Cost and Challenges with E-Government

C
  1. Challenges Policy Makers face to Counter Cybercrime
  2. Cybercrime vs Traditional Crime
  3. Risks, Threats and Vulnerabilities
  4. Security Policies
  5. Cost and Challenges with E-Government
  6. Cultural Values and Moral Legitimacy
  7. One audit standard fits all?
  8. Mobile Security
  9. Will the Mandiant Report Raise Public Awareness?
  10. Ethical vs Non-Ethical Hackers
  11. Motivation and Intent of Hackers
  12. Hacking as an Addiction
  13. Online Anonymity: Good or Bad?
  14. Identity Theft and Inexperienced Internet Users
  15. Regulation vs Innovation
  16. 3D Printing, Copyright and Legal Matters
  17. Software Piracy on an International Scale
  18. Workplace Monitoring and Blocking Software

There is no doubt that E-Government provides conveniences today that many take for granted, however there is an underlying cost for these services.  First of all, government sites are attractive targets for malicious activities, whether or not this involves deliberate disruption of service, or the stealing of sensitive information for profit.  Bidgoli (2006).  The availability, integrity, and confidentiality of information therefore are all very real concerns when providing government services online for individuals and businesses.  For the individual user, security and privacy concerns with regard to their personal information are paramount.

Individual or informally organized hackers, non-state organizers and foreign state-sponsored threats are continuing to increase as more sophisticated systems are made available online.  In order to address these threats, several laws have been put in place over the years.  One of the larger pieces of legislation, the Federal Information Security Act (FISMA) was enacted in order to require “all government agencies to develop security management systems.”  Vacca (2010).  In order to comply with FISMA, the agency must perform a risk assessment to determine what controls will be needed and then implementation of these controls must be carried out.  FISMA provides a comprehensive framework which is mandated by government agencies their contractors.  The National Institute of Standards and Technology (NIST) has documented recommended practices dealing with incident response handling for FISMA compliance.  The Federal Desktop Computer Configuration (FDCC) was brought about to enhance protections on government desktop computers.

Even with all of these mechanisms in place, there are still ever increasing threats facing government web applications.  The cost of adequate protection can be high, depending on the level of sophistication of the systems, however the opportunity cost of successful intrusions is too high to dismiss and federal agencies will need to continue to keep on top of their security defenses.  Earlier literature suggested that the cost of e-government did not balance the benefits it was supposed to provide.  Moon (2002) published an account that summarized at that time e-government, still in an early stage, had not brought about the benefits of cost savings and downsizing in larger administrative processes.  In more recent years however it can be argued that the benefits e-government has brought cannot be ignored just because of the challenges that exist.   Many have come to rely on these services.  The current Administration are very much focused on the new Digital Government Initiative, and as part of that initiative, security and privacy play large roles.  E-government is here to stay, therefore the importance of protecting these systems will continue to grow as the threats surrounding them increase.

References:

  1. Bidgoli, H. (2006). Handbook of Information Security. Bakersfield, CA: John Wiley & Sons, Inc.
  2. Moon, M., J.  (2002). The Evolution of E-Goverment  among  Municipalities: Rhetoric or Reality. Public Administration Review 62(4): 424-33.  Retrieved from: http://www.jstor.org.ezproxy.umuc.edu/stable/10.2307/3110357
  3. Whitehouse (2012).  Digital Government.  Building a 21st Century Platform to Better Serve the American People.  Retrieved from: http://www.whitehouse.gov/sites/default/files/omb/egov/digital-government/digital-government.html
  4. Vacca, C (2009).  Computer and Information Security Handbook. Burlington, MD: Morgan Kaufmann

About the author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

About Author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

Follow Me