Skip to main content

Challenges for Mobile Governance in India: A Legal Perspective

  • Chapter
  • First Online:
  • 866 Accesses

Abstract

In recent years, the governments’ use of Information and Communication Technology (ICT), popularly known as electronic governance (e-governance), has been on the rise. Studies have shown that in many countries e-governance has contributed to achieving a number of the targets set out in the Millennium Development Goal (MDG) by the United Nations. However, emerging economies like India are lagging behind developed countries in initiating and implementing e-governance policy and practice. One of the primary reasons for this is a lack of resources and infrastructure with respect to computers, fixed telephone lines and Internet connectivity within the governance network. However, the meteoric rise in mobile phone subscription in India in the last 10 years provides a strong base for an alternative or complementary tool to support e-governance, known as mobile governance (m-governance). The central and state governments of India have initiated numerous m-governance initiatives, but India still faces several legal challenges with m-governance’s adoption. The Information Technology Act, 2000 (India) is able to address some of these challenges but is unlikely to fully address the complex range of issues involving mobile communication. The aim of this paper is to examine the legal issues that need to be addressed in order to create an effective legal environment for m-governance in India. The findings of this paper are likely to assist other emerging economies that are facing similar legal challenges in improving their e-governance scenario while advancing their MDGs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Public Key infrastructure can be defined as the combination of hardware, software, people, policies and procedures required to create, manage, store, distribute and revoke digital certificates based on public-key cryptography.

References

  • Abrams, M. (2006). Privacy, security and economic growth in an emerging digital economy. Proceedings of the privacy symposium (p. 18). Beijing, China: Institute of Law, Chinese Academy of Social Science.

    Google Scholar 

  • As-Saber, S. N., Hossain, K., & Srivastava, A. (2007). Technology, society and e-government: in search of an eclectic framework. Electronic Government, An International Journal, 4(2), 156–178.

    Article  Google Scholar 

  • As-Saber, S. N., Srivastava, A., & Hossain, K. (2006). Information technology law and e-government: A developing country perspective. Journal of Administration and Governance, 1(1), 84–101.

    Google Scholar 

  • Basu, S. (2004). E-government and developing Countries: An overview. International Review of Law Computers and Technology, 18(1), 109–132.

    Article  Google Scholar 

  • Bekkers, V., & Moody, R. (2011). Visual events and electronic government: What do pictures mean in digital government for citizen relations? Government Information Quarterly, 28(4), 457–465.

    Article  Google Scholar 

  • Bhatnagar, S. (2003). Transparency and corruption: Does e-Government help? Commonwealth Human Rights Initiative. Retrieved 15 November 2011, from http://www.iimahd.ernet.in/~subhash/pdfs/CHRIDraftPaper2003.pdf

  • Bourgeois Inspirations. (2011). The privacy bill, 2011: Third working draft. Bourgeois Inspirations. Retrieved 18 December 2011 from http://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf

  • Department of Information Technology, India. (2010) Guidelines for usage of digital signatures in e-governance, New Delhi.

    Google Scholar 

  • Department of Information Technology, India. (2011a). The information technology (amendment) act 2008. Department of Information Technology, India. Retrieved 17 December 2011 from http://www.mit.gov.in/sites/upload_files/dit/files/downloads/itact2000/it_amendment_act2008.pdf

  • Department of Information Technology, India. (2011b). Information technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011. Department of Information Technology, India. Retrieved 18 December 2011 from http://mit.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf

  • Department of Information Technology, India. (2011c). View the IT Act 2000. Department of Information Technology, India. Retrieved 18 December 2011 from http://www.mit.gov.in/content/view-it-act-2000

  • DNA. (2012). Digital signatures for mobile phones to become a reality in India. DNA. Retrieved 2 September 2013 from http://www.dnaindia.com/scitech/1762181/report-digital-signatures-for-mobile-phones-to-become-a-reality-in-india

  • Gavison, R. (1980). Privacy and the limits of law. The Yale Law Journal, 89(3), 421–471.

    Article  Google Scholar 

  • Government of Assam—Department of Information Technology. (2011). Application form for permanent resident certificate. Government of Assam—Department of Information Technology. Retrieved 17 December 2011 from http://edistrict.assamgov.in/edistrict/documents/pdf/3.pdf

  • Hellström, J. (2011). Mobile governance: Applications, challenges and scaling-up. In M. Poblet (Ed.), Mobile technologies for conflict management: Online dispute resolution, governance, participation (pp. 159–179). Dordrecht, Netherlands: Springer.

    Chapter  Google Scholar 

  • Howard, P. N., & Mazaheri, N. (2009). Telecommunications reform, internet use and mobile phone adoption in the developing world. World Development, 37(7), 1159–1169.

    Article  Google Scholar 

  • India Law and Technology Blog. (2011). Analysis of the privacy bill, 2011. India Law and Technology Blog. Retrieved 18 December 2011 from http://www.iltb.net/2011/06/analysis-of-the-privacy-bill-2011

  • Irani, Z., Elliman, T., & Jackson, P. (2007). Electronic transformation of government in the U.K.: A research agenda. European Journal of Information Systems, 16(4), 327–335.

    Article  Google Scholar 

  • ITU (International Telecommunication Union). (2013). World Telecommunication/ICT Indicators Database. International Telecommunication Union. Retrieved 2 September 2009 from http://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx

  • Kaufmann, D., Kraay, A., & Mastruzzi, M. (2009). Governance matters VIII: Aggregate and individual governance indicators 1996–2008. Washington, DC: World Bank Publication.

    Book  Google Scholar 

  • LaVigne, M. (2002). Electronic government: A vision of a future that is already here. Syracuse Law Review, 52(4), 1243–1252.

    Google Scholar 

  • Lim, Y. F. (2002). Digital signature, certification authorities and the law. Murdoch University Electronic Journal of Law, 9(3). Retrieved 3 September 2013 from http://www.murdoch.edu.au/elaw/issues/v9n3/lim93.html

  • Margetts, H., & Dunleavy, P. (2002). Better public services through e-government: Academic article in support of better public services through e-government. London: National Audit Office.

    Google Scholar 

  • Mason, S. (2003). Electronic signatures in law. London: LexisNexis.

    Google Scholar 

  • May, H., & Hearn, G. (2005). The mobile phone as media. International Journal of Cultural Studies, 8(2), 195–211.

    Article  Google Scholar 

  • Milmo, C., & Hickman, M. (2011). Lawyer claims up to 7,000 may have had phones hacked. The Independent. Retrieved 18 December 2011 from http://www.independent.co.uk/news/media/press/lawyer-claims-up-to-7000-may-have-had-phones-hacked-2266048.html

  • Ministry of Law, India. (2011). Part III: Fundamental right, The constitution of India. Ministry of Law, India. Retrieved 17 December 2011 from http://lawmin.nic.in/olwing/coi/coi-english/Const.Pock%202Pg.Rom8Fsss(6).pdf

  • Ministry of Personnel, Public Grievances & Pensions. (2011). Right to privacy bill, Release ID: 74743. Ministry of Personnel, Public Grievances & Pensions. Retrieved 18 December 2011 from http://pib.nic.in/newsite/erelease.aspx?relid=74743

  • Ministry of Statistics & Programme Implementation, India. (2011). Millennium development goals: India country report 2011. New Delhi, India: Ministry of Statistics & Programme Implementation.

    Google Scholar 

  • National Human Rights Commission. (2011). Human right act 1993, National Human Rights Commission. Retrieved 17 December 2011 from http://nhrc.nic.in/hract.htm

  • OECD (Organisation for Economic Co-operation and Development) & ITU (International Telecommunication Union). (2011). M-Government: Mobile technologies for responsive governments and connected societies. Paris: OECD.

    Google Scholar 

  • Office of the United Nations High Commissioner for Human Rights (OHCHR). (2011). International covenant on civil and political rights. Office of the United Nations High Commissioner for Human Rights (OHCHR). Retrieved 17 December 2011 from http://www2.ohchr.org/english/law/ccpr.htm

  • Patki, T., Khurana, S., Sivasubramanian, S., & Patki, A. B. (2005). Product development for female cyber police programme, Proceedings of the Conflux 2005: The e-Government Conference, centre for Science Development and Media Studies (CSDMS). India: New Delhi.

    Google Scholar 

  • Pitkänen, O., Mäntylä, M., Välimäki, M., & Kemppinen, J. (2003). Assessing legal challenges on the mobile internet. International Journal of Electronic Commerce, 8(1), 101–120.

    Google Scholar 

  • PR Newswire. (2007). Turkcell selects Gemalto for world's largest mobile signature rollout. PR Newswire. Retrieved 18 December 2011 from http://www.prnewswire.co.uk/cgi/news/release?id=194368

  • Raab, C. D. (2004). Privacy issues as limits to access. In G. Aichholzer & H. Burkert (Eds.), Public sector information in the digital age: Between markets, public management and citizens’ rights (pp. 23–47). Cheltenham: Edward Elgar Publishing Limited.

    Google Scholar 

  • Rai, S. (2006). India leads world in cellphone expansion. The New York Times. Retrieved 15 June 2011 from http://www.nytimes.com/2006/09/15/business/worldbusiness/15iht-cell.2821634.html

  • Right to Information. (2011). The right to information act, 2005. Right to Information. Retrieved 18 December 2011 from http://righttoinformation.gov.in/webactrti.htm

  • Robinson, M. (1998). Corruption and development: An introduction. The European Journal of Development Research, 10(1), 1–14.

    Article  Google Scholar 

  • Schwiderski-Grosche, S., & Knospe, H. (2011). Secure m-commerce. Information Security Group. Retrieved 18 December 2011 from http://www.isg.rhul.ac.uk/~scarlet/documents/Secure%20m-commerce%20ECEJ.pdf

  • Schwester, R. (2011). Examining the barriers to e-government adoption. In L. Worrall (Ed.), Leading issues in e-government (pp. 32–50). Reading, UK: Ridgeway Press.

    Google Scholar 

  • Sen, A. (1999). Development as Freedom. Oxford: Oxford University Press.

    Google Scholar 

  • Sharma, R. K., & Yadav, R. K. (2007). Reforms in Indian telecom sector. Indian MBA. Retrieved 17 June 2011 from http://www.indianmba.com/Faculty_Column/FC701/fc701.html

  • Sinha, C. (2005). Effect of mobile telephony on empowering rural communities in developing countries, Proceedings of the conference on digital divide, global development and the information society. Tunisia: Tunis.

    Google Scholar 

  • Smith, R. E. (2002). Authentication: From passwords to public keys. Boston: Addison-Wesley.

    Google Scholar 

  • Stafford, T. F., & Turan, A. H. (2011). Online tax payment systems as an emergent aspect of governmental transformation. European Journal of Information Systems, 20(3), 343–357.

    Article  Google Scholar 

  • The Next Web. (2011). 53 % of Indians subject to mobile phone theft or loss. The Next Web. Retrieved 18 December 2011 from http://thenextweb.com/asia/2011/03/22/53-of-indians-subject-to-mobile-phone-theft-or-loss

  • TRAI (Telecom Regulatory Authority of India). (2013). Press release on telecom subscription sata as on 31st May 2013. Telecom Regulatory Authority of India. Retrieved 2 September 2013 from http://www.trai.gov.in/WriteReadData/PressRealease/Document/PR-TSD-May13(60).pdf

  • Transparency International. (2011). Corruption Perceptions Index 2012. Transparency International. Retrieved 2 September 2013 from http://cpi.transparency.org/cpi2012/results

  • UNDESA (United Nations Department of Economic and Social Affairs). (2003). World public sector report 2003: E-Government at the crossroads. New York: United Nations Publication.

    Google Scholar 

  • UNDESA (United Nations Department of Economic and Social Affairs). (2012). E-Government survey 2012: E-government for the people. New York: United Nations.

    Google Scholar 

  • Wolfe, H. B. (2010). Mobile phone security. The TSCM Journal, 1(2). Retrieved 18 December 2011 from http://www.isaca-wellington.org/files/TSCM_Journal_1_2_Small.pdf

  • World Bank. (2013). The Worldwide Governance Indicators, 2012 Update. World Bank. Retrieved 2 September 2013 from http://info.worldbank.org/governance/wgi/pdf/wgidataset.xlsx

  • Zambrano, R., & Seward, R. K. (2013). From connectivity to service delivery: Case studies in e-governance. New York: United Nations Development Programme.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aashish Srivastava .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Srivastava, A., Hossain, M.K. (2014). Challenges for Mobile Governance in India: A Legal Perspective. In: Kaur, H., Tao, X. (eds) ICTs and the Millennium Development Goals. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7439-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-1-4899-7439-6_15

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4899-7438-9

  • Online ISBN: 978-1-4899-7439-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics