A Review of Frameworks for Evaluating the Security Performance of E-Government Systems
Keywords:
E-government, ICTs, Frameworks, IDS, TCPAbstract
The use of information and communication technology (ICT) is rapidly expanding throughout society. Different ICTs are used by governments to communicate with their country's citizens and other e-government initiative stakeholders. The e-government initiative faces various internal and external challenges, including limited funding, rapid technological advancements, internet accessibility for the public, and concerns about privacy and security. To address these challenges, several frameworks have been proposed that help improve E-government performance. In order to measure the effectiveness of e-government, this paper aims to identify various constructs and their relationships by providing a summary of the proposed frameworks and models for electronic government development
Downloads
References
J. P. F. Gomes and R. M. S. Laureano, “Impacts of Electronic Public Procurement in the Portuguese Construction Sector: several years after implementation.” Advances in Electronic Government, Digital Divide, and Regional Development, pp. 363-383, 2018, doi: 10.4018/978-1-5225-3731-1.ch017.
I. K. Mensah, “E-Government Services Adoption: The Important Elements of Trust and Transparency.” International Journal of Electronic Government Research, vol. 14, no. 3, pp. 12-31, 2018, doi: 10.4018/ijegr.2018070102.
M. J. Moon, “The Evolution of E‐Government among Municipalities: Rhetoric or Reality?” Public Administration Review, vol. 62, no. 4, pp. 424-433, 2002, doi: 10.1111/0033-3352.00196.
O. Gibreel and A. Hong, “A Holistic Analysis Approach to Social, Technical, and Socio-Technical Aspect of E-Government Development.” Sustainability, vol. 9, no. 12, p. 2181, 2017, doi: 10.3390/su9122181.
J. Sisodia, A. Nayak, and R. Boghey, “An Improved Index Price/Movement Prediction by using Ensemble CNN and DNN Deep Learning Technique,” Journal of Applied Artificial Intelligence, vol. 5, no. 1, pp. 41–53, Mar. 2024, doi: https://doi.org/10.48185/jaai.v5i1.980.
A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, “Survey of intrusion detection systems: techniques, datasets and challenges.” Cybersecurity, vol. 2, no. 1, 2019, doi: 10.1186/s42400-019-0038-7.
Mahmoud Khalid Baklizi et al., “Web Attack Intrusion Detection System Using Machine Learning Techniques,” International journal of online and biomedical engineering, vol. 20, no. 03, pp. 24–38, Feb. 2024, doi: https://doi.org/10.3991/ijoe.v20i03.45249.
R. Heeks, Implementing and Managing EGovernment. SAGE, 2006.
D. Comer, Internetworking with TCP/IP. 6th ed., vol. 1. Addison-Wesley, 2014.
R. Clarke, “Privacy and Data Protection for E-Government.” Edward Elgar Publishing, 2018.
P. T. Jaeger, "Transparency and Social Media Communication about Government Stimulus Funding.” Government Information Quarterly, 461-471, 2018.
T. Guberek, A. McDonald, S. Simioni, A. H. Mhaidli, K. Toyama, and F. Schaub, “Keeping a Low Profile? Technology, risk and privacy among undocumented immigrants.” Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018, doi: 10.1145/3173574.3173688.
J. Vitak, Y. Liao, P. Kumar, M. Zimmer, and K. Kritikos, “Privacy Attitudes and Data Valuation Among Fitness Tracker Users.” Transforming Digital Worlds, pp. 229-239, 2018, doi: 10.1007/978-3-319-78105-1_27.
Lewandowski, S.M. et al. (2001) ‘Sara: Survivable autonomic response architecture’, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX’01 [Preprint]. doi:10.1109/discex.2001.932194.
N. Stakhanova, S. Basu, and J. Wong, “A taxonomy of intrusion response systems.” International Journal of Information and Computer Security, vol. 1, no. 1, p. 169, 2007, doi: 10.1504/ijics.2007.012248.
D. Prokopios, G. Dimitris, G. Stefanos, L. Costas, L. Mitrou, “Towards an enhanced authentication framework for e-government services: The Greek case.” Trust and Security, pp. 189-196, 2009.
T. Oliveira, M. F. Martins, “Literature review of information technology adoption models at firm level.” Electronic journal of information systems evaluation, vol. 14, no. 1, pp. 110-121, 2011.
A. Shameli-Sendi, N. Ezzati-Jivan, M. Jabbarifar, M. Dagenais, “Intrusion response systems: survey and taxonomy.” Int. J. Comput. Sci. Netw. Secur, vol. 12, no. 1, 1-14, 2012.
N. B. Anuar, M. Papadaki, S. Furnell, and N. Clarke, “An investigation and survey of response options for Intrusion Response Systems (IRSs).” 2010 Information Security for South Africa, 2010, doi: 10.1109/issa.2010.5588654.
A. Basahel and M. Yamin, “Measuring success of e-government of Saudi Arabia,” International Journal of Information Technology, vol. 9, no. 3, pp. 287–293, Jul. 2017. doi:10.1007/s41870-017-0029-4.
A. Mateen, S. Sabir, K. Ullah, "A development of hybrid framework for E-Government.” arXiv preprint arXiv:1702.02442, 2017.
N. Elisa, L. Yang, F. Chao, and Y. Cao, “A framework of blockchain-based secure and privacy-preserving E-government system.” Wireless Networks, vol. 29, no. 3, pp. 1005-1015, 2018, doi: 10.1007/s11276-018-1883-0.
E. H. H. Al Shiekh Saleh, M. F. Bin Abd Kadir, Y. A. El-Ebiary, “Bottleneck Bandwidth And Round-Trip Propagation Time Algorithm Using TFRC Protocol By Artificial Intelligence Algorithm.” Journal of Pharmaceutical Negative Results, vol. 13, no. 5, pp. 841-849, 2022.
Published
How to Cite
Issue
Section
Copyright (c) 2025 EHAB AL SHEIKH SALEH

This work is licensed under a Creative Commons Attribution 4.0 International License.