Skip to main content

2017 | OriginalPaper | Buchkapitel

The Effects of Public Key Infrastructure (PKI) Implementation on Process Improvements in Public Authorities: An Empirical Study of the PKI Implementation in Tax Administration of the Federation of Bosnia and Herzegovina

verfasst von : Aida Habul, Amila Pilav-Velić, Mirza Teftedarija

Erschienen in: Financial Environment and Business Development

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The use of public key infrastructure in administration has great potential, given that a large number of services are performed in a traditional manner, including long waiting lines and the waste of time, human, and financial resources. This paper is aimed at investigating whether the PKI implementation in public institution such as the Federation BiH Tax Administration contributes to improving its process, enhancing performance and quality of public services, including the end-user satisfaction. The research focuses on the two most extensive and basic processes of Tax Administration (TA): the tax form submission and the issuance of tax payment certificates. The methodology includes comparison between the existing “AS IS model,” based on the manual authentication and the new “TO BE model,” which includes the PKI implementation. The research findings indicate that TO BE model has contributed to the process optimization, including a complete automation of the user authentication and authorization processes. Therefore, the filling of tax return process is carried out in 5, instead of previous 14 different processes, resulting in significant costs in savings and time. On the other hand, a successful PKI implementation depends on the understanding and commitment of staff, including their readiness to change. To that end, they were asked to respond to a questionnaire on their experiences with the PKI. The sample included 37 respondents, who work in different tax offices. It is encouraging that 89 % of them are convinced that the PKI implementation in their institution would significantly improve their tasks and processes, enabling them to develop partnerships with taxpayers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
Zurück zum Zitat Adams, C., & Lloyd, S. (2002). Understanding PKI (2nd ed.). Boston: Addison Wesley. Adams, C., & Lloyd, S. (2002). Understanding PKI (2nd ed.). Boston: Addison Wesley.
Zurück zum Zitat Chadwick, D. W., & Zhao, G. (2005). Public key infrastructure. In Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30–July 1, 2005. Chadwick, D. W., & Zhao, G. (2005). Public key infrastructure. In Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30–July 1, 2005.
Zurück zum Zitat Henry, D. (1999, November). Who’s got the key?. In Conference Proceedings. 27th Annual ACM SIGUCCS Conference on User Services: Mile High Expectations (pp. 106–110). Denver, Colorado, USA. Henry, D. (1999, November). Who’s got the key?. In Conference Proceedings. 27th Annual ACM SIGUCCS Conference on User Services: Mile High Expectations (pp. 106–110). Denver, Colorado, USA.
Zurück zum Zitat Hsu, C. I., & Tung, Y. C. (2008). The benefits of PKI application and competitive advantage. WSEAS Transactions on Communications, 7(7), 776–785. Hsu, C. I., & Tung, Y. C. (2008). The benefits of PKI application and competitive advantage. WSEAS Transactions on Communications, 7(7), 776–785.
Zurück zum Zitat Kohlas, R., & Maurer, U. (2000). Confidence valuation in a public-key infrastructure based on uncertain evidence. In H. Imai & Y. Zheng (Eds.), PKC’2000, Third International Workshop on Practice and Theory in Public Key Cryptography LNCS 1751(pp. 93–112). Melbourne, Australia: Springer. Kohlas, R., & Maurer, U. (2000). Confidence valuation in a public-key infrastructure based on uncertain evidence. In H. Imai & Y. Zheng (Eds.), PKC’2000, Third International Workshop on Practice and Theory in Public Key Cryptography LNCS 1751(pp. 93–112). Melbourne, Australia: Springer.
Zurück zum Zitat Kovinić, M. (2010). Uvod u kriptografiju i infrastrukturu javnih ključeva (PKI) [Introduction to cryptography and public key infrastructure]. Beograd, Serbia: AMRES. Kovinić, M. (2010). Uvod u kriptografiju i infrastrukturu javnih ključeva (PKI) [Introduction to cryptography and public key infrastructure]. Beograd, Serbia: AMRES.
Zurück zum Zitat Lambrinoudakis, C., Gritzalis, S., Dridi, F., & Pernul, G. (2003). Security requirements for e-government services: A methodological approach for developing a common PKI-based security policy. Computer Communications, 26(16), 1873–1883.CrossRef Lambrinoudakis, C., Gritzalis, S., Dridi, F., & Pernul, G. (2003). Security requirements for e-government services: A methodological approach for developing a common PKI-based security policy. Computer Communications, 26(16), 1873–1883.CrossRef
Zurück zum Zitat Law on electronic documents. (2013). Sarajevo: Official Gazette of the FBIH, No. 55. Law on electronic documents. (2013). Sarajevo: Official Gazette of the FBIH, No. 55.
Zurück zum Zitat Lin, C. C., & Laih, C. S. (2003). The GPKI developing status of Taiwan and some major Asia countries. Computer Communications, 26(16), 1884–1892.CrossRef Lin, C. C., & Laih, C. S. (2003). The GPKI developing status of Taiwan and some major Asia countries. Computer Communications, 26(16), 1884–1892.CrossRef
Zurück zum Zitat Lofstedt, U. (2012). E-government-assessment of current research and some proposals for future directions. International Journal of Public Information Systems, 1(1), 39–52. Lofstedt, U. (2012). E-government-assessment of current research and some proposals for future directions. International Journal of Public Information Systems, 1(1), 39–52.
Zurück zum Zitat Nash, A., Duane, W., Joseph, C., & Brink, D. (2001). PKI: Implementing and managing E-security. New York: Osborne/McGraw-Hill. Nash, A., Duane, W., Joseph, C., & Brink, D. (2001). PKI: Implementing and managing E-security. New York: Osborne/McGraw-Hill.
Zurück zum Zitat Raina, K. (2003). PKI security solutions for the enterprise: Solving HIPAA, E-paper Act, and other compliance issues. Indianapolis: Wiley. Raina, K. (2003). PKI security solutions for the enterprise: Solving HIPAA, E-paper Act, and other compliance issues. Indianapolis: Wiley.
Metadaten
Titel
The Effects of Public Key Infrastructure (PKI) Implementation on Process Improvements in Public Authorities: An Empirical Study of the PKI Implementation in Tax Administration of the Federation of Bosnia and Herzegovina
verfasst von
Aida Habul
Amila Pilav-Velić
Mirza Teftedarija
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-39919-5_23