Computer Security in Electronic Government: A State-Local Education Information System

Computer Security in Electronic Government: A State-Local Education Information System

Alison Radl, Yu-Che Chen
Copyright: © 2005 |Volume: 1 |Issue: 1 |Pages: 21
ISSN: 1548-3886|EISSN: 1548-3894|ISSN: 1548-3886|EISBN13: 9781615202683|EISSN: 1548-3894|DOI: 10.4018/jegr.2005010105
Cite Article Cite Article

MLA

Radl, Alison, and Yu-Che Chen. "Computer Security in Electronic Government: A State-Local Education Information System." IJEGR vol.1, no.1 2005: pp.79-99. http://doi.org/10.4018/jegr.2005010105

APA

Radl, A. & Chen, Y. (2005). Computer Security in Electronic Government: A State-Local Education Information System. International Journal of Electronic Government Research (IJEGR), 1(1), 79-99. http://doi.org/10.4018/jegr.2005010105

Chicago

Radl, Alison, and Yu-Che Chen. "Computer Security in Electronic Government: A State-Local Education Information System," International Journal of Electronic Government Research (IJEGR) 1, no.1: 79-99. http://doi.org/10.4018/jegr.2005010105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

As e-government projects proliferate at all levels of government, and as they transition from voluntary to mandatory participation, close examination is required, particularly the examination of security issues. The CIA (Confidentiality, Integrity, Availability) model offers a framework for examining e-government projects. This study examines the factors impacting security, using as a case study an education information system in the 2003-2004 school year. The study focuses on how CIA factors relate to a host of variables, such as school district size, software selection, technology staffing, technical competence and support, awareness of security issues, and project commitment. For the organizations participating in the project, typical factors of district size and software selection are found to be insignificant, and technical support is identified as one of the key factors promoting security.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.