Why most e-government projects fail
MOST e-government projects fail." Thus begins chapter 1 of Implementing and Managing eGovernment by Richard Heeks, from Vistaar (www.indiasage.com) .
D. Murali
The global spend on IT by government (excluding health, education and utilities) was about $3 trillion during the decade of the 2000s, and failures, both partial and total, added up to 60 to 85 per cent, writes Heeks.
The topic is current. For instance, AllAfrica Global Media reported on December 29, 2005 about Nigeria's e-Government products that are ready to be introduced - "eImmigration, elearning, eRegistration, eAuthentication, ePayment, eKiosk and so on."
Computer Business Review (www.cbronline.com) has a story dated December 21 on the announcement by the UK's e-Government Minister, Jim Fitzpatrick, "that innovative projects driving forward e-planning services for the benefit of local authorities, businesses, and individuals, will receive a £500,000 boost."
And www.ameinfo.com reported on December 26 about the gains achieved by the United Arab Emirates (UAE) finding mention in the `e-Government Readiness Report 2005' of the United Nations Online Public Network and Finance (UNPAN). One learns that the UAE gateway www.government.ae "is organised by end-user, providing information, services, and transactions under separate sections for residents, business, visitors, and government."
To facilitate an understanding of e-government systems, Heeks provides an onion-ring model with concentric circles labelled, from the outside to in, environment, organisation, information system, technology and information. He uses `IPOSMO checklist' to capture the stakeholder context. The abbreviation stands for information, technology, processes, objectives and values, staffing and skills, management systems and structures, and other resources. You can add one more O, for `outside world', suggests Heeks.
There is also `CIPSODA checklist,' to summarise the tasks involved, viz. capture, input, process, store, output, decision, action. Part one of the book is on `managing e-Government,' and part two, on implementation. An example of strategic approach is provided in a box that lists the different policies and laws impacting e-Government in the US.
These include the Federal Enterprise Architecture of 2003; e-Government Act of 2002; Federal Information Security Management Act of 2002 "requiring security issues to be integrated into IT planning"; and President's Management Agenda of 2001 encompassing five strands, viz. "competitive sourcing, strategic management of human capital, improved financial accountability, budget and performance integration, and expanded e-Government."
Also relevant are the 1998 Government Paperwork Elimination Act; the 1996 Clinger-Cohen Act (requiring capital planning for IT investments to link agency objectives and accomplishments); the 1996 Electronic Freedom of Information Act amendment (on `quality and accessibility' of data); and the 1993 Government Performance Results Act, mandating that activities be matched with outcomes.
ne of the horror stories is from the UK where, in 2000, the government instituted the `Individual Learning Accounts' scheme aimed to give subsidised training for adults. "Unscrupulous training providers managed to get access to the personal details of trainees who had enrolled onto the scheme. They then used these details in their own training records submitted to government, claiming money for people they had never trained." Plagued by deficient controls, the $400 million project was abandoned a year later.
Another example is from Ireland, where an e-Government project was announced in 1997 "to implement a penalty points system for traffic offences". The system finally stuttered into life in early 2003 with just one of the 68 listed offences (speeding) being operational, informs the book. What was the reason for the tardy implementation? "Politicking by four main agencies involved, viz. the Department of the Environment and Local Government, local authorities, the police, and the judicial system." What is needed perhaps is a penalty points system for babus!
One of the `emerging management issues' Heeks discusses is the length of preservation. "Digital information lasts forever or five years - whichever comes first," is a quote of Jeff Rothenberg in `Computing' cited in the book. "Up to a fifth of the information carefully collected during NASA's 1976 Viking mission to Mars has been lost. Some prisoner-of-war and missing-in-action records and casualty counts from the Vietnam war, stored on US Defence Department computers, can no longer be read."
In contrast, the UK Public Records Office has the 900-year-old Domesday Book of William the Conqueror. It records England's national assets as of 1086. "It can still be accessed today (and understood so long as you can read Latin)."
Ideal read for those keen on results from e-Government initiatives.
Drive safely on the info-way
BASED on experience gained from working in the `Security and Abuse Department' of Juno Online, `a top Internet Service Provider in the US', G. Ram Kumar has written Cyber Crimes, from Viva Books (www.vivagroupindia.com) . He defines cyber crime as "any illegal behaviour by means of, or in relation to, a computer system or network, including such crimes as illegal possession and offering or distributing information by means of computer systems or networks over the Internet."
Too much is at stake, alerts the author. For, a cyber crime involves "your information security, identity, privacy, and money." Remember that this is a borderless crime, no longer belonging to sci-fi but very much a part of reality. "Anybody could become a victim if caution is not observed while online."
Part-I of the book has chapters on junk mail, online frauds, malware, ID theft, password cracking, network intrusions, cyber squatting, and cyber terrorism. A relatively new phenomenon is digital bullying. NCH, a children's charity in the UK, and Tesco Mobile have launched a Web site (www.stoptextbully.com) to give young people information and advice on how to tackle mobile bullying, informs a report dated June 7, 2005 on http://networks.silicon.com.
What makes for alarming reading is the summary of recent findings of NCH that Kumar provides. "One in five kids has been bullied via digital phone or computer. Text bullying was the most regular form of abuse with 14 per cent of kids interviewed experiencing it. And one in 10 youngsters said that someone had used a mobile phone camera to take their picture in a way that made them uncomfortable or threatened."
Part-II of the book has `safe Internet computing guide' with tips for online security, to help block spam, ward off spim, spurn phishing, contain virus, clear cookies, report hacking, and deal with stalking.
"Human ingenuity is exhibited at its worst in cyber crimes," bewails the author. "Cyber conmen are becoming innovative and smarter masterminding the most ingenious frauds and scams possible with each possible day."
0 Comments:
Post a Comment
<< Home