A review of effectiveness of Saudi E-government data security management

被引:9
|
作者
Alharbi A.S. [1 ]
Halikias G. [1 ,2 ]
Rajarajan M. [1 ,2 ]
Yamin M. [3 ]
机构
[1] City, University of London, London
[2] Department of Electrical and Electronic Engineering, City, University of London, London
[3] Faculty of Economics and Administration, King Abdulaziz University, Jeddah
关键词
E-government; Saudi Arabia; Security; Stakeholders; Threats; Vulnerabilities; Yasser;
D O I
10.1007/s41870-021-00611-3
中图分类号
学科分类号
摘要
Security of data has always been a contested issue since the internet became the way of life. The internet and Web 2.0 followed by Web 3.0 have enabled many applications for the use of the citizens. E-government is one of them. Questions have always been raised about the security of data in E-government applications and services. Saudi Arabia is one of the developing countries when it comes to the internet-based services. This paper attempts to review the effectiveness of security policies when dealing with threats and vulnerabilities. We shall study these aspects in the context of Saudi Arabian E-government. E-government, anywhere in the world is a very sensitive area when it comes to ensuring security of the users as well as the corporate data. Breach in security of user data may have catastrophic implications in some cases. © 2021, The Author(s).
引用
收藏
页码:573 / 579
页数:6
相关论文
共 50 条
  • [31] Increasing employees' awareness and enhancing motivation in E-government security behavior management
    Zeng Zhongping
    Yang Kaifeng
    Zhang Yi
    Zhou Peipei
    2013 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL MANUFACTURING AND AUTOMATION (ICDMA), 2013, : 684 - 687
  • [32] Fads and Facts of E-Government: A Review of Impacts of E-government (2003-2009)
    Andersen, Kim N.
    Henriksen, Helle Z.
    Medaglia, Rony
    Danziger, James N.
    Sannarnes, Moyfrid K.
    Enemaerke, Mette
    INTERNATIONAL JOURNAL OF PUBLIC ADMINISTRATION, 2010, 33 (11) : 564 - 579
  • [33] Use-cases for identity management in E-government
    McKenzie, Robin
    Crompton, Malcolm
    Wallis, Colin
    IEEE SECURITY & PRIVACY, 2008, 6 (02) : 51 - 57
  • [34] Knowledge Management Practices in e-Government
    Sensuse, Dana Indra
    Prima, Pudy
    Cahyaningsih, Elin
    Noprisson, Handrie
    2017 3RD INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH), 2017, : 216 - 221
  • [35] Review of performance assessment frameworks of e-government projects
    Singh, Harjit
    Grover, Purva
    Kar, Arpan Kumar
    Ilavarasan, P. Vigneswara
    TRANSFORMING GOVERNMENT- PEOPLE PROCESS AND POLICY, 2020, 14 (01) : 31 - 64
  • [36] DATA PROTECTION IN E-GOVERNMENT SERVICES
    Aced-Felez, Emilio
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2011, 3 (03): : 35 - 44
  • [37] STRATEGIC MANAGEMENT OF E-GOVERNMENT DEVELOPMENT
    Klacmer, Mario
    Calopa, Marina Klacmer
    Horvat, Jelena
    ECONOMIC AND SOCIAL DEVELOPMENT: 10TH INTERNATIONAL SCIENTIFIC CONFERENCE ON ECONOMIC AND SOCIAL DEVELOPMENT, 2015, : 218 - 225
  • [38] E-Government Information Security Risk Assessment Research
    Lei Ping
    Lei Zhanbo
    2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 1, 2010, : 1 - 4
  • [39] How to Design the E-government Information Security Legislation
    Liu Bangfan
    Tao Tao
    Zhang Bei
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5367 - +
  • [40] RESEARCH ON E-GOVERNMENT INFORMATION SECURITY PROBLEMS AND COUNTERMEASURES
    He Huanhuan
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 1413 - 1419