Emerging Tools Key To Gov 2.0
- 21 February, 2008 10:18
While Australia waits to see the shape of the projected Australian government consultation Web sites blog a new report from Quocirca concludes social networking can help public sector bodies achieve far greater interaction with citizens and resources.
But the report warns governments must implement policies to mediate social networking, and choose back-end technology carefully to ensure the non-computer owning citizen is not left behind.
As social networking tools become a core part of many individuals' day-to-day lives, Quocirca says the survey shows harnessing these tools as a means of interaction will increase constituency involvement with government at minimal cost.
The Australian Government Information Management Office (AGIMO) has established a set of principles for ICT-enabled citizen engagement, developed in collaboration with cross-jurisdictional public sector community of practice group e-Democracy Community of Practice as part of the 2006 e-Government Strategy Responsive Government: A New Service Agenda.
It has also been exploring the development of an Australian government e-consultation forum to improve online citizen engagement and promote a consistent and appropriate experience for everyone participating in Australian government online consultation and engagement initiatives.
The first report on submissions provided to the public consultation on a proposed Australian Government Consultation Blog will be released shortly on the Web site.
The report provides a summary of the submissions received by the Department of Finance and Deregulation. This report will be used in conjunction with the results of offline consultation reports, surveys and focus groups to assess the public interest in consulting with government, and to identify the requirements and challenges for an Australian government consultation Web site.
Following full analysis of all relevant data, recommendations will be developed to propose a way forward for the use of consultation blogs in government. Further reports about this consultation process and its overall outcome will be made public as they become available.
The government has said it supports the use of new technologies to foster greater citizen participation in democratic processes.
The Quocirca report finds social networking tools fully capable of playing a part within a controlled, public sector/citizen communication and collaboration environment.
It says usability, standardization and availability have all improved. Proprietary interfaces are breaking down, and back-end standards are enabling consumer tools to interoperate with more commercial systems
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- HP Helps NEC Reduce Network Management Costs and Gain Efficiencies
- Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
- 2013 Global Information Security Survey: Initial findings
- Getting Real About Security Management and Big Data – A Roadmap for Big Data in Security Analytics
- Agentless Security for Virtual Environments
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Devising a Server Protection Strategy with Trend Micro
With so many Information Technology solutions available to choose from today, many organizations put their trust in the experience, insight and advice of Gartner, and their industry-leading analysts. Trend Micro’s portfolio of solutions meets and exceeds Gartner’s recommendations on how to devise a server protection strategy. Precisely how Trend Micro does it is detailed in this whitepaper. Read now.
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
Best Practice in BYOD
The key trend affecting enterprise mobility today can be summarized in four letters: BYOD – Bring Your Own Device. As the number of end-users bringing devices into your organization grows, so does the need for an effective Enterprise Mobility Management (EMM) solution. Learn how to manage devices across multiple platforms all from a single, centralised and unified management console. Download for more!