How to Design the E-government Information Security Legislation

被引:0
|
作者
Liu Bangfan [1 ]
Tao Tao [2 ]
Zhang Bei [1 ]
机构
[1] Yanshan Univ, Humanities Law Coll, Qinhuangdao 066004, Peoples R China
[2] Qinhuangdao Vocat & Tech Coll, Qinhuangdao 066004, Peoples R China
关键词
Information Security; Legislation; E-government;
D O I
10.4028/www.scientific.net/AMM.556-562.5367
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the further development of e-government construction and application, it becomes more and more urgent to strengthen the information security of e-government legislation. Information security is the guarantee of e-government construction and operation. In our country the information security problem needs the guarantee of laws and regulations urgently. It is important to legislate as soon as possible. Establishing and improving relevant legal system can promote the e-government construction and application effectively and quickly in our country. In order to ensure the information security of e-government in the construction and improvement of relevant legislation process, we should pay attention to the following: join the international information security law system positively, build the legal basis for e-government information security actively and promote the execution efficiency of e-government information security laws and regulations.
引用
收藏
页码:5367 / +
页数:2
相关论文
共 50 条
  • [41] An Information Security Framework for Ubiquitous Services in e-Government Structures: A Peruvian Local Government Experience
    Tupia, Manuel
    Bruzza, Mariuxi
    Rodriguez, Flavio
    [J]. PROCEEDINGS OF THE 2016 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2016, 8 : 1309 - 1316
  • [42] An Application of Extreme Value Theory to E-Government Information Security Risk Assessment
    Imamverdiyev, Yadigar
    [J]. 2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2013, : 349 - 352
  • [43] E-Government Web services and Security of Personally Identifiable Information in Developing Nations
    Adedayo, Love
    Butakov, Sergey
    Ruhl, Ron
    Lindskog, Dale
    [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 623 - 629
  • [44] The information ecology of E-government: E-government as institutional and technological innovation in public administration
    Snijkers, K
    [J]. INFORMATION SOCIETY, 2006, 22 (03): : 187 - 188
  • [45] Readability of Spanish e-government information
    Campillo, Adrian
    Morato, Jorge
    Iglesias Maqueda, Ana
    Sanchez-Cuadrado, Sonia
    [J]. 2020 15TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2020), 2020,
  • [46] How Piracy Affects the e-Government?
    Saleemi, Maria
    Nasir, Saeed
    Farooq, M. Kashif
    [J]. WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 600 - +
  • [47] Information communication mechanism in e-government
    Cai, YJ
    [J]. Proceedings of 2005 International Conference on Public Administration, 2005, : 731 - 737
  • [48] E-Government: Information, Technology, and Transformation
    Rabina, Debbie L.
    [J]. GOVERNMENT INFORMATION QUARTERLY, 2012, 29 (01) : 110 - 111
  • [49] A Study on E-Government Information Sharing
    Yan, Zhijun
    Sun, Baowen
    Wang, Tianmei
    [J]. ADVANCES IN GREY SYSTEMS RESEARCH, 2010, : 571 - +
  • [50] Information Security as a Pre-requisite for e-Government Services - Developing the Organizations and the Information Systems
    Pilemalm, Sofie
    Lundholm, Kristoffer
    Hallberg, Jonas
    Yngstrom, Louise
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON E-GOVERNMENT, 2010, : 82 - 90