Advances in Electronic Government, Digital Divide, and Regional Development - Security Frameworks in Contemporary Electronic Government
Latest Publications


TOTAL DOCUMENTS

10
(FIVE YEARS 10)

H-INDEX

1
(FIVE YEARS 1)

Published By IGI Global

9781522559849, 9781522559856

Author(s):  
Vannie Naidoo ◽  
Thokozani Ian Nzimakwe

Technology has taken over every aspect of society. It is only fitting that governments embrace technological changes in society and develop m-government for the technologically savvy people of today's society. A global change that is transforming the government sector is the use of ICTs to improve service delivery. In this chapter, the following themes will be investigated and discussed: e-government, defining mobile government, different perspectives on mobile government, mobile government in developed countries, mobile government in developing countries, benefits and limitations of mobile government, way forward in implementing mobile government, and future research in areas of mobile government.


Author(s):  
Ching Yuen Luk

This chapter uses a historical perspective to examine the development trajectory of e-government in Singapore, the trends and patterns of cybercrimes and cyber-attacks, and the measures taken by the government to combat cybercrimes and cyber-attacks. It shows that the government has adopted a proactive, holistic, and cooperative approach to cybersecurity in order to tackle the ever-increasing cybersecurity challenges. It has regularly reviewed and improved cybersecurity measures to ensure their effectiveness and strengthened its defense capabilities over time through coordinating national efforts with public and private sectors and cooperating with regional and international counterparts. The chase for a perfect cybersecurity system or strategy is both impossible and unnecessary. However, it is important and necessary to establish a cybersecurity system or formulate a cybersecurity strategy that can monitor, detect, respond to, recover from, and prevent cyber-attacks in a timely manner, and make the nation stronger, safer, and more secure.


Author(s):  
Balkis Hamdane ◽  
Sihem Guemara El Fatmi

The internet was initially proposed to interconnect a few trusted hosts. However, its continued success has caused many security problems. New internet services, such as e-government, must address these security issues. A host-centric security model tied to information location and based on various partial corrections has been proposed. However, this model hasn't brought radical solutions and has largely contributed to architecture ossification. In this context, the idea of a clean slate approach, satisfying the new requirements and without any compatibility obligation, has emerged. The information-centric networking approach represents one of these architectures. Its main idea is to consider the named information as the central element rather than the IP addresses. To ensure security requirements, it adopts an information-centric security. This chapter is a survey on security in the ICN, satisfying the internet security requirements in general and particularly e-government services.


Author(s):  
Muhammad Imran Khan ◽  
Simon N. Foley ◽  
Barry O'Sullivan

Insiders are legitimate users of a system; however, they pose a threat because of their granted access privileges. Anomaly-based intrusion detection approaches have been shown to be effective in the detection of insiders' malicious behavior. Database management systems (DBMS) are the core of any contemporary organization enabling them to store and manage their data. Yet insiders may misuse their privileges to access stored data via a DBMS with malicious intentions. In this chapter, a taxonomy of anomalous DBMS access detection systems is presented. Secondly, an anomaly-based mechanism that detects insider attacks within a DBMS framework is proposed whereby a model of normative behavior of insiders n-grams are used to capture normal query patterns in a log of SQL queries generated from a synthetic banking application system. It is demonstrated that n-grams do capture the short-term correlations inherent in the application. This chapter also outlines challenges pertaining to the design of more effective anomaly-based intrusion detection systems to detect insider attacks.


Author(s):  
Opeyemi Idowu Aluko

The trend of e-governance and m-governance in governance is increasing rapidly and the instrument of governance is getting closer to the citizens. This chapter considers the trust and reputation of the digital environment of e-governance and m-governance in the world from the existing legal and judicial inkling. How sufficient are the international policies and benchmarks on the use of information communication technology (ICT) for e-governance and m-governance within and among nations to be trusted and judged to be of good repute among the users and has it been able to promote the use of e-governance and m-governance among the nations of the world? The theoretical framework that this chapter hinges on is the actor network theory (ANT). It emerged from a line of research broadly referred to as the social shaping of technology. The methodology adopted focuses on the United Nation survey data on e-governance from 2005-2016. The data collected is analyzed based on regional and economic groupings for e-government development index (EGDI) of Africa, Americas, Asia, Europe, and Oceania.


Author(s):  
Ayda Saidane ◽  
Saleh Al-Sharieh

Regulatory compliance is a top priority for organizations in highly regulated ecosystems. As most operations are automated, the compliance efforts focus on the information systems supporting the business processes of the organizations and, to a lesser extent, on the humans using, managing, and maintaining them. Yet, the human factor is an unpredictable and challenging component of a secure system development and should be considered throughout the development process as both a legitimate user and a threat. In this chapter, the authors propose COMPARCH as a compliance-driven system engineering framework for privacy and security in socio-technical systems. It consists of (1) a risk-based requirement management process, (2) a test-driven security and privacy modeling framework, and (3) a simulation-based validation approach. The satisfaction of the regulatory requirements is evaluated through the simulation traces analysis. The authors use as a running example an E-CITY system providing municipality services to local communities.


Author(s):  
Nisha Dhanraj Dewani

Different systems require different levels of security according to the services they provide to their users. Cyberspace is the alliance of various networks together connected through internet service providers (ISPs). However, the alliance of these networks often faces security issues. Some use the internet as a path for illegal activities such as breaching of others computer or networks, damaging and stealing information, and blocking or denying legitimate users from services they subscribe. So, the purpose of this chapter is to review the responsibilities of ISPs in securing their customers' network, and find out whether there are legal provisions, or liabilities that are bindings on the ISPs to provide security for their customers. What protections are envisaged under the umbrella of safe harbors? Are ISPs responsible for end users' network security? The Swedish Court recently found The Pirate Bay (TPB) guilty of making copyright works available. Finally, this chapter will analyze the issues raised in the TPB along with ISPs liability.


Author(s):  
Benjamin Enahoro Assay

The growing menace of cyber-related crimes in Nigeria is giving the government and other stakeholders in the information and communication technology sector a cause to worry. Apart from taking a toll on the nation's economic sphere, it has also affected the image of the country negatively especially when viewed against the backdrop of the recent ranking of Nigeria as third in global internet crimes behind United Kingdom and the United States. This scenario, no doubt, requires urgent attention. This chapter, therefore, proffer solutions and recommend ways to make the country's cyberspace free from incessant criminal attacks.


Author(s):  
Opeyemi Idowu Aluko ◽  
Gabriel Temitope Aderinola

E-governance is a technological innovation that brings governance to the fore of integrity and accountability. It requires high technological commitment so as to bring the government closer to the people. Corruption on the other hand is a bane to growth and development in any country. E-governance is a corrective measure to corruption which prevents government officials from shady activities due to its transparency nature. The connection between e-governance and corruption is analyzed in this chapter, and Nigeria is selected as a case study in developing countries. The chapter concludes on the premise that e-governance reduces the strength of corruption in any country and more investment is needed to enhance this development.


Author(s):  
Ines Mezghani Daoud ◽  
Marwa Meddeb

Non-communicable diseases (NCDs) such as obesity, diabetes, cardiovascular diseases, and cancers have become a major health concern for most countries around the world. Different elements such as social, biological, and environmental cause the NCDs. But the only way that one can intentionally modify to avoid these diseases is the desire to reduce risk factors for physical activity, tobacco, and diet. Several prevention strategies have been launched worldwide thorough governmental programs by implementing policies/laws. However, these programs don't integrate active communicate participation and support with the social community. This chapter aims to bring out the priority of enhancing the level of public awareness of NCDs. To ensure public responsiveness, the focus of this research is to create an effective solution to prevent risky behavior. The authors focus on the construction of “Sahtek,” a social media solution developed on the fundamentals of social marketing, to better coach and promote awareness of NCDs prevention.


Sign in / Sign up

Export Citation Format

Share Document