Impact of security standards and policies on the credibility of e-government

被引:46
|
作者
Mishra, Shailendra [1 ]
Alowaidi, Majed A. [2 ]
Sharma, Sunil Kumar [3 ]
机构
[1] Majmaah Univ, Dept Comp Engn, Majmaah, Saudi Arabia
[2] Majmaah Univ, Dept Informat Technol, Majmaah, Saudi Arabia
[3] Majmaah Univ, Dept Informat Syst, Majmaah, Saudi Arabia
关键词
Information and communications technology (ICT); Standard operation of procedures [SOPs; Cloud computing (CC); Cloud of things (CoT); World medical association (WMA); SERVICES; ADOPTION; CLOUD;
D O I
10.1007/s12652-020-02767-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most of the cyber attackers intended to steal user's information that possibly sold on the dark web; they damage the image of brands and exploit the e-commerce websites.Therefore, organizations like ISO and NIST developed standard operating procedures for the safety and security of the information systems to avoid the data breach. This research deals with the impact of security standards and policies on the performance and credibility of e-government. The method selected for the qualitative study is meta-analysis. The quantitative data have been collected using OWSZAP (an open-source scanning tool). Vulnerabilities in e-government, mainly in e-business (e com application), are analyzed using selected tool OWASP ZAP. Qualitative results show the factors percentage that could affect the adoption of e-government and potential barriers. All these factors play a role in understanding the models used in analyzing the vulnerability of a network-an emphasis on the need for continuous public education on cyber safety. The main factors are impacting and leading the need for implementing the information security laws and standards that ultimately impacts on the government.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] A flexible security system for enterprise and e-government portals
    Priebe, T
    Muschall, B
    Dobmeier, W
    Pernul, G
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, 3180 : 884 - 893
  • [42] Design and realization of security guarantee system of E-Government
    Yang, Qi-Feng
    Tao, Mei
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12513 - 12517
  • [43] A security model and architecture for multichannel E-Government systems
    Fugini, MariaGrazia
    ARES 2007: Second International Conference on Availability, Reliability and Security, Proceedings, 2007, : 917 - 924
  • [44] How to Design the E-government Information Security Legislation
    Liu Bangfan
    Tao Tao
    Zhang Bei
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5367 - +
  • [45] E-government technologies for managing national security and defense
    Ladner, Roy
    Petry, Fred
    International Journal of Electronic Government Research, 2008, 4 (01)
  • [46] Municipal E-Government Security: What is the greatest challenge?
    Perez, Timothy J.
    2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, : 2263 - 2271
  • [47] RESEARCH ON E-GOVERNMENT INFORMATION SECURITY PROBLEMS AND COUNTERMEASURES
    He Huanhuan
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 1413 - 1419
  • [48] Security design model of E-government collaborative platform
    Su, JD
    Guo, HQ
    Yu, SS
    DCABES 2004, Proceedings, Vols, 1 and 2, 2004, : 998 - 1001
  • [49] Security and Interoperability in e-Government Principles, Challenges and Experiences
    Cano, Jesus
    2016 THIRD INTERNATIONAL CONFERENCE ON EDEMOCRACY & EGOVERNMENT (ICEDEG), 2016, : 11 - 11
  • [50] Supporting security and trust in complex e-government services
    Tountopoulos, Vasilis
    Giannakoudaki, Ira
    Giannakakis, Konstantinos
    Korres, Lefteris
    Kallipolitis, Leonidas
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8900 : 219 - 233