E-Government Technologies for Managing National Security and Defense
نویسندگان
چکیده
INTroDucTIoN The advances in the development of net-centric approaches to all aspects of government have had major impacts in how government personnel operate day to day. This is particularly true for individuals functioning in the domains of national security and defense. There has been a broad impact on the organizational behavior and management in most military and intelligence communities. Effective understanding of these technologies, their future potentials, and how they will be integrated in the organizations is essential to reaching critically important goals in national security and defense. Information is now as important as tanks, ships, and aircraft in any nation’s defense. Rapid access to data and, more importantly, management of the sharing of data are significant to addressing both conventional and non-conventional threats. Emerging e-government technologies are transforming how nations manage their defense and intelligence functions. This special issue includes articles covering a number of these relevant technologies and applications for e-government.
منابع مشابه
National Resilience As A Determinant Of National Security Of Ukraine
The purpose of this study is theoretical and methodological substantiation, deepening of conceptual provisions and development of scientific and practical recommendations for the formation of an integrated sector of national security and defense based on the principles of national resilience. The relevance of this study is due to the need to build national resilience to address the main problem...
متن کاملE-Government Capabilities for 21st Century Security and Defense
In this article we provide an overview of e-government as it pertains to national security and defense within the Department of Defense (DoD) and Department of Homeland Security (DHS). We discuss the adoption of Web services and service-oriented architectures to aid in information sharing and reduction of IT costs. We also discuss the networks on which services and resources are being deployed ...
متن کاملChallenges related to the government Role in cyberspace Provide: Grounded theory
Introduction: Because if messengers and social networking channels are formed and hosted on foreign service platforms, we will see political, cultural, and so on threats. In this case, the control and monitoring of social emotions and the observation of political currents are out of reach of outsiders and the aliens take over the public opinion by analyzing the content. In the meantime, the cou...
متن کاملA Security Effective Structure for National Defense in the 21st Century
In accordance with human necessities and deep attention into security, research studies have today became an irrefutable necessity in this area. It is noted that traditional concepts of this important issue have changed, as a result of occurring various events in the past, particularly in the 20th century; so that security is no more limited to protecting human beings against individual and col...
متن کاملThe Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review
Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...
متن کامل