Developing an Information Systems Security Success Model for eGovernment Context
نویسندگان
چکیده
Information security has received a great deal of attention from a number of researchers (Dhillon and Backhouse, 2001). However, there has been little research aimed at understanding the dimensions—within the organizational context—of information security success. The current study considers a large body of information security literature and organizes the research based on their findings. This taxonomy is used to develop a model for information security success. The utility of the proposed model within e-Government is considered. Finally the implications for research and industry are discussed.
منابع مشابه
Assessing eGovernment systems success: A validation of the DeLone and McLean model of information systems success
With the proliferation of the Internet and World Wide Web applications, people are increasingly interacting with government to citizen (G2C) eGovernment systems. It is therefore important to measure the success of G2C eGovernment systems from the citizen's perspective. While general information systems (IS) success models have received much attention from researchers, few studies have been cond...
متن کاملExplaining History of eGovernment Implementation in Developing Countries: An Analytical Framework
The paper proposes an analytical framework to explain history of eGovernment implementation over a certain period of time in the context of developing countries. The framework is built upon General Systems Theory (GST) and Institutional Theory enriched with literature from organizational changes, and information systems/e-Government implementation. Three scenarios of implementation are proposed...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملSecurity Concerns in Egovernment Agent-based Interoperability
The use of Information and Communication Technology in the delivery of public services has a number of advantages. In a first approach, it allows productivity and quality improvements in the delivered services and it allows reductions on the running costs. Furthermore, with interoperability between dispersed IT systems, it is possible to deliver enhanced, combined services. The security on eGov...
متن کامل