Skip to main content

A Proposed Strategy for Secure and Trusted Environment in e-Government

  • Conference paper
  • First Online:
Advanced Computer and Communication Engineering Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 362))

Abstract

The Internet as a primary means of the implementation of e-Government is an insecure channel and can provide a loophole, which allows the emergence of various types of threat and vulnerability. This becomes an obstacle in the efforts to increase the participation of the community and gives impacts in decreasing the trust in the system. Therefore, a strategy that involves technological as well as conceptual aspects needs to be carried to realize a secure and trusted environment on e-government. This paper gives an overview of the strategy based on security and trust in one comprehensive solution that can be applied to achieve the goal through the integration of five components, namely: security and standard, security policy, trusted computing, defense-in-depth strategy and human factor. Through this paper then all parties involved in e-government may reconsider a strategy that has been set up to give attention to the issue of secure and trust in the implementation of e-government system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alshehri, M., Drew, S.: E-Government fundamentals. In: International Conference ICT, Society and Human Beings (IADIS), 2010, no. 2001, pp. 35–42

    Google Scholar 

  2. Hadi, F., Bin Muhaya, F.T.: Essentials for the E-Govemment security. In: International Conference on Information Society (i-Society), 2011, pp. 237–240

    Google Scholar 

  3. Moen, V., Klingsheim, N., Inge, K., Simonsen, F., Hole, K.J.: Vulnerabilities in E-Government web portals. Int. J. Electron. Secur. Digit. Forensics 1(1), 89–100 (2007)

    Article  Google Scholar 

  4. Setiawan, A.B.: Implementasi Tata Kelola Keamanan Informasi Nasional Dalam Kerangka e-Government, Jakarta, 2011

    Google Scholar 

  5. Hassan, S., Aziz, Z., Nisar, K.: On the cache performance of the information centric network. In: Proceedings of 2013 International Conference on Computing, Electrical and Electronics Engineering. Research Makes a Differ. ICCEEE 2013, pp. 477–481 (2013)

    Google Scholar 

  6. Security Document World.: The Role of Trusted Digital Identity in Enabling the eGovernment 2020 Vision, 2014

    Google Scholar 

  7. Alsaghier, H., Ford, M.: Conceptualising citizen’s trust in e-Government: application of Q methodology. Electron. J. e-Government 7(4), 295–310 (2009)

    Google Scholar 

  8. Paladi, N.: Trusted Computing and Secure Virtualization in Cloud Computing. Lulea University of Technology, Lulea (2012)

    Google Scholar 

  9. Ideler, H.A.W.: Cryptography as a Service in a Cloud Computing Environment. Eindhoven University of Technology, Eindhoven (2012)

    Google Scholar 

  10. Colesca, S.E.: Understanding trust in e-Government. Inz. Ekon. Econ. 3, 7–15 (2009)

    Google Scholar 

  11. Priyambodo, T.K., Prayudi, Y.: Information security strategy on mobile device based eGovernment. ARPN J. Eng. Appl. Sci. 10(2), 652–660 (2015)

    Google Scholar 

  12. Karokola, G.R.: A framework for securing e-Government services the case of Tanzania. Stockholm University, Sweden (2012)

    Google Scholar 

  13. Teo, T.S.H., Srivastava, S.C., Jiang, L.: Trust and electronic government success: An empirical study. J. Manag. Inf. Syst. 25(3), 99–131 (2009)

    Article  Google Scholar 

  14. Santos, N.M.C.: Improving Trust in Cloud, Enterprise, and Mobile Computing Platforms. Universitat de Saarlandes, Saarbrücken (2013)

    Google Scholar 

  15. Burmester, M., Mulholland, J.: The advent of trusted computing : implications for digital forensics. In: SAC, 2006, pp. 23–27

    Google Scholar 

  16. Singh, S., Karaulia, D.S.: E-Governance : information security issues. In: International Conference on Computer Science and Information Technology (ICCSIT), 2011, pp. 120–124

    Google Scholar 

  17. Wada, K., King, P.: IT policy: an essential element of IT infrastructure. Educause Review, no. June, pp. 14–15, Jul-2001

    Google Scholar 

  18. Gikas, C.: Information Systems Security : A General Comparison of FISMA, HIPAA, ISO 27000, 2010

    Google Scholar 

  19. Taylor, C., Endicott-Popovsky, B., Frincke, D.A.: Specifying digital forensics: a forensics policy approach. Digit. Investig. 4, 101–104 (2007)

    Google Scholar 

  20. Sandhu, R.: Security Models : Past, Present and Future. Institute for Cyber Security, UTSA USA, San Antonio, TX, USA, pp. 1–28 (2010)

    Google Scholar 

  21. Amin, M., Khan, S., Ali, T., Gul, S.: Trends and directions in trusted computing : Models, architectures and technologies. In: International Multiconference Of Engineers and Computer Scientist, 2008, vol. I, pp. 19–21

    Google Scholar 

  22. Mohaideen, Z., Mubarak, M.F., Ahmad, Z.: Advisory Paper for Trusted Computing Technology, 2013

    Google Scholar 

  23. Nikolakopoulos, T.: Evaluating the Human Factor in Information Security. University of Oslo, Oslo (2009)

    Google Scholar 

  24. Soltanmohammadi, S., Asadi, S., Ithnin, N.: Main human factors affecting information system security. Int. J. Contemp. Res. Bus. 5(7), 329–354 (2013)

    Google Scholar 

  25. Gonzalez, J.J., Sawicka, A.: A framework for human factors in information security. In: WSEAS International Conference on Information Security, Hardware/Software Codesign, E-Commerce and Computer Networks, 2002, pp. 1871–1877

    Google Scholar 

  26. Parsons, K., Mccormac, A., Butavicius, M., Ferguson, L.: Human Factors and Information Security : Individual, Culture and Security Environment, Edinburgh, 2010

    Google Scholar 

  27. Dlamini, I.Z., Ngobeni, S.J., Mutanga, M.B.: South African EGov: Secure E-Service. In: eChalange e-2010 Conference, 2010

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tri Kuntoro Priyambodo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Priyambodo, T.K., Prayudi, Y. (2016). A Proposed Strategy for Secure and Trusted Environment in e-Government. In: Sulaiman, H., Othman, M., Othman, M., Rahim, Y., Pee, N. (eds) Advanced Computer and Communication Engineering Technology. Lecture Notes in Electrical Engineering, vol 362. Springer, Cham. https://doi.org/10.1007/978-3-319-24584-3_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24584-3_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24582-9

  • Online ISBN: 978-3-319-24584-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics