Component model of data transmission protection in e-government system
DOI: 10.31673/2409-7292.2020.011117
DOI:
https://doi.org/10.31673/2409-7292.2020.011117Abstract
The article considers a component model of data protection in the e-government system, which combines technical approaches and organizational measures. The main approach of the authors is based on the balanced inclusion of different technologies in terms of ensuring the integrity, confidentiality and accessibility of information for users, ensuring controllability and speed of systems based on trust between users and e-government services. The main components of technical and organizational direction, as well as approaches to their combination are offered.
Keywords: e-government, information protection, component model.
References
1. Погребняк І. Є. Електронний уряд (E-government) і електронне урядування (E-governance): поняття та принципи функціонування // Право та інновації № 3 (7) 2014. 26-35.
2. Електронне урядування та електронна демократія: навч. посіб.: у 15 ч. / за заг. ред. А.І. Семенченка, В.М. Дрешпака. – К., 2017. Частина 13: Захист інформації в системах електронного урядування / [О.М. Хошаба]. – К.: ФОП Москаленко О. М., 2017. – 72 с.
3. Національна стратегія електронної ідентифікації України. Біла книга з електронного урядування. Під редакцією О. Потія та Ю. Козлова // – К: НАДУ, 2015. – 145 с.
4. Соломко Ю. Електронне урядування: поняття, сутність, принципи та напрями розвитку // Ефективність державного управління. 2018. Вип. 2 (55). Ч. 1. – С. 135-143.
5. Luca Calderoni, Dario Maio, (2014) Cloning and tampering threats in e-Passports, Expert Systems with Applications 41 5066–5070.
6. Рощук М. Розвиток електронного урядування в Україні: правовий аспект забезпечення безпеки інформації // Ukrainian Scientific Journal of Information Security, 2018, vol. 24, issue 1, p. 17-22.
7. J. Jang-Jaccard, S.Nepal, (2014) A survey of emerging threats in cyber security‖, Journal of Computer and System Sciences 80 973–993.
8. Choi M., Lee J. and Hwang K. Information Systems Security (ISS) of E-Government for Sustainability: A Dual Path Model of ISS Influenced by Institutional Isomorphism // Sustainability 2018, 10, 1555.
9. Malik F. Saleh, (2011) Information Security Maturity Model , International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (3)
10. Adeel Javaid Electronic Voting System Security // SSRN Electronic Journal · January 2014. 1-18.
11. Mohammad Hazza Zu’bi, Hamdan Hasan AL-Onizat, (2012) E-government and security requirements for information systems and privacy (performance linkage), Journal of management research, Vol 4, No.4.
12. Ali, Omar & M.Wahby, Talaat & Osman, Izzeldin. (2016). E-government Security Models. International Journal of Computer Applications Technology and Research. 5. 439-442.
13. Deven C. Pandya1 , Dr. Narendra J. Patel. Study and analysis of E-Governance Information Security (InfoSec) in Indian Context. IOSR Journal of Computer Engineering (IOSR-JCE). Volume 19, Issue 1, Ver. IV (Jan.-Feb. 2017), PP 04-07.
14. Nanos, Ioannis & Misirlis, Nikolaos & Manthou, Vicky. (2017). Cloud Computing Adoption and E-government. 6th International Symposium and 28th National Conference on Operational Research, At Thessaloniki, Greece. June 2017.
15. Almarabeh, Tamara & Majdalawi, Yousef & Mohammad, Hiba. (2016). Cloud Computing of E-Government. Communications and Network. 08. 1-8.
16. Danielsen, Frank & Flak, Leif & Ronzhyn, Alexander. (2019). Cloud Computing in eGovernment: Benefits and Challenges. ICDS 2019 : The Thirteenth International Conference on Digital Society and eGovernments, At Athens, Greece.
17. Ali M. Al-Khouri, (2013) Technological and Mobility Trends in E-Government, Business and Management Research, Vol. 2, No. 3. 132-139.
18. El-Bakry, Hazem. (2015). Cloud Computing in E-Government: A Survey. International Journal of Advanced Research in Computer Science & Technology. Vol. 3, Issue 2 (Apr. - Jun. 2015)
19. Hassan R.G., Khalifa O.O. E-Government - an Information Security Perspective // International Journal of Emerging Trends & Technology in Computer Science. 2016. 36(1):1-9.
20. Shareef M. Shareef. Enhancing Security of Information in E-Government // Journal of Emerging Trends in Computing and Information Sciences. Vol. 7, No. 3 March 2016. 139-146.