Font Size: a A A

Electronic Government Information Security Problems And Countermeasures Research In Our Country

Posted on:2013-11-22Degree:MasterType:Thesis
Country:ChinaCandidate:K SunFull Text:PDF
GTID:2246330395953000Subject:Administrative Management
Abstract/Summary:PDF Full Text Request
Information security is the basis and guarantee of the e-government run, e-government information security has become an inevitable requirement of e-government construction. Although our construction of e-government information security in recent years gained rapid development, but still faces many difficulties in the process of building and implementation of the same, especially in information security, there are still many problems, which requires that we should protection of e-government information security. Compared with the government information technology application and development of more developed countries, the development of China’s Government Online Project is still in its infancy, the absorption learn from the international community to promote the successful experience of government information and improve our e-government development and the level of information has important practical significance. This article from e-government information security analysis of e-government information security problems and causes, draws on the experience of foreign e-government information security. Obtained the degree of information technology in China is still not high enough, the means of information management is still relatively weak, citizens awareness of information security is still relatively weak, to ensure the safe and reliable operation of e-government must be a profound understanding of e-government environment, the correct deal with information security technology, information security management, the relationship between information security legislation, as well as citizens’ information security awareness. To build a relatively safe security of e-government system.
Keywords/Search Tags:E-government, Information Security, Problem, Strategy
PDF Full Text Request
Related items