IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Information Security Management in Digital Government

Information Security Management in Digital Government
View Sample PDF
Author(s): H. Shih (Coventry University, UK)and C. Li (University of Warwick, UK)
Copyright: 2007
Pages: 4
Source title: Encyclopedia of Digital Government
Source Author(s)/Editor(s): Ari-Veikko Anttiroiko (University of Tampere, Finland)and Matti Malkia (The Police College of Finland, Finland)
DOI: 10.4018/978-1-59140-789-8.ch158

Purchase

View Information Security Management in Digital Government on the publisher's website for pricing and purchasing information.

Abstract

Ensuring security for its information systems, including computers and networks, is a fundamental prerequisite for a digital government to function to the expectation of its people. The security problem can be “visualized” by projecting it onto a three-level hierarchy: management level, system level, and application and data level. The key elements of information security include integrity, confidentiality, availability, authentication and non-repudiation, which have to be taken into account at different levels within the hierarchy. Since there are specific articles in this encyclopedia to address the security issues at the lowest two levels, this article will focus on the management level at the top level of the hierarchy. At the management level, the main emphases are to prevent security breaches from happening and to minimize the impact when security events happen. The decision of security investment and deployment requires clear identification of risks posed to the information systems and feasible cost analyses. In addition, to ensure that the investment and deployment are worthwhile, information security policies and procedures have to be thoughtfully devised and effectively enforced. Therefore, at the management level, risk assessment, cost analysis, policymaking, procedure definition, and policy and procedure enforcement have to be looked into.

Related Content

Serpil Kır Elitaş. © 2023. 11 pages.
Sami Kiraz. © 2023. 14 pages.
Kadir Bendaş. © 2023. 10 pages.
Fatih Değirmenci. © 2023. 15 pages.
Elifnur Terzioğlu. © 2023. 14 pages.
Türker Elitaş. © 2023. 16 pages.
Sudeep Uprety. © 2023. 14 pages.
Body Bottom