20.01.2013 Views

Designing e-Government for the Poor - Tanzania Development ...

Designing e-Government for the Poor - Tanzania Development ...

Designing e-Government for the Poor - Tanzania Development ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Public key infrastructure initiatives <strong>for</strong> e-Asia<br />

At first, he discussed <strong>the</strong> fundamentals of e-government. A defining<br />

feature of e-government is its contribution to <strong>the</strong> national innovation<br />

system. He explained that e-government can be analyzed in terms of<br />

supplier and consumer. When <strong>the</strong> supplier and <strong>the</strong> consumer meet in<br />

cyberspace, it impacts government innovation. From <strong>the</strong> viewpoint of <strong>the</strong><br />

supplier we need to enhance private public partnerships, and from <strong>the</strong><br />

consumer’s viewpoint we need to create an uncomplicated interface <strong>for</strong> <strong>the</strong><br />

citizen. E-government is multifaceted and entails <strong>the</strong> following: <strong>Government</strong>-to-Business<br />

transactions (G2B), <strong>Government</strong>-to-Citizen (G2C), <strong>Government</strong>-to-<strong>Government</strong><br />

(G2G), as well as, Business-to-Business (B2B), and<br />

Business-to-Citizen (B2C). Mr. Hwangbo emphasized <strong>the</strong> significance of <strong>the</strong><br />

OECD’s 10 Guiding Principles <strong>for</strong> Successful E-government, and stated that<br />

<strong>the</strong>se principles should be followed when designing e-government<br />

programmes. Mr. Hwangbo said that although e-government offers many<br />

benefits, it also poses many challenges <strong>for</strong> <strong>the</strong> users and providers. A<br />

leading challenge is <strong>the</strong> infringement of privacy and security. The United<br />

States, European countries and <strong>the</strong> Republic of Korea have addressed this<br />

challenge and have already been operating government public key infrastructure<br />

to ensure confidentiality, au<strong>the</strong>ntication, and integrity. The PKI is<br />

a fundamental to e-government because it provides a security infrastructure<br />

that enables government, citizens, and <strong>the</strong> private sector to conduct transactions<br />

online. Mr. Hwangbo gave <strong>the</strong> example of <strong>the</strong> Korean e-government.<br />

He said that <strong>the</strong> Korean government had successfully accomplished 11 egovernment<br />

projects and 31 projects of participatory e-government. Services<br />

are effectively provided by <strong>the</strong> Korean e-government system because it is<br />

comprised of ubiquitous computing which allows <strong>the</strong> consumer to access<br />

<strong>the</strong> computer system at any time and from any place.<br />

Mr. Hwangbo introduced <strong>the</strong> topic of PKI initiatives by indicating<br />

that although e-commerce offers numerous advantages, payment by credit<br />

card presents a dilemma. He said that credit card payments are risky<br />

because <strong>the</strong> customer’s private financial in<strong>for</strong>mation is not kept confidential,<br />

and can easily lead to crime. There<strong>for</strong>e, identification, au<strong>the</strong>ntication,<br />

and authorization are critical issues. Identification can be defined as identifying<br />

who you are. Au<strong>the</strong>ntication means whe<strong>the</strong>r your identification is<br />

true, and authorization allows <strong>the</strong> transactions to be per<strong>for</strong>med. Mr.<br />

Hwangbo stated that it is easy to identify and au<strong>the</strong>nticate <strong>the</strong> person who<br />

conducts transactions in a store. However, over <strong>the</strong> Internet, <strong>the</strong> person<br />

behind <strong>the</strong> transaction is not directly identifiable. In <strong>the</strong> process of identification<br />

and au<strong>the</strong>ntication, several methods can be employed. However, each<br />

method has obstacles or limitations (figure 7).<br />

Mr. Hwangbo explained that identification and au<strong>the</strong>ntication methods<br />

range from simple methods such as user names and password, to PKI<br />

which allows <strong>the</strong> agency to verify user identity. PKI can be said to be <strong>the</strong><br />

47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!