skip to main content
10.1145/2037556.2037625acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
research-article

Secure government in cyberspace?

Published: 12 June 2011 Publication History

Abstract

This panel will focus on the critical current issues facing governments with respect to the management of digital identities in cyberspace.
Billions of dollars of government funds continue to be spent on implementing identity management solutions, developing associated policy and legislation and on encouraging the use of online services. The panel of Identity and Access Management experts will consider what the current challenges facing governments are, in relation to cybersecurity, cloud computing and the US government's National Strategy [1].

References

[1]
Schmidt H. A. 2010 The National Strategy for Trusted Identites in Cyberspace. http://www.whitehouse.gov/blog/2010/06/25/national-strategy-trusted-identities-cyberspace.
[2]
Seltsikas P. and O'Keefe R. 2010 Expectations and Outcomes in Electronic Identity Management: The Role of Trust and Public Value, European Journal of Information Systems, Vol. 19:1, pp. 93--103.

Cited By

View all
  • (2014)A novel framework for supporting the exponential worldwide adoption of electronic transactions2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)10.1109/AICCSA.2014.7073199(198-205)Online publication date: Nov-2014

Index Terms

  1. Secure government in cyberspace?

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    dg.o '11: Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times
    June 2011
    398 pages
    ISBN:9781450307628
    DOI:10.1145/2037556

    Sponsors

    • Routledge
    • Elsevier
    • University of Arizona: University of Arizona
    • San Diego Super Computing Ctr: San Diego Super Computing Ctr
    • Emerald: Emerald Group Publishing Limited
    • University of Maryland: University of Maryland
    • IOS Press: IOS Press

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 June 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IAM
    2. cloud computing
    3. cybersecurity
    4. digital identity management
    5. information security

    Qualifiers

    • Research-article

    Conference

    dg.o '11
    Sponsor:
    • University of Arizona
    • San Diego Super Computing Ctr
    • Emerald
    • University of Maryland
    • IOS Press

    Acceptance Rates

    Overall Acceptance Rate 150 of 271 submissions, 55%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 08 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)A novel framework for supporting the exponential worldwide adoption of electronic transactions2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)10.1109/AICCSA.2014.7073199(198-205)Online publication date: Nov-2014

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media