Featured articles
Updating the IEEE e-Government index of experts for 2014
IEEE Computer Society e-Government is updating their index of e-Government experts for 2014 (for conferences committees, workgroups, etc.). If you are interested in being part of this list you can download the document and send it to us with your info required (you only need a couple of minutes to fill it). The document can be downloaded from this link within our "Links" page. |
UN General Assembly Plenary Adopts "Right to Privacy in the Digital Age" Resolution
The Plenary of the Sixty-eighth General Assembly of United Nations has adopted on December 18th 2013 the Resolution ‘Right to Privacy in the Digital Age". By the terms of that text, the Assembly established, for the first time, that "human rights should prevail irrespective of the medium, and therefore the need for protection both offline and online". General Assembly calls upon Member States to "review their procedures, practices and legislation on the surveillance of communications, their interception and collection of personal data, including mass surveillance, with a view to upholding the right to privacy by ensuring the full and effective implementation of all relevant obligations under international human rights law". This document has been adopted by UN some days later of publication of the Report and Recommendations of The US President’s Review Group on Intelligence and Communications Technologies titled “Liberty and Security in a Changing World”. IEEE Computer Society e-Government |
Smart Territories' Governance (I): ...When Interoperability and Big Data meet Open Government
Presentation of the IEEE Computer Society e-Government experts, Prof. Francisco Falcone & Carlos E. Jimenez, on May 10th 2013 in Tarragona, Spain, invited by the Computer Engineering and Mathematics Department (DEIM) of the Rovira i Virgili University. Speakers explain their holistic perspective of key technologies and its aligment's importance, in Public Organizations. Documents. |
e-Government: Security Threats
Hector D. Puyosa P.
IEEE eGovernment STC 1. INTRODUCTION The effective management of information security is a key factor as willingness, of the different users (citizens and other parties), to use e-Government services will heavily depend on the trust they have on the data security of this service. 2. INFORMATION SECURITY The process approach for information security management system, ISMS, presented in [3] encourages its users to emphasize the importance of:
Data security requires a set of security requirements: Example of organizational and technical measures to prevent unauthorized access and processing are shown in [4]:
Despite trusted security and privacy measures constitutes a crucial success factor for e-Government that has not been yet addressed as UN 2012 Survey shows only 20% of national portals clearly indicate the presence of security features. Europe is leading with 44% countries displaying secure links on their national websites but survey do not consider regional and local websites and neither the many decentralized public organization web portals. 3. INFORMATION SECURITY THREATS
There are simple and well-known web application vulnerabilities that could be avoided but e- Government webs are still vulnerable. A research work [7] found 81.6% e-Government web sites from 212 different countries were vulnerable to Cross Site Scripting (XSS) and Structured Query Language (SQL) injection. SQL injection attack can compromise data integrity while XSS is a vulnerability, which attackers may exploit to steal users' information. Specific security measures like firewalls, intrusion detection software, encryption, and secure networks must be defined designed and implemented for government agencies to provide the appropriate levels of security. But information security must also take into consideration the people and processes that rely on the systems. Employees with daily access to e-Government systems must be trained on cybersecurity and this aspect must become part of their job. A study by the Department of Computer Science at Columbia University [8] shows how the human factor influences cybersecurity policies and how that work could be used to train government employees to improve the security posture of government departments and agencies.
4. CONCLUSIONS REFERENCES |
Presentation IEEE e-Government Initiative
Presentation IEEE e-Government InitiativeOn 20 September was held a Conference in Madrid which presents IEEE e-Government Initiative. The presentation took place within a technical session on collaboration between IEEE Spain Section, network e-Madrid, the IEEE Technology Management Council (TMC) Spain chapter, IEEE Spain Education Society chapter and IEEE Student Branch at the UNED. At the end of the presentation an interesting Question Time resulted in an analysis of the current situation on e-Government(the video is in Spanish with English subtitles, that they have been included automatically via voice recognition and automatic simultaneous translation).
egov madrid subt 20092012 from stc_egov on Vimeo. |
Introducing IEEE eGovernment STC
The IEEE eGovernment STCThe IEEE Computer Society’s Special Technical Community on eGovernment aims at carrying out more coordinated and better work on eGovernment within the IEEE. The IEEE eGovernment STC is a new worldwide and transversal division within IEEE and, particularly, it is part of the IEEE Computer Society. This is an open community, related specially to public organizations’ technological areas. Some of the tasks this IEEE division could carry out are (but not limited to):
What does eGovernment mean for the IEEE eGovernment STC? We know and understand the differences between the distinct classifications related to technology adoption in public organizations. However, in order to be inclusive, this STC adopts a broader eGovernment view, a transversal and horizontal one that takes into account both the strategic and the operative perspectives. Thus, among other, eGovernment includes infrastructure, management, rules and specific requirements, different areas under the eGovernment umbrella, or public policies (or strategies) related to technology adoption. It also focuses on :
Some examples?The management of technology, innovation and engineering are core disciplines in STC on eGovernment. Some specific areas the group will work on are (but not limited to): 1. The design of systems, standards, architectures and configurations, including Government systems and eGovernment interoperability. How should we prepare eGovernment systems to be interoperable, which standards are key for this purpose? 2. The design of the infrastructure and underlying architecture of eGovernment systems so that all of the technology pieces work together 3. Scalability and maintainability, keeping in mind that selling companies may go out of business but that public organizations’ systems have to keep running (this requires special procurement policies in order to get source code, a good configuration control, documentation, standard development platforms, etc.) 4. Project design, taking into account the real and long-term costs, including ongoing licenses and support fees. 5. Protection and hosting of personal data, resistance to hacking and break-in, resilience to failures and emergencies (how to prevent a nation’s databases from turning off if an earthquake takes place?) 6. Change management in public organizations. How do you convince citizens and users to trust and use the new systems instead of standing in line at the old offices as they have always done? 7. IT and information systems strategic alignment with public policies, principles and eGovernment strategies 8. What pieces of the e-system must continue to be duplicated by the “old” methods, and for how long? How to ensure consistency between data and documents processed through the e-system and the “old” system? Mission, Vision and Field of InterestOur perspective is integrated and aligned with the IEEE Computer Society and IEEE view. Right now, we are in the process of developing it, but these are some of the key elements it will include.
More information about theIEEE Computer Society STC |