Advertisement

Measuring Usability to Improve the Efficiency of Electronic Signature-Based e-Government Solutions

  • Thomas ZeffererEmail author
  • Vesna Krnjic
  • Klaus Stranacher
  • Bernd Zwattendorfer
Chapter
Part of the Public Administration and Information Technology book series (PAIT, volume 5)

Abstract

Usability and security are crucial requirements of efficient e-Government services and applications. Given security requirements are mostly met by integration of approved cryptographic methods such as two-factor authentication and qualified electronic signatures. Integration of these technologies into e-Government applications usually introduces additional complexity and often affects the usability of these solutions. So far, research on usability as efficiency-measuring instrument in e-Government has primarily focused on the evaluation of e-Government Web sites only. Usability issues raised by the integration of security-enhancing technologies into e-Government applications have not been considered in detail yet. We filled this gap by conducting a usability analysis of three core components of the Austrian e-Government infrastructure to improve efficiency in this domain. The evaluated components act as middleware and facilitate integration of e-ID and e-Signature tokens such as smart cards and mobile phones into e-Government applications. We have assessed the usability and perceived security of these middleware components by means of a thinking-aloud test with 20 test users. This chapter introduces the evaluated components, discusses the followed methodology, and presents obtained results of the conducted usability test.

Keywords

Smart Card Technical Background Installation Process Answer Research Question Austrian Citizen 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Altameem T, Zairi M, Alshawi S (2006) Critical success factors of e-Government: a proposed model for e-Government implementation. Innovations in Information Technology, Dubai, pp 1–5. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4085489&tag=1
  2. Boslaugh S, Watters PA (2008) Statistics in a nutshell, vol 54. O’Reilly, SebastopolGoogle Scholar
  3. Centner M, Orthacker C, Bauer W (2010) Minimal-footprint middleware for the creation of qualified signatures. In: Institute for Systems and Technologies of Information, Control and Communication (ed) Proceedings of the 6th international conference on web information systems and technologies. INSTICC—Institute for Systems and Technologies of Information, Control and Communication, Portugal, pp 64–69Google Scholar
  4. Chircu AM, Hae-Dong Lee D (2005) E-government: key success factors for value discovery and realisation. Int J Electron Govern 2(1):11–25CrossRefGoogle Scholar
  5. EU Parliament and Council (2000) Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a community framework for electronic signatures. Off J Eur Commun L 013:12–20Google Scholar
  6. EU Parliament and Council (2012) Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on electronic identification and trust services for electronic transactions in the internal market/*COM/2012/0238 final—2012/0146 (COD)Google Scholar
  7. Frokjaer E, Hertzum M, Hornbaek K (2000) Measuring usability: are effectiveness, efficiency, and satisfaction really correlated? Proceedings of the SIGCHI conference on human factors in computing systems, The Hague, The Netherlands, pp 345–352Google Scholar
  8. Garcia ACB, Maciel C, Pinto FB (2005) A quality inspection method to evaluate e-Government sites. Electronic government fourth international conference, EGOV, vol 3591, pp 198–209Google Scholar
  9. Geetha KT, Malarvizhi V (2010) Acceptance of e-Banking among customers (an empirical investigation in India). J Manag Sci 2(1). ISSN: 2249–1260Google Scholar
  10. Gil-Garcia JR (2007) Exploring e-government benefits and success factors, encyclopedia of digital government. IGI Global, Hershey, pp 803–811Google Scholar
  11. Gil-García JR, Pardo TA (2005) E-government success factors: mapping practical tools to theoretical foundations. Govern Inform Q 22(2):187–216CrossRefGoogle Scholar
  12. Hollosi A, Karlinger G, Rössler T, Centner M (2008) The Austrian citizen card. http://www.buergerkarte.at/konzept/securitylayer/spezifikation/20080220/
  13. Howcroft B, Hamilton R, Heder P (2002) Consumer attitude and the usage and adoption of home-based banking in the United Kingdom. Int J Bank Market 20(3):111–121CrossRefGoogle Scholar
  14. Hung S-Y, Chang C-M, Kuo S-R (2013) User acceptance of mobile e-government services: an empirical study. Govern Inform Q 30(1):33–44. ISSN: 0740-624X, http://dx.doi.org/ 10.1016/j.giq.2012.07.008
  15. Kubicek H (2011) Akzeptanzprobleme sicherer elektronischer Identitäten: Ergebnisse einer vergleichenden Untersuchung in acht Ländern, pp 43–47Google Scholar
  16. Leitold H, Hollosi A, Posch R. (2002) Security architecture of the Austrian Citizen Card concept. In: Proceedings of the 18th annual computer security applications conference, ACSAC ‘02, IEEE Computer Society, Washington, DC, pp 391–400Google Scholar
  17. Ma H-YT, Zaphiris P (2003) The usability and content accessibility of the e-government in the UK. In: Stephanidis C (ed) Universal access in HCI, vol 2007. Lawrence Erlbaum, Mahwah, NJ, USA, pp 760–764Google Scholar
  18. Nielsen J (2013) Why you only need to test with 5 users. http://www.nngroup.com/articles/why-you-only-need-to-test-with-5-users/
  19. Norris P (2003) Digital divide: civic engagement, information poverty, and the Internet worldwide. Prometheus 21(3):1–320Google Scholar
  20. Orthacker C, Zefferer T (2011) Accessibility challenges in e-Government: an Austrian experience. In: Houlden N, Oram D, Picking R, Cunningham S, Grout V (eds) Proceedings of the fourth international conference on internet technologies and applications (ITA 11), Centre for Applied Internet Research (CAIR), Glyndŵr University, Wrexham, UK, pp 221–228Google Scholar
  21. Orthacker C, Centner M, Kittl C (2010) Qualified mobile server signature. Proceedings of the 25th TC 11 international information security conference, SEC 2010Google Scholar
  22. Schultz EE, Proctor RW, Lien MC, Salvendy G (2001) Usability and security an appraisal of usability issues in information security methods. Comput Secur 20(7):620–634CrossRefGoogle Scholar
  23. Siddhartha A (2008) National e-ID card schemes: a European overview. Inf Secur Tech Rep 13(2):46–53CrossRefGoogle Scholar
  24. Sørum H (2011) An empirical investigation of user involvement, website quality and perceived user satisfaction in eGovernment environments. Proceedings of the second international conference on electronic government and the information systems perspective, EGOVIS ’11. Springer-Verlag, Berlin, Heidelberg, pp 122–134Google Scholar
  25. White H, Nteli F (2004) Internet banking in the UK: why are there not more customers. J Financ Serv Market 9:49–57CrossRefGoogle Scholar
  26. Zavareh FB, Ariff MSM, Jusoh A, Zakuan N, Bahari AZ, Ashourian M (2012) E-service quality dimensions and their effects on E-customer satisfaction in internet banking services. Procedia Soc Behav Sci 40:441–445, ISSN: 1877–0428CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  • Thomas Zefferer
    • 1
    Email author
  • Vesna Krnjic
    • 1
  • Klaus Stranacher
    • 1
  • Bernd Zwattendorfer
    • 1
  1. 1.Institute for Applied Information Processing and CommunicationsGraz University of TechnologyGrazAustria

Personalised recommendations