The Quality of E-Government Management, Information Security and Quality

Aferdita Qekaj-Thaçi, Ledri Thaçi


The purpose of the presented paper was to present the state of e-government services in the Republic of Kosovo within the management of electronic services and the role of ICT in data security and quality. E-government is an important sphere in Kosovo, which has been shown to have positively influenced the provision of services to all stakeholders, taking care of the security and quality of these services. This paper belongs to the qualitative and quantitative types, where a total of 115 subjects, experts, and users of e-government services participated and gave their opinions against these services. A literature review was used to process qualitative data, while a questionnaire was used to process quantitative data with experts and users of e-government services. From the results of the research, we understood that the level of use of e-government services in the Republic of Kosovo is high and that there is a high level of data security and quality of services, where the role of ICT in the management of e-data-government is essential and very important. It is recommended that, according to the results of this study, direct access to the management of these services should be considered and offered to ensure the sustainability of e-government services in the Republic of Kosovo.


Doi: 10.28991/ESJ-2023-07-01-016

Full Text: PDF


E-Government; ICT Role; Security; Quality of Information.


Pérez-Morote, R., Pontones-Rosa, C., & Núñez-Chicharro, M. (2020). The effects of e-government evaluation, trust and the digital divide in the levels of e-government use in European countries. Technological Forecasting and Social Change, 154, 119973. doi:10.1016/j.techfore.2020.119973.

Salminen, M., & Hossain, K. (2018). Digitalisation and human security dimensions in cybersecurity: An appraisal for the European High North. Polar Record, 54(2), 108–118. doi:10.1017/S0032247418000268.

Miloslavskaya, N., Tolstaya, S. (2018). Organization’s Business Continuity in Cyberspace. Biologically Inspired Cognitive Architectures (BICA) for Young Scientists, BICA 2017, Advances in Intelligent Systems and Computing, 636. Springer, Cham, Switzerland. doi:10.1007/978-3-319-63940-6_41.

Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610-613. doi:10.1126/science.1130992.

McLaughlin, M. D., & Gogan, J. (2018). Challenges and best practices in information security management. MIS Quarterly Executive, 17(3), 1-12.

Deakin, M. (2014). Smart Cities: the state-of-the-art and governance challenge. Triple Helix, 1(1), 1-16. doi:10.1186/s40604-014-0007-9.

Stewart, T. M. (2022). A Generic Qualitative Study: What Are the Recommendations for Implementing an e-Government System. Ph.D. Thesis, Capella University, Minneapolis, United States.

Aritonang, D. M. (2017). The Impact of E-Government System on Public Service Quality in Indonesia. European Scientific Journal, 13(35), 99-111. doi:10.19044/esj.2017.v13n35p99.

Grout, P. A., & Stevens, M. (2003). The assessment: Financing and managing public services. Oxford Review of Economic Policy, 19(2), 215–234. doi:10.1093/oxrep/19.2.215.

Ferlie, E., Hartley, J., & Martin, S. (2003). Changing Public Service Organizations: Current Perspectives and Future Prospects. British Journal of Management, 14(s1), S1–S14. doi:10.1111/j.1467-8551.2003.00389.x.

Margetts, H. (2021). Public management change and e-government: The emergence of digital-era governance. Routledge Handbook of Internet Politics, 130–146, Routledge, United Kingdom. doi:10.4324/9780203962541-16.

Oden, M., & Strover, S. (2002). Links to the Future: The Role of Information and Telecommunications Technology in Appalachian Economic Development. Appalachian Regional Commission, University of Texas, Austin, United States.

Malodia, S., Dhir, A., Mishra, M., & Bhatti, Z. A. (2021). Future of e-Government: An integrated conceptual framework. Technological Forecasting and Social Change, 173. doi:10.1016/j.techfore.2021.121102.

Glyptis, L., Christofi, M., Vrontis, D., Giudice, M. Del, Dimitriou, S., & Michael, P. (2020). E-Government implementation challenges in small countries: The project manager’s perspective. Technological Forecasting and Social Change, 152, 119880. doi:10.1016/j.techfore.2019.119880.

Hartley, J. (2005). Innovation in governance and public services: Past and present. Public Money and Management, 25(1), 27–34. doi:10.1111/j.1467-9302.2005.00447.x.

Torchia, M., Calabrò, A., & Huse, M. (2011). Women Directors on Corporate Boards: From Tokenism to Critical Mass. Journal of Business Ethics, 102(2), 299–317. doi:10.1007/s10551-011-0815-z.

Holzer, H. (2015). Job market polarization and US worker skills: A tale of two middles. Economic Studies, the Brookings Institution, Washington, United States.

Vevera, A. V, & Udroiu, A. M. (2018). Cost Analysis for Cyberattack. Romanian Journal of Information Technology and Automatic Control, 28(4), 7–12. (In Romanian).

Vasiu, I., & Vasiu, L. (2018). Cybersecurity as an Essential Sustainable Economic Development Factor. European Journal of Sustainable Development, 7(4), 171–178. doi:10.14207/ejsd.2018.v7n4p171.

Zheng, Y. (2015). Trajectory data mining: An overview. ACM Transactions on Intelligent Systems and Technology, 6(3), 1–41. doi:10.1145/2743025.

Dhillon, G., & Backhouse, J. (2001). Current directions in IS security research: towards socio-organizational perspectives. Information Systems Journal, 11(2), 127–153. doi:10.1046/j.1365-2575.2001.00099.x.

Alshehri, M., Drew, S., Alhussain, T., & Alghamdi, R. (2012). The Effects of Website Quality on Adoption of E-Government Service: AnEmpirical Study Applying UTAUT Model Using SEM. arXiv preprint. doi:10.48550/arXiv.1211.2410.

Santos, R. B., Hart, P. W., Jameel, H., & Chang, H. M. (2013). Wood based lignin reactions important to the biorefinery and pulp and paper industries. BioResources, 8(1), 1456–1477. doi:10.15376/biores.8.1.1456-1477.

Nabafu, R., & Maiga, G. (2012). A Model of Success Factors for Implementing Local E-government in Uganda. Electronic Journal of E-Government: EJEG; Reading, 10(1), 31–46.

Shackleton, P. & Dawson, L. (2007). Doing it tough: factors impacting on local e-Government Mmaturity. 20th Bled eConference eMergence: Merging and Emerging Technologies, Processes, and Institutions, 3-6 June, 2007, Bled, Slovenia.

Dias, G. P., & Gomes, H. (2014). Evolution of local e-government maturity in Portugal. 2014 9th Iberian Conference on Information Systems and Technologies (CISTI). doi:10.1109/cisti.2014.6877041.

Al-Jaghoub, S., Al-Yaseen, H., & Al-Hourani, M. (2010). Evaluation of Awareness and Acceptability of Using e Government Services in Developing Countries: The Case of Jordan. Electronic Journal of Information Systems Evaluation, 13(1), 1-8.

Zaidi, S. F. H., & Qteishat, M. K. (2012). Assessing e-government service delivery (government to citizen). International journal of e-business and e-government studies, 4(1), 45-54.

Carter, L., Yoon, V., & Liu, D. (2022). Analyzing e-government design science artifacts: A systematic literature review. International Journal of Information Management, 62, 102430. doi:10.1016/j.ijinfomgt.2021.102430.

Khan, S., Umer, R., Umer, S., & Naqvi, S. (2021). Antecedents of trust in using social media for E-government services: An empirical study in Pakistan. Technology in Society, 64, 101400. doi:10.1016/j.techsoc.2020.101400.

Bulgurcu, Cavusoglu, & Benbasat. (2010). Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly, 34(3), 523. doi:10.2307/25750690.

Da Veiga, A., & Eloff, J. H. P. (2010). A framework and assessment instrument for information security culture. Computers & Security, 29(2), 196–207. doi:10.1016/j.cose.2009.09.002.

Grossmann, K., Connolly, J. J. T., Dereniowska, M., Mattioli, G., Nitschke, L., Thomas, N., & Varo, A. (2022). From sustainable development to social-ecological justice: Addressing taboos and naturalizations in order to shift perspective. Environment and Planning E: Nature and Space, 5(3), 1405–1427. doi:10.1177/25148486211029427.

Wimmer, M., & Von Bredow, B. (2002). A holistic approach for providing security solutions in e-government. Proceedings of the 35th Annual Hawaii International Conference on System Sciences. doi:10.1109/hicss.2002.994083.

Sorensen, J. A., Brewer, D., Wyckoff, L., Horsman, M., Scott, E., & May, J. J. (2013). Building safety partnerships using social network analysis. Social Marketing Quarterly, 19(2), 67–75. doi:10.1177/1524500413483457.

Ullah, M. N., Mahmood, A., Razzaq, S., Ilahi, M., Khan, R. D., & Javaid, N. (2013). A survey of different residential energy consumption controlling techniques for autonomous DSM in future smart grid communications. arXiv preprint arXiv:1306.1134. doi:10.48550/arXiv.1306.1134.

Vicente, M. R., & Novo, A. (2014). An empirical analysis of e-participation. The role of social networks and e-government over citizens’ online engagement. Government Information Quarterly, 31(3), 379–387. doi:10.1016/j.giq.2013.12.006.

Parasuraman, A., Zeithaml, V. A., & Malhotra, A. (2005). E-S-QUAL a multiple-item scale for assessing electronic service quality. Journal of Service Research, 7(3), 213–233. doi:10.1177/1094670504271156.

Zissis, D., & Lekkas, D. (2011). Securing e-Government and e-Voting with an open cloud computing architecture. Government Information Quarterly, 28(2), 239–251. doi:10.1016/j.giq.2010.05.010.

Mensah, I. K., Jianing, M., & Durrani, D. K. (2017). Factors influencing citizens’ intention to use e-government services: A case study of South Korean students in China. International Journal of Electronic Government Research, 13(1), 14–32. doi:10.4018/IJEGR.2017010102.

Posthumus, S., & Von Solms, R. (2004). A framework for the governance of information security. Computers and Security, 23(8), 638–646. doi:10.1016/j.cose.2004.10.006.

Martin, M. (2011). Cutadapt removes adapter sequences from high-throughput sequencing reads. EMBnet.Journal, 17(1), 10-12. doi:10.14806/ej.17.1.200.

Von Solms, B. (2005). Information Security governance: COBIT or ISO 17799 or both? Computers and Security, 24(2), 99–104. doi:10.1016/j.cose.2005.02.002.

Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS quarterly, 34(3), 487-502. doi:10.2307/25750688.

Lee, H., & Kim, C. (2014). Benchmarking of service quality with data envelopment analysis. Expert Systems with Applications, 41(8), 3761–3768. doi:10.1016/j.eswa.2013.12.008.

Ifinedo, P. (2018). Roles of organizational climate, social bonds, and perceptions of security threats on IS security policy compliance intentions. Information Resources Management Journal, 31(1), 53–82. doi:10.4018/IRMJ.2018010103.

Sá, F., Rocha, Á., & Cota, M. P. (2016). Potential dimensions for a local e-Government services quality model. Telematics and Informatics, 33(2), 270–276. doi:10.1016/j.tele.2015.08.005.

Khawaja, A. R., Bokhari, S. M. A., Rasheed, T., Shahzad, A., Hanif, M., Qadeer, F., & Jafferany, M. (2015). Disease Severity, Quality of Life, and Psychiatric Morbidity in Patients with Psoriasis With Reference to Sociodemographic, Lifestyle, and Clinical Variables. The Primary Care Companion for CNS Disorders. doi:10.4088/pcc.14m01629.

Gibbs, J. L., & Kraemer, K. L. (2004). A Cross-Country Investigation of the Determinants of Scope of E-commerce Use: An Institutional Approach. Electronic Markets, 14(2), 124–137. doi:10.1080/10196780410001675077.

Hien, N. M. (2014). A study on evaluation of e-government service quality. International Journal of Humanities and Social Sciences, 8(1), 16-19. doi:10.5281/zenodo.1336168.

Posthumus, S., von Solms, R. (2005). A Responsibility Framework for Information Security. Security Management, Integrity, and Internal Control in Information Systems. IICIS 2004. IFIP International Federation for Information Processing, 193. Springer, Boston, United States. doi:10.1007/0-387-31167-X_13.

Lee, W. J., & Lucey, J. A. (2004). Structure and physical properties of yogurt gels: Effect of inoculation rate and incubation temperature. Journal of Dairy Science, 87(10), 3153–3164. doi:10.3168/jds.S0022-0302(04)73450-5.

Frisbie, D. D., Cross, M. W., & McIlwraith, C. W. (2006). A comparative study of articular cartilage thickness in the stifle of animal species used in human pre-clinical studies compared to articular cartilage thickness in the human knee. Veterinary and Comparative Orthopaedics and Traumatology, 19(3), 142–146. doi:10.1055/s-0038-1632990.

Klischewski, R., & Scholl, H. J. (2008). Information quality as capstone in negotiating e-government integration, interoperation and information sharing. Electronic Government, 5(2), 203–225. doi:10.1504/EG.2008.016647.

Amaldas, C., Shankaranarayanan, A., & Gemba, K. (2012). Technology Instigated Learning Outcomes (TILO): A Management of Technology (MOT) based framework for enabling student needs inside and outside the classroom environment. Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE’12), 16-19 July, 2012, Las Vegas, United States.

Full Text: PDF

DOI: 10.28991/ESJ-2023-07-01-016


  • There are currently no refbacks.

Copyright (c) 2022 Aferdita Qekaj-Thaçi