Opportunities and threats: A security assessment of state e-government websites

被引:72
作者
Zhao, Jensen J. [1 ]
Zhao, Sherry Y. [2 ]
机构
[1] Ball State Univ, Miller Coll Business ISOM, Muncie, IN 47306 USA
[2] Int Comp Sci Inst, Berkeley, CA 94704 USA
关键词
E-government; Computer network systems; IP address; NAT; PAT; Port; 80/tcp; 443/tcp; Security; Vulnerability; Cyber intrusion; Hacker attack;
D O I
10.1016/j.giq.2009.07.004
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
This study assessed the security of the U.S. state e-government sites to identify opportunities for and threats to the sites and their users. The study used a combination of three methods - web content analysis, information security auditing, and computer network security mapping - for data collection and analysis. The findings indicate that most state e-government sites posted privacy and security policy statements; however, only less than half stated clearly what security measures were in action. Second, the information security audit revealed that 98% of the sites secured users' accounts with SSL encryption for data transmission, and the sites' search tools enable public users to search for public information only. Third, although the sites had most of their internet ports filtered or behind firewalls, all of them had their main IP addresses detected and their port 80/tcp open. The study discussed the threats and opportunities and suggested possible solutions for improving e-government security. (C) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:49 / 56
页数:8
相关论文
共 50 条
  • [31] E-government and Citizen Engagement: An Overview of US States' Government Websites
    Greitens, Thomas J.
    Strachan, J. Cherie
    INTERNATIONAL JOURNAL OF PUBLIC ADMINISTRATION, 2011, 34 (1-2) : 54 - 58
  • [32] An extended security framework for e-government
    Al-Ahmad, Walid
    Al-Kaabi, Reem
    ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 294 - +
  • [33] E-government Security Management: Key Factors and Countermeasure
    Wang Jin-fu
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 483 - 486
  • [34] Enhancing security in the integration of e-Government - The e-School initiative
    Zissis, Dimitrios
    Papadopoulou, Anastasia-Evangelia
    Lekkas, Dimitrios
    WEBIST 2008: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2008, : 495 - 502
  • [35] Integrated Architecture Framework for e-Government: an Assessment of the e-Government Initiatives in Zimbabwe
    Ruhode, Ephias
    Owei, Vesper
    PROCEEDINGS OF 5TH INTERNATIONAL CONFERENCE ON E-GOVERNMENT, 2009, : 165 - 173
  • [36] Effective Use of Search Functionality in Pakistan E-Government Websites
    Tahir, Mutahira Naseem
    Arif, Fahim
    FUTURE INTELLIGENT VEHICULAR TECHNOLOGIES, FUTURE 5V 2016, 2017, 185 : 196 - 204
  • [37] QUALITY RANKING OF E-GOVERNMENT WEBSITES - GREY ANALYSIS APPROACH
    Jati, Handaru
    2011 INTERNATIONAL CONFERENCE ON COMPUTER AND COMPUTATIONAL INTELLIGENCE (ICCCI 2011), 2012, : 317 - 321
  • [38] e-Government Services Vulnerability
    Shahintash, Ali
    Hajiyev, Yashar
    2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT), 2014, : 403 - 407
  • [39] The support ability of government websites to G2B E-Government
    Chen, Juan
    Shao, Peiji
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 56 - 61
  • [40] The Challenges of E-participation in Saudi Arabian E-government websites: From Government Perspective
    Alharbi, Abdulla
    Kang, Kyeong
    Alattas, Mohammed
    INNOVATION VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOL I-VI, 2015, : 806 - 813