How to Design the E-government Information Security Legislation

被引:0
|
作者
Liu Bangfan [1 ]
Tao Tao [2 ]
Zhang Bei [1 ]
机构
[1] Yanshan Univ, Humanities Law Coll, Qinhuangdao 066004, Peoples R China
[2] Qinhuangdao Vocat & Tech Coll, Qinhuangdao 066004, Peoples R China
关键词
Information Security; Legislation; E-government;
D O I
10.4028/www.scientific.net/AMM.556-562.5367
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the further development of e-government construction and application, it becomes more and more urgent to strengthen the information security of e-government legislation. Information security is the guarantee of e-government construction and operation. In our country the information security problem needs the guarantee of laws and regulations urgently. It is important to legislate as soon as possible. Establishing and improving relevant legal system can promote the e-government construction and application effectively and quickly in our country. In order to ensure the information security of e-government in the construction and improvement of relevant legislation process, we should pay attention to the following: join the international information security law system positively, build the legal basis for e-government information security actively and promote the execution efficiency of e-government information security laws and regulations.
引用
收藏
页码:5367 / +
页数:2
相关论文
共 50 条
  • [31] Research on Information Security of E-government System Under Internet of Things
    Zhu Jingfeng
    ELECTRONIC INFORMATION AND ELECTRICAL ENGINEERING, 2012, 19 : 439 - 442
  • [32] The State of e-Government Security in South Africa: Analysing the National Information Security Policy
    Ngoqo, Bukelwa
    Njenga, Kennedy
    E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES (AFRICOMM 2017), 2018, 250 : 29 - 46
  • [33] E-government services: Certification and security
    Talamo, M
    CERTIFICATION AND SECURITY IN E-SERVICES: FROM E-GOVERNMENT TO E-BUSINESS, 2003, 127 : 5 - 13
  • [34] Security aspects within e-Government
    Hof, S
    ELECTRONIC GOVENMENT, PROCEEDINGS, 2003, 2739 : 266 - 271
  • [35] The researches on public security in the e-Government
    Zang Yan-lin
    Liu Yan
    Chen Ge-lin
    Proceedings of 2006 International Conference on Public Administration, 2006, : 298 - 304
  • [36] An extended security framework for e-government
    Al-Ahmad, Walid
    Al-Kaabi, Reem
    ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 294 - +
  • [37] How is e-Government Progressing? A Data Driven Approach to E-government Monitoring
    Stragier, Jeroen
    Verdegem, Pieter
    Verleye, Gino
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2010, 16 (08) : 1075 - 1088
  • [38] Design and Implementation of Mobile Personal Information System for E-government
    Huang, Hexiao
    Zhang, Shiming
    Xu, Hexiang
    Zhu, Zhijun
    Guo, Junwen
    2011 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION AND INDUSTRIAL APPLICATION (ICIA2011), VOL III, 2011, : 469 - 472
  • [39] Design and Implementation of Mobile Personal Information System for E-government
    Huang, Hexiao
    Zhang, Shiming
    Xu, Hexiang
    Zhu, Zhijun
    Guo, Junwen
    2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL II, 2010, : 94 - 97
  • [40] How is information shared across the boundaries of government agencies? An e-Government case study
    Yang, Tung-Mou
    Pardo, Theresa
    Wu, Yi-Jung
    GOVERNMENT INFORMATION QUARTERLY, 2014, 31 (04) : 637 - 652