Weitere Kapitel dieses Buchs durch Wischen aufrufen
Legal and regulatory requirements and client expectations regarding management and retention of personal, financial, and other business information are greater than ever. As sensitive data is increasingly shared within organizations and across organizational boundaries, it requires persistent protection from interception and viewing by unauthorized parties. Data encryption technologies are one means of achieving this protection. In addition, organizations must ensure that their document management systems and practices can safeguard personal information contained in documents throughout their life cycle. The Internet and computer networking means that there is a need for new security measures and policies to reduce the threats and challenges inherent from these new technologies and software applications and network devices. The security aspects of public sector information systems are important as the respective systems are often part of critical infrastructures or deal with personal or sensitive data.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Aljifri, H. A., Pons, A., & Collins, D. (2003). Global e-commerce: A framework for understanding and overcoming the trust barrier. Information Management & Computer Security, 11(3), 130–138. CrossRef
Alshboul, A. (2010). Information systems security measures and countermeasures: Protecting organizational assets from malicious attacks. IBIMA Publishing Communications of the IBIMA, 2010(486878), 1–9. CrossRef
Bakari, J. K., Tarimo, C. N., Yngstrom, L., & Magnisson, C. (2005, July). State of ICT security management in the institutions of higher learning in developing countries: Tanzania case study. In Computers & Security Proceedings of the Fifth IEEE International Conference on Advanced Learning Technologies (ICALT 05). Washington, DC: IEEE Computer Society.
Chen, C. C., Shaw, R. S., & Yang, S. C. (2006). Mitigating information security risks by increasing user awareness: A case study of information security awareness system. Information Technology, Learning, and Performance Journal, 24, 1–14.
Ebrahim, Z., & Irani, Z. (2005). E-government adoption: Architecture and barriers. Business Process Management Journal, 11(5), 589–611. CrossRef
Gilbert, D., Balestrini, P., & Littleboy, D. (2004). Barriers and benefits in the adoption of e-government. The International Journal of Public Sector Management, 17(4/5), 286. CrossRef
Heeks, R. (2006). Implementing and managing eGoverment. London: Sage.
Heiman, D. (2002). Public-sector information security: A call to action for public-sector CIOs. National Association of State Chief Information Officers (NASCIO), USA.
John, L. W. (2000). COBIT: A methodology for managing and controlling information and information technology risks and vulnerabilities. Journal of Information Systems, 14, 21–25. CrossRef
Johnson, M. E. (2008). Information risk of inadvertent disclosure: An analysis of file sharing risk in the financial chain. Journal of Management Information Systems, 25(2), 97–123. CrossRef
Kumar, R. L., Park, S., & Subramaniam, C. (2008). Understanding the value of countermeasures portfolios in information systems security. Journal of Management Information Systems, 25, 241–279. CrossRef
Loukis, Ε., & Spinellis, D. (2001). Information systems security in the Greek public sector. Information Management & Computer Security, 9(1), 21–31. CrossRef
Nyanchama, M. (2005). Enterprise vulnerability management and its role in information security management. Information Systems Security, 14, 29–56. CrossRef
Shalhoub, Z. K. (2006). Trust, privacy, and security in electronic business: The case of the GCC countries. Information Management & Computer Security, 14(3), 270–283.
United Nations. (2005). Information economy report 2005. Available from http://www.unctad.org/ecommerce/
World Bank. (2011). Definition of e-government. Retrieved February 7, 2011, from http://go.worldbank.org/M1JHE0Z280
- E-Government and Data Protection in the Public Sector
- Springer New York
- Chapter 7
Neuer Inhalt/© ITandMEDIA