Study on E-government Information Security in the Era of Big Data
Title | Study on E-government Information Security in the Era of Big Data |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Wang, Xiaozhen |
Conference Name | 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) |
Date Published | Dec. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-1907-6 |
Keywords | Big Data, cloud computing, Collaboration, complex system, cryptography, cybersecurity, data application, E-Government, E-government development, e-government hierarchy model, e-government information management, e-government information security system, Electronic government, Encryption, government data processing, Human Behavior, identity authentication, information confidentiality, Information management, information management departments, information security awareness, information security threats, information storage, intranets, large-scale network, management deficiency, network technology defects, policy-based governance, proper information encryption, pubcrawl, resilience, Resiliency, set pair analysis theory, strict information management, survivability association |
Abstract | The government in the era of big data requires safer infrastructure, information storage and data application. As a result, security threats will be the bottleneck for e-government development. Based on the e-government hierarchy model, this thesis focuses on such information security threats as human effects, network technology defects and management deficiency facing the e-government system in the era of big data. On this basis, three solutions are put forward to improve e-government information security system. Firstly, enhance information security awareness and improve network technology of information management departments in the government; secondly, conduct proper information encryption by ensuring information confidentiality and identity authentication; thirdly, implement strict information management through isolation between intranet and extranet and united planning of e-government information management. |
URL | https://ieeexplore.ieee.org/document/8997797 |
DOI | 10.1109/IAEAC47372.2019.8997797 |
Citation Key | wang_study_2019 |
- network technology defects
- information management
- information management departments
- information security awareness
- information security threats
- information storage
- intranets
- large-scale network
- management deficiency
- information confidentiality
- policy-based governance
- proper information encryption
- pubcrawl
- resilience
- Resiliency
- set pair analysis theory
- strict information management
- survivability association
- e-government hierarchy model
- Cloud Computing
- collaboration
- complex system
- Cryptography
- Cybersecurity
- data application
- E-Government
- E-government development
- Big Data
- e-government information management
- e-government information security system
- Electronic government
- encryption
- government data processing
- Human behavior
- identity authentication