Kontaktujte nás | Jazyk: čeština English
dc.title | Proposing an e-government stage model in terms of personal information security in developing countries | en |
dc.contributor.author | Muhammad, Hemin Akram | |
dc.contributor.author | Hromada, Martin | |
dc.relation.ispartof | Proceedings - International Carnahan Conference on Security Technology | |
dc.identifier.issn | 1071-6572 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.identifier.isbn | 978-1-6654-9363-5 | |
dc.date.issued | 2022 | |
utb.relation.volume | 2022-September | |
dc.event.title | 2022 IEEE International Carnahan Conference on Security Technology, ICCST 2022 | |
dc.event.location | Valeč u Hrotovic | |
utb.event.state-en | Czech Republic | |
utb.event.state-cs | Česká republika | |
dc.event.sdate | 2022-09-07 | |
dc.event.edate | 2022-09-09 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
dc.identifier.doi | 10.1109/ICCST52959.2022.9896521 | |
dc.relation.uri | https://ieeexplore.ieee.org/document/9896521 | |
dc.relation.uri | https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9896521 | |
dc.subject | developing countries | en |
dc.subject | e-government | en |
dc.subject | personal information | en |
dc.subject | stage model | en |
dc.description.abstract | With improvements in Internet technology, the majority of governments throughout the world have adopted Information and Communication Technologies (ICTs) to deliver more efficient and effective services to their agencies, companies, and people. In general, e-Government refers to the use of information and communication technologies (ICTs) by government agencies to offer and improve public service delivery. Developing countries are extremely enthusiastic about implementing e-government. But these emerging countries are still in the beginning stages of development and suffer from shortages. In e-government, individuals are concerned about their privacy since e-government frequently deals with personal information. This article studies the concerns and obstacles that affect personal information security in e-government, taking into account the majority of security viewpoints, this research proposes models of e-government from perspective of protecting personal data. The study is qualitative in terms of methodology, it depends on documentary studies, content analysis and comparative study. © 2022 IEEE. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1011177 | |
utb.identifier.obdid | 43884076 | |
utb.identifier.scopus | 2-s2.0-85139875724 | |
utb.source | d-scopus | |
dc.date.accessioned | 2022-10-26T13:40:44Z | |
dc.date.available | 2022-10-26T13:40:44Z | |
utb.ou | Department of Security Engineering | |
utb.contributor.internalauthor | Muhammad, Hemin Akram | |
utb.contributor.internalauthor | Hromada, Martin | |
utb.fulltext.affiliation | Hemin Muhammad Department of Security Engineering Faculty of Applied Informatics Tomas Bata University Zlin, Czech Republic [email protected] Martin Hromada Department of Security Engineering Faculty of Applied Informatics Tomas Bata University Zlin, Czech Republic [email protected] | |
utb.fulltext.dates | - | |
utb.fulltext.references | [1] A. C. Nwaeze, P. Zavarsky, and R. Ruhl, “Compliance evaluation of information privacy protection in e-government systems in Anglophone West Africa using ISO/IEC 29100: 2011,” in 2017 Twelfth International Conference on Digital Information Management (ICDIM), 2017, pp. 98–102. [2] M. Al-Dabbagh, “Electronic Government in Iraq: Challenges of development and implementation,” 2011. [3] I. ALFADLI and M. MOHAMMED, “Citizen Centred eGovernment Services Evaluation Model,” 2015. [4] C. E. Azenabor, “Developing electronic government models for Nigeria: an analysis,” 2013. [5] N. K. A. Samara, “An information systems security framework for the e-government programme of Jordan,” 2019. [6] Y. Wu, “Protecting personal data in E-government: A crosscountry study,” Government Information Quarterly, vol. 31, no. 1, pp. 150–159, 2014. [7] E. Agbozo, D. Alhassan, and K. Spassov, “Personal Data and Privacy Barriers to E-Government Adoption, Implementation and Development in Sub-Saharan Africa,” in International Conference on Electronic Governance and Open Society: Challenges in Eurasia, 2018, pp. 82–91. [8] S. M. Shareef, “Electronic government adoption based on citizencentric approach in regional government in developing countries: the case of Kurdistan Region of Iraq (KRI),” 2012. [9] M. Dewa and I. Zlotnikova, “Citizens’ readiness for e-government services in Tanzania,” Advances in Computer Science: An International Journal, vol. 3, no. 4, pp. 37–45, 2014. [10] J. P. Choi, D.-S. Jeon, and B.-C. Kim, “Privacy and personal data collection with information externalities,” Journal of Public Economics, vol. 173, pp. 113–124, 2019. [11] H.-J. Lee, K. Lee, and D. Won, “Protection profile of personal information security system: designing a secure personal information security system,” in 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 2011, pp. 806–811. [12] A. A. Hassan, “Status of E-Government in Iraq and what the challenges of development and implementation,” International Journal of Science and Research, vol. 5, pp. 1511–1516, 2013. | |
utb.fulltext.sponsorship | - | |
utb.scopus.affiliation | Tomas Bata University, Faculty of Applied Informatics, Department of Security Engineering, Zlin, Czech Republic | |
utb.fulltext.projects | - | |
utb.fulltext.faculty | Faculty of Applied Informatics | |
utb.fulltext.faculty | Faculty of Applied Informatics | |
utb.fulltext.ou | Department of Security Engineering | |
utb.fulltext.ou | Department of Security Engineering |