Skip to main content

Currently Skimming:

2 Special Considerations in E-Government: Why Government Leads in Demand for Certain Information Technologies
Pages 45-60

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 45...
... UBIQUITY Governments must provide services to all citizens. Unlike the private sector, they cannot opt to serve only the more profitable customers, nor can they select particular market segments in which to participate (though governments obviously do target specific populations to achieve their policy objectives)
From page 46...
... Helping provide for those without home access, a growing number of libraries and other community institutions offer public Internet access, supported in part by several federal programs.2 Residential broadband Internet service provides much higher data rates that support faster download times and the use of richer multimedia content, but its availability is spotty. As this availability continues to grow, there will be concerns about whether those limited to dial-up access will be at a disadvantage similar to that experienced earlier by people without any form of Internet access.
From page 47...
... But the technologies may also provide the most effective tools to enhance access: online interactions can substitute for visits to a government office, thereby facilitating access to information and services for those with mobility .
From page 48...
... The vision, to date unrealized, is that applications from different organizations including government agencies and offices would work smoothly together and that users would be provided with effectively seamless access to information and services across various access devices and communications links. Moreover, users would be able to obtain information and services from wherever they are located, and they could use a variety of computing devices not just desktop computers with wired Internet access.
From page 49...
... Security in both classified and nonclassified systems has long been an area of emphasis in government information policy, as reflected in the Computer Security Act of 19875 and the security provisions of OMB Circular A-130.6 One essential ingredient of a trustworthy system is the ability to authenticate the identity of someone wishing to access it, whether that individual is a citizen seeking to retrieve personal records or engage in a transaction online, or a government employee authorized to open records.7 Identity theft has already proven to be a troublesome issue in the private sector, and it is easy to anticipate heightened concerns if it occurred with e-government services. The simplest computer-based authentication mechanisms, commonly used in Internet transactions today, rely on a shared secret, such as a password.
From page 50...
... Several federal agencies are currently working to develop or implement PKI systems, complemented by cross-agency PKI efforts by the Chief Information Officers Council.8 For instance, the Department of Defense is rolling out the Common Access Card, which uses PKI technology to issue certificates to military, dependents, civilian employees, and some contractors. Challenges in implementing PKI in government include justifying the cost premiums associated with being an early adopter, enabling the necessary level of interoperability among systems and across agencies, developing systems that scale up sufficiently, and funding and sustaining a cross-agency effort.
From page 51...
... Second, when allowing code to run in one's own environment (e.g., downloading code that will do useful things on one's own local machine) , how does the person trust that the code will only do what it purports to do and not, for example, gain unwanted access to personal information stored on the computer?
From page 52...
... Another dimension of the trust issue relates to the consequences of inadvertent information disclosure. Given the authority associated with government data, premature release of, say, a key economic indicator could have significant implications for financial markets.
From page 53...
... For example, one might create portals that aggregate information or services for the customer and dispatch the elements of the query or transaction to the appropriate set of government entities. Significant privacy challenges are also posed by portals for government information and transactions that are operated by third parties.
From page 54...
... This means that potentially no one but the citizen would be legally able to fuse the multiple data streams provided to the various government entities. The issue is what privacy safeguards can be provided when the citizen presents a broad range of data to a portal operated by a government entity or a third party, in order that the portal operator may appropriately transact on the citizen's behalf with multiple separate agencies.
From page 55...
... As explored in more detail in the committee's earlier report on a workshop examining crisis management,~° government's particular technological needs include these: · Robust, high-performance communications infrastructure that can adapt to changing demands, manage traffic congestion and Hermit uriority overrides for emergency usage; tJ ' 1 1 · Temporary infrastructure that can be quickly deployed when extensive damage has occurred; · Data management and delivery mechanisms that can function even when the communications infrastructure is degraded and that support unanticipated information needs; · Composition of information and communications systems in ad hoc situations, such as the establishment of an "instant bureaucracy" for crisis response and recovery (see Box 2.1~; · Improved interoperation of information systems, including that among systems operated by all levels of government and by private organizations (see Box 2.2~; · Support for effective decision making and coordination in the face of uncertainty and stress; · Overcoming of language and other barriers to communicating with citizens; · Enhanced means of warning populations at risk, especially providing information targeted to local circumstances faced by individuals or neighborhoods; and · Adapting of e-commerce technology and practices to accommodate the exception-handling necessary in crisis situations. Federal Statistics Federal statistics on population characteristics, the economy, health, education, crime, and other factors play a key role in a wide range of policy, business, and individual decisions.
From page 56...
... These federal statistical agencies are characterized not only by their mission of collecting statistical information but also by their independence and commitment to a set of principles and practices aimed at ensuring the quality and credibility of the information they provide. Thus, these agencies aim to live up to the trustworthiness expectations of citi
From page 57...
... Survey data collection technologies were another example of government leading demand for IT cited at the committee's workshop; federal data collection efforts frequently exceed private sector efforts both in scope and complexity.
From page 58...
... Each federal agency is responsible for ensuring that its records are created and preserved in accordance with the Federal Records Act of 1950.ll A combination of pressures to reduce costs, enhance access, increase efficiency, and modernize aging technical infrastructures has contributed to a shift to government information resources being "born digital.''l2 NARA and the agencies are challenged by the increasing amounts of material that either originates as or is converted to digital formats. Another agency whose central mission faces pressure as materials are increasingly born digital is the Library of Congress.l3 As elsewhere in government, expectations on the part of both the 1lFederal Records Act (44 U.S.C.
From page 59...
... The simplest approach is to create a physical artifact (paper or microfilm printout) of digital materials so that they can be preserved using traditional archival techniques.
From page 60...
... Once digital material has been archived, another key challenge is to construct search and retrieval systems to facilitate access.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.