Providing Adaptive and Evolving Government E-Services through Citizen-Centric Process Views

DOI: 10.1007/978-3-642-15346-4_4


As users of government services, citizens spend much of their time in transit between government agencies acting in different
roles with varying responsibilities. Government agencies are providers of services virtually connected, but with limited actual
integration in practice. We believe that by allowing citizens more direct access to ongoing processes in which they are involved,
it could improve service delivery from the perspective of citizen and the government organization alike. In this paper we
discuss the concept of citizen-centric process views, a conceptual architecture providing channel independent support for
knowledge management and monitoring of cross-organizational service delivery in transformational government. We will set the
stage for the discussion of requirements for the next generation government infrastructures and the surrounding organizations
in order to support delivery of adaptive and evolving government services.

Keywordse-government-services-knowledge management-workflow-evolving IS

Download full-text


Available from: John Krogstie, Oct 01, 2015
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Different numerous risk analysis methodologies are currently available and selecting a suitable one for privacy risk analysis may be a daunting task The objective of the report was to produce an overview of existing risk analysis methodologies, comparison of the different methodologies, and selection of one or two methodologies as a basis for privacy risk analysis framework in the PETweb II (Privacy-respecting Identity Management for e-Norge) project. The PETweb II sets out to providing scientific support for the choice of a scheme for identity management and electronic identifiers in a critical IT systems, specifically supporting: (i) the analysis of specific technical and regulatory privacy and security risks connected to the choice of an identity management approach, (ii) the development of a reference model for privacy-respecting identity management, and (iii) research and development of a simulation and modeling method for privacy consequences of identity management systems. Dr. Habtamu Abie is currently a Senior Research Scientist at NR. He received his B.Sc., M.Sc. and Ph.D. from the University of Oslo, and has many years of experience in computing, both as practitioner and researcher. He has a solid and extensive background in the design and development of real-time systems, and the design, modeling and development of security for distributed object computing systems. He has been a fellow at CERN. He participates as a Guest-Editor, reviewer and member of the technical program committee in international conferences and workshops and reviews scientific papers in books and international journals. His past and present research interests encompass adaptive and evolving security (protocols, DRM, requirements, metrics, policy, privacy, trust, risk management, Identity management) in distributed and telecommunications systems, architecture and methodology, formal methods and tools, hard real-time systems, and mobile, ubiquitous and ambient intelligent computing. Dr. John J. Borking, Director/owner of Borking Consultancy, Privacy-by-Design expert at the law firm CMS Derks Star Busmann in Utrecht The Netherlands, e-Law researcher at the University of Leyden, ICT arbitrator and mediator of the foundation for alternative dispute resolution (SGOA), certified privacy law expert for Europrise in Kiel, former vice-president / privacy commissioner of the Dutch Data Protection Authority (CBP). He participated in several EU research projects, doing research on privacy and identity management, privacy ontologies, HCI and the risks, costs and benefits of privacy protection in sensitive business processes; on privacy incorporated software agents; on a roadmap for privacy & identity management, web data mining and privacy seals/certificates. He is member of a research group PETWEB 1 and 2 for Internet access by citizens of their data stored in the databases of the government and he participates as researcher in a Dutch project on privacy safe video surveillance (WPSS) and a CEN project on a standardized (EN) PIA for RFID. He is a lecturer on PET at Delft TopTech institute. He is and has been (co-) author of many books and articles about privacy and privacy enhancing technologies, privacy impact assessment, software protection, computer law, e-gaming, alternative dispute resolution and e-mediation.As result of research at the Norwegian Research Center for computers and law of the University of Oslo (TERESA research programme) he published a book on the protection of software and firmware: "Third party protection of software and firmware, direct protection of zeros and ones".
    Full-text · Article · Sep 2012