Proceedings of the 12th International Conference on Information Integration and Web-Based Applications &Amp; Services 2010
DOI: 10.1145/1967486.1967523
|View full text |Cite
|
Sign up to set email alerts
|

Information security activities model per e-government service promotion stage

Abstract: Korean government has been making numerous efforts to activate the e-government service since 2001. As a result, Korean government received excellent evaluations by keeping high standards in the UN's e-Government Readiness index. However, the count of incidents increases in relation to the e-government service. And the business managers of the government offices are undergoing being difficult learns information security relation technique being difficult. At this, information security activities model per e-go… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…In recent years, government institutions' research into the development and construction of secure shas been extremely effective. Some contributions focused on integrating security aspects, particularly access control mechanisms, during the implementation phase, whereas others focused on identifying and analyzing security requirements [3]. However, there is no way to address the entire issue of security requirements and their transformation throughout all stages of an information system's life cycle.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, government institutions' research into the development and construction of secure shas been extremely effective. Some contributions focused on integrating security aspects, particularly access control mechanisms, during the implementation phase, whereas others focused on identifying and analyzing security requirements [3]. However, there is no way to address the entire issue of security requirements and their transformation throughout all stages of an information system's life cycle.…”
Section: Introductionmentioning
confidence: 99%
“…However, the implementation of information and communication technologies (ICT) in government institutions has created numerous challenges, particularly privacy concerns and weaknesses related to the ability to provide citizens with access to large amounts of data [6]. There are also concerns about access to enterprise information systems and the risk of unauthorized access from within the organization [3].…”
Section: Introductionmentioning
confidence: 99%