Professional Shiksha Banner

Professional Shiksha Banner

E Gov Issues & Chanllenges

1. Issues in the e-governance implementation


i. Technology Issues


In technology there are three basic elements. These are infrastructure layer, application layer, integration technology and application layer[3]. The technologies and services for networking in e-governance is the infrastructure layer which is about hardware and software required to generate a web site, as well as it is about the equipment‘s location and who looks after it. Application layer is made up of software and services that either extend the site‘s performance or make it easier to manage. The integration layer is to use the Internet to tie together practically all the traditional disciplines associated with various services provided by the web site. Application software is the software that performs the functions of a web based information system.

ii. Infrastructure layer


It is made up of various core technologies which is explained below:

Carrier: The basic element by which site is connected to the internet. Internet service providers(ISP) provide internet connection and bandwidth required for the sites.

Hosting centre: Like big corporate world make specially designed rooms for equipment. E-governance also looking for such specially designed rooms which are cost effective and efficient.

Three more layers of infrastructure are needed for the better performance of the web sites load balancing, security layer, and caching. Load balancing regulates the traffic generated by the incoming requests to the servers. Load balancing software handles information requests with the most available capacity in order to avoid ―server busy‖ messages. Security layer controls which information to be given and to whom. This layer is used to prevent the hacking and making online transaction safe. When web server jumps up against its performance limits, especially when the server has to extract too much information during the peak traffic, the cache gives a helping hand by storing frequently requested information.


iii. Basic Application Layer
The core technologies in the basic applications layer are content management system, personalization, transaction engines, site analysis, campaign management, and customer support. Content management system makes it easy to create and organize web content especially with thousands of pages and lots of interchangeable words and images. Other features of content management system are server caching and analysis of web site traffic. Personalization system stores the visitor/ citizen profile while they visit the site. The system prompts the visitor to give their profile on voluntary basis. Also it tracks the visitor‘s visits. Transaction engine allows the visitor to configure his/her request and facilitates to pay by credit card or other means. Also it manages the service and visitor information, and it facilitates to have a real time link with a third party such as a credit card company or a bank. As web can reveal more about its visitor behavior than any other medium, most servers collect and store enormous amounts of information about how many page views they serve. Besides, site analysis system stores information such as how many visitors came in every month, how long they stayed on the site, and what they looked at. Campaign management system goes beyond the site analysis and helps to launch certain marketing efforts, such as automated email that responds instantly. Customer support system gives a helping hand to a visitor who has trouble using a site. The system gives automated help with the human touch.

iv. Integration technology
 The core technologies in integration are application integration, sales integration, and financials. Application integration enables the user to talk with the ―legacy‖ system, which is a non-Internet system. For example, a web site gives the front-end interface to access to various services. To complete the request the back-end systems are to be integrated. This kind of integration is provided by available ―Enterprise Application Integration‖ software. The integration technology bolts together those non-Internet systems and Web operations. Sales integration collects all sales data in various government centers in real time and provides remarkable opportunities to forecast and track the visitors. Once the transactions are completed over the web, the transaction details are to be plugged into accounting system. This is facilitated by financials system.

v. Application software
 The visitor interacts with the application software when entering input into an application program and receiving output from the program. The three step method is proposed for the application software plan to interact with the user. These are

Where we are
Where we want to go
How do we get there

Where are we: the present status of application in the government organization. Analyzing the functional area in every government organization. Identifying the systems for which the application software is not yet developed is also a primary task.

Where we want to go: what kind of governance are required by the next generation? It is trying to utilize internet technology to shape the way of living for the next generation

How do we get there: Innovative Internet business models are to be created in e-governance context to intertwine the relationship between people and their government. Implementation can be done in progressive stages such as getting online with web sites, providing electronic distribution, implementing financial transaction such as tax or license payments.

vi. Management of Change related Issues

It is important to investigate how the business of government and the nature of governance itself change in the digital networking economy. Questioning the policy formulation processes in view of e-citizen expectations is a major initiative in e-governance. Ultimately the objective of the process reengineering is to rethink the value propositions of the government and how they function in serving the citizens. The major goal is to change the behavior of governments with the changing needs.

vii. Funding issues

Around the world, governments provided funding for the select pilot projects on government on-line, including projects such as public works, government services, and human resources. The real challenge for the government is to go about funding the full range of initiatives in order to achieve the objective of ―Government Online‖. One suggestion is that the concerned department has to come up with adequate fund by themselves. Other issue is utilizing the available resources both in the plan sector and outside it.

For example, in Andhra Pradesh, India, a grand plan for IT infrastructure envisaging to connect every mandal or taluka headquarters with broadband fiber optic or wireless links to a state wide network called AP State Wide Area Network (APSWAN). A fiber optic backbone with 2 Mbps capacity has already been inducted, free of charge from BSNL (1999) to link 25 district head quarters with the state secretariat in Hyderabad. Within another three years, the state government is going to network 1200 mandal headquarters and the network will be used for voice, email, and video communication for effective and efficient administration in health care and education. In the next stage every village will be connected via wireless and dial up access. Accordingly, each state government is expected to strengthen the infrastructure in this manner for the project of ―Government Online.



2. Challenges in e-governance


There are large numbers of potential barriers in the implementation of e-Governance. Some hindrance in the path of implementation, like security, unequal access to the computer technology by the citizen, high initial cost for setting up the e government solutions and resistance to change[6]. Challenges identified as trust, resistance to change, digital divide, cost and privacy and security concerns.

i. Trust

Trust can be defined along two dimensions: as an assessment of a current situation, or as an innate personality trait or predisposition [4]. The implementation of public administration functions via e-government requires the presence of two levels of trust. The first is that the user must be confident, comfortable and trusting of the tool or technology with which they will interact. The second dimension of trust pertains to trust of the government.

There has to be a balance between ensuring that a system prevents fraudulent transactions and the burden that extensive checks can take place on people who are honest.

Recently, confidential information on military veterans was compromised when a computer containing their personal information was lost. This type of incident can erode trust and user confidence in government systems. Trust, along with financial security, are two critical factors limiting the adoption of e-government services.

ii. Resistance to change

The innovation diffusion theory states that over time an innovation will diffuse through a population, and the rate of adoption will vary between those who adopt early—referred to as ―early adopters‖— and to those who adopt the innovation much later, referred to as

―laggards‖. The resistant to change phenomenon can explain much of the hesitation that occurs on the part of constituents in moving from a paper based to a Web-based system for interacting with government. Citizens, employees and businesses can all have their biases with


respect to how transactions should be processed. However, government entities and public policy administrators cannot ignore the changes that occur as a result of the implementation of information and communication technology (ICT). In the early 1990s  identified the important role that ICT would have in shaping public policy, and cautioned both rich and poor governments about neglecting its significance. Education about the value of the new systems is one step toward reducing some of the existing resistance. It can also be particularly useful for a leader or manager, to buy into the new system at an early stage in the adoption process.

iii. Digital Divide

The digital divide refers to the separation that exists between individuals, communities, and businesses that have access to information technology and those that do not have such access. Social, economic, infrastructural and ethno-linguistic indicators provide explanations for the presence of the digital divide . Economic poverty is closely related to limited information technology resources. An individual living below poverty line does not afford a computer for himself to harness the benefits of e-government and other online services. As the digital divide narrows, broader adoption of e-government in the public domain becomes possible.

Economic poverty is not the only cause of digital divide. It can also be caused by the lack of awareness among the people. Even some of the economic stable people don‘t know about the scope of e-governance. Awareness can only help to bring users to that service delivery channel once. It cannot guarantee sustained use of the system unless the system is also designed in such a way as to deliver satisfactory outcome.

Procedures need to be simplified to deliver concrete benefits and clear guidelines provided to encourage their use by the actual end users and reduce users‘ dependence on middlemen/intermediaries.


iv. Cost

Cost is one of the most important prohibiting factor that comes in the path of e-governance implementation particularly in the developing countries like India where most of the people living below the poverty line. Elected officers and politician don‘t seem to be interested in implementing e-governance. Its return is not visible in the near future. In 2004, the United Kingdom and Singapore respectively spent 1 percent and 0.8 percent of their gross domestic product (GDP) on e-government. India is spending 3 percent of GDP.

v. Privacy and Security

There will be three basic levels of access exists for e-government stakeholders: no access to a Web service; limited access to a Web-service or full-access to a Web service, however when personal sensitive data exists the formation of the security access policy is a much more complex process with legal consideration. With the implementation of e-government projects, effective measures must be taken to protect sensitive personal information. A lack of clear security standards and protocols can limit the development of projects that contain sensitive information such as income, medical history.

No comments

Powered by Blogger.