scholarly journals A review of effectiveness of Saudi E-government data security management

Author(s):  
Awad Saleh Alharbi ◽  
George Halikias ◽  
Muttukrishnan Rajarajan ◽  
Mohammad Yamin

AbstractSecurity of data has always been a contested issue since the internet became the way of life. The internet and Web 2.0 followed by Web 3.0 have enabled many applications for the use of the citizens. E-government is one of them. Questions have always been raised about the security of data in E-government applications and services. Saudi Arabia is one of the developing countries when it comes to the internet-based services. This paper attempts to review the effectiveness of security policies when dealing with threats and vulnerabilities. We shall study these aspects in the context of Saudi Arabian E-government. E-government, anywhere in the world is a very sensitive area when it comes to ensuring security of the users as well as the corporate data. Breach in security of user data may have catastrophic implications in some cases.

Author(s):  
Aroon Manoharan ◽  
Marc Fudge

This chapter highlights the research findings of a longitudinal study of online privacy and security practices among global municipalities conducted in 2005 and 2007. As cities worldwide implement sophisticated e-government platforms to increasingly provide services online, many barriers still inhibit the adoption of such strategies by the citizen users, and one such factor is the availability of a comprehensive privacy policy. The survey examines cities throughout the world based upon their population size, the total number of individuals using the Internet, and the percentage of individuals using the Internet. Specifically, we examined if the website has a privacy or security policy, does the website utilize digital signatures and if the website has a policy addressing the use of cookies to track users. Overall, results indicate that cities are increasingly emphasizing on privacy and security policies with major improvements in 2007, along with significant changes in the top ranking cities in when compared to the 2005 study.


2003 ◽  
Vol 84 (12) ◽  
pp. 1703-1710 ◽  
Author(s):  
Andrew Gettelman

The gap between the availability of information in developed and developing countries in climate and meteorology is described and detailed. The description is based on a recent survey of scientists around the world. The information divide results from the high costs of information and lack of resources in many countries and can be compounded by language difficulties and cultural differences. This has led to the breakdown in the flow of weather and forecast data, the flow of journals to developing countries, and the flow of the results of scientific work back to these same journals from developing countries. With the increasing electronic flow of information, many countries are also limited by costly and low-bandwidth access to the Internet. Several ideas for bridging the information divide are also presented, ranging from electronic distribution of journals, to increasing capacity to deal with information, to a commitment to include all users in new strategies for delivering information.


Compiler ◽  
2014 ◽  
Vol 3 (1) ◽  
Author(s):  
Cakra Aminuddin Hamka ◽  
Haruno Sajati ◽  
Yuliani Indrianingsih

Along with the development of current technology, making technology is very important in today's life. Security level digital data has become more vulnerable to exploitation, the problem arises when an information technology device was attacked by people who do not want to take a responsible and important data illegally, so the administrator must act quickly to secure important data. Making a data security technology on the internet is very important information. Limitations administrator underlying the creation of a system that is able to detect and defense systems against such attacks is automation, so that it can be applied to data security. The system is built to prevent attacks on computer networks with more specific on THC - Hydra. This system will analyze the number of errors in the log into the database, and if the error exceeds the tolerance rules are made by the administrator. If the error is more than 3 times in one minute, then with automation, the system will create a rule that can imprison users who do not have such access, and access to the prison in the illegal user can not perform such activities on legal access and access to activities conducted illegal user can be recorded on a file and jail.txt. So under any circumstances and not in supervising administrator, the security of other user data will be safe and can not be retrieved or viewed by a user of illegal access.


2019 ◽  
pp. 171-195
Author(s):  
Ahmed Youssry ◽  
Brett Winklehake ◽  
Jaime A. Lobera

Developing countries around the world strive to implement one of the several current models of microfinance. This study focuses on two models: Grameen Bank, which is considered the change factor for the microfinance field, and Kiva.org, an organization that understood the importance of the Internet and crowdfunding to create a different model of microfinance. The purpose of the study is to analyze these two models and determine which would be more suitable for application in Egypt. This study provides a strengths, weaknesses, opportunities, and threats (SWOT analysis), a financial analysis, and a structural analysis, as well as historical background for both organizations along with a scan for the political, economic, social, and technological infrastructure in Egypt to determine the most suitable microfinance model.


Author(s):  
Elba del Carmen Valderrama Bahamóndez ◽  
Albrecht Schmidt

The Internet and computers are accessible to only half of the population in the world. For the other half, computers and the Internet are almost alien concepts. This half has no medium for gathering information, and they are computer illiterate. In addition, it is well-known, that the use of computers and the Internet, directly and indirectly, enhance the learning process. Therefore, students from under privileged areas of developing regions of the world are, clearly, at a disadvantage compared to their peers in developed countries. However, mobile phones could change this situation. In developing countries, mobile phones are far more accessible than computers or Internet access. This high accessibility together with the multiple functionalities of mobile phones, allow for the potential to build feasible educational applications that enhance the learning experiences of students in developing countries. Such opportunities enable the students’ experiences to be made proportionate to the other half of the world, with a real mechanism for gathering information.


2014 ◽  
pp. 198-216
Author(s):  
Edwin Agwu

The internet has impacted the lives of individuals, organisations, and governments all over the world. However, it is now viewed and adopted with caution due mainly to the criminal tendencies of some misguided elements within the society. The internet technology has evolved to become a weapon of “mass robbery” in the hands of criminals. Fraudulent mails emanating from Africa, in general and Nigeria in particular have received world wide attentions. These and more have dented the image of the country home and abroad. This study presents the various ways in which the internet is used for criminal purposes within the Nigerian polity. It further examined the various crime related laws, their adequacies, and implications. Findings revealed the interplay of different methods through which vulnerable individuals and organisations are defrauded. The strategies proposed for addressing these crimes with a view to giving the country a clean bill of health in the international community are as well applicable to other developing countries. The findings also lay solid foundations for further research within different strands of crimes. It also concludes with recommendations for policy makers, businesses, and internet services providers with emphasis on the need for greater awareness creation.


2012 ◽  
pp. 1738-1751
Author(s):  
Matt Crosslin

This chapter examines how the World Wide Web could possibly change over the next 10 years into a concept increasingly being referred to as “Web 3.0,” and how these changes might affect education. It examines how Web 3.0 concepts such as cloud computing, the Semantic Web, and the three-dimensional (3-D) Web are currently being explored and realized. A possible future online learning scenario is also described and analyzed to help visualize these possibilities for education. The author hopes that providing an understanding of and insight into how the Internet and related technologies may continue to develop and evolve in the next several years will help educators be better prepared for the future of online learning.


Author(s):  
Bay Arinze ◽  
Murugan Anandarajan

Cloud computing has spread within enterprise faster than many other IT innovations. In cloud computing, computer services are accessed over the Internet in a scalable fashion, where the user is abstracted in varying degrees from the actual hardware and software and pays only for resources used. This paper examines the adoption of cloud computing in various regions of the world, as well as the potential of cloud computing to impact computing in developing countries. The authors propose that cloud computing offers varying benefits and appears differently in regions across the world, enabling many users to obtain sophisticated computing architectures and applications that are cost-prohibitive to acquire locally. The authors examine issues of privacy, security, and reliability of cloud computing and discuss the outlook for firms and individuals in both developing and developed countries seeking to utilize cloud computing for their computing needs.


2013 ◽  
Vol 4 (4) ◽  
pp. 94-100
Author(s):  
D Veerasamy

Social networks have become a way of life for many people who use them to connect and communicate with the world at large. Social media is defined as any tool or service that uses the Internet to facilitate conversations. Facebook is one of the most popular social networking sites (SNSs) and has a total of 55 million active users worldwide with an average of 250000 new registrations per day. After Yahoo, MySpace and Google, Facebook is also the fourth most popular SNS in South Africa. The purpose of the paper was to determine whether social networks have an influence on higher education students’ lifestyles and behaviour. This research was descriptive and quantitative in nature. The sample comprised 386 students studying at the Durban University of Technology (DUT). The results indicated that the majority of the respondents preferred Facebook as their social network of choice. More than half of the respondents indicated that they access their preferred social network five times or more per day. The majority of the respondents agreed that social networks allow for global interaction and that maintaining relationships has become easier with social networking,


Internet offers bunch of services and resources, one of them is cloud computing. The centers which provide these services are located all around the world and this service has its own mainstream pros and cons. Cloud computing consists of taking cloud services from the internet and taking them away from the considerable firewall. This paper aims in enhancing specifications of cloud computing, review its security threats and address security concerns along with the cloud operations that needs security. Also, this paper addresses basic security models, qualities and prerequisites for cloud Computing


Sign in / Sign up

Export Citation Format

Share Document