Title: E-Government - Tutorial -
1E-Government- Tutorial -
- Reengineering of the Government
- Services and Solutions
Authors
Jasmina Pilipovic, jasminap_at_beotel.yu Prof. Dr.
Miodrag Ivkovic, misa_at_mnt.bg.ac.yu Prof. Dr.
Dragan Domazet Prof. Dr. Veljko Milutinovic,
vm_at_etf.bg.ac.yu
2What Will You Learn From This Tutorial?
- PART ONE
- INTRODUCTION
- What is E-government
- TECHNICAL ASPECTS
- The infrastructure of E-government
- DIGITAL GOVERNMENT APPLICATIONS
- Some examples that could be implemented
3What Will You Learn From This Tutorial?
- PART TWO
- ENCRYPTION
- DSA, RSA, Digital Signature
- SECURITY TODAY
- Digital Certificates, SSL
4What Will You Learn From This Tutorial?
- PART THREE
- SOME EXAMPLES AND CASE STUDIES IN THE FIELD
- Other Governments experiences, University research
- STRATEGY PLANNING
- Planning of E-government
5Part One
6Introduction to E-Government
- Digital technologies are fundamentally
transforming our economy and society, - and have potentials for transforming
- the Government
7Introduction
- E-government - the transformation of internal and
external - business processes toward customer-centricity
- based upon service delivery opportunities
- offered by new communication technologies.
- It is connecting Citizens, Suppliers, Employees,
- and other agencies securely using
- The technologies of the Internet
- The standards of the Internet
- The public Internet
- Private intranets
8Introduction
- Information and service delivery
- Whenever
- Whatever
- Wherever
9Introduction
- E-government in the use of
- Government itself (communication, services,
information) - Employees (advertising, education, instructing)
- Businesses (supplying, information, services)
- Citizens (online services, digital democracy)
10Introduction
- Benefits
- Efficiency
- Comfort
- Cost savings
- Progress
- Permanency
- Reduced redundancy
11Technical Aspects
12Technical Aspects
- Designing and developing E-government
- brings us a set of both technical and legal
- difficulties to overcome
- The complexity of E-government architecture
- will be presented with a model,
- consisting of several segments
- Sub-infrastructures
- Legal and political constrains
- Standards and protocols of networking
- Applications
13Technical Aspects
14Technical Aspects
- Multiple networks connected together
- Various hardware technologies
- Various underlying communication technologies
- Information superhighway
15Technical Aspects
- Ability to present text, images, video, and
audio contents - Various tools and languages for designing
- Client/server architecture
- Static and dynamic contents of WWW
16Technical Aspects
- Message and information delivery
-
- Search engines and algorithms
- Delivery of both unstructured and structured data
- Unstructured delivery via faxes and e-mails
- Automatic interchange of structured information
- Error and control handling
-
17Technical Aspects
- Privacy
- Governments need to protect citizens privacy
- Problem of involuntarily provided information
- Security
- Protection of data - stored and during
transaction
- Authentication
- The identity of parties in a transaction is
verified
- Confidentiality
- No eavesdrop on the transaction in progress
18Technical Aspects
The most widely used way of purchasingover the
Internet is Credit Card Electronic Cash is
informational equivalent of physical bank notes
and coins Electronic Cash can offer such
benefits as anonymity of the buyer global
acceptance Credit Card will be dominant for
at least the next few years.
19Technical Aspects
- Digital government applications
- Classes G2G, G2E, G2B, B2G, G2C, C2G
- Online services for citizens and businesses
- Intergovernmental and employees communication,
managing digital documentation - Government intranet as basic communicational,
informational, and organizational tool
20Technical Aspects
- Legislative and official politics
- Introducing digital era
- into conducting governmental and commercial
tasks - is opening an important question
- considering legal protection and obligations
21Technical Aspects
- Exterior and inside attacks and misusage
- Electronic espionage and sabotage
- E-war
- Endangering rights and freedoms of citizens
- Corruption and organized crime
- Economical and financial malversations
- Intellectual property
- Monopolization in managing government affairs
-
22Technical Aspects
- Technical standards and network protocols
- TCP/IP as the network protocol
- SMTP and IMAP for mail transport
- LDAP for Directory services
- HTTP for delivery of client transactions and
information
- Agencies participating in E-government
- should continually monitor
- the development and implementation
- of emerging standards
23Digital Government Applications
24Digital Government Applications
- Hundreds of applications that could be developed
- to allow businesses, citizens, and other
governments - to interact with the Government digitally.
- There are at least four distinct aspects of
digital government - Information gathering
- Interactive service delivery
- Online supplying
- Digital democracy
25Digital Government Applications
- Citizens could have an insight on various types
of information, such as - Government services, agencies, and employees
- Event calendars, statistics, news
- Flight and train schedules
- Useful links
26(No Transcript)
27Digital Government Applications
- Information dissemination problem
- Need for standardized information tagging system
- Expanding the amount of accessible information
- Develop expert systems to access information
- Make the Web the first place to put information,
not the last
28Digital Government Applications
- Interactive service delivery
- Issuing permits and licenses, as well as renewing
them - Businesses and individuals could file tax returns
directly, at no cost - Companies could file environmental compliance
forms online - Individuals could apply for Social Security
benefits online - Paying tickets, bills, memberships,...
29(No Transcript)
30Digital Government Applications
- Expand and standardize the number of
applications for online forms - Whenever possible use Web based technology
- Online forms should use shared information about
the submitter - Integrate forms
- Focus on intergovernmental solutions
31Digital Government Applications
- Number of items citizens and business partners
can purchase online - With E-commerce countries can move to the center
of the virtual geography - Collaboration with distributors and suppliers on
scheduling - Forecasting, and just-in-time replenishment of
supplies
32(No Transcript)
33Digital Government Applications
- Communication between citizens and authorities
- Access to reports, plans, and memorandums
- Chat rooms
- Communication between government employees
34(No Transcript)
35End of Part One
Authors
Jasmina Pilipovic, jasminap_at_beotel.yu Prof. Dr.
Miodrag Ivkovic, misa_at_mnt.bg.ac.yu Prof. Dr.
Dragan Domazet Prof. Dr. Veljko Milutinovic,
vm_at_etf.bg.ac.yu
36Part Two
37Encryption
38Encryption
39Encryption
- Secret-key encryption
- Shannon confusion and diffusion
- Uniform encryption (module arithmetic)
- One-time pad (random key generation)
- DES (Data Encryption Standard)IBM National
Bureau of Standards, 1977
40(No Transcript)
41(No Transcript)
42(No Transcript)
43Encryption
- Public-key encryption
- Substitution ciphering with two keys private and
public
44Encryption
- RSA algorithm (Rivest, Shamir Adleman, 1977)
- public key K P Q, P and Q are very long
numbers -
- private key K (2 (P -1) (Q - 1) 1) / 3
- encrypting Ci (Fi t) mod K
- decrypting Fi (Ci K) mod K
-
45Encryption
- Example P 7151 Q 13259
- K 7151 13259 94815109
- K (2 7150 13258 1) / 3 63196467
- Message MARY HAD A LITTLE LAMB
- ASCII REPRESENTATION 77 65 82 89 32 72 65 68
32 - 65 32 76 73 84 84 76 69 32
- 76 65 77 66 46 00
- for t 3 C1 (776582 3) mod 94815109
71611947 - D1 (71611947 63196467) mod 94815109 776582
(!!!) -
-
46Encryption
- Digital signature
- Origin authentication
- Data-integrity authentication
- Non-repudiation
47Encryption
- Digital signature
- Authentication check
48Security Today
49Security Today
- Digital Certificates
- Strong binding between the public key and some
attribute - Help someone receiving a message decide whether
the message, the key and the sender's name are
what they appear to be - An electronic file that uniquely identifies
communication entities on the Internet - Issued and signed by the Certification authority
50Security Today
- De-facto standard for digital certification is
ITU-T recommendation X.509 - Certification Authority (CA) (issues
certificates) - Subscribers (CA Clients)
- Users (the public in general)
51Security Today
- Secure Sockets Layer (SSL)
- A protocol designed to work at the socket layer,
to protect any higher level protocol built on
sockets, such as telnet, ftp, or HTTP
52Security Today
- SSL protocol is composed of two layers
- The Record Layer
- Connection security using data encryption with
symmetric cryptography and message integrity
check - For every SSL session we create a randomly
generated temporary master key
53Security Today
CLIENT-HELLO (information on the cryptographic
systems it is willing or able to support)
SERVER-HELLO (connection id, its key
certificate, and information about the
cryptosystems it supports)
verifies the server's public key, and responds
with a CLIENT-MASTER-KEY message
CLIENT-FINISHED message
SERVER-VERIFY message
REQUEST-CERTIFICATE
CLIENT-CERTIFICATE
SERVER-FINISH
54End of Part Two
55Part Three
56Experience In The Field
57Experience In The Field
- Early stage in the shift to government online
- The use of Internet is increasing each year
58Experience In The Field
- E-government relays not only on Internet
delivery, but telephone, digital TV, and kiosk
delivery as well
59Experience In The Field
- New Zealand
- Critical issues
- Leadership
- Strategy
- Governance
- Integration
- Resourcing
- Ensuring a focus on citizens
- Avoiding the digital divide
- Reskilling government
- The need for communication.
60Experience In The Field
- September the 28th, 1999
- By the year 2005
- Electronically registering with central
government - Transacting all dealings with IRD online
- All government forms and all services available
online - People to have their say in the policy-making
process - Authorized accessing records of a persons health
information - Electronically posting transactions and receiving
documentation - Recording change of address
61Experience In The Field
- The United States
- Week integration across federal services or
between states and federal government - Lack of reliable authentication services no
paper ID card - Digital divide is one of the major barriers
62Experience In The Field
- New York States major projects
- Establishing a statewide IP network
- Implementing a comprehensive plan
- Restructuring the states data centers
- Best Practices sessions
- Statewide legislation
- Cooperation with local governments
- Reviewing all purchases of technology
- Participating in projects.
63Experience In The Field
- Australia
- Federal initiative was to deliver all
Commonwealth services electronically via the
Internet by 2001 - In 1999, over 18 of all households had home
Internet access (79 of that in major cities),
and still made Australia one of the most wired
countries in the world - One of the first e-government programs was
Multimedia Victoria (MMV) in Victoria with
initial strategy document in 1995
64Experience In The Field
- Australia
- The government is also derived into channels
business, land, health channel, etc. - Setting up an application costs betweenA100k
and A200k - Service providers are charged 80 cents to 2 per
transaction.
65Experience In The Field
- United Kingdom
- In 1999, UK published its White
PaperModernizing Government - Electronic Procurement (making 90 of low-value
government procurement electronic by April
2001) - Government Business Processes (equivalence to
written and digital documents) - Service and Information Delivery (25 by 2001,
50 by 2005, and 100 by 2008)
66Experience In The Field
- Use of the internet is not as high as in
Scandinavia, the US, or Australia. - The tax system is very complicated
- No single, integrated national database to be
used to roll out ESD - Opening of e-libraries and placing computers in
schools and neighborhoods - Number of statutes in the UK that prevent data
gathered for one purpose to be used for another,
and the access to the data is seriously limited
67Experience In The Field
- Ontario, Canada
- In 1998, an Information Information Strategy
was released - Too many IT systems with poor evidence of
integration among agencies and weak links to the
broader public sector
68Experience In The Field
- Used technology was incompatible and variety of
networks made it difficult to implement systems
across government - Seven IT clusters were introduced
Resource/land Economics/business Human
Services Justices Community Services
Transportation Finance.
69Strategy Planning
70Strategy Planning
- Elements of a business case
- The following diagram illustrates some
recommended steps in the development of a
business case for government e-commerce
initiatives
71Strategy Planning
- A list of topics that pertains to public
e-commerce projects
72Strategy Planning
- Planning of E-government is characterized with
complexity and deep impact on society - Issue Driven Planning (IDS)
73Strategy Planning
- Planning issues important for successful
development - Motivation
- Budget
- Result measuring
- Development competency
- Contract and project managing
- Best practice
- Relationship managing
- Technology
74Strategy Planning
- Planning steps
- Executive appointment
- E-government vision
- Global plan definition
- Stage I - Strategy (what should be done)
- Stage II - Competency (what could be done)
- Stage III - Implementation (what will be done)
75Strategy Planning
- Strategy planning should start with a meeting
Classification (G2C, G2B, G2E, G2G) Project
priority outcome Project interoperability Timing
schedules Alternative resources selection
76Strategy Planning
- Competency planning - Users and Government
- Users competency
- Need for eye-to-eye contact
- Cultural and language restrictions
- Handicaps
- Economical status
- Geographical limitations
- Need for education
77Strategy Planning
- E-government competency
- Leader competency
- Regulatory restrictions
- Handling with digital records
- Privacy and Security
- Central Authority (CIO - Chief Information
Officer) - strategic support
- technical support
78Strategy Planning
Effects
Approach
Time
Economical Analysis Budget Evaluation Timing and
Resources Schedules Marketing Plan
Integration
Projects
Priorities
Profits
79End of Part Three
80The End
Authors
Jasmina Pilipovic, jasminap_at_beotel.yu Prof. Dr.
Miodrag Ivkovic, misa_at_mnt.bg.ac.yu Prof. Dr.
Dragan Domazet Prof. Dr. Veljko Milutinovic,
vm_at_etf.bg.ac.yu