Skip to main content

2012 | OriginalPaper | Buchkapitel

7. E-Government and Data Protection in the Public Sector

verfasst von : Mary Lampri

Erschienen in: Virtual Communities, Social Networks and Collaboration

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Legal and regulatory requirements and client expectations regarding management and retention of personal, financial, and other business information are greater than ever. As sensitive data is increasingly shared within organizations and across organizational boundaries, it requires persistent protection from interception and viewing by unauthorized parties. Data encryption technologies are one means of achieving this protection. In addition, organizations must ensure that their ­document management systems and practices can safeguard personal information contained in documents throughout their life cycle. The Internet and computer networking means that there is a need for new security measures and policies to reduce the threats and challenges inherent from these new technologies and software ­applications and network devices. The security aspects of public sector information systems are important as the respective systems are often part of critical infrastructures or deal with personal or sensitive data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aljifri, H. A., Pons, A., & Collins, D. (2003). Global e-commerce: A framework for understanding and overcoming the trust barrier. Information Management & Computer Security, 11(3), 130–138.CrossRef Aljifri, H. A., Pons, A., & Collins, D. (2003). Global e-commerce: A framework for understanding and overcoming the trust barrier. Information Management & Computer Security, 11(3), 130–138.CrossRef
2.
Zurück zum Zitat Alshboul, A. (2010). Information systems security measures and countermeasures: Protecting organizational assets from malicious attacks. IBIMA Publishing Communications of the IBIMA, 2010(486878), 1–9.CrossRef Alshboul, A. (2010). Information systems security measures and countermeasures: Protecting organizational assets from malicious attacks. IBIMA Publishing Communications of the IBIMA, 2010(486878), 1–9.CrossRef
3.
Zurück zum Zitat Bakari, J. K., Tarimo, C. N., Yngstrom, L., & Magnisson, C. (2005, July). State of ICT security management in the institutions of higher learning in developing countries: Tanzania case study. In Computers & Security Proceedings of the Fifth IEEE International Conference on Advanced Learning Technologies (ICALT 05). Washington, DC: IEEE Computer Society. Bakari, J. K., Tarimo, C. N., Yngstrom, L., & Magnisson, C. (2005, July). State of ICT security management in the institutions of higher learning in developing countries: Tanzania case study. In Computers & Security Proceedings of the Fifth IEEE International Conference on Advanced Learning Technologies (ICALT 05). Washington, DC: IEEE Computer Society.
4.
Zurück zum Zitat Chen, C. C., Shaw, R. S., & Yang, S. C. (2006). Mitigating information security risks by increasing user awareness: A case study of information security awareness system. Information Technology, Learning, and Performance Journal, 24, 1–14. Chen, C. C., Shaw, R. S., & Yang, S. C. (2006). Mitigating information security risks by increasing user awareness: A case study of information security awareness system. Information Technology, Learning, and Performance Journal, 24, 1–14.
5.
Zurück zum Zitat Ebrahim, Z., & Irani, Z. (2005). E-government adoption: Architecture and barriers. Business Process Management Journal, 11(5), 589–611.CrossRef Ebrahim, Z., & Irani, Z. (2005). E-government adoption: Architecture and barriers. Business Process Management Journal, 11(5), 589–611.CrossRef
6.
Zurück zum Zitat Gilbert, D., Balestrini, P., & Littleboy, D. (2004). Barriers and benefits in the adoption of e-government. The International Journal of Public Sector Management, 17(4/5), 286.CrossRef Gilbert, D., Balestrini, P., & Littleboy, D. (2004). Barriers and benefits in the adoption of ­e-government. The International Journal of Public Sector Management, 17(4/5), 286.CrossRef
7.
Zurück zum Zitat Heeks, R. (2006). Implementing and managing eGoverment. London: Sage. Heeks, R. (2006). Implementing and managing eGoverment. London: Sage.
8.
Zurück zum Zitat Heiman, D. (2002). Public-sector information security: A call to action for public-sector CIOs. National Association of State Chief Information Officers (NASCIO), USA. Heiman, D. (2002). Public-sector information security: A call to action for public-sector CIOs. National Association of State Chief Information Officers (NASCIO), USA.
9.
Zurück zum Zitat John, L. W. (2000). COBIT: A methodology for managing and controlling information and information technology risks and vulnerabilities. Journal of Information Systems, 14, 21–25.CrossRef John, L. W. (2000). COBIT: A methodology for managing and controlling information and information technology risks and vulnerabilities. Journal of Information Systems, 14, 21–25.CrossRef
10.
Zurück zum Zitat Johnson, M. E. (2008). Information risk of inadvertent disclosure: An analysis of file sharing risk in the financial chain. Journal of Management Information Systems, 25(2), 97–123.CrossRef Johnson, M. E. (2008). Information risk of inadvertent disclosure: An analysis of file sharing risk in the financial chain. Journal of Management Information Systems, 25(2), 97–123.CrossRef
11.
Zurück zum Zitat Kumar, R. L., Park, S., & Subramaniam, C. (2008). Understanding the value of countermeasures portfolios in information systems security. Journal of Management Information Systems, 25, 241–279.CrossRef Kumar, R. L., Park, S., & Subramaniam, C. (2008). Understanding the value of countermeasures portfolios in information systems security. Journal of Management Information Systems, 25, 241–279.CrossRef
12.
Zurück zum Zitat Loukis, Ε., & Spinellis, D. (2001). Information systems security in the Greek public sector. Information Management & Computer Security, 9(1), 21–31.CrossRef Loukis, Ε., & Spinellis, D. (2001). Information systems security in the Greek public sector. Information Management & Computer Security, 9(1), 21–31.CrossRef
13.
Zurück zum Zitat Nyanchama, M. (2005). Enterprise vulnerability management and its role in information security management. Information Systems Security, 14, 29–56.CrossRef Nyanchama, M. (2005). Enterprise vulnerability management and its role in information security management. Information Systems Security, 14, 29–56.CrossRef
14.
Zurück zum Zitat Shalhoub, Z. K. (2006). Trust, privacy, and security in electronic business: The case of the GCC countries. Information Management & Computer Security, 14(3), 270–283. Shalhoub, Z. K. (2006). Trust, privacy, and security in electronic business: The case of the GCC countries. Information Management & Computer Security, 14(3), 270–283.
Metadaten
Titel
E-Government and Data Protection in the Public Sector
verfasst von
Mary Lampri
Copyright-Jahr
2012
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-3634-8_7