Publikace UTB
Repozitář publikační činnosti UTB

Proposing an e-government stage model in terms of personal information security in developing countries

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Proposing an e-government stage model in terms of personal information security in developing countries en
dc.contributor.author Muhammad, Hemin Akram
dc.contributor.author Hromada, Martin
dc.relation.ispartof Proceedings - International Carnahan Conference on Security Technology
dc.identifier.issn 1071-6572 Scopus Sources, Sherpa/RoMEO, JCR
dc.identifier.isbn 978-1-6654-9363-5
dc.date.issued 2022
utb.relation.volume 2022-September
dc.event.title 2022 IEEE International Carnahan Conference on Security Technology, ICCST 2022
dc.event.location Valeč u Hrotovic
utb.event.state-en Czech Republic
utb.event.state-cs Česká republika
dc.event.sdate 2022-09-07
dc.event.edate 2022-09-09
dc.type conferenceObject
dc.language.iso en
dc.publisher Institute of Electrical and Electronics Engineers Inc.
dc.identifier.doi 10.1109/ICCST52959.2022.9896521
dc.relation.uri https://ieeexplore.ieee.org/document/9896521
dc.relation.uri https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9896521
dc.subject developing countries en
dc.subject e-government en
dc.subject personal information en
dc.subject stage model en
dc.description.abstract With improvements in Internet technology, the majority of governments throughout the world have adopted Information and Communication Technologies (ICTs) to deliver more efficient and effective services to their agencies, companies, and people. In general, e-Government refers to the use of information and communication technologies (ICTs) by government agencies to offer and improve public service delivery. Developing countries are extremely enthusiastic about implementing e-government. But these emerging countries are still in the beginning stages of development and suffer from shortages. In e-government, individuals are concerned about their privacy since e-government frequently deals with personal information. This article studies the concerns and obstacles that affect personal information security in e-government, taking into account the majority of security viewpoints, this research proposes models of e-government from perspective of protecting personal data. The study is qualitative in terms of methodology, it depends on documentary studies, content analysis and comparative study. © 2022 IEEE. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1011177
utb.identifier.obdid 43884076
utb.identifier.scopus 2-s2.0-85139875724
utb.source d-scopus
dc.date.accessioned 2022-10-26T13:40:44Z
dc.date.available 2022-10-26T13:40:44Z
utb.ou Department of Security Engineering
utb.contributor.internalauthor Muhammad, Hemin Akram
utb.contributor.internalauthor Hromada, Martin
utb.fulltext.affiliation Hemin Muhammad Department of Security Engineering Faculty of Applied Informatics Tomas Bata University Zlin, Czech Republic [email protected] Martin Hromada Department of Security Engineering Faculty of Applied Informatics Tomas Bata University Zlin, Czech Republic [email protected]
utb.fulltext.dates -
utb.fulltext.references [1] A. C. Nwaeze, P. Zavarsky, and R. Ruhl, “Compliance evaluation of information privacy protection in e-government systems in Anglophone West Africa using ISO/IEC 29100: 2011,” in 2017 Twelfth International Conference on Digital Information Management (ICDIM), 2017, pp. 98–102. [2] M. Al-Dabbagh, “Electronic Government in Iraq: Challenges of development and implementation,” 2011. [3] I. ALFADLI and M. MOHAMMED, “Citizen Centred eGovernment Services Evaluation Model,” 2015. [4] C. E. Azenabor, “Developing electronic government models for Nigeria: an analysis,” 2013. [5] N. K. A. Samara, “An information systems security framework for the e-government programme of Jordan,” 2019. [6] Y. Wu, “Protecting personal data in E-government: A crosscountry study,” Government Information Quarterly, vol. 31, no. 1, pp. 150–159, 2014. [7] E. Agbozo, D. Alhassan, and K. Spassov, “Personal Data and Privacy Barriers to E-Government Adoption, Implementation and Development in Sub-Saharan Africa,” in International Conference on Electronic Governance and Open Society: Challenges in Eurasia, 2018, pp. 82–91. [8] S. M. Shareef, “Electronic government adoption based on citizencentric approach in regional government in developing countries: the case of Kurdistan Region of Iraq (KRI),” 2012. [9] M. Dewa and I. Zlotnikova, “Citizens’ readiness for e-government services in Tanzania,” Advances in Computer Science: An International Journal, vol. 3, no. 4, pp. 37–45, 2014. [10] J. P. Choi, D.-S. Jeon, and B.-C. Kim, “Privacy and personal data collection with information externalities,” Journal of Public Economics, vol. 173, pp. 113–124, 2019. [11] H.-J. Lee, K. Lee, and D. Won, “Protection profile of personal information security system: designing a secure personal information security system,” in 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 2011, pp. 806–811. [12] A. A. Hassan, “Status of E-Government in Iraq and what the challenges of development and implementation,” International Journal of Science and Research, vol. 5, pp. 1511–1516, 2013.
utb.fulltext.sponsorship -
utb.scopus.affiliation Tomas Bata University, Faculty of Applied Informatics, Department of Security Engineering, Zlin, Czech Republic
utb.fulltext.projects -
utb.fulltext.faculty Faculty of Applied Informatics
utb.fulltext.faculty Faculty of Applied Informatics
utb.fulltext.ou Department of Security Engineering
utb.fulltext.ou Department of Security Engineering
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam