The poor image of information technology in government
ABSTRACT – E governance has been one of the most recent tools to improve the efficiency and transparency within the governmental sectors to aid the country men and other organizations in regular contact with the governmental departments. However, according to a study conducted many countries have failed to show any form of progress in attaining their aims as essayed by the IT policies at the time of implementation. In some cases, this could be a fault of the national parliamentary authorities.
This paper discusses the poor form of Information Technology structure in such countries. INTRODUCTION Countries all over the globe have taken up ways supporting new IT technologies to bring about more transparent and citizen centric working mechanism. There are many IT structures which have been implemented by many government’s and have brought about significant changes in the system (Robins & Burn, 2001). Some of the countries have taken up reforms seriously, but some of them have fallen short of the expectations in improving their governance structure and relevant outcomes.
In this regard, a number of barriers exist that need to be understood and tackled by developing countries in pursuing e-government objectives. The factors that are associated with this include mainly the lack of IT resources and infrastructure. According to Sabadash, V. 2004, “Often, the lack of resources and technology is compounded by a lack of access to expertise and information’. A strong political will and commitment, reflected in a country’s politico-legal structure, are in the core of combating these barriers an d achieving success.
Need essay sample on "The poor image of information technology in government"? We will write a custom essay sample specifically for you for only $13.90/page
In the nonexistence of such Acts, trades and common man remain cautious and uncertain to get drawn in in any electronic communication and money or trade transactions. At the same time, these inefficiencies make the cyber crimes and other IT related abnormalities tremendously tricky to battle. The issue of confidentiality and safety becomes rigid to follow and make sure that it is perfectly safe in electronic communication and transactions.
Flawless communication, data flow and data management are the most important requirements of an effectual e-government construction. It needs levelheaded declaration of not being pretentious of unlawful actions undertaken by computer hackers and cyber criminals. E-government in emergent countries is going through a course of evolution. The government of these countries have given the IT sector a trust worthy position in the economy with a projection that it will effect the growth in a positive manner, (Burkert, H. 2004).
Although in spite of such intentions shown by the governments during the last years, there has not been a significant change and the creation of a citizen-centric, transparent and efficient digital society based on e- government still remains as a far cry in many countries. In the perspective of Gartner’s typology of e-administration, these countries have got trapped in the subsequent phase or interaction of e- government procedure and have been unsuccessful to make obvious its aptitude to step forward towards the superior stage of e-government, i. e. , `transaction’ followed by `transformation’.
According to Baum and Maio, 2004, “ The increasing complexity and costs involved in moving towards the higher levels, a strong politico-administrative framework with the ability to frame and enforce law is considered as an important precondition to establish an IT-driven government. In addition to providing legal recognition to important e-government functions such as e- communication and e-transactions, an effective legal framework is required to create an environment conducive to promoting and executing e-government”. This system also offers protection to individual property and defend official document of e-publications.
It can at the same time also help to identify and define other illegal activities that were going within the department. As a result, a suitable legislation of an IT Act in concert with reformation and connecting other pertinent lawful codes is significant in order to hold back and cure offenses such as coercion against possessions and folks, piracy, hacking and fake activities and illegal transfer and relocation of data on the web. In adding up, exact lawful influence desires to be put into effect in order to defend intellectual property as well as copyrights.
With respect to data security and inter-operability, an suitable law act is required to be passed to set up encryption standards and to have room for intercontinental agreements on interoperability. It is, therefore, the time for these states and countries to come forward and at once endorse the IT Act to make possible e- government and incorporate itself to the global e-revolution.
REFERENCES 1. Barker, G. 2002, July 13. Stolen identity: The hidden cost. The Age . Retrieved June 22, 2006. 2. Basu, S. (2004). E-Government and d eveloping countries: an overview.
International Review of Law Computers, 18 (1), pp. 109-132. 3. Baum, C. , & A. D. Maio. 2000. Gartner’s four phases of e-government model. Gartner Group Inc. , Stamford. 4. Burkert, H. 2004. The mechanics of public sector information. In G. Aichholzer & H. Burkert (Eds. ), Public Sector Information in the Digital Age: Between Markets, Public Management and Citizens’ Rights. Edward Elgar Publishing Limited, Cheltenham. 5. Cabinet okays draft of ICT act 2005. The Daily Star. 2005, February 15. Retrieved June 10, 2006, from http://www. thedailystar. net/2005/02/15/d50215061187.