Font Size: a A A

Management Of E-government Information Security

Posted on:2015-01-01Degree:MasterType:Thesis
Country:ChinaCandidate:L DingFull Text:PDF
GTID:2266330425496532Subject:Public administration
Abstract/Summary:PDF Full Text Request
With the rise of computer networks and modern communications technology,informationization and internetization have now become the important features of the present eraand extends to almost all areas of social life, and people are enjoying the convenience brought bythem. Meanwhile, the rapid development of information technology also provides technicalsupport to promote government reform, government and academics in many countries are alsocommitted to research and development of e-government.In this background, the majority of countries, including developing countries, are activelyestablishing their e-government under the influence of government e-government informationtechnology of developed countries. The popularity of e-government applications greatlyimproved the efficiency of the office party and government organs, e-government is graduallyproviding strong support to the economic and social development of countries. However, theinformation process is the " double-edged sword " that bringing a series of information securityissues while promoting scientific and technological developments.Currently, the government, which is responsible for national information security, is also thebiggest victim of cyber attacks, and almost all of the information security issues directly point toit. Therefore, the way to maintain the security of government information and create a betterenvironment for social progress and economic development has become an important task of allgovernments. At this moment, China’s e-government information security management system isstill quite informal and lacks of an overall strategy on a national level. The actual managementefforts of e-government and the implementation and supervision of relavent policy are notenough.Parts of the department’s regulations overemphasis self-restraint and ignore the subjectiveinitiative throughout its systematic organization of government. Thus, we research mainlypointed out the importance of good management of information security by comparing thetechnology and management, and found out the limitations existed in Chinese e-governmentinformation security management system by contrasting the current situation of e-govement indomestic and abroad. And finally put foward suggestions on making e-government informationsecurity management security system with Chinese characteristics to promote its healthy andsustainable development.From the perspective of public management, this paper attempts to analyze China’se-government information security management and find information on all aspects affecting thesecurity of confidential factors using systems management theory and starting from the aspects of the system construction, internal and external environment, personnel management andfacilities, etc. This paper aims at integrating computer network security and information securitymanagement through computer knowledge, network technology, public management,information security technology theory and " Secrets Act ", etc. And making suggestions aboutthe way to accelerate development and implementation of e-government information disclosureby combining advanced experience in China and abroad.The article is discussed in five parts:Part I: Elaborating the background and making a brief introduction on the status and resultsof the study on information security management issues, including the research objectives,research methods, and the desired objectives.Part II: briefly introduce the basic conception about research of information securityconfidential management of the electronic government affairsPart III: A brief analyse of both subject and object of e-government information securitymanagement, as well as the current situation and existing problems.Part IV: Elaborating the effectiveness achieved and problems and shortcomings exsited inChina’s information security by combining the analysis of the case of Snowdon leaks and thestatus quo of China’s e-government information security.Part V:The author combined practical work and made specific countermeasures andsuggestions towards e-government information security management system from a practicalperspective.
Keywords/Search Tags:E-Government, Information Security, confidentiality management
PDF Full Text Request
Related items