Access Requirement Analysis of E-Governance Systems

被引:0
|
作者
Kim, Tai-hoon [1 ]
机构
[1] Hannam Univ, Multimedia Engn Dept, Taejon, South Korea
关键词
G2C; Broadcasting model; Critical flow model; Comparative analysis model; E-advocacy model; Interactive model;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.
引用
收藏
页码:124 / 130
页数:7
相关论文
共 50 条
  • [1] Access Requirement Analysis of E-Governance Systems
    Kim, Tai-hoon
    NEW ASPECTS OF APPLIED INFORMATICS, BIOMEDICAL ELECTRONICS AND INFORMATICS AND COMMUNICATION, 2010, : 54 - +
  • [2] Model Based User's Access Requirement Analysis of E-Governance Systems
    Saha, Shilpi
    Jeon, Seung-Hwan
    Robles, Rosslin John
    Kim, Tai-hoon
    Bandyopadhyay, Samir Kumar
    SECURITY-ENRICHED URBAN COMPUTING AND SMART GRID, 2010, 78 : 466 - +
  • [3] A Comparative Analysis of E-Governance and IT Governance
    Nehemia, Monica
    Iyamu, Tiko
    Shaanika, Irja
    2019 OPEN INNOVATIONS CONFERENCE (OI), 2019, : 288 - 296
  • [4] Model based threat and vulnerability analysis of E-governance systems
    Saha, Shilpi
    Bhattacharyya, Debnath
    Kim, Tai-Hoon
    Bandyopadhyay, Samir Kumar
    International Journal of u- and e- Service, Science and Technology, 2010, 3 (02) : 7 - 22
  • [5] E-governance success factors An analysis of e-governance initiatives of ten major states of India
    Kalsi, Nirmaljeet
    Kiran, Ravi
    INTERNATIONAL JOURNAL OF PUBLIC SECTOR MANAGEMENT, 2013, 26 (04) : 320 - +
  • [6] E-governance justified
    Agangiba, William Akotam
    Agangiba, Millicent Akotam
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (02) : 223 - 225
  • [7] Redefining governance: a critical analysis of sustainability transformation in e-governance
    Abbas, Qaiser
    Alyas, Tahir
    Alghamdi, Turki
    Alkhodre, Ahmad B.
    Albouq, Sami
    Niazi, Mushtaq
    Tabassum, Nadia
    FRONTIERS IN BIG DATA, 2024, 7
  • [8] e-Governance and standardization
    Prasad, TV
    IEEE TENCON 2003: CONFERENCE ON CONVERGENT TECHNOLOGIES FOR THE ASIA-PACIFIC REGION, VOLS 1-4, 2003, : 198 - 202
  • [9] Ilham E-GOVERNANCE
    Muttaqin, M. Zaenul
    DRUSTVENA ISTRAZIVANJA, 2022, 31 (02): : 370 - 373
  • [10] The Role of Institutional Logics in the Design of E-Governance Systems
    Mundkur, Anuradha
    Venkatesh, Murali
    JOURNAL OF INFORMATION TECHNOLOGY & POLITICS, 2009, 6 (01) : 12 - 30