Abstract
The Internet as a primary means of the implementation of e-Government is an insecure channel and can provide a loophole, which allows the emergence of various types of threat and vulnerability. This becomes an obstacle in the efforts to increase the participation of the community and gives impacts in decreasing the trust in the system. Therefore, a strategy that involves technological as well as conceptual aspects needs to be carried to realize a secure and trusted environment on e-government. This paper gives an overview of the strategy based on security and trust in one comprehensive solution that can be applied to achieve the goal through the integration of five components, namely: security and standard, security policy, trusted computing, defense-in-depth strategy and human factor. Through this paper then all parties involved in e-government may reconsider a strategy that has been set up to give attention to the issue of secure and trust in the implementation of e-government system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alshehri, M., Drew, S.: E-Government fundamentals. In: International Conference ICT, Society and Human Beings (IADIS), 2010, no. 2001, pp. 35–42
Hadi, F., Bin Muhaya, F.T.: Essentials for the E-Govemment security. In: International Conference on Information Society (i-Society), 2011, pp. 237–240
Moen, V., Klingsheim, N., Inge, K., Simonsen, F., Hole, K.J.: Vulnerabilities in E-Government web portals. Int. J. Electron. Secur. Digit. Forensics 1(1), 89–100 (2007)
Setiawan, A.B.: Implementasi Tata Kelola Keamanan Informasi Nasional Dalam Kerangka e-Government, Jakarta, 2011
Hassan, S., Aziz, Z., Nisar, K.: On the cache performance of the information centric network. In: Proceedings of 2013 International Conference on Computing, Electrical and Electronics Engineering. Research Makes a Differ. ICCEEE 2013, pp. 477–481 (2013)
Security Document World.: The Role of Trusted Digital Identity in Enabling the eGovernment 2020 Vision, 2014
Alsaghier, H., Ford, M.: Conceptualising citizen’s trust in e-Government: application of Q methodology. Electron. J. e-Government 7(4), 295–310 (2009)
Paladi, N.: Trusted Computing and Secure Virtualization in Cloud Computing. Lulea University of Technology, Lulea (2012)
Ideler, H.A.W.: Cryptography as a Service in a Cloud Computing Environment. Eindhoven University of Technology, Eindhoven (2012)
Colesca, S.E.: Understanding trust in e-Government. Inz. Ekon. Econ. 3, 7–15 (2009)
Priyambodo, T.K., Prayudi, Y.: Information security strategy on mobile device based eGovernment. ARPN J. Eng. Appl. Sci. 10(2), 652–660 (2015)
Karokola, G.R.: A framework for securing e-Government services the case of Tanzania. Stockholm University, Sweden (2012)
Teo, T.S.H., Srivastava, S.C., Jiang, L.: Trust and electronic government success: An empirical study. J. Manag. Inf. Syst. 25(3), 99–131 (2009)
Santos, N.M.C.: Improving Trust in Cloud, Enterprise, and Mobile Computing Platforms. Universitat de Saarlandes, Saarbrücken (2013)
Burmester, M., Mulholland, J.: The advent of trusted computing : implications for digital forensics. In: SAC, 2006, pp. 23–27
Singh, S., Karaulia, D.S.: E-Governance : information security issues. In: International Conference on Computer Science and Information Technology (ICCSIT), 2011, pp. 120–124
Wada, K., King, P.: IT policy: an essential element of IT infrastructure. Educause Review, no. June, pp. 14–15, Jul-2001
Gikas, C.: Information Systems Security : A General Comparison of FISMA, HIPAA, ISO 27000, 2010
Taylor, C., Endicott-Popovsky, B., Frincke, D.A.: Specifying digital forensics: a forensics policy approach. Digit. Investig. 4, 101–104 (2007)
Sandhu, R.: Security Models : Past, Present and Future. Institute for Cyber Security, UTSA USA, San Antonio, TX, USA, pp. 1–28 (2010)
Amin, M., Khan, S., Ali, T., Gul, S.: Trends and directions in trusted computing : Models, architectures and technologies. In: International Multiconference Of Engineers and Computer Scientist, 2008, vol. I, pp. 19–21
Mohaideen, Z., Mubarak, M.F., Ahmad, Z.: Advisory Paper for Trusted Computing Technology, 2013
Nikolakopoulos, T.: Evaluating the Human Factor in Information Security. University of Oslo, Oslo (2009)
Soltanmohammadi, S., Asadi, S., Ithnin, N.: Main human factors affecting information system security. Int. J. Contemp. Res. Bus. 5(7), 329–354 (2013)
Gonzalez, J.J., Sawicka, A.: A framework for human factors in information security. In: WSEAS International Conference on Information Security, Hardware/Software Codesign, E-Commerce and Computer Networks, 2002, pp. 1871–1877
Parsons, K., Mccormac, A., Butavicius, M., Ferguson, L.: Human Factors and Information Security : Individual, Culture and Security Environment, Edinburgh, 2010
Dlamini, I.Z., Ngobeni, S.J., Mutanga, M.B.: South African EGov: Secure E-Service. In: eChalange e-2010 Conference, 2010
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Priyambodo, T.K., Prayudi, Y. (2016). A Proposed Strategy for Secure and Trusted Environment in e-Government. In: Sulaiman, H., Othman, M., Othman, M., Rahim, Y., Pee, N. (eds) Advanced Computer and Communication Engineering Technology. Lecture Notes in Electrical Engineering, vol 362. Springer, Cham. https://doi.org/10.1007/978-3-319-24584-3_38
Download citation
DOI: https://doi.org/10.1007/978-3-319-24584-3_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24582-9
Online ISBN: 978-3-319-24584-3
eBook Packages: EngineeringEngineering (R0)