Does high e-government adoption assure stronger security? Results from a cross-country analysis of Australia and Thailand

Abstract We present the first comprehensive audit and comparison of e-government website security in two countries. Australia was selected for its high level of e-government adoption, while Thailand was selected in contrast as a developing nation. Through our audit of 800 pages across 40 websites, we reveal numerous security vulnerabilities suggesting that the high adopters of e-government may not always be providing better protection to their citizens. Alarmingly, the most basic web security measure, the use of Hypertext Transfer Protocol Secure encryption was only used in half of Australian and one-third of Thai sites. Our methodology included content analysis of policies and encryption, followed by security vulnerability testing, to provide the first baseline data on these two countries. Statistical analysis suggests that far from being the benchmark for security, Australian e-government sites do not significantly differ from Thai sites in their vulnerability level. The implications of these findings are examined, and recommendations are made for practice. It is hoped that these insights into the current state of security provide a needed stimulus to focus more on the practical information security aspects of e-government.

[1]  Berry Tholen The changing border: developments and risks in border control management of Western countries , 2010 .

[2]  Lemuria Carter,et al.  Impact of citizens' privacy concerns on e-government adoption , 2018, DG.O.

[3]  Zhitian Zhou,et al.  Study on the E-government Security Risk Management , 2008 .

[4]  Hangjung Zo,et al.  User Acceptance of e-government Services: Examining an e-tax Filing and Payment System in Thailand , 2016, Inf. Technol. Dev..

[5]  France Bélanger,et al.  The utilization of e‐government services: citizen trust, innovation and acceptance factors * , 2005, Inf. Syst. J..

[6]  Gustavo Gonzalez Granadillo,et al.  Decisive Heuristics to Differentiate Legitimate from Phishing Sites , 2011, 2011 Conference on Network and Information Systems Security.

[7]  Rita Ismailova,et al.  Web site accessibility, usability and security: a survey of government web sites in Kyrgyz Republic , 2015, Universal Access in the Information Society.

[8]  Salvatore Nicosia,et al.  Government data does not mean data governance: Lessons learned from a public sector application audit , 2015, Gov. Inf. Q..

[9]  Blessing Ojuloge,et al.  Web application vulnerability assessment and policy direction towards a secure smart government , 2014, Gov. Inf. Q..

[10]  Michael Awoleye,et al.  Technological assessment of e-government web presence in Nigeria , 2012, ICEGOV.

[11]  Christopher G. Reddick,et al.  Why e-government projects fail? An analysis of the Healthcare.gov website , 2016, Gov. Inf. Q..

[12]  M. J. Moon The Evolution of E-Government among Municipalities: Rhetoric or Reality? , 2002 .

[13]  Tegawendé F. Bissyandé,et al.  Vulnerabilities of Government Websites in a Developing Country - the Case of Burkina Faso , 2015, AFRICOMM.

[14]  Nicholas Faulkner,et al.  Can behavioural interventions increase citizens' use of e-government? Evidence from a quasi-experimental trial , 2019, Gov. Inf. Q..

[15]  Jensen J. Zhao,et al.  Opportunities and threats: A security assessment of state e-government websites , 2010, Gov. Inf. Q..

[16]  L. Lee-Kelley,et al.  Citizens' attitudes towards e‐government and e‐governance: a UK study , 2008 .

[17]  William Golden,et al.  Measuring eGovernment success: a public value approach , 2016, Eur. J. Inf. Syst..

[18]  Jakob Nielsen,et al.  Improving a human-computer dialogue , 1990, CACM.

[19]  Shin-Yuan Hung,et al.  Determinants of user acceptance of the e-Government services: The case of online tax filing and payment system , 2006, Gov. Inf. Q..

[20]  France Bélanger,et al.  A Cross-Cultural Comparison of Electronic Government Adoption in Spain and the USA , 2014, Int. J. Electron. Gov. Res..

[21]  Yogesh Kumar Dwivedi,et al.  Citizen's adoption of an e-government system: Validating extended social cognitive theory (SCT) , 2015, Gov. Inf. Q..

[22]  Yu-Che Chen,et al.  Transforming local e-government services: the use of application service providers , 2001, Gov. Inf. Q..

[23]  Almantas Kakareka,et al.  What is Vulnerability Assessment , 2013 .

[24]  Eman Salem Alashwali,et al.  What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS , 2018, SecureComm.

[25]  Dae-Ho Byun,et al.  Evaluating usability, user satisfaction and intention to revisit for successful e-government websites , 2011, Electron. Gov. an Int. J..

[26]  France Bélanger,et al.  Trust and Risk in eGovernment Adoption , 2008, AMCIS.

[27]  Yan Han,et al.  Digital content management: the search for a content management system , 2004 .

[28]  Izzat Alsmadi,et al.  E-government website security concerns and citizens' adoption , 2016, Electron. Gov. an Int. J..

[29]  Enrique Bonsón,et al.  Citizens' engagement on local governments' Facebook sites. An empirical analysis: The impact of different media and content types in Western Europe , 2015, Gov. Inf. Q..

[30]  Mohd Zamri Murah,et al.  Web Assessment of Libyan Government e-Government Services , 2018 .

[31]  Kjell Jørgen Hole,et al.  Vulnerabilities in e-governments , 2007, Int. J. Electron. Secur. Digit. Forensics.

[32]  Mete Yildiz,et al.  E-government research: Reviewing the literature, limitations, and ways forward , 2007, Gov. Inf. Q..

[33]  Paul T. Jaeger,et al.  Using ICTs to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies , 2010, Gov. Inf. Q..

[34]  Sara Hofmann,et al.  Close encounters of the digital kind: A research agenda for the digitalization of public services , 2019, Gov. Inf. Q..

[35]  Tore Dybå,et al.  Applying Systematic Reviews to Diverse Study Types: An Experience Report , 2007, ESEM 2007.

[36]  Marijn Janssen,et al.  Big and Open Linked Data (BOLD) in research, policy, and practice , 2016, J. Organ. Comput. Electron. Commer..

[37]  Robin Gauld,et al.  Do they want it? Do they use it? The 'Demand-Side' of e-Government in Australia and New Zealand , 2010, Gov. Inf. Q..

[38]  Steve Drew,et al.  Implementation of e-Government: Advantages and Challenges , 2010 .

[39]  David Murray,et al.  Towards cultural translation of websites: a large-scale study of Australian, Chinese, and Saudi Arabian design preferences , 2017, Behav. Inf. Technol..

[40]  Li Jiang,et al.  Trust and Electronic Government Success: An Empirical Study , 2008, J. Manag. Inf. Syst..

[42]  Yuquan Shi,et al.  E-Government Web Site Accessibility in Australia and China , 2006 .

[43]  K. Bwalya,et al.  E-government implementation in Zambia – prospects , 2014 .