Search results

1 – 10 of over 83000
Article
Publication date: 12 April 2023

Zijun Mao and Yuqian Zhu

The study focuses on influential factors of collaboration on government data security by the Chinese government.

Abstract

Purpose

The study focuses on influential factors of collaboration on government data security by the Chinese government.

Design/methodology/approach

The article explores the case of e-government in the Chinese centralized unitary state system context, using a structured–pragmatic–situational (SPS) approach and the boundary theory as an analytical lens.

Findings

The findings indicate that e-government operates in highly interconnected environments where the safe flow of government data requires collaborative and cross-boundary strategies. Any organization is a potential “weakest link”. In addition, collaboration is fragmented by ambiguous accountability and organizational inertia across government departments, resources differences and limited visibility and measurability of security efforts across government levels and conflicts and uncertainties in principal–agent relationships. The solutions for those obstacles are also discussed from the multi-function, multi-level and multi-actor dimensions, respectively. A multi-dimensional overarching security model for the flow of government data is proposed.

Originality/value

The study advances the technology-oriented micro-analysis of previous studies on government data security to cross-organizational revealing at the macrolevel by connecting streams of research in information systems and public administration. These findings will contribute to making the safe flow of government data more resilient in the transformation of e-government.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 1 October 2019

Dhruv Gupta

In this paper, the author develops a game theoretical model to understand why Union Government of India, as a third party, has used different schemes at different times in history…

Abstract

Purpose

In this paper, the author develops a game theoretical model to understand why Union Government of India, as a third party, has used different schemes at different times in history to assist the State Governments in fighting the Naxalite insurgency. Comparing across schemes, it was found that though Matching Security Grants scheme was preferred in general, during asymmetric information scenario it led to an emergency situation wherein the Union Government had to provide the less preferred Bulk Security Grants. Later, it became difficult to withdraw these grants as the State Governments free rode by reducing own security contribution. The author finds that instead, in this scenario, Matching Development Grants are more suitable, as they incentivize the State Governments to reveal private information and help the Union Government exit its third-party role. For a practitioner involved in conflict resolution, these conclusions imply that as the desirability of policies can change diametrically overtime, Union Government must spend resources only on those heads of expenditure that provide both security and development benefits provided they aid in preventing flow of resources to Naxalites. Further, to end its assistance, the Union Government’s expenditures should also complement the capabilities of the State Government rather than substituting them. These results can also guide policy in other protracted civil wars with substantial third-party intervention, which are common these days.

Design/methodology/approach

The paper is an historical analysis of strategies used by Union and State Governments and Naxalites. The analysis is based on game theoretic tools supported with examples.

Findings

The Union Government must provide matching grants instead of bulk grants such as Central Armed Police Forces, and the grants should be aimed at building complementarities with the state governmentssecurity contributions. Under asymmetric information scenario, the Union and State Governments reduce their expenses incurred to fight the Naxalites. A Matching Development Grants scheme would have done better. Union Government must spend resources on heads of expenditure that provides both Development and Security benefits, to curb flow of resources to Naxalites, besides complementing the Security Contributions of the State Government.

Research limitations/implications

The research is limited by disaggregated data to test the hypotheses. It is also limited by the data on hidden variables like the contribution of the Naxalites to fighting. The research is also limited to the extent that individual groups in the war like police commanders, politicians and Naxalite commanders are not incorporated. Multiple asymmetric parties are also not considered; that may generalize the model to other theaters of insurgency.

Practical implications

Certain heads of expenditure such as roads, mobile communication, improving quality of investigation, preventing human rights violations by the security forces, etc. are both security and development enhancing. The Union Government's expenditures must be directed toward this end. Therefore, from a practitioner's perspective, the debate between greed and grievances exists not as a limitation but as a guide. The relevant articles of Constitution of India must be redrafted on these principles. Third-party interventions in other insurgencies may be revisited under these conclusions.

Social implications

Security and Development policies are tools for controlling Naxalite insurgency, which can also be used to prevent flow of resources to Naxalites. Security and development policies to resolving insurgencies are useful at different information scenarios. Therefore, information neutral policies should be preferred.

Originality/value

This paper has contributed theoretically in modeling continuing conflicts like Naxalite insurgency, explicitly. The author also shows that though the field of civil wars may have evolved along the Greed vs Grievance debate (Collier and Hoeffler, 2004), for a practitioner, the lines blur when it comes to solutions, as many heads of expenditures have features of both security and development. This paper also shows that when the Union Government faced asymmetric information scenario, the policy of matching development grants would be beneficial in long run though of limited value in short run. This is an important conclusion as the most intense period of violence was preceded by the asymmetric information scenario. Besides, it has relevance for the other civil wars with third-party intervention, such as NATO in Afghanistan.

Article
Publication date: 11 May 2010

Jingyun Ma, Fengming Song and Zhishu Yang

The purpose of this paper is to examine the evolution of China's securities market regulation from 1980 to 2007 and the dual role of the government in this process.

1351

Abstract

Purpose

The purpose of this paper is to examine the evolution of China's securities market regulation from 1980 to 2007 and the dual role of the government in this process.

Design/methodology/approach

When the government is simultaneously the owner and regulator of the securities market, the evolution of securities market regulation follows a path of compulsory institutional change. China's Government authorities have played a dual role in this process by acting both as the securities market regulator and the controlling owner of the stock exchanges. The paper uses the evolution of China's securities market regulation from 1980 to 2007 to illustrate this theoretical framework.

Findings

Using the case of China, this paper provides unique evidence of how securities regulation evolves in response to government direction and supervision if the government is both the owner and the regulator of the securities market.

Originality/value

The paper offers insight into issues of securities market regulation in China and other emerging markets.

Details

Journal of Financial Regulation and Compliance, vol. 18 no. 2
Type: Research Article
ISSN: 1358-1988

Keywords

Article
Publication date: 31 January 2020

Corey Garriott, Sophie Lefebvre, Guillaume Nolin, Francisco Rivadeneyra and Adrian Walton

This paper aims to present four blue-sky ideas for lowering the cost of the Government of Canada’s debt without increasing the debt’s risk profile.

Abstract

Purpose

This paper aims to present four blue-sky ideas for lowering the cost of the Government of Canada’s debt without increasing the debt’s risk profile.

Design/methodology/approach

The authors argue that each idea would improve the secondary-market liquidity of government debt, thereby increasing the demand for government bonds, and thus, lowering their cost at issuance.

Findings

The first two ideas would improve liquidity by enhancing the active management of the government’s debt through market operations used to support the liquidity of outstanding bonds. The second two ideas would simplify the set of securities issued by the government, concentrating issuance in a smaller set of bonds that would each be more highly traded.

Originality/value

The authors discuss the ideas and give an account of the political, legal and operational impediments.

Details

Journal of Financial Economic Policy, vol. 12 no. 4
Type: Research Article
ISSN: 1757-6385

Keywords

Article
Publication date: 20 April 2023

Thomas Tegethoff, Ricardo Santa, Glaucya Daú and Jimy Cortes

The Colombian Government launched an e-government initiative in 2008 to facilitate communication among the government, citizens and organizations. Considering the high level of…

Abstract

Purpose

The Colombian Government launched an e-government initiative in 2008 to facilitate communication among the government, citizens and organizations. Considering the high level of mistrust of citizens and businesses toward governmental institutions, the government must ensure the security of the information handled and provided by online users. Results to date have not been adequate in the usage of e-government systems. The purpose of this study is to evaluate whether the level of online security affects usage and impacts the cost-effectiveness and quality of the operations and, consequently, the operational effectiveness of organizations using e-government systems.

Design/methodology/approach

Structural equation modeling was used to analyze the antecedents and outcomes of operational effectiveness. To this end, 440 usable questionnaires were collected from managers and personnel from Colombian organizations using e-government systems.

Findings

According to the findings, there is a positive predictive relationship between online security and the dimensions of electronic government effectiveness. Furthermore, neither online security nor any of the dimensions of electronic government effectiveness affect the operational costs of organizations. Nonetheless, the quality of information has a positive effect on the quality of operations. As a result, through the quality of the information, online security has an indirect impact on the quality of operations.

Research limitations/implications

The authors used a convenience sample, carefully selecting respondents based on their operations and practice knowledge and implementation of online security processes. Besides, compared to previous research conducted in developed nations, the sample size is relatively small. Because the survey is based on responses from official companies, it must also be taken into account that over 50% of Colombian labor is informal. Furthermore, Colombia is a nation with a high level of mistrust. When considering these factors, generalizability to all industrial sectors is questionable. Nevertheless, the findings of this study offer relevant information that indicates the need for more extended and comprehensive quantitative research.

Practical implications

Improvements in organizations that use e-government systems, based on the benefits that high-quality information brings to operational performance – cost and quality – will help them survive and become more sustainable and competitive. Furthermore, this study supports the assertion that aspects like online security are critical in promoting information and communication technology uptake and user acceptance in transition and rising economies like Colombia.

Originality/value

There is still a scarcity of information on assessing the effectiveness of electronic government systems and their impact on the quality and cost of operations in organizations that use them. Additionally, Colombia, as a country with low levels of trust between citizens, organizations and government, still lacks information about the impact of online security on the effectiveness of its operations.

Details

Information & Computer Security, vol. 31 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 13 March 2020

Gaki Tshering and Shang Gao

The purpose of the research is to assess security concerns in government's use of Blockchain technology through the lens of value focused thinking (VFT) approach.

Abstract

Purpose

The purpose of the research is to assess security concerns in government's use of Blockchain technology through the lens of value focused thinking (VFT) approach.

Design/methodology/approach

Qualitative methods such as open ended questions and interviews were used to gather data and the data was analysed in a structured approach to formulate a means-ends network of objectives. The data were collected from eight interviews of selected participants.

Findings

The findings are 35 objectives of which ten are fundamental objectives related to the values of identity, trust, data privacy, transparency, integrity, public service delivery, cost, availability of public information, responsibility and usability.

Practical implications

The study implies that governments or private organisations building blockchain solutions for governments can benefit from insights on values to focus on in blockchain security; and the current research serves as a base to understand more on blockchain use in the governments as well as security values and application of VFT approach for future academic researchers in this area.

Social implications

It is a need-driven approach in which blockchain is assessed to ensure its fit to societal needs and public values.

Originality/value

It is first of its kind in studying security in blockchain use by government through the lens of VFT approach, and it provides insights of values that are of importance to further blockchain use in the government.

Details

Journal of Enterprise Information Management, vol. 33 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Abstract

Details

Multinational Enterprises and Terrorism
Type: Book
ISBN: 978-1-83867-585-1

Article
Publication date: 7 March 2016

Avinash Ramtohul and K.M.S. Soyjaudah

Highly sensitive information pertaining to citizens and government transactions is processed in an electronic format, making information security a critical part of e-Government

Abstract

Purpose

Highly sensitive information pertaining to citizens and government transactions is processed in an electronic format, making information security a critical part of e-Government applications and architectures. Information security measures should ideally span from authentication to authorisation and from logical/physical access control to auditing of electronic transactions and log books. The lack of such measures compromises confidentiality, integrity and availability of information. Today, most e-Government projects in developing countries in Southern Africa Developing Community (SADC) face challenges in two main areas, namely, information security and application software integration. This paper aims to discuss and analyse the information security requirements for e-Government projects and proposes an information security governance model for service-based architectures (SBAs).

Design/methodology/approach

The current state of information security in emerging economies in SADC countries was researched. The main problems identified were the lack of software integration and information security governance, policy and administration. The design consists of three basic layers: information security governance defined at the strategic level of the government; information security policy/management defined at the management/operational level; and information security measures, implemented at the technical level. This section also proposes a policy for implementing public key infrastructures to protect information, transactions and e-services. A Token-Ring-based mechanism for implementing Single-Sign-On has also been developed as part of this study.

Findings

The main problems identified were the lack of software integration and information security governance, policy and administration. These challenges are causing e-government projects to stagnate.

Practical implications

The proposed approach for implementing information security in e-Government systems will ensure a holistic approach to ensuring confidentiality, integrity and non-repudiation, allowing e-Government maturity to progress from “interaction” to “online transaction” stage in emerging economies.

Originality/value

Research has not focused on developing a solution for emerging economies which are facing difficulties in integration software applications to deploy end-to-end e-services and to produce an underlying identity management architecture and information security governance to secure the e-services developed and deployed using an SBA. The work produced in this paper is specific to SBAs in e-government environments where legacy systems already exist. The work includes: information security governance defined at the strategic level of the government; information security policy/management defined at the management/operational level; and information security measures implemented at the technical level. This section also proposes a policy for implementing public key infrastructures to protect information, transactions and e-services. A Token-Ring-based mechanism for implementing Single-Sign-On has also been developed as part of this study.

Details

Journal of Science & Technology Policy Management, vol. 7 no. 1
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 13 September 2023

Prasetyo Adi Wibowo Putro, Dana Indra Sensuse and Wahyu Setiawan Setiawan Wibowo

This paper aims to develop a framework for critical information infrastructure (CII) protection in smart government, an alternative measure for common cybersecurity frameworks…

Abstract

Purpose

This paper aims to develop a framework for critical information infrastructure (CII) protection in smart government, an alternative measure for common cybersecurity frameworks such as NIST Cybersecurity Framework and ISO 27001. Smart government is defined as the government administration sector of CII due to its similarity as a core of smart technology.

Design/methodology/approach

To ensure the validity of the data, the research methodology used in this paper follows the predicting malfunctions in socio-technical systems (PreMiSTS) approach, a variation of the socio-technical system (STS) approach specifically designed to predict potential issues in the STS. In this study, PreMiSTS was enriched with observation and systematic literature review as its main data collection method, thematic analysis and validation by experts using fuzzy Delphi method (FDM).

Findings

The proposed CII protection framework comprises several dimensions: objectives, interdependency, functions, risk management, resources and governance. For all those dimensions, there are 20 elements and 41 variables.

Practical implications

This framework can be an alternative guideline for CII protection in smart government, particularly in government administration services.

Originality/value

The author uses PreMiSTS, a socio-technical approach combined with thematic analysis and FDM, to design a security framework for CII protection. This combination was designed as a mixed-method approach to improve the likelihood of success in an IT project.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 13 April 2015

Poonam Gupta, Kalpana Kochhar and Sanjaya Panth

This paper aims to analyze, using the bank-level data for India from 1991-2007, the effect of financial sector liberalization on the availability of credit to the private sector…

Abstract

Purpose

This paper aims to analyze, using the bank-level data for India from 1991-2007, the effect of financial sector liberalization on the availability of credit to the private sector. The authors specifically ask whether public and private banks deployed resources freed up by reduced state preemption to increase credit to the private sector.

Design/methodology/approach

The authors use bank-level data for India from 1991-2007 and difference in difference estimates to analyze how state ownership of banks affected the allocation of credit to the private sector post liberalization, and additionally how the size of fiscal deficit affected this allocation.

Findings

The authors find that post liberalization, public banks continued to allocate a larger share of their assets to government securities, or held more cash, than private banks. Crucially, public banks allocated more resources to hold government securities when fiscal deficit was high. The authors rule out profit maximization, need to hold safer assets or the lack of demand for private credit as the possible reasons for the preference of the public banks to hold government securities. The authors suggest that moral suasion or “laziness” is consistent with this behavior.

Originality/value

Our findings suggest that in developing countries, with fewer alternative channels of financing, government ownership of banks, combined with high fiscal deficit, may limit the gains from financial liberalization.

Details

Indian Growth and Development Review, vol. 8 no. 1
Type: Research Article
ISSN: 1753-8254

Keywords

1 – 10 of over 83000