Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Federal Government embracing Gov 2.0

New documents released by the Australian Government Information Management Office (AGIMO) show mass adoption of Twitter and Facebook by government agencies

Federal Government agencies have widely embraced social media and Web 2.0 tools in the wake of the Government 2.0 Taskforce report, documents released by the Australian Government Information Management Office (AGIMO) show.

According to the documents, released as part of an effort to better communicate the work being done in Government 2.0, Twitter, Facebook, blogging and RSS feeds (Really Simple Syndication) were now in widespread use by federal agencies.

Almost 50 Federal agencies now have Facebook pages, some in the form of official pages for an agency and others in the form of specific public campaigns such as anti-depression initiative BeyondBlue and youth mental health initiative Headspace.

Close to 100 agencies, ranging from major departments such as Defence and Health and Aging to smaller agencies such as AusAID, and the Australian Bureau of Statistics, now had official Twitter accounts

Agencies such as the Department of Education, Employment and Workplace Relations, the Department of Finance and Deregulation and the national library of Australia are also shown to be making widespread use of blogging.

Some 133 Web 2.0-related initiatives were currently being run by agencies including creation of information portals and tools, campaigns, and data warehouses.

Some 364 news feeds via RSS were also being run.

According to AGIMO first secretary John Sheridan, the release of the information will support greater government engagement and transparency.

“These lists are another step towards creating a more effective register of agency Government 2.0 activity,” Sheridan wrote on AGIMO’s official blog.

“In the future, we may look to refine or build on these lists and would be interested in any ideas you may have in this area.”

Sheridan, speaking at the recent CeBIT 2011 in Sydney, has also argued that real financial gains and improvements in contract conditions are being realised as a result of the Federal Government’s eight ICT whole-of-government panel arrangements.

Follow Tim Lohman on Twitter: @Tlohman Follow Computerworld Australia on Twitter: @ComputerworldAU

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Australian Bureau of Statistics, CeBIT, Facebook, Federal Government
References show all

Comments

confused

1

As someone who works in the gov sector, it all seems rather pointless when employees are blocked from accessing such social media sites due to concerns of lost productivity.

Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: social networking, social networks, social media, Gov 2.0, Australian Government Information Management Office (AGIMO)
Latest Blog Posts
Whitepapers
  • Siemens Redefines Efficiency with Pure Storage
    Challenges - Server consolidation stalled due to storage performance limits - IO-intensive Oracle database would not consolidate with other applications - Multiple instances of virtual applications plus the Oracle DB Results - Consolidated 30 servers to 5 - 23% increase in Oracle performance after virtualization - 6.7-to-1 data reduction - Provisioning time reduced by 4x - 2x increase in VMware snapshot release time
    Learn more »
  • The F5 DDoS Protection Reference Architecture part 1 of 3
    Distributed denial of service attacks (DDoS) attempt to make a machine or network resource unavailable to its intended users, with a wave of crippling attacks on enterprises since 2012. This whitepaper offers guidance to security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks.
    Learn more »
  • Using an Expert System for Deeper Vulnerability Scanning
    This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments