Search results

1 – 10 of over 60000
Article
Publication date: 12 April 2023

Zijun Mao and Yuqian Zhu

The study focuses on influential factors of collaboration on government data security by the Chinese government.

Abstract

Purpose

The study focuses on influential factors of collaboration on government data security by the Chinese government.

Design/methodology/approach

The article explores the case of e-government in the Chinese centralized unitary state system context, using a structured–pragmatic–situational (SPS) approach and the boundary theory as an analytical lens.

Findings

The findings indicate that e-government operates in highly interconnected environments where the safe flow of government data requires collaborative and cross-boundary strategies. Any organization is a potential “weakest link”. In addition, collaboration is fragmented by ambiguous accountability and organizational inertia across government departments, resources differences and limited visibility and measurability of security efforts across government levels and conflicts and uncertainties in principal–agent relationships. The solutions for those obstacles are also discussed from the multi-function, multi-level and multi-actor dimensions, respectively. A multi-dimensional overarching security model for the flow of government data is proposed.

Originality/value

The study advances the technology-oriented micro-analysis of previous studies on government data security to cross-organizational revealing at the macrolevel by connecting streams of research in information systems and public administration. These findings will contribute to making the safe flow of government data more resilient in the transformation of e-government.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Book part
Publication date: 6 September 2021

Eileen M. Decker, Matthew Morin and Eric M. Rosner

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a…

Abstract

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a constant stream of cyberattacks through varied methods by actors with myriad motivations. These threats are not expected to diminish in the near future. As a result, homeland security and national security professionals at all levels of government must understand the unique motivations and capabilities of malicious cyber actors in order to better protect against and respond to cyberattacks. This chapter outlines the most common cyberattacks; explains the motivations behind these attacks; and describes the federal, state, and local efforts to address these threats.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Article
Publication date: 18 June 2021

Han Zhang, Ying Bi, Fei Kang and Zhong Wang

The purpose of this paper is to analyze the factors influencing the behaviors of government officials during the implementation of open government data (OGD). By identifying and…

Abstract

Purpose

The purpose of this paper is to analyze the factors influencing the behaviors of government officials during the implementation of open government data (OGD). By identifying and understanding the key factors that determine government officials' adoption of OGD in China, this study can create a valuable reference for other countries and their decision-making regarding government implementation of OGD.

Design/methodology/approach

This research collected data by in-depth interviews with government officials in Chinese OGD departments. Through these interviews, the authors consulted 15 administrators from departments that are responsible for the information tasks in Beijing and other cities on their opinions about OGD. The authors also interviewed senior executives from information technology (IT) companies, as well as open data policy scholars from big data alliance and research institutions.

Findings

This paper provides insights about how to promote government officials in OGD implementation, including (1) strengthen social supervision for the environment, through developing and publishing OGD technology roadmaps, then attracting the public to actively participate in the implementing of OGD; (2) establish an OGD assessment mechanism for government officials, with bonus motivations, position promotion incentives, as well as spiritual incentives via regional or sector rankings; (3) alleviate the risks of officials' OGD decisions in actual practice, using the institution construction of OGD to guide its direction and strengthen security protection.

Originality/value

This paper fulfils an identified need to study how government officials' behavior can be motivated on OGD implementation.

Details

Online Information Review, vol. 46 no. 2
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 21 January 2022

Sanjeev Verma and Ashutosh Sheel

Blockchain is widely applied in e-voting, shared economy areas and other government functioning. Fragmented findings and distributed literature need consolidation for a holistic…

1141

Abstract

Purpose

Blockchain is widely applied in e-voting, shared economy areas and other government functioning. Fragmented findings and distributed literature need consolidation for a holistic view of the research domain. The purpose of this study is to comprehensively reviews the blockchain applications for government organizations and presents the past, present and future trends of blockchain applications for government organizations.

Design/methodology/approach

Systematic review protocol instrumentalized the systematic review of research articles published from 2013 to 2021. Science mapping discerns scientific actors’ trends and performance analysis like most influential authors, documents and sources. Content analysis of selected data set unfolds the past, present and future of blockchain applications for government organizations.

Findings

Blockchain technology offers enormous potential for the transformation of government organizations and public services. The primary areas are cryptocurrency, e-voting, shared economy, smart contracts, financial and health services, tourism, logistics and water sustainability.

Research limitations/implications

This study reviewed only published research in journals and conference proceedings and excluded book reviews, book chapters and editorials from the review set. This study persuades governments and policymakers to invest in blockchain technology for transforming government organizations and public services.

Practical implications

This study highlights the importance of blockchain in government-controlled public departments, enhancing transparency and efficiency in public life.

Social implications

Blockchain technology enhances transparency, traceability and accountability of public records.

Originality/value

This study pioneers in chronologically highlighting the importance of blockchain in government-controlled public departments.

Details

Journal of Global Operations and Strategic Sourcing, vol. 15 no. 3
Type: Research Article
ISSN: 2398-5364

Keywords

Article
Publication date: 20 March 2024

Ahmad Mtair Al-Hawamleh

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless…

Abstract

Purpose

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless, the country faces challenges such as evolving cyber threats. The purpose of this study is to investigate the factors influencing cybersecurity practices to ensure the reliability and security of e-government services.

Design/methodology/approach

This paper investigates the multifaceted dynamics of cybersecurity practices and their impact on the quality and effectiveness of e-government services. Five key factors explored include organizational culture, technology infrastructure, adherence to standards and regulations, employee training and awareness and financial investment in cybersecurity. This study used a quantitative method to gather data from 320 participants. The researcher collected 285 completed questionnaires, excluding unusable or incomplete responses, and analyzed the final data set using partial least squares structural equation modeling.

Findings

The findings show that financial investment in cybersecurity, employee training and awareness and adherence to cybersecurity regulations significantly influence the adoption of robust cybersecurity practices. However, the relationship between organizational culture and cybersecurity practices is less straightforward. The research establishes a strong positive correlation between cybersecurity practices and e-government service quality, highlighting the role of security in fostering public trust and user satisfaction and meeting the evolving needs of citizens and businesses.

Originality/value

This research contributes valuable empirical evidence to the fields of e-government and cybersecurity, offering insights that can inform evidence-based policy decisions and resource allocation. By understanding the nuanced dynamics at play, Saudi Arabia is better poised to fortify its digital governance infrastructure and provide secure, high-quality e-government services to its constituents.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 18 March 2024

Noura Aleisa

This study aimed to identify and analyse the key factors influencing the adoption of e-government services and to discern their implications for various stakeholders, from…

Abstract

Purpose

This study aimed to identify and analyse the key factors influencing the adoption of e-government services and to discern their implications for various stakeholders, from policymakers to platform developers.

Design/methodology/approach

Through a comprehensive review of existing literature and detailed analysis of multiple studies, this research organised the influential factors based on their effect: highest, direct and indirect. The study also integrated findings to present a consolidated view of e-government adoption drivers.

Findings

The research found that users' behaviour, attitude, optimism bias and subjective norms significantly shape their approach to e-government platforms. Trust in e-Government (TEG) emerged as a critical determinant, with security perceptions being of paramount importance. Additionally, non-technical factors, such as cultural, religious and social influences, play a substantial role in e-government adoption decisions. The study also highlighted the importance of performance expectancy, effect expectancy and other determinants influencing e-government adoption.

Originality/value

While numerous studies have explored e-government adoption, this research offers a novel classification based on the relative effects of each determinant. Integrating findings from diverse studies and emphasising non-technical factors introduce an interdisciplinary approach, bridging the gap between information technology and fields like sociology, anthropology and behavioural sciences. This integrative lens provides a fresh perspective on the topic, encouraging more holistic strategies for enhancing e-government adoption globally.

Details

Journal of Innovative Digital Transformation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2976-9051

Keywords

Article
Publication date: 1 August 1997

Steve Orlowski

Examines the balance between privacy and law enforcement and initiatives from central governments to retain control. Describes the computer security tools available and discusses…

1768

Abstract

Examines the balance between privacy and law enforcement and initiatives from central governments to retain control. Describes the computer security tools available and discusses the main threats to IT infrastructures.

Details

Information Management & Computer Security, vol. 5 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 20 March 2017

Evgeny Styrin, Luis Felipe Luna-Reyes and Teresa M. Harrison

In this paper, the authors compare the open government data (OGD) ecosystems of Mexico, Russia and the USA in an effort to extract some of the major points of similarity and…

2074

Abstract

Purpose

In this paper, the authors compare the open government data (OGD) ecosystems of Mexico, Russia and the USA in an effort to extract some of the major points of similarity and differentiation between these countries and to trace how variations in these ecosystems may be related to context-specific historical problems and politics, particularly with regard to the possibility of sustained and institutionalized practice.

Design/methodology/approach

The authors take a comparative approach, using a set of concepts commonly applied to the three countries to analyze similarities and differences within this group. The authors gathered textual data and information, the searches for relevant documents guided by a set of concepts or criteria that are frequently used in studies of government’s open data readiness assessment.

Findings

The authors conclude by focusing on the very different national exigencies that have given rise to open data ecosystems in the three countries, the variations in policy vehicles and implementation schemes that have instantiated open data practices within the three ecosystems and the common challenges that each country faces in institutionalizing OGD programs beyond the tenures of their current executives.

Originality/value

OGD is an information policy with near global relevance and increasing application. Practitioners and scholars alike have used the concept of an “ecosystem” to guide their approach to implementing this policy and to theorizing its scope and benefits. The international comparison is original and adds to the current understanding of an ecosystem approach to OGD.

Details

Transforming Government: People, Process and Policy, vol. 11 no. 1
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 9 October 2009

Colin Combe

One of the key aims of the UK's Transformational Government strategy is to create a “joined‐up” government where communications within and between public organisations is improved…

797

Abstract

Purpose

One of the key aims of the UK's Transformational Government strategy is to create a “joined‐up” government where communications within and between public organisations is improved by the use of information technology. Data sharing is a key enabler of “joined‐up” government but the implementation of the strategy presents a series of risks. The purpose of this paper is to articulate and assess the nature of those risks in relation to violations of existing laws using the National Pupil Database (NPD) in England as a case study.

Design/methodology/approach

The paper investigates examples of violations of EU law relating to rights to privacy of data sharing practices within the UK public sector using an interpretive approach to existing published information. The case of the NPD illustrates how certain identified data sharing practices contravene existing laws and exposes this aspect of the Transformational Government strategy to heightened risk of a legal challenge.

Findings

Four examples of violations of existing EU laws on privacy are identified from an investigation into the NPD for schools in England. The analysis exposes the imbalance between the data sharing practices underpinning the Transformational Government strategy in the UK and the requirements for fulfilling privacy protection rights to citizens enshrined in EU law. The findings reveal that data sharing practices as a key enabler of the Transformational Government strategy risks violating existing laws designed to protect privacy. The UK government risks a legal challenge, the outcome of which may seriously undermine the prospects for achieving the stated aim of improving efficiency and effectiveness across the public sector.

Research limitations/implications

The paper is largely restricted to the NPD for schools in England. The findings would be strengthened by expanding the research into other areas of the public sector where data sharing practices have been implemented.

Originality/value

The findings are a significant and timely contribution to understanding the data sharing/privacy tension that ministers and legislators need to address. The work provides an insight into where weaknesses exist within current arrangements that is of value to policymakers, legislators, human rights advocates and government authorities at both central and local levels.

Details

Transforming Government: People, Process and Policy, vol. 3 no. 4
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 18 January 2022

Runhui Lin, Lun Wang, Biting Li, Yanhong Lu, Zhiqiang Qi and Linyu Xie

Blockchain is a technical solution integrating multiple technologies, with the potential to overcome the drawbacks of organizational governance. Given the emergence and prevalence…

Abstract

Purpose

Blockchain is a technical solution integrating multiple technologies, with the potential to overcome the drawbacks of organizational governance. Given the emergence and prevalence of blockchain, its importance for organizational governance has progressively increased. Therefore, this study aims to analyze how blockchain restructure organizational governance.

Design/methodology/approach

This study presents a structured systematic literature review of blockchain-enabled applications across diverse organizational governance models and several case studies to illustrate them. Based on the above analysis, governance mechanisms, transaction upgrading and challenges are proposed.

Findings

Based on the literature review and typical applications, the authors summarize the advances in the research on the theoretical and practical applications of blockchain in organizational governance. We also identify the influence mechanisms of organizational governance and investigate transaction upgrading based on blockchain. Finally, the authors discuss three types of challenges (i.e. administrative, technical and environmental) to the relationship between blockchain and organizational governance. Along with the development of blockchain applications, the impact of blockchain on organizational governance has progressed in both theory and practice. Therefore, these findings will have significant implications for both academics and practitioners.

Originality/value

This paper makes three key theoretical contributions: we review the literature on the impact of blockchain on organizational governance and present typical cases to illustrate it; propose four governance mechanisms for the application of blockchain in organizational governance; and propose an innovating-and-matching-oriented model of transaction upgrading based on blockchain.

Details

Nankai Business Review International, vol. 14 no. 2
Type: Research Article
ISSN: 2040-8749

Keywords

1 – 10 of over 60000