Designing e-Government for the Poor - Tanzania Development ...
Designing e-Government for the Poor - Tanzania Development ...
Designing e-Government for the Poor - Tanzania Development ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Public key infrastructure initiatives <strong>for</strong> e-Asia<br />
At first, he discussed <strong>the</strong> fundamentals of e-government. A defining<br />
feature of e-government is its contribution to <strong>the</strong> national innovation<br />
system. He explained that e-government can be analyzed in terms of<br />
supplier and consumer. When <strong>the</strong> supplier and <strong>the</strong> consumer meet in<br />
cyberspace, it impacts government innovation. From <strong>the</strong> viewpoint of <strong>the</strong><br />
supplier we need to enhance private public partnerships, and from <strong>the</strong><br />
consumer’s viewpoint we need to create an uncomplicated interface <strong>for</strong> <strong>the</strong><br />
citizen. E-government is multifaceted and entails <strong>the</strong> following: <strong>Government</strong>-to-Business<br />
transactions (G2B), <strong>Government</strong>-to-Citizen (G2C), <strong>Government</strong>-to-<strong>Government</strong><br />
(G2G), as well as, Business-to-Business (B2B), and<br />
Business-to-Citizen (B2C). Mr. Hwangbo emphasized <strong>the</strong> significance of <strong>the</strong><br />
OECD’s 10 Guiding Principles <strong>for</strong> Successful E-government, and stated that<br />
<strong>the</strong>se principles should be followed when designing e-government<br />
programmes. Mr. Hwangbo said that although e-government offers many<br />
benefits, it also poses many challenges <strong>for</strong> <strong>the</strong> users and providers. A<br />
leading challenge is <strong>the</strong> infringement of privacy and security. The United<br />
States, European countries and <strong>the</strong> Republic of Korea have addressed this<br />
challenge and have already been operating government public key infrastructure<br />
to ensure confidentiality, au<strong>the</strong>ntication, and integrity. The PKI is<br />
a fundamental to e-government because it provides a security infrastructure<br />
that enables government, citizens, and <strong>the</strong> private sector to conduct transactions<br />
online. Mr. Hwangbo gave <strong>the</strong> example of <strong>the</strong> Korean e-government.<br />
He said that <strong>the</strong> Korean government had successfully accomplished 11 egovernment<br />
projects and 31 projects of participatory e-government. Services<br />
are effectively provided by <strong>the</strong> Korean e-government system because it is<br />
comprised of ubiquitous computing which allows <strong>the</strong> consumer to access<br />
<strong>the</strong> computer system at any time and from any place.<br />
Mr. Hwangbo introduced <strong>the</strong> topic of PKI initiatives by indicating<br />
that although e-commerce offers numerous advantages, payment by credit<br />
card presents a dilemma. He said that credit card payments are risky<br />
because <strong>the</strong> customer’s private financial in<strong>for</strong>mation is not kept confidential,<br />
and can easily lead to crime. There<strong>for</strong>e, identification, au<strong>the</strong>ntication,<br />
and authorization are critical issues. Identification can be defined as identifying<br />
who you are. Au<strong>the</strong>ntication means whe<strong>the</strong>r your identification is<br />
true, and authorization allows <strong>the</strong> transactions to be per<strong>for</strong>med. Mr.<br />
Hwangbo stated that it is easy to identify and au<strong>the</strong>nticate <strong>the</strong> person who<br />
conducts transactions in a store. However, over <strong>the</strong> Internet, <strong>the</strong> person<br />
behind <strong>the</strong> transaction is not directly identifiable. In <strong>the</strong> process of identification<br />
and au<strong>the</strong>ntication, several methods can be employed. However, each<br />
method has obstacles or limitations (figure 7).<br />
Mr. Hwangbo explained that identification and au<strong>the</strong>ntication methods<br />
range from simple methods such as user names and password, to PKI<br />
which allows <strong>the</strong> agency to verify user identity. PKI can be said to be <strong>the</strong><br />
47