Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-vvkck Total loading time: 0 Render date: 2024-04-25T18:55:03.153Z Has data issue: false hasContentIssue false

8 - E-government security

from III - E-security applications

Published online by Cambridge University Press:  11 September 2009

Mohammad Obaidat
Affiliation:
Monmouth University, New Jersey
Noureddine Boudriga
Affiliation:
Université du 7 Novembre à Carthage, Tunis
Get access

Summary

Governments worldwide have dedicated the efforts to deliver their services in ways that meet the needs of businesses and citizens they serve in order to enable them to interact securely in places and at times that are convenient to them. It is commonly agreed that bringing trust and confidence is essential to increase the uptake of e-government services. This chapter provides key support to service providers wishing to provide e-government services in a trusted manner. It lays the foundations for enabling secure services that will really transform the way citizens and businesses interact with government.

Introduction

E-government is to provide a non-stop government information service. The goal is to create a friendly easy-to-use tool for the public and businesses to locate information and use services made available on the net by the government agencies. It aims to provide a large spectrum of public information, authorize a greater and better access to this information, and give more convenience to government services. E-government projects have been started in the mid 1990s in various countries. Each country has assigned its own project with varying focuses, applications, and security mechanisms. Nowadays, some of these projects are in their operational phase, while others are still in the design or prototyping phases. However, as computer power is growing to be cheaper and computer networks are becoming larger and more efficient, many threats against e-government have been observed lately. Threats unfortunately tend to reduce the efficiency of e-government and limit its promises.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2007

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Acquisti, A. (2004). Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots, CMU-ISRI-04-116 (http://www.heinz.cmu.edu/⋧acquisti/papers/).Google Scholar
Ateniese, G., C. Blundo, A. De Santis, and D. R. Stinson (1996). Visual Cryptography for General Access Structures (http://citeseer.ist.psu.edu/ateniese96visual.html).
Australian Government (2004). Managing Privacy Risk: An introduction guide to privacy impact assessment, Nov. 2004.
Benabdallah, S., Guemara, S. ElFatmi, and Boudriga, N. (2002). Security issues in e-government models: what governments should do, IEEE Int. Conf on Syst. Man. and Cybernetics (SMC 2002), Hammamet, Tunisia.Google Scholar
Boudriga, N. and M. S. Obaidat (2002). Driving citizens to information technology. MDF-4, world bank: (http://www.worldbank.org/mdf/mdf4/papers/boudrig-obaidat.pdf).
Boudriga, N. and S. Benabdallah (2002). Laying out the foundation for a digital government model, case study: Tunisia. In Advances in Digital Government: Technology, Human Factors, and Policy. McIver, W. J. Jr. and Elmagarmid, A. K. (eds.), Kluwer.CrossRefGoogle Scholar
Burr, W. E., D. F. Dodson, and W. T. Polk (2004). Electronic Authentication Guideline, NIST special publication 800–63 version 1.0.1.
California Internet Voting Task Force (2000). California Internet Voting Task Force. A Report on the Feasibility of Internet Voting (http://www.ss.ca.gov/executive/ivote/final_report.pdf).
Chaum, D., Ryan, P. Y. A., and Schneider, S. A. (2004a). A Practical, Voter-verifiable Election Scheme, Technical Report Series CS-TR-880, Dec. 2004, http://www.cs.ncl.ac.uk/Google Scholar
Chaum, D. (2004b). Secret-ballot receipts: true voter-verifiable elections. IEEE Security and Privacy, 2(1): 38–47 (http://www.voterverifiable.com/article.pdf).CrossRefGoogle Scholar
F., Cranor L. and Cytron, R. K. (1997). Sensus: a security-conscious electronic polling system for the Internet. Proceedings of the Hawaii International Conference on System Sciences, Jan. 7–10, 1997, Wailea, Hawaii, USA.Google Scholar
Dempsey, J., Anderson, P., and Schartw, A. (2003). Privacy and e-government. A Report to the United Nations Department of Economic and Social Affairs as background for the World Public Sector Report: E-Government, http://www.internetpolicy.net/privacy/20030523cdt.pdf.Google Scholar
E-Government unit, New Zealand (2004). Authentication in e-government: best practice framework for authentication (available at http://www.e-government.govt.nz/authentication).
Fischer, E. A. (2003). Election Reform and Electronic Voting Systems (DREs): Analysis of Security Issues. CRS, http://www.epic.org/privacy/voting/crsreport.pdf
Freedom of Information and Privacy Office (2001). Privacy Impact Assessment Guidelines. Freedom of Information and Privacy Office, Management Board Secretariat, Ontario, Canada. http://www.gov.on.ca/MBS/english/fip/pia/index.html
Fujioka, A., Okamoto, T., and Ohta, K. (1992). A practical secret voting scheme for large scale elections, Advances in Cryptography – AUSCRYPT ‘92, Lecture Notes in Computer Science 718, Springer-Verlag, pp. 244–251.Google Scholar
S., Guemara-ElFatmi and Noureddine, Boudriga (2003). A global monitoring process for securing e-government, 5th Jordanian Int. Electrical and Electronics Engineering Conf. (JIEEEC'03), Jordan, October 12–16, 2003.Google Scholar
Kohno, T., Stubblefield, A., Rubin, A. D., and Wallach, D. S. (2003). Analysis of an Electronic Voting System. Johns Hopkins Information Security Institute Technical Report TR-2003-19 (http://avirubin.com/vote).Google Scholar
Lanwin, B. (2002). A Project of Info Dev and The Center for Democracy and Technology: The E-Government Handbook for Developing Countries. http://www.cdf.org/egov/handbook/2002-11-14egovhandbook.pdf.
Nicopolitidis, P., Obaidat, M. S., Papadimetriou, G. P., and Pomportsis, A. S. (2003). Wireless Networks. Wiley.Google Scholar
Novak, K. (2002). Digital Signature and Encryption Technology: What it Means to Local Governments and Citizens, the Public Entity Risk Institute's Internet Symposium: Safe and Secure – Cyber security and Local Government, http://www.riskinstitute.org.
Obaidat, M. S., G. I. Papadimitviou, and S. Obeidat (2006). Wireless local area networks. In Handbook of Information Security. Bidgoli, H. (ed.), Vol. 1, pp. 617–36, Wiley.
Pràca, D. (2002). Electronic Voting Schemes. Dept. of Computer Science, Faculty of Mathematics, Physics and Informatics, Comenius University, Bratislava, Zuzana Rjašková;, (http://www.brics.dk/⋧jg/).Google Scholar
Pacific Privacy Consulting and Xamax Consultancy (2003). Authentication for e-government: privacy impact assessment report (available at http://www.e.govt.nz/services/authentication/authent-pia-200312/authent-pia-200312.pdf).
A., Rubin (2001). Security Considerations for Remote Electronic Voting over the Internet, http://avirubin.com/.Google Scholar
Sadeh, N. (2002). M-Commerce: Technologies, Services and Business Models. Wiley.Google Scholar
US government, (2002). E-government Act 2002, Public Law 107–347-Dec 17, 2002 (available at http://www.cdt.porg/legislation/107th/e-gov/).
Wimmer, M. and Bredow, B. (2002). A holistic approach for providing security solutions in e-government, Proceedings of the 35th Hawaii International Conference on System Sciences, 2002.CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • E-government security
  • Mohammad Obaidat, Monmouth University, New Jersey, Noureddine Boudriga, Université du 7 Novembre à Carthage, Tunis
  • Book: Security of e-Systems and Computer Networks
  • Online publication: 11 September 2009
  • Chapter DOI: https://doi.org/10.1017/CBO9780511536700.012
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • E-government security
  • Mohammad Obaidat, Monmouth University, New Jersey, Noureddine Boudriga, Université du 7 Novembre à Carthage, Tunis
  • Book: Security of e-Systems and Computer Networks
  • Online publication: 11 September 2009
  • Chapter DOI: https://doi.org/10.1017/CBO9780511536700.012
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • E-government security
  • Mohammad Obaidat, Monmouth University, New Jersey, Noureddine Boudriga, Université du 7 Novembre à Carthage, Tunis
  • Book: Security of e-Systems and Computer Networks
  • Online publication: 11 September 2009
  • Chapter DOI: https://doi.org/10.1017/CBO9780511536700.012
Available formats
×