International Journal of Electronic Governance (13 papers in press)
Investigating the Mobile Side of e-Participation
by Maria Ntaliani
Abstract: Electronic participation is evolving around the globe, providing opportunities and challenges for civic engagement in decision-making and service delivery. As the use of mobile technology grows rapidly, a new dimension of electronic participation has emerged, namely mobile participation. Local governments have not reached to a clear strategy on how to design successful mobile services for participation. In this light, this study attempts to propose a way for exploiting mobile participation in municipal governments. It presents e-participation and m-participation progress in 325 Greek municipal governments. It concludes to a framework for introducing efficient and effective mobile participation applications so as to make local societies more inclusive.
Keywords: electronic participation; mobile participation; local government; municipal government; websites; mobile apps.
Sharing secrets, revealing thoughts and feelings. Perceptions about disclosure practices and anonymity in a FB University students
by Christos Kalloniatis
Abstract: The aim of this study was to identify students
Keywords: Facebook; students communities; personal information disclosure; anonymity; privacy; privacy protection; .
Citizens' perceptions on benefits of e-governance
by Kriti Priya Gupta , Swati Singh, Preeti Bhaskar
Abstract: The paper presents a framework for categorizing the benefits of e-governance in Indian context, wherein four dimensions of benefits are proposed i.e., Economic Benefits, Quality of Service (QoS) benefits, Quality of Governance (QoG) benefits and Personal Development. To test the proposed framework, the study has selected e-governance services offered by New Delhi Municipal Council (NDMC). Primary data has been collected from 515 users of NDMC
Keywords: E- governance; Information and Communication Technology; Economic Benefits; Quality of Service (QoS); Quality of Governance (QoG); India; New Delhi Municipal Council (NDMC).
Security Policy Rules and Required Procedures for two Crucial Cloud Computing Threats
by Konstantinos Lambrinoudakis
Abstract: Cloud computing is the most accurate paradigm of next generation internet-based distributed computing systems. It offers potential benefits including cost savings, flexibility and improved business outcomes for organizations. Despite the potential advantages of Cloud Computing, security is one of the major issues remaining questionable. In this paper two crucial security threats of Cloud Computing systems are presented and are assigned to one of four categories
Keywords: Cloud Computing; Threats; Security Policy Rules; Software-as-a-Service (SaaS); Required Procedures; Methodology; Security Policy.
E-Voting vs E-Trust: A test bed for e-Democracy in a World in Crisis
by Elias Pimenidis
Abstract: The world is currently experiencing a number of real challenges in the face of persistent economic crisis, local conflicts and huge waves of refugees. All of the above are affecting secure access to, completion of peoples
Keywords: e-Voting; e-Trust; e-Democracy; Refugees; Digital Elections; World Crisis; e-Voting Technologies; Palestine.
Mobile communication and political participation: Unraveling the effects of mobile phones on political expression and offline participation among young people
by Hua Pang
Abstract: In recent years, mobile devices have dramatically transformed the landscape of political communication by expanding individuals
Keywords: mobile devices; social networking sites; political communication; political expression; offline political participation; young people; China.
Smart Cross-Border e-Gov Systems: an application to refugee mobility
by Elias Pimenidis
Abstract: Smart Cross-Border e-Government Systems for citizens and business have been recently proposed to further improve everyday lives, expand business frontiers, and facilitate the movement of citizens by reducing the constraints imposed by existing borders between federal states. Their main advantage is their ability to be used by governmental organizations, citizens, and business, in a cross border environment, thanks to the availability of recently developed electronic authentication, identification and signature platforms. These latest technological advances may contribute to solving the mobility issue of legitimate refugees in various European countries. This problem has at the time of writing evolved into a major crisis due to the mass movement of hundreds of thousands of Syrian and Iraqi refugees across Europe and requires immediate attention. An implementation of Smart Cross-Border e-Government Systems appears to be a very good option in supporting the management of individuals and their movement in order to address this crisis.
Keywords: E-Government; Smart Cross-Border e-Government Services; Internet of Things; Cloud Computing; refugee mobility; eIDAS; e-Identification.
TRILLION project approach on scenarios definition for citizen security services
by Charalampos Patrikakis
Abstract: TRILLION project proposes an open, flexible, secure and resilient socio-technical platform to foster effective collaboration of citizens and law enforcement officers. Using the TRILLION platform, citizens will be able to report crimes, suspicious behaviour and incidents, identify hazards and assist law enforcement agents through active participation for achieving better urban security management. In the context of preparation of use cases and scenarios that will serve the needs for enhanced citizen participation and improved citizen-LEA collaboration, a methodology towards a comprehensive definition of use cases, accounting for all related aspects, such as technical, social, organizational and regulatory is proposed in this paper. A particular use case from the project is used in order to demonstrate the application of the proposed methodology.
Keywords: Use cases; methodology; security; social networks; collaborative platforms.
Advanced process simulation tools for improving the quality of the decision-making process in local government of the Czech Republic
by Martin Molhanec
Abstract: The paper addresses the problem of low participation of residents of small settlements in the territorial planning processes. Low participation causes dissatisfaction with democracy in local government and decreases the quality of life. The paper presents a solution which consists in the use of computer simulation tools to increase the level of knowledge of the persons concerned, which makes the effect of increased participation. This hypothesis was confirmed experimentally by our project in settlements of Central Bohemia.
Keywords: territorial planning; quality of life; participation; process modelling; process simulation; training and education.
ELECTRONIC GOVERNANCE PLATFORM: TOWARDS OVERCOMING THE CHALLENGES OF NON-INCLUSION OF CITIZENS IN PUBLIC POLICY FORMULATION AND IMPLEMENTATION IN NIGERIA
by Daniel Gberevbie
Abstract: This paper examined electronic governance platform
Keywords: electronic governance platform; non-inclusion; policy formulation; policy implementation; Nigeria.
The dynamics of E-government enactment in a developing country public sector organization: Evidence from Ghana
by Justice Nyigmah Bawole
Abstract: The demand for accountability, transparency and efficient service delivery by citizens in many countries is pushing many governments to adopt e-government initiatives in achieving timely and efficient information dissemination. However, research shows that many public organizations in developing countries have been slow in responding to these developments. This study investigated how organizational level factors shape e-government implementation in public organizations in a developing country. The qualitative research approach was employed for this study. Key informants were purposively selected and one-on-one in depth interviews were used to collect data. The study identified inadequate financial resources and human resource, leadership support, low ICT literacy as well as inadequate ICT equipment and low internet connectivity to be the factors militating against the effective implementation of the CBT programme at the DVLA. The study concludes that e-government has the potential to enhance the delivery of services in public organizations if the challenges are addressed.
Keywords: e-government; implementation; Ghana; developing country; public organization; Computer-based technology.
Digital Democracy and Public Administration Reform in Indonesia
by Bevaola Kusumasari
Abstract: Studies on digital democracy and public administration have mainly focused on the importance of top management support for technology adoption and sustainability of e-government. Little research considers how digital democracy practices and their relations with public administration reform particularly in Asia Pacific and middle-income country. Thus, this research investigates the variety and stages of digital democracy practices and how government bodies implement practices of digital democracy in relation to public administration reform in Indonesia. This study applied qualitative methods and procedures including document analysis, fieldwork, and interview. This research found that digital democracy in the research areas have been applied in governance and public services sectors. The results provided support that the innovation supporting digital democracy practices improves political information retrieval and exchange between governments, public administrations, representatives, community organizations and individual citizens. These practices have led to significant achievement in relation to public administration reforms by building a new culture in digital innovation.
Keywords: Digital Democracy; Public Administration Reforms; Innovations; electronic governance.
Privacy Protection of Tagged Multimedia Content in Online Social Networks
by Alexandra Michota
Abstract: Tagging services in Online Social Networks (OSNs) allow users to connect online resources based on their characteristics in addition to their URLs. The semantic interoperability creates authorization conflicts when accessing the tagged shared content; as a result, privacy requirements cannot be fully satisfied. In this paper we investigate the privacy implications of unauthorized visibility gaps in tagged multimedia content that are due to the different privacy restrictions that users apply to their Personal Identifiable Information (PII). By examining all the possible visibility combinations in a two-level social relationship scale for different anonymized real user profiles, according to the offered choices that are provided by the privacy mechanisms in OSNs, we identified the cases where there exist visibility gaps that can cause privacy breaches. Our findings indicate that the current privacy mechanisms of OSN users
Keywords: Tag; Sharing Content; Personally Identifiable Information; Privacy; Visibility.