the authorities, in the integrity of the authorities, and in the benevolence of the authorities. The trust perceptions categories that emerged from our
grounded analysis were compared with similar constructs found in trust
models and taxonomies from the trust literature and this strengthens the
view of these emerging themes as generic types of trust perceptions. Draw-
ing on this literature further provided for a reconceptualization of the
grounded categories in terms of trustworthiness attributes, particularly so
in the case of benevolence.
While fi
findings in all three categories reiterate the negative perceptions
of citizen, suggesting an overall lack of trust in public authority, differences
were observed when measured by the frequency of statements made with
respect to each attribute. This is shown in Table 9.2.
Identifying Online Citizens 115
Table 9.2 Trustworthiness Attributes in Rank Order
Proportion of statements
Rank
Trustworthiness attribute
referring to each attribute (%)
1
Benevolence
70
2
Integrity
55
3
Competence
20
Table 9.2 indicates the proportion of responses pertaining to each of the three trustworthiness attributes of competence, integrity, and benevolence.
The majority of the statements were coded within the benevolence category
(70 percent). Integrity-related statements counted for 55 percent, and the
least frequent category was competence, under which 20 percent of the
statements were coded.
Moving beyond the generic typology however, the fi
findings direct atten-
tion to specifi
fic trust-related issues associated with public sector IdMS,
which are summarised in Table 9.3.
The competence theme points to perceived inability to operate securely
a mission-critical system that stores sensitive personal data. The key issue
represented by integrity was the use of personal information for purposes
not originally declared and the passing of personal information to third
Table 9.3 Summary of Trust Perceptions Related to eID
Trust perception
categories
ID-related issues
Justificat
fi
ions
Competence
Inability to operate
Records of IT failures
Extent to which public
securely a mission-critical
in public sector
institutions will
system that is storing and
demonstrate ability
managing large amounts
to do what the
of sensitive personal data
citizens need
Integrity
Passing personal
Mission creep cases
Extent to which public
information to third
(autobahn toll collect
institutions will
parties
data, passenger data)
demonstrate honesty in
handling personal
information of citizens
Benevolence
Use of personal data as a
Political history
Extent to which public
means of overly intrusive
(abuse of personal
institutions will act
surveillance
information in
in the citizens’ best
totalitarian regimes,
interests
mainly Nazi Germany)
116 Ruth Halperin and James Backhouse
party without approval. Judgment of government motives, whether benevo-
lent or not, focused on the use of personal data for intrusive surveillance.
A pattern apparent in the fi
findings concerns the way in which respon-
dents rely on their knowledge and interpretation of prior events as a way of
justifying and substantiating their perceptions. In the case of competence,
the past record of IT failures in public sector was repeatedly mentioned.
Lack of trust in the integrity of the government was explained by reference
to past examples of mission creep. Finally, abuse of personal information
by totalitarian regimes in the past was seen to lay the ground for similar
behaviour in the future, should the opportunity arise.
Before considering some of the implications arising from our study, we
draw attention to the evident similarity between fi
findings in the United
Kingdom and Germany. National diff
fferences in the data and analysis were
marginal and very few were detected. As the analysis scaled up through the
process of grouping higher-level categories into broader themes (Urquhart,
Lehmann, & Myers, 2010), the national differences between the United
Kingdom and Germany appeared even less significant, such that the refined
analytical framework consistently represented both countries.
5 IMPLICATIONS AND CONCLUSION
A crucial issue raised by our research is the citizens’ low trust in govern-
ments responsible for personal data. Seltsikas and O’Keefe (2010) explore
the role of trust in the context identity management systems and eID, and
fi
find that government stakeholders believe that IdMS can be used to shore
up the shortfall of trust. By contrast, our study fi
finds that the technology
adds to the risks they face.
Avgerou and Ganzaroli (2009) fi
find that there are common assumptions
in respect of developing countries about the potential of e-government to
restore trust in government institutions. However in their study in Brazil,
the researchers discover that the production of trust in government services
mediated by information and communication technology depends on citi-
zens’ perceptions: the e-voting system is believed to be trustworthy only as
long as the public authority responsible is seen not to be abusing its power.
The problem centers on the institutions and not the technology. However
Lippert and Ojumu (2008) in a study on e-voting fi
find that innovators and
early adopters are more likely to trust the technology and expressed an
intention in this case to use e-voting systems.
Given the negative attitudes reported in our study, an obvious question
would be how trust can be repaired? Part of the problem is that the low
level of trust in government springs from perceived shortcomings in both
integrity and competence (Rousseau and Sitkin, 1998). This double fail-
ure renders the recovery task much more diffi
fficult: research on trust repair
suggests that remedies for integrity violations are at odds with those for
Identifying Online Citizens 117
competence violations. Kim and Dirk (2006) fi
find that a full apology is
more successful for a competence-based violation whereas for an integrity-
based violation what works better is to mitigate the blame with external
attribution, or indeed deny the fault outright.
So if the answer lies neither in technology nor in appropriate speech
acts, such as denial or apology, what steps should governments t
ake in
order to retrieve the situation? Showing more transparency in personal
data storage and processing might ultimately cast governments in a more
benevolent light. There was a clear distinction in our data between the
benevolence aspect of trustworthiness, with the forceful use of emo-
tive expressions and rhetoric, and the competence and integrity aspects,
which respondents tended to express in more rationalistic terms. Recent
research based on neurological analysis showed a clear distinction in the
brain areas associated with the dimensions of trust and distrust, with
credibility and non-credibility being mostly associated with the brain’s
more cognitive areas, while benevolence and malevolence are mostly
associated with the brain’s more emotional areas (Benbasat, Gefen,
& Pavlou, 2010). Benevolence appears to have potential for restoring
trust; perhaps because it speaks to the emotional rather than the rational
side, it off
ffers a more direct route to the perceptions of citizens. Future
research could explore this further and also examine the ethical consid-
erations involved.
This study focused on data collected in just two European Member
States and its relevance is in the analytical rather than the statistical gen-
eralizations that have emerged. However further studies in other Member
States should be encouraged in order to widen the basis and strength of
the generalizations found here. This research has thrown into sharp focus
some issues of real importance to public authorities in their present quest
to move towards citizen-centric e-government. There is keenly felt short-
fall of trust demonstrated by citizens’ negative attitudes. This defi ci
fi ency
can only threaten the success of the new systems, hinder their acceptance
and put into jeopardy their eventual institutionalization. Our analysis of
the negative attitudes expressed found three recurrent themes in the dis-
course of our respondents: IT failures and data leaks, mission creep and
political history. These themes echo three established aspects of trust-
worthiness found in the literature and in our data: integrity, competence,
and benevolence. The aspect most commonly referred to in our data is
the last one, although much previous research has tended to focus on the
first two. Integrity and competence are aspects of trust that are difficult to
recover from when found lacking, although apologies have featured in the
responses of public authorities. Benevolence however remains an aspect of
trustworthiness that public authorities might reasonably examine further
and policy makers in this area should consider changes that demonstrate
more goodwill toward citizens. Citizens are more reassured by instrumen-
tal acts rather than by speech acts: deeds not words.
118 Ruth Halperin and James Backhouse
NOTES
1.
http://ec.europa.eu/idabc/servlets/Doc?id=25286
2.
http://europa.eu/rapid/pressReleasesAction.do?reference=MEMO/10/200&
format=HTML&aged=0&language=EN&guiLanguage=en
3.
http://www.ccbe.eu/fi le
fi admin/user_upload/NTCdocument/en_annex_tech-
nical_s1_1192451405.pdf
REFERENCES
Agar, M. H. (1980). The professional stranger: An informal introduction to eth-
nography.
y New York: Academic Press.
Ågerfalk, P. J. (2004). Grounding through operationalization: Constructing tangi-
ble theory in IS research. Paper presented at the European Conference on Infor-
mation Systems, Turku, Finland.
Avgerou, C., & Ganzaroli, A. (2009). Interpreting the trustworthiness of government mediated by information and communication technology: Lessons from electronic
voting in Brazil. Information Technology for Development, 15(2), 133–148.
Backhouse, J., & Halperin, R. (2009). Approaching interoperability for identity
management systems. In K. Rannenberg (Ed.), Identity in the information soci-
ety: Challenges and opportunities (pp. 245–268). Berlin/Heidelberg: Springer.
Benbasat, I., Gefen, D., & Pavlou, P. A. (2010). Introduction: Novel perspectives
on trust. MIS Quarterly, 34(2), 367–372.
Gefen, D., Benbasat, I., & Pavlou, P. A. (2008). A research agenda for trust in online environments. Journal of Management Information Systems, 24(4), 275–286.
Glaser, B. G., & Strauss, A. L. (1967). The discovery of grounded theory: Strategies for qualitative research. New York: Aldine.
Henri, F. (1992). Computer conferencing and content analysis. In A. Kaye (Ed.),
Collaborative learning through computer conferencing (pp
g
. 117–136). Berlin:
Springer-Verlag.
IDABC. (2005). European Interoperability Framework for Pan-European eGov-
ernment Services, V 1.0.
Kelle, U. (2007). The development of categories: diff
fferent approaches in grounded
theory. In A. Bryant & K. Charmaz (Eds.), The Sage handbook of grounded
theory (pp. 191–213). London: Sage.
Kim, P. H., & Dirks, K T. (2006). When more blame is better than less: The impli-
cations of internal vs. external attributions for the repair of trust after a compe-
tence- vs. integrity-based trust violation. Organizational Behavior and Human
Decision Processes 99(1), 49–65.
Kinder, T. (2003). Mrs Miller moves house: The interoperability of local public
services in Europe. Journal of European Social Policy, 13(2), 141–157.
Kubicek, H., & Noack, T. (2010) Different countries–diff
fferent paths extended
comparison of the introduction of eIDs in eight European countries. Identity in
the Information Society, 3(1), 235–245.
Lee, A. S., & Baskerville, R. L. (2003). Generalizing Generalizibility in Informa-
tion Systems Research. Information Systems Research, 14(3), 221–243.
Lippert, S. K., & Ojumu, E. B. (2008). Thinking Outside of the Ballot Box: Exam-
ining Public Trust in E-Voting Technology. Journal of Organizational & End
User Computing 20(3), 57–80.
Lusoli, W., & Miltgen, C. (2009). Young people and emerging digital services.
An exploratory survey on motivations, perceptions and acceptance of risks.
Retrieved from http://ftp.jrc.es/EURdoc/JRC50089.pdf access date: 1.5.2012
Identifying Online Citizens 119
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of
organizational trust. Academy of Management Review, 20(3), 709–734.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validat-
ing trust measures for e-commerce: an integrative typology. Information Sys-
tems Research, 13(3), 334–359.
McKnight, D. H., Cummings, L. L., & Chervany, N. L. (2008). Initial trust forma-
tion in new organizational relationships. In R. Bachmann & A. Zaheer (Eds.),
Landmark papers on trust. Cheltenham, UK: Edward Elgar.
Otjacques, B., Hitzelberger, P., & Feltz, F. (2007). Interoperability of E-govern-
ment information systems: Issues of identifi
fication and data sharing. Journal of
Management Information Systems, 23(4), 29–51.
Recordon, D., & Reed, D. (2006). OpenID 2.0: A platform for user-centric iden-
tity
management. Paper presented at the ACM workshop on Digital identity
management. Alexandria, VA, USA , October, 2006.
Reddick, C. G. (2010). Citizen-centric E-government. In Reddick, C. (Ed.), Home-
land security preparedness and information systems: Strategies for Managing
Public Policy. 45–75.
Renn, O. (2008). Risk governance. London: Earthscan.
Rousseau, D. M., & Sitkin, S. B. (1998). Not so different after all: A cross-discipline view of trust. Academy of Management Review, 23(3), 393–404.
Saxby, S. (2006). eGovernment is dead: Long live transformation. Computer Law
& Security Report, 22, 1–2.
Scholl, H. J. (2005). Interoperability in e-government: More than just smart mid-
dleware . Paper presented at the HICSS. Proceedings of the 38th Annual Hawaii International Conference on System Sciences. Hawaii.
Seltsikas, P., & O’Keefe, R. M. (2010). Expectations and outcomes in electronic
identity management: The role of trust and public value. European Journal of
Information Systems 19(1), 93–103.
Sen, H. (2010). Sellers’ trust and continued use of online marketplaces. Journal of the Association for Information Systems 11(4), 182–211.
Strauss, A., & Corbin, J. (1990). Basics of qualitative research: grounded theory, procedures, and techniques. Newbury Park, CA Sage.
Urquhart, C., Lehmann, H., & Myers, M. D. (2010). Putting the ‘theory’ back
into grounded theory: Guidelines for grounded theory studies in information
systems. Information Systems Journal, 20, 357–381.
Yamagishi, T., & Yamagishi, M. (1994). Trust and commitment in the United
States and Japan. Motivation and Emotion, 18(2), 129–166.
Yin, R. K. (1984). Case study research: Design and methods. Thousand Oaks, CA: Sage.
10 Profi ling E-Participation Research
fi
in Europe and North America
A Bibliometric Analysis about
Articles Published
Manuel Pedro Rodríguez Bolívar,
Laura Alcaide Muñoz, and Antonio M.
López Hernández
Manuel Pedro Rodríguez Bolívar, et al.
CHAPTER OVERVIEW
Web technology, particularly Web 2.0 and social networks, has changed the
nature of political and public dialog, encouraging participation of citizens,
allowing a greater involvement of citizens in public aff
ffairs and promot-
ing public managers to use them in order to create more aff or
ff dable, par-
ticipatory and transparent public sector management models. Nonetheless,
despite the relevance of the e-participation process in public administra-
Public Sector Transformation Through E-Government Page 21