recommended reading

Before giving websites the ax, feds should consider public satisfaction, analyst says

A task force charged with slashing and rationalizing the federal government's Web presence should look at traffic, redundancy and user satisfaction as it decides which sites should get the ax, an analytic agency recommended Tuesday.

The company, ForeSee Results, manages the E-Government Satisfaction Index, a quarterly survey of customer satisfaction with participating federal websites.

The White House has embarked on a major campaign to slash and consolidate the more than 20,000 government websites that have sprung up since the 1990s.

Many of those websites were built around a specific issue or initiative and are now rarely visited and poorly maintained. Other websites are visited more often but were built with distinct architecture so it's difficult for casual Web surfers to tell what's official and what's not.

ForeSee primarily analyzes high-profile websites, such as agencies' main websites or those with popular customer service functions, not antiquated sites that are likely to be cut entirely.

A customer satisfaction metric similar to the one ForeSee uses to assess often-visited sites could be a useful tool in determining which lower level sites to drop, the company argues.

"Web traffic alone isn't enough to justify cutting a website because that site may contain valuable, highly targeted content that isn't available anywhere else," the company said in a statement. "Considering whether the site duplicates content is another important consideration, but determining overlaps will be long and arduous . . . An assessment of the quality and value of the specific sites to citizens is therefore vital to determining whether a site is necessary."

The website consolidation campaign is part of a larger Obama administration initiative to improve customer service.

Federal Chief Information Officer Vivek Kundra has floated the idea of creating a single federal Web domain with all other government sites slotted beneath it and using similar architecture and designs. He's stressed, though, that a single government domain isn't a foregone conclusion.

Tuesday's quarterly report from ForeSee found high customer satisfaction with many federal websites. Participating sites' aggregate satisfaction score was about 75 out of 100 on the American Customer Satisfaction Index, about where it's been hovering the past two years but higher than where those sites rated before 2008.

Customer satisfaction with federal websites has consistently rated above satisfaction with non-Web government functions, the company said.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.