Font Size: a A A

E-government Information Security Policy Research

Posted on:2007-02-02Degree:DoctorType:Dissertation
Country:ChinaCandidate:W W ZhuFull Text:PDF
GTID:1118360185451349Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
Information technology is the most advanced factor of productivity in the world. With the development of computer and network techniques, E-government became a reality. E-government is constructed on the network platform based on internet technology, including government-innernet, government-extranet and WWW. The Internet provides us many kinds of services, but it is a globe network without any uniform administration and has also been an enabling medium for computer-based attacks. It makes possible for many criminals to commit their crimes using the internet. The application of e-government is facing a great challenge.In these days, there are a lot of researches on e-government and information security in our country and overseas focused on the facet of theories, techniques and laws. In this paper, we choose two special aspects during the information security constructing period of e-government to research. The main content is summed up as follows:The first chapter summarily analyzes and introduced the research background, the domestic and foreign research actuality and structure of this article. The second chapter presents the basic conception of e-government and the potential information security questions of e-government system by the numbers.The third chapter of this paper intruduces a cost-benefit based model that determines the optimal amount to invest to a given set of information in the E-government system from the angle of security risk management. It also analyzes some important points to pay attention during investing in information security by the properties of two broad classes of security breach probability functions. The result of the research tells that governments should choose different investment strategies encountering different information sets with variety demands or different security breach probability functions. In the last part, it provides two feasible solutions corresponding to the different types of investment.Act as the key component of computer security technologies, intrusion detection...
Keywords/Search Tags:E-government, information security, risk management, investment strategy, intrusion detect, game theory, sampling schemes
PDF Full Text Request
Related items