Amenazas de los gobiernos electrónicosel desafío de la e-seguridad

  1. Esther García-Río
  2. Pedro Baena-Luna
  3. Pedro Palos-Sánchez
  4. Mariano Aguayo-Camacho
Revista:
Revista de Pensamiento Estratégico y Seguridad CISDE

ISSN: 2529-8763

Año de publicación: 2022

Volumen: 7

Número: 2

Páginas: 87-107

Tipo: Artículo

Otras publicaciones en: Revista de Pensamiento Estratégico y Seguridad CISDE

Resumen

El fenómeno del gobierno electrónico (e-gov) ha cambiado la forma en que se relacionan las administraciones públicas (aaPP) con la ciudadanía en general. esta ciudadanía adquiere un mayor protagonismo y participación gracias a gobiernos abiertos basados en los principios de transparencia, integridad, rendición de cuentas y participación. esta circunstancia ha dado lugar a un mayor uso de las tecnologías de la información y la comunicación, acarreando en algunos casos la proliferación de delitos electrónicos y ciberdelincuencia en el ámbito de la intromisión y el robo de datos personales sensibles. las aaPP que asumen modelos de gobierno abierto deben incluir la protección de la privacidad de sus usuarios entre sus prioridades a la hora diseñar e implementar los distintos servicios. el éxito de un e-gov va a depender de la consecución de los objetivos vinculados con la seguridad de la información, la confidencialidad, la integridad, la disponibilidad y la confianza. este artículo presenta los resultados de la revisión bibliométrica de los términos e-gov y seguridad electrónica en el período 2000-2022. Puede constatarse el auge de estos fenómenos en los últimos años en la producción académica de carácter científico. esto, sin duda, se encuentra en consonancia con su actualidad y relevancia actual tanto para la ciudadanía como para el sector público.

Referencias bibliográficas

  • abu-shanab, e. (2014). antecedents of trust in e-government services: an empirical test in jordan. transforming government: People, Process and Policy, 8(4), 480–499. https://doi.org/10.1108/tg-08-2013-0027.
  • alawneh, a.; al-refai, H.; Batiha, K. (2013). measuring user satisfaction from e-government services: lessons from jordan. government information Quarterly, 30(3), 277–288. https://doi.org/10.1016/j.giq.2013.03.001.
  • alharbi, n., Papadaki, m., & dowland, P. (2017). the impact of security and its antecedents in behaviour intention of using e-government services. Behaviour and information technology, 36(6), 620–636. https://doi.org/10.1080/0144929X.2016.1269198.
  • alzahrani, l.; al-Karaghouli, W.; Weerakkody, v. (2017). analysing the critical factors influencing trust in e-government adoption from citizens’ perspective: a systematic review and a conceptual framework. international Business review, 26(1), 164–175. https://doi.org/10.1016/j.ibusrev.2016.06.004.
  • amend, j.; Kaiser, j.; uhlig, l.; urbach, n.; völter, F. (2021). What do We really need? a systematic literature review of the requirements for Blockchain-Based e-government services. in F. ahlemann, r. schütte, & s. stieglitz (eds.), innovation through information systems (pp. 398–412). cham: springer international Publishing.
  • Batubara, F. r.; ubacht, j.; janssen, m. (2018). challenges of blockchain technology adoption for e-government: a systematic literature review. acm international conference Proceeding series. https://doi.org/10.1145/3209281.3209317.
  • Bélanger, F.; carter, l. (2008). trust and risk in e-government adoption. journal of strategic information systems, 17(2), 165–176. https://doi.org/10.1016/j.jsis.2007.12.002.
  • Bertot, j. c.; gorham, u.; jaeger, P. t.; sarin, l. c.; choi, H. (2014). Big data, open government and e-government: issues, policies and recommendations. information Polity, 19(1–2), 5–16. https://doi.org/10.3233/iP-140328.
  • Bertot, j. c.; jaeger, P.; Hansen, d. (2012). the impact of polices on government social media usage: issues, challenges, and recommendations. government information Quarterly, 29(1), 30–40. https://doi.org/10.1016/j.giq.2011.04.004.
  • Bertot, j. c.; jaeger, P. t.; grimes, j. m. (2010). using icts to create a culture of transparency: e-government and social media as openness and anti-corruption tools for societies. government information Quarterly, 27(3), 264–271. https://doi.org/10.1016/j.giq.2010.03.001.
  • Bhattacharya, d.; gulla, u.; gupta, m. P. (2012). e-service quality model for indian government portals: citizens’ perspective. journal of enterprise information management, 25(3), 246–271. https://doi.org/10.1108/17410391211224408.
  • carter, l.; Bélanger, F. (2005). the utilization of e-government services: citizen trust, innovation and acceptance factors. information systems journal, 15(1), 5–25. https://doi.org/10.1111/j.1365-2575.2005.00183.x.
  • choejey, P.; Fung, c. c.; Wong, K. W.; murray, d.; Xie, H. (2015). cybersecurity Practices for e-government: an assessment in
  • Bhutan. the 10th international conference on e-Business (inceB2015), (november), 1–8.
  • ciborra, c. (2005). interpreting e-government and development: efficiency, transparency or governance at a distance? information technology and People, 18(3), 260–279. https://doi.org/10.1108/09593840510615879.
  • davis, F. d. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. mis Quarterly, 319– 340.
  • Fletcher, P. d. (2002). the government paperwork elimination act: operating instructions for an electronic government. international journal of Public administration, 25(5), 723–736. https://doi.org/10.1081/Pad-120003296.
  • gilbert, d.; Balestrini, P.; littleboy, d. (2004). Barriers and benefits in the adoption of e-government. international journal of Public sector management, 17(4), 286–301. https://doi.org/10.1108/09513550410539794.
  • Halchin, l. e. (2004). electronic government: government capability and terrorist resource. government information Quarterly, 21(4), 406–419. https://doi.org/10.1016/j.giq.2004.08.002.
  • Hu, P. j.-H.; Brown, s. a.; thong, j. y. l.; chan, F. K. y.; tam, K. y. (2009). determinants of service quality and continuance intention of online services: the case of etax. journal of the american society for information science and technology, 60(2), 292–306. https://doi.org/10.1002/asi.20956.
  • Kaisara, g.; Pather, s. (2011). the e-government evaluation challenge: a south african Batho Pele-aligned service quality approach. government information Quarterly, 28(2), 211–221. https://doi.org/10.1016/j.giq.2010.07.008.
  • Kim, s.; lee, H. (2006). the impact of organizational context and information technology on employee knowledge-sharing capabilities. Public administration review, 66(3), 370–385. https://doi.org/10.1111/j.1540-6210.2006.00595.x.
  • Krishna, B.; sebastian, m. (2021). examining the relationship between e-government development, nation’s cyber-security commitment, business usage and economic prosperity: a cross-country analysis. information and computer security, 29(5), 737–760. https://doi.org/10.1108/ics-12-2020-0205.
  • lallmahomed, m. Z. i.; lallmahomed, n.; lallmahomed, g. m. (2017). Factors influencing the adoption of e-government services in
  • lambrinoudakis, c.; gritzalis, s.; dridi, F.; Pernul, g. (2003). security requirements for e-government services: a methodological approach for developing a common PKi-based security policy. computer communications, 26(16), 1873–1883. https://doi.org/10.1016/s0140-3664(03)00082-3.
  • layne, K.; lee, j. (2001). developing fully functional e-government: a four stage model. government information Quarterly 18,122–136.
  • li, X.; Hess, t. j.; valacich, j. s. (2008). Why do we trust new technology? a study of initial trust formation with organizational information systems. journal of strategic information systems, 17(1), 39–71. https://doi.org/10.1016/j.jsis.2008.01.001.
  • lian, j.-W. (2015). critical factors for cloud based e-invoice service adoption in taiwan: an empirical study. international journal of information management, 35(1), 98–109. https://doi.org/10.1016/j.ijinfomgt.2014.10.005.
  • lizano-mora, H.; Palos-sanchez, P. r.; aguayo-camacho, m. (2021). the evolution of business process management: a bibliometric analysis. ieee access, 9, 51088–51105. https://doi.org/10.1109/access.2021.3066340.
  • lópez-robles, j.-r.; guallar, j.; otegi-olaso, j.-r.; gamboa-rosales, n.-K. (2019). el profesional de la información (ePi): análisis bibliométrico y temático (2006-2017). Profesional de la información, 28(4), 1–24.
  • mahmood, m.; osmani, m.; sivarajah, u. (2014). the role of trust in e-government adoption: a systematic literature review. 20th americas conference on information systems, amcis 2014, 1–16.
  • napitupulu, d. (2021). a Bibliometric analysis of e-government research digitalcommons @ university of nebraska - lincoln a Bibliometric analysis of e-government research darmawan napitupulu. (july), 6–11.
  • onu. (2020). encuesta sobre e-gobierno, 2020, gobierno digital en la década de acción para el desarrollo sostenible incluye anexo con respuesta al covid-19. in asuntos económicos y sociales. (https://publicadministration.un.org/egovkb/Portals/egovkb/documents/un/2020-survey/2020 un e-government survey (spanish edition).pdf).
  • onumo, a.; gullen, a.; ullah-awan, i. (2017). empirical study of the impact of e-government services on cybersecurity development.
  • Proceedings - 2017 7th international conference on emerging security technologies, est 2017, 85–90. https://doi.org/10.1109/est.2017.8090404.
  • Parra-olivares, j. e. (2011). modelo de análisis de correspondencias múltiples. revista de ciencias sociales, 2(2). https://doi.org/10.31876/rcs.v2i2.24801.
  • Perez-morago, H.; merino-angulo, g. (2020). Bibliometría: herramienta para la identificación, 151–165.
  • rabii, a.; saliha, a.; Khadija, o. t.; roudies, o. (2020). information and cyber security maturity models: a systematic literature review. information & computer security,28(4) 627-644. https://doi.org/10.1108/ics-03-2019-0039.
  • srisusilawati, P.; rusydiana, a. s.; sanrego, y. d.; tubastuvi, n. (2021). Biblioshiny r application on islamic microfinance research. library Philosophy and Practice, 2021.
  • sundberg, l. (2019). electronic government: towards e-democracy or democracy at risk? safety science, 118, 22–32. https://doi.org/10.1016/j.ssci.2019.04.030.
  • teo, t. s. H.; srivastava, s. c.; jiang, l. (2008). trust and electronic government success: an empirical study. journal of management information systems, 25(3), 99–132. https://doi.org/10.2753/mis0742-1222250303.
  • terzi, m. (2019). e-government and cyber terrorism: conceptual Framework, theoretical discussions and Possible solutions. turkish journal of tesam academy, 6(1), 213–247.
  • urbizagastegui, r. (1999). la ley de lotka y la literatura de bibliometría. investigación Bibliotecológica: archivonomía, Bibliotecología e información, 13(27), 125–141. https://doi.org/10.22201/iibi.0187358xp.1999.27.3913.
  • venkatesh, v.; chan, F. K. y.; thong, j. y. l. (2012). designing e-government services: Key service attributes and citizens’ preference structures. journal of operations management, 30(1–2), 116–133. https://doi.org/10.1016/j.jom.2011.10.001.
  • venkatesh, v.; davis, F. d. (2000). a theoretical extension of the technology acceptance model: Four longitudinal field studies. management science, 46(2), 186–204.
  • venkatesh, v.; morris, m. g.; davis, g. B.; davis, F. d. (2003). user acceptance of information technology: toward a unified view. mis Quarterly 27(3), 425–478.
  • vieira, e. s.; gomes, j. a. n. F. (2009). a comparison of scopus and Web of science for a typical university. scientometrics, 81(2), 587– 600. https://doi.org/10.1007/s11192-009-2178-0.
  • Wen, X.; niu, X.; ji, l.; tian, y. (2009). a weak blind signature scheme based on quantum cryptography. optics communications, 282(4), 666–669. https://doi.org/10.1016/j.optcom.2008.10.025.
  • Wirtz, B. W.; Weyerer, j. c. (2017). cyberterrorism and cyber attacks in the Public sector: How Public administration copes with digital threats. international journal of Public administration, 40(13), 1085–1100. https://doi.org/10.1080/01900692.2016.1242614.
  • yang, l.; elisa, n.; eliot, n. (2019). Privacy and security aspects of e-government in smart cities. smart cities cybersecurity and Privacy 89-102. https://doi.org/10.1016/B978-0-12-815032-0.00007-X.
  • Zhang, H.; tang, Z.; jayakar, K. (2018). a socio-technical analysis of china’s cybersecurity policy: towards delivering trusted egovernment services. telecommunications Policy, 42(5), 409–420. https://doi.org/10.1016/j.telpol.2018.02.004.
  • Zhao, j. j.; Zhao, s. y.; Zhao, s. y. (2010). opportunities and threats: a security assessment of state e-government websites. government information Quarterly, 27(1), 49–56. https://doi.org/10.1016/j.giq.2009.07.004.
  • Zissis, d.; lekkas, d. (2011). securing e-government and e-voting with an open cloud computing architecture. government information Quarterly, 28(2), 239–251. https://doi.org/10.1016/j.giq.2010.05.010.