Font Size: a A A

Empirical Study On G2G E-government Information Sharing And Security

Posted on:2009-04-05Degree:DoctorType:Dissertation
Country:ChinaCandidate:J FanFull Text:PDF
GTID:1119360305456528Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
Information sharing among government agencies is the requirement for setting up"large-department system", is the basic approach for the realization of political system reform and"service-oriented"government, and is the necessary condition of government scientific decision and perfect decision information support systems. Electronic tools provide an effective way to realize information sharing among government agencies. However, due to many factors, especially human barriers, information sharing in China remains a great of challenge.Based on the present development of G2G information sharing in China, several questions on G2G information sharing are researched in the dissertation. The main research clue is as following: management methodology research of G2G information sharing---->layered behavior characteristics analysis of G2G information sharing in Chinese context---->the influencing factors identification of realization degree and actual impact of G2G information sharing in Chinese context---->representative factor analysis: information security during information sharing processes.The main work and conclusion is as following:Firstly, based on the explanation of basic definitions, the G2G information sharing literatures are reviewed from three aspects----management, technology and economics. And also the literatures on information security of e-government are reviewed from three aspects---- management, technology and economics. The research scale and research questions are put forward after the analysis and comment on present literatures.Secondly, research on G2G information sharing management methodology based on G2B business processes analysis. Information relationships among different traditional G2B business processes are analyzed and three G2G information sharing modes are set up: information sharing among demanded information and demanded Information; information sharing among demanded information and produced Information; information sharing among produced information and produced Information. Integrated with existing management policies for e-government in China, a system of government information source distributions and sharing management is brought forward. With the management methodology above, the G2B business processes are design based on G2G information sharing, including non-G2G information sharing process, partical G2G information sharing process and complete G2G information sharing process. The management methodology and process design ideas are applied into a practical program of Shanghai industrial and commercial administration inter-operation system. Unfortunately, it is found that complete G2G information sharing processes usually can't be carried out with many objective and subjective constraints.Thirdly, an in-depth field study on layered behavior characteristics of G2G information sharing in Chinese context. Trying to analyze the objective and subjective environments of G2G information sharing in a systematic method, the Layered Behavior Model in the field of large software development is applied to set up the layered behavior model of G2G information sharing which is composed of law and policy authority layer, upper-level managerial authority layer, inter-agency partnership layer, organizational readiness layer and individual expectation layer. With the background of two projects----"Fengxian Enterprises Reputation Platform"and"Shanxi E-Port", the characteristics of different stakeholder layers are discussed by which an extended model of layered behavior is formed to be the basis of survey study.Fourthly, a survey study on influencing factors of the realization degree and actual impact of G2G information sharing in Chinese context. With the purposes of identifying the key factors that influence G2G information sharing in Chinese context, a conceptual model is set up based on the research results of in-depth field study, innovation diffusion theory, social exchange theory and G2G information sharing theories. Aimed at economical and financial services and regulation agencies as samples, the questionnaires are taken in 42 functional agencies in Shannxi province, Shanxi province, Shanghai and Ningbo and 214 effective questionnaires are obtained. With empirical testing by Structural Equation Model(SEM), the new factor----GuanXi is found significantly for G2G information sharing, authority of upper-level managerial agency, compatibility, top-management support, cost, and expected benefits and risks lead to a significant influence on G2G information sharing. However, interagency trust and IT capability have not been proved to be significant. Especially, information security in sharing processes is a significant factor for G2G information sharing.Fifthly, research on a representative factor---information security during sharing processes. Based on the research result of the third and fourth parts, information security is a significant factor for G2G information sharing. Aimed at information security of public or enterprises'by information misuse (abuse) behavior of employees in government agencies, the threat characteristics are identified for every processes of G2G information sharing. Then, based on Security Action Theory (SAT), a conceptual model of information security active countermeasures for G2G information sharing processes is set up. Involved with 21 government information departments and 124 effective questionnaires, the perceived effect of four active countermeasures are tested and ranked by empirical study. The results show that information security software is the first urgent need with most significant effect, for every information sharing process, then are information security awareness training and information security monitoring practice. However, information security policy is the least need by with the weakest effect every process. Otherwise, based on General Deterrence Theory(GDT), the deterrence certainty and deterrence severity are tested, the results show that information security policy and information security awareness training have significant effects on deterrence severity, information security monitoring practice have a significant effect on deterrence certainty.The main innovative ideas can be concluded as following:Firstly, setting up G2G information sharing management methodology based on G2B business processes. At present, the management systems of information sharing in China such as laws, policies, strategies and regulations, most of them are oriented around principle instructions, or oriented around technological standards. However, there is still lack of accurate government information or information sharing management systems. Most of agencies still feel shortage of certain instructions and references.Through the analsis of information relationships among different traditional G2B business processes, three information sharing modes among demanded information and produced information are set up. And also a system of government information source distributions and sharing management is brought forward. These will provide the reference management methodology for the operation of G2G information sharing and the design of G2B one-stop business processes.Secondly, the layered behavior model of G2G information sharing and the influencing factors model of realization degree and impact are set up. Most existing literatures on G2G information sharing paid much attention on western governments environments. However, there is a great gap in politics, cultures, systems, organizational structures, and informalization degree between China and western countries. Therefore, it is necessary to set up the theoretical model of G2G information sharing in Chinese context.A layered behavior model of G2G information sharing is set up which are extended with the in-depth field study of two practical projects. Based on the in-depth field study, the conceptual modle of influencing factors on realization degree and impact is formed and survey questionnaire is designed which offer the reference for theoretical study on information sharing in China. Thirdly, key factors that influence G2G information sharing in Chinese context are specially identified which offer the action points for solving barriers during the process of G2G information sharing. Previous researches for G2G information sharing in China focus on economical study, cases analysis. Most of them are from the view of qualitative research while seldom are quantitative research. So it is necessary to test the factors that influence G2G information sharing by qualitative and quantative methods.These two research methods are integrated for the research (in-depth field study and survey study) and also get significant conclusions.It is found that social network is a new factor for G2G information sharing in Chinese context. The perceived risk of political benefit is the resistant source of G2G information sharing. It is also found IT capability does not play remarkable role on G2G information sharing in China as what most people have imaged. The results show that legal and policies has not show significant effects in the research. Specially, information security is proved to be an important factor which influences G2G information sharing.Fourthly, the active countermeasures system and its perceived effect of information security during the processes of G2G information sharing are researched based on which a precaution system of information security aiming at internal employees'information misuse (abuse) behaviors. Information security is one of the important factors that influence G2G information sharing. Most of the present researches about the information security are for army strategy, economic plans and diplomacy activities, however, there is seldom research on the security of common G2G government business information which concerns with public privacy and enterprises'business security. Much attention is paid on the information security of internal employees'information misuse (abuse) behaviors during G2G information sharing.Based on the security action theory (SAT) and general deterrence theory, a conceptual model of information security active countermeasures for G2G information sharing processes is set up which is aimed at internal employees'information misuse (abuse) behaviors. An empirical study is applied to test the perceived effects of four active countermeasures including: information security policy, information security awareness, information security monitoring practice and information security software. The research results provide certain practical instructions on assign security investment, and also offer a new idea for the application of those four countermeasures through setting up a precaution system of information security.
Keywords/Search Tags:G2G, E-Government Information Sharing, Management Methodology, Influencing Factors, Information Security, Active Security Countermeasures
PDF Full Text Request
Related items