An Information Security Framework for Ubiquitous Services in eGovernment Structures: A Peruvian Local Government Experience
Manuel Tupia, Mariuxi Bruzza, Flavio Rodriguez
DOI: http://dx.doi.org/10.15439/2016F72
Citation: Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 8, pages 1309–1316 (2016)
Abstract. This paper describes a framework designed to establish vital conditions of information security for ubiquitous services (U-Government) both in district and province municipalities (departments' capitals) within the Peruvian electronic (e-government) government structures. The framework contains current regulations concerning information security, data privacy, business continuity, and natural disasters management based on good international practices, including but not limited, ISO 27001, ISO 27002, ISO 22301 standards. The aim is to help implement security controls in the use of mobile services which are part of the e-government services catalogue. The framework structure is closely related to the COBIT 5.0 process model.
References
- H. Ranaweera, “Perspective of trust towards e-government initiatives in Sri Lanka”, SpringerPlus., vol. 5, no 22, pp. 1-11, 2016. http://dx.doi.org/10.1186/s40064-015-1650-y
- J. Batlle-Montserrat, J. Blat, and E. Abadal, “Local e-government Benchlearning: Impact analysis and applicability to smart cities benchmarking,” Information Polity., vol. 21, pp. 43-59, 2016. http://dx.doi.org/10.3233/IP-150366
- P. Pitchay Muthu Chelliah, R. Thurasamy, A. I. Alzahrani, O. Alfarraj, and N. Alalwan, “E-Government service delivery by a local government agency: The case of E-Licensing Telematics and Informatics”, vol. 33, pp. 925-935, 2016. http://dx.doi.org/10.1016/j.tele.2016.02.003
- A. Ramtohul, and K. M. S. Soyjaudah, “Information security governance for e-services in southern African developing countries e- Government projects”, Journal of Science and Technology Policy Management., vol. 7, pp. 26-42, 2016. http://dx.doi.org/10.1108/JSTPM-04-2014-0014
- R. Kennedy and H. J. Scholl, “E-regulation and the rule of law: Smart government, institutional information infrastructures, and fundamental values”, Information Polity., vol. 21, pp. 77-98, 2016. http://dx.doi.org/10.3233/IP-150368
- L. G. Anthopoulos and C. G. Reddick, “Understanding electronic government research and smart city: A framework and empirical evidence”, Information Polity., vol. 21, pp. 99-117, 2016. http://dx.doi.org/10.3233/IP-150371
- ISACA, COBIT 5.0 For Information Security. ISACA Publishing, USA, 2012.
- J. Krumm, Ubiquitous Computing Fundamentals. Chapman and Hall/CRC, USA, 2009.
- A. Anttiroiko, “Towards Citizen-Centered Local e-Government – The Case of the City of Tampere”, Idea Group Publishing, vol. 6, pp. 370–372, 2004. http://dx.doi.org/10.4018/978-1-59140-259-6.ch021
- J. Joo and A. Hovav, “The influence of information security on the adoption of web-based integrated information systems: an e- government study in Peru”, Information Technology for Development, vol. 22, pp. 94-116, 2016. http://dx.doi.org/10.1080/02681102.2014.979393
- B. W. Wirtz and O. T. Kurtz. “Determinants of Citizen Usage Intentions in e-Government: An Empirical Analysis”, Public Organization Review, pp. 1-20, 2016. http://dx.doi.org/10.1007/s11115-015-0338-7
- G. Sangeetha and L. Manjunatha Rao, “Modelling of E-governance framework for mining knowledge from massive grievance redressal data”, International Journal of Electrical and Computer Engineering, vol. 6, pp. 367-374, 2016. http://dx.doi.org/10.11591/ijece.v6i1.9019
- A. Djeddi and I. Djilali, “A user centered ubiquitous government design framework”, ACM International Conference Proceeding Series, 2015. http://dx.doi.org/10.13140/RG.2.1.4890.6000
- B. Schneir, “Ubiquitous Surveillance and Security [Keynote]”, IEEE Technology and Society Magazine, vol. 34, no. 7270448, pp. 39-40, 2015. http://dx.doi.org/10.1109/MTS.2015.2461232
- A. Asquer. “E-government, M-government, L-government: Exploring future ICT applications in public administration”, Public Affairs and Administration: Concepts, Methodologies, Tools, and Applications, 2015, vol. 4, pp. 2155-2168. http://dx.doi.org/10.4018/978-1-4666-8358-7.ch11
- K. Malladi, S. Sridharan and L. T. Jayprakash, “Architecting a large- scale ubiquitous e-voting solution for conducting government elections”, International Conference on Advances in Electronics, Computers and Communications, ICAECC 2014, no. 7002445, 2015. http://dx.doi.org/10.1109/ICAECC.2014.7002445
- E. Mello and J. Souza Neto, “A Governance and Management Model for the Public Sector Shared Services Center Based on COBIT 5”. COBIT Focus, ISACA Publishing, no. 3, on site http://www.isaca.org/COBIT/focus/Pages/a-governance-and-management-model-for-the-public-sector-shared-services-center-based-on-cobit5.aspx?utm_campaign=ISACA+Main&cid=sm_1202172&utm_content=1460055833&utm_source=facebook&utm_medium=social&appeal=sm, 2016.
- K. Maes, P. De Bruyn, G. Oorts and P. Huysmans, “On the Imperative Solicitude for Evolvability Evaluation in Value Management”, International Journal of IT/Business Alignment and Governance (IJITBAG), vol. 5, pp. 70-87, 2014. http://dx.doi.org/10.4018/ijitbag.2014070104
- International Organization for Standardization, ISO/IEC 27002:2013, Information technology – Security techniques – Code of practice for information security management, Switzerland, 2013.
- S. Alghamdi, N. Beloff, “Exploring Determinants of Adoption and Higher Utilisation for E-Government: A Study from Business Sector Perspective in Saudi Arabia”, 10th Conference on Information Systems Management, ISM 2015, vol. 5, pp. 1469 – 1479, 2015. http://dx.doi.org/10.15439/2015F257.
- P. Chatzoglou, D. Chatzoudes, S. Symeonidis, “Factors affecting the intention to use e-Government services”, 10th Conference on Information Systems Management, ISM 2015, vol. 5, pp. 1489–1498, 2015. http://dx.doi.org/10.15439/2015F171
- S. Alghamdi, N. Beloff, “Towards a Comprehensive Model for E- Government Adoption and Utilisation Analysis: The Case of Saudi Arabia”, 9th Conference on Information Systems Management, ISM 2014, vol. 2, pp. 1217–1225, 2014. http://dx.doi.org/10.15439/2014F146
- G. Wangen, E. A. Snekkenes, “A Comparison between Business Process Management and Information Security Management”, 1st Workshop on Emerging Aspects in Information Security, EAIS 2014, vol. 2, pp. 901 – 910, 2014. http://dx.doi.org/10.15439/2014F77