Digital Government Services and Associated Risks Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

As the public expects government services to be simple compared to what the private sector offers, many states institutions worldwide embrace the use of digital technology to ease their service delivery. Digital government services can be illustrated as providing amenities within the parastatal and between the public and government by employing the use of modern information and communication technology (Carte et al., 2016). With the increase in technological advancement, mobile devices have been used to deliver government aid. Before the current digital era, government assistance was offered physically where a client had to visit the physical offices and to seek solutions. However, mobile platforms’ emergence has created an opportunity to access government services in their comfort zones. The help ranges from applying for jobs to filing taxes. Currently, most administrative institutions are using e-government because it integrates all services and one application.

Mobile applications are the software designed and incorporated into mobile device to help in accessing digital services. Some apps can be simple and user friendly while others can be complicated, and mostly, they can require security logins, for instance, national identification numbers or passwords (OECD, 2016). Mobile devices that accept the apps include smartphones, and any other hybrid device that uses broadband and cellular. The apps help in communication; thus, they direct the user on the steps to follow to access the services.

In the 21st century, the world has been modernized by technology, enabling people to be more connected than before. Additionally, trade has been eased since entrepreneurs can access the global market with comfort. Technological advancements have ensured that business increases their profits because it aids real-time information delivery; therefore, it enables companies to get immediate feedback from their customers (Carter et al., 2016). Moreover, productivity in employees is enhanced because of the improved functionality. Despite the benefits associated with digital services, there are several risks posed to the public, especially security issues. As the traditional modes of communication, the applications are vulnerable to both internal and external attacks. In most cases, public and other organizations usually complain of unauthorized people obtaining private information without their consent.

The main risks associated with the mobile applications include:

  1. Insecure communication- In a typical mobile app, information is mainly exchanged in a client-server fashion. This, therefore, implies that during the data transmission via the application, the information navigates the internet and the carrier network of the mobile devices. As a result, attackers can seize the opportunity of the software vulnerabilities and access the user data in the network. Therefore, it can present insecure communication, creating malware in mobile devices.
  2. Lack of input validation – Input validation enables a company to assess its software; hence, it can prevent the app’s malfunction. Lack of validation imposes harmful codes into the system that can instigate malfunction in the mobile app (Sharma et al., 2018). As a result, attackers can introduce malicious data into the app, thus, breaching data stores. In a real sense, input validation should be conducted immediately after the data is obtained from an externally located source. Although input validation can prevent malicious data if conducted efficiently, it rarely defends the mobile app against security risks.
  3. Insecure data storage – This usually occurs in different locations within the mobile app, and they include cookies, SQL databases, binary data stores, among others. Insecure data storage can be vulnerable and easily compromised without issues such as a framework and jailbroken devices (OECD, 2016). Attackers can maneuver their acts across the mobile app’s security protocols when encryption libraries are poorly performed, making it easy for the criminals to bypass by using jailbreaking or rooting the mobile devices (Sharma et al., 2018). Any access to the app will allow the attackers to manipulate the original app, enabling them to extract crucial information from the system. Therefore, intellectual property loss and identity theft can be experienced.
  4. Client code security – issues of code security are usually experienced in mobile applications. They are generally difficult to detect and can take a considerable amount of time to handle. Automated tools are usually used to detect client code security problems, and they are never sufficient; thus, it requires the deployment of a manual system where automation fails.
  5. Reverse engineering – Attackers can usually read the codes of mobile applications using reverse engineering. They determine how the app operates on the back end; thus, they can backtrack the processes used to make the application, modify the source codes, and expose the algorithm’s encryption used. In other words, the code used to develop an app can be used against the developer, thus, posing severe surety risks.

To curb the security risks, several government agencies have been tasked to propose mitigation measures to improve US citizens’ quality of services. Therefore, the agencies decided to collaborate with other entities to provide Mobile Security Reference Architecture popularly known as MSRA (“Mobile Security R&D Program Guide,” 2019). The program has helped both the government and the private institutions to handle security issues poised by mobile applications, therefore, protecting the citizens.

References

Carter, L., Weerakkody, V., Phillips, B., & Dwivedi, Y. K. (2016). Information Systems Management, 33(2), 124-140. Web.

Mobile Security R&D Program Guide. (2019). Homeland Security. Web.

OECD. (2016). Public Services in the Welfare Areas. Web.

Sharma, S. K., Al-Badi, A., Rana, N. P., & Al-Azizi, L. (2018). Mobile applications in government services (mG-App) from user’s perspectives: A predictive modelling approach. Government Information Quarterly, 35(4), 557-568.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, October 6). Digital Government Services and Associated Risks. https://ivypanda.com/essays/digital-government-services-and-associated-risks/

Work Cited

"Digital Government Services and Associated Risks." IvyPanda, 6 Oct. 2022, ivypanda.com/essays/digital-government-services-and-associated-risks/.

References

IvyPanda. (2022) 'Digital Government Services and Associated Risks'. 6 October.

References

IvyPanda. 2022. "Digital Government Services and Associated Risks." October 6, 2022. https://ivypanda.com/essays/digital-government-services-and-associated-risks/.

1. IvyPanda. "Digital Government Services and Associated Risks." October 6, 2022. https://ivypanda.com/essays/digital-government-services-and-associated-risks/.


Bibliography


IvyPanda. "Digital Government Services and Associated Risks." October 6, 2022. https://ivypanda.com/essays/digital-government-services-and-associated-risks/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1