CINXE.COM
{"title":"E-government Security Modeling: Explaining Main Factors and Analysing Existing Models","authors":"N. Alharbi","volume":81,"journal":"International Journal of Humanities and Social Sciences","pagesStart":2585,"pagesEnd":2588,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/16722","abstract":"<p>E-government is becoming more important these days. However, the adoption of e-government is often slowed down by technical and non-technical security factors. Nowadays, there many security models that can make the e-government services more secure. This paper will explain the main security factors that affected the level of e-government security. Moreover, it will also analyse current existing models. Finally, the paper will suggest a comprehensive security model that will contain most of technical and non-technical factors.<\/p>\r\n","references":"[1]\tG.Yanqing, \"E-Government: Definition, Goals, Benefits and Risks\", 2010 International Conference onManagement and Service Science (MASS), Vol. 1, No. 4,2011, pp24-26.\r\n[2]\tS. Alateyah,R.M.Crowder, and G. Wills, \"Towards an integrated model for citizen adoption of E-government services\", International Journal of Information Technology & Computer Science, Vol. 6, 2012, pp47-57.\r\n[3]\tF. Musau, W. Cheruiyot, and J.C. Mushi, \"Trust and Its Challenges Facing E-Government Programs in Kenya\", 2011 International Conference onComputer and Management (CAMAN),2011, pp1-4.\r\n[4]\tM. AlNuaimi, K. Shaalan, M. Alnuaimi, and K. Alnuaimi, \"Barriers to electronic government citizens' adoption: A case of municipal sector in the emirate of Abu Dhabi\" Developments in E-systems Engineering (DeSE),2011, pp.398-403.\r\n[5]\tS. Shareef, \"Electronic government adoption based on citizen-centric approach in regional government in developing countries: the case of Kurdistan Region of Iraq (KRI)\", PhD thesis, University of East London, 2012.\r\n[6]\tM. Rehman, and V. Esichaikul, \"Factors influencing the adoption of e-government in Pakistan,\" 2011 International Conference on E-Business and E-Government (WEE), 2011, pp1-4.\r\n[7]\tG.Karokola, S. Kowalski, and L. Yngstrom, \"Evaluating a Framework for Securing E-Government Services - A Case of Tanzania\", 2013 46th Hawaii International Conference on System Sciences, 2013, pp1792- 1801.\r\n[8]\tJ. S. Park,andM.Pokharel, \"Issues of Interoperability in E-Govemance System and its impact in the Developing Countries\u2751: A Nepalese Case Study,\" ICACT 2009 Advanced Communication Technology, Vol. 3, 2009, pp2160-2164.\r\n[9]\tJE. Lee, JO. Lee, And S. Sang, \"E-Government Challenges in Least Developed Countries ( LDCs ): A Case of Cambodia,\" ICACT 2009 Advanced Communication Technology, Vol. 3,2009, PP2169-2175.\r\n[10]\tA. M. Odat, \"E-Government in developing countries: Framework of challenges and opportunities\", 2012 International Conference for Internet Technology and Secured Transactions, 2012, pp578-582.\r\n \r\n[11]\tZ. Ismail,andM.Shajari, \"A Comprehensive Adoption Model of e-Government Services in Developing Countries\", 2010 IEEE International Conference on Advanced Management Science (laws), Vol. 2, 2010, pp548-553.\r\n[12]\tJ. Jing, and S. Meihui, \"Analysis of Security Models Based on Multilevel Security Policy\", 2012 International Conference on Management of e-Commerce and e-Government, 2012, pp. 95-97.\r\n[13]\tS. Al-Azazi, \"A Multi-layer Model for e-government Information Security Assessment\", PhD thesis, Cranfield University,2008.\r\n[14]\tF. Al-sobhi, \"The Roles of Intermediaries in the Adoption of E-Government Services in Saudi Arabia\", PhD thesis, Brunel University, 2011.\r\n[15]\tS. J. Alotaibi, and M. Walad, \"Towards a UTAUT-Based Model for Studying the Integrating Physical and Virtual Identity Access Management Systems in E-Government Domain\", 2012 International Conference For Technology And Secured Transactions.2012, pp453- 458.\r\n[16]\tG. Johanson, and J. Styen, \"ICTs and Sustainable Solutions for the Digital Divide: Theory and Perspectives\", IGI Global, ISBN 978-1\u00ac61520-800-5, 2011.\r\n[17]\tB. Davis, D. Davis, G. Morries, and V. Venkatesh, \"User acceptance of information technology: toward a unified view\", MIS Quarterly. 2003, Vol. 27, No. 3, pp425-478.\r\n","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 81, 2013"}