Cordella, Antonio; Paletti, Andrea
2018 Information Polity
doi: 10.3233/IP-170061
This paper contributes to the e-government literature discussing the role of information and communication technologies (ICTs) as an enabler of different modes of production of public services. E-government developments are often associated with organizational transformations aimed to increase the efficiency and the effectiveness of the internal production of public services or to facilitate the exchange of information and the coordination among different public organizations. However, ICTs can also enable the co-production of public services allowing citizens or non-public organizations, such as NGOs, social enterprises or private companies to co-produce public services with public sector organizations. ICTs can generate new relationships and dynamics that involve actors and resources outside public organizations, modifying the ways by which the value embedded in the services is produced. This paper critically describes and compares four different ICT mediated modes of production in the light of the two different logics of value creation. For each mode of public service production we identify the associated benefits, risks and possible solutions that can be deployed to mitigate the risks.
Pereira, Gabriela Viale; Parycek, Peter; Falco, Enzo; Kleinhans, Reinout
2018 Information Polity
doi: 10.3233/IP-170067
This literature review has focused on smart governance as an emerging domain of study that attracts significant scientific and policy attention. More specifically, this paper aims to provide more insight in the definitions of and relationships between smart governance and concepts such as smart and electronic government, in the context of smart cities. The literature review shows that smart government can be considered as a basis for developing smart governance, through the application of emergent information and communication technologies (ICT) for governing. Smart governance as the intelligent use of ICT to improve decision-making through better collaboration among different stakeholders, including government and citizens, can be strongly related to government approaches. In this case ICT-based tools, such as social media, and openness can be factors that increase citizen engagement and support the development of new governance models for smart government. Smart governance may also have an important role in smart city initiatives, which require complex interactions between governments, citizens and other stakeholders. Based on the literature review, this paper coins a definition of ‘smart city governance’ and contributes to developing a framework for building new, smart governance models addressing the challenges of the digital society, collaborative governance, information sharing, citizen engagement, transparency and openness.
2018 Information Polity
doi: 10.3233/IP-170060
This study analyzes the policy changes that take place even when though internal institutions and external environments are stable. It tracks the answer to a couple of questions: Does the content of economic policy direction change every year in a more stable macroeconomic environment? If it changes, how can this be explained by theory? To investigate these changes, Korean annual economic policy direction reports released from the Ministry of the Interior were collected. Through text mining analysis, the words in the reports from over 24 years (from 1993 to 2016) were examined. The analytical results show that policy elites constantly compete to influence the policy by keeping themselves in the past to acquire and maintain legitimate authority while responding to the government’s needs for creative innovation and change.
Chatfield, Akemi Takeoka; Reddick, Christopher G.
2018 Information Polity
doi: 10.3233/IP-170058
The U.S. federal government and its agencies face increasingly sophisticated and persistent cyberattacks from black hat hackers who breach cybersecurity for malicious purposes or for personal gain. With the rise of malicious attacks that caused untold financial damage and substantial reputational damage, private-sector high-tech firms such as Google, Microsoft and Yahoo adopted an innovative practice known as vulnerability reward program (VRP) or bug bounty program which crowdsources software bug detection from the cybersecurity community. In an alignment with the 2016 U.S. Cybersecurity National Action Plan, the Department of Defense adopted a pilot VRP in 2016. We use the Pentagon’s VRP case to examine how it fits with the national cybersecurity policy. Our case study results show the feasibility of the government adoption and implementation of the innovative concept of VRP to enhance the government cybersecurity posture as well as the need to develop sophisticated cybersecurity policy and enhanced cybersecurity capability.
Joo, Moon-Ho; Yoon, Sang-Pil; Kwon, Hun-Yeong; Lim, Jong-In
2018 Information Polity
doi: 10.3233/IP-170057
In the age of big data, many countries are implementing and establishing de-identification policies quite actively. There are many efforts to institutionalize de-identification of personal information to protect privacy and utilize the use of personal information. But even with such efforts, de-identification policy always has a potential risk that de-identified information can be re-identified by being combined with other information. Therefore, it is necessary to consider the management mechanism that manages these risks as well as a mechanism for distributing the responsibilities and liabilities in the event of incidents involving the invasion of privacy. So far, most countries implementing the de-identification policies are focusing on defining what de-identification is and the exemption requirements to allow free use of de-identified personal information. On the other hand, there is a lack of discussion and consideration on how to distribute the responsibility of the risks and liabilities involved in the process of de-identification of personal information.The purpose of this study is to compare the de-identification policies of the European Union, the United States, Japan, and Korea, all of which are now actively pursuing de-identification policies. Additionally, this study proposes to take a look at the various de-identification policies worldwide and contemplate on these policies in the perspective of risk society and risk-liability theory. The constituencies of the de-identification policies are identified in order to analyze the roles and responsibilities of each of these constituencies thereby providing the theoretical basis on which to initiate the discussions on the distribution of burden and responsibilities arising from the de-identification policies.
Clara, Angela Maria Cristina; Canedo, Edna Dias; de Sousa Júnior, Rafael Timóteo
2018 Information Polity
doi: 10.3233/IP-170059
Information and Communications Technologies (ICT) comprise a large integrated set of structures and functions employed to access, transfer, store and treat all forms of information. These technologies continue to be an important factor for improving organizational management and achieving competitive advantage, since they can be used to add value, continuously, to almost all business processes. Based on a survey of the literature, international and national regulations, and best practices bodies, this paper presents and discusses common elements that are considered important to guide regulatory compliance verifications of ICT management practices. Designated hereinafter as Elements that Orient Regulatory Compliance Verification Audits (ECVAs), these elements are characterized and their selection is validated in a case study for improving ICT Governance in a Brazilian Public Agency.
Showing 1 to 10 of 10 Articles