E Gov Issues & Chanllenges
1.
Issues in the e-governance implementation
i. Technology Issues
In technology there are
three basic elements. These are infrastructure layer, application layer,
integration technology and application layer[3]. The technologies and services
for networking in e-governance is the infrastructure layer which is about hardware
and software required to generate a web site, as well as it is about the
equipment‘s location and who looks after it. Application layer is made up of
software and services that either extend the site‘s performance or make it
easier to manage. The integration layer is to use the Internet to tie together
practically all the traditional disciplines associated with various services
provided by the web site. Application software is the software that performs
the functions of a web based information system.
ii. Infrastructure layer
It is made up of various
core technologies which is explained below:
Carrier: The basic element by
which site is connected to the internet. Internet service providers(ISP)
provide internet connection and bandwidth required for the sites.
Hosting centre: Like big corporate world
make specially designed rooms for equipment. E-governance also looking for such
specially designed rooms which are
cost effective and efficient.
Three more layers of infrastructure are needed
for the better performance of the web sites load balancing, security layer, and
caching. Load balancing regulates the traffic generated by the incoming
requests to the servers. Load balancing software handles information requests
with the most available capacity in order to avoid ―server busy‖ messages.
Security layer controls which information to be given and to whom. This layer
is used to prevent the hacking and making online transaction safe. When web
server jumps up against its performance limits, especially when the server has
to extract too much information during the peak traffic, the cache gives a
helping hand by storing frequently requested information.
iii. Basic Application
Layer
The core technologies in the basic applications
layer are content management system, personalization, transaction engines, site
analysis, campaign management, and customer support. Content management system
makes it easy to create and organize web content especially with thousands of
pages and lots of interchangeable words and images. Other features of content
management system are server caching and analysis of web site traffic.
Personalization system stores the visitor/ citizen profile while they visit the
site. The system prompts the visitor to give their profile on voluntary basis.
Also it tracks the visitor‘s visits. Transaction engine allows the visitor to
configure his/her request and facilitates to pay by credit card or other means.
Also it manages the service and visitor information, and it facilitates to have
a real time link with a third party such as a credit card company or a bank. As
web can reveal more about its visitor behavior than any other medium, most
servers collect and store enormous amounts of information about how many page
views they serve. Besides, site analysis system stores information such as how
many visitors came in every month, how long they stayed on the site, and what
they looked at. Campaign management system goes beyond the site analysis and
helps to launch certain marketing efforts, such as automated email that
responds instantly. Customer support system gives a helping hand to a visitor
who has trouble using a site. The system gives automated help with the human
touch.
iv. Integration
technology
The core technologies in integration are
application integration, sales integration, and financials. Application
integration enables the user to talk with the ―legacy‖ system, which is a
non-Internet system. For example, a web site gives the front-end interface to
access to various services. To complete the request the back-end systems are to
be integrated. This kind of integration is provided by available ―Enterprise
Application Integration‖ software. The integration technology bolts together
those non-Internet systems and Web operations. Sales integration collects all
sales data in various government centers in real time and provides remarkable
opportunities to forecast and track the visitors. Once the transactions are completed
over the web, the transaction details are to be plugged into accounting system.
This is facilitated by financials system.
v. Application software
The visitor interacts with the application
software when entering input into an application program and receiving output
from the program. The three step method is proposed for the application
software plan to interact with the user. These are
Where we are
Where we want to go
How do we get there
Where are we: the present status of application in the government organization.
Analyzing the functional area in every government organization. Identifying the systems for which
the application software is not yet developed is also a primary task.
Where we want to go: what kind of governance
are required by the next generation? It is trying to utilize internet
technology to shape the way of living for the next
generation
How do we get there: Innovative Internet
business models are to be created in e-governance context to intertwine the
relationship between people and their
government. Implementation can be done in progressive stages such as getting
online with web sites, providing electronic distribution, implementing
financial transaction such as tax or license payments.
vi. Management of Change
related Issues
It is important to investigate how the business
of government and the nature of governance itself change in the digital
networking economy. Questioning the policy formulation processes in view of
e-citizen expectations is a major initiative in e-governance. Ultimately the
objective of the process reengineering is to rethink the value propositions of
the government and how they function in serving the citizens. The major goal is
to change the behavior of governments with the changing needs.
vii. Funding issues
Around the world,
governments provided funding for the select pilot projects on government
on-line, including projects such as public works, government services, and
human resources. The real challenge for the government is to go about funding
the full range of initiatives in order to achieve the objective of ―Government
Online‖. One suggestion is that the concerned department has to come up with
adequate fund by themselves. Other issue is utilizing the available resources
both in the plan sector and outside it.
For example, in Andhra Pradesh, India, a grand
plan for IT infrastructure envisaging to connect every mandal or taluka
headquarters with broadband fiber optic or wireless links to a state wide
network called AP State Wide Area Network (APSWAN). A fiber optic backbone with
2 Mbps capacity has already been inducted, free of charge from BSNL (1999) to
link 25 district head quarters with the state secretariat in Hyderabad. Within
another three years, the state government is going to network 1200 mandal
headquarters and the network will be used for voice, email, and video
communication for effective and efficient administration in health care and
education. In the next stage every village will be connected via wireless and
dial up access. Accordingly, each state government is expected to strengthen
the infrastructure in this manner for the project of ―Government Online.
2.
Challenges in e-governance
There are large numbers
of potential barriers in the implementation of e-Governance. Some hindrance in
the path of implementation, like security, unequal access to the computer
technology by the citizen, high initial cost for setting up the e government solutions
and resistance to change[6]. Challenges identified as trust, resistance to
change, digital divide, cost and privacy and security concerns.
i. Trust
Trust can be defined
along two dimensions: as an assessment of a current situation, or as an innate
personality trait or predisposition [4]. The implementation of public
administration functions via e-government requires the presence of two levels
of trust. The first is that the user must be confident, comfortable and
trusting of the tool or technology with which they will interact. The second
dimension of trust pertains to trust of the government.
There has to be a
balance between ensuring that a system prevents fraudulent transactions and the
burden that extensive checks can take place on people who are honest.
Recently, confidential information on military
veterans was compromised when a computer containing their personal information
was lost. This type of incident can erode trust and user confidence in
government systems. Trust, along with financial security, are two critical
factors limiting the adoption of e-government services.
ii. Resistance to change
The innovation diffusion theory states that over
time an innovation will diffuse through a population, and the rate of adoption
will vary between those who adopt early—referred to as ―early adopters‖— and to
those who adopt the innovation much later, referred to as
―laggards‖. The resistant to change phenomenon
can explain much of the hesitation that occurs on the part of constituents in moving
from a paper based to a Web-based system for interacting with government.
Citizens, employees and businesses can all have their biases with
respect to how
transactions should be processed. However, government entities and public
policy administrators cannot ignore the changes that occur as a result of the
implementation of information and communication technology (ICT). In the early
1990s identified the important role that ICT would have in shaping public
policy, and cautioned both rich and poor governments about neglecting its
significance. Education about the value of the new systems is one step toward
reducing some of the existing resistance. It can also be particularly useful
for a leader or manager, to buy into the new system at an early stage in the
adoption process.
iii. Digital Divide
The digital divide refers to the separation that
exists between individuals, communities, and businesses that have access to
information technology and those that do not have such access. Social,
economic, infrastructural and ethno-linguistic indicators provide explanations
for the presence of the digital divide . Economic poverty is closely related to
limited information technology resources. An individual living below poverty
line does not afford a computer for himself to harness the benefits of
e-government and other online services. As the digital divide narrows, broader
adoption of e-government in the public domain becomes possible.
Economic poverty is not the only cause of
digital divide. It can also be caused by the lack of awareness among the
people. Even some of the economic stable people don‘t know about the scope of
e-governance. Awareness can only help to bring users to that service delivery
channel once. It cannot guarantee sustained use of the system unless the system
is also designed in such a way as to deliver satisfactory outcome.
Procedures need to be simplified to deliver
concrete benefits and clear guidelines provided to encourage their use by the
actual end users and reduce users‘ dependence on middlemen/intermediaries.
iv. Cost
Cost is one of the most important prohibiting
factor that comes in the path of e-governance implementation particularly in
the developing countries like India where most of the people living below the
poverty line. Elected officers and politician don‘t seem to be interested in
implementing e-governance. Its return is not visible in the near future. In 2004,
the United Kingdom and Singapore respectively spent 1 percent and 0.8 percent
of their gross domestic product (GDP) on e-government. India is spending 3
percent of GDP.
v. Privacy and Security
There will be three
basic levels of access exists for e-government stakeholders: no access to a Web
service; limited access to a Web-service or full-access to a Web service,
however when personal sensitive data exists the formation of the security
access policy is a much more complex process with legal consideration. With the
implementation of e-government projects, effective measures must be taken to
protect sensitive personal information. A lack of clear security standards and
protocols can limit the development of projects that contain sensitive
information such as income, medical history.
Post a Comment