Developing an Information Systems Security Success Model for eGovernment Context

نویسندگان

  • Kimberley Dunkerley
  • Gurvirender Tejay
چکیده

Information security has received a great deal of attention from a number of researchers (Dhillon and Backhouse, 2001). However, there has been little research aimed at understanding the dimensions—within the organizational context—of information security success. The current study considers a large body of information security literature and organizes the research based on their findings. This taxonomy is used to develop a model for information security success. The utility of the proposed model within e-Government is considered. Finally the implications for research and industry are discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessing eGovernment systems success: A validation of the DeLone and McLean model of information systems success

With the proliferation of the Internet and World Wide Web applications, people are increasingly interacting with government to citizen (G2C) eGovernment systems. It is therefore important to measure the success of G2C eGovernment systems from the citizen's perspective. While general information systems (IS) success models have received much attention from researchers, few studies have been cond...

متن کامل

Explaining History of eGovernment Implementation in Developing Countries: An Analytical Framework

The paper proposes an analytical framework to explain history of eGovernment implementation over a certain period of time in the context of developing countries. The framework is built upon General Systems Theory (GST) and Institutional Theory enriched with literature from organizational changes, and information systems/e-Government implementation. Three scenarios of implementation are proposed...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Security Concerns in Egovernment Agent-based Interoperability

The use of Information and Communication Technology in the delivery of public services has a number of advantages. In a first approach, it allows productivity and quality improvements in the delivered services and it allows reductions on the running costs. Furthermore, with interoperability between dispersed IT systems, it is possible to deliver enhanced, combined services. The security on eGov...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009