reduce the transaction costs of information<br />

sharing, but also the ongoing barriers to information sharing<br />

explained by inter-organizational relations theory. In addition, it<br />

demonstrates how technology can substantially improve sharing<br />

for certain contexts. The second phase plans to combine interagency<br />

information sharing processes with crowdsourcing. For the<br />

purposes of this project, we define crowdsourcing as a method to<br />

collect data from a large number of people using nonmonetary<br />

incentives.<br />

In practice, many government agencies are hesitant to share<br />

information, even when it falls within their legal mandate or<br />

would advance the ideal of government transparency. One<br />

explanation for this behavior is inter-organizational relations<br />

theory, which argues organizations avoid data sharing since it<br />

results in a loss of autonomy and increased interdependence [1].<br />

Overcoming these barriers requires the negotiation of<br />

arrangements with mutual benefits, often requiring a lengthy<br />

process of problem-setting, cooperation, and coordination. A<br />

recent survey of inter-agency spatial information sharing found<br />

relationships started with staff interactions, but was often<br />

facilitated by formalized mechanisms such as contracts,<br />

regulations, and policies [2]. At a technical level, data sharing is<br />

further limited if the information resides in multiple information<br />

systems, or even paper records, and does not share a similar<br />

underlying structure. For information with modest sharing<br />

benefits, crafting data sharing agreements is cost-prohibitive for<br />

participants. In this case, absent a mandate, municipalities lack the<br />

resources and motivation to compile and report development data<br />

regularly.<br />

This project is also related to the e-government literature on<br />

intergovernmental information integration, an emerging area of egovernment<br />

research [3, 4]. Studies in this area use<br />

multidisciplinary methods to document the technology,<br />

organizational factors, interorganizaitonal context, and policy and<br />

social environment required for successful information<br />

integration. This project differs from much of the research in this<br />

area since it focuses on local government. The success of the<br />

project suggests local government is particularly ripe for technical<br />

innovation, since interagency norms of information sharing are<br />

present but technical infrastructures are lacking. In fact, the<br />

development database is an example of a locally-generated<br />

461<br />

infrastructure for information interoperability called for by<br />

Lansbergen and Wolken [5].<br />

Crowdsourcing is dividing a large task into small pieces that can<br />

be completed by a “crowd” of participants. A study of successful<br />

crowdsourcing projects argues participants can be motivated by<br />

either money, “love,” or “glory” [6]. Crowdsourcing has been and<br />

is used to collect spatial information for crisis response projects<br />

and to develop the Wikipedia of maps, OpenStreetMap.<br />

Goodchild has proposed the term “volunteered geographic<br />

information” to cover the expanding datasets compiled by<br />

volunteers [7]. Linders has proposed this form of “citizen<br />

reporting” fits into a broader spectrum of ICT-enabled<br />

coproduction of public goods, where governments facilitate data<br />

collection [8]. The development team is considering how to<br />

operationalize nonmonetary incentives for the members of the<br />

“crowd” through game mechanics, such as providing public<br />

recognition for users who contribute information.<br />

2.2 Data Crowdsourcing Examples<br />

This section describes two examples of similar projects that use<br />

crowdsourcing principles to collect spatial information about the<br />

urban environment.<br />

OpenStreetMap (http://openstreetmap.org) is often referred to as<br />

the Wikipedia of maps and geographic data. Anybody can login,<br />

create and edit this freely available world map. The project started<br />

in 2004, mainly as response to restrictive European public data<br />

policies and was the first high-profile project in the realm of<br />

volunteered geographic information. OpenStreetMap’s core is a<br />

simplified geographic data model, specifying “nodes” (points),<br />

“ways” (lines between points) and “relations” (relations between<br />

map objects), which are used to describe and map virtually many<br />

real world objects, such as streets, buildings, and other features.<br />

Since its beginning, the OpenStreetMap community has grown to<br />

about 700,000 users worldwide and provides detailed and up-todate<br />

maps for many parts of the world that are higher quality than<br />

available government or commercial maps.<br />

OpenTreeMap (http://opentreemap.github.com/) is an Open<br />

Source platform to search and contribute to a collaborative,<br />

interactive and dynamic map of a community's tree population.<br />

The project can be freely downloaded, customized and installed<br />

by any interested organization or community. It is not a hosted<br />

service and requires some resources to be deployed and used in a<br />

community or region. Users can sign-up and map, update data or<br />

add photos about trees in their community and work<br />

collaboratively on a publicly accessible tree inventory, which is<br />

traditionally a resource intensive process for local authorities.<br />

These two projects take different approaches to their geographic<br />

scale and user communities. OpenStreetMap maintains a<br />

centralized technical infrastructure for the world, and has<br />

developed a large user community who are able to edit any of the<br />

worldwide data. This approach seems suitable for a project with a<br />

simplified data model, a project goal to develop a worldwide map,<br />

and a small coordinating organization. The development database<br />

described in this article shares more similarities with the<br />

OpenTreeMap. In this case, an open source tool is designed to be<br />

implemented in specific places. This approach allows the system<br />

to be tailored to local conditions and implemented by local<br />

organizations which can leverage context-specific resources (such<br />

as interorganizational relationships and positive name<br />

recognition).


3. SYSTEM DEVELOPMENT<br />

3.1 Phase I<br />

3.1.1 Overview<br />

The first phase of the Development Database project,<br />

implemented in late 2010, involved developing a novel web-based<br />

database to collect information from municipal staff about<br />

recently completed and planned developments. MAPC has<br />

previously collected this information through telephone calls and<br />

paper and online surveys. The web-based tool was developed<br />

because it provided several advantages:<br />

o Municipal staff can identify the location of a project on a<br />

map, resulting in greater spatial accuracy than collecting only<br />

addresses;<br />

o Projects can be automatically labeled with the appropriate<br />

municipality and Transportation Analysis Zone (TAZ) based<br />

on the designated location;<br />

o Municipal staff can review, edit, and update data collected in<br />

a previous survey, completed in 2007.<br />

MAPC collects development information for a variety of planning<br />

purposes. In this case, the agency was updating population and<br />

employment projections for use by the Boston Metropolitan<br />

Planning Organization in their 2035 Regional Transportation Plan.<br />

MAPC distributed the database web address and use instructions<br />

to municipal staff by email, and 64 municipal representatives<br />

created accounts to verify or enter development project<br />

information, resulting in a database of over 1,100 projects. Several<br />

technically sophisticated municipalities, including Cambridge,<br />

Somerville, and Boston, provided information in spreadsheet<br />

formats (including latitude and longitude coordinates) exported<br />

from internal records systems. These were manually combined<br />

with the data from the web-based system. The quantity of<br />

development projects in those municipalities would have been<br />

overwhelming for staff to manually enter individually. Following<br />

receipt and input of all municipal submissions, MAPC staff<br />

reviewed all projects in the database to confirm their location and<br />

status. The final product was made available as a spreadsheet and<br />

shapefile available for download from MAPC’s website.<br />

3.1.2 Technical Architecture and Lessons Learned<br />

The development database web application was built with freely<br />

available open source software tools:<br />

o PostgreSQL with the PostGIS extension for spatial data is<br />

used as a database server;<br />

o Data modeling, data forms, user registration and<br />

o<br />

management is done with Django, a Python-based web<br />

framework;<br />

Leaflet is used as mapping tool for displaying basemaps such<br />

as OpenStreetMap, Bing Aerials or a custom MAPC<br />

Basemap) and a project point layer and also allows users to<br />

“drag and drop” markers on the map to add or adjust precise<br />

project locations.<br />

The interface for data manipulation was kept as simple as<br />

possible. Although the chosen software tools would allow more<br />

sophisticated functionality – for instance, instead of point<br />

locations project polygons could be drawn on a map – the strategy<br />

was to have low barriers for users in order to improve the<br />

response rate and level of user participation.<br />

462<br />

MAPC was fortunate to have a few friendly users during the first<br />

few days after the launch. This group provided feedback that<br />

helped to tweak the system and iron out elements in the interface<br />

that caused confusion for non-tech-savvy users. A quick round of<br />

usability tests before launch or roll-out would have been helpful to<br />

catch some issues in advance, and is the recommended method<br />

when primarily targeting a non-technical audience. The<br />

application must be easy to use in order to generate a valuable<br />

data stream in return.<br />

As a fallback, if users were not willing to use the online system,<br />

digital spreadsheets and paper maps were sent out to municipal<br />

staff on request. The strategy was maximize internal efficiency<br />

and have as many entries through the web application added and<br />

validated.<br />

From the perspective of the existing literature on information<br />

sharing, Phase I of the development database confirmed the<br />

significant potential that exists for technology to enhance sharing.<br />

However, notably the technology augmented existing practices<br />

and relationships between municipal employees and the agency.<br />

3.2 Phase II<br />

3.2.1 Overview<br />

The two goals of the second phase of the project is to expand the<br />

website’s functionality as well as opening the system to the<br />

general public. Preliminary development of this phase is<br />

complete, and a beta version was distributed to test users in July<br />

2012. In order to enable broad participation but also ensure data<br />

quality, this phase of the database will accommodate several<br />

distinct user levels.<br />

3.2.2 Development Process<br />

The first stage of the development process included outreach to<br />

the target constituencies for the “crowd”: municipal staff, public<br />

agencies, academics, researchers, the development industry, and<br />

journalists. Six semi-structured interviews were completed with<br />

municipal staff and the development industry, and public agencies<br />

and researchers were consulted. The outreach included questions<br />

soliciting feedback about the existing system, specific<br />

development attributes they desired, and requirements for data<br />

quality. Municipal staff expressed an interest in using the system<br />

to answer citizen information requests. Therefore fields were<br />

added for project website URLs, as well as for sales and listing<br />

agents. We also designed the system so each municipality could<br />

link to only the projects in their jurisdiction.<br />

The development community expressed an interest in entering<br />

information about projects for marketing purposes, using existing<br />

data for market research purposes, as well as to identify projects<br />

for business-to-business marketing purposes. As a result of this<br />

feedback we created a field for the lead developer.<br />

For the next stage of system development, the results from the<br />

outreach as well as MAPC’s internal data needs were used to<br />

develop a list of database attributes, as well as wireframe<br />

diagrams illustrating the revised system functionality and layout.<br />

3.2.3 Website Functionality<br />

The first version of the development database included the ability<br />

to view all projects contained with a municipality, and view and<br />

edit the detailed attributes for a project. The second phase features


expanded functionality in three areas: database navigation, data<br />

access, and data structure.<br />

Additional webpages were added to improve the database<br />

navigation and usefulness. These changes include a (1) search<br />

page, including a map or table of results, (2) dynamic reports<br />

summarizing the total number and size of projects that meet<br />

specific search criteria, and (3) a project detail and editing page.<br />

The search and dynamic reports features include searching by<br />

municipality, by project size and status, as well as for projects<br />

permitted under specific regulations.<br />

Phase II of the database will also allow users to extract<br />

information for the entire region of for certain specific search<br />

criteria. This feature will allow downloading data in tabular<br />

(CSV) and spatial (KML) formats.<br />

Finally, the data structure of the database has also been modified.<br />

In addition to identifying a project’s point location, the website<br />

will assign one or more affected land parcels. The website will<br />

also collect and display a larger set of project attributes than the<br />

first version, including information about developers, designers,<br />

and contractors, which may prompt more inputs from the real<br />

estate development community.<br />

3.2.4 User Model<br />

The second phase of the development database will introduce user<br />

levels allowing different types of users to participate in the<br />

project.<br />

o The public will have read-only access to the data, as well as<br />

some limited search and downloading functionality.<br />

o Registered users will be able to set a preferred municipality,<br />

download data more easily, and enter new projects or edit the<br />

attributes of existing projects. However, these contributions<br />

will be moderated.<br />

o Approved users will include municipal staff or other<br />

municipal representative (such as a citizen serving on a local<br />

board or commission) will be able to edit projects in their<br />

municipality, as well as moderate the contributions of all<br />

registered users for their town.<br />

To incentivize participation, the project team is considering<br />

integrating game-like elements and mechanics. These might<br />

include a “leaderboard” listing users who make the most<br />

contributions, “badges” to encourage users to perform certain<br />

actions such as editing several projects or providing different<br />

types of information.<br />

4. CONCLUSION<br />

Despite rapid advances in web-based technologies for creating<br />

and sharing geographic information, significant barriers remain<br />

for developing spatial information. In particular, regional planning<br />

in the United States often requires obtaining information from<br />

many independent municipalities. This project represents an<br />

innovative hybrid approach to solve this problem for one class of<br />

spatial information, development projects. MAPC continues to<br />

463<br />

develop relationships with municipal staff, which may include<br />

occasional requests to view and update municipal data and<br />

interactions which may lead to formalized sharing practices. The<br />

development database will also seek to use a crowdsourcing<br />

methodology to enable members of the general public with a<br />

particular interest in urban development to contribute and use<br />

development data. Phase I of the project demonstrates the<br />

potential for new technologies to significantly enhance the volume<br />

and accuracy of information sharing in favorable<br />

interorganizational and policy contexts.<br />

5. ACKNOWLEDGMENTS<br />

The other MAPC staff involved in the project includes Barry<br />

Fradkin and Meghna Dutta. The project is funded by the Boston<br />

Metropolitan Planning Organization and a Sustainable<br />

Communities Regional Planning Grant from the U.S. Department<br />

of Housing and Urban Development.<br />

6. REFERENCES<br />

[1] Azad, B., and Wiggins, L., "Dynamics of Inter-<br />

Organizational Geographic Data Sharing: A Conceptual<br />

Framework for Research", in (Onsrud, H.J., and Rushton, G.,<br />

'eds.'): Sharing Geographic Information, Rutgers Center for<br />

Urban Policy Research, New Brunswick, New Jersey, 1995<br />

[2] Nedovic-Budic, Z., and Warnecke, L., "Gis Database<br />

Development and Exchange: Interaction Mechanisms and<br />

Motivations", Spatial Data Infrastructures in Context: North<br />

and South, 2011, pp. 69.<br />

[3] Pardo, T.A., and Tayi, G.K., "Interorganizational<br />

Information Integration: A Key Enabler for Digital<br />

Government", Government Information Quarterly, 24(4),<br />

2007, pp. 691-715.<br />

[4] Gil-Garcia, J.R., Chun, S.A., and Janssen, M., "Government<br />

Information Sharing and Integration: Combining the Social<br />

and the Technical", Information Polity, 14(1), 2009, pp. 1-<br />

10.<br />

[5] Landsbergen Jr, D., and Wolken Jr, G., "Realizing the<br />

Promise: Government Information Systems and the Fourth<br />

Generation of Information Technology", Public<br />

Administration Review, 61(2), 2001, pp. 206-220.<br />

[6] Malone, T., Laubacher, R., and Dellarocas, C., "The<br />

Collective Intelligence Genome", Sloan Management<br />

Review, 51(3), 2010, pp. 21-31.<br />

[7] Goodchild, M.F., "Citizens as Sensors: The World of<br />

Volunteered Geography", GeoJournal, 69(4), 2007, pp. 211-<br />

221.<br />

[8] Linders, D., "We-Government: An Anatomy of Citizen<br />

Coproduction in the Information Age", Digital Government<br />

Society Dg.o 11, 2011


Drivers for Public Sector Contests<br />

ABSTRACT<br />

This study investigates the use of technology-enabled open<br />

innovation practices in public sector agencies. It draws on<br />

theories from the corporate sector and empirical data collected<br />

from government agencies in the U.S. federal government. Based<br />

on preliminary insights from public managers responsible for the<br />

design of challenges and prizes as an innovative form of open<br />

innovation we derive an open innovation research framework. The<br />

main factors influencing the decision to adopt an open innovation<br />

approach in the public sector include organizational, project, and<br />

individual level factors.<br />

Categories and Subject Descriptors<br />

K.4.3 [Organizational Impacts]: Computer-Supported<br />

Collaborative Work<br />

General Terms<br />

Management, Theory<br />

Keywords<br />

Open Innovation, Distributed Innovation, Public Sector<br />

1. INTRODUCTION<br />

In recent years we have witnessed a shift in the innovation<br />

landscape of organizations from closed to more open models<br />

which embrace input into processes, design elements, or<br />

innovative campaigns from the organization’s stakeholders. This<br />

emerging trend is enabled by the internet and social media which<br />

allow the easy flow of information and connection to widely<br />

dispersed experts and enthusiasts [2]. Originating as a private<br />

sector practice, government agencies have begun to embrace this<br />

open approach to problem solving. In the US Federal government,<br />

Challenges and Prizes were introduced as a tool to help agencies<br />

find cost-effective and innovative solutions to the nation’s<br />

problems. In a memo issued from the White House Office of<br />

Management and Budget (OMB) in March 2010 [6] executive<br />

departments and agencies were specifically encouraged to<br />

increase their capacity to support, design and manage prizes,<br />

whether acting alone or in collaboration with external partners.<br />

The memo also articulated the administration’s intention to make<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Claudia Louis<br />

Syracuse University<br />

School of Information Studies<br />

315-443-4508<br />

calouis@syr.edu<br />

464<br />

a web-based platform (Challenge.gov) available to support the<br />

practice.<br />

As an emerging area in e-government research, there are many<br />

unanswered questions concerning the use of the web and social<br />

media for innovation practices in government agencies. This<br />

study draws on private sector theories, combined with empirical<br />

data collected from government agencies to investigate the<br />

following research questions: i) why do public sector agencies<br />

decide to use technology-enabled open innovation practices as<br />

opposed to traditional methods? ii) Why are there variations<br />

among the patterns of use by various agencies? Investigation will<br />

focus on the use of a web-based crowdsourcing platform in US<br />

Federal Government agencies which solicits citizen participation<br />

in solving problems through the use of contests and challenges.<br />

The outcome is a multi-level framework to represent the<br />

organizational determinants of an open approach to problem<br />

solving in the public sector.<br />

2. OPEN INNOVATION AND<br />

CROWDSOURCING<br />

Openness in innovation refers to the practice of embracing outside<br />

participation as well as sharing with others on the outside [3].<br />

Crowdsourcing is a subset of open innovation, and refers to the<br />

practice of outsourcing to crowds. Organizations make the details<br />

of their problems publicly available, and invite potential solvers to<br />

submit solutions. An example of such activity is the initiative by<br />

LEGO to get ideas for new models by soliciting submissions from<br />

customers, with payment of financial rewards for viable<br />

submissions. Likewise the shirt retailer Threadless sells<br />

merchandise designed based on customer submissions [1].<br />

While some advocate the transferring of private sector innovation<br />

theories to the public sector, the unique attributes of public sector<br />

organizations cannot be ignored. For example the bureaucratic<br />

nature with hierarchical structures, strict rules, and conventional<br />

work patterns sometimes make it difficult to try out<br />

unconventional or risky ideas [5]. However that does not diminish<br />

the potential contribution of open innovation practices to public<br />

sector operations.<br />

3. METHOD<br />

The investigation took the form of a multiple case study<br />

examining 28 open innovation projects utilizing the challenges<br />

and prizes format. Cases were selected across 17 agencies and<br />

based on the category of the challenge project. Stratified<br />

purposeful sampling was used to ensure proportional distribution<br />

in each of the four categories identified from earlier analysis of<br />

the Challenge.gov website.


For each case, semi-structured interviews were conducted with<br />

one or two persons responsible for the administration of the<br />

project. Qualitative interviews were used because they provided<br />

an opportunity to understand people within their social and<br />

cultural context. Interviews elicited responses about the i) the<br />

decision to use the challenge format ii) organizational processes<br />

surrounding the use of this approach iii) outcomes and<br />

implementation of submissions and iv) lessons learned and<br />

recommendations for public managers. Some preliminary<br />

qualitative analysis has been conducted on the interview data<br />

which will be followed by a combination of more in-depth<br />

qualitative and content analysis. A combination of deductive and<br />

inductive methods has been employed to identify the main<br />

enablers and barriers to practicing open innovation activities.<br />

4. CONCEPTUAL FRAMEWORK<br />

Organizations who decide to invest in open innovation activities<br />

are sometimes hindered from profiting from these activities due to<br />

certain risks and barriers which they face [4]. In an attempt to<br />

develop a framework for investigating open innovation in the<br />

public sector, we present factors at three distinct levels:<br />

organizational, individual, and project level. At each specific level<br />

a number of factors have been selected based on prominence in<br />

the literature, applicability to the public sector, preliminary<br />

analysis of interview data. At the organizational level the factors<br />

major influencing factors are organization commitment,<br />

management support, and origin of initiative (top-down or<br />

bottom-up). At the project level we examine nature of problem<br />

faced, and presence of a project champion. At the individual level<br />

we examine employee attitudes (Not invented here syndrome) and<br />

perceptions of benefits. At this point the framework is still<br />

emerging and subject to change after more in-depth analysis.<br />

5. FINDINGS<br />

The conceptual framework represents determinants which have so<br />

far been found to influence the decision of an agency to use an<br />

open innovation approach to solve a problem. Preliminary<br />

qualitative analysis of interview data provided support for some of<br />

the factors suggested in the literature such as management<br />

support, organization commitment, employee attitudes, and<br />

perception of benefits. The remaining determinants emerged<br />

inductively from the data: origin of initiative (top-down vs<br />

bottom-up), nature of the problem, and presence of a project<br />

champion. For example one participant stated that “we did it<br />

because it was suggested from the top”, while another indicated<br />

that one of the keys to running an effective challenge was the<br />

presence of a “project champion”. The literature suggested the<br />

presence of bureaucracy and red-tape to be a barrier for<br />

government agencies. Some of the participants who identified<br />

themselves as early adopters indicated that it was extremely<br />

difficult to navigate the necessary legal authority before the<br />

passage of the America Competes Act in 2010. Many admitted<br />

465<br />

that the guidelines and legal authority has significantly reducing<br />

the legal burden for agencies. Other barriers emerging from the<br />

data included legal barriers in selecting judges outside the public<br />

sector, and some technical restrictions of the software platform.<br />

The data provided support for an earlier categorization of the type<br />

of project listed on the challenge.gov website. The four categories<br />

emerging from the process were: i) creativity contests aimed at<br />

public awareness initiatives ii) software applications (apps) and<br />

tools for service provision iii) generating research and ideas and<br />

iv) technical solutions. For example one participant stated that<br />

their agency decided to do only apps challenges because they had<br />

just released a larger amount of public data. Another indicated<br />

that they only did video contests because they “did not have much<br />

experience in running challenges”. Further, there appears to be a<br />

relationship between the category of project undertaken and<br />

mission and strategic plan of the organization. For example,<br />

organizations with public engagement or outreach as part of their<br />

mission had a greater tendency to do video/poster contests and<br />

app challenges. Agencies with a more technical mission tended to<br />

have more of the technical solutions. The different categories of<br />

challenge also varied in level of skill required to solve and the size<br />

of the prize purse attached.<br />

6. OUTLOOK<br />

Factors emerging from the conceptual framework can provide<br />

some guidance to agencies working on current and future<br />

implementations, as well as help them learn from the mistakes and<br />

successes of early adopters. Overall more research is needed on<br />

the viability of open innovation as a public sector practice.<br />

7. REFERENCES<br />

[1] Bughin, J., Chui, M., & Johnson, B. (2008). The next step in<br />

open innovation. The McKinsey Quarterly, June 2008<br />

[2] Chesbrough, H. W. (2003). A Better Way to Innovate.<br />

Harvard Business Review, 81(7), 12-13.<br />

[3] Chesbrough, H. W. (2011). Bringing Open Innovation to<br />

Services. MIT Sloan Management Review, 52(2), 85-90.<br />

[4] Enkel, E., Gassmann, O., & Chesbrough, H. (2009). Open<br />

R&D and open innovation: exploring the phenomenon. R&D<br />

Management, 39(4), 311-316.<br />

[5] Vigoda-Gadot, E., Shoham, A., Schwabsky, N., & Ruvio , A.<br />

(2005). Public sector innovation for the managerial and the<br />

post-managerial era: Promises and realities in a globalizing<br />

public administration. International Public Management<br />

Journal, 8(1), 57-81.<br />

[6] White House (2010). Guidance on the Use of Challenges and<br />

Prizes to Promote Open Government, Memorandum for the<br />

Heads of Executive Departments and Agencies, March 8


ABSTRACT<br />

Rwanda was characterized by divisionism, where one part of<br />

Rwandan (Tutsi) was excluded. In 1994 tutsi genocide more than<br />

1 million people were killed, mutilated and injured.<br />

Based on the analysis of field data collected through interviews,<br />

this research provided to decision makers a web portal solution to<br />

address the reconciliation challenges in Rwanda.<br />

The findings show that one of the benefits of implementing ereconciliation<br />

web portal will be to get easily the information<br />

related to reconciliation there will be other benefits, like avoiding<br />

history distortion, it will show negative impact of genocide, and it<br />

will be the best way to help Rwandans and international<br />

community to learn about the genocide. Although a number of<br />

challenges have been found, the main challenge would be the lack<br />

of internet access; other challenges include: the authenticity of<br />

information and the collection of information to be posted on the<br />

web portal. To address those challenges e-reconciliation can be<br />

accessible via mobile phone as the majority of Rwandan has<br />

access to mobile phone. The information posted on ereconciliation<br />

web portal must have references recognized and the<br />

decision makers have to delegate who will manage the posted<br />

information.<br />

Categories and Subject Descriptors<br />

K.4.0 [COMPUTERS AND SOCIETY]: General<br />

General Terms<br />

Human Factors<br />

1. INTRODUCTION<br />

Rwanda a landlocked country situated in central Africa was<br />

characterized by divisionism, where one part of Rwandan (Tutsi)<br />

was discriminated. In 1994 tutsi genocide more than 1 million<br />

people were killed, mutilated and injured.<br />

The Rwandan government is trying to build up the society and<br />

create stability. The main goal of government now is the process<br />

of reconciliation.<br />

Information relevant to reconciliation of Rwandan is not<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

E-Reconciliation in Rwanda<br />

Bagambiki Erika<br />

National Bank of Rwanda<br />

P. O. Box 531 Kigali Rwanda<br />

Phone: +250 788643998<br />

viterika@yahoo.fr<br />

466<br />

centralized or coordinated. The research proposed to decision<br />

makers an ICT Solution which will help to integrate the relevant<br />

information that pertain to reconciliation in Rwanda and offer<br />

them in a web portal.<br />

2. METHODS<br />

The research used an electronic survey for the following groups to<br />

assess the reconciliation gaps and challenges:<br />

• GAERG: Association bringing together former students<br />

who survived the genocide of Tutsis in 1994.<br />

• IBUKA: Preserve the memory of the 1994 genocide of<br />

Tutsi, support survivors in overcoming its continuing<br />

effects, and work to prevent further genocide.<br />

• CNLG: National Commission for the Fight against<br />

Genocide.<br />

• Prisoners: Prisoners who killed people during the<br />

genocide<br />

• Burial Sites Managers: Managers for different memorial<br />

sites for victims of the genocide in Rwanda<br />

• NURC: National Unity and Reconciliation Commission<br />

3. AIM<br />

The aim of the research was to analyze the reconciliation of<br />

Rwandan, how ICTs can help in Rwanda’s reconciliation efforts<br />

and arrive at a more significant result.<br />

4. RESULTS<br />

For all groups, Access to information related to reconciliation of<br />

Rwandan takes time; the problem resides on access from different<br />

sources.


Figure 1. Comparative analysis on the Results of the<br />

question about access of information related to<br />

reconciliation of Rwanda<br />

Getting an e-reconciliation web portal will help to get easily the<br />

information, it will avoid the history distortion; it will Show<br />

negative impact of Genocide, etc.<br />

Figure 2. Comparative analysis on the results of the question<br />

about benefits of e-reconciliation web portal<br />

E-reconciliation web portal will face some challenges according<br />

to the result from questionnaire by different groups. The main<br />

challenges will be the lack of internet access, authenticity of<br />

information and the collection of information.<br />

Figure 3. Comparative analysis on the Results of the question<br />

about challenges of implementing e-reconciliation web portal<br />

5. CONCLUSION<br />

To achieve the reconciliation of Rwandans, ICT can play a very<br />

important role in a society where people can more easily<br />

communicate, understand the current situation, visualize the<br />

implications of their actions and understand each other’s point of<br />

view.<br />

The following are the recommendations to successful implement<br />

the e-reconciliation web-portal:<br />

• The Fiber optics are being installed in country wide,<br />

when this project will be finished the challenge of lack<br />

467<br />

of Internet will be reduced. Until the majority of<br />

Rwandans have access to internet there are other<br />

solutions to the lack of internet like using mobile phone<br />

as the majorities have mobile phones.<br />

• The people who will post information on ereconciliation<br />

web portal have to make the references<br />

recognized; this will answer the challenge of<br />

authenticity of information on e-reconciliation web<br />

portal<br />

• The decision makers will have to put clear methodology<br />

of collection of information to be posted on ereconciliation<br />

web portal and to delegate who will<br />

manage the posted information in order to avoid the<br />

challenge of collecting information to be posted on the<br />

web portal.<br />

Figure 5.1.The proposed e-reconciliation web portal solution<br />

and its accessibility


Electronic Participation System: The Nigerian Perspective<br />

ABSTRACT<br />

The emergence of e-Governance has transformed the way<br />

Governments carry out their businesses using Information &<br />

Communication Technology (ICT). The application of egovernance<br />

can be characterized in three major areas, namely<br />

Communication, citizen participation, and monitoring and<br />

evaluation of government projects.<br />

This paper, titled ‘Electronic Participation System: The Nigerian<br />

Perspective’ will show case an innovation being introduced to<br />

project monitoring and citizenry inclusion at Federal Government<br />

level. This will bring transparency, effective reporting by<br />

supervising Ministries, enhanced communication, citizen<br />

participation and project monitoring, and ultimately good<br />

governance and elimination of corruption.<br />

Categories and Subject Descriptors<br />

D.2.11 Service-Oriented Architecture (SOA), C.0 System<br />

Application Architecture, J.3 Cellular Computing, B.7.2 Verify<br />

and K.4.1 – Fifth Generation Project<br />

General Terms<br />

Management, Performance, and Verification.<br />

Keywords<br />

Electronic Participation; e-Government; Citizen; Innovation;<br />

Project monitoring; Grassroots; ICT; mobile phones.<br />

1. INTRODUCTION<br />

The Nigerian Government has since recognized the need to evolve<br />

itself through reforms and modernization of its processes using<br />

information technology otherwise known as electronic<br />

Governance. The Electronic Government focuses on the Back-<br />

Office processes and operations, while the electronic Governance<br />

focuses on the coordination, interoperability between three tiers of<br />

Government and citizens’ inclusion.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Ibrahim Aliyu<br />

Federal Secretariat, Shehu Shagari<br />

Complex, Abuja. Nigeria<br />

(234) 805-318-0580; (234) 802-417-6068<br />

i_aliyu@yahoo.co.uk<br />

468<br />

It is against this background that the Office of the Secretary to the<br />

Government of the Federation (OSGF) under “The Presidency”<br />

reviewed the critical pillar of a successful e-<br />

Government/Governance, namely:<br />

i. Citizen Centricity: This is about being citizen focused<br />

by all service providers for effective service delivery.<br />

This brought about the Service Charter in the public<br />

service, by putting in place a structure for effective<br />

transformation and citizen centricity campaign.<br />

ii. Standardisation of Common infrastructure: This will<br />

facilitate data sharing or reuse at least within the<br />

Government structure.<br />

iii. Governance: Coordination and interoperability in<br />

government facilitate the provision of effective and<br />

efficient service delivery by government. The Nigerian<br />

Government has since noted the importance of<br />

Information Technology (IT) or “e” for the coordination<br />

and interoperability among Ministries, Departments and<br />

Agencies.<br />

iv. New Organisational Model: the quest for innovation and<br />

Citizen-Centric Government Services as fundamental to<br />

effective and efficient e-Governance. Hence, innovation<br />

such as electronic Participation System.<br />

v. Social/Citizens inclusion: The concept of e-Governance<br />

is not only the provision of online services, but also<br />

bridging the gap between Government and its citizenry<br />

in such a way that trust and accountability will be built,<br />

and consequently all citizen will participate in<br />

governance. Therefore, as a first step, it was realized<br />

that the easiest way for the citizens inclusion is through<br />

programmes and project monitoring.<br />

2. ELECTRONIC PARTICIPATION<br />

SYSTEM<br />

The e-Participation System is a software application that will<br />

provide a platform for Government to interface with the Nigerian<br />

public through ‘Short Message Service’ (SMS) using the mobile<br />

phones for the purpose of monitoring or tracking implementation<br />

of Government Projects. Study indicates that over 99 million<br />

Nigerian have access to mobile phones, therefore making the<br />

OSGF to contemplate taking that advantage of the mobile phones<br />

technology and internet facility to connect to its citizenry. It is<br />

expected that such feedback will enable Government to monitor<br />

projects’ progress, completed project performance, ongoing


projects and their on-site images. The system will also provide<br />

additional avenue for Citizens to forward suggestions or request<br />

for the development projects required in their locality to the<br />

Government.<br />

It was expected that, when implemented successfully at the<br />

Federal Government level, the project will ultimately be deployed<br />

at the federal level and for Federal projects, but will consequently<br />

be integrated with the States Government.<br />

2.1 E-Participation System Stakeholders<br />

All Ministries, Departments and Agencies (MDAs) at the Federal<br />

Government that execute any Federal Government project will be<br />

considered as stakeholders while the Office of the Secretary to the<br />

Government of the Federation will serve as the driver of this<br />

important e-Government Project.<br />

2.2 Objective of the E-Participation System<br />

1. Provide a Software Application that will provide<br />

interface with the Grassroots through SMS on the GSM<br />

phones and using internet facility for the purpose of<br />

monitoring and tracking Government Project<br />

Implementations.<br />

2. Provide a means for Government to monitor progress on<br />

ongoing projects, completed projects, images and all<br />

information on Projects.<br />

3. Provide a means for Government to keep track of<br />

feedback from the general public on ongoing/completed<br />

projects.<br />

4. Provide a means for the general public to submit request<br />

for developmental projects to the Government.<br />

2.3 PRIVATE SECTOR ENGAGEMENT<br />

The Office of the Secretary to the Government of the Federation<br />

of Nigeria, having conceived the project, engaged the services of a<br />

private sector company in the design, development and the<br />

implementation of the system while riding on the Networking and<br />

communication infrastructure provided by another Government<br />

outfit.<br />

2.4 PROJECT STATUS<br />

The project had reached an advance stage, these stages are as<br />

followings;<br />

• E-participation application has been fully developed,<br />

tested and ready for deployment<br />

• Hosting arrangements in placed.<br />

• Data collection and collation about the approved<br />

Federal Projects for the database is in progress.<br />

• A GSM Service Provider was chosen as the network<br />

operator for the SMS, for the pilot stage of the project.<br />

469<br />

GSM<br />

SERVICE<br />

PROVIDE<br />

R<br />

Mobile<br />

Network<br />

Server<br />

Figure 1. e-Participation System Overview Application<br />

Server<br />

Internet<br />

OSGF<br />

Console<br />

3. ACKNOWLEDGMENTS<br />

I wish to thank the Presidency: Office of the Secretary to the<br />

Government of the Federation (OSGF), Nigeria for the confidence<br />

and support given to the ICT Team from the conception of this<br />

project. My gratitude goes to the Director, Planning, Research and<br />

Statistics of the OSGF and entire ICT Team for the cooperation<br />

and support demonstrated on the course of conceptualization of<br />

this project to its implementation.<br />

.


Enterprise Systems and Government Organizational<br />

Changes: A Socio-Materiality Analysis<br />

Loni Hagen<br />

Department of Informatics<br />

SUNY at Albany<br />

1400 Washington Ave<br />

Albany, NY 12222<br />

(518) 442 3300<br />

lkim3@albany.edu<br />

ABSTRACT<br />

Advocates of Enterprise Systems argue that such systems promise<br />

many advantages to government organizations, such as enhancing<br />

performance, transparency, accountability and efficiency.<br />

However, the fulfillment of these promises is not easy to establish.<br />

The socio-materiality framework provides a useful way to<br />

evaluate Enterprise System implementation by investigating<br />

technology use in everyday practice over time.<br />

This study of the usage of the On-Nara system (a Korean<br />

government Enterprise System) suggests that particular structures<br />

of technology use develop in relation with institutional conditions,<br />

and responsibilities of users, as well as associated technologies in<br />

use. We argue that an Enterprise System can bring unintended<br />

(not necessarily negative) micro-level organizational changes.<br />

Further, we found that initially inflexible Enterprise Systems gain<br />

flexibility when used in combination with other internetconnected<br />

technologies.<br />

Categories and Subject Descriptors<br />

K.6.1 [Computing Milieux]: Project and People Management –<br />

Systems Analysis and Design<br />

General Terms<br />

Management, Human Factors, Theory<br />

Keywords<br />

Socio-Materiality, Practice Theory, Electronic Government,<br />

Public Management, Enterprise System, Materiality, IT Impact,<br />

Organizational Changes<br />

1. INTRODUCTION<br />

The socio-materiality framework was developed to examine the<br />

interaction between technology and users after systems go-live.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

470<br />

Donghee Sinn<br />

Department of Information Studies<br />

SUNY at Albany<br />

1400 Washington Ave<br />

Albany, NY 12222<br />

(518) 442 3300<br />

dsinn@albany.edu<br />

We choose the Korean National Police Agency as an empirical<br />

setting for a case study of the On-Nara System, an Enterprise<br />

System that the Korean Government developed to transform the<br />

way the government works.<br />

In this study, we aimed to learn: (1) What material capabilities of<br />

technology do users adopt and creatively shape in a particular<br />

organizational context?; (2) What are the changes in the users’<br />

routines after the introduction of the technology in this<br />

organization?; and (3) How do the System’s provisions and<br />

features for the goals of improving efficiency and transparency<br />

appear to be used?<br />

Going beyond the question of how a technology is appropriated in<br />

specific environments, we endeavor to understand the process of<br />

human interaction with technology wherein the socio-materiality<br />

of the human-technology nexus is constituted, and recursively<br />

reconstituted, as an emergent structure of technology-in-use.<br />

2. THEORETICAL FOUNDATION:<br />

SOCIO-MATERIALITY FRAMEWORK<br />

Wanda Orlikowski developed the socio-materiality framework to<br />

support the argument that technological materiality is inextricably<br />

bound up with everyday life [4]. The socio-materiality approach<br />

reconfigures the notion of “agency,” as a capacity realized<br />

through associations and networks of humans and materials as<br />

well as organizations, rather than simply inherent in human beings<br />

[3].<br />

The Socio-materiality view posits that humans and technologies<br />

are inseparably entangled with each other in association with<br />

organizational realities that agents build and change [3][4]. In<br />

organizational practices, the need to accomplish task goals with<br />

the available technologies can result in adjustments of routines.<br />

This explains why improvised usage of technical features can<br />

override the originally intended purposes [5]. While<br />

acknowledging that technological properties have inscribed in<br />

them the designers’ intentions and knowledge at the time of<br />

development, this view focuses on the selection and modification<br />

of particular technological capabilities by users [1].<br />

This approach is especially useful for examining internetconnected<br />

technologies where relationships between use and<br />

properties are complicated and constantly changing as new<br />

artifacts and configurations are connected to current technologies<br />

[2]. Nowadays, internet-connected technologies, including<br />

Enterprise Systems, are omnipresent in governments. One of the


key challenges of Enterprise Systems resides in their tight<br />

integration with the business process. We believe that the sociomateriality<br />

framework can aid the understanding of the dynamic<br />

and emergent nature of contemporary organizing involving the<br />

introduction of Enterprise Systems and internet-connected<br />

technologies.<br />

3. RESEARCH DESIGN OF THE STUDY<br />

In order to learn about organizational changes derived from<br />

technology, we interviewed users of the On-Nara system. We<br />

recruited interview subjects selectively among people in<br />

administrative positions in the Korean National Police Agency<br />

who have used On-Nara extensively. There were pre-screening<br />

processes to identify the most appropriate samples and finally<br />

nine phone interviews (four from the Headquarters and five from<br />

local police stations) were conducted. Interview questions were<br />

developed based on conditions (facility, interpretive scheme, and<br />

norm) of enactment which are borrowed from the practice lens<br />

proposed by Orlikowski [2].<br />

3.1 Research Setting: Government<br />

Organizations and an Enterprise System<br />

The On-Nara system was launched in 2007 with extensive<br />

supports from the Korean Ministry of Public Administration and<br />

Security. By 2011, 100% of central, provincial, and metropolitancity<br />

governments used On-Nara. On-Nara is expected to enable<br />

nationally standardized (a) online knowledge transfer, (b)<br />

document management, (c) policy analysis and performance<br />

management, and (d) preservation of decision making histories.<br />

There are six functionalities provided to users in On-Nara: Record<br />

Management, Memo Report, Task Management, Meeting<br />

Management, Order Management, and Schedule Management.<br />

4. FINDINGS<br />

A variety of technology mediated practices emerged, which<br />

depended on individual technological efficacy, knowledge of and<br />

interests in technologies, institutional conditions, and other<br />

technologies at hand. The On-Nara system was used creatively to<br />

improve individual or group productivity, and to collect feedback<br />

from colleagues. Distinctive new practices observed are described<br />

briefly below.<br />

First, users who see using On-Nara as constraining their legacy<br />

practices, tend to work around it. For instance, when users<br />

perceive that the level of transparency required in On-Nara as<br />

burdensome, they would instead use the messenger function from<br />

the Police Integrated Portal System (IPOS) for corresponding to<br />

each other (Interview #4, #6). Second, users improvise<br />

technological capabilities from certain functions in On-Nara that<br />

they find helpful for attaining their task goals. The Memo Report<br />

was initially developed for brief reports to superiors. But it was<br />

also creatively utilized for receiving opinions from colleagues<br />

who would be interested in or knowledgeable about a matter<br />

471<br />

(usually for policy preparation or project planning) prior to<br />

official review (Interview #1, #2, #3, #6). Third, enactment of On-<br />

Nara is deeply intertwined with other technologies in use.<br />

Functions of some systems (such as the Police Knowledge<br />

Management System) overlap with those of On-Nara, which<br />

creates less utilization of such functions in On-Nara. For example,<br />

the Police Knowledge Management System is popularly used by<br />

police officers to acquire business knowledge including<br />

instructions, manuals, professional reports, and official<br />

government reports. On-Nara came into use after this system, and<br />

one of the original intentions of the On-Nara system, enabling online<br />

knowledge transfer, does not seem to have been effectively<br />

achieved. This suggests that when there is an existing system that<br />

works efficiently, people will tend to continue to use it, even if a<br />

similar function is available in a new system.<br />

5. CONCLUSION<br />

Using a socio-materiality framework, we identified multiple<br />

emergent practices of technological usage. We identified<br />

unintended changes in user routine that were induced by the<br />

enactment of the On-Nara system. This study illustrates how an<br />

Enterprise System can result in unintended micro-level<br />

organizational changes.<br />

The socio-materiality view posits that non-human factors, along<br />

with human agents, play consequential roles in the production of<br />

social life. Our study of On-Nara-in-Practice confirm that the<br />

technological context in which a new Enterprise System is<br />

embedded (e.g. IPOS in the Korean National Police Agency) is<br />

crucial in shaping the structures of technology use. We further<br />

note that a relatively inflexible Enterprise System can become<br />

more flexible as human enact it recursively in relation with other<br />

internet-connected technologies.<br />

6. REFERENCES<br />

[1] Harrison, T., Pardo, T., Gil-Garcia, J., Thompson, F., and<br />

Juraga, D. Geographic information technologies,<br />

structuration theory, and the World Trade Center crisis.<br />

Journal of the American Society for Information Science &<br />

Technology, 58(14). 2240–2254.<br />

[2] Orlikowski, W.J. Using Technology and constituting<br />

structures: A practice lens for studying technology in<br />

organizations. Organization Science, 11(4). 404–428.<br />

[3] Orlikowski, W.J. Sociomaterial practices: Exploring<br />

technology at work. Organization Studies, 28(9). 1435–1448.<br />

[4] Orlikowski, W.J. The Sociomateriality of organisational life:<br />

Considering technology in management research. Cambridge<br />

Journal of Economics, 34(1). 125–141.<br />

[5] Schultze, U. and Orlikowski, W.J. A practice perspective on<br />

technology-mediated network relations: The use of Internetbased<br />

self-serve technologies. Information Systems Research.<br />

15(1). 87–106.


Evaluation of E-Governance Projects of Nepal<br />

ABSTRACT<br />

Nepal is a South Asian nation located between China and India.<br />

Internal conflict of more than 15 years has driven back the<br />

country in terms of infrastructure, education, health and overall<br />

national development. However, a peace process has concluded<br />

the conflict and Nepal is now making a slow transition to peace.<br />

And in an effort to modernize itself, the government of Nepal has<br />

formulated an e-governance master plan, or eGMP. The paper<br />

aims to evaluate the major e-governance projects running under<br />

the eGMP. The analysis is based on the basis of more than 20<br />

years of experience as a senior officer of government of Nepal<br />

and long time experience of e-governance initiations at the central<br />

level.<br />

Categories and Subject Descriptors<br />

J.1.4 [Computer Application]: Administrative Data Processing -<br />

Government<br />

General Terms<br />

Management<br />

Keywords<br />

Electronic Governance, Projects, Nepal, Evaluation<br />

1. INTRODUCTION<br />

Many countries around the world are establishing the egovernment<br />

to change their national administrative system for<br />

greater work efficiency. Through this, governments aim to<br />

provide administrative services in a prompt and convenient<br />

manner to their people and seek to enhance their national<br />

competitiveness.<br />

The government of Nepal pursues similar aims; with the eGMP, it<br />

expects to overcome Nepal’s geographical adversities, promote<br />

infrastructure, basic services, and achieve a new round of socioeconomic<br />

development. To achieve these aims, the government<br />

set-up a High Level Commission for Information Technology<br />

(HLCIT), in 2003, and introduced several IT policies. Nepal<br />

Government, along with HLCIT, established the e-government<br />

master plan (eGMP) in 2006. The project period was set for five<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Ganesh Prasad Adhikari<br />

NID, Ministry of Home Affairs<br />

Singhdurbar, Kathmandu, Nepal<br />

00977-01-4377974<br />

ganesh.adhk@gmail.com<br />

472<br />

years-from 2007 to 2011.<br />

2. MAJOR ACTIVITIES UNDER EGMP<br />

The Nepal Government has introduced Information and<br />

Communication Technology Development (ICTD) as a part of the<br />

eGMP. It is aimed at the Nepalese living in the hilly and<br />

mountainous regions of the country. They comprise 52% of the<br />

total population and their progress has been severely affected by<br />

geographic adversities of the regions they live in. The program<br />

aims to provide them better access to information related to<br />

market, job opportunities, health, education and policies, by<br />

establishing proper ICT facilities and internet connectivity.<br />

The project was estimated to cost US$ 31.2 million and was<br />

financed by the following organizations:<br />

i) Asian Development Bank (ADB): US$ 25 million<br />

ii) Nepal Government: US$ 6.2 million through taxes, duties, and<br />

contingencies.<br />

The project comprises of the four components: (1) rural ecommunities,<br />

(2) government network, (3) e-government<br />

applications, and (4) human resources development for egovernance.<br />

The main activities under the above three<br />

components are as follows.<br />

3. PART ONE: RURAL E COMMUNITY<br />

In this phase, the government plans to modernize the rural areas<br />

by improving rural connectivity using the wireless broadband<br />

networks. This objective will be completed in four different<br />

phases. Firstly, wireless broadband networks will be established in<br />

38 out of 75 districts in the country. The installation will be done<br />

in a phased manner and the selected 38 districts will be spread<br />

across all the major geographic regions of Nepal. Then, Village<br />

Network Portals will be established in 11 districts of the country.<br />

They will have the capacity to work in Nepali, English and local<br />

languages. Thirdly, 114 Telecenters will be established in 38<br />

districts. They will have access to the Village Portals and be<br />

integrated with the rural wireless broadband system. The rural<br />

community will be trained by both private and government<br />

institutions so that they can adapt to this infrastructure.<br />

4. PART TWO: GOVERNMENT<br />

NETWORK<br />

The government plans to establish its ICT network by<br />

strengthening Government Integrated Data Center (GIDC), which<br />

has already been established within the National Information<br />

Technology Center (NITC). With this, a data base will be<br />

established where all e-government applications will be housed.<br />

This can lead to the integration of all the groupware applications<br />

into a single web service with open standards for all ministries<br />

and departments.


5. PART THREE: E GOVERNMENT<br />

APPLICATIONS<br />

Looking at specific interests, the government will focus on<br />

establishing a group of particular e-government applications. It<br />

plans to establish enterprise architecture and develop e-<br />

Government operation policy and guidelines. It will also design<br />

and implement web-based system for the public service<br />

commission, land record management, and vehicle registration<br />

and driving licensing systems.<br />

More importantly, the government plans to establish a national<br />

identification system. Every citizen will get a unique identity<br />

number, and there will be a database to keep the record of each<br />

citizen and share among stakeholders. This will be achieved by<br />

generation of a unique ID number, registration in the national<br />

database, verification with biometric features, printing biometric<br />

smart National ID card and issuance of the card to the people.<br />

6. PART FOUR: HUMAN RESOURCE<br />

DEVELOPMENT FOR E GOVERNANCE<br />

In this section, the government aims to build awareness and skills<br />

of the key stakeholders in e-Governance, establish computer<br />

laboratories for training, and develop a better curriculum for the<br />

same purpose. The latter will be done with research and<br />

collaboration with universities.<br />

7. IMPLEMENTATION SCHEDULE<br />

According to the project implementation schedule prepared by<br />

ADB on September 2008, finalizing the bidding documents of all<br />

the above mentioned projects should start on 29 September 2009<br />

and finish on 11 February 2009. Likewise the procurement of all<br />

projects should start on 14 th December and finish on 16 June<br />

2009. The design, supply, installations, testing and commissioning<br />

of the projects under part two and three should start on 01 January<br />

2009 and should finish on 14 th October 2010. It means<br />

commissioning of the most of the projects should finish by the<br />

October 2010.<br />

8. DEVELOPMENT REVIEW AND<br />

CURRENT STATUS OF PROJECTS<br />

According to the Asian Development Bank, as of 30 November<br />

2010, the project’s physical progress is estimated at about 30%,<br />

cumulative contract awards and disbursements were $.2.4 million<br />

and 0.3 million respectively out of the total 25 million budget.<br />

Not even a single project has been completed on time and not one<br />

project has commissioned according to the scheduled plan.<br />

According to the revised action plan, the remaining projects<br />

should have been completed by 31 st January 2011. As of March<br />

2012, the status of the project is still the same as on December<br />

2010, when the new action plan was formed. Significant progress<br />

has been achieved in only one field: Price Waterhouse Coopers<br />

(PWC) has won the contract to design, develop and facilitate<br />

Government Enterprise Architecture.<br />

9. REASONS FOR THE POOR STATUS OF<br />

E-GOVERNANCE PROJECTS<br />

In spite of the strong need for the nation, priority of the<br />

government and good support from the donor agency, the progress<br />

473<br />

of all the projects under ICTD program are very slow. The<br />

responsible reasons for the slowness are found to be as follows.<br />

The analysis is on the basis of the experience as a senior officer<br />

actively involving in e-governance programs since long and the<br />

review of the concerning literature. The problems have been listed<br />

on the basis of priority.<br />

i) Political Instability<br />

ii) Reluctance of conservative government officials to adapt to the<br />

new system<br />

iii) Lack of ICT Education among government officers and people<br />

iv) Poor Infrastructure and Connectivity<br />

v) Lack of sufficient electrical power supply in the nation.<br />

10. CONCLUSION<br />

Nepal, a politically unstable South Asian country, has initiated an<br />

ICT development program under the e-governance master plan of<br />

Nepal. And for this project, it has signed an agreement with the<br />

Asian Development Bank which contributed US$ 25 million, and<br />

formulated an action plan to complete eight projects focused on<br />

government efficiency, modernization of rural areas, and<br />

mobilization of the country’s existing human resources.<br />

However, the progress of the projects has been very slow and the<br />

deadline for commission, which was 14 th October 2010, was<br />

passed. Another action plan shifted the deadline to 31 st January<br />

2011 but again, no significant progress has been made till date.<br />

The main factors widely attributed for this are the factors that<br />

affect most third world nations: lack of political stability, lack of<br />

basic infrastructure like electrical facilities and connectivity, lack<br />

of education, and the reluctance of government officials and the<br />

people to adapt to a new system. Therefore, even though the<br />

bureaucracy has given a lot of priority to this project, based on<br />

current projections, its future looks grim.<br />

11. ACKNOWLEDGMENTS<br />

My sincere and respectful thanks go to my friends and officers<br />

involving in the national e governance campaign. I am grateful to<br />

the officers and team of Asian Development Bank (ADB)<br />

involved with ICTD project.<br />

12. REFERENCES<br />

[1] Brush up Online, HLCIT Dissolve : A regressive step,<br />

December 2011<br />

[2] Government of Nepal, E-Government Master Plan<br />

Consulting report, Kathmandu, Nepal, 2006<br />

[3] Government of Nepal, Information and Communication<br />

Development project (ICTD), September 2008<br />

[4] Ganesh Prasad Adhikari, National ID project of Nepal:<br />

future challenges, ACM Press, 2011<br />

[5] Nepal Telecom Authority, MIS report., December 2011<br />

[6] Ramro.org, Panel directs ministry not to dissolve HLCIT,<br />

nepali-news-ekantipur-en&news=344753, December 2011


Exploiting the FLOSS Paradigm in Collaborative<br />

e-Learning – Application to e-Government<br />

Sara Fernandes 1,2 , Antonio Cerone 1<br />

1 International Institute for Software Technology<br />

United Nations University<br />

P.O. Box 3058, Macao SAR, China<br />

+853 2871-2930<br />

{sara.fernandes, antonio}@iist.unu.edu<br />

ABSTRACT<br />

Modern societies face high demands for skilled professionals, able<br />

to successfully design, deploy and utilize complex Information<br />

Technology (IT) –enabled socio-technical systems at everincreasing<br />

levels of reliability and security. Contrary to traditional<br />

education practices, the high-level training required to fulfill this<br />

demand should rely on the principle that the learners are<br />

themselves responsible for their learning process, that they have<br />

control over this process, and that the process aims at developing<br />

cross-disciplinary and problem-driven competences, not only at<br />

acquiring content knowledge. However, such training requires the<br />

presence of a highly interactive, problem-oriented environment<br />

for technology-supported learning (or e-learning). This poster<br />

presents a doctoral research project, which aims at designing,<br />

validating and monitoring a collaborative e-learning environment<br />

based on the principles of Free/Libre Open Source Software<br />

(FLOSS). In order to validate its outcomes, the project will rely<br />

on two real-life professional training programs: in Software<br />

Engineering for software managers and in e-Government for<br />

public managers. The poster presents the objectives, research<br />

methodology and expected results from this project.<br />

Categories and Subject Descriptors<br />

J.1 [Administrative Data Processing]: Education, Government;<br />

K.3.1 [Computer Uses in Education]: Computer-Assisted<br />

Instruction (CAI); Computer-Managed Instruction (CMI)<br />

General Terms<br />

Design, Experimentation, Human Factors<br />

Keywords<br />

Education; Training; e-Learning; FLOSS; e-Government<br />

1. INTRODUCTION<br />

In Information Society (IS), the creation, distribution, diffusion,<br />

integration, use, and manipulation of information is a significant<br />

economic, political and cultural activity [1]. A major goal is<br />

creative and innovative use of IT to gain competitive advantage<br />

[1], for instance to improve the lives of citizens or to develop new<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

474<br />

Luis Soares Barbosa 2<br />

2 HASLab / INESC TEC<br />

University of Minho<br />

Campus de Gualtar, 4710 – 057, Braga, Portugal<br />

+351 25 360 - 4430<br />

lsb@di.uminho.pt<br />

economic opportunities. However, while IS relies on the diffusion<br />

of IT and the presence of a ubiquitous technological infrastructure<br />

[2], developing and utilizing such infrastructure and a whole range<br />

of components and services deployed on it, requires competent<br />

developers, managers and users. To this end, new educational<br />

methods, suited to the needs of IS, are needed.<br />

Contrary to traditional face-to-face teaching and learning, such<br />

methods should make use of IT to facilitate access to training and<br />

education, and to enhance the learning experience. In addition, the<br />

new educational methods should stress the learner's responsibility<br />

and control over his or her learning process, encourage the<br />

development of cross-cutting competences rather than mere<br />

acquisition of content knowledge, and offer highly interactive,<br />

problem-oriented environments to facilitate the process. Such<br />

principles have been already practiced for years by the FLOSS<br />

(Free/Libre Open Source Software) movement.<br />

This poster presents a research project, which aims at developing<br />

an innovative, light, adaptable and effective high-level e-learning<br />

environment based on the principles and tools underpinning the<br />

FLOSS paradigm. E-learning refers to the use of web-based<br />

technologies to facilitate the teaching and learning process and<br />

access to educational content. In particular, e-learning frees the<br />

learners from the limitations of time and space, allowing them to<br />

learn at their own place and pace [3]. Along its complex history,<br />

marked by the increased availability of computing resources and<br />

debates over the nature of knowledge and information, FLOSS<br />

changed the way societies think about software and introduced a<br />

cultural phenomenon underpinned by technological development,<br />

with the aim of contributing to public good through community<br />

work. FLOSS plays an increasing role in e-learning.<br />

The principles underlying the project are in line with the current<br />

thinking about education, which recognizes that fundamentally<br />

learning and development result from participation of students in<br />

social interactions and culturally-rich activities with other<br />

students, and that IT has the potential to mediate learning<br />

experiences and to support networked collaborative learning.<br />

The rest of this poster is structured as follows. Section 2 presents<br />

the research problem. Section 3 introduces the methodology and<br />

expected results. The final Section 4 explains the expected<br />

contribution of the project to e-Government education [4].<br />

2. RESEARCH PROBLEM<br />

The project aims to address three research questions: 1) What<br />

requirements should be fulfilled by a collaborative e-learning<br />

environment? 2) How is FLOSS, its principles, practices and tools<br />

applicable to collaborative e-learning environment? 3) How to<br />

validate that the proposed environment satisfies IS training needs?


Following the research objectives, obtained results will be<br />

validated through their contribution to professional training of<br />

Government Chief Information Officers (GCIOs).<br />

3. METHODOLOGY<br />

To address these questions, a research methodology has been<br />

proposed comprising the following steps (see Figure 1):<br />

1) Collaborative e-Learning Review – literature and project<br />

review to determine the state-of-the-art and state-of-practice<br />

in collaborative e-learning.<br />

2) Collaborative e-Learning Requirements – based on the<br />

review (1), synthesizing the key functional and nonfunctional<br />

requirements for collaborative e-learning.<br />

3) FLOSS Review – reviewing FLOSS-related literature and<br />

projects to determine the state-of-the-art and state-of-practice<br />

in the area.<br />

4) FLOSS Practice Assessment – based on the review (3),<br />

assessing existing educational practices within FLOSS to<br />

identify the emerging teaching and learning patterns.<br />

5) FLOSS Contributions – based on the FLOSS review (3) and<br />

assessment (4), identifying relevant FLOSS principles and<br />

practices that could be used in collaborative e-learning.<br />

Collaborative<br />

e-Learning Review<br />

Collaborative<br />

e-Learning Requirements<br />

FLOSS<br />

Review<br />

FLOSS<br />

Practice Assessment<br />

6) Collaborative e-Learning Solution – based on requirements<br />

for collaborative e-learning (2) and contributions by FLOSS<br />

(5), building FLOSS-based collaborative e-learning solution.<br />

7) Collaborative e-Learning Testing – testing the solution (6)<br />

using professional training program in Software Engineering.<br />

8) Collaborative e-Learning Validation – validating the tested<br />

(7) solution (6) through professional training program in e-<br />

Government; the program is explained in Section 4.<br />

The research is expected to produce the following contributions:<br />

1) Collaborative e-Learning – complete specifications of an<br />

innovative collaborative e-learning environment implementing<br />

peer-to-peer learning adopted from the FLOSS paradigm; 2) Peerto-Peer<br />

Learning Patterns – learning patterns discovered from the<br />

common practices in the FLOSS communities, contributing to<br />

peer-to-peer learning; and 3) Collaborative e-learning assessment<br />

– assessment model and guidelines to evaluate collaborative elearning,<br />

applied to the environment produced by this research.<br />

Figure 1: Peer-Production Approaches to e-Learning Research Methodology<br />

4. APPLICATION TO E-GOVERNMENT<br />

In the public sector, collaborative e-learning can be used for<br />

various purposes: 1) to share best practices between government<br />

agencies [5]; 2) to train civil servants on specific competencies<br />

and teamwork required in their jobs, for example building<br />

awareness on sustainable development issues among local<br />

government officials [6]; 3) to develop training for small and<br />

medium-size enterprises (SMEs) on how to engage in G2B<br />

services [3]; etc. As a result, a real-life e-government training<br />

program will be used to validate the proposed collaborative elearning<br />

solution, targeting IT competency and experience-sharing<br />

needs of public managers who utilize IT in citizen-focused<br />

government programs. In particular, training for Government<br />

Chief Information Officers, with its strong requirements for<br />

experience-sharing and network-building, will be targeted.<br />

5. ACKNOWLEDGEMENTS<br />

This work is funded partly by UNU-IIST and Macau Foundation<br />

through the PPAeL project, by European Regional Development<br />

Fund through COMPETE programme and by the Portuguese<br />

Foundation for Science and Technology through the FCOMP-01-<br />

0124-FEDER-007254 project. The authors wish to thank Elsa<br />

Estevez and Tomasz Janowski for their comments on earlier<br />

475<br />

FLOSS<br />

Contributions<br />

Collaborative<br />

e-Learning Solution<br />

Collaborative<br />

e-Learning Validation<br />

Collaborative<br />

e-Learning Testing<br />

versions of this paper. Also, the first author wishes to thank<br />

anonymous reviewers for valuable comments concerning her PhD<br />

research.<br />

6. REFERENCES<br />

[1] Wikipedia, Information Society, available at<br />

http://en.wikipedia.org/wiki/Information_society<br />

[2] Steinfield, C., and Salvaggio, J. Towards a Definition of the<br />

Information Society, in “The Information Society: Economic,<br />

Social, And Structural Issues”, edited by J. Salvaggio (1989).<br />

[3] Shyu, Stacy Huey-Pyng, Huang, Jen-Hung. (2011).<br />

Elucidating usage of e-government learning: A perspective<br />

of the extended technology acceptance model, Government<br />

Information Quarterly, vol. 28, no.4, pp.491-502.<br />

[4] Janowski, T, Estevez, E., and Ojo, A., "Conceptualizing<br />

Electronic Governance Education", 45th Hawaii International<br />

Conference on System Science (HICSS-45), Grand Wailea,<br />

Maui, Hawaii, IEEE Computer Society.<br />

[5] CIO Council, e-Training White Paper, EGOV Initiative, Best<br />

Practices Committee, available at http://www.cio.gov/<br />

Documents/etraining_white_paper.pdf.


[6] ICLEI, Electronic Distance Training on Sustainability in<br />

African Local Governments, available at http://www.iclei-<br />

476<br />

europe.org/products-activities?cmd=view&aid=27


From Inter-Agency Information Sharing to Open Data:<br />

A Case Study of Taiwan E-Government<br />

Tung-Mou Yang<br />

Department of Library and Information Science, National Taiwan University<br />

ABSTRACT<br />

Cross-boundary information sharing has been a thriving research<br />

field in e-Government which continues drawing researchers from<br />

various disciplines. Recently, open data has become an important<br />

policy among the government administrations around the world.<br />

Open data initiatives can be considered one type of crossboundary<br />

information sharing between government agencies and<br />

the public including businesses, nonprofit organizations, and<br />

individuals. While extensive research has been conducted in<br />

interagency information sharing, the proposed research intends to<br />

explore the open data initiatives in the context of Taiwan e-<br />

Government. The result of the research can be compared with<br />

those in interagency information sharing and also contribute to the<br />

current open data literature from an international perspective.<br />

Categories and Subject Descriptors<br />

H.4.2 [Information Systems Applications]: Type of Systems –<br />

e-Government Applications<br />

General Terms<br />

Management, Performance, Human Factors, Theory<br />

Keywords<br />

Information Sharing, Open Data, Electronic Government, Taiwan<br />

1. INTRODUCTION<br />

Cross-boundary information sharing in the public sector plays an<br />

important role to help government agencies act more efficiently<br />

and effectively [1-3]. Through interagency information sharing,<br />

government agencies can provide more integrated, accurate, and<br />

innovative services to the public [4]. Researchers have studied<br />

cross-boundary information sharing from different perspectives to<br />

understand its complexity. The following section presents some<br />

brief discussions.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

No. 1, Sec. 4, Roosevelt Rd., Taipei, 10617 Taiwan (R.O.C.)<br />

+886.2.3366.2970<br />

tmyang@ntu.edu.tw<br />

477<br />

2. RECENT RESEARCH IN CROSS-<br />

BOUNDARY INFORMATION SHARING<br />

In recent research, the purposes of cross-boundary information<br />

sharing are explored, and the shared information across<br />

government agencies can be initially categorized into five major<br />

types [5]. The identified five major types are data-oriented<br />

information, value-added information, administration-oriented<br />

information, administration-oriented knowledge, and domainoriented<br />

knowledge. Each type of shared information has<br />

respective influences on the information-sharing behaviors and<br />

intentions of government agencies while some information is<br />

easier to be prepared and shared, and some may be highly related<br />

to privacy and confidentiality.<br />

In order to understand the interactions of government agencies in<br />

information-sharing initiatives, a framework of boundary is<br />

proposed to identify various boundaries among government<br />

agencies from two dimensions, the vertical and horizontal<br />

dimensions [6]. The identified boundaries are hierarchical,<br />

departmental, personal, geographic, development level, process,<br />

and sectoral boundaries. The involved organizations are not<br />

limited to government agencies and public organizations.<br />

Organizations in the private sector such as banks are included.<br />

Researchers also investigate how information is shared across the<br />

boundaries of government agencies along with the development of<br />

information communication technologies [7]. Several frameworks<br />

are proposed to perceive how government agencies, influenced by<br />

various determinants, may adopt different kinds of ICT enabled<br />

approaches to share information in different circumstances<br />

In addition, there are multi-faceted factors such as barriers and<br />

enablers that bring either positive or negative impacts on<br />

information-sharing initiatives among government agencies.<br />

Different perspectives including technological, organizational,<br />

sociological, ideological, and political contexts are discussed<br />

extensively in the literature to explore the complexity of crossboundary<br />

information sharing in the public sector [1-3, 8].<br />

Furthermore, cross-boundary information sharing is usually<br />

defined as the collaboration and interconnection of different<br />

information systems or telecommunication technologies to share<br />

data between entities such as groups, departments, and<br />

organizations [9]. Gil-Garcia at al. [1] also indicate that crossboundary<br />

information sharing activities can be considered as IT<br />

projects and usually lead to organizational structure changing and<br />

business process reengineering. By using Delone and Mclean’s<br />

[10] information systems success model, Yang [4] develops a<br />

preliminary and enhanced model to discuss how government


agencies evaluate the effectiveness of cross-boundary information<br />

sharing in the public sector.<br />

3. CROSS-BOUNDARY INFORMATION<br />

SHARING AND OPEN DATA<br />

Overall, cross-boundary information sharing has been a thriving<br />

research field in e-Government and continues drawing researchers<br />

from various disciplines. The current research in literature mainly<br />

focuses on interagency information sharing. However, as<br />

researchers indicate, government agencies also share information<br />

to private enterprises or non-profit organizations, and a sectoral<br />

boundary is observed [6]. In addition, in recent years, open<br />

government has become an important policy among the<br />

government administrations around the world. In the<br />

memorandum on transparency and open government, Obama [11],<br />

the president of the United States, suggests that government<br />

should be transparent, participatory, and collaborative. He<br />

believes that information maintained by government is national<br />

asset. While consistent with law and policy, each government<br />

agency should disclose its possessed information in forms that the<br />

public can access and use. New information communication<br />

technologies should also be employed by government agencies to<br />

help put information online for the public. He also stresses that<br />

government agencies should cooperate with each other and with<br />

nonprofit organizations, businesses, and individuals to have the<br />

public engage in the work of government. Through public<br />

engagement, the efficiency and effectiveness of government can<br />

be enhanced and the quality of decision making can be improved<br />

by collective expertise and knowledge [11].<br />

Therefore, cross-boundary information sharing is not limited to<br />

government agencies. Under the consent of current law and<br />

regulation, government agencies are encouraged to provide their<br />

possessed data to the public for innovative and value-added<br />

purposes by using the collective intelligence and creativity. While<br />

highly related to open data initiatives, cross-boundary information<br />

sharing in e-Government should not include only government<br />

agencies but also the general public should be counted.<br />

4. THE PROPOSED RESEARCH<br />

While open data initiatives can be considered one type of crossboundary<br />

information sharing between government agencies and<br />

the public including businesses, nonprofit organizations, and<br />

individuals, the aforementioned research in the current<br />

information-sharing literature can be applied to open data<br />

initiatives to provide insights. For instance, what are the factors to<br />

influence government agencies’ intentions to participate in open<br />

data projects and to share data to the public? Whether the<br />

initiatives of interagency information sharing and the initiatives of<br />

open data share the same influential factors? In addition, open<br />

data are posted online and shared by using the newest ICTs. It is<br />

interesting to discuss whether the traditional IS theoretical<br />

frameworks such as TAM, UTATA, and IS Success theory can be<br />

applied to provide insights? It is also interesting to explore the<br />

information seeking behaviors of the public. When the public tries<br />

to retrieve governmental open data, what are the factors to<br />

influence its behaviors?<br />

By using case study methodology, the researcher of the proposed<br />

research is interested in investigating the current open data<br />

initiatives in Taiwan e-Government. Specifically, the following<br />

research questions will be explored:<br />

478<br />

1) In the setting of open data in e-Government, how are open<br />

data initiatives carried out by the Taiwanese governmental<br />

agencies?<br />

2) What are the critical factors that influence the open data<br />

initiatives in Taiwan?<br />

3) What is the nature of the impact of the factors on the open<br />

data initiatives?<br />

4) How do government agencies and the public evaluate the<br />

effectiveness of open data initiatives?<br />

The result of this exploratory research will be compared with the<br />

research result in cross-boundary information sharing among<br />

government agencies. Lastly, the research can also contribute to<br />

the current open data literature from an international perspective.<br />

5. REFERENCES<br />

[1] Gil-Garcia, J.R., I. Chengalur-Smith, and P. Duchessi,<br />

Collaborative e-Government: impediments and benefits of<br />

information-sharing projects in the public sector. European<br />

Journal of Information Systems, 2007. 16(2): p. 121-133.<br />

[2] Pardo, T.A. and G.K. Tayi, Interorganizational information<br />

integration: A key enabler for digital government.<br />

Government Information Quarterly, 2007. 24(4): p. 691-715.<br />

[3] Zhang, J. and S.S. Dawes, Expectations and perceptions of<br />

benefits, barriers, and success in public sector knowledge<br />

networks. Public Performance & Management Review, 2006.<br />

29(4): p. 433-466.<br />

[4] Yang, T.-M., Extending current theories of cross-boundary<br />

information sharing and integration: A case study of Taiwan<br />

e-Government, 2011, University at Albany, State University<br />

of New York: Albany, NY, USA.<br />

[5] Yang, T.-M. and Y.-J. Wu. Identifying the information types<br />

and the purposes of cross-boundary information sharing. in<br />

American Society for Public Administration Annual<br />

Conference, Public Administration without Borders. 2011.<br />

Balimore, Maryland, USA.<br />

[6] Yang, T.-M., L. Zheng, and T.A. Pardo, The boundaries of<br />

information sharing and integration: A case study of Taiwan<br />

e-Government. Government Information Quarterly, 2012.<br />

29(1): p. S51-S60.<br />

[7] Yang, T.-M. and T.A. Pardo. How is information shared<br />

across boundaries? in Hawaii International Conference on<br />

System Sciences. 2011. Koloa, Kauai, Hawaii, USA: IEEE<br />

Computer Society.<br />

[8] Gil-Garcia, J.R. and T.A. Pardo, E-Government success<br />

factors: Mapping practical tools to theoretical foundations.<br />

Government Information Quarterly, 2005. 22(2): p. 187-216.<br />

[9] Barki, H. and A. Pinsonneault, A Model of Organizational<br />

Integration, Implementation Effort, and Performance<br />

Organization Science, 2005. 16(2): p. 165-179.<br />

[10] DeLone, W.H. and E.R. McLean, The DeLone and McLean<br />

model of information systems success: A ten-year update.<br />

Journal of Management information systems, 2003. 19(4): p.<br />

9-30.<br />

[11] Obama, B. Memorandum on Transparency and Open<br />

Government. 2009 [cited 2012 March 3]; Available from:<br />

http://www.whitehouse.gov/the_press_office/Transparencyan<br />

dOpenGovernment.


479


From International Open Government Dataset Search to<br />

Discovery: A Semantic Web Service Approach<br />

Eric Rozell, John Erickson and Jim Hendler<br />

Tetherless World Constellation<br />

Rensselaer Polytechnic Institute<br />

110 8 th St, Troy, NY USA<br />

rozele@rpi.edu, erickj4@rpi.edu, hendler@cs.rpi.edu<br />

ABSTRACT<br />

In this poster, we will present the International Open Government<br />

Dataset Search (IOGDS). IOGDS is a faceted browsing interface<br />

for searching over more than one million open government<br />

datasets from around the world. We will present ongoing research<br />

and development towards the improved discovery and access to<br />

open government data. IOGDS has been designed around S2S, a<br />

framework for constructing user interfaces over Semantic Web<br />

services. We will discuss how the Web service abstraction layer<br />

in the S2S framework can be extended to support the use of<br />

external vocabularies to aid in the discovery of open government<br />

datasets. We will also discuss how the S2S framework can<br />

provide localization and context for non-expert users to improve<br />

the accessibility of open government data.<br />

Categories and Subject Descriptors<br />

H.3.4 [Information Storage and Retrieval]: Systems and<br />

Software – Semantic Web; H.5.2 [Information Interfaces and<br />

Presentation]: User Interfaces<br />

General Terms<br />

Management, Design, Standardization<br />

Keywords<br />

Linked Data, Service Middleware, Access and Accessibility,<br />

Open Government<br />

1. INTRODUCTION<br />

The International Open Government Dataset Search (IOGDS) is<br />

an ongoing project of the Tetherless World Constellation at<br />

Rensselaer Polytechnic Institute. IOGDS is an aggregated catalog<br />

of 1,028,054 datasets (and counting) from 43 countries and<br />

international organizations in 24 languages. The aggregated<br />

catalog uses a Resource Description Framework (RDF)<br />

vocabulary and a provenance-capturing data conversion tool to<br />

integrate datasets from various government data catalogs. IOGDS<br />

uses a graph-based query language, SPARQL [1], to request<br />

datasets using a variety of facets.<br />

We have constructed a faceted browsing interface in order to<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

480<br />

facilitate non-expert users in the discovery of open government<br />

datasets. The interface allows end-users to filter dataset results by<br />

keyword terms from titles and descriptions of datasets; data<br />

catalogs from which the datasets originated; countries of origin<br />

for the data catalogs; agencies responsible for the datasets; and<br />

category tags for the datasets. Figure 1 gives a snapshot of the<br />

current faceted browsing interface for IOGDS.<br />

This faceted browsing interface is developed with the S2S<br />

framework. S2S leverages semantically annotated Web services<br />

to perform the query operations required to implement faceted<br />

browsers and other user interface (UI) paradigms. For IOGDS,<br />

we have developed an OpenSearch 1 service that transforms simple<br />

HTTP requests into complex SPARQL queries over the integrated<br />

government data catalogs. S2S provides an abstract layer to make<br />

Web service requests; these requests can be adapted to numerous<br />

underlying Web service approaches (e.g., OpenSearch). A more<br />

detailed discussion of the IOGDS stack can be found in [2].<br />

In this paper, we discuss some of the current avenues of research<br />

and development for improving the discovery and accessibility of<br />

open government datasets using the S2S framework.<br />

2. TOWARD IMPROVED DISCOVERY<br />

AND ACCESS TO GOVERNMENT DATA<br />

S2S provides two useful capabilities for improving the discovery<br />

and accessibility of open government data: (1) a Web service<br />

abstraction layer that “grounds” semantic requests into specific<br />

Web service requests and (2) a presentation framework that<br />

renders results from Web service queries. The former can be used<br />

to enable the use of external vocabularies (mapped in some way to<br />

local vocabularies) for constraining dataset searches. The latter<br />

can be used to localize Web service responses or to make<br />

additional requests that will help contextualize the search.<br />

2.1 S2S Web Service Abstraction Layer for<br />

Linked Data Facets<br />

A semantic request to S2S specifies the URI of a search service,<br />

the URI of a query operation, and the URI of a set of inputs used<br />

in the operation. The Web service abstraction layer in S2S<br />

transforms these abstract requests into requests for specific to a<br />

type of Web service (e.g., OpenSearch, WSDL). We can also<br />

transform inputs from one vocabulary into another vocabulary,<br />

based on mappings between the two. This effectively increases<br />

the possible facets available to slice-and-dice the data becomes<br />

1 OpenSearch Specification, http://www.opensearch.org


more and more valuable with the growing amounts of linked data<br />

and mappings between linked data resources on the Web.<br />

As a concrete example, consider the faceted browsing interface<br />

for IOGDS. One of the facets for IOGDS is the country of origin<br />

for the data catalog. However, consider a case where a user is<br />

interested in continent of origin for a dataset instead of country of<br />

origin. IOGDS use DBPedia 2 URIs in its country of origin<br />

metadata for dataset catalogs. An external source of continental<br />

data, with mappings from continents to DBPedia URIs for<br />

countries on those continents, can be used to populate a facet for<br />

continents. The Web service abstraction layer in S2S handles the<br />

transformation (using vocabulary mappings) from continents to<br />

countries.<br />

We have implemented this behavior in an ad hoc way for a<br />

biological and chemical oceanography data catalog [3]. We used<br />

mappings from catalog specific dataset parameters to an external<br />

source of parameter categories. This enabled a more abstract<br />

facet for data products that could be used by a broader community<br />

of users. We are currently creating a generic architecture that<br />

supports “facet mappings” at the abstract Web service layer in<br />

S2S.<br />

2.2 S2S Presentation Framework for<br />

Localization and Context<br />

S2S provides a presentation framework for developing UI<br />

widgets. Widgets can be created to support facet constraint and<br />

presentation of results in a UI. There are a number of ways to<br />

leverage this presentation framework to improve the accessibility<br />

of government dataset search interfaces such as IOGDS.<br />

One of those options is to provide a widget that performs<br />

localization of the information based on settings in the browser.<br />

Going back to the countries facet example, before a user is<br />

presented with facet options in the countries facet, the localization<br />

widget could make a request to DBPedia to retrieve a humanreadable<br />

label for the user’s localization settings. As such, an<br />

English user would see “United States” in the countries facet, and<br />

a French user would be presented with “États-Unis.” This same<br />

sort of localization could occur in other facets, such as dataset<br />

categories, assuming there was some external source of this<br />

localization data. Localization at the UI layer can reduce<br />

redundancy in required metadata for open government datasets by<br />

leveraging the vast corpus of linked data already available on the<br />

Web. It also adds value to dataset catalog service providers who<br />

adopt localizable vocabularies (with little added effort).<br />

Another option is to use the presentation framework to provide<br />

different kinds of context for the search. For instance, instead of<br />

presenting the countries facet as a list of options, the information<br />

could be presented as a heat map where countries with available<br />

datasets are highlighted more brightly. There are numerous ways<br />

presentation “widgets” can be designed to help contextualize the<br />

search experience. Providing this kind of context will enable<br />

users to gain broader insights about open government data in<br />

addition to enabling the discovery of individual datasets.<br />

2 DBPedia, http://dbpedia.org/<br />

481<br />

Figure 1: A screenshot of the IOGDS faceted browsing<br />

interface. In this example, the user first constrained his<br />

search with the term “asthma”, and is presented with a<br />

variety of facet values representing the remaining results.<br />

3. CONCLUSION<br />

We have discussed some of the current directions in IOGDS to<br />

help improve discovery and accessibility of open government<br />

datasets. Documentation on S2S framework can be found on the<br />

Web at http://tw.rpi.edu/web/project/sesf/workinggroups/s2s.<br />

You can also try out the IOGDS faceted browsing interface at<br />

http://logd.tw.rpi.edu/demo/international_dataset_catalog_search.<br />

4. ACKNOWLEDGMENTS<br />

The work on the S2S Framework has been supported by the<br />

Semantic eScience Framework project in the Tetherless World<br />

Constellation at RPI, NSF Office of Cyberinfrastructure award<br />

number OCI-0943761. Partial funding for the work on IOGDS<br />

has been provided by a gift from Microsoft Research to the<br />

Tetherless World Constellation at RPI.<br />

5. REFERENCES<br />

[1] E. Prud’hommeaux and A. Seaborne, SPARQL Query<br />

Language for RDF, W3C Recommendation, 15 Jan. 2008.<br />

http://www.w3.org/TR/rdf-sparql-query/<br />

[2] J. Erickson, E. Rozell, Y. Shi, J. Zheng, L. Ding, J. Hendler.<br />

2011. TWC International Open Government Dataset Catalog.<br />

In Proceedings of the 7th International Conference on<br />

Semantic Systems (I-Semantics '11), Chiara Ghidini, Axel-<br />

Cyrille Ngonga Ngomo, Stefanie Lindstaedt, and Tassilo<br />

Pellegrini (Eds.). ACM, New York, NY, USA, 227-229.<br />

[3] Rozell, E., Wang, H., West, P., Zednik, S., Fox, P. (2011),<br />

Configurable User Interface Framework for Data Discovery<br />

in Cross-Disciplinary and Citizen Science, Abstract<br />

EGU2012-12859 presented at General Assembly 2012, EGU,<br />

Vienna, Austria, 22-27 April


482


Implementation of Integrated Tax System COTS product<br />

Uyanga Sambuu<br />

Department of Information System,<br />

National University of Mongolia<br />

Ulaanbaatar, Mongolia<br />

976-99114369<br />

uyanga@num.edu.mn<br />

ABSTRACT<br />

This paper tries to address a number of issues, problems and<br />

challenges currently facing while implementing ITS COTS<br />

solution in the Mongolian Tax Administration (MTA). The paper<br />

describes the gap between expectation of MTA towards positive<br />

impact of improved Tax Information system through COTS<br />

product and the real situation of the implementation of the product<br />

as well as serious risks confronting the new Tax Information<br />

System that is currently under replacement.<br />

Categories and Subject Descriptors<br />

H.4.0 [Information Systems Application]: General –<br />

Information System, Data processing and exchange.<br />

General Terms<br />

Management<br />

Keywords<br />

Tax Information System, e-Government Service, Integrated Tax<br />

System Commercial Off-The-Shelf, COTS, Tax Administration<br />

Information System, Mongolian Tax Administration<br />

1. IMPLEMENTATION PROGRESS OF ITS<br />

COTS IN MONGOLIA<br />

The use of the Commercial Off-The-Shelf (COTS) to implement<br />

technical solutions is becoming increasingly popular in<br />

government such as education, defense, taxation, customs,<br />

healthcare and others, as well as in commercial sectors such as<br />

telecommunication, insurance, banking and financial services.<br />

Selecting and implementing a COTS product represents a<br />

significant investment and partnership with a software vendor. To<br />

realize return on this investment, IT managers must consider at<br />

least four criteria in selecting a product [1]:<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Zolbayar Chuluunbat<br />

Governance Assistance Project,<br />

General Department of Taxation,<br />

Ulaanbaatar-210646, Mongolia<br />

976-91019908<br />

zolbayar@mta.mn<br />

483<br />

Esbold Unurkhaan<br />

Computer Science and Management<br />

School<br />

Mongolian State Technical University<br />

Ulaanbaatar, Mongolia<br />

976-99091335<br />

esbold@mstu.edu.mn<br />

• Functionality. How well do the COTS products meet the<br />

business and user requirements as defined in the requirements<br />

phase?<br />

• Architecture. How closely do the COTS products meet the<br />

technical requirements and align with the organization’s<br />

technical architecture and policy?<br />

• Lifecycle costs. What are the complete lifecycle costs of<br />

implementing and operating the COTS product?<br />

• Vendor. How stable are the vendor and product line?<br />

The Government of Mongolia also has made significant progress<br />

in implementing e-governance programs specifically encourages<br />

the enhancement of MTA’s operational processes and information<br />

technology. To this end the MTA started replacing current inhouse<br />

developed tax information system with COTS Solution<br />

within “Supply, Customization, Installation, Commissioning and<br />

Support of Tax Administration Information System” sub-project<br />

of the World Bank funded Governance Assistance Project since<br />

April 2011.<br />

The selected system is a Tax ITS COTS solution and therefore all<br />

functionality is provided out-of-the-box and ready for<br />

configuration. It allows the Client to have a total taxpayercentered<br />

view, improve services to taxpayers and the efficiency of<br />

administrations. Configuration can therefore be linked to a<br />

specific module or function in a layer with minimal impact on<br />

other areas of the system [3].<br />

Hence the decision to select the Tax ITS COTS was made as such<br />

based on assumption that new Tax Administration Information<br />

System (TAIS) can improve the effectiveness of the MTA through<br />

the availability of more accurate and timely information and the<br />

use of risk management tools to select taxpayers for audit<br />

purposes, and increase the quality of the services provided to<br />

taxpayers’ thus facilitating the taxpayers’ voluntary compliance.<br />

It has been over a year now, but to date the expected results have<br />

not been reached, for which explanation are provided in following<br />

sections.<br />

2. FINDINGS AND LESSONS LEARNED<br />

The contract period with the Supplier of COTS Product is for 16<br />

months, unfortunately the contract now has fallen much behind<br />

the schedule and TAIS now remains at risk of failure in spite of<br />

repeated actions of the MTA, the Client to mitigate the risks. As<br />

an organization, which intended to acquire COTS Product, the<br />

Client clearly defined its business needs and requirements


properly and completely. All procurement procedures to select the<br />

vendor was followed. So question arises “what went wrong?”.<br />

This can be assessed by both Supplier and Client’s point of view.<br />

Now it appears that following major points on which the Client<br />

failed and should have given careful consideration on the<br />

selection of the best vendor:<br />

1. Obtain hands-on experience with the system by organizing<br />

study tour or visit another organization that is operating the<br />

same COTS prior to Contract award to the Supplier;<br />

2. Obtained sufficient successful track records to confirm the<br />

maturity of the product;<br />

3. Establish comprehensive performance measures (including<br />

cost, time spent on each activity, etc.) and implement the<br />

COTS;<br />

4. Exercise a close, continuous, and active partnership among<br />

the COTS provider, and other stakeholders to achieve the<br />

maximum benefits from using COTS products.<br />

From the Supplier’s side the following drawbacks occur on which<br />

an immediate action to overcome is required:<br />

1. While the new software development methodology (called<br />

SCRUM) being used by the Supplier is acceptable, it has not<br />

been correctly followed to date;<br />

2. In particular, development is done in a series of “Sprints”<br />

that add functionality and features to the TRIPS product<br />

being developed. The active participation of the Client’s staff<br />

in the development of “User Stories” for each Sprint has<br />

been lacking due to the Supplier’s limitation to invole the<br />

Client and most importantly these User Stories are<br />

deliverables that have not been submitted to the Client as<br />

required in the Project Plan [4];<br />

3. There is no obvious link to TAIS Contract’s Requirements as<br />

of yet in the SCRUM Methodology so it is difficult for the<br />

Client to understand how the COTS will satisfy these<br />

requirements.<br />

4. Lack of expertise of the Supplier’s team with the COTS<br />

system, and insufficient on-site presence of technical experts;<br />

484<br />

5. Communication between GDT and DJV remains less than<br />

satisfactory;<br />

3 CONCLUSION<br />

ITS COTS products started to get market traction<br />

approximately 10 years ago. There are drawbacks and<br />

benefits in implementing ITS COTS Product [5]. With the<br />

current contract with the Supplier of the COTS product, the<br />

Client now sees more drawbacks because of the Supplier’s<br />

methodology working “behind the scene” without involving<br />

the Client to fit its requirements with ITS COTS Product.<br />

To put everything on right track, the both parties should<br />

strictly understand that the COTS Product Implementation<br />

and its sustainment require a close, continuous, and active<br />

partnership among the customer, COTS provider, and user. It<br />

concerns the need for the customer, COTS provide, and user<br />

to be prepared to cost, schedule, performance, and operations<br />

and maintenance concepts to achieve the maximum benefits<br />

from using COTS products. Knowledge Transfer is key to<br />

TAIS being a sustainable solution for the Client and can be<br />

achieved through continuous cooperation.<br />

4 REFERENCES<br />

[1] C. Todd Couts., Patrick F. Gerdes., “Integrating
COTS<br />

Software: Lessons from a Large Healthcare Organization”,<br />

IEEE Computer Society, 2009<br />

[2] Uyanga, S., Zolbayar, Ch., Modernization of Tax<br />

Information System for Improved E-Government Services,<br />

ICEGOV 2010, Beijing, Conference Proceedings, pp 183-<br />

187, 2011<br />

[3] Document of the World Bank. Governance Assistance<br />

Project. Report (Aug. 2012), 16-20.<br />

[4] Project Plan for “Supply, Customization, Installation,<br />

Commissioning and Support of Tax Administration<br />

Information System”, 2012<br />

[5] Carol Sledge, David Carney, “SEI Monographs on the Use of<br />

Commercial Software in Government Systems: Case Study:<br />

Evaluating COTS Products for DoD Information Systems”,<br />

Carnegie Mellon, Software Engineering Institute, 1998


Information Sharing in Inter-departmental Collaboration: A<br />

Conceptual Framework for Local Government Authorities<br />

Alinaghi Ziaee Bigdeli<br />

Brunel University<br />

Kingston Lane, UB8 3PH<br />

Uxbridge, United Kingdom<br />

cspgaaz@brunel.ac.uk<br />

ABSTRACT<br />

This research attempts to develop a socio-technical framework for<br />

Inter-departmental Electronic Information Sharing (EIS) in Local<br />

Government Authorities (LGAs).<br />

Categories and Subject Descriptors<br />

H.0 INFORMATION SYSTEMS GENERAL<br />

General Terms<br />

Management, Security, Human Factors, Standardization<br />

1. INTRODUCTION<br />

Decision-making over adopting Inter-Organisational Information<br />

Systems (IOIS) that facilitate information sharing in an electronic<br />

manner has become in the centre of attention of researchers and<br />

practitioners in the field of information systems. It can be argued<br />

that a conceptual framework that examines EIS in LGAs is very<br />

limited. Several drawbacks can be identified regarding the<br />

existing frameworks as they: (1) mainly focus on either<br />

organisational or technological side of EIS, and do not look at the<br />

effort from a socio-technical perspective, (2) concern mainly<br />

about sharing information in Federal/Central governments, (3) do<br />

not map the influential factors on different stages of decisionmaking<br />

phases and (4) do not prioritise the influential factors<br />

based on their importance on different stages of decision-making<br />

process.<br />

2. EIS CONCEPTUAL FRAMEWORK<br />

2.1 Factors Influencing EIS in LGAs<br />

In this section, it is attempted to provide a rich and broad picture<br />

of five main areas influencing any IOS initiative (i.e. EIS) based<br />

on the procedural framework of Inter-organisational Systems’<br />

adoption proposed by Kurnia and Johnston [1]; (a) External<br />

Environment, (b) Capability of Organisation, (c) Technology<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Muhammad Kamal<br />

Brunel University<br />

Kingston Lane, UB8 3PH<br />

Uxbridge, United Kingdom<br />

Muhammad.Kamal@<br />

brunel.ac.uk<br />

485<br />

Sergio de Cesare<br />

Brunel University<br />

Kingston Lane, UB8 3PH<br />

Uxbridge, United Kingdom<br />

Sergio.deCesare@brunel.ac.uk<br />

Environment, (d) EIS Characteristics, and (e) Inter-departmental<br />

Environment. First factor group, External Environment, proposes<br />

that certain conditions outside the focal organisation may affect<br />

the decision to adopt any inter-organisational collaboration.<br />

Regarding EIS in LGAs, these factors include any pressure from<br />

outside the specific local authority (e.g. from the Central<br />

Government) that influence the department’s decision on sharing<br />

information electronically. Second factor group, Capability of<br />

Organisation, observes the capability of the focal organisation in<br />

adopting those innovations that require collaboration among its<br />

sections and departments. Third group of factor, Nature of<br />

Technology, considers all technological factors which require the<br />

establishment of any IOIS. It can be argued that LGAs suffer from<br />

what may be termed as “IT lag time” that means there is a large<br />

gap between the adoption of new technologies and its acceptance<br />

and reutilisation across the entire organisation. Forth group of<br />

factor, EIS characteristic, refers to all attributes of electronic<br />

information sharing such as benefits and costs that influence the<br />

decision over sharing information. In addition to these four areas,<br />

the decision over EIS incorporates extra influences arising from<br />

complex and dynamic interaction among different departments<br />

and their suppliers, known as Inter-departmental Environment.<br />

Nevertheless, these factors have yet to be evaluated through real<br />

and practical cases and therefore the researchers propose the<br />

following research proposition for further investigation:<br />

Research Proposition A – Proposed Factors Influencing EIS:<br />

The proposed factors may influence the decision-making on EIS in<br />

inter-departmental collaboration in LGAs.<br />

2.2 Investigating the Phases of Participation<br />

Rogers [2] indicates that an adoption process is the process in<br />

which an individual or agency first, experiences the knowledge of<br />

innovation, second, alters the attitudes towards that innovation,<br />

third, makes decision to adopt or reject, and last, implements and<br />

confirms the decision. Regarding inter-departmental information<br />

sharing in LGAs, it would be vital to clarify the stages in which<br />

each department goes through prior to information sharing effort.<br />

These stages that lead to institutionalisation of EIS within LGAs<br />

might be conceptualised as temporal consequences in which the<br />

agencies pass through from the initiation phase to sustainability.<br />

After analysing innovation adoption literature on private and<br />

public sector, the researchers propose five phases of decisionmaking<br />

for EIS; (a) Incentive that refers to the state when a<br />

department within an LGA is asked or wishes to share information<br />

electronically with another department, (b) Conception that<br />

signifies a plan of action that the agency should pursue. In the


context of EIS, this phase may consist of a set of questions to be<br />

answered by the LGA department prior to sharing information.<br />

(c) Proposal that indicates the formal proposition for adopting any<br />

kind of innovation within an organisation. In the context of EIS,<br />

the proposal can be done through any kind of protocol or set of<br />

agreed principles on sharing personal or confidential information,<br />

(d) Participation Decision that refers to the actual phase in which<br />

the department takes the decision on adopting the specific<br />

innovation. Regarding the EIS initiative, a final decision should<br />

be made when the department has passed through all the above<br />

stages; and (e) Sustainability that refers to the stage in which an<br />

organisation begins to realise the need for strategic changes<br />

towards the use of innovation.<br />

Research Proposition B – EIS Participation Lifecycle: The<br />

departments within an LGA might pass through numerous phases<br />

prior to final decision on EIS with other departments.<br />

2.3 Mapping Factors on Participation Phases<br />

It is worth examining the mapping of EIS participation factors on<br />

participation phases in LGAs. The actual mapping would be<br />

carried out after conducting the empirical research and we<br />

propose the following research proposition to be investigated:<br />

Research Proposition C – Mapping EIS Factors on the<br />

participation Phases: The factors influencing EIS participation in<br />

inter-departmental collaboration in LGA can be mapped on<br />

different phases of participation to support the decision-making<br />

processes of EIS.<br />

2.4 Investigating the Prioritisation of Factors<br />

It should be indicated that prioritisation of factors and identifying<br />

which factor(s) is more important should take into account as it<br />

enables the organisation to improve the procedure of decisionmaking<br />

[3, 4]. Saaty [5] argued that the development of<br />

prioritisation is strongly reliant on the judgement of individuals<br />

within the organisation who involve in the phenomenon.<br />

However, because of the different roles, responsibilities, attitudes,<br />

and backgrounds within the organisation, the individuals may<br />

present different judgement on the prioritisation of factors.<br />

Therefore, to a great extent, prioritisation of factors may<br />

determine whether or not inter-department information sharing<br />

effort would have a constructive result(s). Thus the following<br />

research proposition can be proposed for further investigation:<br />

Research Proposition D – Prioritisation of Factors influencing<br />

EIS: Prioritisation of the factors in each participation phase can<br />

improve the decision-making process of EIS in LGAs.<br />

The arguments reported in previous sections (Section 2.1 to<br />

Section 2.4) prove that the role of factors, participation phases,<br />

mapping of factors on participation phases, and prioritisation of<br />

factors on the participation phases based on their importance<br />

should take into consideration prior to EIS in LGAs. The<br />

researcher proposes that the research propositions (RP-A to RP-D)<br />

should be examined jointly. In doing so, a detailed conceptual<br />

framework for EIS in LGAs is proposed in Figure 2.<br />

3. RESEARCH METHOD<br />

An interpretive, exploratory case study approach will be<br />

employed in order to investigate and analyse the research<br />

propositions. The reason for selecting this approach is that we<br />

486<br />

seek to understand the human thoughts on EIS efforts within the<br />

social and organisational context surrounding the initiative since<br />

the social world cannot be reduced to isolated variables.<br />

Moreover, For the purpose of this study, semi-structured interview<br />

will be utilised as the main data collection technique. Prior to the<br />

interviews, some structured questions to be used as the interview<br />

agenda and some open-ended questions will be prepared.<br />

Political Pressure<br />

(F1)<br />

Inter-­‐Org. Leadership<br />

(F5)<br />

IT Capabilities (F9)<br />

Factors Influencing Participation in EIS (RI – A) Participation Phases<br />

(RI – B)<br />

External Environment<br />

Cost of Sharing<br />

Information (F13)<br />

Business Process<br />

Compatibility (F16)<br />

Economic Pressure (F2)<br />

Return on Investment<br />

(F6)<br />

Data Security and Privacy<br />

(F10)<br />

Capacity of Organisation<br />

Technology Environment<br />

EIS Characteristic<br />

Benefits of Sharing<br />

Information (F14)<br />

Legislation and Policy<br />

Principals (F3)<br />

Network Collaboration<br />

Culture (F7)<br />

Information Quality<br />

(F11)<br />

Inter-­‐departmental Environment<br />

Inter-­‐Departmental Trust<br />

(F17)<br />

Risk of Sharing<br />

Information (F15)<br />

Critical Mass (F18)<br />

Factors Incentive Conception Proposal Participation<br />

Decision<br />

F1<br />

F2<br />

F3<br />

F4<br />

…<br />

F18<br />

Community Pressure<br />

(F4)<br />

Organisation Size (F8)<br />

Technical<br />

Interoperability (F12)<br />

MAPPING FACTORS INFLUENCING PARTICIPATION IN EIS<br />

ON PARTICIPATION LIFECYCLE PHASES (RP – C)<br />

PRIORITISING THE IMPORTANCE OF FACTORS ON<br />

PARTICIPATION LIFECYCLE PHASES (RP – D)<br />

Sustainability<br />

Factors Incentive Conception Proposal Participation<br />

Sustainability<br />

Decision<br />

F1<br />

F2<br />

F3<br />

F4<br />

…<br />

F18<br />

Phase 1<br />

Incentive<br />

Phase 2<br />

Conception<br />

Phase 3<br />

Proposal<br />

Phase 4<br />

Participation Decision<br />

Phase 5<br />

Sustainability<br />

Figure 2: Conceptual Framework for EIS Participation in LGAs<br />

4. REFERENCES<br />

[1] KURNIA, S. AND JOHNSTON, R.B. 2000. The need for a<br />

processual view of inter-organizational systems adoption. The<br />

Journal of Strategic Information Systems 9, 295-319.<br />

[2] ROGERS, E.M. 1995. Diffusion of innovations. Free Pr, .<br />

[3] HUANG, S.M., CHANG, I.C., LI, S.H. AND LIN, M.T. 2004.<br />

Assessing risk in ERP projects: identify and prioritize the factors.<br />

Industrial Management & Data Systems 104, 681-688.<br />

[4] SALMERON, J.L. AND HERRERO, I. 2005. An AHP-based<br />

methodology to rank critical success factors of executive<br />

information systems. Computer Standards & Interfaces 28, 1-12.<br />

[5] SAATY, T.L. 1986. Axiomatic foundation of the analytic<br />

hierarchy process. Management science 841-855.


Interagency Collaboration in Providing Public Services in<br />

Russia: a Legal Perspective<br />

ABSTRACT<br />

This paper analyzes the legal aspects of sharing interagency<br />

information in order to provide electronic public services in<br />

Russia. Normative acts describing the provision process for 644<br />

federal public services were analyzed. The goals implemented in<br />

the research were twofold: first, to identify and second, to<br />

prioritize those services that require interagency collaboration.<br />

Recommendations based on Russian experience in developing an<br />

incremental legal framework for providing public services are<br />

formulated as well.<br />

Categories and Subject Descriptors<br />

J.1. [ADMINISTRATIVE DATA PROCESSING]: Government<br />

General Terms<br />

Management, Legal Aspects<br />

Keywords<br />

Public Services Provision, Single Window, Interagency<br />

Information Sharing, Administrative Regulation<br />

1. INTRODUCTION<br />

In 2004 the Russian government launched a Federal Program “the<br />

Public Administration Reform” to make the governing process<br />

centered around citizens’ needs. The key goal of public<br />

administration reform in Russia is to improve the quality of the<br />

public services provided. To achieve this goal, the federal<br />

government used two technological solutions launched in 2009 to<br />

implement interoperability among federal agencies. This enables<br />

citizens with a single window to access public services [1]. The<br />

Interagency Electronic Exchange System (IEES) is a transport<br />

layer for exchange of electronic documents on federal and<br />

regional levels of government. The federal one-stop shop eservices<br />

portal www.gosuslugi.ru serves as a single window to<br />

access all public services online. Unfortunately, technological<br />

solutions did not make the lives of the citizens easier in their<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Evgeny Styrin and Andrey Zhulin<br />

National Research University<br />

Higher School of Economics<br />

101000 Moscow<br />

str. Myasnitskaya 20<br />

+7 495 621 39 87<br />

estyrin@hse.ru, a.zhulin@hse.ru<br />

487<br />

interaction with federal public agencies. The process of obtaining<br />

services continues to be provided mostly in paper form. The goal<br />

of this paper is to outline bottlenecks mostly in legal and partly in<br />

organizational issues that the Russian federal public agencies face<br />

in implementing the electronic public services provision online.<br />

To this end, we analyzed 644 administrative regulations that are<br />

agency normative acts describing service standards and<br />

peculiarities of the provision process<br />

2. EVOLUTION OF THE PUBLIC<br />

SERVICES LEGAL FRAMEWORK IN<br />

RUSSIA<br />

Government Order № 1555 (2009) established a clear plan for<br />

transforming public services maturity from a public information<br />

paper publication to an online transaction, with service processing<br />

traces and results easily obtained in electronic form by citizens.<br />

However, Federal Law № 210 “About public and municipal<br />

services provision in the Russian Federation” (2010) plays a key<br />

role. It states that every public service must have administrative<br />

regulation that states the citizens’ rights to control and claim<br />

public service provision and quality results (timeliness, payment<br />

method and size, and grounds for refusal).<br />

3. RESEARCH METHODS<br />

All the data about public services were taken from an official<br />

information system called the Public and Municipal Services<br />

Register (PMSR). Documents were analyzed for each service<br />

input and output. By input documents we mean all the necessary<br />

(according to administrative regulation) documents a citizen or<br />

organization must have to successfully initiate or apply for a<br />

service. By output documents we mean the results of providing<br />

the service (passport, license, permission, etc.).<br />

To understand whether a service is eligible for interagency<br />

collaboration (we will call it “a complex service”) we classified<br />

the documents needed to apply for the service: personal<br />

documents (e.g., a citizen’s ID, passport, military status<br />

documents, school diplomas, property rights references, social<br />

security card, and individual taxpayer number), documents<br />

provided by the agency to which the citizen applies for the<br />

service, documents provided from other agencies, and auxiliary<br />

documents (required only as a part of an application package for<br />

some other service). According to our definition, a complex<br />

service for at least one input document needs at least one<br />

interaction with one or several other agencies for at least one type<br />

of citizen – a services user. We underscore that the complexity of


public services depends on the citizen’s social status when he or<br />

she applies for it. For example, to obtain a passport for a sailor<br />

necessitates going through different procedures in the Federal<br />

Migration Service than would be done for a pensioner. We define<br />

auxiliary services as those services that result in producing<br />

exceptional auxiliary documents.<br />

4. RESEARCH FINDINGS<br />

Among the 644 federal public services analyzed in our research,<br />

the need to apply for interagency information sharing was found<br />

in 364 services (56.5%). In 82 public services (12.7%) we found<br />

that it was necessity to perform interactions between authorities at<br />

different government levels (federal and regional). There are 237<br />

federal public services that request payment confirmation (it is<br />

considered as a separate document) (36.8%). An overall document<br />

exchange among federal agencies is necessary in 408 out of 644<br />

public services. There are 305 documents, which, according to<br />

Federal Law №210, must be exchanged among the agencies<br />

without the citizen’s participation. Next, we will present the 5<br />

most popular documents used in the exchange process among<br />

Russian federal agencies to provide public services.<br />

Table 1. Popularity of documents used in the interagency<br />

information exchange<br />

Agency Name of the document Rating<br />

Ownership<br />

by citizens<br />

in paper<br />

form<br />

2012. This will remain a challenge for the agencies due to the lack<br />

of resources. That is why we propose an incremental strategy or a<br />

“citizen’s value proposition” business model for the Russian<br />

Government [2]. This requires the step-by-step involvement of<br />

public services and their related input as well as interagency<br />

collaboration with output documents. In this model the public<br />

services have either a new design or the existing public services<br />

have been redesigned. In this way, needed changes in the legal<br />

framework have been made and the needs of specific groups of<br />

citizens have been met.<br />

In the first stage we propose to integrate only complex services<br />

owned exclusively by federal agencies without the participation of<br />

third party organizations. This means excluding citizens’ personal<br />

storage (paper documents with photo ids issued by the agency<br />

processing the application) and auxiliary documents from the<br />

interagency exchange. In other words, we propose to concentrate<br />

on 17% of the documents (51 documents) that are eligible for the<br />

interagency sharing process. The burden of providing such<br />

documents in paper form to citizens is insignificant but they<br />

would benefit from faster, more tangible outcomes with electronic<br />

information sharing and would trust the project more. Incremental<br />

strategy works because many governmental information systems<br />

either do not always contain the right information or any<br />

information about the citizen. We recommend that federal<br />

agencies “clean up” their e-records as fast as possible by<br />

improving the quality and quantity of citizens’ personal data.<br />

Federal<br />

Tax<br />

Service<br />

Registry<br />

Office<br />

Individual entrepreneur<br />

or legal entity (company)<br />

registration certificate<br />

Reference from the joint<br />

national Registry on<br />

property rights and deals<br />

118<br />

93<br />

Yes<br />

No<br />

o<br />

6. CONCLUSIONS<br />

The interagency information sharing process is aimed at providing<br />

high-quality public services in Russia. To that end, public<br />

managers should take the following actions in an international<br />

context:<br />

Constantly modify an agency’s legal base by formalizing services provision<br />

with it<br />

processes and resolving legislative lockups and impasses;<br />

Federal<br />

Tax<br />

Service<br />

Federal<br />

Tax<br />

Service<br />

Federal<br />

Tax<br />

Service<br />

Documents confirming<br />

registration at tax offices<br />

Reference from the joint<br />

registry of legal entities<br />

(companies) and<br />

individual entrepreneurs<br />

Accounting and financial<br />

reports<br />

72<br />

45<br />

23<br />

o<br />

Yes<br />

o<br />

No o<br />

Yes o<br />

Formalize all difficult cases in an exchange of documents and manage them<br />

in a joint data base with the help of professional experts;<br />

Define which documents and citizens’ personal data are to be shared with<br />

other agencies through IEES;<br />

Improve the quality of data bases containing citizens’ personal data relevant<br />

to agency activities. Keep e-records of all the documents ever issued to the<br />

citizens;<br />

Establish clear requirements regarding the form and number of documents<br />

(paper or electronic) of a service that citizens can initiate by themselves;<br />

It is important to mention that among the 305 documents o that Avoid are multiple responsibilities and clarify the redistribution of powers in<br />

involved in an interagency exchange, 254 of them, according service to ownership and the delivery of results.<br />

the current legal framework in Russia, are possessed in o paper Increase ICT literacy and information system usage skills on a permanent<br />

form by citizens. In other words, citizens need to make basis. a<br />

preliminary visit to the proper authority before applying for a<br />

service with regard to only 51 out of 305 documents.<br />

7. REFERENCES<br />

There are only 4 complex services that need to share more than 10<br />

documents and about 70 services that need to share 3 to 6<br />

documents among the agencies. The remaining services need to<br />

exchange only 1-2 documents among the agencies.<br />

[1] Bent, S., Kernaghan K., Marson D. Innovations and Good<br />

Practices in Single Window Service, Citizen-Centered<br />

Service Network, Canadian Center for Management<br />

Development, 1999.<br />

5. INTERAGENCY COLLABORATION<br />

[2] Joha A., Janssen M., Types of Shared Services Business<br />

Models in Public Administration. In Proceedings of the 12th<br />

TRANSITION PROCESS IN RUSSIA<br />

Annual International Conference on Digital Government<br />

Federal Law №210 requires the agencies not to ask for any paper<br />

documents from public service applicants starting from July 1,<br />

Research (DG.O 2011) (Univ. of Maryland, College Park,<br />

MD, USA, June 12-15, 2011), ACM, 2011, 26-3<br />

488


489


Monitoring Methods of e-Governance Development<br />

Assessment: Comparative Analysis of International and<br />

Russian Experience<br />

Lyudmila Bershadskaya, Andrei Chugunov, Dmitrii Trutnev<br />

eGovernment Center<br />

National Research University of Information Technologies, Mechanics and Optics (NRU ITMO)<br />

V.O., Birzhevaya line, 14, office 270; 199034, St.Petersburg, Russia; +7812-457-1796<br />

ABSTRACT<br />

In this paper the analysis of e-governance monitoring methods is<br />

given. The article includes international measurement techniques<br />

description.The authors introduce expert poll methodology for egovernance<br />

development assessment and the results of it’s<br />

application in Russia.<br />

Categories and Subject Descriptors<br />

K.4 Computers and Society; K.6 Management of Computing and<br />

Information Systems; H.1 Models and Principles; H.4.2<br />

[Information Systems Applications]: Type of systems –<br />

e-government applications<br />

General Terms<br />

Research framework, e-government, e-governance<br />

Keywords<br />

e-governance, e-government, monitoring, assessment, expert poll<br />

1. INTRODUCTION<br />

The global practice contains plenty of monitoring and assessment<br />

systems of e-governance development focused both on<br />

quantitative and quality characteristics of the research theme.<br />

Nevertheless not all methods and assessment criteria can be<br />

applied to the analysis of the experience of a certain country.<br />

The study of global experience in this field allows to define<br />

e-government rankings, e-services assessment methodology, the<br />

foresight techniques. The UN e-Government Development Index<br />

(3 evaluation directions, 53 indicators) and Waseda University<br />

World e-Government Ranking (7 evaluation directions, 20<br />

indicators) are examined in the poster [1, 2].<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

{analytics, chugunov, trutnev}@egov-center.ru<br />

490<br />

2. INTERNATIONAL EXPERIENCE<br />

OF E-GOVERNANCE ASSESSMENT<br />

Each of the described methods has several levels of assessment.<br />

The table below (Table 1) provides the results of this comparison<br />

based on 3-level measurement system (the number in the second<br />

column indicates the level of assessment occupied by Waseda’s<br />

Level 1 measurement in the ranking of the UN).<br />

Table 1. Assessment level comparison between<br />

Waseda University Ranking and UN e-Government<br />

Development Index<br />

Waseda Univ.<br />

World<br />

e-Gov Ranking<br />

Network<br />

Preparedness /<br />

Infrastructure<br />

Management<br />

Optimization /<br />

Efficiency<br />

Required<br />

Interface-<br />

Functioning<br />

Applications<br />

National Portal-<br />

Homepage<br />

Government<br />

CIO<br />

Level<br />

UN e-Government Development<br />

Index<br />

1 Telecommunication Infrastructure<br />

Component<br />

0 No<br />

0 Partly compatible with Online Services<br />

Component Class C (One-stop-shop for<br />

online services, Downloadable forms,<br />

Online forms, Job opportunities, Online<br />

transactions)<br />

3 Online Services Component Class A<br />

(Existence of a one-stop-shop national<br />

portal)<br />

3 Online Services Component Class A<br />

(Chief Information Officer (CIO), or<br />

similar officer with a leadership role, to<br />

manage national cross-agency e-gov.<br />

programmes/projects<br />

0 No<br />

e-Government<br />

Promotion<br />

e-Participation / 2 Online Services Component Class D<br />

Digital<br />

(Citizen participation /<br />

Inclusion<br />

interconnectedness)<br />

N/a 1 Human Capital Component<br />

International indices allow the cross-country comparisons<br />

conducting, however, it can not be used to analyze the situation in<br />

the specific country. In this connection the system of indicators to<br />

measure the level of electronic services development in the<br />

European Union (the development of Capgemini) should be


noted. The list of basic e-services (12 - for people, 8 - for<br />

business) allows to assess the level of services providing in the<br />

EU countries. It is based on a 5-level scale: the lack (0) and the<br />

availability of services by improvement.<br />

There is not established system of monitoring the e-governance<br />

development currently in Russia, which allows you to evaluate<br />

this phenomenon not only from the quantitative, statistical<br />

characteristics, but also from the perspective of improving the<br />

quality of services provided.<br />

3. EXPERT POLL APPLICATION FOR<br />

THE ANALYSIS OF E-GOVERNMENT<br />

E-Government Center NRU ITMO has launched a set of<br />

sociological researches dedicated to the challenges of<br />

e-government development in Russia and solution approach<br />

thereof. The purpose of expert poll held in autumn 2011 was to<br />

study the difficulties of e-government development identification<br />

and to make recommendations for the best results of<br />

e-government implementation. During the research 66 experts<br />

were interviewed. Three areas have been studied in frame of the<br />

research: e-government development issues, its solutions and<br />

preferable communication channels.<br />

In the course of the study, experts have proposed various solutions<br />

to e-government development issues, based on their experience<br />

(Table 2).<br />

Table 2. Experts’ solutions<br />

for e-government development problems (Russia)<br />

No Issue Solution<br />

1 Unachievable<br />

deadlines for goals<br />

(3,8 points)<br />

2 Lack of e-legislation<br />

development<br />

coordination<br />

(3,8 points)<br />

3 The practice of egovernment<br />

development doesn’t<br />

match development<br />

standards of large<br />

information systems<br />

(3,7 points)<br />

� Targeting must comply with the SMART<br />

criteria (Specific, Measurable, Achievable,<br />

Realistic, Timely)<br />

� The need to create a separate authority<br />

with responsibility for e-government and<br />

information society development and<br />

regulatory base formation<br />

� Coordinated, coherent and consistent state<br />

policy conducting with vertically<br />

integrated control system<br />

� 4 major components of online service<br />

providing standardization on the base of egovernment<br />

architecture<br />

� Usage of positive international experience<br />

The authors of the poster have tried to present a research<br />

technique based on the results of reflection on the variety of the<br />

best state-of-practice methods in a unified scheme (Fig. 1). The<br />

authors recognized the need to shift the research focus from<br />

simple components of assessment to complex ones. The existing<br />

monitoring methodology proves the necessity of scientific<br />

foresight application. In this regard, the experience of the<br />

European foresight, which identified priorities for the ICT<br />

program of the EU countries, could be useful. The integration<br />

between e-government development and administration reform is<br />

an important task in current situation [3].<br />

The authors believe that the research methodology and tools<br />

should be developed not only for Russia but for the post-Soviet<br />

countries - in particular the Commonwealth of the Independent<br />

State (CIS).<br />

491<br />

QUANTITATIVE<br />

METHODS<br />

Integral indicators<br />

(indexes & rankings)<br />

Web-monitoring<br />

methods<br />

Statistical reports<br />

Public opinion poll<br />

EXPERT<br />

POLL<br />

FORESIGHT<br />

QUALITY<br />

METHODS<br />

Reviews Recommendations Forecasts<br />

Test purchase<br />

Content analysis<br />

methods<br />

Focus groups<br />

Web-portal analysis<br />

(content, usability…)<br />

Figure 1. E-government development<br />

and Information Society monitoring methods<br />

4. CONCLUSIONS<br />

1. Countries with the high level of quantitative indicators’<br />

development (IT infrastructure, Human capital) can get higher<br />

positions in the UN e-Government development Index. On the<br />

contrary, the group of top leader countries consists of states with<br />

highly developed quantity indicators (management optimization<br />

etc.). Positions of countries in each rating differ because of the<br />

disparity of indicators’ weight and analysis focus. For instance,<br />

Human capital component doesn’t fit in Waseda methods of<br />

estimation. This component is traditionally high in Russian<br />

Federation. This fact explains the lower position of Russia in this<br />

ranking.<br />

2. In case of building a system of assessing the level of egovernment<br />

in a particular country the technique of the EU<br />

online services evaluation is appropriate to use (in adapted form).<br />

It should be noted that the basis of this method is approved the<br />

enlarged list of priority e-services.<br />

3. The authors proposed the assessment methodology which can<br />

be used to measure the e-governance development in other<br />

countries. The authors believe that expert polls conduction,<br />

standing in line with the global research practices, provides the<br />

qualitative assessment, reasonable forecasts and recommendations<br />

for e-governance evaluation in the country.<br />

REFERENCES<br />

[1] United Nations e-Government Surveys. [E-source]:<br />

http://www.unpan.org/Home/tabid/1243/language/Library/M<br />

ajorPublications/UNEGovernmentSurvey/tabid/646/<br />

language/en-US/Default.aspx<br />

[2] The 2012 Waseda University World e-Government Ranking.<br />

[E-source] http://www.e-gov.waseda.ac.jp/ranking.htm<br />

[3] Ojo, A., Janowski, T. Integrating Electronic Government and<br />

Public Administration Reform Strategies: Method and<br />

Experience. In Global Strategy and Practice of<br />

E-Governance: Examples from Around the World. Eds.<br />

Danilo Piaggesi, Kristian Sund, Walter Castelnovo. 2011,<br />

102-123.


Moroccan E-Government Ten Years Evolutions<br />

ABSTRACT<br />

While the Northern Africa region performed better in the 2010<br />

UN E-Government Survey with 0.3692, Morocco take just<br />

0.3287. Morocco leads the region with the highest internet and<br />

infrastructure telecommunication ratio per 100 inhabitants.<br />

The aim of this paper is to outline the historical evolution of egovernment<br />

in Morocco and the effort make by Government to<br />

develop the Digital government, a court description of Morocco<br />

digital plan 2013 initiate by the actual government to lead and<br />

empower society through the utilization of ICT.<br />

Categories and Subject Descriptors<br />

H.4.2 [Information Systems Application]: Type of Systems<br />

General Terms<br />

Measurement<br />

Keywords<br />

Moroccan e-Government, Maturity Models<br />

1. INTRODUCTION<br />

The e-government is defined as the use of information and<br />

communication technologies in its relationship with the<br />

administered, employees and partners is the major difficult project<br />

to implement. The e-government in Morocco follows the<br />

experience of other countries in Europe and America. The egovernment<br />

implementation in Morocco is based on seven major<br />

functions: information accessibility, flexibility of utilization,<br />

democratization of information, connected agencies, system<br />

interoperability, security and privacy protection; and services<br />

based on citizen and business lifecycle events.<br />

The workflow of this implementation is based on 4 steps:<br />

o The inventory of procedures and administrative forms;<br />

o The simplification of those administrative procedures;<br />

o The vulgarization of simplified administrative procedures<br />

through web site to inform citizens and gather their remarks.<br />

o The management of those procedures through ICT based on<br />

roles definition (RACI Models)<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Mohamed Mohyi Eddine EL AICHI<br />

Isert, ENSIAS, University Mohamed V<br />

BO BOX 713, Agdal Rabat<br />

Morocco<br />

661 199076. 212<br />

melaichi@intelcom.co.ma<br />

492<br />

This study presents Moroccan E-Government ten years evolution<br />

in order to present weakness of the actual models and how will<br />

improve it. The first section presents the first phase of Egovernment<br />

in Morocco. The second section presents the Morocco<br />

Numeric 2013 Vision. The third section presents the weakness of<br />

actual plan and how can it improve. The conclusion presents the<br />

need of government maturity adoption to insure the government<br />

transformation.<br />

2. THE LAST TEN YEARS E-<br />

GOVERNMENT IN MORROCO<br />

The Electronic Administration project in Morocco starts at the<br />

earliest of 1999 by defining more than ten years program through<br />

four phases: 1) 1999-2003: Brainstorming and analyzing; 2) 2004-<br />

2005: Training and planning; 3) 2006-2008: Governance<br />

implementation, and 4) 2009-2012: Government transformation.<br />

The goals of this project were: 1) to develop information systems<br />

development to increase productivity and performance, 2)<br />

strengthening communication between government agencies to<br />

improve decision-making process, 3) to improve service to<br />

citizens and business: quality, proximity, accessibility, ease and<br />

cost, and 4) strengthening the integrity and transparency<br />

in relations with users.<br />

Moroccan Government adopts Gartner E-government Maturity<br />

Models defined on 2000 as result of Brainstorming and analyzing<br />

phase. This model focuses on citizen-centric and grounds on<br />

technology, organizational and managerial feasibility stage.<br />

Technically the Moroccan government sites are heterogeneous;<br />

they are built based ASP.Net (majority), JSP, PHP and static<br />

pages. Some web site use Open Source CMS or commercials<br />

solutions to manage content, the others update directly on pages or<br />

through customized development. In terms of design, much of the<br />

government sites doing well. Unfortunately, it seems that<br />

ergonomics has been forgotten in favor of good design: font’s too<br />

small, truncated text, navigation menus are difficult to find or use,<br />

see some of the items blank or incomplete. The transactional<br />

services are limited in majority to online request where citizen or<br />

business can fill forms and wait for call or must be present in<br />

government agencies to accomplish its request.<br />

The portal maroc.ma, supposed as consolidate web site or unique<br />

web site access, presents more weakness. The design is not<br />

attractive. The website is built using static pages and few<br />

dynamics pages. It’s an institutional web site without online<br />

public services integration and contains the same content picked<br />

from other government web site (kingdom work, primary minister<br />

work, etc.). The public service web site ‘service-public.ma’ offers


the description of procedure for more than 70 public’s services.<br />

The evolution of this site must be to transform those procedures to<br />

transactional application forms and template to download.<br />

To encourage public service to empower its organization,<br />

Moroccan government had launch since 2005 e-government<br />

awards “e-mtiaz” for excellence in e-government to incite public<br />

service to implant or develop more e-service. This program is<br />

replaced in 2008 by new vision morocco digital 2013 after failed<br />

to create integrate services.<br />

After ten years, the e-government implantation was not a success<br />

story. It’s important to note that after this long period, the<br />

transformation through ICT presents multiple problems and<br />

majority of project consume budget, time and effort without reach<br />

the real result. Some announced project failed. Public service in<br />

Morocco doesn’t have attractive content, service and interface to<br />

be classed as 100 solicited web site in Morocco and less that 16<br />

services were operational and were applied to business to<br />

simplified government relationship and check.<br />

3. MOROCCO DIGITAL PLAN 2013:<br />

TARGETS AND SERVICES<br />

Morocco digital plan was built around a clear vision and<br />

ambitions for Morocco. The aim is to use the e-Government<br />

projects to modernize the government and local governments to<br />

serve citizens and businesses. It uses ICT to reconfigure the<br />

process in depth, making them effective and efficiency, fully<br />

geared to serve citizens and business. The goal for 2011 is to<br />

complete commitment from other emerging countries and by<br />

2013, to be at their level of utilization of e-government services.<br />

To achieve those objectives, four key indicators have been<br />

identified: 1) United Nations readiness ranking evolution from 0,2<br />

to 0,8, 2) E-government project evolution from 16 services to 89,<br />

3) Growth of IT business turnover more than 100 million, and 4)<br />

Ranked e-government site in top 100 are more than 5.<br />

3.1 Public Services<br />

Morocco Digital 2013 aims to offer a panoply of services required<br />

by citizen and business lifecycle evolution. The complete list is<br />

available and other resource relying to e-government in Morocco<br />

at www.egov.ma. This section presents a selection of services<br />

offered to citizens and businesses.<br />

3.1.1 Citizen Services<br />

Public Service Description<br />

Electronic National Manual service to store citizen data<br />

Identity Card<br />

Biometric Passport This service offers the possibility to<br />

www.passeport.ma track the evolution of the biometric<br />

passport request.<br />

e-justice, @dala This service offers a database of the<br />

law in morocco from 1912. The<br />

database is not updated.<br />

Citizen Unique This project aims to identify Citizen<br />

identification for all integrated services<br />

Marital status This services aims to provide<br />

administrative paper to citizen<br />

E-Consulat<br />

This service aims to answer Moroccan<br />

reside in foreign countries requests<br />

E-Tax<br />

This service aims to provide a web site<br />

to pay local tax on line<br />

493<br />

3.1.2 Business Services<br />

Public Service Description<br />

Simple IS, Simple Tax Service declaration for<br />

TVA<br />

Business<br />

B@DR Custom online service<br />

CNSS<br />

Online service to declare<br />

employees social subscription<br />

Business<br />

This project aims to get Business<br />

identification unique identification<br />

Entrepreneurship This services aims to provide an<br />

online service to declare business<br />

3.2 E-Participation Web Site<br />

The objective of e-participation initiative is to improve citizen<br />

access to public services information and their participation in<br />

decision making.<br />

Moroccan government launches several initiatives, including:<br />

o Fikra: The Suggestion Box to Administration Improvement<br />

o Laws Commenting: Citizens may comment laws<br />

o Satisfaction survey and suggestion box on the government<br />

o Department websites starts providing forms to measure user<br />

satisfaction or get feedback.<br />

4. MOROCCO DIGITAL 2013 AND T-GOV<br />

Moroccan government through its program to transform the<br />

society as digital communities is a challenge. To success this<br />

ambition Moroccan government had invest in infrastructure and<br />

promote more oriented service like biometric passport, driver<br />

license and digital national card. This investment take morocco at<br />

the range 126 with 0,32 in the UN e-Government survey in 2010<br />

earning 14 places. Take a good place is the goal of the Morocco<br />

Digital 2013, Moroccan government must think more how to<br />

transform its structure to insure the real integrated government.<br />

Like other developing countries, Moroccan E-gov encountered the<br />

problem of how to manage efficiency the cost associated with its<br />

IT, how success the integration of the offered services. The next<br />

step is to rethink this plan by integrating the KPI attached to<br />

return on investment and mange citizen differently. Some projects<br />

must be split to smaller project to earn on realization visibility.<br />

Moroccan government must also prioritized project like Unique<br />

Citizen or Business Identification and Inter-government Buses.<br />

5. CONCLUSION<br />

By adopting the Morocco digital 2013, Moroccan Government<br />

decide to improve its performance and empower citizen and<br />

business through the integration of ICT. The adoption of ICT is<br />

the first step in restyling Moroccan government. By the way, the<br />

Moroccan government must rethinking its offer through adopting<br />

IT Service management as repository to manage its offer, to align<br />

with the citizen and business needs and to readapt a maturity<br />

models that improve public services life cycle according a<br />

government enterprise architecture.<br />

6. REFERENCES<br />

[1] United Nations E-Government Survey 2010.<br />

[2] United Nations E-Government Survey 2008.<br />

[3] Kim, H. (2009), Maturity Model based on quality concept of<br />

Enterprise Information Architecture.


[4] Stratégie Nationale pour la Société de l’Information et de<br />

l’Économie Numérique.<br />

494


Opportunities for Improving eGovernment: Using<br />

Language Technology in Workflow Management<br />

ABSTRACT<br />

Workflow management deals with a fair amount of free text –<br />

scanned paper documents, web input forms, e-mail, input from<br />

mobile devices as well as texts from government agencies to<br />

citizens. The free-text input is intended for a human reader. Still,<br />

in eGovernment settings we would like to process such input<br />

before, while and after handling officers read it. This paper<br />

presents some examples on how language technology can increase<br />

efficiency and quality of workflow management.<br />

Categories and Subject Descriptors<br />

H.4.1 [Information Systems Applications]: Workflow<br />

management; H.5.2 [User Interfaces]: Natural language; I.2.7<br />

[Natural Language Processing]: Text analysis<br />

General Terms<br />

Algorithms, Human Factors, Languages.<br />

Keywords<br />

Workflow management, document analysis, language technology.<br />

1. INTRODUCTION<br />

The citizens’ communication with government agencies are today<br />

to a large extent text-based, although telephone, and face-to-face<br />

meetings are still used. The approaches to communication differ at<br />

least within the Swedish government, which is the area of our<br />

research. Some agencies have chosen to prioritize some specific<br />

communication channel (e.g. telephone, or the web), some other<br />

agencies has opened up all different channels for communication<br />

including social media (e.g. Facebook). Nevertheless, most of this<br />

communication is text-based, and in some way most of the<br />

information that should be saved and archived has to be<br />

transformed to written text, which means opportunities for<br />

automatic text analysis using language technology [6].<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Ola Knutsson, Eriks Sneiders, Alyaa Alfalahi<br />

Department of Computer and System Sciences<br />

Stockholm University<br />

Forum 100, SE-164 40 Kista, Sweden<br />

+46 8 16 16 84<br />

{knutsson, eriks, alyalfa}@dsv.su.se<br />

495<br />

This paper is about using language technology in governments’<br />

workflow processes, and how the technology could be used with<br />

Workflow Management Systems (WfMS), and similar systems<br />

relevant in the citizen-government interaction and communication<br />

loop. The aim is to increase efficiency and quality. Efficiency is<br />

for instance about using internal resources better, and to give<br />

citizens decisions faster. Quality includes to use handling officers’<br />

competencies in a better way, or to get better knowledge of the<br />

context for a case, even including what happens outside the<br />

government agency, including what people think about the<br />

specific government agency, and its services. The quality aspects<br />

could to a large extent be described as improvement of the<br />

government’s business intelligence.<br />

What is Language technology? “The goal of this new field is to<br />

get computers to perform useful tasks involving human language,<br />

tasks like enabling human-machine communication, improving<br />

human-human communication, or simply doing useful processing<br />

of text or speech.“ [6] Although the field has always been<br />

followed by too high expectations of “linguistic intelligence”, the<br />

practical use of natural language processing has always been<br />

there. The frontiers of practical use of LT are constantly moving.<br />

No one could have missed the great improvement of statistical<br />

machine translation the last years.<br />

A workflow management system is used for the management of<br />

business processes [2]. Workflow management systems are used<br />

in many organizations, and the market is big. There exist a huge<br />

number of workflow management systems, with several systems<br />

from the large software developers, but also many in-house<br />

developed systems. Services based on language technology could<br />

be applied before, during and after the workflow processes. In the<br />

following section we will look into phases in the workflow where<br />

language technology have been applied in previous research. Our<br />

approach is to analyze where in the workflow language<br />

technology could be used, and not on what current workflow<br />

management systems allow.<br />

2. USING LANGUAGE TECHNOLOGY IN<br />

WORKFLOW MANAGEMENT<br />

The use of language technology has been studied in areas useful<br />

in workflow management for quite a long time now (cf. [1]). The<br />

research topics range from Optical Character Recognition, which<br />

is important in the process of digitalization, to different levels of<br />

document understanding [4]. In the following we have identified


how language technology has been or could be used in relation to<br />

some but not all of the processes in workflow management.<br />

In a Workflow Management System (WfMS), the triage and<br />

routing of cases/tasks are an important part, and automatic means<br />

could be used to make this step more efficient. If the case or the<br />

carrier of the case includes accessible text, language technology<br />

could improve this process, by routing the task to a handling<br />

officer who knows the area of the task, this could be done using<br />

text categorization. An experiment with document routing was<br />

carried out by [10]. They used a very limited part of the textual<br />

resources, such as references and subject lines, in their<br />

experiment.<br />

When looking at businesses outside government, “trouble tickets”<br />

have been analyzed [11]. One could see the use of the same<br />

techniques within a government agency, here the “trouble tickets”<br />

could for instance concern reports from the citizens about<br />

“problems” in their neighborhood, which then could be mined<br />

about problem areas of a specific kind in the whole community. In<br />

the paper by Ku et al [8] information extraction was used on<br />

police reports, newspaper articles, and victims’ and witnesses’<br />

reports. This is an interesting example of how a system could<br />

combine extracting information from sources on the “inside”<br />

(police reports, victims’ and witnesses’ reports) with the outside<br />

world (newspaper articles), and how the extraction of people,<br />

places, vehicle names and other entities from both sides could<br />

give a broader picture of an event.<br />

E-mail is a common channel to contact an organization and to<br />

initiate a case. Knutsson et al. [7] discusses the benefits of<br />

automated e-mail answering in large organizations, as well as a<br />

number of tools and techniques useful for e-mail processing in<br />

eGovernment settings. Most early e-mail answering systems used<br />

machine learning and pursued the task of text classification.<br />

Similar to the text classification task is matching incoming e-mail<br />

messages to a list of frequently asked questions (FAQs). Iwai et<br />

al. [5] makes an observation that 30-40% of an e-mail flow<br />

addresses often reoccurring topics, and presents a system for<br />

developing an FAQ list and matching these FAQs to future emails.<br />

Question-answering systems answer single-sentence questions. In<br />

closed domains dealing with one or few subjects, automated FAQ<br />

retrieval has proved practical. Recently, template based<br />

techniques have gained more attention. Samarakoon et al. [9]<br />

presents a help-desk application where each FAQ is associated<br />

with hand-written text patterns that match future queries.<br />

Statistical n-gram matching and ranking algorithms are applied. A<br />

more “intelligent” alternative to FAQ retrieval are chatbots alias<br />

conversational agents alias dialogue systems; these systems<br />

maintain a dialog with the user. Deryugina [3] lists a number of<br />

chatbot applications in customer care, which is relevant for<br />

eGovernment.<br />

3. CONCLUSIONS<br />

In this paper we have discussed the use of language technology in<br />

several different areas of workflow management. Language<br />

technology could increase efficiency by task routing and<br />

automatic answering, and some of the techniques even prevent<br />

some of the citizens’ cases from becoming part of the workflow.<br />

The use of language technology in business intelligence might<br />

increase quality by giving organizations a better picture of the<br />

496<br />

information on the inside, but also what is going on outside the<br />

government agency.<br />

4. REFERENCES<br />

[1] Abecker, A., Bernardi, A., Maus, H., Sintek, M. and Wenzel,<br />

C. Information supply for business processes: coupling<br />

workflow with document analysis and information retrieval.<br />

Knowledge-Based Systems, 13 (2000), 271-284.<br />

[2] Bae, H., Hu, W., Yoo, W. S., Kwak, B. K., Kim, Y., and<br />

Park, Y. Document configuration control processes captured<br />

in a workflow. Comput. Ind. 53, 2 (February 2004), 117-131.<br />

[3] Deryugina, O.V. Chatterbots. Scientific and Technical<br />

Information Processing, 37, 2 (2010), 143–147.<br />

[4] Esposito, F., Ferilli, S., Teresa M.A. Basile, T.M.A., and Di<br />

Mauro, N. (2008). Machine Learning for Digital Document<br />

Processing: from Layout Analysis to Metadata Extraction,<br />

Studies in Computational Intelligence (SCI) 90 (2008), 105–<br />

138.<br />

[5] Iwai, K., Iida, K., Akiyoshi, M., and Komoda, N. (2010). A<br />

help desk support system with filtering and reusing e-mails,"<br />

In Proceedings of the 8th IEEE International Conference on<br />

Industrial Informatics (INDIN 2010),(Osaka, Japan, 13-16<br />

July, 2010), 321-325.<br />

[6] Jurafsky, D. and Martin, J. H. Speech and Language<br />

Processing: An Introduction to Natural Language<br />

Processing, Computational Linguistics, and Speech<br />

Recognition, Prentice Hall, Upper Saddle River, NJ, 2008.<br />

[7] Knutsson, O., Pargman, T. C., Dalianis, H., Rosell, M., and<br />

Sneiders, E. Increasing the Efficiency and Quality of E-mail<br />

Communication in eGovernment Using Language<br />

Technology. In Proceedings of the IFIP e-government<br />

conference (EGOV 2010), (Lausanne, Switzerland, August<br />

29-September 2, 2010). Trauner Verlag, Linz, Austria, 45-<br />

52.<br />

[8] Ku, C. H., Iriberri, A., and Leroy, G. Natural Language<br />

Processing and e-Government: Crime Information Extraction<br />

from Heterogeneous Data Sources. In Proceedings of the 9th<br />

Annual International Digital Government Research<br />

Conference, (Montreal, Canada, 2008).<br />

[9] Samarakoon, L.; Kumarawadu, S.; Pulasinghe, K. Automated<br />

question answering for customer helpdesk applications. In<br />

Proceedings of 6th IEEE International Conference on<br />

Industrial and Information Systems (ICIIS 2011), (Kandy, Sri<br />

Lanka, 16-19 August 2011) IEEE, 328-333,<br />

[10] Soares, C. and Calejo, M. Intelligent Document Routing as a<br />

First Step towards Workflow Automation: A Case Study<br />

Implemented in SQL. ISoLA (1) 2010: pp. 276-284.<br />

[11] Temprado, Y., Molinero, F. J., Garcia, C. and Gomez, J.<br />

Knowledge Discovery from Trouble Ticketing Reports in a<br />

Large Telecommunication Company. In Proceedings of the<br />

2008 International Conference on Computational<br />

Intelligence for Modelling Control & Automation (CIMCA<br />

'08). IEEE Computer Society, Washington, DC, USA, 37-4


Prioritization and Geo-Spatiotemporal Hotspot Detection of<br />

Forest Loss Hotspot Using NDVI as a Response Variable<br />

Koli Rajesh E., Rao Anil G., Rane Gauri M.<br />

JalaSRI, M. J. College,<br />

Jalgaon(MH)-425002, India<br />

rek.jalasri@gmail.com, raoag_jal@rediffmail.com,<br />

gmr.jalasri@gmail.com<br />

ABSTRACT<br />

Forest loss is spatial and temporal issue of concern for any<br />

governance. Due to limitation of man power, money or resources<br />

the issue requires first to point out most critical area i.e. Geospatiotemporal<br />

hotspot and then prioritize it so the most needed<br />

area always concern first.Geo-spatiotemporal hotspot detection is<br />

a scan statistical process that identifies a region exhibiting<br />

characteristics of interest (unusual, anomaly, outbreak, critical<br />

resources area) over the period. The hotspot detection is a<br />

statistical process. It requires geospatial dataset as an input which<br />

includes two variables for hotspot detection, Size or Population<br />

and Response or Cases. In deforestation hotspot detection, size<br />

variable is a total area of forest while response variable is a<br />

deforested area. In this paper we figure out deforestation hotspot<br />

using Normalized Difference Vegetation Index (NDVI) as a<br />

response variable. The paper presents and elaborates algorithm<br />

that causes use of NDVI as a response variable. This paper<br />

discusses the multi-criteria or multi-indicator ranking methods<br />

using Partially Order Set (POSET) which uses as a prioritization<br />

tool.<br />

Categories and Subject Descriptors<br />

H.3.3 [Information Search and Retrieval]: Clustering, G.3<br />

[PROBABILITY AND STATISTICS]: Statistical Software,<br />

Markov Processes, Distribution Functions<br />

General Terms<br />

Measurement, Documentation, Performance, Experimentation,<br />

Theory, and Verification<br />

Keywords<br />

NDVI, Hotspot detection, PULSE, Remote Sensing, Geo-<br />

Spatiotemporal, POSET, Prioritization<br />

1. INTRODUCTION<br />

The forest loss or deforestation is very important concern of every<br />

government and the issue is spatial and temporal. Detection of<br />

deforestation within the forest is very difficult job for manual<br />

survey. Tracking of different time series data and do analysis on it<br />

is not possible manually. NDVI is a very reliable and more<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

497<br />

Joshi Manish R.<br />

Department of Computer Science<br />

North Maharashtra University,<br />

Jalgaon(MH)-425002,India<br />

joshmanish@gmail.com<br />

accurate process of detecting deforestation. Using NDVI data we<br />

can generate input data for hotspot detection where total area of<br />

forest per unit is a size variable and forest loss area is a response<br />

variable for the hotspot detection.<br />

The Land Use Land Cover (LULC) is currently used to determine<br />

the forest area and forest loss area. Both the methods of LULC i.e.<br />

supervised classification and unsupervised classification ignores<br />

the very small patches of forest loss within the forest area and<br />

very small patches of forest with in the waste land area, whereas<br />

NDVI can give more exact measurements.<br />

Many times due to the limitation of man power and resources to<br />

handle situation of hotspot zone for concerned problem ranking<br />

and prioritization of the hotspot zone are needed. Also concern<br />

issue always has multiple indicators to consider. For example<br />

forest loss due to low rainfall, human population, forest,<br />

encroachment etc. So the multi-criteria ranking and prioritization<br />

toolbox is used as a decision support tool in this paper.<br />

As a case study we represent hotspot identification for<br />

deforestation in Satpuda hill region of Maharashtra State in India.<br />

The case study uses LISS III satellite images of December -2007<br />

to calculate forest loss using NDVI.<br />

The remaining paper is organized as follows. Section 2 provides<br />

general background information of geospatial hotspot detection,<br />

its software tools, NDVI, prioritization and its software tools. The<br />

steps for using NDVI as a response variable in hotspot detection<br />

are presented in section 3. Section 3 delineates the methodology<br />

used to obtain the data with the help of NDVI and the process of<br />

hotspot detection and prioritization. A case study of identification<br />

of deforestation hotspot is presented in section 4. The conclusions<br />

are presented in section 5.<br />

2. BACKGROUND<br />

2.1. Geospatial Hotspot Detection<br />

A scan statistic is commonly used in geospatial hotspot detection.<br />

A geospatial region is tessellated into ‘cells’. Data from the region<br />

in the form of responses from individual cells are available. One is<br />

interested in identifying a cellular zone, if one exists, with<br />

unusually elevated response compared with the rest of the cells.<br />

Such a zone is called a hotspot. Hotspot detection has become a<br />

popular area of research after Kulldorff et al. (1998) have<br />

developed the SaTScan software system for detection and<br />

evaluation of disease clusters. Later this software is used for other<br />

applications also. Besides SaTScan, PULSE [3] is also used for<br />

hotspot detection.


2.2 Multi-Criteria Prioritization<br />

Dr. Bruggemann and Dr. G. P. Patil [4] discussed the method of<br />

ranking a finite collection of objects when a suit of indicator<br />

available for each member of the collection. The method<br />

represents the objects in POSET. The pictorial format of the<br />

POSET is a HASSE diagram and from HASSE diagram we can<br />

study the collection of all rankings that are compatible with the<br />

partial order (linear extensions). Finally using the cumulative rank<br />

frequency (CRF) and Markov Chain Monte Carlo (MCMC) the<br />

rank can be calculated.<br />

Using theory explained in the book “Ranking and Prioritization<br />

for Multi-indicator Systems Introduction to Partial Order<br />

Applications”, Rainer Brüggemann and Ganapati P. Patil,<br />

Environmental and Ecological Statistics, 2011, Volume 5,<br />

JalaSRI, Jalgaon, Maharashtra, Indian has developed software<br />

RAPID-2 for multi-criteria ranking and prioritization. RAPID-2<br />

has used in the case study.<br />

3. METHODOLOGY<br />

The overall process of generating data using NDVI determining<br />

geo-spatiotemporal hotspot and then prioritization is described in<br />

this section using block diagram.<br />

Satellite<br />

image like<br />

LISS III<br />

image<br />

Prioritization<br />

using RAPID-<br />

2<br />

Processed<br />

Image<br />

NDVI Classification<br />

using<br />

ERDAS<br />

module<br />

Hotspot<br />

Detection &<br />

presentation<br />

of it<br />

Tabulate<br />

data<br />

Figure 1: Block diagram of method<br />

NDVI<br />

Distribution<br />

Raster<br />

of NDVI<br />

Image<br />

data in the<br />

admin<br />

unit/cell<br />

Over-lapped<br />

image by<br />

admin unit<br />

4. A CASE STUDY<br />

The NDVI model is created using model maker tool of the<br />

ERDAS software. The output of the model is also raster file but<br />

only contain the vegetation pixels. The image 1 shows NDVI of<br />

2007 image where middle area of forest shows good vegetation.<br />

We are using PULSE software to find elevated cluster for<br />

deforestation. The result of PULSE for NDVI data is shown in<br />

image-2.<br />

Image 1: NDVI Image of Satpuda Forest Including 45 Beats<br />

498<br />

Image 2: Hotspot detected by PULSE for NDVI data<br />

Summary of result of PULSE for NDVI data:<br />

Hotspot Zone including beat IDs: 18, 19, 20, 21, 22, 23, 24, 26<br />

Log likelihood ratio: 24.02, p-Value: 0.001<br />

The prioritization of objects in the forest loss hotspot can do with<br />

any related indicators. In this case study we used NDVI area,<br />

barren land area, and population pressure. The Figure 3 shows<br />

HASSE diagram for the data.<br />

Figure 3: HASSE diagram with High to Low order and table<br />

of average heights.<br />

The figure 3 shows table of result of the Bubley Dyer MCMC<br />

Simulation. The figure 3 clearly shows the object 26 is heights<br />

ranking.<br />

5. CONCLUSION<br />

We propose to use NDVI to automatically generate realistic data<br />

of deforestation. With the help of a case study of Satpuda hilly<br />

region deforestation, we listed out steps that would generate<br />

deforestation data from a satellite image. We also describe in<br />

detail the NDVI model developed and used to obtain the actual<br />

information about deforestation. We discussed hotspot detection<br />

software PULSE. The identified hotspots are presented and<br />

analyzed. We prioritized the hotspot cells using RAPID software.<br />

This NDVI based data generation process, geo-spatiotemporal<br />

hotspot detection and prioritization tool would eliminate the<br />

laborious task of collecting data and it would help in proper<br />

governance.<br />

6. REFERENCES<br />

[1] Andrew T. Hudak, Carol A. Wessman, Deforestation in<br />

Mwanza District, Malawi, from 1981 to 1992, as determined<br />

from Landsat MSS imagery, Applied Geography 20 (2000)<br />

155–175<br />

[2] Duczmal L, Kulldorff M, Huang L. (2006). Evaluation of<br />

spatial scan statistics for irregular shaped clusters. Journal of<br />

Computational and Graphical Statistics 15,428-442.<br />

[3] Patil, G.P., Joshi, S.W., and Koli, R.E. (2009b). PULSE,<br />

Progressive Upper Level Set Scan Statistic for Geospatial<br />

Hotspot Detection, Environmental and Ecological Statistics,<br />

Springer, 149—181.


[4] R.Bruggemann and Ganapati P. Patil(2010). Multicriteria<br />

prioritization and partial order in environmental sciences,<br />

Environmental and Ecological Statistics, Volume 17,<br />

Number 4, Pages 383-410<br />

499<br />

[5] Zuzana mašková, and Jan Květ, Normalized difference<br />

vegetation index (NDVI) in the management of mountain<br />

meadows, Boreal environment research 13: 417–432


Quality Assurance Case Study of an ICT Supported<br />

Legally Binding Election in Austria<br />

Klaus John<br />

Vienna University of Technology,<br />

Research Group for Industrial<br />

Software (INSO), Austria<br />

klaus.john@inso.tuwien.ac.at<br />

ABSTRACT<br />

The use of new technologies in established procedures such as<br />

electronic elections is often an underestimated task. More<br />

technology does not mean more quality. The challenge of quality<br />

assurance is described in this paper focusing on an ICT supported<br />

legally binding election in Austria.<br />

1. INTRODUCTION<br />

In recent years, the use of Information and Communication<br />

Technology (ICT) in administrative procedures, also called egovernment<br />

has gained much attention in efforts to modernize<br />

government. One task of the IT-strategy of the Austrian federal<br />

computing centre (Bundesrechenzentrum GmbH) is the egovernment<br />

realization of electronic elations and ICT supported<br />

elections. [1] In an IT-strategy the targets for a computing centre<br />

(state owned or private) are documented and shape a roadmap<br />

where to go and what to do on a generic level with the idea of<br />

target achievements. Any IT-strategy will influence Quality<br />

Management (QM) and QM includes the process Quality<br />

Assurance (QA). QA as a control process for e-government<br />

projects, influences the quality output of e-government projects,<br />

and is closely linked via QM with the IT-strategy. This paper will<br />

show how ICT supported elections demand special continuous<br />

quality management and improvement processes, which are on a<br />

high level part of the IT-strategy.<br />

2. IMPLEMENTATION OF THE<br />

AUSTRIAN E-VOTING PROJECT<br />

The Austrian Federation of Student´s election (Hochschülerinnen-<br />

und Hochschülerschaftswahlen) is a legally binding election<br />

which takes place every two years. The election is regulated by<br />

legislation passed in the Austrian national parliament. The voting<br />

period is three days long during which students at all universities<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Andreas Ehringfeld<br />

Vienna University of Technology,<br />

Research Group for Industrial<br />

Software (INSO), Austria<br />

andreas.ehringfeld@<br />

inso.tuwien.ac.at<br />

500<br />

Gerald Fischer<br />

Vienna University of Technology,<br />

Research Group for Industrial<br />

Software (INSO), Austria<br />

gerald.fischer@<br />

inso.tuwien.ac.at<br />

in Austria can cast their votes. Prior to the 2009 election, on-site<br />

paper-based voting was the only voting channel.<br />

In the 2009 Austrian student union election, e-voting was invented<br />

as an additional voting channel. Furthermore attempts were made<br />

to avoid problems of poorly specified requirements and standards<br />

documents, and the inability to carry out meaningful verification<br />

by defining requirements by law and by using current<br />

international security standards like Rec(2004)11 as a benchmark<br />

in the certification process of the e-voting system. The timeline,<br />

activities, and responsibilities of the election are defined in the<br />

Austrian Federation of Students’ law [2] and election regulations<br />

[3], which are still in effect at present. The legal framework<br />

stipulates, among other aspects, that the election system has to be<br />

approved by the Austrian data protection commission.<br />

Furthermore a certification process based on Common Criteria<br />

and the recommendations in Rec (2004) 11 has to be passed.<br />

The e-voting software (as well as the documentation, development<br />

process descriptions, architecture, security descriptions, threat<br />

analysis, technical descriptions and source code) was audited<br />

between December 2008 and March 2009. The technical<br />

infrastructure was operated at two different locations by the<br />

Austrian Federal Computing Centre. The e-voting system was<br />

classified as a highly critical system and was subject to special<br />

security mechanisms within the Federal Computing Centre.<br />

3. QUALITY MANAGEMENT<br />

The time for implementation and testing of the election system<br />

was limited, deadlines could not be postponed, the human<br />

resources were limited and the budget was fixed.<br />

For the election a new electronic administration system had to be<br />

developed. The administration system should support the election<br />

commissions in their work by automatically creating the electoral<br />

roll for the electronic and paper based election, the definition files<br />

for the e-voting system and all the print outs of the ballot sheets,<br />

the results, the letters to the candidate to inform them about their<br />

mandate and much more. The administration system had to be<br />

developed and tested in the timeframe of the project.<br />

Facing the typical challenges of IT projects the project´s<br />

conception was to follow an agile software development<br />

approach. The programming and testing intervals were very short<br />

to maximize implementation progress and fulfil quality


equirements. A direct communication between the programming<br />

and the test team was established and ICT was used for<br />

transparency and reproducibility, e.g. platforms like Bugzilla were<br />

used for bug tracking. For the testing this approach brought the<br />

project team in the comfortable situation where they concentrated<br />

all test resources on workflow tests for the administration<br />

software. The project did not concentrate on single functionality<br />

but looked at complete processes as workflows which were<br />

walked through in the same way as election commissions<br />

administrate their election. To identify bugs even before the<br />

workflow tests and therefore increase efficiency of the<br />

development process document tests were performed and every<br />

developer had to test her or his software parts. Executed test case<br />

results are divided into business process, usability after WAI and<br />

security test cases. All results of a test execution at a certain date<br />

are displayed by the amount of found or not found bugs (number<br />

of defects or none defects) and their attribute (business process,<br />

usability and security). The idea was to create a simple table<br />

where execution date, number of found defects or executable<br />

business process test cases are documented. According to the test<br />

strategy it was not always necessary to test a new release with all<br />

business process test cases. With every new release the test team<br />

analysed new functionality or changes and discussed which test<br />

cases are relevant.<br />

Evaluation of the project´s test strategy can be described as the<br />

following. Document tests have been implemented for assuring<br />

that the requirements have been translated into good system<br />

specification. Developers executed developer’s tests to check<br />

functionality, specialists performed workflow tests to verify all<br />

processes and the operation team tested the technical<br />

infrastructure.<br />

4. ELECTION<br />

230.479 students were eligible to vote at the 21 Austrian<br />

universities where the federation of students’ elections 2009 took<br />

place. A total 375 races had to be decided, consisting of 21<br />

university body elections and 354 study body elections. 2,411<br />

candidates campaigned for 1,633 mandates. The electronic voting<br />

ended technically successful on Friday, May 22nd 2009, at 6:00 h<br />

pm. Until then 2,161 students participated in the elections. [4]<br />

The project´s test approach turned out to be very efficient and<br />

effective, however, only focusing on the technical level. Due to a<br />

process error based misleading communication one ballot sheet<br />

included an incorrect name of a political party. Furthermore<br />

certain electronic ballot sheets did not include the short names of<br />

political parties at all. The problem was an outsourcing of tasks<br />

from the election commission to a technical operation team<br />

combined with special designed e-voting processes between all<br />

parties. After re-analysing the results from the electronic election<br />

a certain risk level must have caused the critical situation. The<br />

process and communication error was not discovered as there was<br />

a separation into technical and workflow testing, where the<br />

operation team tested their processes and simulated the activities<br />

of the election commission but they could not test integration into<br />

the election system. On the other side there was training for the<br />

election commission where they tested their activities and actions<br />

(workflows) but the operation of the e-voting system was only<br />

501<br />

simulated. There was a lack of communication in the workflows<br />

between the operation team and the election commission.<br />

As a result of these issues on December 13 2011 the Austrian<br />

Supreme Court decided that e-voting at the student union election<br />

did not fulfil all requirements of the law. They concluded that<br />

election commissions must be able to verify the correctness of the<br />

main steps of the voting phase and vote counting without the help<br />

of any expert. This includes not only the detection of possible<br />

manipulations but also the errorless realization. The decision<br />

focuses on the use of an e-voting system but for sure also effects<br />

the use of any electronic system for elections like administration<br />

software.<br />

5. CONCLUSION<br />

The paper has shown that the challenge of quality assurance of egovernment<br />

such as ICT supported elections lies not only in<br />

fulfilling various standards or technical correctness of software,<br />

but also in process management and IT-strategies at all<br />

stakeholders. When establishing new technologies also workflows<br />

change’s which have to be considered, evaluated and tested. The<br />

case study has shown the need of process oriented approaches<br />

when redesigning election administration by ICT support.<br />

Furthermore this demands an overall IT strategy where quality<br />

management is one part of it. Nevertheless, also due to the<br />

decision of the Austrian Supreme Court, the election commission<br />

should never lose control of process execution and process<br />

control. Furthermore the authors believe that to gain trust the<br />

challenge is to implement a QM process for the election system<br />

where everyone – especially election commission and eligible<br />

voters – has online access to the documented test cases and get the<br />

possibility to test the software by their own. Transparency in the<br />

QM process might lead to accuracy, correctness and to more trust.<br />

We would call this a QM-trust-box.<br />

6. REFERENCES<br />

[1] Federal Computing Centre, BRZ, e-government IT-strategy,<br />

http://www.brz.gv.at/Portal.Node/brz/public/content/unterne<br />

hmen/struktur/unternehmensbereiche/10052.html#E-<br />

Government, Feb. 2012.<br />

[2] Austrian Government (no date): Hochschülerinnen- und<br />

Hochschülerschaftsgesetz 1998 (HSG 1998) [Federation of<br />

Students law]. http://www.bmwf.gv.at/startseite/<br />

hochschulen/universitaeten/gesetze/studienrecht/hsg_1998/<br />

[3] Austrian Government (no date): Hochschülerinnen- und<br />

Hochschülerschaftswahlordnung 2005 (HSWO 2005)<br />

[Election Regulations]. http://www.bmwf.gv.at/startseite/<br />

hochschulen/universitaeten/gesetze/studienrecht/hswo_2005<br />

[4] Andreas Ehringfeld, Larissa Naber, Thomas Grechenig,<br />

Robert Krimmer, Markus Traxl, Gerald Fischer: Analysis of<br />

Recommendation Rec(2004)11 Based on the Experiences of<br />

Specific Attacks Against the First Legally Binding<br />

Implementation of E-Voting in Austria. Electronic Voting<br />

2010, EVOTE 2010, 4th International Conference, July 21st<br />

- 24th, 2010, Austria


Quality Assurance Model for e-Governance Projects: A<br />

Case Study on e-Counseling<br />

Rama Krushna Das<br />

National Informatics Centre<br />

Berhampur 760 004, India<br />

+91–94370-64536<br />

ramdash@yahoo.com<br />

ABSTRACT<br />

Ensuring quality for any software application, especially in the<br />

domain of e-Governance is a challenging task. This is because a<br />

slight mistake will not only jeopardize sensitive functions of a<br />

government but can adversely affect a large section of the society<br />

and may lead to aversion in the minds of the public towards use of<br />

ICT in governmental functions. Several standards have been<br />

followed in software development but quality assurance has<br />

remained as an active area of research especially for the e-<br />

Governance applications. In this paper we investigate certain<br />

quality parameters which are relevant to e-Governance<br />

applications and propose a quality assurance model which can be<br />

followed while developing different applications. As a proof-ofconcept<br />

we have considered a very successful project called “e-<br />

Counseling” which was implemented in one of the backward<br />

states of India to facilitate student admission to different<br />

professional courses. The project not only helped in streamlining<br />

student admission but helped students in rural areas living at<br />

remote locations of the state of Orissa to participate in the<br />

admission process without having to travel long distances. Initial<br />

criticism because of unsatisfactory performance led to the present<br />

study to come up with a quality assurance model which can be<br />

followed for the success of the project.<br />

Categories and Subject Descriptors<br />

H.3.5 [Information Storage and Retrieval] Online Information<br />

Services - Data sharing, Web-based services: J.1 [Administrative<br />

Data Processing]: Business, Government.<br />

General Terms<br />

Experimentation, Human Factors<br />

Keywords<br />

Quality Assurance, e-Governance, e-Counseling.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Manas Ranjan Patra<br />

Berhampur University<br />

Berhampur 760 007, India<br />

+91–94371-45430<br />

mrpatra12@gmail.com<br />

502<br />

1. INTRODUCTION<br />

Pabitrananda Patnaik<br />

National Informatics Centre<br />

Bbhubaneswar 751 001, India<br />

+91–94370-03107<br />

ppabitra@hotmail.com<br />

The characteristics of software such as invisibility, complexity<br />

and flexibility force the developers to make changes even after the<br />

software is implemented. This adversely affects the usability of<br />

software. Therefore, appropriate measures must be taken<br />

throughout the development life cycle in order to minimize the<br />

possibility of errors. Quality Assurance is an umbrella activity<br />

which is to be applied throughout the life cycle of software<br />

engineering process [1][2].<br />

In the present work, a Quality Assurance model is developed and<br />

experimented with a tightly time scheduled, zero error tolerance<br />

and highly sensitive citizen centric e-Governance application<br />

called “e-Counseling”. The model shows the role of different<br />

stakeholders responsible for the success of the project. We call<br />

this as an “Analyst-Developer-User-Manager” model wherein<br />

each stakeholder needs to perform his/her task which is welldefined.<br />

This can assure the expected quality of the software and<br />

contribute towards the success of the project.<br />

2. e-COUNSELING<br />

e-Counseling is an application which is introduced in the state of<br />

Orissa to streamline admission into different professional courses<br />

and help the students to participate in the admission process<br />

without traveling long distances to a centralized student<br />

counseling center, especially from rural areas. The project was<br />

spearheaded by NIC, a central government department under the<br />

Ministry of IT. This not only helped in reducing student<br />

movements but increased transparency and better monitoring of<br />

the entire admission process [7]. Initially the project was<br />

subjected to criticism as it could not deliver due to bugs in the<br />

software and procedural problems which were not properly<br />

defined. This led to our present study on quality assurance.<br />

3. QUALITY ASSURANCE MODEL<br />

This paper emphasizes on the stages of ensuring quality at<br />

different stages of work execution of e-Governance applications<br />

in which the developers and users are involved.<br />

Stage – 1: The detailed process has to be defined. The analysis,<br />

logic development, implementation strategy, maintenance strategy<br />

and all other process related activities are to be defined very<br />

clearly. At this stage Analyst is involved to define the complete<br />

process.


Stage – 2: Here the actual software is developed, tested and put in<br />

use. The Developers are associated with this stage and they may<br />

develop in any platform according to the requirement, but, they<br />

must have the required skill to develop error free software.<br />

Stage – 3: Supply of data by the user department must be 100%<br />

error free. This is possible only when the User is associated with<br />

the system and supply accurate data.<br />

Stage – 4: It is observed in many e-Governance projects that, the<br />

success of the project lies on the managerial capability of the<br />

Project Manager. Whenever inadvertent errors and problems crop<br />

in during the project life cycle the managerial capability to handle<br />

the situation is highly essential.<br />

This model can be referred as Analyst-Developer-User-Manager<br />

model because of the involvement of four different stake holders<br />

at different stages of the project execution.<br />

3.1 Process Quality<br />

The allotment of seats are done based on the student performance<br />

in the entrance test, his/her preferences, category to he/she<br />

belongs, and the availability of seats under a particular category.<br />

The allotment of seat in a course is based on a first/best fit<br />

strategy depending on the candidate’s choice.<br />

3.2 Software Quality<br />

Software quality depends on the understanding of the requirement<br />

by the Analyst and Developer. The people involved in software<br />

development should have both technical and domain knowledge,<br />

so as to minimize error. The following Software Quality Metrics<br />

[8] are associated at this stage.<br />

Correctness : The extent to which the software satisfies the user<br />

requirement = (No. of requirements fulfilled) / (Total no. of<br />

requirements) * 100<br />

Reliability : The extent to which the software can function<br />

without failure = (Mean Time to Failure) / (Total Run Time) *<br />

100<br />

Efficiency : The output to given input = (Space or time usage) /<br />

(Total Space or Time) * 100<br />

Integrity : Extent to which the software can ensure accuracy and<br />

consistency = (No. of successful attempts) / (Total no. of<br />

attempts) * 100<br />

Usability : Efforts required to operate the software = (Total time<br />

taken to handle the software) / (Total development time) * 100<br />

Maintainability : The efforts required to trace and fix the error =<br />

(Time taken to fix the error) / (Total development time) * 100<br />

Testability : The efforts required to test the software with all its<br />

functionalities = (Time taken for testing the functionality) / (Total<br />

development time) * 100<br />

Flexibility : The efforts required for modifying an operational<br />

software = (Time taken to modify the program) / (Total<br />

development time) * 100<br />

Portability : Transferability of the software from one environment<br />

to another = (No. of successful ports) / (Total no. of ports) * 100<br />

Reusability : The degree to which the software programs can be<br />

reused in other applications = (No. of reusable functions) / (Total<br />

no. of functions) * 100<br />

503<br />

Interoperability : The efforts required to couple the components of<br />

one software with another = (Time required for coupling) /<br />

(Installation Time) * 100.<br />

3.3 Data Quality<br />

Data Quality is one of the major components for successful<br />

implementation of a project. A small mistake in seat allotment for<br />

one candidate can have ripple effect. Therefore quality of data<br />

plays a crucial role. Several metrics like Accuracy, Completeness,<br />

Relevance, Reliability, Accessibility, and Presentation can be used<br />

to control the data quality.<br />

3.4 Managerial Quality<br />

The success of the project depends on the Project Manager and<br />

User Manager who handles the data. For e-Governance<br />

applications there are lot of stake holders involved in a project. In<br />

e-Counseling the stakeholders are State Government, Institutions,<br />

Vendors, Developers, Media and the Citizens. Therefore, their<br />

skill, knowledge, ethics, responsibility and mentality can affect<br />

the success of the project. Some of the quality metrics with<br />

respect to the skill of a manger are Defects Handling, Time<br />

Management, Cost Management, Change Management,<br />

Manpower Risk Management, Ethics of the Stake Holder.<br />

4. KEY FINDINGS OF THE PAPER<br />

Quality Metrics associated with each stage of the Quality<br />

Assurance Model were found and the degree of quality achieved<br />

by using this model is determined. Most of the metrics are<br />

qualitative and some are quantitative. The Quality Importance<br />

Factor (Fi) is taken on a 10 points scale (0 to 10) and the Quality<br />

Achievement factor (Ai) is taken as Very Low for 0 – 10%, Low<br />

for 10 – 25%, Moderate for 25 – 50%, High for 50 – 75% and<br />

Very High for 75 – 100%. The Quality Assurance Metrics with<br />

Quality Importance and Quality Achievement Factors are<br />

computed for the e-Counseling project during 2011.<br />

5. CONCLUSION<br />

In this work we have proposed a Quality Assurance model which<br />

was followed in the implementation of a very sensitive application<br />

called “e-Counseling”. It not only streamlined the cumbersome<br />

admission process but could build confidence in the minds of the<br />

parents and students to use the e-counseling system<br />

enthusiastically.<br />

6. REFERENCES<br />

[1] IEEE Standard for Software Quality Assurance Plans, IEEE<br />

Std 730-1998 (Revision of IEEE Std 730-1989).<br />

[2] Michalis, X., Software Metrics and Measurements, In<br />

“Encyclopedia of E-Commerce, E-Government and Mobile<br />

Commerce”, Mehdi Khosrow-Pour (Ed.), Idea Group<br />

Publishing, ISBN: 1-59140-799-0, 2006, 1029-1036.


Regulation Room: Moving Towards Civic Participation 2.0<br />

ABSTRACT<br />

Rulemaking is one of the U.S. government’s most important<br />

policymaking methods. Although broad transparency and<br />

participation rights are part of its legal structure, significant<br />

barriers prevent effective engagement by many groups of<br />

interested citizens. RegulationRoom, an experimental opengovernment<br />

partnership between academic researchers and<br />

government agencies, is a socio-technical participation system<br />

that uses multiple methods to alert and effectively engage new<br />

voices in rulemaking.<br />

Categories and Subject Descriptors<br />

H.5.2. [User Interfaces] – User-Centered Design; J.1<br />

ADMINISTRATIVE DATA PROCESSING – Government;<br />

H.5.3 [Information Interfaces and Presentation]: Group and<br />

Organization Interfaces—Asynchronous Interaction<br />

General Terms<br />

Design, Experimentation, Human Factors, Theory, Legal Aspects<br />

Keywords<br />

E-Rulemaking, Open Government, Web 2.0, Government-<br />

Academic Partnerships<br />

1. INTRODUCTION<br />

Here we present RegulationRoom, (http://regulationroom.org/), an<br />

experimental online public participation platform, which is the<br />

U.S. Department of Transportation’s (USDOT) Open Government<br />

Flagship Initiative. RegulationRoom is unique in being a<br />

systematic effort to discover how to use information and<br />

communication technologies (ICTs) to alert and engage citizens<br />

effectively in the formation of complex government policy. We<br />

focus on rulemaking, the process federal agencies use to make<br />

new health, safety, environmental, and other regulations.<br />

The project is a unique collaboration between academic<br />

researchers of the Cornell eRulemaking Initiative (CeRI) and the<br />

government. CeRI owns, designs, operates, and controls<br />

RegulationRoom, but also works closely with USDOT to identify<br />

suitable “live” rulemakings for the site [2]. Agency officials work<br />

with CeRI before the public comment period opens, and help<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

Josiah Heidt and Jackeline Solivan<br />

Law School<br />

Cornell University<br />

Ithaca, New York USA<br />

jbh249@cornell.edu, jks38@cornell.edu<br />

504<br />

evaluate success after it closes. This collaboration allows us to<br />

field test design and operational strategies for eliciting and<br />

supporting participation by individuals who have not previously<br />

commented in a federal rulemaking. CeRI involves researchers<br />

from communications, computing, conflict resolution, information<br />

science, law, legal informatics, and political science. This type of<br />

interdisciplinary approach has been recognized as important to<br />

designing successful online participation systems. [7, 8].<br />

Researchers agree that first generation e-rulemaking systems have<br />

not produced significantly broader, meaningful public<br />

participation. [1, 8]. RegulationRoom is a second-generation erulemaking<br />

system that uses Web 2.0, ICTs, and human<br />

facilitative moderation to support effective public participation.<br />

2. OUR GOAL<br />

After examining the unsuccessful history of conventional<br />

rulemaking and first-generation e-rulemaking systems<br />

(Rulemaking 1.0), we hypothesized that a successful public<br />

participation system must address three barriers to citizen<br />

engagement. The first barrier is lack of awareness that<br />

rulemakings of interest are going on. The second barrier is<br />

information overload from voluminous and complex rulemaking<br />

materials. Rulemaking documents are generally 50–100 pages<br />

long and are written at a graduate-school level of English. The<br />

third barrier is unfamiliarity with how to effectively participate in<br />

the rulemaking process. Many individuals do not know that<br />

participation in this process is not like voting. Effective<br />

participation requires informed participation and includes giving<br />

reasons, alternatives, data, or otherwise substantiated claims.<br />

Our goal with RegulationRoom is to address and remediate these<br />

three barriers in order to create high quality, efficient, and<br />

effective e-government participation. RegulationRoom employs<br />

Web 2.0 technology and other ICTs, a combination of social and<br />

conventional media, purposeful site design and presentation of<br />

information, and human facilitative moderation.<br />

3. OUR PROJECT<br />

3.1 Combating Lack of Awareness<br />

USDOT conducts several hundred rulemakings annually, most of<br />

which affect only limited industry groups who already participate<br />

effectively in the rulemaking process. Rulemakings hosted on<br />

RegulationRoom are carefully selected because they directly<br />

affect individuals or groups unlikely to meaningfully engage in<br />

the conventional process.<br />

Once a rule is chosen, the process of remediating public<br />

unawareness begins long before the comment period opens. First,<br />

we create a communications outreach plan: After defining the<br />

kinds of stakeholders we want to alert, we try to discover where,<br />

and how, these target groups get information. We identify


membership associations, recreational and trade publications, and<br />

influential individuals such as bloggers, and reach out to them<br />

through email, phone, and online communications. We develop a<br />

list of keywords and phrases to use on social media (1)<br />

proactively in daily tweeting and Facebook posting; (2) reactively<br />

by setting up continuous automated searches and responding with<br />

comments or tweets when the rule or its subjects appears on news<br />

sites, blogs, or Twitter; and, most recently; (3) in Facebook and<br />

Google ads. RegulationRoom has a presence on Facebook, and<br />

the site itself is designed to encourage users to “share” both issue<br />

posts and individual comments. We coordinate media outreach<br />

with USDOT’s communications office, and try to persuade<br />

conventional and online media to publicize the rulemaking and<br />

the availability of RegulationRoom. We have found that print<br />

coverage can be surprisingly effective in driving online<br />

participation [3].<br />

Registered users receive a welcome email, as well as a notice<br />

whenever someone replies to their comments. We email them<br />

periodically during the comment period to provide updates and<br />

encourage further participation, and after the comment period<br />

closes to report on how the rulemaking concluded to close the<br />

participation feedback loop – an important step often omitted in<br />

public participation projects [4].<br />

3.2 Managing Information Overload<br />

The other, equally challenging, “cognitive victory” required for<br />

effective participation [6] is presenting the vast information of a<br />

rulemaking in a way that makes it cognitively manageable for<br />

people without legal or technical expertise.<br />

Because of both length and readability level, having users<br />

comment directly on the NPRM text was infeasible. Our solution<br />

utilizes several information design strategies:<br />

o Triage: identifying and fore-grounding the information users<br />

will most likely be interested in and need, and packaging this<br />

information in thematic segments (6–10 “issue posts”) of<br />

manageable length;<br />

o Translation: using relatively simple vocabulary and sentence<br />

structure;<br />

o “Layering”: heavily using hyperlinks to allow users, at their<br />

choice, to go deeper (e.g., to relevant sections of primary<br />

documents; to statutory text or background information) or to<br />

find help (e.g., glossary and brief explanation tooltips)<br />

Through layering, all information in the NPRM and<br />

supporting documents is available on the site, but in a form<br />

that gives users control and is less likely to overwhelm; and<br />

o Indexing: all the issue post topics are visible and accessible<br />

from a navigational index; within each post, every<br />

commentable section has a title, all of which are visible and<br />

accessible from an index at the top of the post. (The latter<br />

was a simple but effective solution to the problem we<br />

observed in early rules that users tended to attach comments<br />

to the first section, regardless of content.)<br />

The other essential component of managing information overload<br />

for inexperienced commenters is human facilitative moderation.<br />

Neutral moderators encourage a “knowledge building<br />

community” that supports maximum learning of, participation in,<br />

and access to the rulemaking process. The moderator<br />

505<br />

interventions include: (1) recognizing when users are missing, or<br />

misunderstanding, important information and helping them<br />

acquire it; (2) encouraging more knowledgeable or engaged users<br />

to go more deeply into the agency’s analysis; and (3) pointing out<br />

other issues, and other comments, that are related to the<br />

commenter’s apparent interests or concerns.<br />

3.3 Remediating Unfamiliarity with the<br />

Process<br />

Educational materials on the site include “Learn More” pages that<br />

use graphics and simple language to explain the rulemaking<br />

process and effective commenting. Users can also watch a short<br />

video explaining rulemaking. However, consistent with general<br />

website use patterns, these educational aids are used only<br />

sporadically [3]. The principal strategy for increasing rulemaking<br />

“participation literacy” is tacit rather than overt: human<br />

moderators who mentor effective commenting using facilitative<br />

moderation. Law students in an e-government clinic are trained in<br />

the conflict resolution techniques of content- and process-based<br />

group facilitation [5], and they moderate asynchronously under<br />

the supervision of senior researchers.<br />

4. ACKNOWLEDGMENTS<br />

This material is based upon work supported by the National<br />

Science Foundation under Grant No. NSF IIS-1111176. Any<br />

opinions, findings, and conclusions or recommendations<br />

expressed in this material are those of the author(s) and do not<br />

necessarily reflect the views of the National Science Foundation.<br />

5. REFERENCES<br />

[1] Coglianese, C. Citizen participation in rulemaking: past,<br />

present, and future. Duke Law J 55, 943–968, 2006.<br />

[2] Farina, C. R., Newhart, M. J., Cardie, C., Cosley, D., and<br />

Cornell eRulemaking Initiative. Rulemaking 2.0. Miami Law<br />

Rev. 65, 395–448, 2011.<br />

[3] Farina, C. R., Miller, P., Newhart, M.J., Cardie, C., Cosley,<br />

D., Vernon, R. Rulemaking in 140 characters or less: social<br />

networking and public participation in rulemaking. Pace Law<br />

Rev. 31, 382-463, 2011.<br />

[4] Johnston, P. Open Government: Assessing the Obama<br />

Administration’s Efforts to Make Government Transparency<br />

a Reality, [online],<br />

http://www.cisco.com/web/about/ac79/docs/pov/Open_and_<br />

Transparent_Government_Formatted_120209FINAL.pdf,<br />

2009.<br />

[5] Kaner, S., Lind, L., Toldi, C., Fisk, S., and Berger, D.<br />

Facilitator’s Guide to Participatory Decision-Making. John<br />

Wiley & Sons, Inc., San Francisco, CA, 2007.<br />

[6] Lupia, A. Deliberation disconnected: What it takes to<br />

improve civic competence, Law and Contemporary<br />

Problems, Vol. 65 No. 3, 133–150, 2002.<br />

[7] Preece, J. Online communities: Designing Usability,<br />

Supporting Sociability, John Wiley & Sons, Inc., Wiley,<br />

Chichester, UK, 2000.<br />

[8] CSFFR. Achieving the potential: the future of federal erulemaking.<br />

Technical report, Committee on the Status &<br />

Future of Federal e-Rulemaking/American Bar Association,<br />

Washington, DC, 2009.


Revival of Farming Community with M-Agriculture<br />

ABSTRACT<br />

This paper is aimed at developing an architecture which drives<br />

scalable, replicable and commercially successful Farmer<br />

Information Services. It aims at building services that impact<br />

farmer’s income and productivity by reducing multiple<br />

distribution channels. Using 360 degrees of communication<br />

systems makes this system a unique system.<br />

Categories and Subject Descriptors<br />

Agriculture information systems, mobile technologies, supply<br />

chain management, customer relationship management<br />

General Terms<br />

Economics, Reliability, Experimentation, Human Factors.<br />

Keywords<br />

Agriculture, Mobile Devices, M-Agriculture, E-Agriculture, Egovernment,<br />

Farmer.<br />

1. INTRODUCTION<br />

As the famous saying goes “Any sufficiently advanced technology<br />

is indistinguishable from magic” – a Law of prediction by Arthur<br />

C Clarke, innovations in our agriculture information system can<br />

create magic and wonders in lives of farmers and in turn in the<br />

lives of general public. Agriculture is the basic contributor to<br />

many countries GDP since several decades. But of late its<br />

contribution is declining. For example share of agriculture and<br />

allied activities came down from 35% in the early 1980s to about<br />

32% in the early 1990s nose-dived in the reform era – down to<br />

25% in 2000-01 in India. The rate of decline in agriculture’s share<br />

was even faster in the second phase of reform. Between 2000-01<br />

and 2010-11, the share was down by a huge 11 percentage point.<br />

Nearly half of the farmers in India are in debts and funds flow<br />

from the government towards agriculture is declining . At the<br />

same time inflation is going up day by day, common man is not<br />

able to afford a basic meal. Under these circumstances it is highly<br />

recommended to introduce proposed e-agriculture model as part<br />

of e-government services which will help farmer as well as<br />

common man to buy and sell farm produce at reasonable price.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Swapna Veldanda<br />

ERP Product Specialist,CSC<br />

sveldanda@gmail.com<br />

506<br />

2. INFORMATION TECHNOLOGY<br />

REVOLUTION IN AGRICULTURE<br />

The greatest impact of IT has been its ability to create linkages,<br />

not its ability to process internal data into information. Network<br />

integration allows departments/organizations to share information<br />

and interact electronically across organizational boundaries. These<br />

systems enable stakeholders in the redesign of their key business<br />

process there by enhancing productivity, quality, speed,<br />

flexibility, at the same time it is also wise to consider and address<br />

network issues like Security, Customer care, Services pricing<br />

calculations, Fee and tax collection and Partnership accounting.<br />

2.1 Customization and personalization<br />

The key to this system’s effectiveness is that it is “plug and play”<br />

– our overriding objective is to remove complexity, allowing<br />

service developers to focus their efforts on the service elements of<br />

the transaction, rather than the technological elements.<br />

This adaptability is particularly important in the world of<br />

agriculture, where the differences from community to community<br />

can be quite pronounced, both in terms of the services being<br />

provided (large versus small or urban versus rural, for example)<br />

and the level of technological sophistication.<br />

2.2 Transition in Agriculture Systems<br />

In many countries at least 50% of the farms produce is either<br />

going waste or the farmers are selling at a cheaper price. At the<br />

same time public is buying farms produce at astronomical prices<br />

because of inflated prices by distributers. With this neither the<br />

farmers are gaining nor the public. And it is resulting in<br />

discouragement among farmers towards agriculture. The solution<br />

lies in minimizing the cost so as to guarantee equitable access and<br />

affordability. Countries should look at ways of harmonizing costs<br />

and discuss with private sector. There has been progress in this<br />

direction in some Asian countries, like India, where the<br />

government has involved the private sector in investing in making<br />

the mobile based services more affordable. Following picture<br />

shows how the transformation took place from traditional<br />

agriculture system to distributed connection model.


Fig 1 : Agriculture Revolution<br />

3. PROPOSED AGRICULTURE SYSTEM<br />

Proposed Agriculture Information System works based on the<br />

following steps explained. It helps in providing flexibility,<br />

accessibility and adaptability to all stakeholders of agriculture<br />

sector, viz., common people who will buy farm produce, farmers,<br />

vendors who will be selling raw material for farming.<br />

Agriculture System will enable all these stake holders to register<br />

in portal either through internet or through mobile. Once<br />

registration is done required information will be accessible and<br />

SMS facility can be used for PULL and PUSH.<br />

• Stakeholders (Customers, Farmers, Vendors, Service<br />

providers) will register in portal<br />

• Portal is integrated with various services and SMS is<br />

sent to the concerned users based on service requested.<br />

• Based on interactive SMS facility consumer can place<br />

order, and farmers can sell products to the users directly<br />

without distributors.<br />

Fig 2: Proposed Agriculture system<br />

Following are the prospective services which can be provided<br />

through the system:<br />

• Direct interaction with End users: Elimination of<br />

distribution channels helps farmers and consumers in<br />

getting right product and the right price.<br />

• Agriculture Education: Advice, education, and<br />

awareness: applications that enable provision of<br />

information to farmers and extensionists about good<br />

practices, crop varieties, and pest or disease<br />

management. This information can be sent to mobiles as<br />

an SMS based on the request.<br />

• Commodity prices, market information, and trading<br />

transactions: applications that prices in regional<br />

markets to inform decision making throughout<br />

agricultural value chains.<br />

• Data collection: applications that enable collection of<br />

data into central repositories, potentially from large<br />

geographic regions.<br />

507<br />

• Pest and disease outbreak warning and tracking:<br />

applications that send and receive data on outbreaks.<br />

• Financial services: applications that enable provision of<br />

microloans, banking services, and micro-insurance for<br />

crops and livestock.<br />

• Geographical Information System: Weather forecasts,<br />

alerts about draught, impact of bad weather etc., can be<br />

circulated to the target groups.<br />

Table1: SWOT Analysis of Agriculture Information<br />

System<br />

4. CONCLUSION<br />

Unlocking productivity potential, improving supply chain<br />

demand, refining customer relationship management while<br />

helping to manage improvised production with information on<br />

weather forecast, market trends, soil based information, cost of<br />

raw material etc., will help in bringing the past glory in farming<br />

community. No more impact of floods, no more suicides of<br />

farmers. These developments, coupled with the rapid advances<br />

that are being made in human computer interfaces, are likely to<br />

make it ubiquitous, enabling access to dramatically increased<br />

amounts of data, tools for analysis, and decision support systems.<br />

As regards the systems they can be said to have more and more<br />

functions, which is ensured by the high level of integration. The<br />

wider than earlier application and innovative spread of the wired<br />

and the Mobile Internet are primarily limited by economic and<br />

social factors. Enhancements in agriculture system will help in<br />

envisioning and fulfilling dreams of farming community and<br />

achieving economic balanced society.<br />

5. ACKNOWLEDGMENTS<br />

I am thankful to ICEGOV for providing an opportunity to publish<br />

my thoughts on improving the lives of farming community.


Social Media Usage Guidelines for the Government of the<br />

United Arab Emirates<br />

ABSTRACT<br />

In this poster, we present the experience of Emirates eGovernment<br />

in designing social media usage guidelines for government<br />

organizations in the United Arab Emirates (UAE). We highlight<br />

the local context by focusing on social media adoption by the<br />

government and citizens, and describe the process we followed<br />

when designing the guidelines and the key policy issues we<br />

covered in the document. We conclude with a set of<br />

recommendations for other government agencies planning to go<br />

through a similar process.<br />

Categories and Subject Descriptors<br />

K.5.2 [Legal Aspects of Computing]: Government Issues –<br />

Regulation.<br />

General Terms<br />

Legal Aspects<br />

Keywords<br />

Social Media, e-Government, United Arab Emirates<br />

1. INTRODUCTION<br />

In an attempt to clearly describe the growing impact of social<br />

media and Web 2.0 technologies on the government sector, this<br />

technology revolution is described as one of the “four new forces<br />

that enable the transformation of government” in addition to<br />

demographic, social, and business revolutions [11]. The<br />

interactive and pervasive nature of social media, and its instant<br />

capabilities, can create new ways of “democratic participation,<br />

pressures for new institutional structures, processes and<br />

frameworks for open and transparent government on an<br />

unprecedented scale” [1]. A similar conclusion was provided by<br />

[8], who discussed how social media can promote citizen<br />

participation in governments’ decision making and process design<br />

and help improve democratic practices in general.<br />

But the growing use of social media raises many challenges<br />

related to governing its use and the related legal impacts. Most of<br />

the laws that govern the use of social media in the US government<br />

were written prior to its existence [2]. According to [5], any social<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Elbadawi, Ibrahim<br />

Telecommunications Regulatory Authority<br />

Dubai, United Arab Emirates<br />

Ibrahim.elbadawi@gia.gov.ae<br />

508<br />

media policy should cover eight essential elements: employee<br />

access, account management, acceptable use, employee conduct,<br />

content, security, legal issues, and citizen conduct. Motivated by<br />

similar needs, the eGovernment and Information Sector within the<br />

Telecommunications Regulatory Authority (the government body<br />

responsible for the federal eGovernment program; website<br />

http://www.emiratesegov.ae) has developed comprehensive social<br />

media usage guidelines for all government entities in the UAE [4].<br />

1.1 eGovernment in the UAE<br />

The UAE is a federation of seven emirates with a federal<br />

government of over 50 entities, most of which provide public<br />

services, and a local government within each of the seven emirates<br />

[3]. The eGovernment program in the UAE has achieved<br />

remarkable success in enabling the technology-based transformation<br />

of public services. According to [10], the UAE is ranked 6 th globally<br />

in the eParticipation Index, 7 th in the Online Service Index, and 28 th<br />

in the eGovernment Development Index.<br />

1.2 Social Media in the UAE<br />

Social media is widely adopted among citizens of the UAE;<br />

40.6% of its population has active Facebook accounts, which is<br />

the highest rate among all Arab countries [7].<br />

Government agencies and officials are increasingly establishing<br />

their presence on one or more social media sites. His Highness<br />

Sheikh Mohammed bin Rashid Al Maktoum, Vice President and<br />

Prime Minister of the UAE and Ruler of Dubai, offers a role<br />

model for government officials. He is very popular on Facebook,<br />

Twitter, and YouTube and he uses these channels to continuously<br />

communicate with the public and consult them on new ideas and<br />

initiatives. Government employees in the UAE consider social<br />

networking among the top technologies that could increase the<br />

level of collaboration across the government [9].<br />

The UAE is considered among the developing countries that have<br />

managed to catch up with the developed countries as e-Leaders<br />

with the use of consultation tools, including social media [10].<br />

2. SOCIAL MEDIA USAGE GUIDELINES<br />

In this section, we illustrate the process used to design the UAE<br />

government’s social media usage guidelines, describe the key<br />

policy issues covered in the guidelines, and provide a set of<br />

recommendations for other government organizations planning to<br />

develop a similar document.<br />

2.1 The Design Process<br />

The policy guidelines document was prepared collaboratively<br />

between May 2010 and March 2011 by a task force that brought<br />

together representatives of the government sector, academic


sector, private sector, and civil society. Emirates eGovernment<br />

and Dubai School of Government lead the work, which was<br />

kicked off by a discussion forum and policy roundtable [4]. The<br />

result of the roundtable discussion was a draft document with a<br />

list of the policy issues that participants agreed should be covered<br />

by the final guidelines document. The work continued with<br />

intensive research until the document was finalized and officially<br />

launched. During this research period, the task force continued its<br />

discussion via online platforms, as well as offline meetings when<br />

needed.<br />

2.2 Key Policy Elements of the Usage<br />

Guidelines Document<br />

The social media usage guidelines aimed to provide government<br />

entities with policy guidelines on how to use social media tools in<br />

“responsible, safe and effective manners to communicate with<br />

their clients and public and engage them in designing/delivering<br />

government programs and services” [4]. To achieve this goal, and<br />

as a result of the policy design process described above, the<br />

guidelines covered the following eight policy issues, which are<br />

aligned to a great extent with the eight issues recommended by<br />

[6]:<br />

o Access to social media sites: guidelines to help government<br />

agency leaders decide whether to allow their employees to<br />

access social media sites during working hours. The general<br />

recommendation was in favor of granting this access, as it’s<br />

essential for enabling transformation towards social agency.<br />

o Account management: detailed the overall process from<br />

account creation until deletion/deactivation; differentiated<br />

between personal, professional, and official accounts.<br />

o Content management: compared the key characteristics of<br />

publishing/managing content on social and traditional media.<br />

Listed skills and qualifications required for editors and<br />

managers of social media content, and offered a set of<br />

strategies for government agencies to consider when<br />

moderating discussion on social media and managing usergenerated<br />

content.<br />

o Employee conduct and acceptable use: the guidelines<br />

aligned the government employees’ social media code of<br />

conduct with existing human resources rules and regulations.<br />

o Citizen code of conduct: a list of issues to be covered by any<br />

policy statement to be published on their social media<br />

accounts as a participation policy for the public.<br />

o Privacy: in the absence of a law dedicated to online privacy in<br />

the UAE, a set of policy guidelines offered to help government<br />

agencies minimize potential privacy breaches.<br />

o Security: the guidelines elaborated a set of security threats<br />

related to social media, such as social engineering, and<br />

suggested actions to take in addition to the standard<br />

Information Technology most organizations use to reduce<br />

their vulnerability to these threats.<br />

o Other legal issues: copyright and intellectual property<br />

ownership; concerns about these issues are mainly caused by<br />

the ease of copying and sharing others’ content on social<br />

media sites.<br />

2.3 Recommendations<br />

Building on the experience we gained during the process of<br />

designing this social media usage guidelines document and the<br />

lessons we learned, we recommend that other government<br />

509<br />

agencies planning to develop a similar policy document consider<br />

these points:<br />

o Clearly identify your goals for designing the policy.<br />

o Study and analyze your context.<br />

o Collaborate with other stakeholders inside and outside the<br />

government sector.<br />

o Balance the organizational and personal aspects of social<br />

media.<br />

o Focus on the policy aspects of social media as compared to the<br />

technological aspects.<br />

3. CONCLUSION<br />

In this poster, we presented the UAE government’s experience of<br />

developing government-wide social media usage guidelines. We<br />

described the process of the policy design, the key policy issues<br />

covered, and concluded by providing a set of recommendations<br />

for other government organizations planning to go through a<br />

similar process.<br />

4. REFERENCES<br />

[1] Bertot, J. C., Jaeger, P. T., Munson, S., and Glaisyer, T.<br />

Engaging the public in open government: The policy and<br />

government application of social media technology for<br />

government transparency. IEEE Computer, 43, 11 (Nov.<br />

2010), 53-59.<br />

[2] Bertot, J., Hansen, D., and Jaeger, P. Government policies on<br />

the use of social media: legislating for change. In<br />

Proceedings of the 12th annual international conference on<br />

digital government research (Dg.o '11) (College Park, MD,<br />

USA, June 12-15, 2011). ACM Press, New York, NY, 2011,<br />

131-140.<br />

[3] Elbadawi, Ibrahim. Cloud computing for e-government in<br />

UAE: opportunities, challenges and service models. In<br />

Proceedings of the 5 th international conference on theory and<br />

practice of electronic governance (ICEGOV '10) (Tallinn,<br />

Estonia, September 26-28, 2011). ACM Press, New York,<br />

NY, 2011, 387-388.<br />

[4] Emirates eGovernment. 2010. Retrieved June 17, 2012 from<br />

http://www.emiratesegov.ae/web/guest/articleDetails?articleI<br />

d=329912.<br />

[5] Gharawi, M., Helbig, N., Hradinova J., and Werthmuller, D.<br />

An exploratory study of social media adoption in<br />

government. In Proceedings of the 4 th international<br />

conference on theory and practice of electronic governance<br />

(ICEGOV '10) (Beijing, China, October 25-28, 2010). ACM<br />

Press, New York, NY, 2010, 359-360.<br />

[6] Hrdinova, J., Helbig, N., and Peters, C. Designing Social<br />

Media Policy for Government: Eight Essential Elements.<br />

Center for Technology in Government, University at Albany-<br />

SUNY, NY, 2010.<br />

[7] Mourtada, R. and Salem, F. Social Media in the Arab World:<br />

Influencing Societal and Cultural Change? Technical Report.<br />

Dubai School of Government, 2012.<br />

[8] Noveck, B. Wiki Government: How Technology can Make<br />

Government Better, Democracy Stronger, and Citizens More<br />

Powerful. Brookings Institution Press, Washington D.C.,<br />

2009.


[9] Salem, F. and Jarrar, Y. Cross Agency Collaboration in the<br />

UAE Government, the Role of Trust and Impact of<br />

Technology. Technical Report. Dubai School of Government,<br />

2009.<br />

[10] United Nations Department of Economic and Social Affairs.<br />

United Nations E-Government Survey 2012: e-Government<br />

for the People. Technical Report. New York, United Nations<br />

Publications, 2012.<br />

[11] World Economic Forum. The Global Agenda 2009. Geneva,<br />

Switzerland, 2009.<br />

510


System For Measuring e-Gov: A Multi-stakeholder<br />

Approach<br />

Camilo Cristancho Mantilla<br />

Externado University of Colombia<br />

St. 12 # 1-17 east. Bogota, Colombia<br />

+ 34 622 444607<br />

camilo.cristancho@uexternado.edu.co<br />

ABSTRACT<br />

This paper describes a model for measuring e-government (e-gov)<br />

performance, which intends to integrate a multi-stakeholder<br />

approach within a contextual appraisal. Basically, it measures<br />

capacities (readiness) of public agencies to implement e-gov<br />

strategy, and results (use and performance) of citizens, businesses<br />

and civil servants.<br />

Categories and Subject Descriptors<br />

K.4 [Computers and Society]: Public Policy<br />

General Terms<br />

Documentation<br />

Keywords<br />

E-gov, e-government measurement, e-services<br />

1. INTRODUCTION<br />

In 2009 the District Systems Commission (DSC), responsible for<br />

IT public policy in the Mayoralty of Bogota - Colombia,<br />

established an action plan for implementing the e-gov and digital<br />

city strategy. This Plan defined 12 macro-projects which integrate<br />

71 single projects related to IT, formulated by all the government<br />

offices in the city.<br />

To control the advancement and effectiveness of this initiative,<br />

DSC required a tool to monitor and measures the development<br />

and results of e-gov and digital city actions. Considering this<br />

need, the Externado University of Colombia developed a<br />

monitoring and measurement system of e-gov and smart city<br />

(SMECI by its acronym in Spanish).<br />

2. MODEL DESCRIPTION<br />

2.1 Objectives<br />

The objective of SMECI is to monitor performance and results of<br />

projects related to Bogota’s e-government and digital city<br />

strategy.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

511<br />

Juan Carlos Noriega Silva<br />

Externado University of Colombia<br />

St. 12 # 1-17 east. Bogota, Colombia<br />

+57 1 3537000 ext. 11-59<br />

juanc.noriega@uexternado.edu.co<br />

The model intends to measure and describe 1. Who uses egovernment<br />

services in Bogota, 2. How is e-gov used in the<br />

district?, and 3. To what extent do citizen perspectives vary on<br />

their evaluation of e-gov experiences?<br />

Furthermore, it aims to identify the most relevant factors that<br />

explain the differences in usage, performance and readiness<br />

levels, answering 1. Which attributes of citizen are related with<br />

the best experiences in using Bogotá's e-services? And 2. What<br />

practices of local government agencies determine differences in<br />

usage/performance/readiness levels?<br />

2.2 Methodological Approach<br />

On one hand SMECI takes information of indirect sources,<br />

obtained from reports of e-gov strategy and information society<br />

indicators of Bogota and its localities. On the other hand, it takes<br />

information of direct sources, obtained from internal and external<br />

users of e-services provided by Bogota’s Mayoralty entities. This<br />

information is captured through user surveys filled out by people<br />

who interact with the district public bodies (civil servants, citizens<br />

and businesses).<br />

2.3 Measurement Framework<br />

The model focuses on users and context, considering the elements<br />

of the e-gov strategy. It is divided into supply and demand<br />

components and internal and external actors of e-gov as shown in<br />

Table 1.<br />

Table 1. Contents of the e-gov measurement framework<br />

Side Supply Demand<br />

Internal<br />

Bogota's<br />

Administration<br />

External<br />

Government<br />

Private Sector<br />

Civil Society<br />

Quadrant II<br />

Evaluation of G2G,<br />

G2B and G2C.<br />

Entities as providers.<br />

Institutional readiness.<br />

Quadrant III<br />

Service and<br />

infrastructure<br />

Institutional Conditions<br />

Quadrant I<br />

Demand G2G -<br />

Entities as users.<br />

Characterization<br />

of internal users.<br />

Quadrant IV<br />

Characterization<br />

of External Client<br />

The first component of model (Quadrant I), incorporates products<br />

and services provided in G2G relationships. It refers to<br />

information and resources exchanged by public employees or<br />

local government offices. It involves the internal use of e- services<br />

in interactions, processes and services between government<br />

offices and the characterization of government officers and


internal users. The evaluation includes characterization of civil<br />

servants' skills and attitudes, as well as specific conditions that<br />

determine their performance in providing e-services. It’s centered<br />

on surveys oriented to civil servants as users of e-gov services.<br />

This evaluation intends to identify cross-agency interaction needs<br />

through an estimation of the information and requirements<br />

received in agencies, in order to detect priorities and restrictions<br />

in information flow processes.<br />

The second component of model (Quadrant II), incorporates the<br />

supply side of product and services provided in G2G, G2C and<br />

G2B relationships. Its purpose is to gauge these services, on four<br />

dimensions: e-gov performance models used in international<br />

practices, national and district plans of e-gov, user expectations,<br />

macro-projects and projects of each singular entity. A first<br />

dimension considers common and international evaluation models<br />

in order to make comparisons between different administrations<br />

and to take elements of analysis previously tested. The second,<br />

adapts the local context policies to delimit expectations of<br />

District and National authorities. Accordingly, SMECI uses<br />

guidelines established in the Online Government Manual and the<br />

Monitoring Guide of advancement in the stages of e-government.<br />

In the third dimension performance is measured by all key<br />

stakeholders (civil servants, citizens and businesses). This<br />

measurement is based on subjective evaluation of the services in<br />

the case of citizen’s surveys, and the effectiveness in the case of<br />

public servants. The survey also includes use and appropriation<br />

categories in the case of public servants. The fourth dimension is<br />

oriented to control the internal performance by looking at the<br />

achievement of goals and advancements in projects. This<br />

dimension also includes internal indicators that agencies consider<br />

pertinent to measure the e-gov and digital city macro-projects.<br />

The third component of model (Quadrant III) proposes a<br />

characterization centered on particular conditions of city to<br />

provide ICT products and services, and normative frameworks<br />

which regulate relations between public and private actors. This<br />

categorization is made through objective observations, from<br />

national or international statistics, and expert evaluations. It<br />

involves external provision of ICT infrastructure and services<br />

from private sector and institutional conditions from the National<br />

government context. To do so, in this component are monitored<br />

changes and cross-case variations in IT services, ICT<br />

infrastructure and external institutional conditions.<br />

The fourth component (Quadrant IV) is proposed to characterize<br />

the demand of external actors, evaluating socio-demographic<br />

characteristics, as well as access and abilities for using ICTs. This<br />

measurement allows understanding differences between<br />

communities about needs, services and channels used by<br />

population groups in their relationship with government.<br />

3. CONCLUSION<br />

E-Gov studies focus mainly on supply-side evaluation given the<br />

difficulty of involving user surveys or other sophisticated<br />

measurement tools which are complex and need expensive data<br />

512<br />

collection and analysis. However, understanding the particular<br />

success factors and leveraging points of e-gov performance in<br />

contexts with heterogeneous institutional and organizational<br />

conditions and IT environments, is a central matter for success in<br />

implementation. This implies that countries with higher diversity<br />

in conditions of government offices need to assume higher costs<br />

in monitoring the context and conditions that enable e-gov<br />

development.<br />

The model developed by the Externado University of Colombia<br />

uses a multi-stakeholder evaluation, responding to the following<br />

particularities and challenges of Bogota: 1. Limited information<br />

on citizen preferences for government services. 2. Dynamic<br />

business needs in a complex regulatory and policy context, and<br />

3.A unique model for public employment dependent on external<br />

contracting of the public workforce.<br />

The SMECI articulates programs and projects of the Mayoralty’s<br />

agencies, based on the operative and legal framework. On the one<br />

hand, the model focuses on macro-projects, formulated to ensure<br />

the strategic alignment between IT projects executed by Bogota’s<br />

Mayoralty agencies and the entire e-gov strategy of Bogota, as<br />

mentioned before. On the other hand, the model bases its<br />

measurement on the compliance of obligations established in<br />

norms and policies of the national and district level. In this way,<br />

this model also takes into account the normative development<br />

generated within the whole-of-government of Colombia.<br />

The model was designed for a comprehensive evaluation which<br />

includes readiness, ongoing service and cutting edge innovations<br />

in e-services and systems integration of the Mayoralty, in order to<br />

attend the differing levels of maturity in the government offices<br />

within Bogota and their interaction with government bodies in the<br />

National and local level.<br />

4. REFERENCES<br />

[1] Ana Waksberg-Guerrini & Eduard Aibar. Toward a Network<br />

Government. A Critical Analysis of Current Assessment<br />

Methods for eGov. (2007) Accessed at:<br />

http://eprints.uoc.edu/research/bitstream/10363/521/1/waksb<br />

erg_aibar.pdf<br />

[2] Deloitte Consultants & Indigov. Study on User Satisfaction<br />

and Impact in the EU 27. (2009). Accessed at:<br />

http://business.motorola.com/americalatina/rankingciudadesd<br />

igitales/index.html<br />

[3] Partership on measuring ICT for development. Accessed at:<br />

http://www.uis.unesco.org/Communication/Documents/Core<br />

_ICT_Indicators_2010.pdf<br />

[4] Programa Gobierno en Línea y Universidad de los Andes.<br />

Metodología de Monitoreo y Evaluación de Gobierno en<br />

línea. (2009). Accessed at:<br />

http://programa.gobiernoenlinea.gov.co/documentos.shtml?a<br />

pc=e1a1--&s=e&m=b&cmd[17]=c-1-<br />

'300'&als[MIGA____]=Metodolog%EDas


The Digital Divide’s Devaluing of Local E-Government<br />

Richard Huff<br />

Virginia Commonwealth University<br />

923 W. Franklin Street<br />

P.O. Box 842028<br />

00-1-804-827-1430<br />

rrhuff@vcu.edu<br />

ABSTRACT<br />

Despite an abundance of literature on the potential of egovernment<br />

to improve service delivery and alter the relationship<br />

between citizens and government, few scholars have addressed<br />

perhaps the most obvious barrier: the digital divide. This proposed<br />

research highlights the importance of understanding the<br />

complexity of technology and the digital divide as well as users<br />

themselves before implementing solutions.<br />

Keywords<br />

Digital divide, e-government demand, evaluation, user-centered<br />

1. INTRODUCTION<br />

Government today faces the challenge of using 21st<br />

century technologies and strategies to address last century’s<br />

problems. The allure of new tools coupled with extant social and<br />

economic problems has sometimes resulted in the elevated<br />

expectation of information technology. As a result, many have<br />

positioned e-government and its transformative potential as a<br />

solution for more transparent government. Despite the worthiness<br />

of that goal, its long-term agenda should not obfuscate the reality<br />

of today which is that transactional forms of e-government remain<br />

difficult to achieve.<br />

At the local level, e-government efforts have stagnated<br />

in their evolutionary tracks [3], and public officials face the<br />

challenge of assessing e-government demand, not just supply.<br />

Questions aimed at whether governments are ready to supply<br />

citizens with new tools miss the second half of the equation,<br />

which is, do citizens even want e-government and can they use it?<br />

[1]. Much of the academic literature to date has focused on<br />

supply-side factors and few scholars have emphasized the<br />

limitations posed by the digital divide [8][20]. A lack of<br />

alignment between supply and demand may result in wasted<br />

investments, ineffective services and the unintended consequence<br />

of lower levels of trust between citizens and government--just the<br />

opposite e-government’s intent [8].<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

513<br />

Liana Kleeman<br />

Virginia Commonwealth University<br />

921 W. Franklin Street<br />

P.O. Box 842028<br />

00-1-804-827-2168<br />

lmkleeman@vcu.edu<br />

2. DEMAND-SIDE CONSIDERATIONS<br />

Before designing or implementing e-government tools,<br />

administrators must first understand the macro context (including<br />

social, political and economic influences on individuals’<br />

relationships with technology) as well as users. Without<br />

recognizing the complexity and multi-dimensionality of<br />

technology, the digital divide and users themselves, e-government<br />

will miss the mark.<br />

3.1 Understanding technology & the digital<br />

divide<br />

Technology is a vague term with seemingly limitless<br />

meanings. It almost seems that as technology becomes more<br />

pervasive in the digital age, the less it is understood. Specifically,<br />

those who use technology multiple times a day on multiple<br />

devices and for multiple purposes often assume that everyone else<br />

is accessing and using technology in similar ways, or, at least, can<br />

do so if they choose.<br />

Orlikowski [16][17] advocates for a reconstruction of<br />

the concept of technology, one that is multi-dimensional,<br />

emergent and accounts for the reality that technology is<br />

“continually socially and physically constructed” [16][17].<br />

Orlikowski’s [16][17] structurational theory of technology reveals<br />

the shortcomings of a techno-centric approach to e-government<br />

and instead, emphasizes the intersectionality of technology with<br />

human agents and organizational structures. A narrow focus on<br />

just one element will result in an overly simplistic rendering of<br />

new technologies and their potential impact.<br />

Just as the notion of technology is complex, so, too, is<br />

the digital divide. Importantly, the digital divide is not a<br />

technology problem; rather, it is a social and economic problem<br />

with a technological component. Similar to Orlikowski’s claim<br />

that technology is dependent on human interaction and<br />

organizational structures, the digital divide stems from a<br />

compounding of systemic social and economic issues.<br />

Despite national statistics that suggest all demographic<br />

groups are increasingly going online today, they are not doing so<br />

at equal rates [15]. The digital divide extends beyond simplistic<br />

notions of technology haves and have not’s to include whether<br />

people can participate and prosper in the digital age [6]. At a<br />

micro level, individuals must have access to new technologies and<br />

the skills to use them in meaningful ways, yet at a macro level,<br />

they must be able to participate in society, socially, economically<br />

and politically [14]. The divide may best be viewed as a


continuum in which individuals must gain additional access and<br />

skills to take advantage of new opportunities afforded by<br />

technology. Schradie’s [22] work confirms, however, that<br />

disparities may persist even once groups are online. In looking at<br />

who produces content (i.e., the opposite of passive information<br />

consumption), she finds that only one-fifth of people actually<br />

contribute online, and that they tend to be those with higher<br />

educational levels. In fact, people are four times more likely to<br />

produce content yesterday if they have a college level education<br />

versus a high school degree [22]. Importantly, the digital divide is<br />

not a static problem but, instead, constantly evolves and amplifies.<br />

Technology-based initiatives can reinforce existing inequities if<br />

not implemented strategically and if larger social and economic<br />

forces are overlooked [11]. As quickly as technology changes, so,<br />

too, does the digital divide, constraining not only individuals but<br />

entire communities and geographic regions.<br />

Hilbert [9] suggests a lack of understanding of the<br />

digital divide may result ineffective and wasted efforts. He posits<br />

that interpretations of the divide are as diverse as the impacts<br />

organizations seek and encourages the development of a larger<br />

framework for comparing and contrasting definitions. Definitions<br />

of the digital divide may vary depending on organizations’ views<br />

of who is affected (e.g., individuals, communities), their<br />

characteristics (e.g., income, age), the level of digital<br />

sophistication (e.g., basic access or effective adoption) and the<br />

type of technology (e.g., mobile, computers) [9]. In effect, with<br />

various definitions of the digital divide possible, one organization<br />

may believe the divide is shrinking while another may view it as<br />

widening [9].<br />

Lastly, it is important to briefly note Goldfinch’s [5]<br />

work which demonstrates varying interpretations of e-government<br />

based upon the position and knowledge of government<br />

employees. Goldfinch [5] employs agency theory to explore why<br />

certain principals and actors approach e-government differently<br />

and how these diverse outlooks, approaches and understandings<br />

can undermine the effectiveness of efforts. For example, managers<br />

tend to take an entrepreneurial approach to technology and are<br />

more heavily influenced by bureaucratic structures, while IT<br />

professionals tend to focus on the technology itself absent the<br />

larger contexts and strategies [5].<br />

3.2. Understanding users of e-government<br />

Once government administrators understand the<br />

connections and disconnects among their conceptions of egovernment,<br />

technology and the digital divide, they must then<br />

commit to understanding users. A user-centric approach shifts the<br />

focus to the needs and wants of citizens and allows them to drive<br />

e-government development [26]. According to a report of the<br />

OECD [18], this shift away from technology toward citizens<br />

began in mid-2000’s; however, it is questionable as to what extent<br />

change has actually occurred [1][24].<br />

Understanding the user requires the recognition that<br />

user groups are diverse, not homogenous [8]. Ferro and Molinari<br />

[4] suggest that government tends to categorize users by degrees<br />

of access, skills and motivation, all of which are elements akin to<br />

the digital divide. Without a shared understanding of all<br />

stakeholders’ “interests, perspectives, value dimensions and<br />

benefits,” up-take, or e-government adoption, will be limited [21].<br />

Furthermore, a failure to recognize that many users cannot access<br />

e-government, know how to use e-government or prefer more<br />

traditional communication channels weakens the success of e-<br />

514<br />

government efforts and may prop up a new “e-aristocracy”<br />

marked by elite individuals obtaining greater power [19]. Brewer,<br />

Neubauer and Geiselhart [2] suggest administrators have a<br />

responsibility to actively shape e-government based on<br />

democratic values to narrow gaps between the “information elite”<br />

and the “information poor.” Not addressing this gap may prove<br />

detrimental to goals of efficiency since those who depend on<br />

government the most often have the least access.<br />

3.3 Evaluating demand<br />

Lastly, governments serious about digital inclusion must<br />

commit to measuring demand. Despite the importance of egovernment<br />

assessments, there has been a general lack of<br />

evaluation and measurement [4]. Even at the federal level,<br />

agencies have developed plans and good practices in adherence to<br />

the Open Government Initiative but do not specifically address the<br />

impact of these efforts [12]. In the 2011 ICMA survey [10], 14%<br />

of local governments claim that a lack of demand poses a barrier<br />

to e-government efforts, but there is no indication of how demand<br />

was measured, if at all. An earlier ICMA survey reveals few local<br />

governments surveyed their citizens to better understand demand,<br />

and it appears measurements often fail to assess the complexities<br />

of demand-side factors [23]. Evaluations of the digital divide also<br />

fall short. With broadband adoption data primarily stemming from<br />

non-transparent businesses, knowledge at the local level remains<br />

limited. Today, local governments have a basic understanding of<br />

access and subscription rates but little more, e.g., how people use<br />

technology and for what purposes.<br />

Governments must understand why people use egovernment<br />

as well as why they do not. Given the rate that<br />

technology changes, citizen feedback is especially important to<br />

ensure offerings align with preferences and are utilized [25]. An<br />

absence of feedback loops places the alignment of supply and<br />

demand in jeopardy and threatens government’s ability to adapt as<br />

users’ needs change [25]. Measurements may include evaluations<br />

of user satisfaction, awareness of services, access to technology,<br />

skill levels, trust and preference of communication channels;<br />

further, assessments should move beyond outputs to include<br />

outcomes [25][13]. As budgets constrict government faces<br />

increasing pressure to justify expenditures and demonstrate a<br />

return on investment; therefore, evaluation remains critical to<br />

designing and sustaining e-government efforts [18].<br />

5. CONCLUSION<br />

With little written on the interdependence of egovernment<br />

and the digital divide, and a profound lack of data on<br />

technology adoption and use at the local level, this proposed study<br />

will contribute knowledge about how local governments deploy egovernment<br />

in the absence of good information.<br />

REFERENCES<br />

[1] Bertot, J.C., & Jaeger, P.T. (2006). User-centered egovernment:<br />

Challenges and benefits for government<br />

websites. Government Information Quarterly, 23, 163-168.<br />

[2] Brewer, G.A., Neubauer, B.J., & Geiselhart, K. Designing<br />

and implementing e-government systems: Critical<br />

implications for public administration and democracy.<br />

Administration and Society, 38(4), 472-499.


[3] Coursey, D., & Norris, D.F. (2008). Models of egovernment:<br />

Are they correct? An empirical assessment.<br />

Public Administration Review, 68(3), 523-536.<br />

[4] Ferro, E., & Molinari, F. (2010). Making sense of egovernment<br />

2.0 strategies: “no citizens, no party.” eJournal<br />

of E-Government and E-Democracy, 2(1), 56-68.<br />

[5] Goldfinch, S. (2007). Pessimism, computer failure and<br />

information systems development in the public sector. Public<br />

Administration Review, 67(5): 917-929.<br />

[6] Gordo, B. (2008). Disconnected: A community and<br />

technology needs assessment of the Southeast Los Angeles<br />

Region (SELA). Retrieved from Academia.edu:<br />

http://bit.ly/Al3j51<br />

[7] Green, L. (2001). Technoculture: From alphabet to cybersex.<br />

St. Leonards, N.S.W: Allen & Unwin.<br />

[8] Helbig, N., Gil-Garcia, J.R., & Ferro, E. (2009).<br />

Understanding the complexity of e-government: Implications<br />

from the digital divide literature. Government Information<br />

Quarterly, 26(1), 89-87.<br />

[9] Hilbert, M. (2011). The end justifies the definition: The<br />

manifold outlooks on the digital divide and their practical<br />

usefulness for policy-making. Telecommunications Policy,<br />

35, 715-736.<br />

[10] ICMA. (2011). Electronic government 2011. Retrieved from<br />

the ICMA website: http://bit.ly/Hrgpok<br />

[11] Kvasny, L. (2006). Cultural (re)production of digital<br />

inequality in a US community technology initiative.<br />

Information, Communication & Society, 9(2), 160-181.<br />

[12] Nabatchi, T. (2012). A manager’s guide to evaluating citizen<br />

participation. Retrieved from the IBM Center for the<br />

Business of Government website: http://bit.ly/At8mkm<br />

[13] Milliard, J. (2008). E-Government measurement for policy<br />

makers. European Journal of e-Practice. Retrieved from<br />

http://www.epractice.eu/files/4.3.pdf<br />

[14] Mossberger, K., Tolbert, C.J., & Stansbury, M. (2003).<br />

Virtual inequality: Beyond the digital divide. Washington,<br />

DC: Georgetown University Press.<br />

[15] National Telecommunications and Information<br />

Administration (NTIA). (2011). Digital nation: Expanding<br />

515<br />

Internet usage. Retrieved from the NTIA website:<br />

http://1.usa.gov/xOqiUJ<br />

[16] Orlikowski, W.J. (2000). Using technology and constituting<br />

structures: A practice lens for studying technology in<br />

organizations. Organization Science, 11(4), 404-428.<br />

[17] Orlikowski, W.J. (1992). The duality of technology:<br />

Rethinking the concept of technology in organizations.<br />

Organization Science, 3(3), 398-427.<br />

[18] Organisation for Economic Co-operation and Development<br />

(OECD). (2009). Rethinking e-government services: Usercentered<br />

approaches. Retrieved from the OECD website:<br />

http://bit.ly/2XRQ3A<br />

[19] Pena-Lopez, I. (2011). The disempowering goverati: Earistocrats<br />

or the delusion of e-democracy. eJournal of E-<br />

Government and E-Democracy, 3(1), 1-21.<br />

[20] Reddick, C.G. (2005). Citizen interaction with e-government:<br />

From the streets to the servers? Government Information<br />

Quarterly, 22(1), 38-57.<br />

[21] Rowley, J. (2011). E-government stakeholders—Who are<br />

they and what do they want? International Journal of<br />

Information Management, 31(1), 53-62.<br />

[22] Schradie, J. (2011). The digital production gap: The digital<br />

divide and Web 2.0 collide. Poetics, 39(2), 145-168.<br />

[23] Shareef, M.A., Kumar, V., Kumar, U., & Dwivedi, Y.K.<br />

(2011). E-government adoption model (GAM): Differing<br />

service maturity levels. Government Information Quarterly,<br />

28(1), 17-35.<br />

[24] Van Dijk, J., Peters, O., & Ebbers, W. (2008). Explaining the<br />

acceptance and use of government internet services: A<br />

multivariate analysis of 2006 survey data in the Netherlands.<br />

Lecture Notes in Computer Sciences, 4084, 269-280.<br />

[25] Verdegem, P., & Verleye, G. (2009). User-centered egovernment<br />

in practice: A comprehensive model for<br />

measuring user satisfaction. Government Information<br />

Quarterly, 26(3), 487-497.<br />

[26] Wang, Yih-Jeou. (2009). Rethinking e-government services:<br />

User-centered approaches. Retrieved from the Organisation<br />

for Economic Co-operation and Development website:<br />

http://bit.ly/2XRQ3A


The Importance of Electronic Accessibility in Brazilian<br />

Juridical Electronic Process<br />

Adriana Simeão Ferreira<br />

IBDE<br />

Rua D. Nelson de Sá Earp, 95<br />

Gr.301 Petrópolis- RJ- Brazil<br />

+55-69-8112-4467<br />

adrisimeao@hotmail.com<br />

ABSTRACT<br />

This article aims at proposing the implementation of accessibility<br />

requirements in the pilot project of electronic process in the<br />

Brazilian Labor Judiciary Branch through analysis and research of<br />

disabled Brazilians’ reality, regarding the access to electronic<br />

means and mobile devices, observing, above all, international and<br />

domestic access standards. In addition to studying the reality of<br />

persons with disabilities, this paper aims at drawing some<br />

guidelines for implementation of this electronic accessibility<br />

requirements in the process of the Brazilian Labor Judiciary<br />

Branch.<br />

Categories and Subject Descriptors<br />

K.4.3 [ Computer and Society ]: Organizational Impacts –<br />

Automation, Computer-Supported Collaborative Work,<br />

Reegineering; K.J.1 [ Computer Aplications ]: Administrative<br />

Data Processing – Government;<br />

General Terms<br />

Management, Experimentation, Human Factors, Standardization,<br />

Theory, Legal Aspects.<br />

Keywords<br />

Labor Justice, Accessibility, Process, Strategic Management,<br />

Public Sector.<br />

1. INTRODUCTION<br />

In December 2006, after enacting the Law nº 11,419, which<br />

created the Brazilian Juridical Electronic Process, Brazil has taken<br />

a step forward into implementing the juridical electronic process.<br />

From that time on, Brazilian courts began to seek technological<br />

improvements in its infrastructure. After a short period of time,<br />

besides several innovations brought in, the Brazilian Judiciary<br />

Power, in June 2011, officially ushered in the Juridical Electronic<br />

Process Project (PJe).<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Daniel Gonçalves de Melo<br />

TRT 14<br />

Rua Almirante Barroso,600<br />

Porto Velho – RO<br />

+55-69-81124467<br />

Melodg@uol.com.br<br />

516<br />

Leondeniz Freitas<br />

TRT 9 Região<br />

Alameda Dr. Carlos de Carvalho, 528,<br />

Centro; Curitiba - PR<br />

+55-69-81124467<br />

leondenizfreitas@trt9.jus.br<br />

This project is a computer system developed by the National<br />

Council of Justice, in partnership with other courts, in order to<br />

build an “Electronic” Judiciary. The idea was to gather the efforts<br />

of Brazilian courts towards adopting a unique solution for<br />

electronic process. With the PJe, not only magistrates, but also<br />

civil servants and other participants in procedural phases shall<br />

exert juridical acts directly in the system, by fully electronic<br />

means, as well as following all juridical phases of a process.<br />

Nowadays, initial versions of the System are being implemented<br />

in five regions of Brazil. However, after practicing the first<br />

juridical acts and developing the System, pundits have<br />

acknowledged a dire need for adapting the PJe to accessibility<br />

principles.<br />

To talk about accessibility is to speak of equality and parity as<br />

well. The accessibility movement, whether the architectural,<br />

digital or of attitude, impels the diminishing of barriers imposed<br />

by a peculiar characteristic of such individuals. Accessibility, to<br />

persons with disabilities, represents the right of no impediments<br />

when it comes to architecture, communication, physical access,<br />

equipments, adequate content programmes and presentation of<br />

alternative information files. The goal is to provide unrestricted<br />

and wide access to such people. To evaluate and measure the<br />

importance of accessibility in the current context is not an easy<br />

task. For the broadness of this subject, we deem it as a principle<br />

that should be unwaveringly followed, once it should be the basis<br />

of any rule or standard related to human dignity. Accessibility is<br />

not limited to just allowing persons with disabilities (or with<br />

reduced capability) to take part in activities which include the use<br />

of products, services and information, but also to provide them an<br />

opportunity of inclusion and extension of such rights, to all social<br />

classes.<br />

Every action aiming at accessibility is very important.<br />

Nevertheless, given the progress of information and<br />

communication technologies, electronic accessibility has become<br />

a fundamental tool for developing any application in technological<br />

fields, especially in Brazil, where recent data (year 2010) from the<br />

Statistics and Geographical Brazilian Institute (IBGE) appoints<br />

that 45,6 millions of people have some sort of disability, which<br />

accounts for 23.91% of the Brazilian population. From that<br />

amount, 12,7 millions (6.7% of the whole population) have at<br />

least a severe kind of deficiency. In these numbers one may also<br />

find persons with disabilities in risk situations, such as extreme<br />

poverty, abandonment and social isolation.


In Brazil, electronic accessibility has been the subject of laws, and<br />

the Federal Government has been implementing several projects<br />

for installing it in Brazilian courts. However, the Judiciary Power<br />

still needs proper actions pertaining to accessibility, especially<br />

when it comes to electronic accessibility.<br />

Furthermore, despite the efforts made by the federal government,<br />

there are still numerous websites and technological systems of<br />

municipal governments and courts which do not yet abide by the<br />

criteria established in international norms of accessibility or even<br />

in the Brazilian accessibility model [1], the E-mag (Government<br />

Electronic Accessibility Model). Besides, the UN Convention on<br />

the Rights of Persons with Disabilities, ratified as a constitutional<br />

rule in Brazil (by the 186/2008 decree), determines, in the article<br />

9, that States Parties shall take appropriate measures to ensure to<br />

persons with disabilities access, on an equal basis with others, to<br />

information and communications technologies and systems, which<br />

includes the Electronic Process.<br />

2. CRITERIA FOR ACCESSIBILITY IN<br />

THE PROJECT OF JURIDICAL<br />

BRAZILIAN ELECTRONIC PROCESS<br />

The central element of this approach is exactly how to implement<br />

the changes in the right time and how to fully carry out the<br />

project, following accessibility standards, whether it be the model<br />

used by the Federal Government, or the international one. In this<br />

context, the Superior Council of Labor Justice has been gathering<br />

efforts in order to guide the criteria for implementation. However,<br />

it is worth to point out the following guidelines:<br />

1) The project shall be in full conformity with the UN<br />

Convention, particularly with its article 9, and with the<br />

186/2008 decree;<br />

2) The project shall make compatible the usability patterns<br />

with the ones of accessibility, in a way that each pattern<br />

does not rule out another. Also, the accessibility and<br />

usability’s integration shall be searched, because not yoking<br />

such concepts might result in different barriers to the users;<br />

3) Court Accessibilities Commissions shall be created,in order<br />

to continuously monitor and supervise the project<br />

development;<br />

4) The approached pattern shall include electronic accessibility<br />

to persons with all sorts of disabilities, in a way that web<br />

patterns shall merge fully with accessibility guidelines;<br />

517<br />

5) To advance with internal norms form the Courts: there<br />

should be internal norms which deal specifically with<br />

Electronic Process;<br />

6) To implement the electronic process aligned with the court’s<br />

Strategic planning: this alignment will be essential in order<br />

to minimize the risks of implementing and maintaining the<br />

technological environment of this new tool, especially<br />

because the electronic process involves direct consequences<br />

to society. Also, it is important to prioritize the Courts’<br />

strategies, by implementing an IT governance plan, in order<br />

to strengthen the Information Technologies sector.<br />

3. CONCLUSION<br />

For these reasons, it is clear that implementing accessibilities<br />

requirements in the electronic process is essential to reap a<br />

successful project, given that the number of persons with<br />

disabilities is approximately of 45 millions of people. Therefore,<br />

according to what has been verified in the studied cases, it is of<br />

good advice to adopt planning criteria in the implementation<br />

project, by using models of electronic governance which pertains<br />

the project’s development. It is also imperative to underscore that<br />

the development of juridical electronic process that upholds<br />

accessibilities requirements shall be crucial to the development of<br />

Justice in the Amazon, where some Brazilian Courts are located in<br />

the Amazon and it is very complicated to get to.<br />

Therefore, at the current stage in which the project stands, it is<br />

still possible for the Labor Courts Administration to take efficient<br />

measures in the administrative, juridical and structural spheres, in<br />

order to ensure the implementation of a fair electronic process that<br />

encourages social equality and provides an effectively accessible<br />

tool of electronic justice to persons with disabilities.<br />

4. REFERENCES<br />

[1] Government of Brazil, Acessed on 2 april 2012 at<br />

http://www.governoeletronico.gov.br/acoes-e-projetos/e-<br />

MAG<br />

[2] Kurbalija J. and Gelbstein E 2005. Internet Governance<br />

Issues and Actors and Divisions. Diplofoundation and global<br />

knowledge Partnership<br />

[3] Superior Council of Labor Justice, Acessed on 3 april 2012<br />

at http://www.csjt.jus.br/pje-jt


The Use of Mobile and Wireless Technology and Food<br />

Quality Control in China<br />

Shuhua Monica Liu<br />

Fudan University<br />

No 220, Handan Road,<br />

Yangpu District, Shanghai,<br />

PRC<br />

86-21-55665676<br />

shuhua.monica.liu@gm<br />

ail.com<br />

Qianli Yuan<br />

Fudan University<br />

No 220, Handan Road,<br />

Yangpu District, Shanghai,<br />

PRC<br />

86-21-55665676<br />

qianliyuan1990@gmail.<br />

com<br />

ABSTRACT<br />

The surge of product quality and safety control issue has become<br />

one of the top concerns country wide in recent years. Citizens,<br />

academics and nonprofit organizations urged government<br />

agencies to further refine product quality supervision strategies.<br />

The purpose of this paper focuses on interaction between ICT and<br />

production control, supply, and inspection system.<br />

Categories and Subject Descriptors<br />

H.4.1 [Information systems]: Information systems applications –<br />

Office automation<br />

General Terms<br />

Management, Performance, Human Factors, Standardization<br />

Keywords<br />

Food Safety, Monitoring technology, Mobile and wireless<br />

technology<br />

1. INTRODUCTION<br />

This paper focuses on role and function of mobile technologies in<br />

quality control in China in the past two decades.<br />

1) What mobile tools are employed in quality control systems<br />

in China in the past two decades?<br />

2) What roles are mobile technologies playing in the quality<br />

control and food safety watch system?<br />

2. MOBILE AND WIRELESS<br />

TECHNOLOGIES IN FOOD SAFETY<br />

CONTROL<br />

Major wireless ICTs in quality control system are Wireless Net<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

518<br />

Danyao Li<br />

Fudan University<br />

No 220, Handan Road,<br />

Yangpu District, Shanghai,<br />

PRC<br />

86-21-55665676<br />

danielle.lee.33@hotmail<br />

.com<br />

Lei Zheng<br />

Fudan University<br />

No 220, Handan Road,<br />

Yangpu District, Shanghai,<br />

PRC<br />

86-21-55665676<br />

zhengl@fudan.edu.cn<br />

work, Radio Frequency Identification, Geographic Information<br />

System [1, 2]. Notable advantages of wireless ICT are:<br />

1) Low cost and consistent monitoring, collection and<br />

distribution of accurate product related data<br />

2) Flexibility for product life cycle information transmission<br />

3) Provide a solid base for production strategy adjustment<br />

However, some issues are still a great concern for wireless<br />

systems employment.<br />

1) System reliability, data accuracy, privacy and standard<br />

2) Overwhelming/unstructured data without proper analysis<br />

3) Integration with existing legacy system<br />

4) Commitment of private enterprises<br />

3. RESEARCH DESIGN AND<br />

METHODOLOGY<br />

3.1 Theoretical Framework: Structuration<br />

Theory and Grounded Approach<br />

Structuration theory’s principal is to connect human actions with a<br />

structural explanation in social analysis [3]. It has been widely<br />

applied to research of ICT and its influence on institutional<br />

environments and individual behavior related.<br />

Data analysis is guided by grounded theory. It is to bridge the gap<br />

between theoretically uninformed empirical research and<br />

empirically uninformed theory [4].<br />

3.2 Data Collection<br />

A total of 264 papers and reports meet the criteria of our selection<br />

from mainly two sources:<br />

1) Academic papers in China National Knowledge Infrastructure<br />

and Google Scholar<br />

2) Official reports from database of government agencies and<br />

international organizations<br />

3.3 Multifaceted Coding Methods<br />

We conducted a multifaceted coding on papers and reports<br />

selected based on following aspects in quality control.<br />

1) The specific mobile/wireless ICT used


2) The areas to which mobile and wireless ICT was applied<br />

3) The goals and functions for adopting mobile wireless ICT<br />

4) Impacts and challenges generated by using mobile and<br />

wireless ICT<br />

4. FINDINGS<br />

The 11th five-year plan released by China General Administration<br />

of Quality Supervision, Inspection, and Quarantine demonstrated<br />

Specific<br />

processes<br />

Production<br />

safety<br />

5. DISCUSSIONS<br />

5.1 Micro-level Impacts<br />

1) It helps to refine quality control working procedures and<br />

improve decision making quality and accuracy<br />

2) It empowers FDA officials to take a more proactive role<br />

3) It also helps to efficiently prevent corruptions associated<br />

with loose inspection and quality control.<br />

However, low technical operation capability and capability,<br />

especially the latter one, are two major obstacles for application.<br />

5.2 Intermediary Level Impacts<br />

1) Accurate data accumulated enable private vendors and FDA<br />

to optimize supply chain and decision making.<br />

2) A flatter hierarchy in government is slowly emerging.<br />

3) Communication barriers between agents start breaking.<br />

4) Collaboration between private food suppliers and the FDA<br />

in China is greatly enhanced.<br />

5.3 Macro-level Impacts<br />

1) FDA control began to return with actual data pointing to the<br />

origin of problems and entities for accountability<br />

2) Local FDAs are collaborating to launch a national project<br />

for authentic data to punish vendors’ illegal actions.<br />

3) Public employees' lack of capacity and willingness for<br />

information processing and sharing<br />

4) Food vendors’ low motivation to install inspection system<br />

due to high cost and resistance to share with FDA key data.<br />

that China’s FDA invested heavily in national food quality control<br />

infrastructure. The pilot project called “Golden in 2006 Quality”,<br />

consists of one network, including all equipments and network<br />

platforms; one database, “Quality Supervision Administration<br />

Database”; three systems, Quality Supervision, Inspection and<br />

Management System, Administrative Licensing and Management<br />

System, Quality Inspection Information Service System. We<br />

present our findings on the use of mobile ICT for food and drug<br />

safety management in Table 1.<br />

5) Lack of legal and regulatory environment for food quality<br />

Table 1: Major mobile and wireless technologies used for food quality control<br />

Mobile ICT involved Purpose Actual Impact<br />

RFID; Wireless sensor<br />

system; coding techniques;<br />

Supply chain RFID; ZIGbee; GIS; GPS;<br />

RS etc<br />

Monitoring<br />

and Tracing<br />

Emergency<br />

management<br />

Collect and manage data on production<br />

environment and individual identifier<br />

Optimize business flows in supply chain;<br />

improve transportation efficiency;<br />

supervise and inspect product quality<br />

GPRS; RFID; GPS; GIS; Supervise products in the market;<br />

Consumer inquiry of product data<br />

ArcGIS server Food and Drug emergency data<br />

collection, analysis and application<br />

519<br />

Visual presentation of production environment<br />

on GIS; RFID system for product information<br />

collection, identification and retrieval<br />

“3S” system for vehicle tracking and<br />

dispatching; In-transit merchandise inspection<br />

and management with RFID<br />

Data inquiry on the entire production process in<br />

the central database with PDA<br />

Backtrack product information in the case of<br />

emergencies<br />

control to punish private vendors' wrongdoings<br />

6. CONCLUSION<br />

In this paper, we reviewed academic papers and reports published<br />

to understand roles and impacts of mobile and wireless<br />

technology in food quality control in China. More progress on<br />

three levels is still required before mobile and wireless ICT can<br />

unleash its full potential in quality control system.<br />

7. ACKNOWLEDGMENTS<br />

We want to thank multiple funding agencies for their generous<br />

support on the research: China National Social Science<br />

Foundation (Project ID: KRB3056068), Shanghai Pujiang<br />

Program (Project ID: KBH3056609), New Faculty Member Startup<br />

Programs, China Ministry of Education (Project ID:<br />

JJH3056008), Fudan 985 Program (Project ID: 2011SHKXZD013)<br />

8. REFERENCES<br />

[1] N. Wang, N. Zhang, M. Wang “Wireless sensors in<br />

agriculture and food industry, Recent development and future<br />

perspective” Computers and Electronics in Agriculture 50<br />

(2006) 1–14<br />

[2] P. Kumar, H. Reinitz, J. Simunovic, K.Sandeep, P. Franzon<br />

“Overview of RFID technology and its applications in the<br />

food industry” Journal Of Food Science Vol. 74, Nr. 8, 2009<br />

[3] A. Giddens (1979) New rules of sociological method<br />

London: Hutchinson.<br />

[4] Frank, Dirk and Riedl, Peter “Theoretical foundations of<br />

contemporary qualitative market research” Forum:<br />

Qualitative Social Research, 2004, 5(2), ART, 30.


The Use of Recursive Bisection in the Mapping of Sample<br />

New York State Electoral Districts<br />

David Molik<br />

Tetherless World Constellation<br />

Rensselaer Polytechnic Institute<br />

110 8 th Street, Troy, NY 12180<br />

+1 (716) 982-5235<br />

molikd@rpi.edu<br />

ABSTRACT<br />

In this paper, we describe the use of open, linked data with the<br />

utilization of recursive bisection in the mapping of sample New<br />

York State Electoral Districts. The use of data in a novel way<br />

provides a solution to complications caused from the creation of<br />

electoral districts.<br />

Categories and Subject Descriptors<br />

J.1 [COMPUTER APPLICATIONS]: Administrative Data<br />

Processing – Government.<br />

General Terms<br />

Algorithms, Management, Design<br />

Keywords<br />

Data integration, open data, electoral districts<br />

1. INTRODUCTION<br />

The emergence of large data sets that are formed through the<br />

mining of the World Wide Web provides an opportunity for many<br />

people such as politicians, social scientists, and economists to<br />

correlate and visualize this data for its benefit to society and the<br />

growth of knowledge around the world. The creation of such<br />

analytical tools from this linkage of data is what this research<br />

project has done using the latest practices in linked and open data.<br />

In the State of New York Electoral state senate electoral districts<br />

have been created through a political process. This process has<br />

been referred to as gerrymandering. The District Mapping<br />

algorithm used is an alternative to the more political process.<br />

Vickers [1] describes complications in electoral district creation in<br />

the Prevention of Gerrymandering, especially in the areas of<br />

disproportionate representation of political parties among its<br />

constituents. We have designed a general approach to the<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

520<br />

Michelle Sharer<br />

Tetherless World Constellation<br />

Rensselaer Polytechnic Institute<br />

110 8 th Street ,Troy, NY 12180<br />

+1 (518) 276-4384<br />

sharem@rpi.edu<br />

construction of electoral districts by leveraging the use of a<br />

recursive bisection mapping algorithm and varied granularities of<br />

Economic, Voter Registration, and Racial data. The initial demo 1<br />

utilizes New York State, statewide voter registration data that it<br />

combines with a linked data approach to public record data.<br />

Minority data is kept by all county governments in New York<br />

State and is also accounted for in the mapping. This algorithm<br />

system seemingly removes the need for gerrymandering. Political<br />

scientists, politicians, and economists predicting electoral polls<br />

and assessing the importance of why such relationships exist<br />

between race, voting, and the economy can use the demo, as an<br />

analytical tool.<br />

Figure 1. A visual on how<br />

data is brought together<br />

Figure 2. Shows the early use of recursive<br />

bisection on a abstract square state<br />

1 Published demo: http://aquarius.tw.rpi.edu/projects/districts/


2. OVERVIEW OF DISTRICT MAPPING<br />

The mapping of the Sample Electoral Districts in New York State<br />

creates a number of districts on coordinate plain by taking into<br />

account a number of user controllable weights on variables. As<br />

shown in Figure 1 various data are collated and mapped to create<br />

districts. The mapping algorithm requires that the data that is<br />

being used have the ability to be in a coordinate plain. The<br />

original data that was being used contained 13 million data points,<br />

in which the location was an Address. Dan Goldberg provides a<br />

service, geocoding, which is able to convert the data from<br />

addresses to latitude and longitude. We expounded on the data by<br />

later adding, racial make up, economic factors and assessed house<br />

values.<br />

The mapping uses a Recursive Bisection algorithm, which creates<br />

rectangles on a coordinate plain according to user-weighted<br />

variables. Recursive Bisection is a graph, in the demo the graph is<br />

a set of data points on a coordinate plain, portioning method in<br />

which equal points are assigned to either side of a bisector, in the<br />

demo we modify the algorithm to take into account minority and<br />

political affiliation. A total of two and half million plus data<br />

points are used to construct this mapping. Which is lower than the<br />

total amount of registered voters because of diminishing returns<br />

from using more data points. The Recursive Bisection Algorithm<br />

being used in the Mapping uses the address of registered New<br />

York State voters; the addresses are converted into a Latitude and<br />

Longitude format that is used in a coordinate system. Each<br />

coordinate has a certain amount of data connected to it. Including<br />

County data on racial makeup of the county, GDP Per Capita and<br />

unemployment the point itself stores the political affiliation and<br />

cost of the house, if available.<br />

Figure 3. An early user interface utilizing Google Maps<br />

The output is then shown in an interface like that in Figure 3.<br />

Data for a district is outputted when a user clicks on a district.<br />

Allowing for the user to explore what the algorithm has created.<br />

To evaluate the demo, according to the United States census there<br />

are roughly 19.5 million citizens of New York State. The Demo<br />

uses about 13 million data points. Which would mean the<br />

majority of all New York State citizens are taken into account<br />

even with migration. The Algorithm produces only rectangular<br />

shapes, which may fail to take into account political and natural<br />

barriers. However, because the algorithm group’s data points<br />

together these shapes usually avoid doing so. The rectangular<br />

shapes may be very oblong, but this is not necessarily good or<br />

521<br />

bad, for example, many of the runs of the algorithm produced a<br />

long, slender district in the north east portion of New York, which<br />

may seemingly be a obstruction to proper political management,<br />

until the geographic location of the northern portion of the<br />

Hudson and Champlain Valley’s are taken into account.<br />

3. DATA<br />

Economic, Voter Registration, and Minority data are accessible at<br />

varying granularities for the State of New York. The mapping of<br />

Electoral Districts utilizes voter registration data collected from<br />

the New York State Board of Elections. The address of registered<br />

voters in the state of New York were transformed to latitude and<br />

longitude points by Dan Goldberg 2 at the Spatial Sciences<br />

Institute, USC Dana and David Dornsife College of Letters arts<br />

and Sciences, University of Southern California. Economic data is<br />

also utilized in the mapping an index is created from the county<br />

unemployment and GDP Per Capita. The US census has the data<br />

for governments minority data, it also has political boundaries and<br />

shape files. This creates areas where the racial makeup of a point<br />

can be guessed. These averages can later be taken into account.<br />

4. CONCLUSIONS AND FUTURE WORK<br />

We demonstrated an open data approach to creating Electoral<br />

Districts by using Recursive Bisection in Mapping. Data points<br />

where the registered voters of New York. Economic and Racial<br />

Data added to scope of controllable variables in the Mapping<br />

A number of extensions to the mapping algorithm and the sources<br />

of data used are ongoing. The leveraging of semantic<br />

technologies, such as a owl ontology and storage of the voter<br />

registration data. Average personal and business income and<br />

religious affiliation would increase the base of data being drawn<br />

on. If the mapping toke into account current political boundaries it<br />

would be further improved, this could be done using census<br />

boundaries and shape files for towns and counties.<br />

5. ACKNOWLEDGEMENTS<br />

The authors would like to thank Jim Hendler, Tetherless World<br />

Constellation at Rensselaer Polytechnic Institute, Dan Goldberg 3 ,<br />

University of Southern California, and Francine Berman,<br />

Rensselaer Polytechnic Institute and Aaron Tobais, Rensselaer<br />

Polytechnic Institute.<br />

6. REFERENCES<br />

[1] Vickrey, William. On the Prevention of Gerrymandering.<br />

Poltical Science Quarterly, 76, 1 (Mar. 1961), 1<br />

2 https://webgis.usc.edu/<br />

3 Dan W. Goldberg PHD, Spatial Sciences Institute, University of<br />

Southern California, dwgoldbe@usc.edu


Toward Interoperable Government - A Case of Bangladesh<br />

ABSTRACT<br />

Despite several efforts of the Government, Bangladesh is far away<br />

to integrate and interconnect various public agencies, their<br />

processes and applications. So people and public agencies are<br />

affected by inconsistent public services/reports/documents. This<br />

article addresses the initiatives and progresses to integrate systems<br />

so that future e-government programs could be scaled up to<br />

achieve interoperability.<br />

Categories and Subject Descriptors<br />

D.2.12 [Interoperability]: Integration Different Public<br />

Information Systems – Data Mapping<br />

General Terms<br />

Management, Measurement, Documentation, Performance,<br />

Design, Economics, Trust, Reliability, Security, Human Factors,<br />

Standardization, Legal Aspects, Verification<br />

Keywords<br />

Interoperability, Integrity, eGovernment, Information Systems,<br />

eGIF, Public eService, Digital Bangladesh<br />

1. INTRODUCTION<br />

In Bangladesh, as of today each of the public agencies has been<br />

exercising to establish separate information systems for their own<br />

needs. Different public agencies developed their database systems<br />

aimed at strengthening public service delivery and creating<br />

accountability of services. But there was hardly any<br />

interoperability guideline or common promises among those<br />

systems. Consequently the efforts of the potential public agencies<br />

resulted developing several duplicate infrastructures and<br />

processes, and gradually it becomes more complex and expensive<br />

to achieve interoperability.<br />

2. INTEROPERABILITY<br />

Interoperability refers to the technical ability of communications<br />

among different systems to maintain interrelationships among<br />

systems and or processes. Pardo and Burke [5] articulated that<br />

Government interoperability is the combination of policy,<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, United States, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10…$15.00.<br />

M. Shakhawat Hossain Bhuiyan<br />

Economic Relations Division, Government of Bangladesh<br />

+880-1552-370267<br />

shbhuiyan@hotmail.com<br />

522<br />

management, and technology capabilities needed by a network of<br />

organizations to deliver coordinated services [3]. The e-<br />

Government Interoperability Framework (eGIF) sets out<br />

government’s technical policies, architectural design and<br />

standards as well as specifications of services and guidelines in<br />

order to facilitate interoperability and integration across the public<br />

sector agencies. The UNDP eGovernment interoperability guide<br />

(2007) identifies seven key principles (e.g. interoperability,<br />

scalability, reusability, open standards, market support, security,<br />

privacy etc.) that are roughly used as the criteria for choosing the<br />

standards in developing those eGIFs, The guide also recognizes<br />

three key dimensions (or domains) of interoperability-<br />

organizational, semantic (or informational) and technical.<br />

3. MAJOR PUBLIC DATABASES<br />

In spite of several contemporary policies and initiatives, there is<br />

still absence of a standard database management guideline among<br />

the service provider, which precludes interoperable public eservice<br />

development. At present, there are several important<br />

public databases as described below:<br />

3.1 National Voter ID<br />

The largest Government database in Bangladesh is Voter ID<br />

database (about 86 million voters), also referred to as future<br />

National ID database which is maintained by Bangladesh Election<br />

Commission (BEC). Obviously, this is not a complete National ID<br />

database as it excludes the citizens under 18 years, the minimum<br />

age to become an eligible voter. On the other hand, the BEC did<br />

not verify information when its database was prepared. It has<br />

included in the database whatever information was given by an<br />

individual. The voter ID card has been helping in disciplined and<br />

organized vote casting during last few national elections.<br />

3.2 Birth Registration<br />

The second largest public database is the Birth Registration<br />

Information System (BRIS) which was established recently. The<br />

birth information is stored on the centralized database server and<br />

the framework has been designed so that it is interoperable with<br />

other databases and information systems of the country. For<br />

example, The Birth Registration Number (BRN) is 17 digits and<br />

similar to National ID Number.<br />

3.3 Machine Readable Passport (MRP)<br />

Bangladesh recently established Machine Readable Passport<br />

(MRP) and Machine Readable Visa (MRV) elevating the<br />

country’s passport and visa system to an international standard in<br />

order to comply with the International Civil Aviation<br />

Organization (ICAO) requirements.


3.4 Driving License<br />

Driving License database is also one of the large public databases<br />

in Bangladesh owned by Bangladesh Road Transport Authority<br />

(BRTA). Recently BRTA has undertaken a project titled<br />

“Installation and Commissioning of High Security Driving<br />

License System” and introduced Smart Card Driving licenses to<br />

prevent the use of fake licenses. The license will have chips<br />

storing a driver's biometric data e.g. photograph, fingerprints, and<br />

signature among other details. The technology of the new license<br />

will be similar to that of the MRP.<br />

3.5 Tax Identification Number (TIN)<br />

The National Board of Revenue (NBR) has a database of more<br />

than 2.6 million Tax Identification Number (TIN) holders. The<br />

existing TIN is a manual registration program that suffers from<br />

many defects including representation errors, duplicate numbers,<br />

incomplete database and inconvenience of a decentralized<br />

registration procedure [4]. It becomes difficult for the officials to<br />

find out fake TIN holders while many people possess several<br />

TINs. Now NBR is in the process of replacing this TIN by a<br />

nationally unique number which will be linked to the national ID<br />

Number to verify the identity of TIN holders.<br />

3.6 Government Forms and Inconsistency<br />

Each of the above systems owned by different agencies and they<br />

have some common and very basic information regarding citizens.<br />

A closer observation of the publicly used government forms<br />

reflects that data inputs (like citizen’s name, parent’s name,<br />

address, place of birth, date of birth, etc.) by different systems are<br />

scarcely follows any specific standard. As a result, it is hard to<br />

maintain integration and interoperability among these systems and<br />

very often the systems produce inconsistent public documents as<br />

outputs causing sufferings to the general mass people.<br />

4. ADOPTING E-GIF IN BANGLADESH<br />

The first formal interoperability initiative was circulated among<br />

public agencies through a seminar titled “e-Governance<br />

interoperability framework for Bangladesh” for e-Governance<br />

focal points and ICT officials in the year 2008. Based on<br />

participants’ recommendations all government offices have to use<br />

Unicode-compliant NIKOSH font (Bengali language) in preparing<br />

public documents. Other initiatives are depicted below:<br />

4.1 Technical Interoperability Initiatives<br />

In 2008, an eGIF team developed a comparative analytical report<br />

on interoperability system among (i) Birth Registration<br />

Information System (BRIS), (ii) project on Electoral Role with<br />

Photograph (PRP) and (iii) database of Machine readable Passport<br />

(MRP). The team proposed a Citizen Core Data Structure (CCDS)<br />

to avoid duplication of work, enhance the sharing of information<br />

and increase the authenticity of public services. In July 2011,<br />

Cabinet Division finalized and released a CCDS Version 1.0 [1]<br />

and confirmed that 11 (eleven) Mandatory fields must be filled<br />

by the citizen while another 6 (six) optional fields may be<br />

essential based on respective public agency requirements. The<br />

mandatory fields are: citizen ID, Name (Bengali and English),<br />

523<br />

parent’s information (Bengali and English), date of birth, place of<br />

birth, present address, permanent address, gender, marital status,<br />

religion, profession and optional fields are: blood group,<br />

nationality, Educational qualification, disability, biometric<br />

information (digital picture, facial biometric, finger print, eye<br />

iris). The metadata definition of the CDS elements contains field<br />

level, field size and description which are believed to ensure<br />

country-wide e-governance applications interoperability.<br />

Furthermore, the Digital Certificate Interoperability Guideline [2]<br />

represents the initiatives to perform a secure e-business and etransactions<br />

with international standard.<br />

4.2 Organizational Interoperability Initiatives<br />

The National Identity Registration Authority (NIRA)’2008<br />

mandated to provide 18 services to citizens e.g. passport issue,<br />

opening bank account etc. It has introduced biometric Voter ID<br />

cards which are definitely an initial step towards a future unified<br />

national electronic ID system. Very recently, BEC has finalized a<br />

policy to allow verification of information provided in the<br />

national Identity (NID). The NBR and BEC have signed an<br />

agreement to share data of the NID card holders and TIN holders<br />

by cross checking which facilitates online verification of Identity<br />

to prevent tax evasion and deception [4].<br />

5. CONCLUSIONS/ RECOMMENDATIONS<br />

All the documents regarding interoperability initiatives (e.g.<br />

CCDS, policies, guidelines, acts, rules and regulations, etc.)<br />

should be available in a central website where experts can easily<br />

access to review and may contribute in government’s efforts while<br />

developing an effective eGIF for the country. Simplification of all<br />

government forms are essential in the way that common data<br />

fields should be in the same format for all public information<br />

systems. Government should have clear direction what document<br />

will get the precedence (e.g. national ID or birth certificate) for<br />

identity verification to avoid ambiguity.<br />

6. REFERENCES<br />

[1] Cabinet (2012). Citizen Core Data Structure (CCDS).<br />

Cabinet Division, Government of Bangladesh. Accessed<br />

from `http://www.cabinet.gov.bd/<br />

[2] CCA (2012). Digital Certificate Interoperability Guideline.<br />

Office of the Controller of Certifying Authorities (CCA),<br />

Ministry of ICT. Accessed from www.cca.gov.bd/<br />

[3] CTG (2012). Improving Government Interoperability,<br />

http://www.ctg.albany.edu/publications/reports/improving_g<br />

overnment_interoperability?chapter=1<br />

[4] NBR (2012). Outline of Modernization Plan (2011-2016).<br />

National Board of Revenue (NBR), Government of<br />

Bangladesh. Accessed from: http://www.nbrbd.org/index.html<br />

[5] Pardo, T.A. & Burke, G. B. (2008). Improving Government<br />

Interoperability: a capability framework for government<br />

managers, Center for Technology in Government, University<br />

of Albany, New York.


Trust Issues in the E-Government Implementation in Nepal<br />

Garima Dhakal<br />

Kathmandu University<br />

Dhulikhel, Kavre, Nepal<br />

dhakal.gareema@gmail.com<br />

ABSTRACT<br />

This paper discusses trust as one of the primary challenges in the<br />

implementation of e-government in Nepal. We bring into focus<br />

the trust issues through field visits and experimentation of dummy<br />

portal among ICT literate youths. The user level trust concerns are<br />

identified and trust parameters are categorized accordingly. We<br />

introduce a trust framework that shows the relationship between<br />

three domains: i) Service Provider, ii) Service Recipient and iii)<br />

ICT; and explains the role of Law in the framework. The trust<br />

framework aims to mitigate citizens’ mistrust in e-government<br />

and to increase user participation in the system. Hence, we<br />

recommend phase-wise implementation of e-government so that<br />

entire trust framework could be addressed in each phase.<br />

Categories and Subject Descriptors<br />

J.4 [Computer Applications]: Social and Behavioral Sciences –<br />

sociology, psychology.<br />

General Terms<br />

Management, Experimentation, Human Factors<br />

Keywords<br />

Trust parameters, E-government, Nepal<br />

1. INTRODUCTION<br />

The current focus of the Government of Nepal mostly lies in the<br />

development of necessary infrastructure for the e-government<br />

implementation. In this context, we argue that for a sustainable<br />

and effective use of e-government services for information<br />

exchange, interaction and transaction, it is necessary to address<br />

different trust issues prevailing among the citizens. We explore<br />

trust issues from socio-technical approach, keeping into focus the<br />

acceptance and adoption of e-government services. Hence, we<br />

believe that increased trust corresponds to increased user<br />

participation in the e-government system.<br />

Trust issues on e-government implementations have received<br />

significant interest from researchers and implementers; some<br />

examples include [3-5]. Trust issues related to technological [3] as<br />

well as social [4] and user perspectives [5] have been explored.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Prajwal Amatya<br />

Kathmandu University<br />

Dhulikhel, Kavre, Nepal<br />

prajwalamatya@gmail.com<br />

524<br />

Bal Krishna Bal<br />

Kathmandu University<br />

Dhulikhel, Kavre, Nepal<br />

bal@ku.edu.np<br />

Even though research like [1] has been done to understand the<br />

challenges of e-government implementation in Nepal, the research<br />

on trust still remains an important and largely unexplored issue. In<br />

[6] authors assess level of trust on government and on internet and<br />

explain the use of social media to increase trust and adoption of egovernment<br />

in Nepal. While, we introduce trust parameters and<br />

trust framework to address citizens’ mistrust in e-government. In<br />

this work, we seek an insight to the following research questions.<br />

o What are the trust issues prevalent in the e-government<br />

implementation in Nepal?<br />

o How can we address the trust issues in the context of Nepal?<br />

To find out the answers, we look into the global trust issues in egovernment<br />

implementations and then examine the relevance of<br />

these issues in the context of Nepal thus developing our own<br />

cases. We have formed the trust parameters put forward by<br />

Belanger and Carter [2] as the guidelines for understanding<br />

citizens’ trust in e-government. Belanger and Carter [2] categorize<br />

trust into four parameters: “Trust of the Government”- citizen’s<br />

attitude and perception towards government’s capabilities in<br />

providing the electronic services, “Trust of the Internet”-<br />

concerns of privacy and security over exchanging personal data<br />

and information through the internet, “Disposition to Trust” –<br />

general acceptance and adoption of technology especially when<br />

people start to learn and use new system, and “Perceived Risk” –<br />

uncertainties that is beyond the control of users.<br />

2. METHODOLOGY<br />

The e-government implementation in Nepal of late has been<br />

focusing in making the Government to Government (G2G)<br />

electronic network better equipped. Very few government<br />

websites are actually providing electronic service to the citizens<br />

and these too are limited to downloading the application forms.<br />

Hence, we have developed our own dummy e-government portal.<br />

The portal consists of frequently sought government services like<br />

issuance of national identity card, passport and driving license,<br />

and one relatively new concept of e-polling. We have also created<br />

two types of roles in the system- user as general citizen and user<br />

as government official.<br />

We have conducted field visits and carried out experiments in four<br />

different sites of Nepal, namely, Hetauda, Narayanghat,<br />

Bhairahawa, and Pokhara. In addition to the observations of user<br />

behavior, we have gathered feedbacks from the participants in the<br />

form of interview and focus group discussion in order to<br />

understand different trust concerns they have come up while using<br />

the dummy portal. The number of participants is altogether 339,<br />

out of which 202 are males and 137 females. The participants<br />

have fairly good knowledge on Information and Communication<br />

Technology (ICT) and they come from different socio-cultural


and socio-economic backgrounds. Their age group varies from<br />

late teens to early twenties.<br />

3. FINDINGS<br />

Trust concerns or issues over e-government implementation in<br />

Nepal can primarily be grouped into nine categories as follows:<br />

1) Reliability concerns on services such as electricity and<br />

internet.<br />

2) Usability concerns owing to low digital literacy.<br />

3) Privacy and Security concerns regarding online transactions<br />

and exchange of documents online.<br />

4) Authenticity concerns about service providers and validity<br />

of submitted data online.<br />

5) Concerns over Government readiness in terms of trained<br />

and competent human resources for providing electronic<br />

services.<br />

6) Legal concerns about online procedures.<br />

7) Transparency concerns about the status and progress<br />

notification of requested services.<br />

8) Technology acceptance and their reliance on word-of-mouth<br />

marketing from family, friends and relatives to use new<br />

services.<br />

9) Affordability concerns leading to non-uniform use of egovernment<br />

services thus creating ignorance and<br />

consequently distrust to e-government services in general.<br />

Figure 1. Trust Framework in the E-Government<br />

Implementation in Nepal<br />

In order to address different trust concerns raised above, we<br />

present the trust framework in Figure 1. The trust framework<br />

categorizes trust parameters into three domains (service provider,<br />

service recipient and ICT) and shows the relationship between<br />

them in establishing trust among the citizens. In the given trust<br />

framework, service providers are the organizations or authorities<br />

responsible for delivering electronic services to citizens. Service<br />

recipients are the individuals and different organizations seeking<br />

e-government services. ICT is the bridge to connect both service<br />

providers and service recipients. Each of these interlinked<br />

domains has similar intensity to trust. Effective implementation<br />

of law is the grounding body to facilitate communication and<br />

information exchange between service provider and service<br />

recipient.<br />

525<br />

4. CONCLUSION<br />

The trust framework shown in Figure 1 forms a basis to address<br />

citizens’ trust concerns and thus increase user participation in the<br />

e-government system. Therefore, entire trust framework needs to<br />

be incorporated in each implementation of e-government. Keeping<br />

into consideration the nation’s limited resources, phase-wise<br />

implementations of e-government seem to be the most suitable<br />

and feasible approach that will eventually gain trust from citizens.<br />

For instance, e-government service could be initially implemented<br />

in selected urban population, which will serve as beta release of<br />

the system. The service can then be expanded mitigating the<br />

different problems coming up during implementation. On the<br />

other hand, e-government procedure may be automated<br />

eventually. For example, to start with, the verification process of<br />

the information passed to the e-applications may be done using<br />

traditional paper-based procedures. Gradually, every material<br />

required for verification would then be fed in to the automated<br />

system.<br />

5. ACKNOWLEDGMENTS<br />

This work has been partially supported by the University Grants<br />

Commission, Nepal. We would like to thank Mr. Rajendra Man<br />

Banepali for his efforts in developing the e-government dummy<br />

portal for this research. Our sincere thanks also go to Dr. Sanat<br />

Kumar Bista for his kind guidance and reviews of the work.<br />

6. REFERENCES<br />

[1] Adhikari, P.G. National ID Project of Nepal: Future<br />

Challenges. In Proceedings of the 5 th International<br />

Conference on Theory and Practice of Electronic<br />

Governance (ICEGOV ’11) (Tallinn, Estonia, September 26-<br />

28, 2011). ACM Press, New York, NY, 2011, 379-380.<br />

[2] Belanger, F. and Carter, L. Trust and risk in e-government<br />

adoption. Journal of Strategic Information Systems, 17, 2<br />

(June 2008), 165-176.<br />

[3] Berdykhanova, D., Dehghantanha, A., and Hariraj, K. Trust<br />

Challenges and Issues of E-Government: E-Tax Prospective.<br />

In 2010 International Symposium on Information Technology<br />

(ITSim 2010) (Kwala Lumpur, Malaysia, June 15-17, 2010).<br />

IEEE, 2010, 1015-1019.<br />

[4] Colesca, E. S., Understanding Trust in e-Government.<br />

Inzinerine Ekonomika- Engineering Economics, 3 (June<br />

2009), 7-15.<br />

[5] Kumar, V., Mukherji, B., Butt, I., and Persaud, A. Factors for<br />

Successful e-Government Adoption: a Conceptual<br />

Framework. Electronic Journal of e-Government, 5, 1<br />

(August 2007), 63-76.<br />

[6] Shah, P. B. and Lim, N. Using Social Media to Increase E-<br />

Government Adoption in Developing Countries. In<br />

Proceedings of the 5 th International Conference on Theory<br />

and Practice of Electronic Governance (ICEGOV ’11)<br />

(Tallinn, Estonia, September 26-28, 2011). ACM Press, New<br />

York, NY, 2011, 205-213.


eGovernance Implementation Model for Public Sector<br />

Innovation<br />

M. Irfanullah Arfeen<br />

Department of Management Sciences<br />

Virtual University of Pakistan<br />

Islamabad, 44000, Pakistan<br />

Telephone number: +92-300-8508918<br />

m.irfanullah@vu.edu.pk<br />

ABSTRACT<br />

This study examines the process of innovation in the Federal<br />

Government Agencies of Pakistan to enhance the efficiency and<br />

effectiveness of public services. Research objective of this study<br />

is to provide an eGovernance Implementation Model of how<br />

innovation in the public sector is carried out. The Government of<br />

Pakistan initiated many eGovernance initiatives to improve<br />

public access to information and satisfy the citizens but not able<br />

to get the desire results due to deficiency of ICT skilled<br />

manpower and infrastructure. The study concludes that<br />

innovation in government is to bring in changes to the culture in<br />

the organization, the way a decision is made. This research<br />

constitutes an important contribution towards public sector<br />

innovation e.g. eGovernance.<br />

Categories and Subject Descriptors<br />

K.6 [Management of Computing and Information Systems]:<br />

General – Performance and usage measurement, Data<br />

processing.<br />

Keywords<br />

e-Governance, e, ICT policy, innovation, public sector.<br />

1. INTRODUCTION<br />

e-Governance is defined as the use of ICT to narrow the digital<br />

divide, promote effective governance and advance sustainable<br />

development (UNCTAD, 2009). e-Governance initiatives have<br />

produced favorable impacts on delivery of public services,<br />

however in developing countries like Pakistan its overall impact<br />

has remained limited, due to a plethora of constraints and slow<br />

pace of their implementation. Citizens want public services to be<br />

effective and they should have access to correct and often<br />

detailed information.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies<br />

are not made or distributed for profit or commercial advantage and that<br />

copies bear this notice and the full citation on the first page. Copyrights<br />

for components of this work owned by others than ACM must be<br />

honored. Abstracting with credit is permitted. To copy otherwise, to<br />

republish, to post on servers or to redistribute to lists, requires prior<br />

specific permission and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

526<br />

Nawar Khan<br />

National University of Sciences and Technology<br />

(NUST)<br />

EME college, Rawalpindi, 46000, Pakistan<br />

Telephone Number: +92-51- 56132627<br />

Nwr_khan@yahoo.com<br />

This paper develops an eGovernance implementation model for<br />

Pakistan. For this purpose, majority of the fieldwork was<br />

conducted at federal, provincial and district level in Pakistan<br />

with remaining extiensive research work done in United<br />

Kingdom to examine experiences of eGovernance initiatives.<br />

The adoption of eGovernance in Pakistan was instigated on a big<br />

scale. Every government agency was instructed to propose its<br />

own eGovernance projects. This was headline-grabbing<br />

initiative, which is common in the government agencies. The<br />

government of Pakistan was very enthusiastic; numerous core<br />

ICT strategies and vision statement were formulated and various<br />

layers of eGovernance working groups were setup with the<br />

allocation of a substantial budget.<br />

eGovernance offers a new way forward, helping improve<br />

government processes, connect citizens, and build interactions<br />

with and within civil society. According to the United Nations e-<br />

Government Survey, measured for 192 countries, Pakistan’s<br />

ranking of 137 in 2003, improved in 2005 and 2008 (with<br />

rankings of 136 and 131 respectively (Figure 1). However, in<br />

2010 its ranking dropped dramatically by 15 ranks to 146. The<br />

majority of the high scorers in the 2010 e-Government<br />

development index are South Korea, United States and Canada,<br />

all high-income countries, who have the financial resources to<br />

expand and rollout advanced eGovernance initiatives, as well as<br />

to create a favorable environment for citizen engagement and<br />

empowerment. Meanwhile emerging economies such as China<br />

and India rank 72 and 119 respectively while even Bangladesh<br />

has a 12 point lead over Pakistan.<br />

Figure 1. United Nations e-Government Development Index<br />

for Pakistan Source: UN e-Government Survey from 2003 –<br />

2010<br />

Rank 2010<br />

Rank 2008<br />

Rank 2005<br />

Rank 2003<br />

Pakistan<br />

120 125 130 135 140 145 150<br />

Pakistan


Figure – 2: eGovernment Implementation Model<br />

2. E-GOVERNANCE IMPLEMENTATION<br />

MODEL FOR PAKISTAN<br />

How to the government agencies adopt eGovernance in order to<br />

achieve better success. This study now proposes an eGovernance<br />

implementation model which is based on the empirical findings.<br />

First, the presence of strong leader is required for overcome the<br />

resistance and inertia in the government agencies. In a country<br />

like Pakistan where there is a federal government, centralized<br />

eGovernance with hybrid approach is favourable as<br />

implementation easier to manage and align. eGovernance<br />

initiatives failed due to poor goal definition and poor alignment of<br />

actions to goals. In relation to the above point, there is a strong<br />

urgency for government to exercise innovation in policy. Unclear<br />

objectives of eGovernance implementation lead to an eventual<br />

failure. eGovernance initiatives especially on a large scale must be<br />

initiated when there is a problem or anticipated problem that<br />

needs a solution. It should not be based on outside influence that<br />

pushes a government to blindly imitate. eGovernance initiatives to<br />

solve the internal problem tends to have small scale impact.<br />

Questions must be asked such as does (Pakistan) really need<br />

eGovernance initiatives and why?<br />

3. CONCLUSION<br />

This study developed the eGovernance Implementation Model<br />

which highlighted the priority areas for the government to<br />

consider the aspect of policy. The validation of model foresees<br />

that model will be implemented in the near future. eGovernance<br />

portals that are not available in the national and local languages<br />

527<br />

(speaking by significant majority groups) are not going to be used<br />

by a critical mass of citizens: one can only assume that much, or<br />

even the vast majority of the population may be unable to<br />

comprehend the information and services provided (Davison et<br />

al., 2005). Indeed there is also evidence that e-Governance is for<br />

the educated minority in developing countries like Pakistan. This<br />

would be truly unfortunate situation, since it is often the less<br />

educated that have most to gain from online initiatives that<br />

empower them to make decision based on what is in their best<br />

interest, and would stand in stark contrast to the presumably<br />

universal principle of government: serving all citizens.<br />

4. REFERENCES<br />

[1] UNKB - Nations e-Government Development Knowledge<br />

Base (2010), “e-Government Survey 2010’, from<br />

http://www2.unpan.org/egovkb/profilecountry.aspx?ID=128<br />

[2] UNCTAD (2009), Information Economy Report 2009,<br />

Trends and Outlook in Turbulent Times, United Nations<br />

publication, New York and Geneva.<br />

[3] Davison, R.M., Wagner, C. and Ma, L.C.K. (2005), “From<br />

government to e-government: a transition model”, Journal of<br />

Information Technology & People, Vol. 18, No. 3, pp. 280-<br />

299.<br />

[4] United Nations (2008), e-Government Survey 2008 From E-<br />

Government to Connected Government, Department of<br />

Economic and Social Affairs, Division of Public<br />

Administration and Development Management, New York.


Tutorials


Tutorial: Digital Curation for Public Sector Professionals<br />

ABSTRACT<br />

This tutorial will expose government professionals to the<br />

foundations, considerations and functions of digital curation.<br />

Governance activities at all levels are increasingly carried out<br />

through digital information. Democratic processes, operational<br />

efficiencies, accountability, compliance with records laws, and<br />

active engagement with citizen all require professionals in the<br />

public sector to serve as responsible stewards of digital<br />

information. Despite the great relevance of digital curation<br />

concepts, skills and innovations to government, public sector<br />

professionals may often be unaware of these connections. This<br />

two-hour ICEGOV tutorial is an effort to address this gap by<br />

exposing public servants to the latest digital curation concepts,<br />

research and tools.<br />

Categories and Subject Descriptors<br />

H.3.7 [Information Storage and Retrieval]: Digital Libraries –<br />

collection, dissemination, systems issues.<br />

General Terms<br />

Professional Development, Digital Curation, Electronic<br />

Governance.<br />

Keywords<br />

Continuing education, digital information, public sector,<br />

government<br />

1. INTRODUCTION<br />

Governance activities at all levels are increasingly carried out<br />

through digital information. Democratic processes, operational<br />

efficiencies, accountability, compliance with records laws, and<br />

active engagement with citizen all require professionals in the<br />

public sector to serve as responsible stewards of digital<br />

information.<br />

Despite the great relevance of digital curation concepts, skills and<br />

innovations to government, our experience has been that public<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Christopher A. Lee and Helen Tibbo<br />

School of Information and Library Science<br />

University of North Carolina<br />

216 Lenoir Drive, CB #3360<br />

1-(919)-962-8366<br />

callee, tibbo@email.unc.edu<br />

528<br />

sector professionals are often unaware of these connections. The<br />

ICEGOV tutorial is an effort to address this gap, by briefly<br />

exposing public servants to the latest digital curation literature,<br />

research and tools. It builds on various previous educational<br />

activities, including the ESOPI projects, in which we have<br />

developed a specialized dual-degree curriculum – between the<br />

School of Information and Library Science (SILS) and the School<br />

of Government SOG) – at the University of North Carolina and<br />

associated practical engagement work experiences for publicsector<br />

professionals.<br />

2. DIGITAL CURATION AS AN ARENA<br />

OF PREFESSIONAL ACTIVITY<br />

Within the past few decades, individuals engaged in many<br />

seemingly disparate streams of activity have increasingly come to<br />

recognize that they share a common set of challenges and<br />

opportunities related to caring for digital information. The term<br />

“digital curation” has recently come into use, referring to<br />

“stewardship that provides for the reproducibility and re-use of<br />

authentic digital data and other digital assets” [17]. Digital<br />

curation is not simply the responsibility of professionals working<br />

in collecting institutions (e.g. libraries, archives and museums) but<br />

is instead an endeavor shared by numerous actors with an interest<br />

in stewardship of digital information. In the public sector, this<br />

includes a variety of information professionals, public officials,<br />

agency employees, contractors and private citizens.<br />

While the notion of shared responsibility for government<br />

information certainly is not new, the discussion of curation in this<br />

context is relatively recent. In the 1980s and 1990s, use of the<br />

phrase “data curation” emerged in literature related to the<br />

management of scientific data. Two reports in 2003 brought<br />

further attention to the idea of data curation within the context of<br />

e-science and cyberinfrastructure [9][10].<br />

The phrase “digital curation” has more recent origins. In 2001, the<br />

Digital Preservation Coalition and British National Space Centre<br />

held a seminar called “Digital Curation: Digital Archives,<br />

Libraries and E-science.” The following year, the Joint<br />

Information Systems Committee (JISC) in the UK issued an<br />

“Invitation to tender: requirements and feasibility study on<br />

preservation of e-prints,” which resulted in the formation of the<br />

Digital Curation Centre (DCC) in 2004. In 2006, the Institute for<br />

Museum and Library Services (IMLS) – building on the 21st<br />

Century Librarian program that it began in 2003 – called for grant<br />

proposals to develop educational programs in digital curation and<br />

has funded several programs as a result of this call [14].


Digital curation has served as an umbrella concept that spans a<br />

diversity of professions, institutions and sectors. “Digital<br />

curation” is less wedded to specific institution types than phrases<br />

such as “digital archives” or “digital libraries.” It also reflects a<br />

tendency toward increasing convergence across different types of<br />

institutions, which is driven in large part by technological changes<br />

and considerations [12].<br />

Digital curation is a recent (and useful) phrase to designate a set<br />

of opportunities for cross-institutional and cross-disciplinary<br />

engagement that have been evolving for decades. We believe that<br />

individuals in the public sector can benefit from a better<br />

understanding of advances in digital curation. Conversely, we<br />

believe that experts in electronic governance have a great deal to<br />

contribute to the evolving dialogue around digital curation. It is<br />

our hope that this ICEGOV tutorial will help to catalyze such<br />

connections.<br />

3. BACKGROUND TO THIS TUTORIAL<br />

Over the past decade, we have developed and administered a wide<br />

range of professional educational offerings in digital curation.<br />

Tibbo hosted the Humanities Advanced Technology and<br />

Information Institute week-long digitization workshops in March<br />

2002, May 2003, and May 2004[1]. Since 2006, we have<br />

administered several digital curation education and professional<br />

engagement projects funded by the Institute for Museum and<br />

Library Services (IMLS): (1) Preserving Access to Our Digital<br />

Future: Building an International Digital Curation Curriculum<br />

(DigCCurr) [2], (2) DigCCurr II [3], (3) Educating Stewards of<br />

Public Information for the 21st Century (ESOPI-21) [4], (4)<br />

Closing the Digital Curation Gap (CDCG) [5], and Educating<br />

Stewards of the Public Information Infrastructure (ESOPI 2 ) [6].<br />

These projects have generated a detailed curriculum framework<br />

[7], course modules, full graduate courses [8], week-long<br />

continuing education institutes for professionals [9] and numerous<br />

practical engagement opportunities through paid fellowships. 1 In<br />

April 2010, the SILS faculty approved a new Graduate Certificate<br />

in Digital Curation [11].<br />

As part of the DigCCurr II project, we have offered a week-long<br />

digital curation institute for working professionals every year<br />

since 2009 [8]. The first three years of the institute were<br />

supported through funds from the IMLS. This year’s institute<br />

(2012) was funded solely through participant registration fees.<br />

The Royal Library of Denmark asked us to offer the institute for<br />

them in Copenhagen, which we administered in June 2012.<br />

This ICEGOV tutorial also builds upon "An Introduction to<br />

Digital Curation for Public Records Professionals," a workshop<br />

that we offered at the joint annual meeting of the National<br />

Association of Government Archives and Records Administrators<br />

1 DigCCurr and ESOPI Fellows have had field placement in<br />

institutions including the National Archives and Records<br />

Administration (NARA); the North Carolina State Archives; the<br />

town of Chapel Hill, NC; Orange County, NC; NC Live; UNC-<br />

CH’s University Archives; the Odum Institute for Research in<br />

Social Science, and the Environmental Finance Center of the<br />

UNC School of Government.<br />

529<br />

(NAGARA) and Council of State Archivists (CoSA) on July 16<br />

2011 in Nashville, Tennessee.<br />

4. OUTLINE AND CONTENT<br />

Digital curation brings a wide array of opportunities and<br />

challenges. Opportunities include wider access, integrated access,<br />

representation of a wider range of human experience, persistence<br />

through redundant copying, economies of scale, and enrollment of<br />

collective expertise. Challenges include bit rot, obsolescence,<br />

social inertia, technology monitoring, limited intellectual control,<br />

complex access environments, and various barriers to conveying<br />

meaning over time.<br />

Digital resources are composed of interacting components that can<br />

be considered and accessed at different levels of representation<br />

(e.g. bitstream, through a filesystem; files as rendered through<br />

specific applications; records composed of multiple files; abstract<br />

“works”; larger aggregations such as web sites) [21]. Accessing<br />

and using a document stored as a digital object, requires the<br />

coordinated operation of various hardware and software<br />

components (e.g. storage medium, peripheral devices, operating<br />

system, device drivers, application software). To ensure integrity<br />

and future use, digital curation requires numerous decisions<br />

regarding treatment at multiple levels of representation.<br />

The challenges associated with digital curation are not only<br />

technical but also institutional, economic and political. In order<br />

for digital collections to be sustainable over time, the actors<br />

responsible for curation must continuously have appropriate<br />

expertise, resources, and a political/institutional mandate to carry<br />

out the work required. Given the cost and complexity of digital<br />

curation, as well as the potential to exploit the rich sets of<br />

relationships across individual collections, coordination of work<br />

across social boundaries is also important.<br />

When acquiring, managing and providing access to materials,<br />

professionals must consider various norms, laws, codes of ethics,<br />

policies, procedures, and personal values. As they address<br />

curation of digital information, they are increasingly discovering<br />

“policy vacuums” [18] in which there is no existing guidance on<br />

new issues, and “latent ambiguities” [19] 2 in established guidance.<br />

Digital curation requires clear articulation of policies, procedures,<br />

and practices in ways that were not previously necessary.<br />

In order to address the above considerations, the ICEGOV tutorial<br />

will be composed of the following components:<br />

• Welcome, introductions and logistics<br />

• Overview of digital curation definition, scope and main<br />

functions<br />

• Trustworthiness and assessment<br />

• The many levels of representation in digital materials –<br />

implications for curation<br />

• Lifelong learning for digital curation<br />

The content of this tutorial will address various elements of all<br />

four areas of the “Lifecycle of Electronic Governance Initiatives”<br />

identified in the ICEGOV call: planning, architecture,<br />

implementation and operations. The tutorial is designed to expose<br />

participants to a wide range of professional and strategic issues<br />

2 Lessig borrows the term “latent ambiguity” from [20].


ut also provide sufficient detail on several topics to (1) leave<br />

participants with concrete ideas about next steps in their own<br />

work and (2) demonstrate the implications of the main ideas<br />

through specific characteristics of associated technologies.<br />

After completing the tutorial, participants should be able to:<br />

• Identify and understand the main functions of digital<br />

curation and essential transition points in the life of<br />

digital objects<br />

• Understand the collaborative nature of digital curation<br />

work and the interdependencies among various<br />

professionals and stakeholders<br />

• Identify particular aspects of current digital curation<br />

activities that are relevant to their work<br />

• Understand and be able to interact with digital<br />

information at multiple levels of representation<br />

• Be able to identify appropriate continuing education<br />

opportunities.<br />

5. ACKNOWLEDGMENTS<br />

Materials for this workshop have been developed through support<br />

of a series of grants from the Institute for Museum and Library<br />

Services (Grant Awards #RE-05-08-0060-08, # RE-05-09-0085-<br />

09, and # RE-05-11-0076) and the Andrew W. Mellon<br />

Foundation.<br />

6. REFERENCES<br />

[1] Digitization for Cultural Heritage Information Professionals,<br />

2002-2004. UNC-Chapel Hill.<br />

http://sils.unc.edu/news/2003/DigitizationWorkshop;<br />

http://sils.unc.edu/news/2004/DigitizationWorkshop.<br />

[2] DigCCurr I: Preserving Access to Our Digital Future: Building<br />

an International Digital Curation Curriculum.<br />

http://ils.unc.edu/digccurr.<br />

[3] DigCCurr II: Extending an International Digital Curation<br />

Curriculum to Doctoral Students and Practitioners.<br />

http://ils.unc.edu/digccurr/aboutII.html.<br />

[4] Educating Stewards of Public Information in the 21 st Century.<br />

(ESOPI). http://ils.unc.edu/esopi21/index.html.<br />

[5] Closing the Digital Curation Gap.<br />

http://digitalcurationexchange.org/cdcg/?q=about.<br />

[6] Educating Stewards of the Public Information Infrastructure.<br />

(ESOPI 2 ). http://ils.unc.edu/esopi21/index.html.<br />

[7] DigCCurr. DigCCurr Matrix of Digital Curation Knowledge<br />

and Competencies. http://ils.unc.edu/digccurr/digccurrmatrix.html;<br />

DigCCurr High-Level Categories of Digital<br />

530<br />

Curation Functions. http://ils.unc.edu/digccurr/digccurr-functcategories.pdf.<br />

[8] DigCCurr Professional Institute: Curation Practices for the<br />

Digital Object Lifecycle.<br />

http://ils.unc.edu/digccurr/institute.html.<br />

[9] Atkins, D.E., et al. 2003. Revolutionizing Science and<br />

Engineering through Cyberinfrastructure: Report of the<br />

National Science Foundation Blue-Ribbon Advisory Panel on<br />

Cyberinfrastructure. National Science Foundation,<br />

Washington, DC.<br />

[10] Lord, P. and Macdonald A. 2003. E-Science Curation Report:<br />

Data Curation for E-Science in the UK: An Audit to Establish<br />

Requirements for Future Curation and Provision. JISC<br />

Committee for the Support of Research, London.<br />

[11] SILS, UNC-CH Digital Curation Certificate.<br />

http://sils.unc.edu/programs/certificates/digital_curation<br />

[12] Tibbo H.R. and Lee C.A. 2010. Convergence through<br />

Capabilities: Digital Curation Education for Libraries,<br />

Archives and Museums. In Archiving 2010: Final Program<br />

and Proceedings, June 1-4, 2010, Den Haag, The<br />

Netherlands. Society for Imaging Science and Technology,<br />

Springfield, VA, 53-57.<br />

[13] Beagire, Neil and Pothen, P. 2001. The Digital Curation:<br />

Digital Archives, Libraries and E-Science Seminar. Ariadne<br />

30, http://www.ariadne.ac.uk/issue30/digital-curation/.<br />

[14] Ray, J. 2009. Sharks, Digital Curation, and the Education of<br />

Information Professionals. Museum Management and<br />

Curatorship 24, no. 4, 357-68.<br />

[17] Lee, C.A. and Tibbo H.R. 2007. Digital Curation and Trusted<br />

Repositories: Steps Toward Success. Journal of Digital<br />

Information 8, no. 2.<br />

[18] Moor, J.H. 1985. What Is Computer Ethics? Metaphilosophy<br />

16, no. 4, 266-75.<br />

[19] Lessig L. 2006. Code: Version 2.0. Basic Books, New York,<br />

NY, 25-28, 155-277.<br />

[20] Williston, S. 1957. A Treatise on the Law of Contracts, 3rd<br />

ed., ed. by Walter H.E. Jaeger. N (Baker, Voorhis, Mount<br />

Kisco, NY, 627, 898.<br />

[21] Lee, C. A. Forthcoming. Digital Curation as Communication<br />

Mediation. In Handbook of Technical Communication, edited<br />

by Alexander Mehler, Laurent Romary, and Dafydd Gibbon.<br />

Mouton De Gruyter.


Use of Agent-Based Modeling for e-Governance Research<br />

Yushim Kim<br />

Arizona State University<br />

411 N. Central Ave. Ste. 400<br />

Phoenix, AZ 85004<br />

1-602-496-1157<br />

ykim@asu.edu<br />

ABSTRACT<br />

This tutorial focuses on the basic functionalities of an emerging<br />

simulation modeling technique (i.e., agent-based modeling), the<br />

use of the tool for modeling a managerial issue, and the analysis<br />

of simulation data for electronic governance (e-governance)<br />

research. It also articulates potential questions that may be raised<br />

in each step of modeling. The tutorial ends with perspectives on<br />

critical subjects in ABM.<br />

Categories and Subject Descriptors<br />

I.6.5 [Simulation and Modeling]: Model Development<br />

General Terms<br />

Management, Performance<br />

Keywords<br />

Agent-Based Modeling, e-Governance<br />

1. INTRODUCTION<br />

The idea that the world we inhabit is complex is not new, and the<br />

problems policy makers and public managers deal with are quite<br />

challenging. Leveraging upon advances in information and<br />

technology, electronic governance (e-governance) initiatives have<br />

been proposed to provide better approaches to some of the<br />

complexities that public managers are confronting. However, even<br />

our most current knowledge is often limited in conceptualizing,<br />

capturing, and analyzing the world and its problems in a way that<br />

is useful for decision makers.<br />

Modeling and simulation approaches are useful for researchers,<br />

policy makers, and stakeholders in thinking through, defining, and<br />

analyzing the world, system, or problems that concern the world<br />

or a system. Computational tools and approaches can aid in<br />

crystalizing the thought process related to complex problems [1].<br />

This tutorial aims to help those who are interested in approaching<br />

e-governance topics with simulation using computational tools by<br />

articulating the basic steps required. The steps are discussed using<br />

the example of a public service delivery model.<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Callie McGraw<br />

Arizona State University<br />

411 N. Central Ave. Ste. 400<br />

Phoenix, AZ 85004<br />

1-623-363-6275<br />

callie.mcgraw@asu.edu<br />

531<br />

2. LEARNING OBJECTIVE<br />

The objective of this tutorial is to introduce a way for researchers<br />

and practitioners in e-governance to interact with an agent-based<br />

modeling approach in order to better understand complex<br />

problems and systems that they deal with. Attention is given to a<br />

specific topic in public management on which the authors have<br />

worked (i.e., fraud detection in public service deliveries) so the<br />

audience can easily contextualize this approach. The expected<br />

learning outcome is an increase in e-governance researchers’<br />

interest in computational modeling.<br />

3. AGENT-BASED MODELING (ABM)<br />

3.1 Why ABM?<br />

ABM has been popularized among social science disciplines with<br />

the explosion of computational technologies. From a social<br />

science research point of view, one of the most significant<br />

features of ABM is not that researchers can work with a primitive<br />

data type—numbers and characters—that is similar to other<br />

computer programming languages, but that ABM allows<br />

researchers to define other types of entities (e.g., individuals,<br />

schools, or stores) and the interactions that are relevant to one’s<br />

own context. This provides a unique opportunity to introduce not<br />

only individuals but also important entities and objects necessary<br />

for an autonomous decision-making unit in social simulations.<br />

With ABM, researchers can frame their problems within large,<br />

dynamic social processes. In doing so, they must carefully<br />

consider social actors, interactions, interdependencies, and<br />

processes among heterogeneous decision-making units. If<br />

properly done, this can enhance the fidelity of simulation models<br />

and aid in understanding the nature of complex social problems.<br />

3.2 What is ABM?<br />

Artificial worlds built as simulation models whose dynamics can<br />

be observed, tested, and retested serve as flexible research and<br />

decision support platforms. ABM has the unique benefit of<br />

enabling the investigation of mechanisms at micro-levels that can<br />

lead to dynamic patterns of social systems at the macro-level.<br />

Thus, the goal of this approach is often stated as exploring social<br />

processes and mechanisms—the rules, interactions, and<br />

feedback—that can lead to aggregate systemic patterns.<br />

Conceptually, ABM requires two components: agents and<br />

interaction rules. ABM consists of ‘agents’ who can make<br />

autonomous and adaptive decisions using local information and<br />

‘rules’ that elicit social mechanisms and processes. ABM can<br />

accommodate heterogeneous agent types and asymmetries in<br />

social systems, and can be easily scaled to a larger system with<br />

many agents.


ABM is known as a bottom-up simulation approach [2] and relies<br />

heavily upon lower-level actors’ perspective within systems rather<br />

than on higher-level observers’ perspective, which differentiates it<br />

from other existing analytical or simulation approaches for social<br />

inquiry [3].<br />

3.3 Toolkits<br />

Several ABM simulation toolkits have been developed by various<br />

organizations and institutions. This includes, but is not limited to,<br />

Swam, Mason, RePast, and NetLogo. In the Wikipedia list, there<br />

are more than 70 ABM toolkits, packages, and libraries listed that<br />

researchers can easily access. These toolkits provide basic<br />

functionality with convenience in building an ABM and useful<br />

demonstration models such as Schelling’s segregation and<br />

innovation diffusion model. This tutorial does not provide<br />

recommendations on which tool to choose. See Gilbert (2008) for<br />

a comparison of the major toolkits [4].<br />

4. MODEL DEVELOPMENT<br />

When one decides to build an ABM, the first questions are related<br />

to where to start and what steps to follow. This tutorial answers<br />

those questions using an example.<br />

4.1 A Public Service Delivery Example<br />

Public service delivery programs (e.g., food stamps and WIC)<br />

currently consist of somewhat goal-congruent players, such as<br />

program recipients, vendors, and state and local agencies.<br />

Vendors are private entities, and the delivery of public services to<br />

program recipients has been contracted out to those private<br />

entities. A common issue observed in this mode of public service<br />

delivery is illegal activities being committed by some of the<br />

players. One of the government’s critical functions has been to<br />

monitor and regulate rule-violating activities in these programs.<br />

Despite well-established government information systems in these<br />

programs, the actual processes of illegal exchange among some<br />

players are largely hidden from the governing authority. Existing<br />

fraud detection techniques are useful in detecting abnormalities<br />

mainly after illegal activities are committed, and the techniques<br />

are also fairly well known to potential rule violators in the<br />

programs. Thus, the utility of the existing techniques are limited.<br />

A prototype ABM was built to represent a public service delivery<br />

program in the U.S. [5]. The model aimed to analyze the process<br />

of rule-breaking and emerging statistical and spatial patterns of<br />

fraud from such a process in public service delivery so that public<br />

managers can have better insights on fraud detection and control.<br />

Figure 1 presents a snapshot of the model. The following section<br />

describes the steps taken and the questions that were/can be<br />

raised.<br />

Figure 1. Public Service Delivery Model Interface<br />

532<br />

4.2 Steps To Follow<br />

Step 1: Assess the research question.<br />

A model is a working representation of some real world processes<br />

that a researcher aims to understand. There are many purposes of<br />

building simulation models. For example, Yucel and Dallen<br />

(2009) provided an overview of the types of models built to<br />

support policy-making: analytical models, advisory models,<br />

strategic models, mediation models, participatory models, and<br />

discussion models [6]. ABM can also be seen based on objectives<br />

that are tightly linked to the research questions. Therefore, the<br />

first step involves developing the research question and<br />

considering how ABM can be a useful approach for<br />

answering/solving/investigating the research question.<br />

For example, the ABM of public service deliveries was built as an<br />

analytical model. Analytical models “act as a tool to develop<br />

insight about dynamic phenomena being studied. These models<br />

aim to represent the system as it is. In that sense, a good<br />

representation of the 'real system' is the main concern in building<br />

this kind of model” [6]. The objective in our example is to<br />

examine how fraud patterns in public service deliveries emerge<br />

from some players’ decisions and behaviors. Thus, a<br />

representation of the program that includes heterogeneous,<br />

congruent players and their behaviors is crucial for the model.<br />

Standard analytical techniques are not well equipped for<br />

understanding and exploring the adaptive decisions and behaviors<br />

of heterogeneous entities, so ABM is a valuable alternative. Thus,<br />

the questions that can be asked at this stage are as follows:<br />

- Is it difficult to answer the research question using<br />

standard approaches?<br />

- Can ABM be a useful alternative, or supplement, to<br />

standard approaches?<br />

- What is the objective of building an ABM?<br />

Step 2: Develop a conceptual model that describes a system and<br />

the processes that are relevant to the research question.<br />

A conceptual model is a description of real world systems or<br />

processes in a textual or graphical format. Usually the model<br />

specifies interdependencies among actors or the basic structure<br />

within a system of interest and describes the decision-making,<br />

interaction, and action rules among actors.<br />

In the example, the basic relationship between key actors in public<br />

service deliveries is elicited to represent the business processes of<br />

a state’s public health service delivery program. In other words,<br />

the way in which business flows in such a program can provide<br />

information on how public services are delivered to program<br />

recipients through vendors and what governing authorities do in<br />

the process.<br />

While the business process describes routine activities of the<br />

program, it does not provide sufficient information about how or<br />

why actors engage in certain decision-making processes. Nor does<br />

it provide information about interactions, such as 1) how program<br />

recipients choose a store to receive public services and 2)<br />

how/why some recipients and vendors engage in illegal benefit<br />

exchanges. For the former, existing consumers’ store choice<br />

literature was used to model program recipients’ choice on which<br />

vendor to utilize. For the latter, two sources of information were<br />

used: criminology theories, such as crime opportunity theories,


and the experience of a state program’s vendor specialists. Some<br />

of the questions addressed included:<br />

- What are the boundaries of the system under<br />

investigation?<br />

- Who should be considered as key actors?<br />

- What attributes of the actors need to be included?<br />

- What interdependencies and interactions must be<br />

specified and how?<br />

- Which theories and information should be relied upon?<br />

- What temporal unit (e.g. months or years) should<br />

simulation steps reflect?<br />

- Should physical geography be explicitly accounted for?<br />

Step 3: Build a prototype model that implements the conceptual<br />

model.<br />

Once a conceptual model is specified, a prototype model is built<br />

using object-oriented programming languages or existing ABM<br />

toolkits. Building a prototype model implies that the model<br />

requires a computational format so that it is given input at the<br />

beginning and can produce output as it runs. This is the stage that<br />

requires programming skills. Building an ABM that is as simple<br />

as possible is the most important consideration in this stage.<br />

Complexity can always be added later.<br />

The ABM of public service deliveries was originally built in<br />

MASON and later replicated in NetLogo. While both toolkits<br />

were designed in a java platform, the NetLogo language is slightly<br />

different from the java used for MASON. Some questions that<br />

might be considered at this point include:<br />

- Which programming language or simulation toolkit<br />

might be chosen given the level of programming skills<br />

and technical capability required for the research (e.g.,<br />

importing spatial data)?<br />

- Are there any existing models that can be examined for<br />

the research?<br />

- How can useful sources and potential answers for<br />

programming questions be found?<br />

- What are reasonable ways to set up initial parameters?<br />

- How are variability and uncertainty incorporated?<br />

- At what step should the ABM simulation stop?<br />

Step 4: Carefully examine how the model behaves and experiment<br />

with some extreme scenarios.<br />

Many ABM toolkits provide a real time visualization capability.<br />

This helps researchers easily and instantly examine the behavior<br />

of agents and the system. Extreme values of some parameters can<br />

also be tested.<br />

Both MASON and NetLogo provide such functionality in the<br />

ABM of public service deliveries. Some example questions<br />

include:<br />

- How can changes in the key attributes of agents (e.g., a<br />

propensity toward risk behavior) using color schemes<br />

and texts be observed?<br />

533<br />

- How does one examine whether programmed codes<br />

perform as they were intended?<br />

- Which behavior of the system needs to be closely<br />

monitored?<br />

Step 5: Analyze the simulation data.<br />

ABM produces a large set of data on variables and interactions of<br />

interest to the researcher. The size of the dataset is ultimately a<br />

function of the researcher’s question and decision on what<br />

information needs to be extracted from the simulation. For<br />

example, the level of fraudulent vendors identified in the<br />

simulation steps can be reported, but is dependent upon the<br />

experimental conditions and decision rules tested.<br />

The analysis of simulation data is not different from the analysis<br />

of empirical data, so statistical tools and techniques can be useful<br />

for simulation data analysis. In addition, existing analytical<br />

packages such as R can be directly linked to the ABM using<br />

NetLogo, which allows a real time statistical analysis of<br />

simulation data during the simulation. The following questions<br />

should be addressed:<br />

- What information needs to be extracted?<br />

- Should the ABM simulation output be extracted at the<br />

individual agent level or aggregate system level?<br />

- How many simulation runs are appropriate?<br />

- What methods and techniques are appropriate for the<br />

analysis of the simulation data?<br />

5. DISCUSSION<br />

There are several issues surrounding the use of ABM as a research<br />

tool for social and policy issues. Among them, this tutorial<br />

focuses on providing perspectives on questions that audiences<br />

often ask: How do we know whether ABM is built without<br />

programming errors? How do we know whether ABM says<br />

anything about the real system? Where do the data come from?<br />

The first is a question of verification, the second is a question of<br />

validation, and the third requires answering the relationship<br />

between ABM and empirics.<br />

5.1 Verifying and Validating ABM<br />

Conventionally, “verification in modeling” is used to refer to the<br />

process of debugging programming errors, whereas validation<br />

requires some processes to establish the predictive power of the<br />

model against real world situations. However, the verification and<br />

validation of ABM has been a controversial topic and there is no<br />

easy answer. In recent years, the artificial social systems and<br />

simulation community has been interested in “model replication”<br />

as a process of verifying and validating ABM [7].<br />

The ABM of public service deliveries was technically verified by<br />

replicating the same model using a different programming toolkit<br />

by an author who has no experience with the actual delivery<br />

program [8] and partly validated against empirical data that were<br />

reported in government documents [9, 10]. This does not mean<br />

that the model was verified or validated in the same sense that<br />

researchers use in standard analytical approaches. It is largely a<br />

process of building confidence on how the model behaves<br />

compared to what is known.


5.2 Relation to Empirics<br />

“Where did you get data?” is often asked when a prototype ABM<br />

is presented. This introduces some consideration about what one<br />

really means by data: Are data a matrix with numerical data<br />

points in Excel spreadsheets? Does one consider what is reported<br />

in research articles as data? Are stories or interviews data?<br />

ABM is “a computation method that enables a researcher to<br />

create, analyze, and experiment with models composed of agents<br />

that interact within an environment” [4, p.2]. Usually, the process<br />

of building an ABM is informed by existing knowledge in the<br />

form of literature, theories, empirical observations, and stories. If<br />

one considers these forms of knowledge as data, then this is where<br />

the data of ABM originates.<br />

If others consider only a numerical representation of the world<br />

using standardized scales and procedures as data, ABM can<br />

certainly work with empirical datasets. For example, GIS data can<br />

be imported to set up artificial landscapes. Census data can be<br />

utilized to represent characteristics of the population in cities or<br />

regions. An example of this approach can be found in the Network<br />

Dynamics and Simulation Science Laboratory’s information<br />

integration platform [11].<br />

However, these are not the only methods that one can utilize to<br />

make sense of ABM’s relation to empirics. ABM studies have<br />

generated new propositions and hypotheses on complex<br />

phenomena, which can be empirically tested in real world<br />

settings. In other words, ABM can be situated in large research<br />

cycles in order to improve our current understanding of complex<br />

social matters. Figure 2 presents this within a research cycle,<br />

showing how ABM can be related to empirical approaches,<br />

studies and data.<br />

Figure 2. Research Cycle<br />

5.3 Conclusion<br />

Depending upon the level of understanding about the real system<br />

one wants to simulate, ABM can be designed for a variety of uses,<br />

such as a hypothesis generator, mediator (e.g., microscope), or<br />

predictor (e.g., calculator). According to the most recent survey of<br />

279 ABM studies published in the 1998-2008 period, a majority<br />

(60%) were built as a mediator, and the remaining ABMs were<br />

built for hypothesis generation [12]. Surprisingly, no study has<br />

used ABM as a predictor. This finding suggests that a prototype<br />

ABM for thought experiments would be extremely useful and that<br />

534<br />

we can gain crucial insights on various social and policy problems<br />

using such a prototype.<br />

This tutorial introduces ABM as a tool that is particularly<br />

appropriate for thought experiments related to policy and<br />

managerial issues in the e-governance community.<br />

6. ACKNOWLEDGMENTS<br />

This work was funded by the National Research Foundation of<br />

Korea Grant (NRF-2010-330-B00262).<br />

7. REFERENCES<br />

[1] Sterman, J. D. Business Dynamics: Systems Thinking and<br />

Modeling for a Complex World. Irwin McGraw-Hill, Boston,<br />

2000.<br />

[2] Miller, J. H. and Page, S. E. Complex Adaptive Systems.<br />

Princeton University Press, Princeton, 2007.<br />

[3] Gilbert, N. Agent-Based Models. Sage Publications, LA,<br />

2008.<br />

[4] Gilbert, N., & Troitzsch, K. Simulation for the Social<br />

Scientist, Open University Press, 2005.<br />

[5] Kim, Y. Analysis for Adaptive Complex Public Enterprises.<br />

Doctoral Dissertation, The Ohio State University, Columbus,<br />

OH, 2006.<br />

[6] Yucel, G., & van Daalen, E. An objective-based perspective<br />

on assessment of model-supported policy processes. Journal<br />

of Artificial Societies and Social Simulation 12(4), 3-29.<br />

2009.<br />

[7] Wilensky, U., & Rand, W. Making models match:<br />

Replicating an agent-based model. Journal of Artificial<br />

Societies and Social Simulation, 10, 2, 2007.<br />

[8] Zhong, W., & Kim, Y. Using model replication to improve<br />

the reliability of agent-based models. In S. K. Chai, J. J.<br />

Salerno, & P. L. Mabry (Eds.), Advances in Social<br />

Computing (pp. 118-127), New York: Springer, 2010.<br />

[9] Kim, Y., & Xiao, N. FraudSim: Simulating fraud in a public<br />

delivery program. In L. Liu & J. Eck (Eds.), Artificial Crime<br />

Analysis Systems: Using Computer Simulations and<br />

Geographic Information Systems (pp. 319-338). Hershey,<br />

PA: IGI Global, 2008.<br />

[10] Kim, Y. Simulating a fraud mechanism in public service<br />

delivery, In A. Desai (Ed.), Simulations for Policy Inquiry,<br />

New York: Springer, 2012.<br />

[11] Barrett, C. L., Eubank, S. Marathe, A., Marathe, M. V., Pan,<br />

Z., & Swarup, S. Information integration to support modelbased<br />

policy informatics. The Innovation Journal, 16(1),<br />

2011.<br />

[12] Heath, B., Hill, R., & Ciarallo, F. A survey of agent-based<br />

modeling practices (January 1998 to July 2008). Journal of<br />

Artificial Society and Social Simulation, 12(4), 9, 2009.


Adhikari, Ganesh Prasad ................ 472<br />

Agrawal, Sandeep ........................... 458<br />

Almazan, Rodrigo Sandoval ......... 109<br />

Andersen, David F. ............................ 1<br />

Al-Khalifa, Hend S. ........................ 243<br />

Al-Rajebah, Nora I. ....................... 243<br />

Al-Razgan, Muna S. ...................... 243<br />

Alfalahi, Alyaa .............................. 495<br />

Aliyu, Ibrahim ............................... 468<br />

Almasoud, Ameera M. ................... 243<br />

Akilli, H. Serkan .............................. 71<br />

Amatya, Prajwal ............................ 524<br />

Andreasson, Kim ............................ 430<br />

Anrique, Roberto ............................ 440<br />

Arcelus, Josune ................................ 83<br />

Arfeen, M. Irfanullah .................... 526<br />

Armenia, Stefano ............................. 62<br />

Awoleye, O. Michael ..................... 236<br />

Awotwi, Johanna E. ....................... 369<br />

Azanzi, Fidèl Jiomekong ............... 406<br />

Babaoglu, Cenay ............................. 71<br />

Bal, Bal Krishna ............................ 524<br />

Barbosa, Luis Soares ..................... 474<br />

Belachew, Mesfin ........................... 210<br />

Bershadskaya, Lyudmila ......... 79, 490<br />

Bertot, John Carlo ........................... 87<br />

Bhuiyan, M. Shakhawat Hossain .. 522<br />

Bigdeli, Alinaghi Ziaee .................. 485<br />

Bloniarz, Peter ............................... 123<br />

Bokhari, Hasnain ........................... 158<br />

Brena, Ramón ................................ 166<br />

Breslin, John .................................. 389<br />

Broto, Laurent ............................... 406<br />

Burov, Vasiliy ................................ 450<br />

Cardona, Diego .............................. 188<br />

Cellary, Wojciech .......................... 332<br />

Cerone, Antonio ............................ 474<br />

Author Index<br />

Chen, Qian ...................................... 267<br />

Chesñevar, Carlos ......................... 166<br />

Cho, JooWon ................................. 452<br />

Choenni, Sunil ................................... 5<br />

Choi, John (Jong Uk) ..................... 452<br />

Chugunov, Andrei .................... 79, 490<br />

Chuluunbat, Zolbayar .................... 483<br />

Codagnone, Cristiano ..................... 287<br />

Colaco, Jessica ................................. 18<br />

Concha, Gastón .............................. 440<br />

Conradie, Peter ................................... 5<br />

Coughlan, Chris .............................. 389<br />

Criado, J. Ignacio ............................. 75<br />

da Silva, Miguel Mira ..................... 320<br />

de Cesare, Sergio ........................... 485<br />

de Melo, Daniel Gonçalves ............ 516<br />

de Souza, Cesar A ........................... 419<br />

Daniel, Vanessa Marques ............... 385<br />

Das, Abhishek ................................ 458<br />

Das, Rama Krushna ................ 402, 502<br />

Demircioglu, Mehmet Akif .............. 71<br />

Deosthali, Kanchan ....................... 202<br />

Dhakal, Garima ............................... 524<br />

Dika, Agni ...................................... 324<br />

Ehringfeld, Andreas ....................... 500<br />

El Aichi, Mohamed Mohyi Eddine . 492<br />

Elbadawi, Ibrahim .......................... 508<br />

Eom, Seok-Jin ................................. 105<br />

Erickson, John ................................. 480<br />

Erika, Bagambiki ............................ 466<br />

Estevez, Elsa .................................. 166<br />

Faniran, Sanjo ............................... 184<br />

Fernandes, Sara .............................. 474<br />

Ferreira, Adriana Simeão .............. 516<br />

Fischer, Gerald .............................. 500<br />

Freitas, Leondeniz ......................... 516<br />

Gharawi, Mohammed .................... 113<br />

Gil-Garcia, J. Ramon ............... 30, 426<br />

Goldstein, Ira ................................. 350<br />

Goodspeed, Robert ......................... 460<br />

Gorham, Ursula ............................... 87<br />

Gronau, Norbert ............................. 346<br />

Grönlund, Åke ............................... 297<br />

Gu, Lihong ...................................... 95<br />

Hagen, Loni .................................... 470<br />

Hagimont, Daniel .......................... 406<br />

Heidt, Josiah .................................. 504<br />

Heine, Moreen .............................. 346<br />

Hendler, Jim ................................. 480<br />

Huff, Richard ................................ 513<br />

Huffman, Amy .............................. 379<br />

Hrdinova, Jana ................................... 1<br />

Islam, M. Sirajul ............................. 297<br />

Jaeger, Paul T. ................................ 87<br />

Janssen, Marijn .............................. 216<br />

Johannessen, Marius Rohde ............. 48<br />

John, Klaus ................................... 500<br />

Joshi, Manish R. ............................. 497<br />

Kamal, Muhammad ........................ 485<br />

Kesan, Jay P. ................................ 147<br />

Khan, Mustafa ............................... 158<br />

Khan, Nawar ................................. 526<br />

Kim, B. Joon ..................................... 34<br />

Kim, Dong Hwa ............................ 452<br />

Kim, Jun Houng ............................. 105<br />

Kim, Soonhee ................................. 44<br />

Kim, Taesung ................................ 279<br />

Kim, Yushim .................................. 531<br />

Kleeman, Liana ............................. 513<br />

Kleinschmit, Stephen W. .................. 34<br />

Koli, Rajesh E. ............................... 497<br />

Konstantinos Tarabanis .................. 132<br />

Knutsson, Ola ................................. 495<br />

Krumova, Milena .......................... 301


Larson, Elizabeth ............................. 87<br />

Lau, Gloria T. ....................... 147, 175<br />

Law, Kincho H. ..................... 147, 175<br />

Lee, Christopher A. ................ 171, 528<br />

Lee, Hyejung ................................ 279<br />

Lee, Jooho ....................................... 44<br />

Lee, Jungwoo ................................. 279<br />

Lee, Mi Yeon ................................. 105<br />

Lessa, Lemma ................................. 210<br />

Leyva, Nancy Karina Saucedo ....... 426<br />

Li, Danyao ..................................... 518<br />

Liang, Xiao ................................... 248<br />

Lincoln, Ruth ................................... 87<br />

Liu, Shuhua Monica ..................... 518<br />

Liu, Xinping ................................... 258<br />

López-Bachiller, Jorge ................... 188<br />

Louis, Claudia ................................ 464<br />

Luna-Reyes, Luis F. ..................... 1, 30<br />

Luna, Dolores E. .............................. 30<br />

Macadar, Marie Anne ..................... 385<br />

Maguitman, Ana ............................ 166<br />

Maheshwari, Devender ................. 216<br />

Mantilla, Camilo Cristancho .......... 511<br />

Matheus, Ricardo .................... 22, 419<br />

Mathur, Kapil ................................. 458<br />

McGraw, Callie .............................. 531<br />

Millard, Jeremy ............................. 430<br />

Misra, Goldi .................................. 458<br />

Misra, Harekrishna ......................... 354<br />

Misuraca, Gianluca .................. 62, 287<br />

Molik, David ................................. 520<br />

Mulligan, Brendan .......................... 389<br />

Mureddu, Francesco ......................... 62<br />

Mutuku, Leonida N. ........................ 18<br />

Navarrete, Celene .......................... 109<br />

Negash, Solomon .......................... 210<br />

O’Donoghue, Padraic ..................... 389<br />

Odongo, Agnes Owuato ................ 192<br />

Ojuloge, Blessing ........................... 236<br />

Olaniyan, Kayode .......................... 184<br />

Osimo, David ................................... 62<br />

Outsetari, Vasiliki ........................... 132<br />

Padhy, Rabi Prasad ........................ 402<br />

Pardo, Theresa A. ....... 1, 113, 123, 310<br />

Paszkiewicz, Zbigniew .................. 332<br />

Patarakin, Evgeny ........................... 450<br />

Patnaik, Pabitrananda ...................... 502<br />

Patra, Manas Ranjan ............... 402, 502<br />

Pawar, Sucheta ............................... 458<br />

Peres, Marco .................................... 67<br />

Pereira, Gabriela Viale .................... 385<br />

Pereira, Ruben ................................ 320<br />

Pimiento, Johanna ............................. 14<br />

Porwol, Lukasz ............................... 389<br />

Potnis, Devendra ........................... 202<br />

Prandini, Marco ................................ 58<br />

Prieto, Lydia Marleny ....................... 14<br />

Proske, Niels ................................. 346<br />

Puron-Cid, Gabriel ......................... 336<br />

Quintero, Johanna Pimiento ........... 206<br />

Ramilli, Marco ................................. 58<br />

Rane, Gauri M. ................................ 497<br />

Rao, Anil G., .................................. 497<br />

Reardon, Timothy .......................... 460<br />

Rexha, Blerim ............................... 324<br />

Rexhepi, Artan ............................... 324<br />

Reynoso, Juan M. Gomez .............. 109<br />

Ribeiro, Manuella Maia ........... 22, 419<br />

Rodríguez, Ana Carolina .................. 14<br />

Rojas-Romero, Yaneileth ................. 30<br />

Rorissa, Abebe ............................... 456<br />

Rozell, Eric .................................... 480<br />

Saenz-Core, Javier ........................ 188<br />

Sambuu, Uyanga .................... 454, 483<br />

Sandoval-Almazan, Rodrigo .... 30, 426<br />

Savoldelli, Alberto ......................... 287<br />

Sayogo, Djoko Sigit .................. 1, 123<br />

Schläpfer, Michael ......................... 410<br />

Sharer, Michelle ............................. 520<br />

Sharma, Mona ............................... 364<br />

Siddiquee, Noore Alam ................. 271<br />

Silva, Diana Parra .......................... 206<br />

Silva, Juan Carlos Noriega ............ 511<br />

Sinn, Donghee ................................ 470<br />

Siyanbola, Willie O. ....................... 236<br />

Snaprud, Mikael ............................. 430<br />

Sneiders, Eriks ............................... 495<br />

Solivan, Jackeline .......................... 504<br />

Spanring, Christian ........................ 460<br />

Steibel, Fabro .................................. 38<br />

Strang, Carl ..................................... 350<br />

Styrin, Evgeny ............................... 487<br />

Suárez, Paula ................................... 67<br />

Taduri, Siddharth ............................ 147<br />

Taewoo Nam .................................. 310<br />

Tambouris, Efthimios .................... 132<br />

Tayi, Giri Kumar .............................. 1<br />

Taylor, Natalie Greene .................... 87<br />

Tchuente, Maurice ........................ 406<br />

Tibbo, Helen R. ..................... 171, 528<br />

Trutnev, Dmitrii ...................... 79, 490<br />

Tudevdagva, Uranchimeg ............. 454<br />

Unurkhaan, Esbold ........................ 483<br />

Vaz, José Carlos ...................... 22, 419<br />

Veldanda, Swapna ......................... 506<br />

Volkamer, Melanie ........................ 410<br />

Xu, Huina ..................................... 267<br />

Wayne L. Myers ............................ 226<br />

Wang, Fang ...................................... 95<br />

Widyaningsih, Yekti ...................... 226<br />

Yang, Tung-Mou ................... 143, 477<br />

Yarmakhov, Boris .......................... 450<br />

Yoo, Chang Hun ............................ 452<br />

Yuan, Qianli .................................. 518<br />

Zheng, Lei .............. 258, 262, 393, 518<br />

Zheng, Tuo .................................... 393<br />

Zhang, Jing ........................................ 1<br />

Zhulin, Andrey .............................. 487


ACM INTERNATIONAL CONFERENCE PROCEEDINGS SERIES,<br />

ACM PRESS

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!