Impact of security standards and policies on the credibility of e-government

被引:46
|
作者
Mishra, Shailendra [1 ]
Alowaidi, Majed A. [2 ]
Sharma, Sunil Kumar [3 ]
机构
[1] Majmaah Univ, Dept Comp Engn, Majmaah, Saudi Arabia
[2] Majmaah Univ, Dept Informat Technol, Majmaah, Saudi Arabia
[3] Majmaah Univ, Dept Informat Syst, Majmaah, Saudi Arabia
关键词
Information and communications technology (ICT); Standard operation of procedures [SOPs; Cloud computing (CC); Cloud of things (CoT); World medical association (WMA); SERVICES; ADOPTION; CLOUD;
D O I
10.1007/s12652-020-02767-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most of the cyber attackers intended to steal user's information that possibly sold on the dark web; they damage the image of brands and exploit the e-commerce websites.Therefore, organizations like ISO and NIST developed standard operating procedures for the safety and security of the information systems to avoid the data breach. This research deals with the impact of security standards and policies on the performance and credibility of e-government. The method selected for the qualitative study is meta-analysis. The quantitative data have been collected using OWSZAP (an open-source scanning tool). Vulnerabilities in e-government, mainly in e-business (e com application), are analyzed using selected tool OWASP ZAP. Qualitative results show the factors percentage that could affect the adoption of e-government and potential barriers. All these factors play a role in understanding the models used in analyzing the vulnerability of a network-an emphasis on the need for continuous public education on cyber safety. The main factors are impacting and leading the need for implementing the information security laws and standards that ultimately impacts on the government.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] The impact of security and its antecedents in behaviour intention of using e-government services
    Alharbi, Nawaf
    Papadaki, Maria
    Dowland, Paul
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2017, 36 (06) : 620 - 636
  • [32] THE IMPACT OF E-GOVERNMENT ON THE LEVEL OF CORRUPTION
    Tsutskiridze, Maksym
    Bereza, Anatoliy
    BALTIC JOURNAL OF ECONOMIC STUDIES, 2020, 6 (02) : 93 - 99
  • [33] IMPACT OF E-GOVERNMENT AT THE LEVEL OF CORRUPTION
    Knezackova, Radka
    Linhartova, Veronika
    7TH INTERNATIONAL DAYS OF STATISTICS AND ECONOMICS, 2013, : 621 - 630
  • [34] E-government Security Management: Key Factors and Countermeasure
    Wang Jin-fu
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 483 - 486
  • [35] SPECIAL ISSUE: E-INCLUSION AND E-GOVERNMENT - CHALLENGES AND POLICIES
    Rodousakis, Niki
    INNOVATION-THE EUROPEAN JOURNAL OF SOCIAL SCIENCE RESEARCH, 2008, 21 (04) : 281 - 282
  • [36] A CA-based security e-government system
    Cong, Shiquan
    Fang, Zhiyi
    Zhang, Chao
    Liu, Xiaonan
    Zhang, Yingrui
    2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, : 941 - 945
  • [37] Inclusive Security Models To Building E-Government Trust
    Supriyanto, Aji
    Diartono, Dwi Agus
    Hartono, Budi
    Februariyanti, Herny
    2019 3RD INTERNATIONAL CONFERENCE ON INFORMATICS AND COMPUTATIONAL SCIENCES (ICICOS 2019), 2019,
  • [38] Research on Evaluation System of E-government Security Governance
    Zhang, Haicheng
    2016 2ND INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SUPPORTED EDUCATION (FCSE 2016), 2016, : 217 - 220
  • [39] Research on distributed access control by security E-government
    Shen Yue
    Yu fei
    Zhang Linfeng
    Liao Guiping
    Zhou Tao
    2006 CHINESE CONTROL CONFERENCE, VOLS 1-5, 2006, : 531 - +
  • [40] A Solution to the Security Issues of an E-Government Procurement System
    Islam, Md. Sadiqul
    Dey, Sanjoy
    Kundu, Gourab
    Hoque, A. S. M. Latiful
    PROCEEDINGS OF ICECE 2008, VOLS 1 AND 2, 2008, : 659 - 664