How to Design the E-government Information Security Legislation

被引:0
|
作者
Liu Bangfan [1 ]
Tao Tao [2 ]
Zhang Bei [1 ]
机构
[1] Yanshan Univ, Humanities Law Coll, Qinhuangdao 066004, Peoples R China
[2] Qinhuangdao Vocat & Tech Coll, Qinhuangdao 066004, Peoples R China
关键词
Information Security; Legislation; E-government;
D O I
10.4028/www.scientific.net/AMM.556-562.5367
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the further development of e-government construction and application, it becomes more and more urgent to strengthen the information security of e-government legislation. Information security is the guarantee of e-government construction and operation. In our country the information security problem needs the guarantee of laws and regulations urgently. It is important to legislate as soon as possible. Establishing and improving relevant legal system can promote the e-government construction and application effectively and quickly in our country. In order to ensure the information security of e-government in the construction and improvement of relevant legislation process, we should pay attention to the following: join the international information security law system positively, build the legal basis for e-government information security actively and promote the execution efficiency of e-government information security laws and regulations.
引用
收藏
页码:5367 / +
页数:2
相关论文
共 50 条
  • [1] ON HOW TO STRENGTHEN THE INFORMATION SECURITY OF E-GOVERNMENT
    Liu Wei
    Hu Changlong
    [J]. FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 341 - 345
  • [2] Design of E-Government Security System based on Information Security Model
    Zhang, X. F.
    [J]. 2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 875 - 878
  • [3] Design of E-Government Security System based on Information Security Model
    Wang, JiaJu
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL II, 2008, : 359 - 362
  • [4] Information security evaluation of e-government systems
    Cheng, Xiaorong
    Li, Mei
    Zhao, Huilan
    [J]. DCABES 2007 Proceedings, Vols I and II, 2007, : 532 - 535
  • [5] Information Security in E-Government: Legal Aspects
    Politanskyi, Viacheslav
    Lukianov, Dmytro
    Ponomarova, Hanna
    Gyliaka, Oleh
    [J]. CUESTIONES POLITICAS, 2021, 39 (69): : 361 - 372
  • [6] RESEARCH ON E-GOVERNMENT INFORMATION SECURITY PROBLEMS AND COUNTERMEASURES
    He Huanhuan
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 1413 - 1419
  • [7] Data Mining Applications in E-Government Information Security
    Yuan, Tongwei
    Chen, Peng
    [J]. 2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 235 - 240
  • [8] E-Government Information Security Risk Assessment Research
    Lei Ping
    Lei Zhanbo
    [J]. 2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 1, 2010, : 1 - 4
  • [9] The Human Factor: How Can Information Security Awareness Be Sustainably Achieved in E-Government?
    Scholl, Margit
    Fuhrmann, Frauke
    Pokoyski, Dietmar
    [J]. ELECTRONIC GOVERNMENT AND ELECTRONIC PARTICIPATION, 2016, 23 : 403 - 404
  • [10] How to Design the E-government secure cloud
    Xu Shui
    Liu Bangfan
    Liang Kaiyu
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6215 - 6218