A Framework for e-Democracy implementation in the Developing Nations
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 10, Issue 10
Abstract
Several e-Democracy implementations started as an offshoot of e-Government implementation where other models of e-Government such as Government to Government (G2G), Government to Business (G2B), Government to Employees (G2E), and Government to NGOs (G2N) etc were first implemented before Government to Citizen (G2C). However, going by the resulting issues of lack of trust and apathy between Government and Citizen as well as the observed decline in voters’ turnout for elections all over the world, a paradigm shift is hereby proposed in the design methodology starting from G2C to other models.This paper presents a framework for e-Democracy implementation that is premised on the e-Government development cube proposed by Rabaiah and Vandijck (2011), and Funikul and Chutimaskul (2009), which is based on fundamental platforms of organizational, infrastructural and institutional guidelines. Also, the incremental software engineering approach as described by Lizarralde et al. (2007) was employed for phased implementation of e-Government starting from e-Democracy (G2C); and a multi-channel approach, which includes Web 2.0, mobile devices and Internet that will enable a wider cross-section of the society to engage with e-Government was implemented. The deployment architecture of Evangelopoulos and Visinescu (2012) is employed.Essentially, the developed framework offers potentials for: increased participation and trust in the polity; reduced apathy between the electorate and the political class; and reduced intra and inter country politically motivated conflicts within the developed nations.Â
Authors and Affiliations
Ayo C. K. , Mbarika V. , Okunoye A.
Trusted Cloud Platform for Cloud Infrastructure
Reliability and trust Models are used to enhance secure , reliable scheduling , load balancing and QoS in cloud and Distributed environment. Trust models that are being used in Distributed and Grid environment, does not...
Incremental Frequent Pattern Mining using Graph based approach
Extracting useful information from huge amount of data is known as Data Mining. It happens at the intersection of artificial intelligence and statistics. It is also defined as the use of computer algorithms to discover h...
Security in Android
New technologies have always created new areas of concern for information security teams. Usually it provides time for the development of effective security controls. The rapid growth of the smartphone in market and the...
A Feature Selection process Optimization in multi-class Miner for Stream Data Classification
Multi-class miner resolves the problem of feature evaluation, data drift and concept evaluation of stream data classification. The process of stream data classification in multi-class miner based on ensemble technique of...
Efficient Detection of SPAM messages and SPAM zombies in the Internet using Naïve-Bayesian and Sequential Probability Ratio Test (SPRT)
The Internet is a global system of interconnected computer networks that provides the communication to serve billions of users worldwide. Compromised machines in the internet allows the attackers to launch various securi...