A review of effectiveness of Saudi E-government data security management

被引:9
|
作者
Alharbi A.S. [1 ]
Halikias G. [1 ,2 ]
Rajarajan M. [1 ,2 ]
Yamin M. [3 ]
机构
[1] City, University of London, London
[2] Department of Electrical and Electronic Engineering, City, University of London, London
[3] Faculty of Economics and Administration, King Abdulaziz University, Jeddah
关键词
E-government; Saudi Arabia; Security; Stakeholders; Threats; Vulnerabilities; Yasser;
D O I
10.1007/s41870-021-00611-3
中图分类号
学科分类号
摘要
Security of data has always been a contested issue since the internet became the way of life. The internet and Web 2.0 followed by Web 3.0 have enabled many applications for the use of the citizens. E-government is one of them. Questions have always been raised about the security of data in E-government applications and services. Saudi Arabia is one of the developing countries when it comes to the internet-based services. This paper attempts to review the effectiveness of security policies when dealing with threats and vulnerabilities. We shall study these aspects in the context of Saudi Arabian E-government. E-government, anywhere in the world is a very sensitive area when it comes to ensuring security of the users as well as the corporate data. Breach in security of user data may have catastrophic implications in some cases. © 2021, The Author(s).
引用
收藏
页码:573 / 579
页数:6
相关论文
共 50 条
  • [1] E-government Security Management: Key Factors and Countermeasure
    Wang Jin-fu
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 483 - 486
  • [2] Developing an Information Management Strategy for e-Government in Saudi Arabia
    Almehmadi, Fatmah
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (11) : 643 - 653
  • [3] On Security Risk Management in the Construction of E-Government
    Li, Bing
    EIGHTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2009, : 100 - 104
  • [4] Study on the E-government Security Risk Management
    Zhou, Zhitian
    Hu, Congyang
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (05): : 208 - 213
  • [5] Measuring success of e-government of Saudi Arabia
    Basahel A.
    Yamin M.
    International Journal of Information Technology, 2017, 9 (3) : 287 - 293
  • [6] Data Mining Applications in E-Government Information Security
    Yuan, Tongwei
    Chen, Peng
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 235 - 240
  • [7] System and operational effectiveness alignment: The case of e-government in Saudi Arabia
    Santa, Ricardo
    Lopez Echeverry, Ana Maria
    Villa Sanchez, Paula Andrea
    Rios Patino, Jorge Ivan
    INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE AND ENGINEERING MANAGEMENT, 2014, 9 (03) : 212 - 220
  • [8] Evaluating the Usability and the Accessibility of Saudi E-Government Websites
    Aloboue, Nourah
    Alotaibi, Raghad
    Algahtani, Amani
    HUMAN-COMPUTER INTERACTION. DESIGN AND USER EXPERIENCE, HCI 2020, PT I, 2020, 12181 : 363 - 372
  • [9] E-Government in Saudi Arabia: Between Promise and Reality
    Al-Fakhri, Maher O.
    Cropf, Robert A.
    Higgs, Gary
    Kelly, Patrick
    INTERNATIONAL JOURNAL OF ELECTRONIC GOVERNMENT RESEARCH, 2008, 4 (02) : 59 - 82
  • [10] E-GOVERNMENT SAFETY MANAGEMENT BASED ON DATA ENCRYPT
    Wang Kai
    Shi Xian-Ming
    Rong Li-Qing
    Yang Chao
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 1454 - 1457