Documente Academic
Documente Profesional
Documente Cultură
E-GOVERNMENT SYSTEMS
Critical Implications for Public
Administration and Democracy
GENE A. BREWER
University of Georgia
BRUCE J. NEUBAUER
University of South Florida
KARIN GEISELHART
University of Canberra
This article explores the emerging challenges and opportunities of information technology in
government and argues that designing and implementing e-government systems involves
more than merely improving the instrumental processes of government. Democratic values
can serve as design elements and anchors for these systems. Thus, the authors argue that
public administrators should take an active role in designing and implementing e-government
systems to instill democratic values and ensure that democratic processes and outcomes
are realized. The resulting communications infrastructures can help government agencies
respond quickly and effectively to chaotic events while still retaining their essential democ-
ratic nature.
472
capacity (Friedman, 2000). Many people are familiar with Moore’s Law,
which posits that the data storage capacity of a microchip doubles every
12 to 18 months (G. E. Moore, 1965). George Gilder’s (2000) Law of
Telecosm adds that world bandwidth doubles about every 4 months (also
see Gleick, 1999). These and related factors increase the likelihood of
environmental turbulence and beg a point of stability. Public administra-
tion, grounded in democratic values, can provide this stability and con-
tinuity (Kiel, 1994; Wamsley & Wolf, 1996).
The paradox here is that IT is one of the major factors creating chaos
for government agencies, and it is one of the most promising solutions
as well. The information revolution is forcing government agencies to
utilize new technologies creatively to mediate the chasm between frag-
mented political structures and citizens’ needs. If public agencies lose
the ability to perform routine tasks efficiently and cope with crises, their
host governments may experience an erosion of legitimacy and sover-
eignty. Furthermore, there is a growing need for greater accessibility to
and coordination of government services at all levels. In short, institu-
tional theory is being strained by the emerging reality of a virtual state
that allows citizens to obtain information and access services electroni-
cally (Fountain, 2001).5
Government agencies can help smooth the transition between old and
new systems and boost the legitimacy of existing governments by incor-
porating some methods of electronic commerce into their operations.
The term we use for this capacity to innovate quickly in the face of rapid
technological change is requisite agility. We believe that public admin-
istrators should embrace the information revolution as a means for
improving governance and enhancing democratic values.6 Accordingly,
democratic values can become referents that provide context and mean-
ing to progressive governance.
Chaos theory was developed in the field of mathematics and has been
applied to the social sciences and public administration (Alligood,
Sauer, & Yorke, 1997; Elliott & Kiel, 1999; Gleick, 1987; Kiel, 1994;
Kiel & Elliott, 1996; also see Gaus, 1947, pp. 6-19). Its basic assump-
tion is that natural processes are nonlinear and involve multiple causes
and effects. Chaos theory suggests that there are variations in behaviors
and other types of outcomes that occur over time and possibly at multi-
ple scales. Although not predictable, these variations are within limits or
boundaries defined by “attractors.”
Attractor is a mathematical concept meaning the combination of effects
that define the boundaries of a chaotic system. For example, gravity is an
attractor that constrains the size of the solar system by influencing the
behavior of planets and other masses. Similarly, the shared values and
beliefs of an organization’s members can be thought of as attractors that
guide and constrain organizational behavior. Kiel (1994, p. 108) described
the way work is organized, the attitudes employees hold, and the tech-
nologies they use as attractors similar to those of physical systems operat-
ing under chaotic conditions. These patterns can be stable or unstable and
functional or dysfunctional. But they are ultimately linked to the values
and beliefs of people in the system. The behavior of government officials,
agency employees, citizens, and others swirls around such sets of values,
resulting in nonlinear sequences of events that are facilitated and possibly
accelerated by IT.
The usual introduction to chaos theory includes an explanation of the
“butterfly effect.” The idea is that something as insignificant as a butter-
fly flapping its wings in a distant land can result in a storm locally. In
today’s world, there are many salient examples of the butterfly effect.
Sudden acute respiratory syndrome (SARS) apparently originated in
Hong Kong. Several hotel guests acquired SARS and traveled by air to
distant nations such as Canada, Malaysia, and Taiwan. Soon afterward,
those nations experienced outbreaks of the virus that resulted in signifi-
cant public health and economic consequences. Another example is the
Blaster worm and related computer viruses planted on the Internet
recently. These seemingly innocuous bits of code almost instantly crip-
pled vulnerable government and business networks all over the world
and caused significant losses in productivity.
Globalization further creates complexity as communications technol-
ogy moves information around the globe at near the speed of light.
Before the advent of modern communications technology, news traveled
sequentially from location to location, and the amount of news received
from distant places was minimal. Today, the world reverberates with
news, and the causes and effects of distant events are tightly coupled.
The resulting combination of structural complexity and speed of infor-
mation flow makes the operating environments of most government
agencies near chaotic.
In his introduction to cybernetics, Ashby (1963) observed that the
ability to regulate or adapt to an environment is the key to survival for
both individuals and species. Furthermore, if the focal biological system
is attempting to regulate the behavior of others in a common environ-
ment, then the variety of its moves must equal or exceed theirs.
Otherwise, it cannot achieve or maintain equilibrium. Ashby termed this
capacity “requisite variety.”
Implications of Ashby’s law can be extended to public administra-
tion. If an agency is limited in its information-processing capacities, it
may lose the ability to adapt to or regulate other entities in its environ-
ment. Thus, Ashby’s law implies what we term requisite agility, which
is the capacity to respond quickly to cues in the environment. In other
words, it is not enough for an agency to have a sufficient variety of
moves. It must also be able to execute these moves quickly enough to be
effective. If an agency lacks requisite agility, it may be disintermediated
(i.e., bypassed or replaced) by other entities such as corporations and
Stable environment
• general dissatisfaction with government agencies
(characterized by gradual and
• negative stereotypes of government employees
predictable changes)
Dynamic environment
• citizens challenge public employees
(characterized by rapid and
• citizens seek alternative service delivery systems
relatively predictable changes)
• lowered trust in government
Turbulent environment
• agencies increasingly disintermediated as citizens
(characterized by increasingly
find alternative service delivery systems
rapid and relatively
• agencies cannot adapt quickly enough to changing
unpredictable changes)
conditions to either regulate or meaningfully
participate in events of social consequence
• the legitimacy and/or sovereignty of the
government becomes an issue
Chaotic environment
(characterized by very rapid • agencies lose the ability to monitor and anticipate
and very unpredictable significant events in their environments
changes driven by complex • agency officials are overwhelmed and unable to
interrelationships mediated by influence citizens or other actors
modern information • agencies and governments lose relevance,
technology) legitimacy, and/or sovereignty
ADMINISTRATIVE IMPLICATIONS
DEMOCRATIC IMPLICATIONS
ACCESS TO INFORMATION
AVAILABILITY OF TRANSACTIONS
to the purpose of the list and does not necessarily mean that an agency
official is censoring what is being communicated.
A Web blog is an online diary that can be updated from any location
with an Internet connection. Web blogs can facilitate small group com-
munication, and they are simpler and easier to follow than e-mail or dis-
cussion forums. A blog can promote cohesiveness and group culture and
can serve to represent the beliefs or preferences of the group to outsiders.13
Using a technology called RSS (an acronym with multiple meanings,
including Rich Site Summary), content can be syndicated across multiple
Web blogs automatically (Hammersley, 2003).
Chat rooms and virtual environments (sometimes called cyberspaces)
enable people to interact with others in real time, somewhat like a con-
ference telephone call. At present, most online virtual environments are
not used for serious discussions of social or political consequence. But
this technology can be used for serious purposes.
Enabling citizens to have persistent identities across multiple cyber-
spaces can enhance their ability to express themselves and participate in
policy making (Jordan, Hauser, & Foster, 2003). Identity is prerequisite to
both association and expression and qualifies as a democratic design ele-
ment. If a person cannot be recognized and authenticated across multiple
cyberspaces, his or her ability to participate fully as a citizen in matters
with policy consequence may be compromised. Of course, with persistent
identity comes issues regarding privacy and possible identity theft.
DISCUSSION
The major themes in this article are that government agencies face
increasingly chaotic environments that require them to use IT systems to
become more agile, and public administrators must be involved in the
design and implementation of these systems to help ensure that democ-
ratic values are preserved and democratic outcomes are realized. Public
administration, grounded in democratic values, can provide the needed
continuity and stability to make the increasingly fragmented and disar-
ticulated political state work (Brewer, 2003; Frederickson, 1999; Kiel,
1994; Wamsley & Wolf, 1996). If IT experts are allowed to design e-
government systems without understanding the important role of demo-
cratic values in public administration, these values may be compromised
and the public interest may be jeopardized.
Some proponents of chaos theory may believe that democratic values
and practices will naturally emerge from the use of new technologies
CONCLUSION
NOTES
1. During the cold war, the Advanced Research Projects Agency of the U.S. Department
of Defense sought to create a communications network that would be immune to nuclear
attack. The project—called ARPANET—connected mainframe computers at four western
universities: University of California, Los Angeles, Stanford Research Institute, University
of California, Santa Barbara, and University of Utah. The number of nodes grew from 4 in
1969 to 15 in 1971 and to 37 by 1972.
2. In addition, government is a large end user of hardware and software, and it per-
forms other missions that are heavily reliant on information technology.
3. We acknowledge that democratic participation can work a hardship on public admin-
istration by limiting administrative discretion and creating operational inefficiencies.
Although some view this as the price of democracy, we think of it as part of the challenge.
Our goal is to design and implement information systems that further the aims of both
administration and democracy.
4. Traditionally designed organizations cannot cope with some policy problems, which
are sprawling, multijurisdictional, and prone to change over time. Scholars of policy imple-
mentation have observed that interorganizational or intergovernmental networks—chunks of
organizations or governments that work together on a particular policy problem—more accu-
rately describe the implementation structures that exist today (Hjern & Porter, 1981; O’Toole
& Hanf, 2002).
5. Some view the virtual state as the electronic extension of the policy networks
Frederickson (2003) and others have described. Just as policy networks facilitate citizen
access to government, the virtual state can integrate most aspects of policy networks and
help citizens interact with their governments more effectively.
6. Several years ago, the Organisation for Economic Co-operation and Development
(OECD; 1998a) assessed information technology’s potential for transforming the democratic
process in eight member countries: Canada, Denmark, Italy, Norway, Spain, Switzerland, the
United Kingdom, and the United States. The study found that the forces in play are very
complex: Technology is evolving rapidly, but institutions and processes seem rooted in tra-
ditional modes of thought. Thus, the overall impact has been modest. The report concluded
that government officials must try harder to link the public to the decision-making process in
a substantive way; officials must try to contain their propensity toward secretiveness and their
instinct to “ration democracy” (OECD, 1998b, pp. 7-10).
7. With the advent of Web services and service-oriented architecture, programmers
may become more involved in understanding organizational needs. The fact is that
the principles of object-oriented programming are influencing the design of organizations.
Computer science departments are being more frequently housed in university depart-
ments of business administration, and programs that combine information systems and
computer science are common.
8. The distinction between analysis and design in software engineering is not clear-
cut. Analysis involves understanding and documenting the needs of the organization that
the new software is intended to resolve. Design involves technical decisions about how the
code for the new software will be written. It may be helpful for generalist public adminis-
trators to have some understanding of object-oriented programming, software develop-
ment life cycles, and software project management. But at some point, generalist public
administrators are unlikely to understand what programmers are doing or need to be in the
room. Nevertheless, just as analysis and design overlap, so do the respective abilities and
concerns of generalist public administrators and programmers.
9. A joint application design session is a meeting in which sponsors, business
analysts, programmers, end users, and other stakeholders meet to discuss their needs and
write specifications and other documentation for the system to be built. Having everyone
in the same room at the same time can help facilitate communication.
10. Disintermediation refers to bypassing a person or organization because they are no
longer necessary for accomplishing a process or achieving a goal.
11. Often, parts of the same agency or department will lack compatible information sys-
tems. Such problems have been documented in the U.S. Departments of Agriculture,
Defense, and Homeland Security, for example.
12. Symonds’s (2000) typology is used here because it aligns well with Dahl’s (1989)
criteria regarding democracy and is representative of other typologies and related efforts
to describe the developmental stages of e-government.
13. Discussion boards are a similar but older technology that is more difficult for citi-
zens to follow because they can involve many threads of conversation.
14. At the present time, the following URL describes flash-mobs: http://abcnews
.go.com/sections/scitech/US/cybershake030718.html
REFERENCES
Abramson, M. A., & Means, G. E. (Eds.). (2001). E-government 2001. Lanham, MD:
Rowan and Littlefield.
Abramson, M. A., & Morin, T. L. (Eds.). (2003). E-government 2003. Lanham, MD:
Rowan and Littlefield.
Allcorn, S. (1997). Parallel virtual organizations. Administration & Society, 29, 412-439.
Alligood, K. T., Sauer, T. D., & Yorke, J. A. (1997). Chaos: An introduction to dynamical
systems. New York: Springer-Verlag.
Ashby, W. R. (1963). Introduction to cybernetics. New York: John Wiley.
Barrett, K., & Greene, R. (2001). Powering up: How public managers can take control of
information technology. Washington, DC: CQ Press.
Barry, D. K. (2003). Web services and service-oriented architectures. San Francisco:
Morgan Kaufmann.
Bloomfield, B. P., Coombs, R., Knights, D., & Littler, D. (Eds.). (2000). Information tech-
nology and organizations: Strategies, networks, and integration. New York: Oxford
University Press.
Brewer, G. A. (2003). Building social capital: Civic attitudes and behavior of public ser-
vants. Journal of Public Administration Research and Theory, 13, 5-26.
Calabrese, A., & Borchert, M. (1996). Prospects for electronic democracy in the United
States: Rethinking communication and social policy. Media, Culture and Society, 18,
249-268.
Caldow, J. (1999). The quest for electronic government: A defining vision. Institute for
Electronic Government, IBM Corporation. Retrieved December 1, 2005, from
http://www-1.ibm.com/industries/government/ieg/pdf/egovvision.pdf
Collin, B. C. (1996). The future of cyber terrorism. Proceedings of 11th annual interna-
tional symposium on criminal justice issues, University of Illinois at Chicago.
Retrieved December 1, 2005, from http://afgen.com/terrorism1.html
Dahl, R. A. (1989). Democracy and its critics. New Haven, CT: Yale University Press.
Dickey, C. (2005, November 14). Rage on rue Picasso. Newsweek, p. 37.
Downes, L., & Mui, C. (1998). Unleashing the killer app, digital strategies for market
dominance. Boston: Harvard Business School Press.
Dryzek, J. (1990). Discursive democracy: Politics, policy, and political science. New York:
Cambridge University Press.
Elliott, E., & Kiel, L. D. (Eds.). (1999). Nonlinear dynamics, complexity and public pol-
icy. Commack, NY: Nova Science.
Executive Office of the President, Office of Management and Budget. (2001). The presi-
dent’s management agenda, FY 2002. Retrieved December 1, 2005, from http://www
.whitehouse.gov/omb/budget/fy2002/mgmt.pdf
Follett, M. P. (1999). The new state: Group organization and the solution of popular
government. University Park: Pennsylvania State University Press.
Ford, W., & Baum, M. S. (2000). Secure electronic commerce: Building the infrastructure
for digital signatures and encryption. Upper Saddle River, NJ: Prentice Hall.
Fountain, J. E. (2001). Building the virtual state: Information technology and institutional
change. Washington, DC: Brookings Institution.
Fountain, J. E. (2002a). Information, institutions and governance: Advancing a basic social
science research program for digital government. National Center for Digital
Government, Kennedy School of Government, Harvard University. Retrieved December
1, 2005, from http://www.ksg.harvard.edu/digitalcenter/reports/Workshop%20Report%
201-08-03.pdf
Fountain, J. E. (2002b). Toward a theory of federal bureaucracy for the twenty-first
century. In E. C. Kamarck & J. S. Nye, Jr. (Eds.), Governance.com: Democracy in the
information age (pp. 117-140). Washington, DC: Brookings Institution.
Frederickson, H. G. (1999). The repositioning of American public administration. John
Gaus lecture to the American Political Science Association. Retrieved December 1,
2005, from http://www.apsanet.org/PS/dec99/frederickson.cfm
Frederickson, H. G. (2003). Public administration, governance and the concept of univer-
sal jurisdiction. PA Times, 26(7), 11. Retrieved December 1, 2005, from http://www
.aspanet.org/patimes/archives/2003/07/frederickson.html
Friedman, T. (2000). The lexus and the olive tree. New York: Anchor.
Garson, G. D. (Ed.). (1999). Information technology and computer applications in public
administration: Issues and trends. Harrisburg, PA: Idea Group.
Garson, G. D. (Ed.). (2001). Social dimensions of information technology: Issues for the
new millennium. Hershey, PA: Idea Group.
Garson, G. D. (Ed.). (2003a). Public information technology: Policy and management
issues. Hershey, PA: Idea Group.
Garson, G. D. (2003b). Toward an information technology research agenda for public
administration. In G. D. Garson (Ed.), Public information technology: Policy and
management issues (pp. 331-357). Hershey, PA: Idea Group.
Gates, B. (1995). The road ahead. London: Viking.
Gaus, J. M. (1947). Reflections on public administration. Tuscaloosa: University of Alabama
Press.
Gilder, G. (2000). The twenty laws of the telecosm. New York: Free Press/Simon &
Schuster.
Gleick, J. (1987). Chaos: Making a new science. New York: Viking.
Gleick, J. (1999). Faster: The acceleration of just about everything. New York: Pantheon.
Hagel, J. III. (2002). Out of the box: Strategies for achieving profits today and growth
tomorrow through web services. Boston: Harvard Business School Press.
Hammer, M., & Champy, J. (1993). Reengineering the corporation: A manifesto for
business revolution. New York: HarperBusiness.
Hammersley, B. (2003). Content syndication with RSS. Sebastopol, CA: O’Reilly &
Associates.
Harvard Policy Group on Network-Enabled Services and Government. (2000). Eight
imperatives for leaders in a networked world: Guidelines for the 2000 election and
beyond. Harvard University’s Kennedy School of Government and IBM Institute for
Electronic Governance. Available from Kennedy School of Government’s Web site,
http://www.ksg.harvard.edu/exec_ed/3e/eight_imperatives.htm
Haywood, T. (1995). Info-rich Info-poor: Access and exchange in the global information
society. London: Bowker-Saur.
Heclo, H. (1978). Issue networks and the executive establishment. In A. King (Ed.), The
new American political system (pp. 87-124). Washington, DC: American Enterprise
Institute.
Hjern, B., & Porter, D. (1981). Implementation structures: A new unit of administrative
analysis. Organizational Studies, 2, 211-227.
Hubert, R. (2001). Convergent architecture: Building model driven J2EE systems with
UML. New York: John Wiley.
Jordan, K., Hauser, J., & Foster, S. (2003). The augmented social network: Building iden-
tity and trust into the next-generation internet. First Monday 8(8). Retrieved December
1, 2005, from http://firstmonday.org/issues/issue8_8/jordan/index.html
Kamarck, E. C., & Nye, J. S., Jr. (Eds.). (2002). Governance.com: Democracy in the infor-
mation age. Washington, DC: Brookings Institution.
Kaye, D. (2003). Loosely coupled: The missing pieces of web services. Marin County, CA:
RDS Press.
Kettl, D. F. (2000). The global public management revolution: A report on the transfor-
mation of governance. Washington, DC: Brookings Institution.
Kiel, L. D. (1994). Managing chaos and complexity in government. San Francisco: Jossey-
Bass.
Kiel, L. D., & Elliott, E. (Eds.). (1996). Chaos theory in the social sciences: Foundations
and applications. Ann Arbor: University of Michigan Press.
La Porte, T. M., Demchak, C. C., & De Jong, M. (2002). Democracy and bureaucracy in
the age of the web: Empirical findings and theoretical speculations. Administration &
Society, 34, 411-446.
Lasswell, H. D. (1936). Politics: Who gets what, when, how. New York: McGraw-Hill/
Peter Smith.
Linthicum, D. S. (2004). Next generation application integration: From simple informa-
tion to web services. Boston: Addison-Wesley.
Lowi, T. J. (1969). The end of liberalism. New York: Norton.
Manes, A. T. (2003). Web services: A manager’s guide. Boston: Addison-Wesley.
Moore, G. E. (1965). Cramming more components onto integrated circuits. Electronics,
8. Retrieved December 1, 2005, from ftp://download.intel.com/research/silicon/
moorepaper.pdf
Karin Geiselhart holds a PhD in communications and has previously been a public
sector journalist and teacher. She was a postdoctoral research fellow in electronic
commerce at RMIT University and taught e-marketing at the Australian National
University. She is currently an adjunct research fellow at the University of Canberra.
Her major research interest is the application of complex systems analysis to elec-
tronic democracy and issues of global governance.