Egovernment - PowerPoint PPT Presentation

1 / 97
About This Presentation
Title:

Egovernment

Description:

E-government. Frank Robben. General manager Crossroads ... not monolithic. EU. in every country. federal level. regions. communities. provinces. municipalities ... – PowerPoint PPT presentation

Number of Views:115
Avg rating:3.0/5.0
Slides: 98
Provided by: FrankR59
Category:

less

Transcript and Presenter's Notes

Title: Egovernment


1
E-government
Frank Robben General manager Crossroads Bank for
Social Security Strategic advisor Federal Public
Service for ICT Sint-Pieterssteenweg 375 B-1040
Brussels E-mail Frank.Robben_at_ksz.fgov.be Website
http//www.law.kuleuven.ac.be/icri/frobben
Crossroads Bank for Social Security Federal
Public Service for ICT (FEDICT)
2
What is E-government ?
  • E-government is a continuous optimization of
    service delivery and governance by transforming
    internal and external relationships through
    technology, internet and new media
  • external relationships
  • government lt-gt citizen
  • government lt-gt business
  • internal relationships
  • government lt-gt government
  • government lt-gt employees
  • all relationships
  • are bidirectional
  • can be within a country or border-crossing

3
Government
  • not monolithic
  • EU
  • in every country
  • federal level
  • regions
  • communities
  • provinces
  • municipalities
  • parapublic institutions
  • private instutions participating in delivery of
    public services
  • integrated E-government is based upon common
    strategy, multilateral agreements and
    interoperability
  • E-government contains the opportunity to realize
    one virtual electronic government with full
    respect for every specific competence

4
Advantages
  • efficiency gains
  • in terms of costs same services at lower total
    costs, e.g.
  • unique information collection using co-ordinated
    notions and administrative instructions
  • less re-encoding of information by electronic
    information exchange
  • less contacts
  • functional task sharing concerning information
    management, information validation and
    application development (distributed information
    systems)
  • in terms of quantity more services at same total
    cost, e.g.
  • all services are available at any time, from
    anywhere and from any device
  • integrated service delivery
  • in terms of speed same services at same total
    cost in less time
  • reduction of waiting and travel time
  • direct interaction with competent governmental
    institution
  • real time feedback for the user

5
Advantages
  • effectiveness gains
  • in terms of quality same services at same total
    cost in same time, but to a higher quality
    standard, e.g.
  • more corrected service delivery
  • personalized and participative service delivery
  • more transparant and comprehensive service
    delivery
  • more secure service delivery
  • possibility of quality control on service
    delivery process by customer
  • in terms of type of services new types of
    services, e.g.
  • push system automatic granting of or information
    about services
  • active search of non-take-up using
    datawarehousing techniques
  • controlled management of own personal information
  • personalized simulation environments

6
E-government a structural reform process
  • ICT is only a means by which a result may be
    obtained
  • E-government requires
  • considering information as a strategic resource
    for all government activity
  • change of basic mindset from government centric
    to customer centric
  • re-engineering of processes within each
    government institution, each government level and
    across government levels
  • clear definition of mission and core tasks of
    every governmental institution

7
E-government a structural reform process
  • E-government requires
  • co-operation between governmental institutions
    one virtual electronic government, with respect
    for mission and core tasks of each governmental
    institution and government level
  • co-operation between government and private
    sector
  • interoperability framework ICT, unique
    identification keys, harmonized concepts
  • common security framework
  • adequate legal environment elaborated at the
    correct level
  • implementation with a decentralized approach, but
    with co-ordinated planning and program management
    (think global, act local)
  • adequate measures to prevent a digital divide

8
Information as resource implications
  • information modelling
  • information is being modelled in such a way that
    the model fits in as close as possible with the
    real world
  • definition of information elements
  • definition of attributes of information elements
  • definition of relations between information
    elements
  • information modelling takes into account as much
    as possible the expectable use cases of the
    information
  • the information model can be flexibly extended or
    adapted when the real world or the use cases of
    the information change

9
Information as resource implications
  • unique collection and re-use of information
  • information is only collected for well-defined
    purposes and in a proportional way to these
    purposes
  • all information is collected once, as close to
    the authentic source as possible
  • information is collected via a supplier-chosen
    channel, but preferably in an electronic way,
    using uniform basic services (single sign on,
    arrival receipt of a file, notification for each
    message, )
  • information is collected according to the
    information model and on the base of uniform
    administrative instructions

10
Information as resource implications
  • unique collection and re-use of information
  • with the possibility of quality control by the
    supplier before the transmission of the
    information
  • the collected information is validated once
    according to an established task sharing, by the
    most entitled institution or by the institution
    which has the greatest interest in a correct
    validation
  • and then shared and re-used by authorized users

11
Information as resource implications
  • management of information
  • information in all forms (e.g. voice, print,
    electronic or image) is managed efficiently
    through its life cycle
  • a functional task sharing is established
    indicating which institution stores which
    information in an authentic way, manages the
    information and keeps it at the disposal of the
    authorized users
  • information is stored according to the
    information model
  • information can be flexibly assembled according
    to ever changing legal notions
  • all information is subject to the application of
    agreed measures to ensure integrity and
    consistency

12
Information as resource implications
  • management of information
  • every institution has to report probable
    improprieties of information to the institution
    that is designated to validate the information
  • every institution that has to validate
    information according to the agreed task sharing,
    has to examine the reported probable
    improprieties, to correct them when necessary and
    to communicate the correct information to every
    known interested institution
  • information will be retained and managed as long
    as there exists a business need, a legislative or
    policy requirement, or, preferably anonimized or
    encoded, when it has historical or archival
    importance

13
Information as resource implications
  • electronic exchange of information
  • once collected and validated, information is
    stored, managed and exchanged electronically to
    avoid transcribing and re-entering it manually
  • electronic information exchange can be initiated
    by
  • the institution that disposes of information
  • the institution that needs information
  • the institution that manages the interoperability
    framework
  • electronic information exchanges take place on
    the base of a functional and technical
    interoperabilty framework that evolves
    permanently but gradually according to open
    market standards, and is independent from the
    methods of information exchange

14
Information as resource implications
  • electronic exchange of information
  • available information is used for the automatic
    granting of benefits, for prefilling when
    collecting information and for information
    delivery to the concerned persons

15
Information as resource implications
  • protection of information
  • security, integrity and confidentiality of
    government information will be ensured by
    integrating ICT measures with structural,
    organizational, physical, personnel screening and
    other security measures according to agreed
    policies
  • personal information is only used for purposes
    compatible with the purposes of the collection of
    the information
  • personal information is only accessible to
    authorized institutions and users according to
    business needs, legislative or policy requirement
  • the access authorisation to personal information
    is granted by an independent institution, after
    having checked whether the access conditions are
    met
  • the access authorizations are public

16
Information as resource implications
  • protection of information
  • every concrete electronic exchange of personal
    information is preventively checked on compliance
    with the existing access authorisations by an
    independent institution managing the
    interoperability framework
  • every concrete electronic exchange of personal
    information is logged, to be able to trace
    possible abuse afterwards
  • every time information is used to take a
    decision, the used information is communicated to
    the concerned person together with the decision
  • every person has right to access and correct his
    own personal data

17
Customer centric
  • unique declaration of every event during the life
    cycle/business episode of a customer and
    automatic granting of all related services, e.g.

18
Customer centric
  • delivery of services that cannot be granted
    automatically to a customer
  • in an integrated way
  • information
  • interaction
  • transaction
  • re-using all available information
  • harmonized concepts
  • back-office integration
  • prefilled information

19
Customer centric
  • delivery of services that cannot be granted
    automatically to a customer (ctd)
  • in a personalized way
  • look feel and interface
  • content
  • only relevant information and transactions
  • personalized support
  • contextual help
  • own language
  • adapted vocabulary
  • on-line simulations
  • or at least based on the way of thinking of the
    customer group
  • life events (birth, marriage, etc.) or business
    episodes (starting a company, recruiting
    personnel, etc.)
  • life styles (sport, culture, etc.)
  • life status (unemployed, retired, etc.) or
    business sectors
  • specific target groups

20
Customer centric
  • declaration of events and service delivery via an
    access method chosen by the customer
  • application to application
  • various end-user devices
  • PC, GSM, PDA, digital TV, kiosks,
  • file transfer
  • use of intermediaries
  • use of integrated customer relation management
    tools
  • service delivery in principle free of charge

21
Co-operation between government levels
  • in Belgium, a co-operation agreement has been
    signed between federal government, regions and
    communities
  • coordinated offer of e-services to
    citizens/companies
  • guarantee that a citizen/company can use the same
    tools
  • terminal
  • software
  • electronic signature
  • guarantee of a unique data collection from the
    citizen/company
  • with respect for the partition of competences
    between government levels

22
Co-operation agreement between government levels
  • co-ordinated, customer oriented service delivery
  • agreements have to be made on common standards
  • mutual tuning of portals, middleware, websites
    and back offices
  • use of common identification keys and electronic
    signature
  • mutual tuning of business processes when
    necessary
  • gradual mutual task-sharing on data storage in
    authentic form
  • common policy on SLAs and security

23
Co-operation government and private sector
  • private companies as service providers (sharing
    of investments), e.g.
  • network and security management
  • co-sourcing in BPR and development/maintenance/hou
    sing of ICT building blocks, e.g.
  • certification authorities
  • portals
  • private companies as partners
  • integrated work flow with their own information
    systems, e.g.
  • e-procurement
  • tax declaration
  • social security declarations

24
Interoperability framework
  • goal to guarantee the ability of government
    organizations and customers to share information
    and integrate information and business processes
    by use of
  • interoperable ICT
  • common identification keys/sets for every entity
  • harmonized concepts and data modelling

25
Common identification keys
  • at least common identification keys and
    identification sets for every entity
  • person
  • company
  • patch of ground
  • between nations
  • unique schemes
  • conversion tables
  • regulation of interconnection of information
    based on unique identification keys

26
Common identification keys
  • characterictics
  • unicity
  • one entity one identification key
  • same identification key is not assigned to
    several entities
  • exhaustivity
  • every entity to be identified has an
    identification key
  • stability through time
  • identification key doesnt contain variable
    characterics of the identified entity
  • identification key doesnt contain references to
    the identification key or characteristics of
    other entities
  • identification key doesnt change when a quality
    or characteristic of the identified entity changes

27
Harmonized concepts and data model
  • standard elements
  • with well defined characteristics
  • used within all services
  • OO-oriented, e.g. inheritance in a multilingual
    environment
  • version management in an ever changing
    environment
  • define once, use many (different presentations)
  • workflow for validation of standard elements and
    characteristics
  • multi criteria search
  • by element
  • by scheme
  • by version

28
Common security framework
  • issues
  • confidentiality
  • integrity
  • availability
  • authentication
  • autorisation
  • non-repudiation
  • audit

29
Common security framework
  • specific points of interest
  • risk awareness based on risk analysis
  • security policies
  • structural and organisational aspects
  • encryption standards
  • interoperability of
  • PKI
  • electronic certificates
  • procedures (registration authority, certification
    authority)
  • difference between identification certificates
    and attribute certificates
  • attributes, optional fields
  • revocation lists
  • directories
  • application security

30
Changes of the legal environment
  • organization of integrated data management and
    electronic service delivery legal base for Royal
    Decree exists
  • functional task sharing on information management
  • obligation to respect unique data collection from
    the customer
  • obligation to exchange information in an
    electronic way
  • permission or obligation to use unique
    identification keys
  • harmonization of basic concepts

31
Changes of legal environment
  • ICT-law
  • data protection
  • public access to information
  • electronic signature
  • probative value
  • no overregulation
  • only basic principles
  • technology-neutral, but not technology unaware

32
Some interesting Belgian projects
  • social security sector
  • network of service integrators
  • integration of portal sites
  • electronic identity card

33
Belgian social security sector
  • principles have been implemented under
    co-ordination of the Crossroads Bank for Social
    Security, in co-operation with 2.000 public and
    private social security institutions
  • functional and technical interoperability
    framework is functioning
  • between these institutions
  • between these institutions and all employers
  • every socially insured person has a unique
    identification key throughout the whole social
    security sector and an electronically readable
    social identity card containing this
    identification key

34
Interoperability within social security
onss
spf ss
onssapl
inasti
FEDICT National Register
cpsm
spf e t
onafts
Crossroads Bank for Social Security
onem
adp
inami
fat
sickness funds network
cimire
fmp
onp
onva
ossom
35
Reference directory
  • serves as a base for organization of information
    flows
  • structure
  • directory of persons what persons in what
    capacities have personal files in what social
    security institutions for what periods
  • data availability table what data are available
    in what social security institutions for what
    types of files
  • access authorization table what data may be
    transmitted to what institutions for what types
    of files
  • functions
  • routing of information
  • preventive access control
  • automatic communication of changes to information

36
Information security
  • institutional measures
  • organizational and technical measures based on
    ISO 17799
  • legal measures

37
Institutional measures
  • no central data storage
  • independent Control Committee
  • preventive control on legitimacy of data exchange
    by Crossroads Bank according to authorizations of
    the independent Control Committee
  • information security department in each social
    security institution
  • specialized information security service
    providers
  • working party on information security

38
Independent Control Committee
  • assigned by Parliament
  • competences
  • supervision of information security
  • authorizing the data exchange
  • complaint handling
  • information security recommendations
  • extensive investigating powers
  • annual activity report

39
Information security department
  • in each social security institution
  • composition
  • information security officer
  • one or more assistants
  • control on independence and permanent education
    of the information security officers is performed
    by the Control Committee
  • the Control Committee can allow to commit the
    task of the information security department to a
    recognized specialized information security
    service provider

40
Information security department tasks
  • information security department
  • recommends
  • promotes
  • documents
  • controls
  • reports directly to the general management
  • formulates the blueprint of the security plan
  • elaborates the annual security report
  • general management
  • takes the decision
  • is finally responsible
  • gives motivated feedback
  • approves the security plan
  • supplies the resources

41
Contents of the security report
  • general overview of the security situation
  • overview of the activities
  • recommendations and their effects
  • control
  • campaigns in order to promote information
    security
  • overview of the external recommendations and
    their effects
  • overview of the received trainings

42
Specialized information security service providers
  • to be recognized by the Government
  • recognition conditions
  • non-profit association
  • having information security in social security as
    the one and only activity
  • respecting the tariff principles determined by
    the Government
  • control on independence is performed by the
    Control Committee

43
Specialized information security service providers
  • tasks
  • keeping information security specialists at the
    disposal of the associated institutions
  • recommending
  • organizing information security trainings
  • supporting campaigns promoting information
    security
  • external auditing on request of the institution
    or the Control Committee
  • each institution can only associate with one
    specialised information security service provider

44
Working party on information security
  • composition
  • information security officers of all institutions
  • task
  • coordination
  • communication
  • proposal of minimal security conditions
  • check list
  • recommendations to the Control Committee

45
Organizational technical measures
  • security policies
  • classification of information
  • security requirements towards the personnel
  • physical protection
  • management of communication and service processes
  • processing of personal data
  • logical access control
  • development and maintenance of systems
  • continuity management
  • internal and external control
  • communication to the public of the policy
    concerning security and the protection of privacy

46
Legal measures
  • obligations of the controller
  • principles relating to data quality
  • criteria for making data processing legitimate
  • specific rules for processing of sensitive data
  • information to be given to the data subject
  • confidentiality and security of processing
  • notification of the processing of personal data
  • rights of the data subject
  • right of information
  • right of access
  • right of rectification, erasure or blocking
  • right of a judicial remedy
  • penalties

47
Information servers
  • information servers
  • directory of persons of the Crossroads Bank
  • National Register
  • Crossroads Bank Registers
  • work force register
  • wages and working time database (LATG) of the
    ONSS
  • employers directory (WGR) of the ONSS
  • database of contribution certificates
  • SIS-card and professional card registers
  • services offered
  • interactive consultation
  • batch consultation
  • automatic communication of updates

48
National Register - CBSS Registers - past
situation
National Register
Municipalities
49
National Register - CBSS Registers present
situation
National Register
Municipalities
50
Preprocessed messages
  • preprocessed messages
  • beginning/end of labour contract, beginning/end
    of self-employed activity
  • contribution certificates medical care
    (employees, self-employed, beneficiaries of
    social security allowances)
  • unemployment benefits career break
  • allowances for incapacity for work (health care,
    accidents at work, occupational disease)
  • young unemployed
  • allowances to the handicapped
  • guaranteed income social support
  • people suffering from long-term illness
  • social exemption
  • fiscal exemption
  • derived rights (e.g. tax reduction/exemption,
    free public transport, ...)
  • special contribution for social security
  • solidarity contribution on old age pensions
  • migrant workers

51
Preprocessed messages
  • services offered
  • batch consultation
  • automatic communication of messages

52
Contribution certificate health care sector
past situation
Employees
Employer
Sickness funds
Control
INAMI
ONSS
53
Contribution certificate health care sector -
present situation
54
Derived rights in tax affairs
  • a number of people are entitled to an increased
    refund of the costs for medical care
  • moreover, a number of municipalities and
    provinces grant these persons reductions or even
    exemptions of the taxes

55
Derived rights in tax affairs - past situation
Sickness fund
56
Derived rights in tax affairs - present situation
CBSS
sickness funds network
57
Some figures
  • 339.137.455 exchanged messages in 2003
  • 15,1 million different persons known in directory
    of persons
  • on an average, every person is known in 6,6
    sectors
  • response time on-line messages

question
question
answer
answer
96,1 in lt 1 sec 99,8 in lt 2 sec
99,2 in lt 4 sec
58
Social security card
  • functions
  • reliable, electronically readable identification
    card in the hands of each social insured person,
    that contains the unique social security
    identification number
  • electronic support owned by every social insured
    person, containing information on his social
    security status needed by bodies not connected to
    the social security network
  • first application proof of health care
    insurability status to health care professionals
    applying the third payer rule
  • protected memory chip card having a capacity of 8
    kbits, respecting ISO 7816.1-7816.5
  • delivered to every insured person (10.000.000
    cards)

59
Social security card
name Christian name date of birth sex social
security number period of validity of the
card card number
sickness fund sickness fund registration
number insurance period insurance status social
exemption status
key 1
other data to be added in the future, if useful
60
Social security card - example 1
Social identity card
in chemistries and hospitals
Sickness fund 1
Sickness fund 2
Sickness fund 3
61
Social security card - example 2
EMPLOYER
ONSS
CBSS
62
Interoperability outside social security
Internet
Publilink
R
R
Access servers
R
FedMAN
FW
R
R
Internet services
FW
Other extranets
R
Backbone
FW
FW
FW
FW
FW
FW
R
R
R
R
R
R
R
Crossroads bank for social security
R
R
R
63
Social security portal
64
Integrated service delivery
  • common basic services (e.g. single sign on,
    notification
  • information
  • several categories of transactions
  • transactions at the beginning or the end of
    employment (DIMONA)
  • quarterly declaration of wages and working time
  • transactions when a social risk occurs
  • transactions in order to manage information about
    yourself
  • transactions in order to control the quality of
    the service delivery process
  • ...

65
Integrated service delivery (ctd)
  • harmonized concepts
  • harmonized data model and XML-schemes
  • self-service and personalization
  • customer relation management
  • contact center

66
Transactions at beginning/end of employment
Simplification
Employment contract
Work force register
Special work force register
Indivudual document
Students contract
On line consultation
ONSS
Inspection
Work force register
Data- base
67
Immediate declaration of employment
  • can only be done electronically via
  • social security portal
  • FTP/MQSeries
  • interbanking network
  • vocal server
  • 24/7
  • offers the employer a key to on-line consultation
    and correction
  • of the database on employment
  • by using a electronic certificate, of the
    database concerning wages and working time and
    other derived databases
  • concerning his employees and the period of
    employment

68
Quarterly declaration wages working time
Simplification
Employer
one electronic declaration
ONSS
old age pension
CBSS
holiday pay
69
Quarterly declaration wages working time
  • can only be done electronically via
  • social security portal
  • FTP/MQSeries
  • interbanking network
  • 24/7
  • can, by using an electronic certificate
  • be consulted and corrected on-line by the
    employer
  • concerning his employees and the period of
    employment

70
Electronical declaration of social risks
  • past situation multiple collection of
    information by using various, complex, not
    co-ordinated paper forms

71
Electronical declaration of social risks
  • actual situation
  • limitation of the collected information to the
    information not yet available at other public
    services (abolition or at least significant
    simplification of forms)
  • unique collection of information from the
    employer
  • in a standardized way across all social security
    institutions
  • can be done on paper or electronically (24/7) via
  • social security portal
  • FTP/MQSeries
  • interbanking network
  • uniform instructions

72
Operational transactions
  • quarterly multifunctional declaration of wages
    and working times to the National Office for
    Social Security (NOSS)
  • correction of the quarterly declaration to the
    NOSS
  • DIMONA-declaration
  • consultation of the work force register
  • consultation of the directory of employers
  • integrated electronical declaration of building
    yards
  • consultation of overdue payments of social
    security contributions by an employer
  • declaration of temporary employment of foreign
    employees in Belgium
  • declaration of temporary unemployment
  • consultation of the holiday database
  • declaration of an industrial accident, monthly
    report and resumption of work after an industrial
    accident

73
Operational transactions
  • declaration of the beginning of a part-time job
    with retention of rights to unemployment benefits
    (unemployment sector)
  • private sector
  • education, municipalities or provinces
  • monthly declaration of part-time work for the
    calculation of guaranteed income payments
    (unemployment sector)
  • private sector
  • education, municipalities or provinces
  • monthly submission of work as an employee
    employed in a protected workplace (unemployment
    sector)
  • monthly submission of work in the framework of an
    activation programme (unemployment sector)
  • declaration for the establishment of young
    peoples vacation rights (unemployment sector)
  • monthly declaration of young peoples vacation
    hours (unemployment sector)
  • annual submission of temporary unemployment
  • monthly submission of hours of temporary
    unemployment
  • authorized request for the temporary removal of a
    pregnant employee (sector of professional
    diseases)

74
Further evolution
  • beginning 2005
  • application for unemployment benefits
  • declaration of fulltime or half-time early
    retirement
  • declaration of the removal of a pregnant employee
  • at a date still to be fixed
  • electronic data exchange between sickness funds
    and employers necessary to deal with an
    application for benefits in case of incapacity
    for work, maternity leave, complete or partial
    leave from work as a measure to protect
    motherhood, leave for fatherhood
  • declaration of resumption of work after a period
    of incapacity for work
  • declaration of an employees holiday days
  • declaration of extension post-natal leave

75
Towards a network of service integrators
Service integrator
R/CPS
R/CPS
Services repository
Extranet region or community
Service integrator (CBSS)
Services repository
SSI
Extranet social security
SSI
Internet
Municipality
FPS
SSI
Publilink ?
FPS
FEDMAN
Services repository
Service integrator (FEDICT)
Province
City
FPS
Services repository
76
Towards a network of service integrators
  • type of exchanged information
  • structured data
  • documents
  • images
  • multimedia
  • metadata
  • business processes
  • using web services

77
Towards a network of service integrators
  • useful functions of service integrators (FEDICT,
    CBSS, )
  • secure messaging
  • business logic and work flow support
  • directory of authorized users and applications
  • list of users and applications
  • definition of authentication means and rules
  • definition of authorization profiles
  • which service is accessible to which type of
    user/application for which persons/companies in
    which capacities in which situation and for which
    periods
  • directory of data subjects
  • which persons/companies in which capacities have
    personal files in which institutions for which
    periods
  • subscription table
  • which users/applications want to receive
    automatically which services in which situations
    for which persons in which capacities

78
Towards a network of service integrators
  • key issues
  • evolution of standards
  • collaboration with vendors
  • not limited to public agencies
  • national, European international standards
  • every partner is free to implement internally in
    his own way black box philosophy

79
Portal sites actual situation
intermediaries
employees
suppliers
  • customers
  • citizens
  • companies

partners
  • PORTAL B
  • single sign on
  • personalization
  • user groups
  • multi-channel
  • aggregation
  • PORTAL A
  • single sign on
  • personalization
  • user groups
  • multi-channel
  • aggregation

content management
business intelligence
business intelligence
content management
  • back-end
  • systems, e.g.
  • ERP
  • groupware
  • DBs
  • applications

directory
  • back-end
  • systems, e.g.
  • ERP
  • groupware
  • DBs
  • applications

directory
80
Portal sites
  • need to strike the right balance between roles in
    delivering e-government services not a single,
    but many one-stop shops (public and private)

Content and Services
Public
Private
Private
Channel
PPP
Public
Source Andrea Di Maio - Gartner
81
Portal sites
  • public institutions need to concentrate on core
    activities, such as
  • information
  • modular
  • up to date
  • information blocks concerning public services
  • with standardized metadata
  • based on standardized thesauri
  • in generally accessible content management
    systems
  • with separation between content and metadata
    (reuse, dont rewrite)
  • that can be submitted to automatical
    re-indexation
  • transactions
  • applications that can be easily integrated in
    private or public portal sites

82
Portal sites
  • public portals should have added value
  • integration of services
  • information
  • work flow based on life events of the customers
  • integration with work flow of customers
  • coordinated basic services for own customers
  • single sign on
  • ticketing
  • logging
  • notification service

83
Portal sites to be situation
intermediaries
employees
suppliers
  • customers
  • citizens
  • companies

partners
  • PORTAL B
  • single sign on
  • personalization
  • user groups
  • multi-channel
  • aggregation
  • PORTAL A
  • single sign on
  • personalization
  • user groups
  • multi-channel
  • aggregation
  • back-end
  • systems, e.g.
  • ERP
  • groupware
  • DBs
  • applications
  • back-end
  • systems, e.g.
  • ERP
  • groupware
  • DBs
  • applications

directory
directory
content management
business intelligence
business intelligence
content management
84
Portal sites
  • other key issues
  • multidimensionality accessibility of same
    services through different  views 
  • multi channel enabling
  • citizen/company relation management
  • integrated service delivery, across all used
    channels
  • personalization of service delivery
  • first step personalized home page for every
    company on social security portal
  • evolution to push system
  • quality control
  • feedback mechanisms for permanent improvement of
    service delivery
  • contact center

85
Electronic identity card
  • retained functions
  • visual and electronic identification of the
    holder
  • electronic authentication of the holder via the
    technique of the digital signature
  • generation of electronic signature via the
    technique of the digital signature (non
    repudiation)
  • proof of characteristics of the holder via the
    technique of the digital signature on the
    initiative of the holder
  • only identification data storage
  • no electronic purse
  • no biometry

86
Electronic identity card content
  • visual
  • identification data name, first names, sex, date
    and place of birth
  • National Register number
  • photograph
  • card number
  • validity period
  • electronic
  • serial number (sn)
  • National Register number (nrn)
  • card number (cn)
  • visual identification data sn nrn cn
    (signed by National Register sig1)
  • address sig1 (signed by National Register
    sig2)
  • photograph sig1 (signed by National Register
    sig3)

87
Organization model
  • government chooses card producer and
    certification authority issuing the identity
    certificates as a result of a public call for
    tenders
  • the municipality calls the holder for the issuing
    of the electronic identity card
  • the municipality acts as registration authority
    for 2 certificates authentication and electronic
    signature
  • 2 key pairs are generated within the card at
    production time and the private keys are stored
    within the chip of the card

88
Organization model
  • the 2 certificates are created by the
    certification authority, but published only when
    the holder agrees
  • the use of the private keys within the chip needs
    an activation of the card by a municipal official
    using his PUK2 and the PUK1 sent to the holder
  • first authentication within one session (first
    private key) and every generation of an
    electronic signature (second private key)
    requires the PIN code of the holder
  • the second private keys and the identity
    certificate on the electronic identity card can
    be used to generate an electronic signature
    within the scope of E-government applications
    which require such a signature

89
Organization model
  • the electronic identity card contains the
    necessary space to store other private keys
    associated to attribute certificates that holder
    can obtain at the certification authority of his
    choice

90
Organization model
1
1
91
No storage of electronic data on the card
  • why not ?
  • preventing perception of the card as a big
    brother
  • preventing loss of data, when the card is lost
  • preventing frequent updates of the card
  • stimulation of the controlled access to data over
    networks, using the card as an access tool,
    rather than storage of data on the card
  • thus, no integration of SIS-card and electronic
    identity card

92
Critical success factors
  • E-government as a structural reform process
  • process re-engineering within and across public
    institutions
  • back-office integration for automatic granting of
    services
  • integrated and personalized front-office service
    delivery
  • support of and access to policymakers at the
    highest level
  • co-operation between all actors concerned based
    on repartition of tasks rather than
    centralization of tasks
  • quick wins combined with long term vision
  • focus on more efficient and effective service
    delivery rather than on the fight against fraud
  • respect for legal repartition of competences
    between actors
  • legal framework
  • creation of an institution that stimulates and
    co-ordinates

93
Most important barriers
  • privacy and security
  • average public sector project is more complex
    than average private sector project, due to
  • interaction with a larger number of stakeholders
    (elected officials, public employees, members of
    interest groups, voters, tax payers, recipients
    of public services, other governmental
    institutions, other government levels, )
  • execution in a less stable environment
  • complexity of BPR in a government environment
  • race for quick wins (cf surveymania) doesnt
    stimulate development of well conceived systems
    based on re-engineering

94
Most important barriers
  • public sector tends, perhaps for reason of
    prestige, to favour tailor-made, high-risk,
    state-of-the-art solutions even when alternative,
    off-the-shelf, cheap, tried and tested systems
    are available
  • in the public sector, there is typically no
    financial margin of value to be added by
    innovation
  • intermediaries often perceive e-government as a
    threat
  • skills and knowledge

95
Most important barriers
  • need for radical cultural change within
    government, e.g.
  • from hierarchy to participation and team work
  • meeting the needs of the customer, not the
    government
  • empowering rather than serving
  • rewarding entrepreneurship within government
  • ex post evaluation on output, not ex ante control
    of every input

96
More info
  • Crossroads Bank for Social Security
  • http//www.ksz.fgov.be
  • FEDICT
  • http//www.fedict.be
  • portal sites
  • federal portal http//www.belgium.be
  • social security portal https//www.socialsecurity
    .be
  • personal website
  • http//www.law.kuleuven.ac.be/icri/frobben

97
Th_at_nk you !
Crossroads Bank for Social Security Federal
Public Service for ICT (FEDICT)
Write a Comment
User Comments (0)
About PowerShow.com