Data Mining Applications in E-Government Information Security

被引:8
|
作者
Yuan, Tongwei [1 ]
Chen, Peng [1 ]
机构
[1] Chinese Acad Sci, Software Engn Ctr, Beijing 100190, Peoples R China
关键词
Data mining; E-government; information security;
D O I
10.1016/j.proeng.2011.12.700
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
This paper proposes a current more mature Association Analysis Model after it gives an overview of data mining method, and conducts a formal description. Various industries in the current increasing emphasis on information security, we give an Information Security Risk Assessment for a large-scale e-government by using Association Analysis Model. This method provides valuable reference data for enterprise information security assessment and decision analysis. (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of Harbin University of Science and Technology.
引用
收藏
页码:235 / 240
页数:6
相关论文
共 50 条
  • [1] E-government and network information security
    Center of Network, Hubei Administrative College, Wuhan 430022, China
    [J]. Zhongshan Daxue Xuebao, 2006, SUPPL. (156-159):
  • [2] Research on personalized information service based on data mining in e-government
    Chen, FJ
    Yang, SL
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING, VOLS 1 AND 2, 2004, : 441 - 444
  • [3] Information security evaluation of e-government systems
    Cheng, Xiaorong
    Li, Mei
    Zhao, Huilan
    [J]. DCABES 2007 Proceedings, Vols I and II, 2007, : 532 - 535
  • [4] Information Security in E-Government: Legal Aspects
    Politanskyi, Viacheslav
    Lukianov, Dmytro
    Ponomarova, Hanna
    Gyliaka, Oleh
    [J]. CUESTIONES POLITICAS, 2021, 39 (69): : 361 - 372
  • [5] ON HOW TO STRENGTHEN THE INFORMATION SECURITY OF E-GOVERNMENT
    Liu Wei
    Hu Changlong
    [J]. FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 341 - 345
  • [6] Research on Application of Data Mining in E-government
    Zhong Yi
    Chen Hua-an
    [J]. PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (6TH), VOL III, 2010, : 393 - 397
  • [7] How to Design the E-government Information Security Legislation
    Liu Bangfan
    Tao Tao
    Zhang Bei
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5367 - +
  • [8] RESEARCH ON E-GOVERNMENT INFORMATION SECURITY PROBLEMS AND COUNTERMEASURES
    He Huanhuan
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 1413 - 1419
  • [9] E-Government Information Security Risk Assessment Research
    Lei Ping
    Lei Zhanbo
    [J]. 2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 1, 2010, : 1 - 4
  • [10] Design of E-Government Security System based on Information Security Model
    Zhang, X. F.
    [J]. 2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 875 - 878