E-Government - an information security perspective
The growth and rapid adoption of the Internet has greatly changed how all organizations deal with their respective stakeholders. As the move from administrative operations to service operations accelerates, e- government Network Platform is a solution to transform the way they do business and...
| Main Authors: | Hassan, Rasha G., Khalifa, Othman Omran |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
International Journal of Computer Trends and Technology
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/50985/ http://irep.iium.edu.my/50985/1/E-Government_-_an_Information_Security__Perspective_IJCTT-V36P101.pdf |
Similar Items
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016)
by: Khalifa, Othman Omran, et al.
Published: (2016)
Challenging development citizen-centric e-governance in
Sudan
by: Edrees , Rasha, et al.
Published: (2015)
by: Edrees , Rasha, et al.
Published: (2015)
Applied information theory and coding
by: Khalifa, Othman Omran
Published: (2016)
by: Khalifa, Othman Omran
Published: (2016)
Responsibility-value alignment in information security governance
by: Abdul Munir, Rufizah, et al.
Published: (2018)
by: Abdul Munir, Rufizah, et al.
Published: (2018)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
The cybersecurity governance in changing the security psychology and security posture: insights into e-procurement
by: Dawood Gani, Anisha Banu, et al.
Published: (2021)
by: Dawood Gani, Anisha Banu, et al.
Published: (2021)
Impact of NSA-PRISM to National Information Security
Strategy & Policy
by: Khudayer, Aiesha Y., et al.
Published: (2014)
by: Khudayer, Aiesha Y., et al.
Published: (2014)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
The state of e-government security in Malaysia : reassessing the legal and regulatory framework on the threat of information theft
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
E-waste : problems, Islamic perspective and solutions
by: Faris, Waleed Fekry, et al.
Published: (2011)
by: Faris, Waleed Fekry, et al.
Published: (2011)
Secure data communication using blind source separation
by: Kumar, Anil, et al.
Published: (2008)
by: Kumar, Anil, et al.
Published: (2008)
Assessment of employee’s knowledge and compliance on information security governance
by: Chow, Win Niy
Published: (2014)
by: Chow, Win Niy
Published: (2014)
E-Government And Trust
In Public Administration From
The Perspective Of E-Notifikasi Users
by: Zulkifli, Zarina
Published: (2021)
by: Zulkifli, Zarina
Published: (2021)
A model of component interaction between Formal, Technical and Informal components within IS/IT security governance
by: Nadianatra, Musa, et al.
Published: (2013)
by: Nadianatra, Musa, et al.
Published: (2013)
Information technology in future education: open and distance learning
by: Khalifa, Othman Omran
Published: (2003)
by: Khalifa, Othman Omran
Published: (2003)
Exploring information technology governance in a Malaysian public university: providers' perspectives
by: Ajayi, Binyamin Adaniyi, et al.
Published: (2014)
by: Ajayi, Binyamin Adaniyi, et al.
Published: (2014)
GSM security: problems and solutions
by: Saeed, Rashid Abdelhaleem, et al.
Published: (2011)
by: Saeed, Rashid Abdelhaleem, et al.
Published: (2011)
Reliability information to support decision making for e-Government projects
by: Faiz, Mohd Turan, et al.
Published: (2017)
by: Faiz, Mohd Turan, et al.
Published: (2017)
Unintentional information security behavior from the Qur’an
and Hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016)
by: Barzak, Omar Mokhles, et al.
Published: (2016)
Medical identity theft in telemedicine: solving the privacy and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Information security in the Islamic perspective: the principles and practices
by: Zulhuda, Sonny
Published: (2010)
by: Zulhuda, Sonny
Published: (2010)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Coding, cryptography, information security and OFDM
Published: (2011)
Published: (2011)
Multicast security : issues and solutions
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
Pesonal data governance in Malaysia from a cyber security perspective
by: Zulhuda, Sonny
Published: (2016)
by: Zulhuda, Sonny
Published: (2016)
Disposal of E-Waste: Government Agencies’ Perspective
by: Suziyana, Mat Dahan, et al.
Published: (2024)
by: Suziyana, Mat Dahan, et al.
Published: (2024)
RFID for Hajj identification guide information and personnel announcement
by: Julaihi, Dzul I’zzat, et al.
Published: (2011)
by: Julaihi, Dzul I’zzat, et al.
Published: (2011)
Information security culture concept towards information security compliance: A comparison between it and non-it professionals
by: Akhyari, Nasir, et al.
Published: (2022)
by: Akhyari, Nasir, et al.
Published: (2022)
Suitability of using symmetric key to secure multimedia data: an overview,
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
The influence of organizational factors on information systems success in e-government agencies in Malaysia
by: Hussein, Ramlah, et al.
Published: (2007)
by: Hussein, Ramlah, et al.
Published: (2007)
Performance evaluation of MPEG-4 video transmission over IEEE802.11e
by: Mohammed Jama, Abdi Risaq, et al.
Published: (2010)
by: Mohammed Jama, Abdi Risaq, et al.
Published: (2010)
Video transmission over an enhancement approach of
IEEE802.11e
by: Jama, Abdirisaq Mohammed, et al.
Published: (2015)
by: Jama, Abdirisaq Mohammed, et al.
Published: (2015)
Security issues with health care information technology
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
Establishing a personalized information security culture
by: Talib, Shuhaili, et al.
Published: (2011)
by: Talib, Shuhaili, et al.
Published: (2011)
The most principle security issues in e-Commerce
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
Reduced-reference video quality metric using spatial
Information in salient regions
by: Abdul Rahman, Farah Diyana, et al.
Published: (2018)
by: Abdul Rahman, Farah Diyana, et al.
Published: (2018)
Value-added information in term structure: the case of Malaysian government securities
by: Elshareif, Elgilani Eltahir, et al.
Published: (2008)
by: Elshareif, Elgilani Eltahir, et al.
Published: (2008)
Information Security And IT Governance Policies Application : A Study Of Prudential Malaysia
by: Halim, Elisa Mardiana
Published: (2009)
by: Halim, Elisa Mardiana
Published: (2009)
Persuasive technology contributions toward enhance information security awareness in an organization
by: Qudaih, Hani A., et al.
Published: (2014)
by: Qudaih, Hani A., et al.
Published: (2014)
Similar Items
-
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016) -
Challenging development citizen-centric e-governance in
Sudan
by: Edrees , Rasha, et al.
Published: (2015) -
Applied information theory and coding
by: Khalifa, Othman Omran
Published: (2016) -
Responsibility-value alignment in information security governance
by: Abdul Munir, Rufizah, et al.
Published: (2018) -
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)