E-Planning

Author(s):  
Stephen Kwamena Aikins

This chapter discusses the security risks and management implications for the use of information technology to manage urban and regional planning and development processes. The advancement in GIS technology and planning support systems has provided the opportunity for planning agencies to adopt innovative processes to aid and improve decision-making. Although studies show that a number of impediments to the widespread adoption these technologies exist, emerging trends point to opportunities for the integration of planning supporting systems with various models to help estimate urban growth, environmental, economic and social impact, as well as to facilitate participatory planning. At the same time, information security infrastructure and security preparedness of most public agencies lag behind vulnerabilities. Drawing on the literature on planning, e-planning and information security, the author argues that the emergence of e-planning as an efficient approach to urban planning and development also poses enormous security challenges that need to be managed to ensure integrity, confidentiality and availability of critical planning information for decision-making.

Author(s):  
Blessing Maumbe ◽  
Vesper T. Owei

Information security risks are a major threat to South Africa’s bid to build a broad-based information society. The integration of information security in e-government is no longer an option, but an imperative given the resulting “information overload” and the need to filter “good” from “bad” information. Unless South Africa integrates information security in its e-government development policy and practices, the acclaimed benefits of e-government will not be realized. The moral hazard problems arising from bad information behavior such as human manipulation, withholding information, unauthorized access, and violation of individual privacy and confidentiality heightens the need to combat info-security risks and vulnerabilities. South Africa’s readiness to deal with the information security risks has come under scrutiny. The information security infrastructure in South Africa is also not clearly understood. This chapter examines South Africa’s information security landscape and describes how institutional and agency coordination could help improve information security in e-government.


2015 ◽  
pp. 1018-1031
Author(s):  
Blessing M. Maumbe ◽  
Vesper T. Owei

Information security risks are a major threat to South Africa's bid to build a broad-based information society. The integration of information security in e-government is no longer an option, but an imperative given the resulting “information overload” and the need to filter “good” from “bad” information. Unless South Africa integrates information security in its e-government development policy and practices, the acclaimed benefits of e-government will not be realized. The moral hazard problems arising from bad information behavior such as human manipulation, withholding information, unauthorized access, and violation of individual privacy and confidentiality heightens the need to combat info-security risks and vulnerabilities. South Africa's readiness to deal with the information security risks has come under scrutiny. The information security infrastructure in South Africa is also not clearly understood. This chapter examines South Africa's information security landscape and describes how institutional and agency coordination could help improve information security in e-government.


2021 ◽  
Vol 6 ◽  
pp. 194-200
Author(s):  
Amyrtaa K. Mongush ◽  
Igor N. Karmanov

Information security is a major concern because security risks can greatly affect the assets of an organization. To increase the level of information security, it is proposed to use a knowledge management system with a multi-level architecture in order to improve knowledge exchange and facilitate decision-making, as well as reduce dependence on individual information security experts.


2010 ◽  
Vol 113-116 ◽  
pp. 561-564
Author(s):  
Jian Ding ◽  
Ke Hong Wu ◽  
Zhi Bing Ding

The application of GIS technology to Military Environmental Information(MEI) management will play a vital role in MEI management, and can lead to better decision-making. This paper discusses both the management method and the application fields. Case studies, like information management, pollution coverage evaluating, military transportation planning and monitoring, and decision-making supporting, are presented in this paper. Detailed digital basemap database, Digital Elevation Model(DEM) data, Digital OrthoImage Model(DOM) data, image database of Remote Sensing, Social economic element database, and other informations related to military features, can be integrated into MEI GIS, and will meet the needs for later query and statistics. Spatial analysis is the bridge that links fundamental data models to GIS technology. While buffer analysis can be used for identifying the locations of hazardous chemical storage sites in relation to residents living area, and can facilitate the evaluation of the threatened area in the event of a leak or spill of hazardous materials. Network analysis can be used in military transportation planning and monitoring. GIS is particularly useful in providing composite visual representation of fairly complex underlying model calculations, analysts can draw implicit and important conclusion from the already known geographical data. The study shows that the management of MEI using GIS technology is reasonable and feasible, and GIS is a highly efficient tool in MEI management.


2015 ◽  
Vol 11 (4) ◽  
pp. 52-69 ◽  
Author(s):  
Janine L. Spears ◽  
Tonia San Nicolas-Rocca

Community-based organizations (CBOs) in the health and human services sector handle very sensitive client information, such as psychiatric, HIV testing, criminal justice, and financial records. With annual revenue often in the range of $1 to $10 million, these organizations typically lack the financial, labor, and technical resources to identify and manage information security risks within their environment. Therefore, information security risk assessments were conducted at CBOs as part of a university service learning course intended to ultimately improve security within participating CBOs. Knowledge transfer between trainees and trainers is essential in order for security improvements to be realized. Therefore, this paper constructs a theoretical model of knowledge transfer that is used as a lens through which to examine initial study results of the CBO interventions as part of an exploratory study.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 664 ◽  
Author(s):  
Rajeev Kumar ◽  
Abhishek Kumar Pandey ◽  
Abdullah Baz ◽  
Hosam Alhakami ◽  
Wajdi Alhakami ◽  
...  

Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies.


Sign in / Sign up

Export Citation Format

Share Document