Protecting personal data in E-government: A cross-country study

Abstract This paper presents the findings of a comparative study of laws and policies employed to protect personal data processed in the context of e-government in three countries (the United States, Germany, and China) with rather different approaches. Drawing on governance theory, the paper seeks to document the mechanisms utilized and to understand the factors that shape the governance modes adopted. The cases reveal that national government regulations have not kept pace with technological change and with the current information practices of the public sector. Nonetheless, traditional government regulation remains the major governance mode for the issue under discussion. Self-regulation and code-based regulation serve supplementary roles to traditional government regulation. National context is found to impact the form and level of data protection and the choice of governance modes.

[1]  Anil Kumar Interview with: Rainey Reitman Director of Communications Privacy Rights Clearinghouse , 2010 .

[2]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[3]  J. Fountain Bureaucratic Reform and E-Government in the United States: An Institutional Perspective , 2007 .

[4]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[5]  J. Fountain Building the Virtual State: Information Technology and Institutional Change , 2001 .

[6]  Mark Beatty,et al.  Internet Governance: The New Frontier of Global Institutions , 2010 .

[7]  H. P Gassmann,et al.  OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .

[8]  Telecommunications Board,et al.  Findings and Recommendations , 2014 .

[9]  J. W. DeCew In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .

[10]  Anthony Ogus,et al.  Rethinking Self-Regulation , 1995 .

[11]  Lawrence B. Solum Models of Internet Governance , 2008, Internet Governance - Infrastructure and Institutions.

[12]  Linda A.J. Senden,et al.  Soft Law, Self-Regulation and Co-Regulation in European Law: Where Do They Meet? , 2006 .

[13]  Milton L. Mueller Networks and States: The Global Politics of Internet Governance , 2010 .

[14]  Rolf H. Weber Regulatory Models for the Online World , 2002 .

[15]  B. Flyvbjerg Five Misunderstandings About Case-Study Research , 2006, 1304.1186.

[16]  Fred H. Cate,et al.  Privacy in the Information Age , 1997 .

[17]  David Lazer,et al.  Governance and Information Technology: From Electronic Government to Information Government , 2007 .

[18]  Kathleen Hale,et al.  Technology, politics, and e-commerce: Internet sales tax and interstate cooperation , 2011, Government Information Quarterly.

[19]  Peter Slominski,et al.  Regulation Remixed: Institutional Change Through Self- and Co-Regulation in the Mediamatics Sector , 2004 .

[20]  P. Jaeger,et al.  Social Information Behavior and the Democratic Process: Information Poverty, Normative Behavior, and Electronic Government in the United States , 2004 .

[21]  Omar E. M. Khalil,et al.  e-Government readiness: Does national culture matter? , 2011, Gov. Inf. Q..

[22]  Gerry Stoker,et al.  Governance Theory and Practice: A Cross-Disciplinary Approach , 2008 .

[23]  Ingo Take,et al.  Regulating the Internet infrastructure: A comparative appraisal of the legitimacy of ICANN, ITU, and the WSIS , 2012 .

[24]  Martina Gillen,et al.  Internet Co-Regulation: European Law, Regulatory Governance and Legitimacy in Cyberspace , 2012, Int. J. Law Inf. Technol..

[25]  R. McNeal,et al.  Citizen–Government Interaction and the Internet: Expectations and Accomplishments in Contact, Quality, and Trust , 2008 .

[26]  N. Ben Fairweather,et al.  The Key Organisational Issues Affecting E-Government Adoption in Saudi Arabia , 2009, Int. J. Electron. Gov. Res..

[27]  Barbara B. Flynn,et al.  Empirical research methods in operations management , 1990 .

[28]  Yuan Long,et al.  Synthesizing e-government stage models - a meta-synthesis based on meta-ethnography approach , 2005, Ind. Manag. Data Syst..

[29]  Jayoti Das,et al.  Global E-Government and the Role of Trust: A Cross Country Analysis , 2009, Int. J. Electron. Gov. Res..

[30]  Margaret Reid How Governments Privatize: The Politics of Divestment in the United States and Germany , 2003 .

[31]  Lucas D. Introna Privacy and the computer: why we need privacy in the information society , 1997 .

[32]  Christian Fuchs,et al.  Implications of Deep Packet Inspection (DPI) Internet Surveillance for Society , 2012 .

[33]  Yuehua Wu Personal data protection in e -government: Globalization or glocalization? A comparative study of the United States, Germany and China , 2010 .

[34]  William J. Long,et al.  Personal data privacy protection in an age of globalization: the US-EU safe harbor compromise , 2002 .

[35]  Maeve McDonagh E-Government in Australia: the Challenge to Privacy of Personal Information , 2002, Int. J. Law Inf. Technol..

[36]  Graham Greenleaf,et al.  China’s Proposed Personal Information Protection Act , 2008 .

[37]  Philip Eijlander,et al.  Possibilities and Constraints in the Use of Self-Regulation and Co-Regulation in Legislative Policy : Experiences in the Netherlands-Lessons te Be Learned for the EU? , 2007 .

[38]  Judee K. Burgoon,et al.  Maintaining and Restoring Privacy through Communication in Different Types of Relationships , 1989 .

[39]  David G. Post,et al.  Law and Borders--The Rise of Law in Cyberspace , 1996 .

[40]  Gerda Falkner,et al.  Modes of governance: towards a conceptual clarification , 2007 .

[41]  Donsia R. Strong The computer matching and Privacy Protection Act of 1988: necessary relief from the erosion of the Privacy Act of 1974 , 1988 .

[42]  France Bélanger,et al.  The utilization of e‐government services: citizen trust, innovation and acceptance factors * , 2005, Inf. Syst. J..

[43]  A. Chadwick Bringing E-Democracy Back In , 2003 .

[44]  Johannes M. Bauer,et al.  Internet Governance: Theory and First Principles , 2005 .

[45]  J. Rubenfeld The Right of Privacy , 1989 .

[46]  Robert Gellman,et al.  Data privacy law: A study of United States data protection , 1997 .

[47]  J. Barlow A Declaration of the Independence of Cyberspace , 2021, Commonplace.

[48]  J. Reidenberg Lex Informatica: The Formulation of Information Policy Rules through Technology , 1997 .

[49]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[50]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[51]  James N. Rosenau,et al.  Governance without Government: Order and Change in World Politics , 1992 .

[52]  D. West E‐Government and the Transformation of Service Delivery and Citizen Attitudes , 2004 .

[53]  Albert A. Harrison,et al.  Living Aloft: Human Requirements for Extended Spaceflight , 2005 .

[54]  Thea van der Geest,et al.  A cue or two and I'll trust you: Determinants of trust in government organizations in terms of their processing and usage of citizens' personal information disclosed online , 2012, Gov. Inf. Q..

[55]  Christine Nadel,et al.  Case Study Research Design And Methods , 2016 .

[56]  A. Ho Reinventing Local Governments and the E‐Government Initiative , 2002 .

[57]  Devendra Potnis,et al.  Measuring e-Governance as an innovation in the public sector , 2010, Gov. Inf. Q..

[58]  Jeffery L. Johnson Privacy and the judgment of others , 1989 .

[59]  Saul Levmore,et al.  The Offensive Internet: Speech, Privacy, and Reputation , 2011 .

[60]  Joel R. Reidenberg,et al.  Resolving Conflicting International Data Privacy Rules in Cyberspace , 2000 .

[61]  Sandra Braman,et al.  Change of state: Information, policy and power , 2007, First Monday.

[62]  Stephen M. Mutula E-Government Readiness , 2010 .