Skip to main content

Abstract

E-government is a complex phenomenon that involves e-data and e-exchange. The security of e-government functions is one of the fundamental priorities of a country or region, and the highest importance is given to securing e-government sites because they contain sensitive, private, and confidential information. This paper provides a general overview of the most critical aspects of e-government security. It defines the term “e-government” from various perspectives and discusses the most important issues affecting security. We begin by defining the concept and goals of e-government security and review the literature on e-government security. We then present the issues that affect e-government security and the security requirements needed to counter these issues. The presentation includes a literature review that discusses the risks identified by global research and shows how modern technology has been used to increase security. Finally, we identify the main challenges threatening e-government security today and summarize the discussion of the most important axes in the security of electronic government transactions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cahlikova T (2021) Defining e-government. In: The introduction of e-government in Switzerland. Palgrave Macmillan, Cham, pp 19–43

    Google Scholar 

  2. Egovernment development index. https://publicadministration.un.org/egovkb/en-us/data-center. Accessed Dec 2022

  3. Yang L, Elisa N, Eliot N (2019) Privacy and security aspects of e-government in smart cities. In: Smart cities cybersecurity and privacy. Elsevier, pp 89–102

    Google Scholar 

  4. Lambrinoudakis C, Gritzalis S, Dridi F, Pernul G (2003) Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Comput Commun 26(16):1873–1883

    Article  Google Scholar 

  5. Biswas K, Muthukkumarasamy V (2016) Securing smart cities using blockchain technology. In: High performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on. IEEE, pp 1392–1393

    Google Scholar 

  6. Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292–2303

    Article  Google Scholar 

  7. Li J, Yang L, Fu X, Chao F, Qu Y (2017) Dynamic QoS solution for enterprise networks using tsk fuzzy interpolation. In: 2017 IEEE international conference on fuzzy systems (FUZZ-IEEE), pp 1–6

    Google Scholar 

  8. Alotaibi Y (2020) A new secured e-government efficiency model for sustainable services provision. J Inf Secur Cybercrimes Res 3(1):75–96

    Article  Google Scholar 

  9. Amend J, Kaiser J, Uhlig L, Urbach N, Völter F (2021) What do we really need? A systematic literature review of the requirements for blockchain-based e-government services. Lecture notes in information systems and organisation, pp 398–412

    Google Scholar 

  10. Oliveira TA, Oliver M, Ramalhinho H (2020) Challenges for connecting citizens and smart cities: ICT, e-governance and blockchain. Sustainability 12(7):2926

    Google Scholar 

  11. United Nations E-government Survey. E-government knowledge base, un.org. Available: https://publicadministration.un.org/egovkb/en-us/Overview. Accessed 9 Sept 2022

  12. Wescott CG (2007) E-government and the applications of technology to government services. Globalization in transition: forces of adjustment in the Asia Pacific Region. Available: http://www.adb.org/Documents/Papers/E-Government/egov-techgov. Accessed 9 Sept 2022

  13. Hwang MS, Li CT, Shen JJ, Chu YP (2004) Challenges in e-government and security of information. Inf Secur 15(1):9–20

    Google Scholar 

  14. Hassan RG, Khalifa OO (2016) E-government—an information security perspective. Int J Comput Trends Technol (IJCTT) 36(1):1–9

    Article  Google Scholar 

  15. Schneider RM (2010) A comparison of information security risk analysis in the context of e-government to criminological threat assessment techniques. In: 2010 Information security curriculum development conference 2010 Oct 1, pp 107–116

    Google Scholar 

  16. Mitrokotsa A, Douligeris C (2007) E-government and denial of service attacks. In: Secure E-government web services. IGI Global, pp 124–142

    Google Scholar 

  17. Stefanovic D, Marjanovic U, Delić M, Culibrk D, Lalic B (2016) Assessing the success of e-government systems: an employee perspective. Inf Manage 53(6):717–726

    Article  Google Scholar 

  18. Sukmana M, Meinel C (2016) E-government and security evaluation tools comparison for Indonesian e-government system. In: Proceedings of the 4th international conference on information and network security, pp 96–103

    Google Scholar 

  19. Sarantis D (2019) Analysing e-government research: current areas and dimensions. In: 18th international conference on WWW/internet. International Association for the Development of the Information Society (IADIS), Cagliari, pp 7–9

    Google Scholar 

  20. Eurostat. E-government—more citizens consult information online. Available: https://ec.europa.eu/eurostat/web/products-eurostat-news/-/EDN-20200307-1. Accessed 7 March 2020

  21. Bojang MB (2019) Challenges and successes of e-government development in developing countries: a theoretical review of the literature. Int J Res Innov Soc Sci 3(4)

    Google Scholar 

  22. Distel B, Koelmann H, Plattfaut R, Becker J (2020) Watch who you trust! A structured literature review to build a typology of e-government risks. In: Information systems and e-business management, pp 1–30

    Google Scholar 

  23. Yang L, Li J, Fehringer G, Barraclough P, Sexton G, Cao Y (2017) Intrusion detection system by fuzzy interpolation. In: 2017 IEEE international conference on fuzzy systems (FUZZ-IEEE), pp 1–6

    Google Scholar 

  24. Al Rousan M, Intrigila B (2020) A comparative analysis of biometrics types: literature review

    Google Scholar 

  25. Alotaibi SS (2018) Registration center based user authentication scheme for smart e-governance applications in smart cities. IEEE Access 7:5819–5833

    Article  Google Scholar 

  26. Al Mudawi N, Beloff N, White M (2020) Issues and challenges: cloud computing e-government in developing countries. Int J Adv Comput Sci Appl 11(4):7–11

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ebtesam Jaber Aljohani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aljohani, E.J., Almukhalfi, H.M., Alhazmi, O.H. (2023). A Brief Overview of E-Government Security. In: Kumar, S., Hiranwal, S., Purohit, S., Prasad, M. (eds) Proceedings of International Conference on Communication and Computational Technologies. ICCCT 2023. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-99-3485-0_2

Download citation

Publish with us

Policies and ethics