skip to main content
10.1145/2691195.2691238acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicegovConference Proceedingsconference-collections
research-article

Information systems security management key issues in local government

Published: 27 October 2014 Publication History

Abstract

Information systems security plays a central role in the provision of services by Public Administration agencies. To foster a trust climate in the development of e-government, it is important to know the main concerns when managing initiatives to protect information assets. The aim of this research in progress is to identify and prioritize the key issues that Local Government chief information officers face, or believe they will face in the near future, in the domain of information systems security management.

References

[1]
Palanisamy, R. and Mukerji, B. 2014. Security and Privacy Issues in E-Government. In Cyber Behavior: Concepts, Methodologies, Tools, and Applications. IRMA, Ed. IGI Global, Hershey, PA, 880--892.
[2]
Kraaijenbrink, J. 2002. Centralization Revisited? Problems on Implementing Integrated Service Delivery in The Netherlands. In Proceedings of the 1st International Conference on Electronic Government (Aix-en-Provence, France, September 2-5, 2002). 10--17.
[3]
CFS. 2012. UK data leaks rise 1,000% in five years. Comput Fraud Secur 2012, 9, 20.
[4]
GAO. 2014. Information Security: Federal Agencies Need to Enhance Responses to Data Breaches. GAO-14-487T. http://www.gao.gov/assets/670/662227.pdf
[5]
Eyob, E. 2004. E-government: breaking the frontiers of inefficiencies in the public sector. Elect Gov 1, 1, 107--114.
[6]
Venkatesh, V., Chan, F. K. Y. and Thong, J. Y. L. 2012. Designing e-government services: Key service attributes and citizens' preference structures. J Oper Manag 30, 1--2, 116--133.
[7]
ISO/IEC. 2013. ISO/IEC 27002:2013 -- Information technology -- Security techniques -- Code of practice for information security controls. ISO.
[8]
Evangelidis, A., Akomode, J., Taleb-Bendiab, A. and Taylor, M. 2002. Risk Assessment & Success Factors for e-Government in a UK Establishment. In Proceedings of the 1st International Conference on Electronic Government (Aix-en-Provence, France, September 2-5, 2002). 395--402.
[9]
Ball, L. and Harris, R. 1982. SMIS Members: A Membership Analysis. MIS Quart 6, 1, 19--38.
[10]
Kappelman, L., McLean, E., Luftman, J. and Johnson, V. 2013. Key Issues of IT Organizations and Their Leadership: The 2013 SIM IT Trends Study. MIS Quart Exec 12, 4, 227--240.
[11]
Polónia, F. and de Sá-Soares, F. 2013. Key Issues in Information Systems Security Management. In Proceedings of the 34th International Conference on Information Systems (Milan, Italy, December 15--18, 2013).
[12]
Schmidt, R. C. 1997. Managing Delphi surveys using nonparametric statistical techniques. Decision Sci 28, 3, 763--774.

Cited By

View all
  • (2019)Strategic Agility Frameworks for Information System GovernanceStrategic IT Governance and Performance Frameworks in Large Organizations10.4018/978-1-5225-7826-0.ch004(138-171)Online publication date: 2019

Index Terms

  1. Information systems security management key issues in local government

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICEGOV '14: Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance
      October 2014
      563 pages
      ISBN:9781605586113
      DOI:10.1145/2691195
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      • Macao Foundation, Macao SAR Govt: Macao Foundation, Macao SAR Government
      • Municipio de Guimarães: Municipio de Guimarães

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 27 October 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. information systems security management
      2. key issues
      3. local government information systems security

      Qualifiers

      • Research-article

      Conference

      ICEGOV2014
      Sponsor:
      • Macao Foundation, Macao SAR Govt
      • Municipio de Guimarães

      Acceptance Rates

      ICEGOV '14 Paper Acceptance Rate 30 of 73 submissions, 41%;
      Overall Acceptance Rate 350 of 865 submissions, 40%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 22 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2019)Strategic Agility Frameworks for Information System GovernanceStrategic IT Governance and Performance Frameworks in Large Organizations10.4018/978-1-5225-7826-0.ch004(138-171)Online publication date: 2019

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media