E-Governance: Website of Ministry of Education of Pakistan
E-Governance: Website of Ministry of Education of Pakistan
E-Governance: Website of Ministry of Education of Pakistan
RESEARCH OBJECTIVE
The objective of this research is to analyze the Website of
ministry of education of Pakistan with respect to its design,
model, internet marketing, legal ethical and social issues
and computer and network security. Also conduct the
SWORT analysis.
Importance of
Government websites:
Importance of Government websites:
Making government sites usable can help
citizens understand
how their government works
how to access services
how to change the laws and policies under
which they live.
Characteristics of good e-
government sites:
The informational (institutional) side, which
explains:
Policies. For example, when the garbage is
picked up, which pets need licenses, etc.
Political structure. For example, who reports to
whom and who is elected versus who is
appointed.
The actions (services) side, which lets people
do such things as:
Pay taxes.
Get a license renewed.
E-government information
architecture
Information-oriented:
Includes institutional policies, politics, and procedures.
Organized around citizens’ lives, not government
bureaucracies.
Action-oriented:
Online services.
Accessible:
The site has to work for everyone.
Navigable:
Understandable navigation, search, index with synonyms, site
map.
Private and Secure:
What information is used for. How information is protected.
People don’t want hackers getting their ID numbers and data
from government sites, or data from one government site
showing up on another.
Easily maintained and added to
There are no million-ruble budgets for maintaining government
2 sides of good e-
government sites
The informational (institutional) side, which
explains:
Policies. For example, when the garbage is picked up,
which pets need licenses, etc.
Political structure. For example, who reports to whom
and who is elected versus who is appointed.
The actions (services) side, which lets people do
such things as:
Pay taxes.
Get a license renewed.
Check who owns a building or factory.
LIFE CYCLE:
The reasons that they share this Customer Information and other Personally
Identifiable Information include the following:
To protect Users.
o To provide superior service.
o To tell you about new or enhanced services and/or products.
o By understanding more about Users and their use of the Products, they can
better meet User needs and determine how other Product features could be of
value to Users.
o Email Updates:
o Customer Information
o Every Product feature that they offer is designed to reflect the ways Users
actually use the Products.
o User Information
o To improve and develop their information, products and services.
Information Confidentiality and Security:
Web site is committed to prevent any unauthorized access to each User's
Customer Information and other Personally Identifiable Information.
a) Security Programs
web site has taken technical, administrative, and physical steps to protect
against unauthorized access to Customer Information and other Personally
Identifiable Information used to administer its customer accounts.
b) User IDs and Passwords.
Each User is responsible for maintaining the confidentiality of his or her
User ID and password, and is responsible for all Product activities that occur
under his or her User ID and password, including, without limitation, all
related Customer Information and other Personally Identifiable Information.
Tips To Help You Protect Your Information:
If any User suspects that someone has had unauthorized access to his or
her account, or access to his Information, such as his or her User ID or
password, the User should send an email to
[email protected] immediately so they can take appropriate action
to protect the User and his or her Customer Information and other
Personally Identifiable Information.
Users may want to consider if it is important to report the crime to local law
enforcement agencies and to the Federal Trade Commission (FTC), sign
onto www.consumer.gov/idtheft. The site also provides links to numerous
consumer education materials.
Evaluated Security
Proxy authentication
Three tier security
RECOMMENDATIONS
To keep track of their visitor, the site should use
o A tailored web experience but at the same time its a violation of the privacy
The site should avoid surveillance. Reasons for surveillance are:
o Slower transmission times
o Harassment suits
o Low productivity
The site should follow the stated policy regarding the collection and use of
visitor’s personal information by using Privacy policy services and software i.e.
o PrivacyBot.com
o TRUSTe
RECOMMENDATIONS
The ministry of education should be responsible for a fair use of copyright i.e.
o The use of a copyrighted work for education, research, criticism
o The purpose of the copyrighted work is examined
o The nature of the copyrighted work is taken into account
o The amount of the material that has been reproduced is reviewed
o The effect is taken into consideration
The site should promote online commerce by legitimizing online contractual
agreements