E-government Security Modeling: Explaining Main Factors and Analysing Existing Models
Authors: N. Alharbi
Abstract:
E-government is becoming more important these days. However, the adoption of e-government is often slowed down by technical and non-technical security factors. Nowadays, there many security models that can make the e-government services more secure. This paper will explain the main security factors that affected the level of e-government security. Moreover, it will also analyse current existing models. Finally, the paper will suggest a comprehensive security model that will contain most of technical and non-technical factors.
Keywords: E-government, technical, non-technical, security model.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1087816
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2071References:
[1] G.Yanqing, "E-Government: Definition, Goals, Benefits and Risks", 2010 International Conference onManagement and Service Science (MASS), Vol. 1, No. 4,2011, pp24-26.
[2] S. Alateyah,R.M.Crowder, and G. Wills, "Towards an integrated model for citizen adoption of E-government services", International Journal of Information Technology & Computer Science, Vol. 6, 2012, pp47-57.
[3] F. Musau, W. Cheruiyot, and J.C. Mushi, "Trust and Its Challenges Facing E-Government Programs in Kenya", 2011 International Conference onComputer and Management (CAMAN),2011, pp1-4.
[4] M. AlNuaimi, K. Shaalan, M. Alnuaimi, and K. Alnuaimi, "Barriers to electronic government citizens' adoption: A case of municipal sector in the emirate of Abu Dhabi" Developments in E-systems Engineering (DeSE),2011, pp.398-403.
[5] S. Shareef, "Electronic government adoption based on citizen-centric approach in regional government in developing countries: the case of Kurdistan Region of Iraq (KRI)", PhD thesis, University of East London, 2012.
[6] M. Rehman, and V. Esichaikul, "Factors influencing the adoption of e-government in Pakistan," 2011 International Conference on E-Business and E-Government (WEE), 2011, pp1-4.
[7] G.Karokola, S. Kowalski, and L. Yngstrom, "Evaluating a Framework for Securing E-Government Services - A Case of Tanzania", 2013 46th Hawaii International Conference on System Sciences, 2013, pp1792- 1801.
[8] J. S. Park,andM.Pokharel, "Issues of Interoperability in E-Govemance System and its impact in the Developing Countries❑: A Nepalese Case Study," ICACT 2009 Advanced Communication Technology, Vol. 3, 2009, pp2160-2164.
[9] JE. Lee, JO. Lee, And S. Sang, "E-Government Challenges in Least Developed Countries ( LDCs ): A Case of Cambodia," ICACT 2009 Advanced Communication Technology, Vol. 3,2009, PP2169-2175.
[10] A. M. Odat, "E-Government in developing countries: Framework of challenges and opportunities", 2012 International Conference for Internet Technology and Secured Transactions, 2012, pp578-582.
[11] Z. Ismail,andM.Shajari, "A Comprehensive Adoption Model of e-Government Services in Developing Countries", 2010 IEEE International Conference on Advanced Management Science (laws), Vol. 2, 2010, pp548-553.
[12] J. Jing, and S. Meihui, "Analysis of Security Models Based on Multilevel Security Policy", 2012 International Conference on Management of e-Commerce and e-Government, 2012, pp. 95-97.
[13] S. Al-Azazi, "A Multi-layer Model for e-government Information Security Assessment", PhD thesis, Cranfield University,2008.
[14] F. Al-sobhi, "The Roles of Intermediaries in the Adoption of E-Government Services in Saudi Arabia", PhD thesis, Brunel University, 2011.
[15] S. J. Alotaibi, and M. Walad, "Towards a UTAUT-Based Model for Studying the Integrating Physical and Virtual Identity Access Management Systems in E-Government Domain", 2012 International Conference For Technology And Secured Transactions.2012, pp453- 458.
[16] G. Johanson, and J. Styen, "ICTs and Sustainable Solutions for the Digital Divide: Theory and Perspectives", IGI Global, ISBN 978-1¬61520-800-5, 2011.
[17] B. Davis, D. Davis, G. Morries, and V. Venkatesh, "User acceptance of information technology: toward a unified view", MIS Quarterly. 2003, Vol. 27, No. 3, pp425-478.