ArticlePDF Available

Abstract and Figures

With dramatic increase in the mobile technology, the mobile cellular phones have played a significant role in the several fields particularly, education, military, business and health. The deployment of mobile phone in the Government has been of high interest of research community to improve fundamental functions, efficient information provision and augmenting the quality of service QoS provisioning. A lot of research is conducted for service improvement in Mobile Government(MGovernment), but there is marginal research is available for security particularly privacy preserving of M-Government. In this paper, the authors propose privacy preserving framework for M-Government to secure an administration interface to avoid possible security threats. The proposed framework is verified using mathematical formulation. Furthermore, the proposed framework is tested using Java Platform. The experimental results confirm the reliability, efficiency and QoS provision of the privacy preserving framework.
Content may be subject to copyright.
DOI: 10.4018/IJITWE.2016070105
Copyright © 2016, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.

Volume 11 • Issue 3 • July-September 2016


Muder Almiani, Al-Hussein Bin Talal University, Ma’an, Jordan
Abdul Razaque, Cleveland State University, Cleveland, OH, USA
Ayman Al Dmour, Al-Hussein Bin Talal University, Ma’an, Jordan

With dramatic increase in the mobile technology, the mobile cellular phones have played a significant
role in the several fields particularly, education, military, business and health. The deployment
of mobile phone in the Government has been of high interest of research community to improve
fundamental functions, efficient information provision and augmenting the quality of service QoS
provisioning. A lot of research is conducted for service improvement in Mobile Government(M-
Government), but there is marginal research is available for security particularly privacy preserving of
M-Government. In this paper, the authors propose privacy preserving framework for M-Government
to secure an administration interface to avoid possible security threats. The proposed framework
is verified using mathematical formulation. Furthermore, the proposed framework is tested using
Java Platform. The experimental results confirm the reliability, efficiency and QoS provision of the
privacy preserving framework.

Adaptability, e-Government Services, Framework, Mobile Government, Quality of Service, Security, Self-
Dependability

Phones Governments and businesses-oriented organizations are looking for the special services to
provide for the consumers in order to meet their demands at anytime, anywhere. The organizations
are also keen to improve the quality of life of their citizens by integrating the information and
communications technologies (ICT) with the public services like the public transport, and municipal
infrastructure around the world. As this trend causes the increase of the energy consumption and
costs (Almiani, Al Dmour, & Abdul Razaque, 2015).
The implementation of e-government can establish strong government-public relationship and
allow the governments to become more effective and efficient in satisfying their delivery and service
functions. This is one of the key goals being faced to the e-government (Abdul Razaque, & Elleithy,
2011).
M-Government addresses the mobility of the Government itself. M-Government is not meant
to be a replacement for e-government but a complement to e-government Operators (Jotischky, &
Nye, 2011)
The mobile operators that support the m-government can participate in four key elements of
public services, the first one is managing the connectivity of the public service infrastructure for
65

Volume 11 • Issue 3 • July-September 2016
66
the customers to have an access to the m-government databases and central servers. The second one
is data aggregation and data analysis of the data and information collected from several sources to
produce new insights that can be used. The third one is the service delivery that transporting the
real-time information to people and the technology that will enable them to use, respond and adapt
with the public service. The last one is the creation of the customer service interface to provide the
customer-supported operations (e.g., web portals and call centers) for delivering the messages and
supporting the service to the subscribers (Abrahams, 2009; Kushchu & Kuscu, 2003; Pang, Min-
Seok, Lee, & DeLone, 2014; Rony, 2012;Somani, 2013).
For transcending the E-government to M-government, there is need of indispensable changes in
ICT, so that Government-public relationship can highly be improved. The deployment of Information
Technology (IT) in several governmental agencies/departments connects the different sectors/
departments and improving the public safety and services. As, polishing the effectiveness of those
services, delivery process can be made faster and also reduced the government-public communication
cost World Bank, (2001).
Currently, most of the countries are highly affected due to rapid automatic change in ICT to
M-government. However, the trend of this change could be justified with several ways such as
increasing the public services that allows people to enter data into digital systems anywhere. In addition,
the decision capability is also much improved and helping in taking the action in organized manner.
Furthermore, it provides more services such as improving delivery, lowering the cost and increasing
channels for people interaction. On the other hand, it faces some challenges such as lack of qualified
persons particularly the group that is deprived of IT facilities due to financial hurdles, elderly persons
and untrustworthiness in some societies. We believe that our proposed interactive framework for the
M-Government will be of paramount significance for establishing the solid relationship between
public and government. The benefits of M-government using wireless and mobile technology rather
than traditional one is the revolution of ICT depicted in Figure 1.
For the government departments that use the applications and services can improve organizational
and business processes, such as making in-field mobile workers more productive. For the Citizens
Figure 1. Transition from Traditional-government to Mobile- government
12 more pages are available in the full version of this
document, which may be purchased using the "Add to Cart"
button on the product's webpage:
www.igi-global.com/article/privacy-preserving-framework-to-
support-mobile-government-services/164472?camid=4v1
This title is available in InfoSci-Journals, InfoSci-Journal
Disciplines Computer Science, Security, and Information
Technology, InfoSci-Select, InfoSci-Select, InfoSci-Select,
InfoSci-Select, InfoSci-Select, InfoSci-Digital Marketing, E-
Business, and E-Services eJournal Collection, InfoSci-
Networking, Mobile Applications, and Web Technologies
eJournal Collection. Recommend this product to your
librarian:
www.igi-global.com/e-resources/library-
recommendation/?id=2
Related Content
The Evaluation Cycle Management - Method Applied to the Evaluation of
Learning Management Systems
Matija Pipan, Tanja Arh and Borka Jerman Blažic (2010). Integrating Usability
Engineering for Designing the Web Experience: Methodologies and Principles (pp.
58-80).
www.igi-global.com/chapter/evaluation-cycle-management-method-
applied/40493?camid=4v1a
Business Transformation though Cloud Computing in Sustainable Business
K. S. Jasmine and M. Sudha (2016). Web-Based Services: Concepts, Methodologies,
Tools, and Applications (pp. 2285-2298).
www.igi-global.com/chapter/business-transformation-though-cloud-
computing-in-sustainable-business/140900?camid=4v1a
Performance Analysis of a Web Server
Jijun Lu and Swapna S. Gokhale (2008). International Journal of Information
Technology and Web Engineering (pp. 50-65).
www.igi-global.com/article/performance-analysis-web-
server/2653?camid=4v1a
Clustering Web Information Services
Athena Vakali, George Pallis and Lefteris Angelis (2007). Web Data Management
Practices: Emerging Techniques and Technologies (pp. 34-55).
www.igi-global.com/chapter/clustering-web-information-
services/31095?camid=4v1a
... Mgovernment providers need to remain competitive to produce benefits and deliver results to both individuals and businesses and to positively enhance national economic growth. Governments are utilizing internet technologies to improve service quality in order to transform relationships with individuals, businesses and other government entities [3,4]. M-government affords a powerful and transformational capacity to both extend access to existing services, and expand the delivery of new services. ...
... To fill this gap, this study was developed to test hypotheses using framework of the extended TMA as the foundation to determine the predictors of users' intention to use m-government services in Saudi Arabia. In addition, user acceptance is considered one of the critical success factors of m-government services [4,5]. Accordingly, this study aims to measure the users' acceptance of mobile government services by investigating the important factors that may play a major role from the users' perspective. ...
... Customer's Adoption of Mobile Government Services: The obtained from this study aims to enrich m-commerce research because of its relative novelty and potential applications [4,7]. It is worth to mention that m-commerce research lacks investigation of critical factors required for better implementation [8]. ...
Article
Full-text available
The purpose of the study is to examine the factors that impact the intention of Saudi citizens to use a mobile government smartphone application (Absher). Saudi Arabia seeks to invest and develop the infrastructure of the government’s mobile services, to be one of the leading countries in the region. Smartphone applications backed by mobile technologies have changed mobile services use which permit anywhere at any time access. Drawing on technology acceptance theories and relevant literature, this study developed and tested a structural model that integrates factors perceived usefulness, perceived ease of use, perceived privacy and trust in order to investigate the predictors of Absher use intention in the Saudi Arabia. The proposed model is tested using structural equation model (SEM) on data collected using an online questionnaire. Statistical analysis revealed that intention to use Absher was significantly associated with perceived trust, security and privacy, ease of use, and usefulness. Drawing on the technology acceptance model and trust theory, this study develops and empirically examines a model for users' intention to use mobile government services. This study contributes to the marketing literature by examining the impact of PU, PEOU and trust on mobile government services acceptance in developing countries.
... The organisational factors like Staff empowerment, budgeting/cost, interaction, good governance or efficiency, infrastructure, service quality, reliability, security, and value of MG system were some of the factors that are considered from an organizational context (Chanana, Agrawal, & Punia, 2016;Ali & Al-Kabbi, 2018;Ishengoma, Mselle, & Mongi, 2019). Further, perceived value and perceived security are considered to be the two critical factors in accessing the MG performance or success , C. Wang, 2014Almiani, Razaque, Al-Dmour, 2016;Ishengoma et al., 2019). Thus, most studies have adopted integrative theory approach in value creation management and information system value theory for accessing the MG system (Whitmarsh et al., 1999;Wang, Fang et al., 2012;C. ...
Article
Mobile government (MG) being a critical subset of e-government system has gained a lot of prominence among the practitioners and researchers. With its complex nature, MG has not achieved the desired success rate, and has therefore led to numerous research studies. Also, with the diverse literatures on MG, it is critical to take stock of the existing literature and systematically categorise all documents. This will assist the aspiring researchers in understanding the topic, categorising and systematically deriving the objectives for their study. Thus, this study performs a systematic review using a bibliometric analysis (co-citation analysis and bibliometric coupling analysis) using Scopus database on MG research. The resulting clusters in these two approaches are then analysed to identify the seminal works, type of study (i.e., themes) in MG research and to determine research gaps for directing future studies. Overall, this study gives clear picture of MG research reflecting on various themes of work and its related seminal works. It also directs future orientation that contributes significantly to the field.
... Both service providers and governments seek for certain services with the capacity to satisfy the demands of users at any time and place. Also, globally, organizations are seeking to improve the citizen's life quality through the integration of information and communications technologies (ICT) with public services including municipal infrastructure and public transport [3]. The use of mobile services assists in the improvement of delivery while lowering the cost and at the same time, the channels for the interaction among people are increased. ...
Article
Full-text available
Use of mobile services is an integral part of today’s life. Organizations, government agencies as well as service providers in the market employ mobile services or application in reaching their citizens or users worldwide. Notably, service failure issues might frustrate users in using mobile service, but usually, service providers would employ the strategy of recovery as solution. Recovery strategy aims to sustain the relationship with users following service failure. Somehow, the factors that might impact recovery process are unclear. It is also unclear if users will use the service again following the completion of recovery process. Hence, in this study, a survey on 743 adults was carried out, and the data were analyzed using SEM to determine the factors that impact users’ recovery satisfaction the most and the impact of recovery satisfaction on citizens loyalty to use mobile government in the future. The finding of this study illustrated that expect of self-efficacy, all factors proposed in the research model found to has a significant impact on recovery satisfaction. Among all the supported hypothesis, the highest impact on recovery satisfaction comes from perceived trust in government as the initial predictor to use the service
Article
Full-text available
This research presents a quantitative analysis of 121 published papers specific to Jordan's e-government researches (EGR) throughout the years 2009- January 2021 through a meta-analysis systematic process. The focus EGR specific to Jordan is due to the fact that the e-government studies conducted in Jordan context are among the highest publications in developing countries. Study results reveal that the majority of EGR in Jordan have adopted a quantitative approach rather than qualitative or multi-method evaluation approaches and none of EGR adopted a design research approach or action research approach involved researcher(s) and practitioner(s). While a fair number of EGR take a theory-based approach, the majority of them rely on common and traditional theories (e.g., TAM and UTAUT), neglecting many other potential theories to use e.g., expectation confirmation and technology-organization-environment theories. EGR in Jordan has overwhelmingly focused on specific e-government topics (e.g., citizens' acceptance and adoption besides evaluating e-government websites or portals) and thus more research orientation should go further toward other recent topics e.g., continuous-use intention and /or post-adoption, citizens resistance, privacy and security issues as well as to capture new trends and priorities in the e-government domain such as anticipatory e-government, smart government, participatory governance, smart city, and data-centric governance that all are critically required to advance EGR in Jordan. The study findings provide opportunities for future areas of research, which contribute to more diversity of EGR in Jordan. The study helps to develop reliable knowledge and leads to ideas for new studies that are anticipated to be of significant value for both academics and practitioners. While the findings might be restricted to Jordan's context, nevertheless, it would encourage other e-government scholars to conduct similar studies for their own countries.
Conference Paper
Data mining is becoming increasingly important in the data-driven society in recent years. Unfortunately, privacy of the individuals fails to be protected and considered deliberately. It’s a significantly challenging question that outputs of data mining models can be applied to preserve privacy while simultaneously maintaining analyzing capability. With advancements in big data, series of big data computing platforms have evolved into widely utilized paradigms for data mining. However, users’ sensitive data which are outsourced on the cloud and mined on open-sourced computing platform. It poses such severe threats that measures must be taken to protect the privacy of individuals’ data. Regarding this issue, much fruitful work has been done on designing privacy preserving data mining approaches for improving big data computing platform security and privacy of individuals. In this paper, a systematic investigation of a wide array of the state-of-the-art privacy preserving data mining (PPDM) techniques has been performed from different aspects on threat model, anonymity, secure multiparty computation (SMC), differential privacy. We are focused on improving data privacy in these sensitive areas on big data computing platforms. Hopefully, our work aims to highlight the urgent need for applying privacy preserving data mining approaches on big data computing platforms. Moreover, a better understanding of this research area may benefit the usage of big data and future exploration.
Conference Paper
k-means is one of the most widely used clustering algorithms by far. However, when faced with massive data clustering tasks, traditional data mining approaches, especially existing clustering mechanisms fail to deal with malicious attacks under arbitrary background knowledge. This could result in violation of individuals’ privacy, as well as leaks through system resources and clustering outputs while untrusted codes are directly performed on the original data. To address this issue, this paper proposes a novel, effective hybrid k-means clustering preserving differential privacy in Spark, namely Differential Privacy Hybrid k-means (DPHKMS). We combined Particle Swarm Optimization and Cuckoo-search to initiate better cluster centroid selections in the framework of big data computing platform, Apache Spark. Furthermore, DPHKMS is implemented and theoretically proved to meet ε-differential privacy with determinative privacy budget allocation under Laplace mechanism. Finally, experimental results on challenging benchmark data sets demonstrated that DPHKMS, guaranteeing availability and scalability, significantly improves existing varieties of k-means and consistently outperforms the state-of-the-art ones in terms of privacy-preserving, verifying the effectiveness and advantages of incorporating heuristic swarm intelligence.
Conference Paper
Cloud computing security is the key bottleneck that restricts its development, and access control on the result of cloud computing is a hot spot of current research. Based on the somewhat homomorphic encryption BGN and combined with Green’s scheme that proposed outsourcing the decryption of CP-ABE (Ciphertext-Policy Attribute-Based Encryption) ciphertexts, we constructed a BGN type outsourcing the decryption of CP-ABE ciphertexts. In our construction, partial decryption of ciphertexts is outsourced to the cloud, and only users whose attribute meets the access policy will get the correct decryption. And the scheme supports arbitrary homomorphic additions and one homomorphic multiplication on ciphertexts. Finally, we prove its semantic security under the subgroup decision assumption and compare it with other schemes.
Article
Full-text available
This study develops and presents a proposed framework for the measurement of mobile government (m-government) services. The measurement framework consists of: (i) identification/categorisation of m-government services; (ii) sophistication stages of these services; and (iii) indicators to evaluate their progress. With respect to the methodological approach followed in the study, twenty e-government services clustered by type of activity and interaction level are ranked for importance in terms of criteria that characterise the mobile setting. Moreover, core indicators used for e-government are examined in terms of their appropriateness to the mobile setting. According to the authors’ findings, three m-government service clusters are established, assisting governments to prioritise services to mobile users. A modification in the sophistication model for e-services is recommended for application in m-government. Finally, the proposed indicators are mainly user-focused, in accordance with the personalised nature of services delivered through mobile devices.
Article
Full-text available
What value does information technology (IT) create in governments and how does it do so? While business value of IT has been extensively studied in the information systems field, this has not been the case for public value. This is in part due to a lack of theoretical bases for investigating IT value in the public sector. To address this issue, we present a conceptual model on the mechanism by which IT resources contribute to value creation in the public-sector organizations. We propose that the relationship between IT resources and organizational performance in governments is mediated by organizational capabilities and develop a theoretical model that delineates the paths from IT resources to organizational performance, drawing upon public-value management theory. This theory asserts that public managers, on behalf of the public, should actively strive to generate greater public value, as managers in the private sector seek to achieve greater private business value. On the basis of the review of public-value management literature, we suggest that the following five organizational capabilities mediate the relationship between IT resources and public value – public service delivery capability, public engagement capability, co-production capability, resource-building capability, and public-sector innovation capability. We argue that IT resources in public organizations can enable public managers to advance public-value frontiers by cultivating these five organizational capabilities and to overcome conflicts among competing values.
Conference Paper
Full-text available
Deployment of new emerging technologies have attracted and motivated a great deal of attention from researchers and scientist in various disciplines to develop and design the learning management systems, virtual learning environments and conference systems with support of MCL for education and other organizations. This technological revolution of connecting large numbers of potential learners through mobile telephony creates new challenges for developing the new architectures for education and business. Some of the MCL paradigms are proposed and implemented in various fields such as university, corporate, health and military but they lack completeness. This paper introduces new server and client side architectural based prototypes with support of various working components, which help the users in obtaining the contents from server to meet the pedagogical requirements. This paper has also proposed and integrated the features of content-server with cache-server to provide the faster delivery of contents for MCL. Finally, The paper proposes and implements some features of a novel “group application” to support asynchronous and synchronous and multimodal features to facilitate the students for MCL. This contribution will encourage and motivate the students to pursue their education again because the students will be able to get the course contents at anytime and anywhere.
Chapter
The chapter examines and discusses the approach taken by a regional government to implement e-government as a means of providing e-services, thus enhancing accountability and performance management Specifically, the purpose of this chapter is to acquire a fundamental understanding of how e-services are adopted within regional governments in Spain and to determine precisely which factors have most impact on their adoption. Furthermore, we identify critical success factors (CSF) for innovation and the adoption of e-services in Andalusia, the most populated region of Spain. Our analysis of this case study identifies nine CSFs in the adoption of e-services in Andalusia.
Book
New state-of-the-art techniques for analyzing and managing Web data have emerged due to the need for dealing with huge amounts of data which are circulated on the Web. Web Data Management Practices: Emerging Techniques and Technologies provides a thorough understanding of major issues, current practices, and the main ideas in the field of Web data management, helping readers to identify current and emerging issues, as well as future trends in this area. Web Data Management Practices: Emerging Techniques and Technologies presents a complete overview of important aspects related to Web data management practices, such as: Web mining, Web data clustering, and others. This book also covers an extensive range of topics, including related issues about Web mining, Web caching and replication, Web services, and the XML standard.
Conference Paper
E-government plays an increasingly significant role in our day-to-day lives. Mobile government (m-Government) is a subset and extension of electronic government e-Government comprising of an alternative channel for governments to improve governments' fundamental functions and providing information and services. This paper introduces an interactive framework for m-Government that improves governmental public services with self-dependability and adaptability in the highly dynamic contextual environment. The proposed interactive framework is composed of eight elements: front ending organizations portal and personalization, existing e-government service systems, interaction and transaction, vertical & horizontal integration channels, electronic participation, m-government core platform, delivery service channels, and end customer. Experiments were conducted to validate the framework's feasibility and results demonstrate the capabilities of the proposed framework.
Article
Mobile Government is an important area for responsible governments to harness and utilise efficiently. The benefits of increased access, in-situ service delivery and increased productivity, make mobile government a worthwhile venture for various levels and agencies of government. This paper suggests greater emphasis be placed on legislative and regulatory considerations during design and implementation of Mobile Government initiatives, and during any post implementation or periodic reviews. The observations apply regardless of jurisdiction or the level of technology utilised.
Article
As the research body on information technology (IT) in government aims at consolidation, it faces one of the common fundamental challenges of scholarly research: how to fill the theory–practice gap, and to contribute to knowledge and practice through means of partnership with stakeholders, co-creation, and action research. Using Van de Ven's framework of ‘engaged scholarship’, this paper reports an analysis of 55 empirical studies on impacts of IT in government published in international journals in the period 2003–2009, assessing the presence of stakeholder involvement in the problem formulations, theory building, research designs, and problem solving of the studies. Findings show that fewer than a quarter of the studies considered are based on some form of engagement with key stakeholders, and that half of these describe or explain public sector IT processes from a detached and external perspective. The paper concludes by providing inputs for a discussion on the role of engaged scholarship in research on IT in the public sector.