Information security evaluation of e-government systems

被引:0
|
作者
Cheng, Xiaorong [1 ]
Li, Mei [1 ]
Zhao, Huilan [1 ]
机构
[1] N China Elect Power Univ, Sch Comp Sci & Technol, Baoding 071003, Hebei, Peoples R China
关键词
e-government system; security assessment SSE-CMM; fuzzy comprehensive judgment; entropy-weight;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An information security assessment model based on the systems security engineering capability maturity model (SSE-CMM) is proposed according to characteristics and security requirements of e-government systems. Fuzzy comprehensive judgment is also applied to mitigate the uncertainty of threats and weaknesses in e-government systems. To overcome the subjectivity in fuzzy judgment, assessment factors are calculated objectively by the method of entropy weight coefficient. Finally, the study of a case shows the security degree of an e-government network system can be conveniently found out with this method, while efficiently decreasing the computing complexity and influence form human factors.
引用
收藏
页码:532 / 535
页数:4
相关论文
共 50 条
  • [31] The Role of Business and Information Systems Engineering in E-Government
    Buhl, Hans Ulrich
    Loeffler, Markus
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2011, 3 (06): : 341 - 344
  • [32] The Effect of Information Quality on Trust in E-Government Systems
    Lee, Ally
    Levy, Yair
    Hafner, William L.
    AMCIS 2012 PROCEEDINGS, 2012,
  • [33] Information Systems Governance for e-Government - Issues and Challenges
    Haider, Abrar
    INNOVATION AND SUSTAINABLE COMPETITIVE ADVANTAGE: FROM REGIONAL DEVELOPMENT TO WORLD ECONOMIES, VOLS 1-5, 2012, : 2681 - 2690
  • [34] The Impact of Privacy and Security Concerns, Trust in Technology and Information Quality on Trust in E-Government and Intention to Use E-Government
    Mohajerani, Somayeh
    Shahrekordi, Sharareh Zarean
    Azarlo, Mitra
    2015 9TH INTERNATIONAL CONFERENCE ON E-COMMERCE IN DEVELOPING COUNTRIES: WITH FOCUS ON E-BUSINESS (ECDC), 2015,
  • [35] Tailorability in the context of e-government information systems: An approach
    Lepouras, G
    Sotiropoulou, A
    Theotokis, D
    Vassilakis, C
    INNOVATIONS THROUGH INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2004, : 799 - 802
  • [36] Security Analysis of e-Government Systems Using SAT Problem
    Baquerizo Anastacio, Monica Marlene
    Guevara Maldonado, Cesar Byron
    INGE CUC, 2016, 12 (01) : 73 - 79
  • [37] The influence of information security on the adoption of web-based integrated information systems: an e-government study in Peru
    Joo, Jaehun
    Hovav, Anat
    INFORMATION TECHNOLOGY FOR DEVELOPMENT, 2016, 22 (01) : 94 - 116
  • [38] Information technology (IT) for e-Government
    Omura, H
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2000, 36 (02): : 232 - 235
  • [39] The information ecology of e-government
    Grafton, C
    SOCIAL SCIENCE COMPUTER REVIEW, 2006, 24 (01) : 132 - 134
  • [40] Information flows in E-Government
    Lin, TY
    27TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 616 - 621