Paper/Speech Details of Conference Program for the 16th NISPAcee Annual Conference Program Overview II. Working Group on E-government Author(s) Franziska Cecon Upper Austria University of Applied Sciences Linz Austria Wolfgang Eixelsberger Title Trusted computing for public administration File Paper files are available only for conference participants, please login first. Presenter Abstract Trusted Computing is the upcoming technology helping to improve IT security. A study conducted shows the awareness of IT security. Furthermore, there is a model process shown using Trusting Computing. The third step has to do with the possible migration scenario to change to a trusted environment in the public administration. Methods and Results: The research project is conducted in three different stages. (1) Analysis of the current state of Trusted Computing in the public administration (local, provin-cial and federal level) through in-depth interviews with key users. (2) Identification of potential processes for Trusted Computing within the public administration through process analysis. (3) Development of migration scenarios to change towards processes supported by Trusted Com-puting. (1) Trusted Computing is in principle unknown in the field of public administration. There are two main reasons for that: (1) the concept is still in the state of intensive research and (2) there has not been a roll-out of this concept in other fields. The need for more and higher measures of security in the field of IT is a given fact which was approved throughout this research project conducted. A seminar held by the European Commission in springtime 2006 on the topic "Trust in the net" led to the highly prioritised conclusion that Trusted Computing infrastructures need to be introduced, in order to ensure secure transactions and accomplish data protection laws. (2) Public administration processes are identified which might be most appropriate for the use of Trusted Computing. To ensure the best choice, a selected number of key experts of public admini-stration has been interviewed. Potential processes and applications are for example public health, e-voting or the use of mobile electronic devices for employed field staff that gets access to internal public information and databases. (3) The introduction of Trusted Computing technology requires a change in hardware, software as well as organisational processes. Besides a necessary certification infrastructure there is a consistent standard needed. A thorough planning as well as the technical, organisational and personnel re-quirements are crucial for a successful migration process. The potential migration scenario is shown by the selected process (2). Discussion and Conclusions: Currently the research project is dealing with state (2) and moving on to state (3). The conducted interviews promoted the idea of IT-security and increased the awareness for potential solutions of future IT problems. The model process as well as the migration scenario will be approved by IT specialists in the public administration. The model process will be centrally in the paper delivered to NISPAcee Annual Conference.