How to Design the E-government Information Security Legislation

被引:0
|
作者
Liu Bangfan [1 ]
Tao Tao [2 ]
Zhang Bei [1 ]
机构
[1] Yanshan Univ, Humanities Law Coll, Qinhuangdao 066004, Peoples R China
[2] Qinhuangdao Vocat & Tech Coll, Qinhuangdao 066004, Peoples R China
关键词
Information Security; Legislation; E-government;
D O I
10.4028/www.scientific.net/AMM.556-562.5367
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the further development of e-government construction and application, it becomes more and more urgent to strengthen the information security of e-government legislation. Information security is the guarantee of e-government construction and operation. In our country the information security problem needs the guarantee of laws and regulations urgently. It is important to legislate as soon as possible. Establishing and improving relevant legal system can promote the e-government construction and application effectively and quickly in our country. In order to ensure the information security of e-government in the construction and improvement of relevant legislation process, we should pay attention to the following: join the international information security law system positively, build the legal basis for e-government information security actively and promote the execution efficiency of e-government information security laws and regulations.
引用
收藏
页码:5367 / +
页数:2
相关论文
共 50 条
  • [1] ON HOW TO STRENGTHEN THE INFORMATION SECURITY OF E-GOVERNMENT
    Liu Wei
    Hu Changlong
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 341 - 345
  • [2] Design of E-Government Security System based on Information Security Model
    Wang, JiaJu
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL II, 2008, : 359 - 362
  • [3] Design of E-Government Security System based on Information Security Model
    Zhang, X. F.
    2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 875 - 878
  • [4] E-government and network information security
    Center of Network, Hubei Administrative College, Wuhan 430022, China
    Zhongshan Daxue Xuebao, 2006, SUPPL. (156-159):
  • [5] Information security evaluation of e-government systems
    Cheng, Xiaorong
    Li, Mei
    Zhao, Huilan
    DCABES 2007 Proceedings, Vols I and II, 2007, : 532 - 535
  • [6] Information Security in E-Government: Legal Aspects
    Politanskyi, Viacheslav
    Lukianov, Dmytro
    Ponomarova, Hanna
    Gyliaka, Oleh
    CUESTIONES POLITICAS, 2021, 39 (69): : 361 - 372
  • [7] RESEARCH ON E-GOVERNMENT INFORMATION SECURITY PROBLEMS AND COUNTERMEASURES
    He Huanhuan
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 1413 - 1419
  • [8] Data Mining Applications in E-Government Information Security
    Yuan, Tongwei
    Chen, Peng
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 235 - 240
  • [9] E-Government Information Security Risk Assessment Research
    Lei Ping
    Lei Zhanbo
    2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 1, 2010, : 1 - 4
  • [10] The Human Factor: How Can Information Security Awareness Be Sustainably Achieved in E-Government?
    Scholl, Margit
    Fuhrmann, Frauke
    Pokoyski, Dietmar
    ELECTRONIC GOVERNMENT AND ELECTRONIC PARTICIPATION, 2016, 23 : 403 - 404