Ways to establish public authorities information security governance utilizing E-government information security management system (G-ISMS)
نویسندگان
چکیده
منابع مشابه
A Study on E-Taiwan Promotion Information Security Governance Programs with E-government Implementation of Information Security Management Standardization
The promotion of Information Security Governance (ISG) has become an important factor in the implementation of e-government and information security management within the “National Information and Communications Technology Security Development Program (2009 ̃2012)” in continuing the “Plan for Establishment of Information and Communication Technology Infrastructure Security Mechanism (2001 ̃2008)”...
متن کاملE-Government Information Security Trust Assessment Model
The establishment of trust in e-government information security is of prominent importance for the full use of the actual potential of e-government. In this article, the trust creation mechanism to e-government information security is analyzed, and the model for the assessment of trust is suggested. The model is based on integration of reputation values calculated according to trust data collec...
متن کاملEnhancing Security of Information in E-Government
In our daily lives, the advances of new technology can be used to sustain development for people across the globe. Particularly, e-government can be the dynamo of the development for the people. E-government services are intended to be responsive, citizen-centric based and social inclusive. It also engages citizen to participate in the process of delivery of services. Consequently, users can ea...
متن کاملInformation Systems Security Compliance in E-Government
The aim of this research paper is the development of a Fuzzy Logic model framed on Activity Theory to predict and benchmark compliance of Government agencies activities, with information systems security (ISS) standard, AS17799 (2006). The ISS standard has 10 main categories and 127 controls for which survey questions were asked in an online process. This project is a longitudinal study that co...
متن کاملIdentifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach
In recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of the Korean Institute of Information and Communication Engineering
سال: 2013
ISSN: 2234-4772
DOI: 10.6109/jkiice.2013.17.4.769