11,214 research outputs found

    Empirical study of the impact of e-government services on cybersecurity development

    Get PDF
    YesThis study seeks to investigate how the development of e-government services impacts on cybersecurity. The study uses the methods of correlation and multiple regression to analyse two sets of global data, the e-government development index of the 2015 United Nations e-government survey and the 2015 Inter-national Telecommunication Union global cybersecurity develop-ment index (GCI 2015). After analysing the various contextual factors affecting e-government development , the study found that, various composite measures of e-government development are significantly correlated with cybersecurity development. The therefore study contributes to the understanding of the relation-ship between e-government and cybersecurity development. The authors developed a model to highlight this relationship and have validated the model using empirical data. This is expected to provide guidance on specific dimensions of e-government services that will stimulate the development of cybersecurity. The study provided the basis for understanding the patterns in cybersecurity development and has implication for policy makers in developing trust and confidence for the adoption e-government services.National Information Technology Development Agency, Nigeria

    Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge

    Get PDF
    The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in the state of the art, because there are no self-assessment methods for quantifying IoT cyber risk posture. To address this gap, an empirical analysis is performed of 12 cyber risk assessment approaches. The results and the main findings from the analysis is presented as the current and a target risk state for IoT systems, followed by conclusions and recommendations on a transformation roadmap, describing how IoT systems can achieve the target state with a new goal-oriented dependency model. By target state, we refer to the cyber security target that matches the generic security requirements of an organisation. The research paper studies and adapts four alternatives for IoT risk assessment and identifies the goal-oriented dependency modelling as a dominant approach among the risk assessment models studied. The new goal-oriented dependency model in this article enables the assessment of uncontrollable risk states in complex IoT systems and can be used for a quantitative self-assessment of IoT cyber risk posture

    Does High Cybersecurity Capability Lead to Openness in Digital Trade? The Mediation Effect of E-Government Maturity

    Get PDF
    Cybersecurity risks threaten the digital economy, including digital trade enabled by digital technologies. As parts of cybersecurity capability building, governments implement fragmented, in-flux policies to manage cybersecurity threats from cross-border digital activities. However, the lack of shared understandings of cybersecurity within cross-border digital innovations raises an increasing debate about how cybersecurity capability building policies can impact digital trade restrictions. This study develops a National Cyber Trade Behavior model to examine the relationship between national cybersecurity capability and digital trade restrictions. Utilizing the PLS-SEM-based path analysis, we draw empirical evidence to verify the developed model and reveal that building cybersecurity capability can indirectly support an open digital trade system, mediated by E-government maturity

    Why the Insurance Industry Cannot Protect Against Health Care Data Breaches

    Get PDF

    European smart specialization for Ukrainian regional development: path from creation to implementation

    Get PDF
    The focus of the research is to develop recommendations of smart specialization (SS) for Ukrainian policymakers using European approaches. The authors revealed that the main SS projects are presented in such sectors as agri-food, industrial modernization and energy. More than 12 EU countries were the plot for conducted analysis of SS, as a result of which the level of activity of each country was determined. The creation of consortiums, including SMEs, associations, universities and other participants, disclosed the successful way of SS realization. The structure of SME’s innovative potential in Ukraine was identified underlining their main characteristic features like types of innovations and innovative activity, differentiation according to enterprise size, their regional distribution. The authors explored lack of innovations on regional and national level and significant territorial disparities, which could be eliminated through policy implementation of regional SS. The existing legislative norms for possibility of SS implementation in Ukraine were analyzed due to correspondence with the EU ones. The analysis provides the opportunity to consider them only as general framework documents without any action plans and sectoral prioritization at all. The weak points of these law documents are emphasized. As a result of research, the authors developed recommendations presented by direct action plan for Ukrainian policymakers, which include such activities as underlining key priorities (especially ICT applicability in every SS project) and their correspondence with the EU ones; eliminating regional imbalances by focusing on innovation development and reorientation of some regions according to SS priorities; respecting regional existing capacities; providing organizational mechanism for cooperation of stakeholders and financial mechanism for SS support through the EU structural funds

    Emerging Technologies, Law Enforcement Responses, and National Security

    Get PDF

    Mobile Privacy and Business-to-Platform Dependencies: An Analysis of SEC Disclosures

    Get PDF
    This Article systematically examines the dependence of mobile apps on mobile platforms for the collection and use of personal information through an analysis of Securities and Exchange Commission (SEC) filings of mobile app companies. The Article uses these disclosures to find systematic evidence of how app business models are shaped by the governance of user data by mobile platforms, in order to reflect on the role of platforms in privacy regulation more generally. The analysis of SEC filings documented in the Article produces new and unique insights into the data practices and data-related aspects of the business models of popular mobile apps and shows the value of SEC filings for privacy law and policy research more generally. The discussion of SEC filings and privacy builds on regulatory developments in SEC disclosures and cybersecurity of the last decade. The Article also connects to recent regulatory developments in the U.S. and Europe, including the General Data Protection Regulation, the proposals for a new ePrivacy Regulation and a Regulation of fairness in business-to-platform relations

    Integrating IS success model with cybersecurity factors for e-government implementation in the Kingdom of Saudi Arabia

    Get PDF
    The electronic government (E-Gov) Systems are currently getting recognized as an authentic strategically tool in delivering E-services. Considering the development of information system (IS) as well as the expanding of the internet-based applications in KSA, E-Gov has always been a significant aspect in delivering governmental services. This research has adopted the (IS) success model by both DeLone and McLean (D&M), moreover, it adopted technology acceptance model (TAM) with cybersecurity factors, both models were implemented to discover the status of the IS success then investigate cybersecurity aspects that impact the service efficiency and effectiveness in KSA. Consequently, this research aims to create a model to investigate the IS success model along with cybersecurity factors that influence E-Gov services effectiveness and usage. Therefore, a survey has been applied as the major data gathering approach; the survey has been distributed among 211 users of E-Gov services consistently. Moreover, all research findings were attained through a quantitative method using the structural equation modelling (SEM). Findings revealed that the constructs fundamental of the (IS) success model are strongly influencing users' satisfaction (US) of the E-Gov services; correspondingly, the fundamental constructs factors of cybersecurity with TAM appear to have a strong impacts on perceived risk (PR), in addition, both which affect the E-Gov services towards usage and effectiveness

    An information systems security framework for the e-Government Programme of Jordan

    Get PDF
    Any e-government programme provides e-services as one of the most important means by which the interaction between citizens, businesses and governments takes place. This has brought great opportunities but also raises serious cybersecurity challenges. Critical information assets are facing various potential security risks and threats. Information systems security is necessary to mitigate those risks and threats that are faced by the e-government programme and to safeguard the confidentiality, integrity and availability of the available e-services. In light of the above, the aim of this study is to examine how information security is managed and approached within e-government programmes and the case study of the Ministry of ICT in Jordan informs that aim. The study deconstructs information security through the Technical/Formal/Informal (TFI) framework and enriches that framework by customising it for e-government, expanding it also to include citizens’ online trust. To achieve this aim, a qualitative investigation of the Jordanian e-government programme was conducted by following the research design of a case study in the interpretivist tradition. Furthermore, a survey was used as a complementary phase to examine citizens’ perspectives on e-government security. By combining, analysing and reflecting on the empirical data, a consolidated information security framework was developed for different security aspects, based on the TFI model (technical, formal and informal). The dissertation contributes to the knowledge domain at the intersection of e-government and cybersecurity both practically and theoretically, focusing on technical aspects and non-technical aspects as well. The proposed framework provides an overview of the TFI-categorised elements that can help governments reflect on and manage the security challenges of their corresponding e-government programmes
    • 

    corecore