8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) 2013
DOI: 10.1109/icitst.2013.6750278
|View full text |Cite
|
Sign up to set email alerts
|

E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…Several studies have looked into the privacy and security practices of e-government sites mainly in West Africa with only few studies done in the context of East Africa. A study of privacy practices of e-government websites in Ghana, Nigeria, Sierra Leone, Gambia, and Liberia against ISO 29100 privacy principles and the ECOWAS Regional Data Protection Act revealed the existence of limited controls in protecting the PII of the respective countries' citizens and complying with the above privacy principles/acts [15]. A separate study that examined PII processing by Nigerian consulates in 8 countries revealed the existence of ineffective controls in the protection of PII of Nigerian citizens living abroad [16].…”
Section: A Privacy and Security Controls In E-government Sitesmentioning
confidence: 99%
See 1 more Smart Citation
“…Several studies have looked into the privacy and security practices of e-government sites mainly in West Africa with only few studies done in the context of East Africa. A study of privacy practices of e-government websites in Ghana, Nigeria, Sierra Leone, Gambia, and Liberia against ISO 29100 privacy principles and the ECOWAS Regional Data Protection Act revealed the existence of limited controls in protecting the PII of the respective countries' citizens and complying with the above privacy principles/acts [15]. A separate study that examined PII processing by Nigerian consulates in 8 countries revealed the existence of ineffective controls in the protection of PII of Nigerian citizens living abroad [16].…”
Section: A Privacy and Security Controls In E-government Sitesmentioning
confidence: 99%
“…Mutimukwe et al evaluated compliance of three leading e-government service providers' in Rwanda with international privacy principles and found that the providers partially comply with the principles [17]. However, [15,1] examined limited privacy and security parameters when evaluating compliance while [17] relied on survey and interview data to draw their conclusions. Our approach advances the aforementioned studies by evaluating websites' actual privacy practices using web scraping and data mining techniques.…”
Section: A Privacy and Security Controls In E-government Sitesmentioning
confidence: 99%
“…A study [5] was carried out recently to reveal how some Nigerian e-government web services process citizens' PII in unsecured web environment without adequate security in place on those web portals or any globally acceptable regulatory framework for online personal data protection and thus exposing the sensitive information to the threat of identity theft. In another related research on balancing security and privacy in e-government services [13], a "trustworthy system" was advocated to complement the multiple technical nuances of security so as to provide privacy, security and trust in e-government web services.…”
Section: Privacy Regulations In E-government Web Servicesmentioning
confidence: 99%
“…Although outsourcing generally has some benefits which include: cost efficiency, scalability as well as flexibility, there are a lot of inherent risks associated with outsourcing of citizens' PII data collection leading to dangers of the data being revealed to the service provider or any illegal user thus resulting in unexpected outcomes. Several risks on outsourcing business process operations had also been assessed to include a misuse of trust and security breaches [5] whereby the authors refers to a "misuse of trust" in a data privacy respect arguing that the external service provider needs access to non-encrypted sensitive data from the customers of a bank in order to process the outsourced transaction. Thus the risk is that service provider employees may use this data in an unauthorized manner (e.g.…”
Section: Conclusion and Recommendationmentioning
confidence: 99%
See 1 more Smart Citation