Skip to main content

Part of the book series: Studies in Computational Intelligence ((SCI,volume 929))

  • 937 Accesses

Abstract

In the big data era, a shift from an existing provider-oriented e-government to a user-centered digital government is required. It is time to implement a consumer-centered digital government that can proactively provide customized services to the public rather than services that meet the public’s eye. This study analyzed prior studies and cases of e-government in order to derive the factors influencing the continuous use of e-government services provided by central government departments, local governments and public institutions, and to establish the causal relationship between each factor. Moreover, based on the information system success model and the technology acceptance model, the empirical analysis was used to determine how concerns about quality and privacy of e-government services and security affect usability, user satisfaction, and willingness to use them continuously. This contributed to presenting the policy direction and implications to the e-government in the contemporary paradigm of new IT and the fourth industrial revolution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Cho SH, Oh SY, Rou HG, Gim GY (2019) A study on the factors affecting the continuous use of e-government services-focused on privacy and security concerns. In: 2019 20th IEEE/ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD). IEEE, pp 351–361

    Google Scholar 

  2. National Intelligence Service, Ministry of Public Administration and Security, Ministry of Knowledge Economy, & Korea Communications Commission (2009) National Information Protection White Paper. Seoul, Korea

    Google Scholar 

  3. Aaker D (2003) The power of the branded differentiator. MIT Sloan Manage Rev 45(1):83; Al-Omari H, Al-Omari A (2006) Building an e-Government e-trust infrastructure. Am J Appl Sci 3(11):2122–2130

    Google Scholar 

  4. Kwon YM (2014) A study on the effect of service quality on service satisfaction and government trust in the government 3.0 era—focusing on the information gap between users in the metropolitan area. Doctoral dissertation. Available from RISS Dissertation and Theses database. (No. 13417330)

    Google Scholar 

  5. Lee CE (2008) The effect of relationship quality on citizen satisfaction with electronic government services. Doctoral dissertation. Available from RISS Dissertation and Theses database. (No. 11274561)

    Google Scholar 

  6. Lee HG, Lee SH (2009) Analysis of prior studies for elucidating future directions of information privacy: focusing on information privacy concerns online. Informatization Policy 16(2):3–16

    Google Scholar 

  7. Choi BM, Park MJ, Chae SM (2015) A study on factors affecting personal information technology acceptance behavior. Inf Syst Rev 17(3):77–94

    Google Scholar 

  8. Han KH (2012) An empirical study on the influencing factors of intention to adoption of mobile e-government service. Doctoral dissertation. Available from RISS Dissertation and Theses database. (No. 12683689)

    Google Scholar 

  9. Elliman T (2006) Generating citizen trust in e-government using a trust verification agent: a research note. In: European and mediterranean conference on information systems

    Google Scholar 

  10. Warren SD, Brandeis LD (1890) The right to privacy. Harvard Law Rev 193–220

    Google Scholar 

  11. Kim BS, Lee J, Kim KK (2006) The impact of perceived trust, risk, usability, and convenience on intention to use e-government service: focused on online application and service. Informatization Policy 13(4):186–202

    Google Scholar 

  12. DeLone WH, McLean ER (1992) Information systems success: the quest for the dependent variable. Inf Syst Res 3(1):60–95

    Article  Google Scholar 

  13. Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 319–340

    Google Scholar 

  14. Delone WH, McLean ER (2003) The DeLone and McLean model of information systems success: a ten-year update. J Manage Inf Syst 19(4):9–30

    Article  Google Scholar 

  15. Jin JS, Kim HM, Park JS (2017) A study on behavior in using fin-tech based on life style types. J Inf Technol Serv 16(1):119–138

    Google Scholar 

  16. Pitt LF, Watson RT, Kavan CB (1995) Service quality: a measure of information systems effectiveness. MIS Q 173–187

    Google Scholar 

  17. In KY (2016) A study of the effect of service quality to the continuous usage of e-government services. Master thesis. Available from RISS Dissertation and Theses database. (No. 14059381)

    Google Scholar 

  18. Davis FD (1985) A technology acceptance model for empirically testing new end-user information systems: theory and results. Doctoral dissertation, Massachusetts Institute of Technology

    Google Scholar 

  19. Kim BS (2018) An empirical study on factors affecting the operational performance of the war game system of the ROK air force: focused on theater-level exercise model. Doctoral dissertation. Available from RISS Dissertation and Theses database. (No. 14730384)

    Google Scholar 

  20. Weinstein L, Neumann PG (2000) Internet risks. Commun ACM 43(5):144–144

    Article  Google Scholar 

  21. Nunnally JC (1978) Psychometric theory. McGraw-Hill, New York

    Google Scholar 

  22. Chin WW (1998b) Issues and opinion on structural equation modeling. Mis Q 22(1)

    Google Scholar 

  23. Cohen J (1988) Statistical power analysis for the behavioral sciences. Psychology Press

    Google Scholar 

  24. Tenenhaus M, Vinzi VE, Chatelin YM, Lauro C (2005) PLS path modeling. Comput Stat Data Anal 48(1):159–205

    Article  MathSciNet  Google Scholar 

  25. Fornell C, Larcker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. J Mark Res 18(1):39–50

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gwangyong Gim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Cho, S., Oh, S., Rou, H., Gim, G. (2021). Study on Security and Privacy of E-Government Service. In: Kim, J., Lee, R. (eds) Data Science and Digital Transformation in the Fourth Industrial Revolution. Studies in Computational Intelligence, vol 929. Springer, Cham. https://doi.org/10.1007/978-3-030-64769-8_6

Download citation

Publish with us

Policies and ethics