Electronic Government in the GCC Countries
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Electronic Government in the GCC Countries

Authors: A.M. Al-Khouri, J. Bal

Abstract:

The study investigated the practices of organisations in Gulf Cooperation Council (GCC) countries with regards to G2C egovernment maturity. It reveals that e-government G2C initiatives in the surveyed countries in particular, and arguably around the world in general, are progressing slowly because of the lack of a trusted and secure medium to authenticate the identities of online users. The authors conclude that national ID schemes will play a major role in helping governments reap the benefits of e-government if the three advanced technologies of smart card, biometrics and public key infrastructure (PKI) are utilised to provide a reliable and trusted authentication medium for e-government services.

Keywords: e-Government, G2C, national ID, online authentication, biometrics, PKI, smart card.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1074519

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1987

References:


[1] A. Chadwick and C. May, "Interactions between states and citizens in the age of the internet: e-government in the United States, Britain and the European Union." Governance: an International Journal of Policy, Administration and Institutions, vol. 16, no. 2, 271-300, 2003.
[2] S. Graham and A. Aurigi, "Virtual Cities, Social Polarisation, and the Crisis in Urban Public Space." Journal of Urban Technology, vol. 4, no. 1, 19-52, 1997.
[3] K. Layne, and J.W. Lee, "Developing Fully Functional E-Government: A Four Stage Model," Government Information Quarterly, vol. 2, 122- 36, 2001.
[4] P. J. Windley (2002) "eGovernment Maturity"
[Online]. USA: Windleys' Technolometria, Available: http://www.windley.com/docs/eGovernment% 20Maturity.pdf.
[5] P.R. Devadoss, S.L. Pan & J.C. Huang, "'Structurational analysis of egovernment initiatives: a case study of SCO," Decision Support Systems, vol. 34, 253-269, 2002.
[6] A. Leigh & R.D. Atkinson, Breaking Down Bureaucratic Barriers: The next phase of digital government. USA: Progressive Policy Institute, 2001.
[7] P. Windley, Digital Identity. USA: O'Reilly Media, Inc, 2005.
[8] Digital ID World (2004) ÔÇÿWhat is Digital Identity?-
[Online]. Digital World. Available from: http://www.digitalidworld.com/local.php?op=view& file=aboutdid_detail.
[9] A.M. Al-Khouri, "UAE National ID Programme Case Study," International Journal Of Social Sciences, vol. 1, no. 2, pp.62-69, 2007.
[10] C. Lambrinoudakis, S. Gritzalis, F. Dridi, & G., Pernul, "Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy'," Computer Communications, vol. 26, 1873-1883, 2003.
[11] G. Hoinville and R. Jowell, Survey Research Practice. London: Heinemann Educational Books, 1978.
[12] A.N. Oppenheim, Questionnaire Design, Interviewing and Attitude Measurement. London: Pinter, 1992.
[13] M. Shipman ÔÇÿInformation through asking questions-, in The Limitations of Social Research (third edition). London: Longman. pp. 78-115, 1988.
[14] L.J. Camp (2003) ÔÇÿIdentity in Digital Government - A research report of the digital government civic scenario workshop- (Online). Cambridge, USA, Kennedy School of Government. Available: http://www.ljean. com/files/identity.pdf.