Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Security Threats

Handbook of Research on Information Communication Technology Policy: Trends, Issues and Advancements
Software or programs that tend to hinder proper information dissemination in e-governance environment.
Published in Chapter:
Information and Communication Technology Security Network: A Sure Solution to E-Governance Security Problems
Ogochukwu Thaddaeus Emiri (Delta State University, Nigeria) and Chukwunweike Gracious Omede (Delta State University, Nigeria)
DOI: 10.4018/978-1-61520-847-0.ch024
Abstract
This chapter examines the problems of e-governance data/information security. In order to adequately achieve this objective, the chapter after the introduction, deals with the information and communication technology (ICT) security network, followed by effects of the changing nature of security threats in e-governance. The use of ICT internet security balancing requirements for achieving effective e-governance security network is considered. The chapter observes that strong security for internet transactions (information communication) is one of the last technical hurdles to be overcome in achieving true e-governance, enabling the broadest range of online government services while streamlining bureaucracy and providing efficient alternatives to in-person contact between government agencies and their constituents. The chapter argues that the problems of information security threats, if not tackled effectively, can hinder e-governance implementation success. The use of ICT internet security balancing requirements for achieving effective e-governance security network is recommended.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Agent-Based Intrusion Detection in Wireless Networks
Are tools, techniques, or methods that can cause unwanted incidents, and potentially result in damaging the network.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR