Electronic Government in the GCC Countries

The study investigated the practices of organisations in Gulf Cooperation Council (GCC) countries with regards to G2C egovernment maturity. It reveals that e-government G2C initiatives in the surveyed countries in particular, and arguably around the world in general, are progressing slowly because of the lack of a trusted and secure medium to authenticate the identities of online users. The authors conclude that national ID schemes will play a major role in helping governments reap the benefits of e-government if the three advanced technologies of smart card, biometrics and public key infrastructure (PKI) are utilised to provide a reliable and trusted authentication medium for e-government services.





References:
[1] A. Chadwick and C. May, "Interactions between states and citizens in
the age of the internet: e-government in the United States, Britain and
the European Union." Governance: an International Journal of Policy,
Administration and Institutions, vol. 16, no. 2, 271-300, 2003.
[2] S. Graham and A. Aurigi, "Virtual Cities, Social Polarisation, and the
Crisis in Urban Public Space." Journal of Urban Technology, vol. 4, no.
1, 19-52, 1997.
[3] K. Layne, and J.W. Lee, "Developing Fully Functional E-Government:
A Four Stage Model," Government Information Quarterly, vol. 2, 122-
36, 2001.
[4] P. J. Windley (2002) "eGovernment Maturity" [Online]. USA: Windleys'
Technolometria, Available: http://www.windley.com/docs/eGovernment%
20Maturity.pdf.
[5] P.R. Devadoss, S.L. Pan & J.C. Huang, "'Structurational analysis of egovernment
initiatives: a case study of SCO," Decision Support
Systems, vol. 34, 253-269, 2002.
[6] A. Leigh & R.D. Atkinson, Breaking Down Bureaucratic Barriers: The
next phase of digital government. USA: Progressive Policy Institute,
2001.
[7] P. Windley, Digital Identity. USA: O'Reilly Media, Inc, 2005.
[8] Digital ID World (2004) ÔÇÿWhat is Digital Identity?- [Online]. Digital
World. Available from: http://www.digitalidworld.com/local.php?op=view&
file=aboutdid_detail.
[9] A.M. Al-Khouri, "UAE National ID Programme Case Study,"
International Journal Of Social Sciences, vol. 1, no. 2, pp.62-69, 2007.
[10] C. Lambrinoudakis, S. Gritzalis, F. Dridi, & G., Pernul, "Security
requirements for e-government services: a methodological approach for
developing a common PKI-based security policy'," Computer
Communications, vol. 26, 1873-1883, 2003.
[11] G. Hoinville and R. Jowell, Survey Research Practice. London:
Heinemann Educational Books, 1978.
[12] A.N. Oppenheim, Questionnaire Design, Interviewing and Attitude
Measurement. London: Pinter, 1992.
[13] M. Shipman ÔÇÿInformation through asking questions-, in The Limitations
of Social Research (third edition). London: Longman. pp. 78-115, 1988.
[14] L.J. Camp (2003) ÔÇÿIdentity in Digital Government - A research report of
the digital government civic scenario workshop- (Online). Cambridge,
USA, Kennedy School of Government. Available: http://www.ljean.
com/files/identity.pdf.