Security and Privacy Issues in E-Government

2014 ◽  
pp. 880-892 ◽  
Author(s):  
Ramaraj Palanisamy ◽  
Bhasker Mukerji

Government is a unique actor as a provider of online public services to its citizens and enterprises. The e-citizens expect that the e-government services are safe and secure, that the privacy of the e-citizen is protected. As security and privacy are primary concerns in e-government, this chapter describes the security and privacy issues faced by the government, the sources and applications of these threats, the ways of protecting security and citizens' personal information, and the challenges in managing the security threats. The purpose of this chapter is to provide guidelines for the administrators of state-level & federal-level e-government services and IT professionals that they need for continuous improvement of e-government security and privacy.

Author(s):  
Ramaraj Palanisamy ◽  
Bhasker Mukerji

Government is a unique actor as a provider of online public services to its citizens and enterprises. The e-citizens expect that the e-government services are safe and secure, that the privacy of the e-citizen is protected. As security and privacy are primary concerns in e-government, this chapter describes the security and privacy issues faced by the government, the sources and applications of these threats, the ways of protecting security and citizens’ personal information, and the challenges in managing the security threats. The purpose of this chapter is to provide guidelines for the administrators of state-level & federal-level e-government services and IT professionals that they need for continuous improvement of e-government security and privacy.


Author(s):  
Dr. J. Padmavathi ◽  
Sirvi Ashok Kumar Mohanlal

Today Social Media is an integral part of many people’s lives. Most of us are users of one or many of these such as Facebook, Twitter, Instagram, LinkedIn etc. Social media networks are the most common platform to communicate with our friends, family and share thoughts, photos, videos and lots of other information in the common area of interest. Privacy has become an important concern in social networking sites. Users are not aware of the privacy risks involved on social media sites and they share their sensitive information on social network sites. While these platforms are free and offer unrestricted access to their services, they puzzle the users with many issues such as privacy, security, data harvesting, content censorship, leaking personal information etc. This paper aims at analyzing, the major users of social media networks, namely, the college students. It was intended to assess the extent the consumers’ are aware of the risks of free usage and how to mitigate against these privacy issues.


2021 ◽  
Vol 17 (1) ◽  
pp. 150-166
Author(s):  
Andrei L. LOMAKIN ◽  
Evgenii Yu. KHRUSTALEV ◽  
Gleb A. KOSTYURIN

Subject. As the socio-economic relationships are getting digitalized so quickly, the society faces more and more instances of cybercrime. To effectively prevent arising threats to personal information security, it is necessary to know key social engineering methods and security activities to mitigate consequences of emerging threats. Objectives. We herein analyze and detect arising information security threats associated with social engineering. We set forth basic guidelines for preventing threats and improving the personal security from social engineering approaches. Methods. The study relies upon methods of systems analysis, synthesis, analogy and generalization. Results. We determined the most frequent instances associated with social engineering, which cause personal information security threats and possible implications. The article outlines guidelines for improving the persona; security from social engineering approaches as an information security threat. Conclusions and Relevance. To make information security threats associated with social engineering less probable, there should be a comprehensive approach implying two strategies. First, the information security protection should be technologically improved, fitted with various data protection, antivirus, anti-fishing software. Second, people should be more aware of information security issues. Raising the public awareness, the government, heads of various departments, top executives of public and private organizations should set an integrated training system for people, civil servants, employees to proliferate the knowledge of information security basics.


2011 ◽  
pp. 133-148
Author(s):  
Patrick R. Mullen

The growth of the Internet and digital government has dramatically increased the Federal government’s ability to collect, analyze, and disclose personal information about many private aspects of citizens’ lives. Personal information once available only on paper to a limited number of people is now instantly retrievable anywhere in the world by anyone with a computer and an Internet connection. Over time, there has also been a declining level of trust by Americans in government, and currently, many perceive the government as a potential threat to their privacy. Given these forces at work in our society, one should not be surprised to read the results of surveys that show privacy as a top concern of citizens in the 21st century. If citizens do not believe that the government is adequately protecting the privacy of their individual information, they may be less willing to provide this information. Such reluctance could compromise the ability of government to collect important information necessary to develop, administer and evaluate the impact of various policies and programs. Privacy issues discussed in this chapter include challenges regarding (1) protecting personal privacy; (2) ensuring confidentiality of data collected; and (3) implementing appropriate security controls. Perspectives on privacy and stewardship responsibilities of agencies are also discussed.


2018 ◽  
Vol 7 (4.1) ◽  
pp. 51
Author(s):  
Ala'a Saeb Al-Sherideh ◽  
Roesnita Ismail ◽  
Fauziah Abdul Wahid ◽  
Norasikin Fabil ◽  
Waidah Ismail

Mobile applications available in anytime and from anywhere. The utilizing of mobile governmental applications is significant to reduce the efforts and time that are required to accomplish the public services by citizens. The main challenges that face the acceptance and adoption of mobile governmental applications are the privacy and security issues. The users, who do not trust the security of mobile governmental applications, may reject the use of these applications which discourages the government to adopt the mobile services. This study focuses in investigating the security and privacy requirements of mobile government applications. Many related works are reviewed and discussed to understand the important security requirements of mobile government applications. The main results indicate that effective privacy and security of mobile government applications should be assured so as to enhance the level of adopting and using these applications. The security requirements involve many considerations such as the hardware characteristics, software characteristics, and communication characteristics. This article mainly gives better understanding of security requirements of mobile government applications.   


1969 ◽  
Vol 10 (3) ◽  
Author(s):  
Witra Apdhi Yohanitas dan Teguh Henry Prayitno

One manifestation of good governance is the availability of infrastructure that providing information and take into account of people's expectations, so that it can be used to improvethe performance of government services. Basically, public has the right to use the complaints media if the performance of the government is not in line with public prospects. By giving an example of complaints managements and policiesthat are applied in the city of Bekasi as a benchmark that can be copied or replicated in other agencies. This study utilize exploratory descriptive method that link with regulationin order to explain the complaint in a straightforward and structured. Bekasi city has packed a system of provision of information and public complaints by utilizing technology which is the website and the SMS center. In addition, to support the success of the public services, Bekasi provides clear rules related to the provision of information and public complaints, and organizingtransparency complaint data and simple management. Model that performed by Bekasi Local Government is quite simple, therefore it can be duplicated/ replicated in other local governments.Keywords: complaint management, Bekasi City, website, sms center, community expectationsSalah satu wujud pemerintahan yang baik adalah tersedianya sarana dan prasarana untuk pemberian informasi, mendengar dan memperhatikan harapan masyarakatsehingga dapat menjadi perbaikan pelayanan dan kinerja pemerintah.Masyarakat berhak menggunakan media pengaduan jika kinerja pemerintah tidak sesuai dengan harapannya. Pemberian contoh pola pengaduan yang diterapkan di kota Bekasi dan memberikan beberapa contoh kebijakan yang ditempuh agar pengelolaan pengaduan yang diterapkan dapat berjalan sesuai dengan yang diinginkan diharapkan pengelolaan pengaduan kota Bekasi dapat menjadi pembanding yang dapat dicontoh atau direplikasi instansi lain.Melalui Metode deskriptif eksploratifterhadap peraturan dipilih untuk menjelaskan pengaduan secara lugas dan terstruktur. Kota Bekasi telah mengemas suatu sistem pelayanan penyediaan informasi dan pengaduan masyarakat dengan memanfaatkan sarana teknologi yaitu situs web dan sms center.Selain itu, untuk menunjang keberhasilan pelayanannya, kota Bekasi memberikan aturan yang jelas terkait pemberian informasi dan pengaduan masyarakat, dan melakukan transparansi data pengaduan serta manajemen yang sederhana. Model yang dilakukan cukup sederhana, maka pengelolaan pengaduan yang dilakukan oleh kota Bekasi dapat ditiru/ direplikasi didaerah lain.Kata Kunci: pengelolaan pengaduan, Kota Bekasi, situs web, sms center, harapan masyarakat


2018 ◽  
Vol 16 (2) ◽  
pp. 34
Author(s):  
Khairul Rahman

The demands of services that priority the needs and demands of society will be difficult to be realizedwithout the responbility of every apparatus government. The complain and even critics who oftendelivered about the low quality of public services at all levels has become the theme of dailyconversation. All the evidence for the low quality of service received by society. The importance ofbuilding responsilbe government services because the society has the right to obtain services thatprioritize the objectives development. This is based on the idea that the government is actually formedto provide services to the society and in fact the government to gain power in a democratic state is amandate of society. The organizations of government are often referred to as ’society of services’(public servant). In reality, not all officials government / administrators have realized the importanceof service. The closer relationship between the service with the responsibility, the lack ofundersatnding of the government apparatus for the importance of the service indicates the weakness ofthe responsibility of the apparatus government. The complaint from society of poor and disappointingservices from the government and the flow of stories power abus. One of the causes, of all that is thelack of government responsibility to the society. An understanding of how to bulid government servicesis responsibility.


2008 ◽  
pp. 2905-2914
Author(s):  
Stephen Marsh ◽  
Andrew S. Patrick ◽  
Pamela Briggs

Building any online system or service that people will trust is a significant challenge. For example, consumers sometimes avoid e-commerce services over fears about their security and privacy. As a result, much research has been done to determine factors that affect users’ trust of e-commerce services (e.g., Egger, 2001; Friedman, Khan, & Howe, 2000; Riegelsberger & Sasse, 2001). Building trustable e-government services, however, presents a significantly greater challenge than e-commerce services for a number of reasons. First, government services are often covered by privacy protection legislation that may not apply to commercial services, so they will be subject to a higher level of scrutiny. Second, the nature of the information involved in an e-government transaction may be more sensitive than the information involved in a commercial transaction (Adams, 1999). Third, the nature of the information receiver is different in an e-government context (Adams, 1999). Some personal information, such as supermarket spending habits, might be relatively benign in an e-commerce situation, such as a loyalty program (supermarket points, or Air Miles, for instance), but other information such as medical records would be considered very sensitive if shared amongst all government agencies. Fourth, the consequences of a breach of privacy may be much larger in an e-government context, where, for example, premature release of economic data might have a profound effect on stock markets, affecting millions of investors (National Research Council, 2002). E-government services also involve significant privacy and security challenges because the traditional trade-offs of risks and costs cannot be applied as they can in business. In business contexts it is usually impossible to reduce the risks, for example of unauthorized access to information, or loss of or corruption of personal information, to zero and managers often have to trade-off acceptable risks against increasing costs. In the e-government context, because of the nature of the information and the high publicity, no violations of security or privacy can be considered acceptable (National Research Council, 2002). Although zero risk may be impossible to achieve, it is vital to target this ideal in an e-government service. In addition, government departments are often the major source of materials used to identify and authenticate individuals. Identification documents such as driver’s licenses and passports are issued by government agencies, so any breach in the security of these agencies can lead to significant problems. Identity theft is a growing problem worldwide, and e-government services that issue identification documents must be especially vigilant to protect against identity theft (National Research Council, 2002). Another significant challenge for e-government systems is protecting the privacy of individuals who traditionally have maintained multiple identities when interacting with the government (National Research Council, 2002). Today, a driver’s license is used when operating an automobile, a tax account number is used during financial transactions, while a government health card is used when seeking health services. With the implementation and use of e-government services it becomes possible to match these separate identities in a manner that was not being done before, and this could lead to new privacy concerns.


Author(s):  
S. Marsh ◽  
A. S. Patrick

Building any online system or service that people will trust is a significant challenge. For example, consumers sometimes avoid e-commerce services over fears about their security and privacy. As a result, much research has been done to determine factors that affect users’ trust of e-commerce services (e.g., Egger, 2001; Friedman, Khan, & Howe, 2000; Riegelsberger & Sasse, 2001). Building trustable e-government services, however, presents a significantly greater challenge than e-commerce services for a number of reasons. First, government services are often covered by privacy protection legislation that may not apply to commercial services, so they will be subject to a higher level of scrutiny. Second, the nature of the information involved in an e-government transaction may be more sensitive than the information involved in a commercial transaction (Adams, 1999). Third, the nature of the information receiver is different in an e-government context (Adams, 1999). Some personal information, such as supermarket spending habits, might be relatively benign in an e-commerce situation, such as a loyalty program (supermarket points, or Air Miles, for instance), but other information such as medical records would be considered very sensitive if shared amongst all government agencies. Fourth, the consequences of a breach of privacy may be much larger in an e-government context, where, for example, premature release of economic data might have a profound effect on stock markets, affecting millions of investors (National Research Council, 2002). E-government services also involve significant privacy and security challenges because the traditional trade-offs of risks and costs cannot be applied as they can in business. In business contexts it is usually impossible to reduce the risks, for example of unauthorized access to information, or loss of or corruption of personal information, to zero and managers often have to trade-off acceptable risks against increasing costs. In the e-government context, because of the nature of the information and the high publicity, no violations of security or privacy can be considered acceptable (National Research Council, 2002). Although zero risk may be impossible to achieve, it is vital to target this ideal in an e-government service. In addition, government departments are often the major source of materials used to identify and authenticate individuals. Identification documents such as driver’s licenses and passports are issued by government agencies, so any breach in the security of these agencies can lead to significant problems. Identity theft is a growing problem worldwide, and e-government services that issue identification documents must be especially vigilant to protect against identity theft (National Research Council, 2002). Another significant challenge for e-government systems is protecting the privacy of individuals who traditionally have maintained multiple identities when interacting with the government (National Research Council, 2002). Today, a driver’s license is used when operating an automobile, a tax account number is used during financial transactions, while a government health card is used when seeking health services. With the implementation and use of e-government services it becomes possible to match these separate identities in a manner that was not being done before, and this could lead to new privacy concerns.


2018 ◽  
Vol 20 (5) ◽  
pp. 399-412 ◽  
Author(s):  
Sheshadri Chatterjee ◽  
Arpan Kumar Kar

Purpose The purpose of this study is to highlight the importance of Internet of Things (IoT) in India. The purpose also includes providing insights regarding policy framing for IoTs with a focus on regulation and governance. Design/methodology/approach A qualitative approach has been taken here for understanding the issues of IoT policy for India so far as regulations and governance are concerned. Findings This study highlights that the draft IoT policy of India, 2015 is to be improved. Attention is to be focused on regulation and governance for addressing security and privacy issues among other issues. For proper enablement of IoT technology, arrangements of funds are essential. Research limitations/implications IoT-related technologies in India have immense potential for the industries. This study implies the importance of security and privacy issues. If these issues are properly addressed, the industries will flourish further. Practical implications The study provides insights covering how usage of IoT technology would help the industry to grow up, how research and development organizations would be able to strengthen IoT technology for further development and to what extent it will improve the human daily activities. Social implications IoT would influence lives of millions of people of India. IoT-related policies would have huge social implication in terms of human–device interactions and communications. This research is a contemporary study on the implication of IoT policy toward the future growth of IoT-enabled devices in India. Originality/value The Government of India is expected to frame a comprehensive IoT policy with the help of draft IoT policy of 2015. This paper has taken a unique attempt to provide effective inputs to develop a comprehensive IoT policy for India.


Sign in / Sign up

Export Citation Format

Share Document