The Electronic Journal of e-Government publishes perspectives on topics relevant to the study, implementation and management of e-Government

For general enquiries email administrator@ejeg.com

Click here to see other Scholarly Electronic Journals published by API
For a range of research text books on this and complimentary topics visit the Academic Bookshop

Information about the European Conference on Digital Government is available here

 

Journal Article

e‑Procurement: A Tool to Mitigate Public Procurement Fraud in Malaysia?  pp150-160

Khairul Saidah Abas Azmi, Alifah Aida Lope Abdul Rahman

© Dec 2015 Volume 13 Issue 2, ECEG2015, Editor: Carl Adams, pp75 - 160

Look inside Download PDF (free)

Abstract

Abstract: The major aim of this paper is to explore and analyse the views of Malaysian public officials on how e‑Procurement helps mitigate procurement fraud. While it is fully legitimate for private enterprises to bid for public works, in many cases ther e is inappropriate granting of public money to non‑qualifying private business in a fraudulent manner. The visibility of fraud losses in the public sector has undermined the delivery of public services. Decrease of fraud incidents can improve the countryâ  ’s growth in terms of infrastructure, by providing facilities to improve healthcare and education, to combat poverty, and to fund security and defence. This paper analyses the implementation of E‑Government in Malaysia, which has transformed the public s ervice into a dynamic and diverse environment for government activities. Electronic Procurement (e‑Procurement) can be used as a tool to mitigate fraudulent activities in public organisations by ensuring accountability, transparency and the achievement of best value for money contracts. In this qualitative study, a political economy approach was used to investigate the social phenomenon. Documentary analysis and semi‑structured interviews via the Snowball Sampling Method (SSM) were conducted for inves tigating public procurement fraud in Malaysia. The personal views of 13 procurement officers from various Malaysian government agencies were examined. Their perspectives, views and individual experiences shed light on how e‑Procurement helps to alleviate public procurement fraud in Malaysia. The findings showed that that e‑Procurement can (1) dispute political and economic forces in government purchasing processes, (2) manage demands and interference when rewarding government contracts, and (3) be u sed efficiently at the nexus of government and businesses. Thus, this study has a number of practical implementations and contributions based on the experience and views on e‑Procurement by Malaysian public officials. It can also facilitate policy makers, enforcement agencies and researchers in understanding

 

Keywords: Keywords: e-procurement, public procurement, fraud, political economy approach, Malaysia

 

Share |

Journal Article

The Risk of e‑Voting  pp169-178

Thomas W. Lauer

© Oct 2004 Volume 2 Issue 3, Editor: Frank Bannister, pp147 - 218

Look inside Download PDF (free)

Abstract

World wide, there are various proposals for automating manual voting processes. This paper considers two different e‑voting schemes, Internet voting and direct recording electronic (DRE) voting systems, explicitly focusing on risk to the integrity of the voting process. Fair elections must assure voter authentication, vote confidentiality and integrity, and the ability to audit the election. E‑voting poses special challenges. The paper analyzes security risks that may threaten e‑voting schemes and makes recommendations.

 

Keywords: Internet voting, e-voting, direct recording electronic voting, IS security, risk analysis, voter fraud

 

Share |

Journal Article

Towards an Information Strategy for Combating Identity Fraud in the Public Domain: Cases from Healthcare and Criminal Justice  pp214-222

Marijn Plomp, Jan Grijpink

© Dec 2011 Volume 9 Issue 2, ECEG, Editor: Frank Bannister, pp93 - 222

Look inside Download PDF (free)

Abstract

Two trends are present in both the private and public domain: increasing interorganisational co‑operation and increasing digitisation. More and more processes within and between organisations take place electronically, on local, national and European scal e. The technological and organisational issues related to this prove to be difficult on a local scale and barely manageable on national and European scales. We introduce the theoretical framework of Chain‑computerisation, which explains large‑scale chain co‑operation as an answer to a dominant chain problem. Identity fraud proves to be the dominant chain problem in many chain co‑operation situations. Therefore, our main research question is: how to arrive at a successful information strategy to combat ide ntity fraud in the large‑scale processes that constitute the public domain? We demonstrate the problem of identity fraud on the basis of two Dutch cases, from the criminal justice chain and the healthcare sector. These cases are taken from our chain resea rch programme in which we test empirical findings against the theoretical framework of Chain‑computerisation to derive a successful chain‑specific information strategy. In both cases, the problem of identity fraud presents a threat to the chain co‑operati on. Identity fraud has to be tackled with an approach focused on large‑scale processes and with specific person‑oriented security procedures and instruments preventing identity fraud from happening undetected. This study forms an important contribution to information science and to the security realm that still pivots only on traditional authentication frameworks that cannot cope with wrong person identity fraud. In large‑scale situations, therefore, additional safeguards will be necessary. Taking into account that the problem of identity fraud rises in many other domains and countries as well, we conclude that it is a major threat to the European society. Finally, we argue that chain‑specific information systems with random identity verification enable combating identity fraud.

 

Keywords: chain-computerisation, interorganisational information systems, chain co-operation, information strategies within the public sector, identity management, identity fraud

 

Share |