Microsoft Word - 2.5804-19321-LE3R Knowledge Engineering and Data Science (KEDS) pISSN 2597-4602 Vol 2, No 1, Juni 2019, pp. 10–18 eISSN 2597-4637 https://doi.org/10.17977/um018v2i12019p10-18 ©2019 Knowledge Engineering and Data Science | W : http://journal2.um.ac.id/index.php/keds | E : keds.journal@um.ac.id This is an open access article under the CC BY-SA license (https://creativecommons.org/licenses/by-sa/4.0/) The Diffusion of ICT for Corruption Detection in Open Government Data Darusalam a, 1, *, Jamaliah Said a, 2, Normah Omar a, 3, Marijn Janssen b, 4, Kazi Sohag c, 5 a Accounting Research Institute, University Teknologi Mara, Malaysia, Level 12, Menara Sultan Abdul Aziz Shah, Universiti Teknologi MARA, 40450 Shah Alam, Selangor, Malaysia b Department of Technology, Policy and Management, Delft University of Technology Building 31 Jaffalaan 5, Delft and 2628 BX Delft, Netherlands c Graduate School of Economics and Management Ural Federal University, Russia. Lenin Ave, 51, Yekaterinburg, Sverdlovskaya oblast', 620075, Russia 1 darusalam85@gmail.com*; 2 jamaliah533@salam.uitm.edu.my; 3normah645@salam.uitm.edu.my; 4M.F.W.H.A.Janssen@tudelft.nl; 5sohagkaziewu@gmail.com * corresponding author I. Introduction Recently, open data has become popular due to the drastic growth of information technology [1]. Government agencies, state own companies, nonprofit organisation have started initiatives to open their data to enhance the transparency and accountability toward the stakeholder [1]. Open data enables public to access data freely, subsequently monitor and participate in government activities. Some developing countries have already implemented open data for fighting corruption. Information and Communication Technology (ICT) development enable the opening of data to create transparency and have the potential to create anti-corruption tools. [2] argues that there are five significant ways in which ICT can help reducing corruption risks: Raising awareness of specific governance problems (types of corruption); Providing low-cost online platforms to monitor and promote more inclusive, transaction and accountable decision-making. As a result it can reduce the cost of distribution, accessing and collecting government information [3]; Reduce the incentives for corruption by reducing the direct contact and familiarity between end-users and decision-makers; enabling the more effective control of financial transactions that may put the integrity of politically exposed agents (individual or collective) at stake; and Speeding up public awareness for anti- corruption campaigns. ARTICLE INFO A B S T R A C T Article history: Received 29 November 2018 Revised 25 April 2019 Accepted 13 May 2019 Published online 23 June 2019 Corruption occurs in many places within the government. To tackle the issue, open data can be used as one of the tools in creating more insight into the government. The premise of this paper is to support the notion that data opening can bring up new ways of fighting corruption. The current paper aimed at investigating how open data can be employed to detect corruption. This open data is trivial due to challenges like information asymmetry among stakeholders, data might only be opened partly, different sources of data need to be combined, and data might not be easy to use, might be biased or even manipulated. The study was conducted using a literature review approach. The reviews implied that corruption can be detected using Open Government Data, Thus, by conducting the open data technique within the government, the public could monitor the activities of the governments. The practical contribution of this paper is expected to assist the government in detecting corruption by using a data-driven approach. Furthermore, the scientific contribution will originate from the development of a framework reference architecture to uncover corruption cases. This is an open access article under the CC BY-SA license (https://creativecommons.org/licenses/by-sa/4.0/). Keywords: Open Data Anti-Corruption Activity Theory Public Sector Private Sector Information and Communication Technology Darusalam et al. / Knowledge Engineering and Data Science 2019, 2 (1): 10–18 11 Corruption is a problem in the public and private sector and came in many shapes and forms including: bribery [4], embezzlement [5], theft [6], extortion [7], abuse of power [8], discretion [9], favoritism [10], conflicting interest [11], and improper political contribution [12]. The consequences of corruptions are diverse. Corruption can harm society and result in increased poverty, diminishing money available for essential government services, destroy citizen trust in government and undermining economic growth The open data has been used as a mechanism to fight against corruption has been successfully implemented. The original mission of open data is to enhance credibility, the democratisation of government decisions, participation and the promotion of a global culture of transparency and accountability. For example, Timor Leste a small island close to Indonesia with 1 million inhabitants is using financial data to monitor and control corruption [13]. Thus, this study aims to investigate how open data can be used to detect corruption. This paper explores the literature on ICT development and open data as a mechanism to fight against corruption. In this paper, the institutional setting will be taken into account, but the change of the culture is outside the scope. The following section of this research provides background information regarding the developments including open government data (OGD), data-driven detection of corruption and overview of stakeholder. Next, the challenge for data-driven corruption detection. After that, the problem statement and research objective are presented. Finally, this proposal discusses the research phases and research method. II. Methods This study review past related literature on the role of open data in mitigating corruption. The literature review is focused on 1) open government data 2) information architecture and 3) corruption detection. The determined critical concepts for the literature reviews include open government data, corruption, and accountability. Articles were found by using Scopus, JSTOR, ACM, Digital Library, and Google Scholar/l Snowballing will be used examining the citations in the identified articles and adding these articles. A literature review is one of the critical elements for research and generally focus as fundamental in a research project [14]. Webster and Watson’s 2002 study [15] stated that new researcher uses the method of the literature review is as nothing more than grouping some papers and summaries it or collaborated the multiple research manuscript of annotated bibliography. The definition of literature review for various scholars mentioned as “the use of ideas in the literature to justify the particular approach to the topic, the selection of methods, and demonstration that this research contributes something new” Hart’s study cited in [15]. Hart (1998) also noted that for the literature review, “quality means appropriated breadth and depth, rigour and consistency, clarity and brevity and effective analysis and synthesis” cited in [15]. [15] in reporting Shaw’s study emphasised that the aspect of a literature review should “explain how one piece of research builds on another”. In line with the above definition, Webster and Watson’s [15] (2002) define the literature review as one that “creates a firm foundation for advancing knowledge. It facilitates theory development, closes areas where a plethora of research exists, and uncovers areas where research is needed”. According to [15], an effective literature review should follow the following steps. First, conducting methodological analysis and synthesizing the quality of the literature. Secondly, providing a firm foundation for a research topic. Thirdly, providing a firm foundation to the selection of research methodology, and finally, demonstrating the usefulness of the proposed research to the overall body of knowledge or advancing the research field’s knowledge-base. Figure 1 described the three-step process to propose a literature review. The process contains the following steps; 1) Inputs, 2) Processing and 3) Outputs. It gives an overall view of the process proposed. This proposal is using a literature review as the first step to define the critical constructs of study as well as to identify factors which influence open data to detect corruption. Webster and Watson’s 2002 [15] stated that a useful and quality literature review is a review that is based upon a concept-centric approach rather than chronological or author-centric approach. Researchers must ask themselves when they are reviewing and writing the literature review and see if the presented articles are related or not to the study [15]. 12 Darusalam et al. / Knowledge Engineering and Data Science 2019, 2 (1): 10–18 III. Results and Discussion This part presents a global overview of how ICT especially open data can be used for mitigating corruption. A. Opening the Government Data The former President of United States of America, Barrack Obama, stated in a memorandum of Transparency and Open Government that the government should ensure the public trust and establish a system of transparency, public participation, and collaboration [16]. Openness will strengthen our democracy and promote efficiency and effectiveness in government. The European Commission also state that the availability of raw data and document in various readable format and languages may maximise the re-useability value of public sector information (PSI) (European Commission, 2010, p.5). Therefore, the government should provide the most practical data for users. Data should be available, for free, over the Internet in open, structured, machine-readable formats to anyone who wants to use it [17]. According to [18] open data is freely accessed internet data, can be to re-used without limitation. [19] said that everyone can freely see, use and inform the open data to others. Open data can be freely used, re-used and distributed by anyone and make their work available to be shared as well [20]. These definitions show that the main characteristics of open data are data (re)use, machine-readable and access. Machine-readable should ensure that a massive amount of data can be processed automatically. Open data has the potential to support the detecting of corruption; however, how this can be done is not known yet. Data collection, current systems, administrative processes and institutional arrangements might need to be changed. A reference information architecture capturing administrative processes, data, and software systems and organizational principles can help to develop systems to support the detecting of corruption. Open data has become an important and growing topic in many developing countries [21] due to improve transparency, accountability and citizen participation [22]. [22] argue that there are five primary drivers of open data initiative in developing countries. First, an open data initiative can be motivated by politicians to improve the information flow within the government and with other stakeholders to reduce administrative burden, costs and inefficiencies. Second, the increase of accountability may strengthen the government political policies by giving better information on regional, local or sectoral government activities. The third driver for open data initiative is the pressure from civil society, media, and parliamentarians or private companies. The fourth is international pressures to create data transparency. The last driver is the government motives to gain reputation from transparency. B. ICT for Corruption Mitigation This part presents a global overview of how ICT can be used for mitigating corruption. There are three types of indicator in ICT such as ICT access, ICT use and ICT skill. We only focus on ICT access which is consists of five proxies. For example, fixed telephone subscriptions, mobile phone, Fig. 1. The three stages of effective literature review process [15] Darusalam et al. / Knowledge Engineering and Data Science 2019, 2 (1): 10–18 13 internet bandwidth, the computer used, and internet access. [2] argues that there are five major ways in which ICT can help reducing corruption risks: 1) Raising awareness of specific governance problems (types of corruption); 2) Providing low-cost online platforms to monitor and promote more comprehensive transaction and accountable decision making. As a result it can reduce the cost of distribution, accessing and collecting government information [3]; 3) Reduce the incentives for corruption by reducing the direct contact and familiarity between end-users and decision-makers; 4) Enabling the more effective control of financial transactions that may put the integrity of politically exposed agents (individual or collective) at stake; and 5) Speeding up public awareness for anti- corruption campaigns. ICT of Information and Communications technology is referred to actions that provide connecting to information through other electronic technologies such as, Internet, wireless networks, cell phones and other mediums communication [23][24]. Some prior studies argue that ICT has a positive relationship in fighting corruption and improve quality governance. Previous studies indicated that ICT is able to provide countries a new method to creating transparency and indorsing anti-corruption [3][25][26][27][28][29][30][31]. Subsequently, a high number of countries try to implement and connected transparency with ICT-based initiative for example through e-government [32]. Furthermore, according to [33], in India ICT is success support quality of governance. ICT support the decision of public administrators to improve planning and monitoring programs for more transparent public services through access to information and knowledge. For instance, the use of GIS (Geographical information system) for planning location of rural facilities or identifying the disaster area. Another example is the use of telephone to develop socioeconomic development [34]. People can reduce their communication cost since the telephone can minimise the number of communicating links among some parties. Following that, many ICT literatures commented on the implementation of ICT approach to reducing corruption. For instance, [30] ICT can promote to reduce corruption by implemented good governance, strengthening reform-oriented initiatives, reducing the potential for corrupt actions, improving the connection between citizens and public employee, permit the citizen to follow their activities, monitor and control the public employee actions. Also, [35] stated that, to success in reducing, the ICT initiatives must be changed to disclose the information. As a result, the societies, NGO, researcher, politicians can track the decisions and action that lead by a government employee. In the same time, some governments see the implementation of ICT as a resource to encourage efficiency and transparency in the same [36]. In general, ICT envision as a practical tool to reduce corruption, although social culture can reduce the effectiveness of ICT as anti-corruption [29]. Statistical analyses and cases studies show that ICT is demonstrating a great deal in reducing corruption. Especially, ICT can improve the effectiveness of managerial and internal control ended by fraudulent behaviour as well as endorsing the transparency and accountability on governments [30]. A study by [37] regarding the analysing of corruption data over ICT-enable e-government initiatives concluded that corruption could be reduced significantly by implementing e-government, “even after controlling for any propensity for corrupt governments to be more or less aggressive in adopting e-government initiatives” [37] p. 210. Other studies examined the successes of e-government in reducing corruption in some countries like Americans, Europe and Asia [21][30]. The most prominent successes solution for fighting corruption by e-government in the area of taxes and government contracts [12]. For examples, in India, by provided the property record online in a rural area has significantly improved the speed at which the records are retrieved and updated, whereas, in the same time erasing the opportunities for the local employee to receive bribes as had previously been widespread [21]. The property records online or the Bhoomi electronic land record system at Karnataka, India is approximate to have saved 7 million in bribes to the local employee in its first several years. Before the implemented the system, it required Rs.100 to transfer to a local employee for bribes, though the electronic system only takes Rs.2 [38]. Similarly, in Pakistan, by using e-government for tax transaction. The government was restructured all tax system and the department to e-government structure. The aims are to decrease the face to face contact between tax employee and citizen to decreasing chances for requests for bribes [37]. Also, in the Philippines Department of budget and management, they create an e-procurement system for bidding on government contracts to both avoid price fixing and provide accountability on the public. In the same way, in Chile nation, e-procurement system was established to provide public and citizens 14 Darusalam et al. / Knowledge Engineering and Data Science 2019, 2 (1): 10–18 to see and compare the cost and services of the bids purchased by the government. The e-procurement system provides 500 outsourced services from more than 6,000 providers [30]. The system approximately gives advantages $150 million US per year by avoiding price fixing or inflation by corrupt officials and contractors. Not to mention, this new system gives a positive contribution to reducing corruption and allow small business to participate in the government bidding process [39]. As a matter of fact, in Fiji, the successful of e-government to reducing corruption has built positive public perception of government corruption. As a result, it improves the responsiveness of public employee to provide better services to citizens [40]. Coupled with, the United State has establishing web sites that permit access to the government expenditure data, for instance (recovery-gov) general funds (USA spending-gov), and information technology funds (IT USA spending-gov) web sites, the purpose is involving society to control the government spending for earlier identification and removal of wasteful projects [16]. Some states in the US adopted similar websites involving the citizens to control and monitor government spending for waste and fraud. Additionally, some U.S websites on government permit for tracking of transaction therefore that it is possible to monitor the progress of one’s application or a request from government services. For example, the U.S Customs and Immigration Services (USCIS) give access to immigrants to check their application progress. Similarly, with U.S Department of State allow passport seekers to check the progress of their application. This service allows a significant number of the user (such as citizens, residents, immigrants) to monitor the progress of their application through online services. As a result, it saves the time for the user, efficiency and offers reasonable timeframes for processes of some services, documents and resources [12]. Thus, [2] argues that some conditions should be in places to make ICT as a weapon to fight against corruption like training of public officials, and institutional arrangements. The latter is necessary for the ability to further analysis and take interventions after spotting possible corruption. Since corruption is rooted in culture ICT alone is not sufficient to reduce corruption they should collaborate with public governance, institution, media and society [2]. C. Open Data-driven corruption detection More data is available that can be used to detect possible corruption. The availability of a large volume of data is often named ‘big data’ [41]. Corruption is often hard to detect and to observe. Anomalies, outliers or changes in the patterns might be a sign of corruption. It is likely that multiple data sources need to be combined with being able to detect corruption. Each of these sources might provide complementary insight. Different sources might not be consistent or show a different picture of the situation, which makes analysis difficult. Differences might be a sign for corruption, but can also due to problems in data collection. The availability of data is related to the datafication. The term of datafication can be defined as “the ability to quantify all sorts of information into machine-readable data format” Datification resulted in the need for the development of new capabilities to handle the large volume of data [42]. The use of sensors of the internet of Things (IoT) enables the collection of data at the source. By collecting data directly, the chance of data manipulations is reduced. The creation of new content, connectivity, analysis software and infrastructure may continuously evolve the datafication. One of the most changes is the transformation data from closed data to the open, interconnected world where the traditional roles of, and the relation between, sectors are changing [18]. Example of IoT measures of pollution, video cameras, weighing goods, counting the number of cars (or people) passing and so on. This kind of information might be useful for detecting corruption. For example, more cars might have been passed than toll has been paid. Data-driven corruption detection is a complex process in which data need to be collected, processed, analyzed and acted upon. In this process, many stakeholders can be involved. Figure 2 shows schematically how corruption can be detected by collecting and using data. Firstly, the data is collected from the process under scrutiny in which various actors can play a role. Different types of data can be collected at various points in time and from multiple stakeholders. Data can be collected in different areas, including budgeting, actual spending, policy programmers and so on. The categories of data that is collected likely determine if it is possible to detect corruption. Darusalam et al. / Knowledge Engineering and Data Science 2019, 2 (1): 10–18 15 D. The information architecture, modelling, and principles Mechanisms for information sharing needs to be in place to detect corruption. A public organisation needs guidance to develop systems and processes for disclosing data to detect corruption. In this research, the focus is on developing a reference architecture to be able to detect corruption. By using reference information, architecture organisations can develop a system that can be used to detect corruption. There are various views on what constitutes an information architecture. In general, an information architecture (IA) is a coherent whole of principles and models capturing elements like organisational structure, business processes, data, and IT infrastructure. It is a formal description of a system, or a detailed plan of the system at component level to guide its implementation as well as the structure of components, their inter-relationships, and the principles and guidelines are governing their design and evolution ever time [43]. Furthermore, the reference architecture is defined as a set of principal guidance for implementation and a system structure and components, is simultaneously applicable to multiple related of specific system with explicit variation (Taylor, Medvidovic, & Dashofy, 2009, p.58). [43] explains the advantages of using a reference architecture as follows. 1. Accelerating the whole or partial system analysis. 2. Improving the reusability and connectivity. 3. Decreasing mistakes and error. Information architecture should provide a blueprint of the desired situation and an overall plan regarding the implementation. The architecture can be used by stakeholders to make decisions regarding the development strategies system. Software architecture, enterprise architecture and reference architecture differ in many ways; their generality and their scope [44]. A reference architecture is a generic architecture, while enterprise architecture and software architecture are specific architectures for a situation. The target of enterprise architecture is the enterprise as a whole. While software architecture is only for specific solution architecture in their scope. Information architecture describes the relationship between the business process, application and information source aim at storing, processing, reusing and distributing of information across information resources. In other words, information architecture is the organisation of information to aid information sharing among actors. However, reference architecture can be applying in all levels both solutions and enterprise [43]. What a reference architecture should contain varies in the literature. We follow [43] a reference architecture includes 1) architectural principles, 2) implementation guidelines, and 3) system structures and components. On the other hand, [45] categorise the contents of a reference architecture into three separate classifications, i.e. 1) customer context, 2) business architecture, and 3) technical architecture. Customer context consists of customer enterprises and users as well as their interaction; Technical architecture, which provides solutions in technology, includes design patterns technology; business context comprises of a business model and life cycle. According to [46], referential architecture has three primary elements: (1). Statements of technical positions that guide system architects in making technical decisions; (2) An organisation-wide consolidated infrastructure blueprint that gives a blueprint for the overall infrastructure and shows how various enterprise components are hooked together, and (3) Individual reference architectures for specific types of systems. Fig. 2. Data-driven corruption detection Open Data Collection Data Processing Data Analysing Measuring the Coruption Possibility 16 Darusalam et al. / Knowledge Engineering and Data Science 2019, 2 (1): 10–18 Despite the different contents given by various authors, there are some commonalities that should be included in a reference architecture: (1) Architecture should be both descriptive and prescriptive (blueprint) which describes system structure and components as well as their interaction; and, (2) Practical guidance for implementation (principles, guidelines, or technical positions). There is a variation of contents by inserting business context and customer context into a reference architecture. In our work, we consider a reference architecture as a perspective information architecture describing the highest level of abstraction of a system In term of modelling languages, there are various languages for architecture modelling such as Archimate and BPMN. The Archimate language contains concepts for describing the relationships between architecture descriptions at the business, application, and technology levels. It plays a central role, related to the ubiquitous problem of business–ICT alignment. ArchiMate conforms to existing languages or standards, such as Unified Modelling Language (UML) for each architectural domain, [47]. The Business Process Modelling Notation (BPMN) is a standard for modelling processes, which gives unambiguous symbols and constructs for mapping out processes resulting in simple communicative models [48]. BPMN will be used for mapping business processes in which the responsible entity for executing tasks can be modelled using in the swim lane. The connection among organisation can be designed by exchanging information, with the modeller choosing the aggregation level at which a service is specified. This allows a link among the business processes, organisational responsibilities, data stored and exchanged related to (sub) processes and tasks. Our focus is on data sources, information exchange and business processes; therefore, BPMN will be adopted as the modelling language. Furthermore, architecture principles can be defined as must be followed rules, emphasises “doing the right things” and expected to give significant improvement [44]. Guidelines are supporting practical guides which often cannot wholly be followed and need trade-offs; system structures are levels of structures of the system that expected to satisfy the requirements; system components are components of the system that expected to satisfy the requirements. Part of the reference architecture is architectural principles. Principles are defined as rules which have to be followed, emphasises as well as to provide a significant improvement [49]. On the other word, principles is a normative reusable and directive statement that guide architects in designing the capabilities needed to achieve overarching goals. The use of principles to solve complex or structural problems cannot be formulated in clear and quantitative terms and computational techniques [47]. The use of principle based design (PBD) is suitable for Information System (IS) design in multi-tasks environments [48] such as facilitating different sets of goals and process of various users; unfamiliar events and processes in non-routine task environments; different audiences (architects, IT developers, IT auditors, system managers and operators); deep uncertainty; and a wide range of dynamic-technical solutions and alternatives. The principle can give guidance during the multi-level of the design process and architects IT auditors can use it as a checklist for the evaluation of the existing information system. The implementation of the reference information architecture is aimed at enabling the design of information architectures that allow corruption detection IV. Conclusion Open data is one of the tools for fighting corruption; opening up government data to the public is an excellent strategy to control the public and private government. The mission of open data is to improve credibility, democratisation, transparency and accountability of government decisions. Also, there is some requirement to be in places to make ICT development to be a tool to fighting corruption, for example, training the official staff and institution revolution, ICT itself is not sufficient to reduce corruption, they must work with public government NGOs, media and society. In this paper, we consider creating a framework of reference architecture as a viewpoint information architecture describing the top level of abstraction of a system. Future research will have to show whether this framework can be applying in the case study. The practical contribution is aimed at helping the government to detect corruption by using a data-driven approach. The scientific contribution will originate from the development of a reference architecture and architectures principles which enable the design of information architectures enabling the detecting of corruption. Darusalam et al. / Knowledge Engineering and Data Science 2019, 2 (1): 10–18 17 Acknowledgements We are indebted to the Mora Scholarship 5000 Doktor Ministry of Religious Affairs of Indonesia, State Islamic University of Raden Fatah Palembang, Indonesia, Accounting Research Institute (ARI, UiTM) Malaysia, Technology University of Delft, the Netherlands in giving us the support needed for this project. We appreciate the reviews and comments made by academicians on earlier drafts of this paper. Many thanks to government agencies, organizations that participated in the project. References: [1] M. Janssen, et al., "Benefits, adoption barriers and myths of open data and open government," Information Systems Management, vol. 29, pp. 258-268, 2012. [2] L. d. Sousa, "Open government and the use of ICT to reduce corruption risks," PPT, 2016. [3] J. C. Bertot, et al., "Crowd-sourcing transparency: ICTs, social media, and government transparency initiatives," in Proceedings of the 11th Annual International Digital Government Research Conference on Public Administration Online: Challenges and Opportunities, 2010, pp. 51-58. [4] N. Huijboom and T. Van den Broek, "Open data: an international comparison of strategies," European journal of ePractice, vol. 12, pp. 4-16, 2011. [5] I. Amundsen, Political corruption: An introduction to the issues: Chr. Michelsen Institute, 1999. [6] A. Shleifer and R. W. Vishny, "Corruption," The quarterly journal of economics, vol. 108, pp. 599-617, 1993. [7] J. Hindriks, et al., "Corruption, extortion and evasion," Journal of Public economics, vol. 74, pp. 395-430, 1999. [8] D. Waite and D. Allen, "Corruption and abuse of power in educational administration," The Urban Review, vol. 35, pp. 281-296, 2003. [9] S. Johnson, et al., "Regulatory discretion and the unofficial economy," The American Economic Review, vol. 88, pp. 387-392, 1998. [10] J. Leitner, et al., "The Debate About Political Risk: How Corruption, Favoritism and Institutional Ambiguity Shape Business Strategies in Ukraine," in EU Crisis and the Role of the Periphery, ed: Springer, 2015, pp. 3-19. [11] O. Fadiaro, et al., "Coverage of Corruption News by Major Newspapers in Nigeria," Publications of New Media and Mass Communication, vol. 24, pp. 53-59, 2014. [12] J. C. Bertot, et al., "Using ICTs to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies," Government information quarterly, vol. 27, pp. 264-271, 2010. [13] CIA, "Central Intellegence Agency," https://www.cia.gov/library/publications/the-world-factbook/geos/tt.html, 2006. [14] Y. K. Dwivedi, et al., "Completing a PhD in business and management: A brief guide to doctoral students and universities," Journal of Enterprise Information Management, vol. 28, pp. 615-621, 2015. [15] Y. Levy and T. J. Ellis, "A systems approach to conduct an effective literature review in support of information systems research," Informing Science: International Journal of an Emerging Transdiscipline, vol. 9, pp. 181-212, 2006. [16] W. House, "Memorandum on transparency and open government," ed, 2009. [17] D. G. Robinson, et al., "Government data and the invisible hand," Yale Journal of Law & Technology, vol. 11, p. 160, 2009. [18] T. Jetzek, et al., "Data-driven innovation through open government data," Journal of theoretical and applied electronic commerce research, vol. 9, pp. 100-120, 2014. [19] J. Kučera, et al., "Open Government Data Catalogs: Current Approaches and Quality Perspective," in Technology- Enabled Innovation for Democracy, Government and Governance: Proceedings of the Joint International Conference on Electronic Government and the Information Systems Perspective, and Electronic Democracy (EGOVIS/EDEM 2013), Prague, Czech Republic, 2013, pp. 152-166. [20] B. Ubaldi, "Open Government Data," 2013. [21] S. Bhatnagar, "E-government and access to information," Global Corruption Report, vol. 2003, pp. 24-32, 2003. [22] C. Schwegmann, "Open data in developing countries," European Public Sector Information Platform-Topic Report 2013, vol. 2, 2012. [23] C. Dictionaries, Collins english dictionary: HarperCollins Publishers, 2009. [24] C. Cobuild and U. o. B. . Collins Cobuild advanced learner's English dictionary: HarperCollinsPublishers, 2003. [25] C.-K. Kim, "Anti-corruption initiatives and e-government: a cross-national study," Public Organization Review, vol. 14, pp. 385-396, 2014. [26] S. Kim, et al., "An institutional analysis of an e-government system for anti-corruption: The case of OPEN," Government Information Quarterly, vol. 26, pp. 42-50, 2009. [27] D. A. Lalountas, et al., "Corruption, globalization and development: How are these three phenomena related?," Journal of Policy Modeling, vol. 33, pp. 636-648, 2011. [28] J. Carlo Bertot, et al., "Promoting transparency and accountability through ICTs, social media, and collaborative e- government," Transforming Government: People, Process and Policy, vol. 6, pp. 78-91, 2012. [29] D. C. Shim and T. H. Eom, "Anticorruption effects of information communication and technology (ICT) and social capital," International review of administrative sciences, vol. 75, pp. 99-116, 2009. 18 Darusalam et al. / Knowledge Engineering and Data Science 2019, 2 (1): 10–18 [30] D. C. Shim and T. H. Eom, "E-government and anti-corruption: Empirical analysis of international data," Intl Journal of Public Administration, vol. 31, pp. 298-316, 2008. [31] V. Tanzi and H. Davoodi, "Corruption, public investment, and growth," in The Welfare State, Public Investment, and Growth, ed: Springer, 1998, pp. 41-60. [32] J. E. Relly and M. Sabharwal, "Perceptions of transparency of government policymaking: A cross-national study," Government Information Quarterly, vol. 26, pp. 148-157, 2009. [33] S. Bhatnagar, "Social implications of information and communication technology in developing countries: Lessons from Asian success stories," The Electronic Journal of Information Systems in Developing Countries, vol. 1, pp. 1-9, 2000. [34] P. Palvia, et al., "ICT for socio-economic development: A citizens’ perspective," Information & Management, 2017. [35] S. Bhatnagar, "Transparency and corruption: Does e-government help?," DRAFT Paper prepared for the compilation of CHRI, 2003. [36] C. Von Haldenwang, "Electronic government (e-government) and development," The European Journal of Development Research, vol. 16, pp. 417-432, 2004. [37] T. B. Andersen, "E-Government as an anti-corruption strategy," Information Economics and Policy, vol. 21, pp. 201- 210, 2009. [38] WorldBank, "Anti-corruption," http://www.worldbank.org/en/topic/governance/brief/anti-corruption, 2016. [39] R. Heeks, "e-Government as a Carrier of Context," Journal of Public Policy, vol. 25, pp. 51-74, 2005. [40] R. D. Pathak, et al., "E-governance to cut corruption in public service delivery: A case study of Fiji," Int. Journal of Public Administration, vol. 32, pp. 415-437, 2009. [41] J. S. Ward and A. Barker, "Undefined by data: a survey of big data definitions," arXiv preprint arXiv:1309.5821, 2013. [42] V. Mayer-Schönberger and K. Cukier, Big data: A revolution that will transform how we live, work, and think: Houghton Mifflin Harcourt, 2013. [43] Y. Gong, Engineering flexible and agile services: a reference architecture for administrative processes: TU Delft, Delft University of Technology, 2012. [44] D. Greefhorst and E. Proper, Architecture principles: the cornerstones of enterprise architecture: Springer Science & Business Media, 2011. [45] R. Cloutier, et al., "The concept of reference architectures," Systems Engineering, vol. 13, pp. 14-27, 2010. [46] P. J. Windley, Digital identity: " O'Reilly Media, Inc.", 2005. [47] W. Janssen, et al., "Business case modelling for e-services," Proceedings 18th Bled eConference: eIntegration in Action, Bled, Slovenia, 2005. [48] N. Bharosa, et al., "An activity theory analysis of boundary objects in cross-border information systems development for disaster management," Security Informatics, vol. 1, p. 1, 2012. [49] N. Bharosa and M. Janssen, "Principle-Based Design: A Methodology and Principles for Capitalizing Design Experiences for Information Quality Assurance," Journal of Homeland Security and Emergency Management, vol. 12, pp. 469-496, 2015.