How to Design the E-government Information Security Legislation

被引:0
|
作者
Liu Bangfan [1 ]
Tao Tao [2 ]
Zhang Bei [1 ]
机构
[1] Yanshan Univ, Humanities Law Coll, Qinhuangdao 066004, Peoples R China
[2] Qinhuangdao Vocat & Tech Coll, Qinhuangdao 066004, Peoples R China
关键词
Information Security; Legislation; E-government;
D O I
10.4028/www.scientific.net/AMM.556-562.5367
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the further development of e-government construction and application, it becomes more and more urgent to strengthen the information security of e-government legislation. Information security is the guarantee of e-government construction and operation. In our country the information security problem needs the guarantee of laws and regulations urgently. It is important to legislate as soon as possible. Establishing and improving relevant legal system can promote the e-government construction and application effectively and quickly in our country. In order to ensure the information security of e-government in the construction and improvement of relevant legislation process, we should pay attention to the following: join the international information security law system positively, build the legal basis for e-government information security actively and promote the execution efficiency of e-government information security laws and regulations.
引用
收藏
页码:5367 / +
页数:2
相关论文
共 50 条
  • [21] Construction of communication network pattern and information security in e-government
    Li, XM
    Cai, YJ
    Li, JH
    Proceedings of 2005 International Conference on Public Administration, 2005, : 703 - 711
  • [22] Study on the Impact of Security Countermeasures on E-Government Information Misuse
    Fan, Jing
    Zhang, Pengzhu
    Zhao, Xinjie
    EIGHTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2009, : 450 - 456
  • [23] Information Security Risks in Enabling e-Government: The Impact of IT Vendors
    Berghmans, Peter
    Van Roy, Karel
    INFORMATION SYSTEMS MANAGEMENT, 2011, 28 (04) : 284 - 293
  • [24] Research on the evaluation of security risk for e-government information system
    Liu, Ming-Sheng
    Sun, Shu-Jin
    Yin, Xiao-Hua
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1404 - +
  • [25] Research and Design on E-government Information Retrieval Model
    Liu, Xiaoxing
    Hu, Changxia
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 3170 - 3174
  • [26] The Impact of Privacy and Security Concerns, Trust in Technology and Information Quality on Trust in E-Government and Intention to Use E-Government
    Mohajerani, Somayeh
    Shahrekordi, Sharareh Zarean
    Azarlo, Mitra
    2015 9TH INTERNATIONAL CONFERENCE ON E-COMMERCE IN DEVELOPING COUNTRIES: WITH FOCUS ON E-BUSINESS (ECDC), 2015,
  • [27] Information technology (IT) for e-Government
    Omura, H
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2000, 36 (02): : 232 - 235
  • [28] The information ecology of e-government
    Grafton, C
    SOCIAL SCIENCE COMPUTER REVIEW, 2006, 24 (01) : 132 - 134
  • [29] Information flows in E-Government
    Lin, TY
    27TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 616 - 621
  • [30] Information Society and e-Government
    Montecinos Garcia, Alejandro
    REVISTA CHILENA DE DERECHO Y TECNOLOGIA, 2012, 1 (01): : 171 - 219