E-Government and Security Requirements for Information Systems and Privacy
This paper aims to review the literature related to e-Government and security requirements for information systems and privacy in the performance approach, security is a global problem that requires global and multi-dimensional response with respect to policy, socio-economic, legal and technological aspects. E-Government as a public sector faces a challenge due to its impact on security and privacy. E-Government can develop information security metrics that measure the effectiveness and efficient of their security and privacy to provide information that can be analyzed in the context of e-Government performance to avoid all kinds of threats.
- Al-Azazi, S. (2008). A multi-layer model for e-Government information security assessment, Ph.D. thesis, Cranfield University.
- Al Nagi, E., M. Hamdan (2009).Computerization and e-Government implementation in Jordan: Challenges, obstacles and successes.Government Information Quarterly .(26).577–583.
- Al-Onizat H. Hamdan(2011), A Web based Model for Evaluating E- Government Performance (Jordan),Unpublished Dissertation, Jinan University.
- Carbo, T., & Williams, J. G. (2004). Models and Metrics for Evaluating Local Electronic Government Systems and Services. Electronic Journal of E-Government, 2(3).
- Clarke, R. (2000). Beyond the OECD guidelines: Privacy protection for the 21st century. Retrieved March 13, 2008, from: http://www.anu.edu.au/people/Roger.Clarke/DV/PP21C.html.
- Coelho,(2007), Security Certification For Organizations A Framework To Manage Information Security, Stituto Superior de Ciências do Trabalho e da Empresa.
- Henriksson, A. Yi, Y. Frost, B. and Middleton, M.( 2006), Evaluation instrument for e-Government websites, Proceedings Internet Research 7.0: Internet Convergences, Brisbane, Queensland, Australia.
- High Level Seminar On Measuring And Evaluating E-Government And Back-To-Back 3rd Meeting Of The Working Group 2 On E-Government And Administrative Simplification.(2007). Measuring and Evaluating E-Government in Arab Countries.Dubai School of Government
- Holden, S. H., Norris, D. F., & Fletcher, P. D. (2003). Electronic government at the local level: Progress to date and future issues. Public Performance & Management Review, 26(4).
- Institute for development Policy and Management. (2008), What is e-Government?. Accessed on 4th December 2010: http://www.egov4dev.org/success/definitions.shtml#definition.
- Mazumdar, Chandan, Kaushik, Anil K, & Banerjee, Parthasarathi, “On Information Security Issues in EGovernance: Developing Country Views”, CSDMS journal, 6th July, 2009.
- Morison W.L. (1973). Report on the Law of Privacy. Sydney, Australia: Government Printer.
- Patton, M.& Josang,A.(2004), Technologies For Trust In E-Commerce, Electronic Commerce research, 4(1&2),9-22
- Stowers, G. N. L. (2004). Measuring the Performance of E-Government. Accessed on December ,3,2010, from:http://www.businessofgovernment.org/pdfs/8493_Stowers_Report.pdf
- Siponen, M. T. and Oinas-Kukkonen, H. (2007). A review of information security issues and respective research contributions. SIGMIS Database, 38 (1), 60-80.
- Tassabehji Rana & Tony Elliman.(2006).European and Mediterranean Conference on Information Systems (EMCIS).Spain
- The Performance Institute. (2002). Creating a performance-based electronic government. Accessed 2end December 2010: http://www.cio.gov/archive/egovernmentreport.pdf
- Tojib, D. R., Sugianto, L., & Sendjaya, S. (2006). A conceptual model for B2E portal user satisfaction. Proceedings of the International Conference on Business and Administration (BAI), Singapore.
- United Nations(2010). United Nations E-Government Survey. Accessed on December ,22,2010, from: http://www2.unpan.org/egovkb/global_reports/10report.htm
- West, D., Assessing E-Government: The Internet, Democracy, and Service Delivery by State and Federal Governments, Brown University, September 2000. Available: http://www.brown.edu/Departments/Taubman_Center/polreports/ego treport00.html .
- Willy C. Isaac.(2007). Performance Measurement for the e-Government Initiatives:A Comparative Study. ProQuest Information and Learning Company. 300 North Zeeb Road.
- Wimmer, M., & Bredow, B. V. (2002). A holistic approach for providing security solutions in e-government. Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS 35 02), Volume 5, 2002, 1715- 1724
This work is licensed under a Creative Commons Attribution 3.0 License.
To make sure that you can receive messages from us, please add the 'macrothink.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
Copyright © Macrothink Institute ISSN 1941-899X
'Macrothink Institute' is a trademark of Macrothink Institute, Inc.