Introducing E-Government in Developing Countries Analysis of Egyptian e-Government Services

被引:0
|
作者
Elaswad, Othoman [1 ]
Jensen, Christian Damsgaard [1 ]
机构
[1] Tech Univ Denmark, Dept Appl Math & Comp Sci, DK-2800 Lyngby, Denmark
关键词
Authentication and Identity management;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Online Identification and Authentication is an essential requirement for providing e-services. Few studies have investigated the challenges facing eGovernment and IDM in developing countries and, to the best of our knowledge, none of the existing research has studied the challenges facing online identification and remote authentication in developing countries, such as the North Africa Countries (NAC), where a relatively large proportion of citizens are illiterate. Therefore, the design of a national IDM system in a NAC must explicitly consider illiteracy to allow this group of citizens to benefit from online services. Egypt is one of the NAC, which has implemented online identification and authentication services that are widely recognized as the most advanced among the NAC. This paper analyses the Egyptian digital IDM in order to identify IDM requirements for online identification and authentication services that guarantee equal access to online services and an inclusive society. The study identifies strengths and weaknesses of the Egyptian e-Government and IDM services, which we believe are common to most NAC, since the NAC are quite similar in terms of social culture, citizen's education level and skills, citizen's behaviours, digital infrastructure and legislation, but also common to many other developing countries. Our analysis of the Egyptian e-Government services indicates that the security requirements and principle of equal access are not fully met, which illustrates the difficulty of introducing e-Government in developing countries.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] E-Government Maturity Model for Sustainable E-Government Services from the Perspective of Developing Countries
    Joshi, Pusp Raj
    Islam, Shareeful
    [J]. SUSTAINABILITY, 2018, 10 (06)
  • [2] Impact of Government Capacity and E-Government Performance on the Adoption of E-Government Services
    Mensah, Isaac Kofi
    [J]. INTERNATIONAL JOURNAL OF PUBLIC ADMINISTRATION, 2020, 43 (04) : 303 - 311
  • [3] Quality of E-government Services in Oman: A Perspective of E-government Services Providers
    Al Balushi, Taiseera Hazeem
    [J]. VISION 2020: SUSTAINABLE ECONOMIC DEVELOPMENT, INNOVATION MANAGEMENT, AND GLOBAL GROWTH, VOLS I-IX, 2017, 2017, : 763 - 770
  • [4] E-Police System for Improved E-Government Services of Developing Countries
    Mollah, Muhammad Baqer
    Islam, Kazi Reazul
    Islam, Sikder Sunbeam
    [J]. 2012 25TH IEEE CANADIAN CONFERENCE ON ELECTRICAL & COMPUTER ENGINEERING (CCECE), 2012,
  • [5] What is E-Government? Introducing a Work System Framework for Understanding E-Government
    Lindgren, Ida
    Melin, Ulf
    Saebo, Oystein
    [J]. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2021, 48 : 503 - 522
  • [6] Secure e-Government Services: A Comparative Analysis of e-Government Maturity Models for the Developing Regions-The Need for Security Services
    Karokola, Geoffrey
    Yngstrom, Louise
    Kowalski, Stewart
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC GOVERNMENT RESEARCH, 2012, 8 (01) : 1 - 25
  • [7] E-Government in Spain: An Analysis of the Right to Quality E-Government
    de-Miguel-Molina, Maria
    [J]. INTERNATIONAL JOURNAL OF PUBLIC ADMINISTRATION, 2009, 33 (01) : 1 - 10
  • [8] Internationalization of e-Government Services
    Williams, Idongesit
    Falch, Morten
    Tadayoni, Reza
    [J]. 2018 11TH CMI INTERNATIONAL CONFERENCE: PROSPECTS AND CHALLENGES TOWARDS DEVELOPING A DIGITAL ECONOMY WITHIN THE EU, 2018, : 19 - 31
  • [9] Securing e-government services
    Kim, Jong-Weon
    Kim, Kyu-Tae
    Choi, Jong-Uk
    [J]. COMPUTER, 2006, 39 (11) : 111 - 112
  • [10] e-Government Services Vulnerability
    Shahintash, Ali
    Hajiyev, Yashar
    [J]. 2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT), 2014, : 403 - 407