Amenazas de los gobiernos electrónicosel desafío de la e-seguridad

  1. Esther García-Río
  2. Pedro Baena-Luna
  3. Pedro Palos-Sánchez
  4. Mariano Aguayo-Camacho
Revista:
Revista de Pensamiento Estratégico y Seguridad CISDE

ISSN: 2529-8763

Ano de publicación: 2022

Volume: 7

Número: 2

Páxinas: 87-107

Tipo: Artigo

Outras publicacións en: Revista de Pensamiento Estratégico y Seguridad CISDE

Resumo

The phenomenon of electronic government (e-gov) has changed how public administrations (PPas) relate to citizens in general. this citizenry acquires greater protagonism and participation thanks to open governments based on the principles of transparency, integrity, accountability, and participation. this has led to increased use of information and communication technologies, in some cases resulting in the proliferation of electronic crime and cybercrime around intrusion and theft of sensitive personal data. Public administrations that adopt open government models must include the protection of their users' privacy among their priorities when designing and implementing different services. the success of an e-gov will depend on the achievement of objectives related to information security, confidentiality, integrity, availability, and trust. this article presents the results of a bibliometric review of the terms e-gov and e-security in the period 2000- 2022. the rise of these phenomena in recent years in scientific academic production can be observed. this is undoubtedly in line with their current relevance for both citizens and the public sector.

Referencias bibliográficas

  • abu-shanab, e. (2014). antecedents of trust in e-government services: an empirical test in jordan. transforming government: People, Process and Policy, 8(4), 480–499. https://doi.org/10.1108/tg-08-2013-0027.
  • alawneh, a.; al-refai, H.; Batiha, K. (2013). measuring user satisfaction from e-government services: lessons from jordan. government information Quarterly, 30(3), 277–288. https://doi.org/10.1016/j.giq.2013.03.001.
  • alharbi, n., Papadaki, m., & dowland, P. (2017). the impact of security and its antecedents in behaviour intention of using e-government services. Behaviour and information technology, 36(6), 620–636. https://doi.org/10.1080/0144929X.2016.1269198.
  • alzahrani, l.; al-Karaghouli, W.; Weerakkody, v. (2017). analysing the critical factors influencing trust in e-government adoption from citizens’ perspective: a systematic review and a conceptual framework. international Business review, 26(1), 164–175. https://doi.org/10.1016/j.ibusrev.2016.06.004.
  • amend, j.; Kaiser, j.; uhlig, l.; urbach, n.; völter, F. (2021). What do We really need? a systematic literature review of the requirements for Blockchain-Based e-government services. in F. ahlemann, r. schütte, & s. stieglitz (eds.), innovation through information systems (pp. 398–412). cham: springer international Publishing.
  • Batubara, F. r.; ubacht, j.; janssen, m. (2018). challenges of blockchain technology adoption for e-government: a systematic literature review. acm international conference Proceeding series. https://doi.org/10.1145/3209281.3209317.
  • Bélanger, F.; carter, l. (2008). trust and risk in e-government adoption. journal of strategic information systems, 17(2), 165–176. https://doi.org/10.1016/j.jsis.2007.12.002.
  • Bertot, j. c.; gorham, u.; jaeger, P. t.; sarin, l. c.; choi, H. (2014). Big data, open government and e-government: issues, policies and recommendations. information Polity, 19(1–2), 5–16. https://doi.org/10.3233/iP-140328.
  • Bertot, j. c.; jaeger, P.; Hansen, d. (2012). the impact of polices on government social media usage: issues, challenges, and recommendations. government information Quarterly, 29(1), 30–40. https://doi.org/10.1016/j.giq.2011.04.004.
  • Bertot, j. c.; jaeger, P. t.; grimes, j. m. (2010). using icts to create a culture of transparency: e-government and social media as openness and anti-corruption tools for societies. government information Quarterly, 27(3), 264–271. https://doi.org/10.1016/j.giq.2010.03.001.
  • Bhattacharya, d.; gulla, u.; gupta, m. P. (2012). e-service quality model for indian government portals: citizens’ perspective. journal of enterprise information management, 25(3), 246–271. https://doi.org/10.1108/17410391211224408.
  • carter, l.; Bélanger, F. (2005). the utilization of e-government services: citizen trust, innovation and acceptance factors. information systems journal, 15(1), 5–25. https://doi.org/10.1111/j.1365-2575.2005.00183.x.
  • choejey, P.; Fung, c. c.; Wong, K. W.; murray, d.; Xie, H. (2015). cybersecurity Practices for e-government: an assessment in
  • Bhutan. the 10th international conference on e-Business (inceB2015), (november), 1–8.
  • ciborra, c. (2005). interpreting e-government and development: efficiency, transparency or governance at a distance? information technology and People, 18(3), 260–279. https://doi.org/10.1108/09593840510615879.
  • davis, F. d. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. mis Quarterly, 319– 340.
  • Fletcher, P. d. (2002). the government paperwork elimination act: operating instructions for an electronic government. international journal of Public administration, 25(5), 723–736. https://doi.org/10.1081/Pad-120003296.
  • gilbert, d.; Balestrini, P.; littleboy, d. (2004). Barriers and benefits in the adoption of e-government. international journal of Public sector management, 17(4), 286–301. https://doi.org/10.1108/09513550410539794.
  • Halchin, l. e. (2004). electronic government: government capability and terrorist resource. government information Quarterly, 21(4), 406–419. https://doi.org/10.1016/j.giq.2004.08.002.
  • Hu, P. j.-H.; Brown, s. a.; thong, j. y. l.; chan, F. K. y.; tam, K. y. (2009). determinants of service quality and continuance intention of online services: the case of etax. journal of the american society for information science and technology, 60(2), 292–306. https://doi.org/10.1002/asi.20956.
  • Kaisara, g.; Pather, s. (2011). the e-government evaluation challenge: a south african Batho Pele-aligned service quality approach. government information Quarterly, 28(2), 211–221. https://doi.org/10.1016/j.giq.2010.07.008.
  • Kim, s.; lee, H. (2006). the impact of organizational context and information technology on employee knowledge-sharing capabilities. Public administration review, 66(3), 370–385. https://doi.org/10.1111/j.1540-6210.2006.00595.x.
  • Krishna, B.; sebastian, m. (2021). examining the relationship between e-government development, nation’s cyber-security commitment, business usage and economic prosperity: a cross-country analysis. information and computer security, 29(5), 737–760. https://doi.org/10.1108/ics-12-2020-0205.
  • lallmahomed, m. Z. i.; lallmahomed, n.; lallmahomed, g. m. (2017). Factors influencing the adoption of e-government services in
  • lambrinoudakis, c.; gritzalis, s.; dridi, F.; Pernul, g. (2003). security requirements for e-government services: a methodological approach for developing a common PKi-based security policy. computer communications, 26(16), 1873–1883. https://doi.org/10.1016/s0140-3664(03)00082-3.
  • layne, K.; lee, j. (2001). developing fully functional e-government: a four stage model. government information Quarterly 18,122–136.
  • li, X.; Hess, t. j.; valacich, j. s. (2008). Why do we trust new technology? a study of initial trust formation with organizational information systems. journal of strategic information systems, 17(1), 39–71. https://doi.org/10.1016/j.jsis.2008.01.001.
  • lian, j.-W. (2015). critical factors for cloud based e-invoice service adoption in taiwan: an empirical study. international journal of information management, 35(1), 98–109. https://doi.org/10.1016/j.ijinfomgt.2014.10.005.
  • lizano-mora, H.; Palos-sanchez, P. r.; aguayo-camacho, m. (2021). the evolution of business process management: a bibliometric analysis. ieee access, 9, 51088–51105. https://doi.org/10.1109/access.2021.3066340.
  • lópez-robles, j.-r.; guallar, j.; otegi-olaso, j.-r.; gamboa-rosales, n.-K. (2019). el profesional de la información (ePi): análisis bibliométrico y temático (2006-2017). Profesional de la información, 28(4), 1–24.
  • mahmood, m.; osmani, m.; sivarajah, u. (2014). the role of trust in e-government adoption: a systematic literature review. 20th americas conference on information systems, amcis 2014, 1–16.
  • napitupulu, d. (2021). a Bibliometric analysis of e-government research digitalcommons @ university of nebraska - lincoln a Bibliometric analysis of e-government research darmawan napitupulu. (july), 6–11.
  • onu. (2020). encuesta sobre e-gobierno, 2020, gobierno digital en la década de acción para el desarrollo sostenible incluye anexo con respuesta al covid-19. in asuntos económicos y sociales. (https://publicadministration.un.org/egovkb/Portals/egovkb/documents/un/2020-survey/2020 un e-government survey (spanish edition).pdf).
  • onumo, a.; gullen, a.; ullah-awan, i. (2017). empirical study of the impact of e-government services on cybersecurity development.
  • Proceedings - 2017 7th international conference on emerging security technologies, est 2017, 85–90. https://doi.org/10.1109/est.2017.8090404.
  • Parra-olivares, j. e. (2011). modelo de análisis de correspondencias múltiples. revista de ciencias sociales, 2(2). https://doi.org/10.31876/rcs.v2i2.24801.
  • Perez-morago, H.; merino-angulo, g. (2020). Bibliometría: herramienta para la identificación, 151–165.
  • rabii, a.; saliha, a.; Khadija, o. t.; roudies, o. (2020). information and cyber security maturity models: a systematic literature review. information & computer security,28(4) 627-644. https://doi.org/10.1108/ics-03-2019-0039.
  • srisusilawati, P.; rusydiana, a. s.; sanrego, y. d.; tubastuvi, n. (2021). Biblioshiny r application on islamic microfinance research. library Philosophy and Practice, 2021.
  • sundberg, l. (2019). electronic government: towards e-democracy or democracy at risk? safety science, 118, 22–32. https://doi.org/10.1016/j.ssci.2019.04.030.
  • teo, t. s. H.; srivastava, s. c.; jiang, l. (2008). trust and electronic government success: an empirical study. journal of management information systems, 25(3), 99–132. https://doi.org/10.2753/mis0742-1222250303.
  • terzi, m. (2019). e-government and cyber terrorism: conceptual Framework, theoretical discussions and Possible solutions. turkish journal of tesam academy, 6(1), 213–247.
  • urbizagastegui, r. (1999). la ley de lotka y la literatura de bibliometría. investigación Bibliotecológica: archivonomía, Bibliotecología e información, 13(27), 125–141. https://doi.org/10.22201/iibi.0187358xp.1999.27.3913.
  • venkatesh, v.; chan, F. K. y.; thong, j. y. l. (2012). designing e-government services: Key service attributes and citizens’ preference structures. journal of operations management, 30(1–2), 116–133. https://doi.org/10.1016/j.jom.2011.10.001.
  • venkatesh, v.; davis, F. d. (2000). a theoretical extension of the technology acceptance model: Four longitudinal field studies. management science, 46(2), 186–204.
  • venkatesh, v.; morris, m. g.; davis, g. B.; davis, F. d. (2003). user acceptance of information technology: toward a unified view. mis Quarterly 27(3), 425–478.
  • vieira, e. s.; gomes, j. a. n. F. (2009). a comparison of scopus and Web of science for a typical university. scientometrics, 81(2), 587– 600. https://doi.org/10.1007/s11192-009-2178-0.
  • Wen, X.; niu, X.; ji, l.; tian, y. (2009). a weak blind signature scheme based on quantum cryptography. optics communications, 282(4), 666–669. https://doi.org/10.1016/j.optcom.2008.10.025.
  • Wirtz, B. W.; Weyerer, j. c. (2017). cyberterrorism and cyber attacks in the Public sector: How Public administration copes with digital threats. international journal of Public administration, 40(13), 1085–1100. https://doi.org/10.1080/01900692.2016.1242614.
  • yang, l.; elisa, n.; eliot, n. (2019). Privacy and security aspects of e-government in smart cities. smart cities cybersecurity and Privacy 89-102. https://doi.org/10.1016/B978-0-12-815032-0.00007-X.
  • Zhang, H.; tang, Z.; jayakar, K. (2018). a socio-technical analysis of china’s cybersecurity policy: towards delivering trusted egovernment services. telecommunications Policy, 42(5), 409–420. https://doi.org/10.1016/j.telpol.2018.02.004.
  • Zhao, j. j.; Zhao, s. y.; Zhao, s. y. (2010). opportunities and threats: a security assessment of state e-government websites. government information Quarterly, 27(1), 49–56. https://doi.org/10.1016/j.giq.2009.07.004.
  • Zissis, d.; lekkas, d. (2011). securing e-government and e-voting with an open cloud computing architecture. government information Quarterly, 28(2), 239–251. https://doi.org/10.1016/j.giq.2010.05.010.