Skip to main content

Home/ ITGS News/ Group items tagged e-government

Rss Feed Group items tagged

Madeline Brownstone

A survey of technology and government: The road to e-democracy | The Economist - 0 views

  •  
    "According to Cary Coglianese, an American e-government expert, imagining that online consultation will breathe new life into democracy "is a bit like imagining that giving automobile owners the ability to download technical manuals and order car parts online would turn a great number of them into do-it-yourself mechanics". Greater involvement by experts may make for more sensible rules, but it will not turn the system of public administration on its head. In short, badly managed organisations with computers will stay badly managed. That has been the lesson from private business, and it equally applies to the public sector, where e-government has barely begun to scratch the surface of what is possible. That is reason for disappointment, but also for hope. "
Madeline Brownstone

A survey of technology and government: E for express | The Economist - 0 views

  •  
    This article raises a number of issues related to e-government and the use of mobile phones for government transactions. It appears that India embarked ahead of more developed nations in the West to go electronic. The problem of access to phones and widespread illiteracy is discussed and raises some important concerns.
Madeline Brownstone

A survey of technology and government: Look it up on the web | The Economist - 0 views

  •  
    "EVEN the most curmudgeonly critic would have to admit the one great benefit of e-government: it comes twinned with i-government, where i stands for information. As readers under the age of 30 may be only dimly aware, before the internet age simply getting hold of information on any aspect of government was often far from straightforward. "
Madeline Brownstone

A survey of technology and government: Notional Health Server | The Economist - 0 views

  •  
    "O SEE how frustrating the wrong kind of e-government can be, look at "Choose and Book", the flagship project of Britain's £12.4 billion ($25 billion) programme "Connecting for Health"-the world's biggest non-military government computerisation programme. The aim is bold and inspiring: to allow patients in the National Health Service (NHS), advised by their doctors, to choose the treatment they want, and book an appointment when they want it. "
  •  
    This is likely NOT relevant for CS 2010
Madeline Brownstone

IX Infopoverty World Conference - Social Edge - 0 views

  •  
    "18-20 March 2009, New York, UN Headquarters, Milan, European Parliament Office Infopoverty is a common platform aiming at fighting poverty through the innovative use of the Information and Communication Technologies (ICT), able to provide broadband services such as telemedicine, e-learning, e-government, etc. to disadvantaged communities. Infopoverty is a Programme born in the ambit of the United Nations and coordinated by OCCAM, the Observatory for Cultural and Audiovisual Communication created by UNESCO in 1997. The Infopoverty Programme involves more than 100 international institutions that have taken part, in various forms, in the Infopoverty World Conference."
T Graham

Credit Cards At Risk from High-Tech Pickpockets? - CBS News - 2 views

  •  
    In this article Walt Augustinowicz has shown and proved many people in the public how they can be pick pocketed with out a single finger being laid upon them. They can have their credit cards, debit cards, and passports information stolen quite easily with a simply passing by of the scanner. With this advanced technology that makes paying for things easier, also makes it easier for others to pay for their things using the same card. The card number, the expiration date, the type of card, and even the person's name can be found out. This can show how the social/ethical issue involved is thus privacy - security is another possible issue. The IT system is the RFID tags/microchips. The stakeholders are the people whose information is getting stolen and the people who are stealing the information - people who make the RFID tags/microchips are also possible stakeholders. The area of impact is politics and government - but also can be business and employment. People's private information is at stake and electronic pickpockets can easily steal the information and order products.
  •  
    This article talks about the security concerns related to RFID technology. RFID technology is susceptible to theft because it broadcasts radio frequencies about the information embedded in the card. This makes it very easy for thieves in possession of a card reader. A person with intent to steal information could just walk past a card carrier with a card reader and pick up the theft victim's credit card numbers, expiration dates and sometimes even the card owner's name. 20% of the card information that was stolen in an experiment has RFID chips. RFID technology increases the chance of identity theft, even passports have RFID implemented in them, this makes them very vulnerable. Passports carry very sensitive information and anyone with a RFID card scanner could wake pass a passport carrier and gain his or her personal information. The stakeholders in this issue include the card carrier or passport carrier whose security is endangered, the information thief who is gaining unauthorized access to a person's personal information and the businesses such as Visa or MasterCard whose reliability is being endangered. This is a security issue that has hampered the positive buzz surrounding RFID technology and its convenience.
Elisavet M

Data Security Laws Seem Likely, So Consumers and Businesses Vie to Shape Them - 0 views

  •  
    During 2005, political organizations advocated for strict laws implementing data security enforcement, as rising concerns stemmed out of alarming statistical studies and research, revealing identity theft, credit card frauds and hacking as emerging and terrorizing practices overtaking much of the internet realm. This article introduces the beginning of the rise in public awareness, as technology strongly began to redirect the business world into another more digital phase. It was during that year, the primary stakeholders, also known as the businesses ( participants of e-commerce that stored, verified and utilized private consumer data), vocalized their needs clarifying their desire for the creation of constraints in regards to the consequences or negative implications of passing certain bills (for data security). The past exemplifies the various influences the introduction of data security measures, passed by the government legislatures, had upon newly initiated businesses; among the most significant implications discussed were: the need to build a secure database for reliable storage of clientele digital data with the utilization of particular software as well as improving business organizational structure in order to maximize the rate of security notifications towards consumers based on a foundation of rigid security standards. Far from the adaptation to such implications, the political crisis of establishing solid ground for a new set of security data policies and standards became an overwhelming process for politicians, congress members in conjunction with consumer and data privacy groups that rivaled in attaining the responsibilities of passing the needed laws. The politicians (stakeholders, holding the role of administering governmental legislation to stabilize data security breaches), came into opposition with the concerns of many members of advocacy groups (stakeholders, holding the responsibility of supervising and publicly navigating the direction of th
  •  
    continuation: the adjusted standards enforced by politicians). The problem of adhering to the instruction of newly created laws motioning businesses to appoint data security officers, draft policies, to comply with policies and procedures involving giving access to files in business databases for the Federal Trade Commission to check comes into collision with what most online businesses want to go through the process of doing. However, with the issue of security surfacing future consumer problems, as security breaches become major forces threatening the safe entering of digitally encrypted information (such as credit card codes), many companies become increasingly aware of the needed adherence to the strict security data laws, in order to continue profiting financially in order to keep the rate of consumer trust and payment increasing.
Mohammad A

Tech Companies Push to Digitalize Patients' Records - 0 views

  •  
    This article is regarding the use of Electronic Health Records, and digitalizing medical documents for the "betterment" of the medical staff, and the ease of use that databases provide as a solution to the IT issues that these facilities face. Many health care policy makers within the government, including President Obama, are advocating for the major shift in the use of electronic health records, and digitalizing patient information. However, only a small percentage of medical treatment offices have done so (approximately 17%). Basically, electronic health records document personal information of the patients, for example name, address, age, and medical issues that they face, making it much more easier for doctors and medical staff members to get into the use of e-prescriptions, providing treatment electronically. However, as information becomes digitalized, often times, major issues such as reliability of the IT equipment becomes and important aspect of the scenario. Major companies such as Dell and IBM are in the run to provide electronic health record databases for medical facilities to use. To these major stakeholders, these databases, when set-up properly, are basically a tool for health care providers to use; they can reduce costs and improve the type of care that is provided for patients. They also have the patient's entire medical history, and other medications, along with lab tests that if properly connected to databases, can ease the treatment guidelines. Thus the benefits include less trivial tests, reduced health related errors, and better care with less costs for patients. The IT systems that are provided, including faster networks with improved wireless connections and more financially affordable computers are what will basically be used within the medical facilities running on electronic health records with digitalized information. Also, there will be more space for these new machines to be placed in, since all
  •  
    continued... the paper documents are now going to be taking no physical space; entirely stored digitally. However these devices do not provide the solution of reliability that staff members may face when on the wireless networks and/or dealing with digital data. One solution that the article provides is the new Internet-based service model, known as cloud computing, in which much of the computing firepower and data reside in remote data centers, which doctors, nurses and staff would use via the Web browsers on their personal computers. Through cloud-computing, there is a more reliable and efficient way for medical staff members to document data without having system failures, and also if they ever plan on outsourcing, they can easily work with the database online.
Alex F

Can Barack Obama ensure all Americans have electronic health records by 2014? | Society... - 0 views

  • Personal health records are a concept enabling customers to gather their information from different providers (perhaps their primary and secondary care providers, for example) and store them in one place.
    • Alex F
       
      this is how health records are used, and how useful they would be when customers go to different providers and that way information can be passed on.
  • Portability and Accountability Act of 1996 which is meant to govern the security and privacy of EHRs.
    • Alex F
       
      this is historical information
  • Privacy
    • Alex F
       
      issue/ concern
  • ...5 more annotations...
  • health information exchanges, and the DHHS has already commissioned 15 contractors to work on trial implementations of prototype architectures.
  • 2007, according to research from George Washington University, 20-25% of outpatients were being served by some form of electronic health records (EHR) in the US
  • "meaningful use": the practical deployment of these records for e-prescribing, laboratory exchange and quality measurement
  • The American Medical Association says it is fully behind Connecting for Health.
  • Google and Microsoft have also endorsed Connecting for Health, a consortium that provided one of the original prototype architectures for the NHIE (and unconnected to the NHS IT organisation of the same name).
1 - 9 of 9
Showing 20 items per page