Research on Information Security of E-government System Under Internet of Things

被引:0
|
作者
Zhu Jingfeng [1 ]
机构
[1] Guangxi Econ Management Cadre Coll, Nanning, Peoples R China
关键词
Internet of Things; E-government; system security; information security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper analyzes the information security of E-government system under Internet of Things (IOT), and builds the E-government system information security system on the three aspects of information system security, information transmission network security and information security management. It provides an information security assessment model of E-government system based on triangular fuzzy AHP, according to the relative importance of each factor impacting E-government system information security, the fuzzy judgment matrix is achieved, and based on the calculated result of the judgment matrix, synthetic assessment is carried out for E-government system information security, which provides theoretic supports for implementation of E-government system information security assessment under IOT.
引用
收藏
页码:439 / 442
页数:4
相关论文
共 50 条
  • [31] Government Information System Audit Should Focus on E-government
    Che, Gang
    Bao, Hailiang
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL SEMINAR ON EDUCATION RESEARCH AND SOCIAL SCIENCE (ISERSS 2019), 2019, 322 : 543 - 546
  • [32] A SUSTAINABLE INFORMATION SECURITY FRAMEWORK FOR E-GOVERNMENT - CASE OF TANZANIA
    Wangwe, Carina Kabajunga
    Eloff, Maria Margaretha
    Venter, Lucas
    [J]. TECHNOLOGICAL AND ECONOMIC DEVELOPMENT OF ECONOMY, 2012, 18 (01) : 117 - 131
  • [33] An Information Security Model for E-government Services Adoption in Uganda
    Khanyako, Eseri
    Maiga, Gilbert
    [J]. 2013 IST-AFRICA CONFERENCE AND EXHIBITION (IST-AFRICA), 2013,
  • [34] Construction of communication network pattern and information security in e-government
    Li, XM
    Cai, YJ
    Li, JH
    [J]. Proceedings of 2005 International Conference on Public Administration, 2005, : 703 - 711
  • [35] Study on the Impact of Security Countermeasures on E-Government Information Misuse
    Fan, Jing
    Zhang, Pengzhu
    Zhao, Xinjie
    [J]. EIGHTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2009, : 450 - 456
  • [36] Information Security Risks in Enabling e-Government: The Impact of IT Vendors
    Berghmans, Peter
    Van Roy, Karel
    [J]. INFORMATION SYSTEMS MANAGEMENT, 2011, 28 (04) : 284 - 293
  • [37] Discussions of E-government Affairs Information Security of Based on Cloud
    Zhang, Haicheng
    Zhao, Ting
    Liang, Jun
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON ECONOMIC, BUSINESS MANAGEMENT AND EDUCATIONAL INNOVATION (EBMEI 2016), PT 3, 2016, 56 : 391 - 394
  • [38] Theorizing Information Security Success: Towards Secure E-Government
    Dukerley, Kimberley
    Tejay, Gurvirender
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC GOVERNMENT RESEARCH, 2010, 6 (03) : 31 - 41
  • [39] Research on the Forecast Model of Security Situation for Information System Based on Internet of Things
    Hao, Taiyan
    Jia, Yifan
    Tian, Xi
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2013,
  • [40] Research On E-Government system based on Multi-source Information Fusion
    Wang, Ying
    Sun, Jieli
    Lin, Tianhua
    [J]. SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2345 - 2348