Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1509096.1509160acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicegovConference Proceedingsconference-collections
research-article

Utility computing-based framework for e-governance

Published: 01 December 2008 Publication History

Abstract

Developing countries are witnessing an upsurge in the number of e-Governance projects being undertaken. This has presented a lot of issues and challenges in efficiently using ICT in delivering effective governance at the lowest societal costs. One of the critical areas where there is duplication of infrastructure and manpower in e-governance is the data center. There are several approaches to e-Governance but most of them require the different government agencies to procure and maintain the entire IT infrastructure themselves. Utility Based Computing (UBC) offers tremendous potential to develop a sustainable e-Governance framework wherein a common data center infrastructure can be setup to provide the e-governance solutions, with different departments being billed as per the usage of the infrastructure. The combined potential of UBC to deliver computing on demand and to pay as you go paradigm offer a new approach to deliver cost-effective and efficient governance to the citizens. However, this framework has also its risks and issues.

References

[1]
Michiel B., E-Governance and Developing Countries: introduction and examples.
[2]
Mittal P. A., A Framework for e-Governance Solutions, IBM J. RES.&DEV. VOL. 48 NO. 5/6, Sept/Nov 2004
[3]
Rappa, M. A. The utility business model and the future of computing services, IBM Sys, Jrnl., Vol. 43, NO 1, 2004
[4]
Eilam T. et al, Using a utility computing framework to develop utility systems, IBM Sys. Jrnl., Vol. 43(1), 2004
[5]
Paleologo, G. A. Price -- at -- risk: A methodology for pricing utility computing services, IBM SYSTEMS JOURNAL, VOL 43, NO 1, 2004
[6]
Pardhasaradhi, Y. Improving Citizen -- Government interface through e-Governance: A study of India, Internet and Information Technology for Greater Mekong Subregion (GMS) Business, Part IV
[7]
Jayaradha, N. and Shanthakumar, C. K., E-governance: Tracking the Hurdles, Tamil Internet 2003
[8]
Pagden, E. The IT Utility Model-Part I, Sun Professional Services, Sun BluePrintsTM Online -- July 2003
[9]
Hiles, A. The Complete IT Guide to Service Level Agreements---Matching Service Quality to Business Needs, Rothstein Associates, Inc., Brookfield, CT, 1999/2000
[10]
Frey, N., Matlus, R. and Maurer, W. A Guide to Successful SLA Development and Management, Gartner Group Research, Strategic Analysis Report, Gartner, Inc., Stamford, CT, October 2000.
[11]
Buco M. J., Utility computing SLA management based upon Business objectives, IBM Sys. Jnrl, 43), NO 1, 2004
[12]
Chater, J. Utility Based Computing, Utility Based Computing Briefing paper, ATOS Orgin S. A, October 2006
[13]
Ross, J. W. And Westerman, G. Preparing for Utility computing: The role of IT architecture and relationship management, IBM SYSTEMS JRNL., VOL 43, NO 1, 2004

Cited By

View all
  • (2018)Investigating pay-as-you-go to address issues of trust, privacy and security around media use at homeUniversal Access in the Information Society10.1007/s10209-012-0270-312:2(217-231)Online publication date: 21-Dec-2018
  • (2013)Moving Target Defense for Cloud Infrastructures: Lessons from BotnetsHigh Performance Cloud Auditing and Applications10.1007/978-1-4614-3296-8_2(35-64)Online publication date: 1-Aug-2013

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICEGOV '08: Proceedings of the 2nd international conference on Theory and practice of electronic governance
December 2008
561 pages
ISBN:9781605583860
DOI:10.1145/1509096
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. SWUC framework
  2. e-governance
  3. utility based computing

Qualifiers

  • Research-article

Conference

ICEGOV '08

Acceptance Rates

Overall Acceptance Rate 350 of 865 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Investigating pay-as-you-go to address issues of trust, privacy and security around media use at homeUniversal Access in the Information Society10.1007/s10209-012-0270-312:2(217-231)Online publication date: 21-Dec-2018
  • (2013)Moving Target Defense for Cloud Infrastructures: Lessons from BotnetsHigh Performance Cloud Auditing and Applications10.1007/978-1-4614-3296-8_2(35-64)Online publication date: 1-Aug-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media