The digitalization revolution plays a crucial role in every government administration. It manages a considerable volume of user information and is currently seeing an increase in internet access. The absence of unorganized information, on the other hand, adds to the difficulty of data analysis. Data mining approaches have recently become more popular for addressing a variety of e-governance concerns, particularly data management, data processing, and so on. This chapter identifies and compares several existing data mining and data warehouses in e-government. Deep learning is a subset of a larger class of machine learning techniques that combine artificial neural networks. The significance and difficulties of e-governance are highlighted for future enhancement. As a result, with the growth of e-governance, risk and cyber-attacks have increased these days. Furthermore, the few e-governance application performance evaluations are included in this chapter. The purpose of this chapter is to focus on deep learning applications of e-governance in detecting cyber-attacks.
A cyber-attack can damage data, computer programs, and network one or more computers through applying different methods and cybercriminal's activities to steal information. The increasing of new technologies among the users facilities them. The cyber-attacks are growing tremendously. E-governance is an application of IT and giving online services. These days the world is completely focused on creating social distance among the people, and billions of peoples around the world are working from home (online activities) and shops, and businesses are closed in the COVID-19 pandemic, which the WHO recommended. A remarkable cyber-crime has been recorded by the researcher's study in this environment, affecting society and businesses. This research's primary objective is to find cyber-attacks that steal information in the COVID-19 pandemic and assess the user loss. The results of five years have been compared on the machine learning techniques.
With the development of new advanced technology, people's expectations and grievances of improving services and values in all aspects of life are growing. Changes in technology are offering better solutions to problems, hence improving existing systems. At the same time, new technologies are presenting new security and privacy violations. As information resources become more digitized, infrastructure and digital data are also facing increasing challenges. For advanced nations, the security parameters and optimization techniques have been thoroughly tested and are in good working order. However, these issues have yet to be adequately addressed in developing countries. An unauthorized person applies several different methods and techniques in the modern age for getting self-profit. The major goal of the research is to discover and assess the implications of integrity attacks and threats that have been used in e-governance research during the last 15 years. This research will be supported in assessing the security of various organizations that are working under e-governance.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.