Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The 21st century is an age of information; e-government has become an inevitable trend for social information development. However, most e-government system currently just gives emphasis to construction but not security. Security evaluation to e-government system is a necessary means to master security of e-government system. The paper makes researches and analysis to many aspects of e-government...
Information security risk assessment is essential to government for making an efficient and effective security management plan. This paper firstly established a hierarchy structure index system for E-government information systems security risk assessment based on the operationally critical threat, assets and vulnerability evaluation (OCTAVE). Considering that the previous weights selection methods...
China has established a legal system of government information disclosure. The current key point is to safeguard the execution of government information disclosure system from every aspect. This paper researches deeply into the government information disclosure system of China from the supervision to the information disclosure department, the relief for the information disclosure right and the external...
Cross Domain Systems for handling classified information complicate the certification test and evaluation problem, because along with multiple data owners comes duplicate responsibility for residual risk. Over-reliance on independent verification and validation by certifiers and accreditors representing different government agencies is interpreted as conflating the principle of defence-in-depth with...
With the application of e-government becomes more and more extensive, the security issues become increasingly important. The paper firstly presents a relatively complete e-government security risk evaluation index system basing on comprehensive analysis of risk factors which affects e-government security. Then we conduct orthogonal transformation to the indexes for eliminating duplication between...
Over the past ten years, web enabled technology has been the catalyst to enhanced Electronic Service Delivery (ESD) delivery. ESD has conveniently reduced the cost to governments and at the same time benefited Ontarians by providing convenient access to services. There remains a concern that the use of web technology increases one's risk to breach of privacy. A privacy breach, where information may...
This paper firstly presents a review of the goals of the security of e-government system, and meanwhile analyst the risk. Then, the paper discusses the measures of improving the security from managerial perspectives. At the end part, the paper propose that to effectively lower the trade cost, government should grade the security levels, and make more openness to the public.
Biometric represents in our days a solution to a lot of the user identification and security problems. The abuse on personal information's and misuse, intentional and inadvertent is a gaping hole in many security equipments. Our paper will examine almost all the technological and feasibility aspects that can be used in developing applications such as biometrical passport. Many negative aspects influence...
As the Chinese informationization has marched into the 3G (Third Generation Mobile Telephony) era, 3G-Based mobile government information system will guide the way of the development of E-government. Based on the analysis of the existing technology of China, this paper aims at providing more technological appliance and development channel for the government information disclosure. Besides, corresponding...
The hot demand for e-government makes it vitally important to provide a solution to privacy preservation. This paper discusses in depth the key concerns and implementation techniques related to privacy preservation in e-government, before providing a solution which best tradeoffs the demand for information disclosure and the concerns about privacy preservation.
Internet-based E-government has become a new work model of government departments. But due to heterogeneous and autonomous between different business systems, there are barriers in E-government systems when they are interoperating. To eliminate information silos, building a unified information-sharing platform is a necessary choice for the work of the government's information. This paper studies service-oriented...
When Israel's Ministry of Internal Affairs decided to move to electronic voting, it chose to replace the traditional paper ballot with secure contactless smartcards. The system was designed around HF RFID technology to make voting stations easier to use and less prone to mechanical faults. However, in doing so the system was exposed to a powerful class of hardware-based attacks called relay attacks,...
The proposed architecture of the Hungarian e-government framework, mandating the functional co-operation of independent organizations, puts special emphasis on interoperability. WS-*standards have been created to reach uniformity and interoperability in the common middleware tasks for Web services such as security, reliable messaging and transactions. These standards, however, while existing for some...
E-Government can provide a citizen with better and/or more convenient services as opposed to the traditional government services. Application of electronic approach in completing an e-Procurement process opens up a lot of issues regarding security. The transparent nature of the process at hand is requiring a sophisticated security system. Unauthorized access or different kinds of intrusion present...
Electronic voting systems are a perfect example of security-critical computing. One of the critical and complex parts of such systems is the voting process, which is responsible for correctly and securely storing intentions and actions of the voters. Unfortunately, recent studies revealed that various e-voting systems show serious specification, design, and implementation flaws. The application of...
Most European governments offer electronic self-services to citizens and businesses on a 365/7/24-basis. e-Services are available. In addition to availability, e-Services also have to be accessible in order to be successful. A number of accessibility standards and design guidelines exist and are widely applied on websites offering e-Services. Increasingly, e-Services are designed to be carried out...
Advances in digital technology are increasing the volume of computer data and accelerating the massive integration of software into our daily lives. The widespread interconnection of networks and digital convergence accentuates this computerization process, making computing, telecommunications and audiovisual information increasingly compatible and interoperable. eGovernment services to citizens and...
Government computer systems and networks are under increasing attack from foreign governments, organized crime, and other malicious attackers. Security best practice checklists are commonly used to ensure the protection of government computer systems. However, experimental validation of the recommended security measures is lacking. Additionally, administrators have no way to compare the effectiveness...
While the importance of trust in the online vendor and electronic channel for e-commerce transactions is well established, less is known about factors that influence trust in e-government services. Moreover, perceptions of trust depend heavily on the cultural context and thus can vary across countries. This study investigates differences in trust and consumption of public services by citizens across...
In 2008, 90 million citizens in the United States used electronic tax filing to submit their federal tax returns. Yet these adopters represent only a subset of the population. Citizen concerns regarding the security of this electronic option still serve as a barrier to e-file adoption. In this study, we propose a model of e-file adoption that integrates technology acceptance, optimism bias, reputation...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.