The Electronic Journal of e-Government publishes perspectives on topics relevant to the study, implementation and management of e-Government

For general enquiries email administrator@ejeg.com

Click here to see other Scholarly Electronic Journals published by API
For a range of research text books on this and complimentary topics visit the Academic Bookshop

Information about the European Conference on Digital Government is available here

 
Journal Issue
Volume 9 Issue 2, ECEG / Dec 2011  pp93‑222

Editor: Frank Bannister

Download PDF (free)

The Role of National Culture on Citizen Adoption of eGovernment services: An Empirical Study  pp93‑106

Omar Al-Hujran, Mahmoud Al-dalahmeh, Anas Aloudat

Look inside Download PDF (free)

The use of Web 2.0 on Mexican State Websites: A Three‑Year Assessment  pp107‑121

Rodrigo Sandoval-Almazan, J. Ramon Gil-Garcia, Luis F. Luna-Reyes, Dolores E. Luna, Gabriela Diaz-Murillo

Look inside Download PDF (free)

Pan‑European Services in Slovenia  pp122‑131

Jaro Berce, Vasja Vehovar, Ana Slavec, Mirko Vintar

Look inside Download PDF (free)

Predictive Analytics in the Public Sector: Using Data Mining to Assist Better Target Selection for Audit  pp132‑140

Duncan Cleary

Look inside Download PDF (free)

Collaborative Network Analysis of two eGovernment Conferences: Are we Building a Community?  pp141‑151

Nusa Erman, Ljupco Todorovski

Look inside Download PDF (free)

A Multi‑Level Framework for ICT‑Enabled Governance: Assessing the Non‑Technical Dimensions of 'Government Openness'  pp152‑165

Misuraca Gianluca, Alfano, Giuseppe, Viscusi, Gianluigi

Look inside Download PDF (free)

Determinants of eGovernment Maturity in the Transition Economies of Central and Eastern Europe  pp166‑182

Princely Ifinedo, Mohini Singh

Look inside Download PDF (free)

The Challenges of Accelerating Connected Government and Beyond: Thailand Perspectives  pp183‑202

Asanee Kawtrakul, Intiraporn Mulasastra, Tawa Khampachua, Somchoke Ruengittinun

Look inside Download PDF (free)

Examining the Potential for Channel Shift in the UK Through Multiple Lenses  pp203‑213

Darren Mundy, Qasim Umer, Alastair Foster

Look inside Download PDF (free)

Towards an Information Strategy for Combating Identity Fraud in the Public Domain: Cases from Healthcare and Criminal Justice  pp214‑222

Marijn Plomp, Jan Grijpink

Look inside Download PDF (free)

Abstract

Two trends are present in both the private and public domain: increasing interorganisational co‑operation and increasing digitisation. More and more processes within and between organisations take place electronically, on local, national and European scal e. The technological and organisational issues related to this prove to be difficult on a local scale and barely manageable on national and European scales. We introduce the theoretical framework of Chain‑computerisation, which explains large‑scale chain co‑operation as an answer to a dominant chain problem. Identity fraud proves to be the dominant chain problem in many chain co‑operation situations. Therefore, our main research question is: how to arrive at a successful information strategy to combat ide ntity fraud in the large‑scale processes that constitute the public domain? We demonstrate the problem of identity fraud on the basis of two Dutch cases, from the criminal justice chain and the healthcare sector. These cases are taken from our chain resea rch programme in which we test empirical findings against the theoretical framework of Chain‑computerisation to derive a successful chain‑specific information strategy. In both cases, the problem of identity fraud presents a threat to the chain co‑operati on. Identity fraud has to be tackled with an approach focused on large‑scale processes and with specific person‑oriented security procedures and instruments preventing identity fraud from happening undetected. This study forms an important contribution to information science and to the security realm that still pivots only on traditional authentication frameworks that cannot cope with wrong person identity fraud. In large‑scale situations, therefore, additional safeguards will be necessary. Taking into account that the problem of identity fraud rises in many other domains and countries as well, we conclude that it is a major threat to the European society. Finally, we argue that chain‑specific information systems with random identity verification enable combating identity fraud. 

 

Keywords: chain-computerisation, interorganisational information systems, chain co-operation, information strategies within the public sector, identity management, identity fraud

 

Share |