E-Government - Tutorial - - PowerPoint PPT Presentation

About This Presentation
Title:

E-Government - Tutorial -

Description:

E-Government - Tutorial - Reengineering of the Government: Services and Solutions Authors: Jasmina Pilipovi , jasminap_at_beotel.yu Prof. Dr. Miodrag Ivkovi , misa_at_mnt ... – PowerPoint PPT presentation

Number of Views:273
Avg rating:3.0/5.0
Slides: 81
Provided by: jasm74
Category:

less

Transcript and Presenter's Notes

Title: E-Government - Tutorial -


1
E-Government- Tutorial -
  • Reengineering of the Government
  • Services and Solutions

Authors
Jasmina Pilipovic, jasminap_at_beotel.yu Prof. Dr.
Miodrag Ivkovic, misa_at_mnt.bg.ac.yu Prof. Dr.
Dragan Domazet Prof. Dr. Veljko Milutinovic,
vm_at_etf.bg.ac.yu
2
What Will You Learn From This Tutorial?
  • PART ONE
  • INTRODUCTION
  • What is E-government
  • TECHNICAL ASPECTS
  • The infrastructure of E-government
  • DIGITAL GOVERNMENT APPLICATIONS
  • Some examples that could be implemented

3
What Will You Learn From This Tutorial?
  • PART TWO
  • ENCRYPTION
  • DSA, RSA, Digital Signature
  • SECURITY TODAY
  • Digital Certificates, SSL

4
What Will You Learn From This Tutorial?
  • PART THREE
  • SOME EXAMPLES AND CASE STUDIES IN THE FIELD
  • Other Governments experiences, University research
  • STRATEGY PLANNING
  • Planning of E-government

5
Part One
6
Introduction to E-Government
  • Digital technologies are fundamentally
    transforming our economy and society,
  • and have potentials for transforming
  • the Government

7
Introduction
  • E-government - the transformation of internal and
    external
  • business processes toward customer-centricity
  • based upon service delivery opportunities
  • offered by new communication technologies.
  • It is connecting Citizens, Suppliers, Employees,
  • and other agencies securely using
  • The technologies of the Internet
  • The standards of the Internet
  • The public Internet
  • Private intranets

8
Introduction
  • Information and service delivery
  • Whenever
  • Whatever
  • Wherever

9
Introduction
  • E-government in the use of
  • Government itself (communication, services,
    information)
  • Employees (advertising, education, instructing)
  • Businesses (supplying, information, services)
  • Citizens (online services, digital democracy)

10
Introduction
  • Benefits
  • Efficiency
  • Comfort
  • Cost savings
  • Progress
  • Permanency
  • Reduced redundancy

11
Technical Aspects
12
Technical Aspects
  • Designing and developing E-government
  • brings us a set of both technical and legal
  • difficulties to overcome
  • The complexity of E-government architecture
  • will be presented with a model,
  • consisting of several segments
  • Sub-infrastructures
  • Legal and political constrains
  • Standards and protocols of networking
  • Applications

13
Technical Aspects
14
Technical Aspects
  • Network infrastructure
  • Multiple networks connected together
  • Various hardware technologies
  • Various underlying communication technologies
  • Information superhighway

15
Technical Aspects
  • Network publishing
  • Ability to present text, images, video, and
    audio contents
  • Various tools and languages for designing
  • Client/server architecture
  • Static and dynamic contents of WWW

16
Technical Aspects
  • Message and information delivery
  • Search engines and algorithms
  • Delivery of both unstructured and structured data
  • Unstructured delivery via faxes and e-mails
  • Automatic interchange of structured information
  • Error and control handling

17
Technical Aspects
  • Operating infrastructure
  • Privacy
  • Governments need to protect citizens privacy
  • Problem of involuntarily provided information
  • Security
  • Protection of data - stored and during
    transaction
  • Authentication
  • The identity of parties in a transaction is
    verified
  • Confidentiality
  • No eavesdrop on the transaction in progress

18
Technical Aspects
  • Monetary system

The most widely used way of purchasingover the
Internet is Credit Card Electronic Cash is
informational equivalent of physical bank notes
and coins Electronic Cash can offer such
benefits as anonymity of the buyer global
acceptance Credit Card will be dominant for
at least the next few years.
19
Technical Aspects
  • Digital government applications
  • Classes G2G, G2E, G2B, B2G, G2C, C2G
  • Online services for citizens and businesses
  • Intergovernmental and employees communication,
    managing digital documentation
  • Government intranet as basic communicational,
    informational, and organizational tool

20
Technical Aspects
  • Legislative and official politics
  • Introducing digital era
  • into conducting governmental and commercial
    tasks
  • is opening an important question
  • considering legal protection and obligations

21
Technical Aspects
  • Major risks
  • Exterior and inside attacks and misusage
  • Electronic espionage and sabotage
  • E-war
  • Endangering rights and freedoms of citizens
  • Corruption and organized crime
  • Economical and financial malversations
  • Intellectual property
  • Monopolization in managing government affairs

22
Technical Aspects
  • Technical standards and network protocols
  • TCP/IP as the network protocol
  • SMTP and IMAP for mail transport
  • LDAP for Directory services
  • HTTP for delivery of client transactions and
    information
  • Agencies participating in E-government
  • should continually monitor
  • the development and implementation
  • of emerging standards

23
Digital Government Applications
24
Digital Government Applications
  • Hundreds of applications that could be developed
  • to allow businesses, citizens, and other
    governments
  • to interact with the Government digitally.
  • There are at least four distinct aspects of
    digital government
  • Information gathering
  • Interactive service delivery
  • Online supplying
  • Digital democracy

25
Digital Government Applications
  • Information gathering
  • Citizens could have an insight on various types
    of information, such as
  • Government services, agencies, and employees
  • Event calendars, statistics, news
  • Flight and train schedules
  • Useful links

26
(No Transcript)
27
Digital Government Applications
  • Information dissemination problem
  • Need for standardized information tagging system
  • Expanding the amount of accessible information
  • Develop expert systems to access information
  • Make the Web the first place to put information,
    not the last

28
Digital Government Applications
  • Interactive service delivery
  • Issuing permits and licenses, as well as renewing
    them
  • Businesses and individuals could file tax returns
    directly, at no cost
  • Companies could file environmental compliance
    forms online
  • Individuals could apply for Social Security
    benefits online
  • Paying tickets, bills, memberships,...

29
(No Transcript)
30
Digital Government Applications
  • Problems
  • Expand and standardize the number of
    applications for online forms
  • Whenever possible use Web based technology
  • Online forms should use shared information about
    the submitter
  • Integrate forms
  • Focus on intergovernmental solutions

31
Digital Government Applications
  • Online supplying
  • Number of items citizens and business partners
    can purchase online
  • With E-commerce countries can move to the center
    of the virtual geography
  • Collaboration with distributors and suppliers on
    scheduling
  • Forecasting, and just-in-time replenishment of
    supplies

32
(No Transcript)
33
Digital Government Applications
  • Digital democracy
  • Communication between citizens and authorities
  • Access to reports, plans, and memorandums
  • Chat rooms
  • Communication between government employees

34
(No Transcript)
35
End of Part One
Authors
Jasmina Pilipovic, jasminap_at_beotel.yu Prof. Dr.
Miodrag Ivkovic, misa_at_mnt.bg.ac.yu Prof. Dr.
Dragan Domazet Prof. Dr. Veljko Milutinovic,
vm_at_etf.bg.ac.yu
36
Part Two
37
Encryption
38
Encryption
  • Encryption techniques

39
Encryption
  • Secret-key encryption
  • Shannon confusion and diffusion
  • Uniform encryption (module arithmetic)
  • One-time pad (random key generation)
  • DES (Data Encryption Standard)IBM National
    Bureau of Standards, 1977

40
(No Transcript)
41
(No Transcript)
42
(No Transcript)
43
Encryption
  • Public-key encryption
  • Substitution ciphering with two keys private and
    public

44
Encryption
  • RSA algorithm (Rivest, Shamir Adleman, 1977)
  • public key K P Q, P and Q are very long
    numbers
  • private key K (2 (P -1) (Q - 1) 1) / 3
  • encrypting Ci (Fi t) mod K
  • decrypting Fi (Ci K) mod K

45
Encryption
  • Example P 7151 Q 13259
  • K 7151 13259 94815109
  • K (2 7150 13258 1) / 3 63196467
  • Message MARY HAD A LITTLE LAMB
  • ASCII REPRESENTATION 77 65 82 89 32 72 65 68
    32
  • 65 32 76 73 84 84 76 69 32
  • 76 65 77 66 46 00
  • for t 3 C1 (776582 3) mod 94815109
    71611947
  • D1 (71611947 63196467) mod 94815109 776582
    (!!!)

46
Encryption
  • Digital signature
  • Origin authentication
  • Data-integrity authentication
  • Non-repudiation

47
Encryption
  • Digital signature
  • Authentication check

48
Security Today
49
Security Today
  • Digital Certificates
  • Strong binding between the public key and some
    attribute
  • Help someone receiving a message decide whether
    the message, the key and the sender's name are
    what they appear to be
  • An electronic file that uniquely identifies
    communication entities on the Internet
  • Issued and signed by the Certification authority

50
Security Today
  • De-facto standard for digital certification is
    ITU-T recommendation X.509
  • Certification Authority (CA) (issues
    certificates)
  • Subscribers (CA Clients)
  • Users (the public in general)

51
Security Today
  • Secure Sockets Layer (SSL)
  • A protocol designed to work at the socket layer,
    to protect any higher level protocol built on
    sockets, such as telnet, ftp, or HTTP

52
Security Today
  • SSL protocol is composed of two layers
  • The Record Layer
  • Connection security using data encryption with
    symmetric cryptography and message integrity
    check
  • For every SSL session we create a randomly
    generated temporary master key

53
Security Today
  • The Handshake Layer

CLIENT-HELLO (information on the cryptographic
systems it is willing or able to support)
SERVER-HELLO (connection id, its key
certificate, and information about the
cryptosystems it supports)
verifies the server's public key, and responds
with a CLIENT-MASTER-KEY message
CLIENT-FINISHED message
SERVER-VERIFY message
REQUEST-CERTIFICATE
CLIENT-CERTIFICATE
SERVER-FINISH
54
End of Part Two
55
Part Three
56
Experience In The Field
57
Experience In The Field
  • Early stage in the shift to government online
  • The use of Internet is increasing each year

58
Experience In The Field
  • E-government relays not only on Internet
    delivery, but telephone, digital TV, and kiosk
    delivery as well

59
Experience In The Field
  • New Zealand
  • Critical issues
  • Leadership
  • Strategy
  • Governance
  • Integration
  • Resourcing
  • Ensuring a focus on citizens
  • Avoiding the digital divide
  • Reskilling government
  • The need for communication.

60
Experience In The Field
  • September the 28th, 1999
  • By the year 2005
  • Electronically registering with central
    government
  • Transacting all dealings with IRD online
  • All government forms and all services available
    online
  • People to have their say in the policy-making
    process
  • Authorized accessing records of a persons health
    information
  • Electronically posting transactions and receiving
    documentation
  • Recording change of address

61
Experience In The Field
  • The United States
  • Week integration across federal services or
    between states and federal government
  • Lack of reliable authentication services no
    paper ID card
  • Digital divide is one of the major barriers

62
Experience In The Field
  • New York States major projects
  • Establishing a statewide IP network
  • Implementing a comprehensive plan
  • Restructuring the states data centers
  • Best Practices sessions
  • Statewide legislation
  • Cooperation with local governments
  • Reviewing all purchases of technology
  • Participating in projects.

63
Experience In The Field
  • Australia
  • Federal initiative was to deliver all
    Commonwealth services electronically via the
    Internet by 2001
  • In 1999, over 18 of all households had home
    Internet access (79 of that in major cities),
    and still made Australia one of the most wired
    countries in the world
  • One of the first e-government programs was
    Multimedia Victoria (MMV) in Victoria with
    initial strategy document in 1995

64
Experience In The Field
  • Australia
  • The government is also derived into channels
    business, land, health channel, etc.
  • Setting up an application costs betweenA100k
    and A200k
  • Service providers are charged 80 cents to 2 per
    transaction.

65
Experience In The Field
  • United Kingdom
  • In 1999, UK published its White
    PaperModernizing Government
  • Electronic Procurement (making 90 of low-value
    government procurement electronic by April
    2001)
  • Government Business Processes (equivalence to
    written and digital documents)
  • Service and Information Delivery (25 by 2001,
    50 by 2005, and 100 by 2008)

66
Experience In The Field
  • Use of the internet is not as high as in
    Scandinavia, the US, or Australia.
  • The tax system is very complicated
  • No single, integrated national database to be
    used to roll out ESD
  • Opening of e-libraries and placing computers in
    schools and neighborhoods
  • Number of statutes in the UK that prevent data
    gathered for one purpose to be used for another,
    and the access to the data is seriously limited

67
Experience In The Field
  • Ontario, Canada
  • In 1998, an Information Information Strategy
    was released
  • Too many IT systems with poor evidence of
    integration among agencies and weak links to the
    broader public sector

68
Experience In The Field
  • Used technology was incompatible and variety of
    networks made it difficult to implement systems
    across government
  • Seven IT clusters were introduced
    Resource/land Economics/business Human
    Services Justices Community Services
    Transportation Finance.

69
Strategy Planning
70
Strategy Planning
  • Elements of a business case
  • The following diagram illustrates some
    recommended steps in the development of a
    business case for government e-commerce
    initiatives

71
Strategy Planning
  • A list of topics that pertains to public
    e-commerce projects

72
Strategy Planning
  • Planning of E-government is characterized with
    complexity and deep impact on society
  • Issue Driven Planning (IDS)

73
Strategy Planning
  • Planning issues important for successful
    development
  • Motivation
  • Budget
  • Result measuring
  • Development competency
  • Contract and project managing
  • Best practice
  • Relationship managing
  • Technology

74
Strategy Planning
  • Planning steps
  • Executive appointment
  • E-government vision
  • Global plan definition
  • Stage I - Strategy (what should be done)
  • Stage II - Competency (what could be done)
  • Stage III - Implementation (what will be done)

75
Strategy Planning
  • Strategy planning should start with a meeting

Classification (G2C, G2B, G2E, G2G) Project
priority outcome Project interoperability Timing
schedules Alternative resources selection
76
Strategy Planning
  • Competency planning - Users and Government
  • Users competency
  • Need for eye-to-eye contact
  • Cultural and language restrictions
  • Handicaps
  • Economical status
  • Geographical limitations
  • Need for education

77
Strategy Planning
  • E-government competency
  • Leader competency
  • Regulatory restrictions
  • Handling with digital records
  • Privacy and Security
  • Central Authority (CIO - Chief Information
    Officer)
  • strategic support
  • technical support

78
Strategy Planning
  • Implementation planning

Effects
Approach
Time
Economical Analysis Budget Evaluation Timing and
Resources Schedules Marketing Plan
Integration
Projects
Priorities
Profits
79
End of Part Three
80
The End
Authors
Jasmina Pilipovic, jasminap_at_beotel.yu Prof. Dr.
Miodrag Ivkovic, misa_at_mnt.bg.ac.yu Prof. Dr.
Dragan Domazet Prof. Dr. Veljko Milutinovic,
vm_at_etf.bg.ac.yu
Write a Comment
User Comments (0)
About PowerShow.com