Reference Hub12
Security and Privacy Issues in Cloud-Based E-Government

Security and Privacy Issues in Cloud-Based E-Government

Copyright: © 2016 |Pages: 30
ISBN13: 9781466686298|ISBN10: 1466686294|EISBN13: 9781466686304
DOI: 10.4018/978-1-4666-8629-8.ch012
Cite Chapter Cite Chapter

MLA

Susanto, Heru, and Mohammad Nabil Almunawar. "Security and Privacy Issues in Cloud-Based E-Government." Cloud Computing Technologies for Connected Government, edited by Zaigham Mahmood, IGI Global, 2016, pp. 292-321. https://doi.org/10.4018/978-1-4666-8629-8.ch012

APA

Susanto, H. & Almunawar, M. N. (2016). Security and Privacy Issues in Cloud-Based E-Government. In Z. Mahmood (Ed.), Cloud Computing Technologies for Connected Government (pp. 292-321). IGI Global. https://doi.org/10.4018/978-1-4666-8629-8.ch012

Chicago

Susanto, Heru, and Mohammad Nabil Almunawar. "Security and Privacy Issues in Cloud-Based E-Government." In Cloud Computing Technologies for Connected Government, edited by Zaigham Mahmood, 292-321. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-8629-8.ch012

Export Reference

Mendeley
Favorite

Abstract

Cloud computing services have grown rapidly over the years. Government agencies are also interested in cloud-based provision for their E-government processes. Despite the advantages of cloud-related technologies, there are many security issues as well that fall into several categories of breaches with serious impacts. All these breaches have serious legal and reputational implications. Therefore, governments need to ensure that inherent security threats can be neutralized to ensure that data or information stored in the cloud are well protected. It is imperative for cloud-based e-government (CB-eGov) to use an information security management system (ISMS) to effectively manage CB-eGov. The purpose of this chapter is to discuss how cloud computing can be incorporated in an e-government implementation to improve its efficiency without compromising information security. As such, the government needs to take special care in ensuring security, privacy, and confidentiality of information stored in the cloud.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.