skip to main content
10.1145/1940941.1940966acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

A comparison of information security risk analysis in the context of e-government to criminological threat assessment techniques

Published: 01 October 2010 Publication History

Abstract

This paper examines prior research on the topic of information security analysis in the context of e-Government. Specifically, risk management concept models and analysis techniques are reviewed and their application in e-Government is covered. In addition, this paper will review criminological threat assessment techniques and relate them to risk management methodologies, discussing similarities and differences. This paper offers the conclusion that the fields of information security risk management and criminological threat assessment techniques have a number of similarities and differences and the methodologies should be examined together more closely in future research for the benefit of both fields.

References

[1]
International Telecommunication Union (2010). Information Communication Technology Indicators Database. Retrieved June 20, 2010 from ITU Statistics page: http://www.itu.int/ITU-D/ict/statistics/index.html
[2]
Zang, Z. (2002). E-Government in Digital Era: Concept, Practice, and Development. International Journal of The Computer, The Internet, and Management, 10 (2). 1--22.
[3]
Ebrahim, Z., Irani, Z. (2005). E-government adoption: Architecture and barriers. Business Process Management Journal, 15 (5). 589--611.
[4]
Wang, J. F. E-Government security management: Key factors and countermeasures. in Fifth International Conference on Information Assurance and Security. (Xi'an, China, 2009). IEEE Computer Society, 483--486.
[5]
Joshi, J., Ghafoor, A., Aref, W. G., Spafford, E. H. Digital government security infrastructure design challenges, IEEE Computer, 34 (2). 66--72.
[6]
Hwang, M. S., Li, C. T., Shen, J. J., Chen, Y. P. Challenges in e-government and security of information. Information & Security: An International Journal, 15 (1). 9--20.
[7]
Conklin, A., White, G. B. E-government and cyber security: The role of cyber security exercises. Proceedings of the 39th Hawaii International Conference on System Sciences. (Kauai, HI, 2006). IEEE Computer Society, 1--8.
[8]
Luna-Reyes, L. F., Gil-Garcia, J. R. E-government & internet security: Some technical and policy considerations. Proceedings of the 2003 Annual National Conference on Digital Government Research. (Boston, MA, 2003). ACM International Conference Proceeding Series, Vol. 130.
[9]
Whitman, M., and Mattord, H. J. Management of Information Security. Thomson Course Technology, Boston, 2010.
[10]
Stoneburner, G., Goguen, A., Feringa, A. Risk management guide for information technology systems: recommendations of the national institute of standards and technology. NIST Special Publication 800--30. Retrieved June 20, 2010 from http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf
[11]
Evangelidis, A. A risk assessment framework for e-services. Electronic Journal of e-Government, 2 (1). 21--30.
[12]
Tchankova, L. Risk Identification - Basic Stage in Risk Management. Environmental Management and Health, 13 (3). 290--297.
[13]
Liebermann, Y., Stashevsky, S. Perceived risks as barriers to internet and e-commerce usage. Qualitative Market Research: An International Journal, 5 (4). 291--300.
[14]
Zhou, Z., Hu, C. Study on the e-government security risk management. IJCSNS International Journal of Computer Science and Network Security, 8 (5). 208--213.
[15]
Fein, R. A., Vossekuil, B., & Holden, G. A. (1995). Threat assessment: An approach to prevent targeted violence. National Institute of Justice: Research in Action, 1--7.
[16]
Ackerman, A., Moran, S. Bioterrorism and threat assessment. Weapons of Mass Destruction Terrorism Research Program. Retrieved June 20, 2010 from http://www.wmdcommission.org/files/No22.pdf

Cited By

View all
  • (2023)A Brief Overview of E-Government SecurityProceedings of International Conference on Communication and Computational Technologies10.1007/978-981-99-3485-0_2(11-23)Online publication date: 1-Sep-2023
  • (2022)A Framework of the Critical Factors for Healthcare Providers to Share Data Securely Using BlockchainIEEE Access10.1109/ACCESS.2022.316221810(41064-41077)Online publication date: 2022
  • (2019)Mobile Information Security Risk Calculator2019 7th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)10.1109/FiCloudW.2019.00031(104-110)Online publication date: Aug-2019
  • Show More Cited By

Index Terms

  1. A comparison of information security risk analysis in the context of e-government to criminological threat assessment techniques

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    InfoSecCD '10: 2010 Information Security Curriculum Development Conference
    October 2010
    187 pages
    ISBN:9781450302029
    DOI:10.1145/1940941
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • KSU - CISE: KSU Center for InfoSec Education
    • ISSA: The Metro Atlanta Information Systems Security Association

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 October 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. criminology
    2. e-government
    3. information systems
    4. management
    5. risk analysis
    6. risk management
    7. security
    8. threat assessment

    Qualifiers

    • Research-article

    Conference

    InfoSecCD '10
    Sponsor:
    • KSU - CISE
    • ISSA

    Acceptance Rates

    Overall Acceptance Rate 18 of 23 submissions, 78%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)8
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)A Brief Overview of E-Government SecurityProceedings of International Conference on Communication and Computational Technologies10.1007/978-981-99-3485-0_2(11-23)Online publication date: 1-Sep-2023
    • (2022)A Framework of the Critical Factors for Healthcare Providers to Share Data Securely Using BlockchainIEEE Access10.1109/ACCESS.2022.316221810(41064-41077)Online publication date: 2022
    • (2019)Mobile Information Security Risk Calculator2019 7th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)10.1109/FiCloudW.2019.00031(104-110)Online publication date: Aug-2019
    • (2019)Requirements elicitation for secure and interoperable cross-border health data exchange: the KONFIDO studyIET Software10.1049/iet-sen.2018.5292Online publication date: 1-Feb-2019
    • (2018)Comprehensive user requirements engineering methodology for secure and interoperable health data exchangeBMC Medical Informatics and Decision Making10.1186/s12911-018-0664-018:1Online publication date: 16-Oct-2018
    • (2018)An empirical study of factors influencing cloud adoption among private sector organisationsTelematics and Informatics10.1016/j.tele.2017.09.01735:1(38-54)Online publication date: Apr-2018

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media