Expression #1 of SELECT list is not in GROUP BY clause and contains nonaggregated column 'n.id' which is not functionally dependent on columns in GROUP BY clause; this is incompatible with sql_mode=only_full_group_by
Expression #1 of SELECT list is not in GROUP BY clause and contains nonaggregated column 'n.id' which is not functionally dependent on columns in GROUP BY clause; this is incompatible with sql_mode=only_full_group_by STATE-OF-THE-ART ANALYSIS OF THE RESEARCHES ON E-GOVERNMENT INFORMATION SECURITY MANAGEMENT (azerb.) - İTP Jurnalı
AZERBAIJAN NATIONAL ACADEMY OF SCIENCES
STATE-OF-THE-ART ANALYSIS OF THE RESEARCHES ON E-GOVERNMENT INFORMATION SECURITY MANAGEMENT (azerb.)
Yadigar N. Imamverdiyev

Ensuring of information security and personal data protection in e-government environment are the main challenges of e-government technology. Along with the development and expansion of e-services of the e-government, these problems are becoming more acute. Reliable information security requires a systematic approach, flexible and appropriate to the conditions management model. This article analyzes the current state of research in the field of e-government information security management  and selects actual problems for further research. (pp. 19-26) 

Keywords:e-government, e-service, information security, information security management
References
  • United Nations E-Government Survey 2012: E-government for the people. UN Department of Economic and Social Affairs, United Nations New York, 2012, 160 p.
  • Pina V., Torres L., Acerete B., Are ICTs promoting government accountability?: A comparative analysis of e-governance developments in 19 OECD countries // Critical Perspectives on Accounting, 2007, vol. 18, no. 5, pp. 583-602.
  • Ndou V.M., E-government for developing countries: opportunities and challenges // The Electronic Journal on Information Systems in Developing Countries, 2004, vol. 18, no. 1, pp. 1-24.
  • Norris D. F., Moon M. J., Advancing e-government at the grassroots: tortoise or hare? // Public Administration Review, 2005, vol. 64, no. 1, pp. 65-75.
  • Conklin W.A., Barriers to adoption of e-government / Proc. of 40th Annual Hawaii International Conference on System Sciences (HICSS), 2007, pp.1-8.
  • Ebrahim Z., Irani Z., E-government adoption: architecture and barriers // Business Process Management Journal, 2005, vol. 11, no. 5, pp. 589-611.
  • Belanger F., Carter L., Trust and risk in e-government adoption // Journal of Strategic Information Systems, 2008, vol. 17, no. 2, pp. 165-176.
  • Tassabehji R., Inclusion in e-government: a security perspective / eGovernment Workshop’05 (eGOV05), 2005, pp.1-9.
  • Saint-Germain R., Information security management best practice based on ISO/IEC 17799 // Information Management Journal, 2005, vol. 39, no. 4, pp. 60-66.
  • Dhillon G., Backhouse J., Information systems security management in the new millennium // Comm. ACM, 2000, vol. 43, no. 7, pp. 125-128.
  • Wiander T., Savola R., Karppinen K., Rapeli M., Holistic information security management in multi organization environment / Proc. of the IEEE International Symposium on Industrial Electronics, 2006, vol. 4, pp. 2942 – 2947.
  • Əliquliyev R.M., İmamverdiyev Y.N., E-dövlətin informasiya təhlükəsizliyi: aktual tədqiqat istiqamətləri // İnformasiya Cəmiyyəti Problemləri, № 1, s. 3-13, 2010.
  • Von Solms B., Information security - the fourth wave // Computers & Security, 2006, vol. 25, no. 3, pp. 165-168.
  • ISO/IEC 13335-1:2004 Information technology - Security techniques - Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security management, 2004.
  • ISM3 Consortium: Information security management maturity model, Consortium version 2.10, 2007.
  • Hong K.-S., Chi Y.-P., Chao L., Tang J.-H., An integrated system theory of information security management // Information Management & Computer Security, 2003, vol. 11, no. 5, pp. 243-248.
  • ISO/IEC 27001:2005 Information technology - Security techniques - Information security management systems – Requirements. 2005, 34 p.
  • Eloff J., Eloff M., Information security management – a new paradigm / Proc. of the annual research conference of the South African Institute of Computer Scientists and Information Technologists on enablement through technology, 2003, pp. 130-136.
  • Joshi J., Ghafoor A., Aref W.G., Spafford E.H., Digital government security infrastructure design challenges // IEEE Computer, 2001, vol. 34, no. 2, pp.66-72.
  • Mehta M., Singh S., Lee Y., Security in e-services and applications / Network Security: Current Status and Future Directions, Edited by Douligeris C. & Serpanos D.N., John Wiley & Sons, 2007, pp.157-178.
  • Yee G, Personalized security for e-services / Proc. of the First International Conference on Availability, Reliability and Security (ARES’06), 2006, pp.140-147.
  • Hof S., Reichstädter P., Securing e-Government / EGOV 2004, 2004, pp. 336-341.
  • Wimmer M., von Bredow B., E-government: aspects of security on different layers / Proc. of the 12th International Workshop on Database and Expert Systems Applications, 2001, pp.350-355.
  • Stibbe M., E-government security // Infosecurity Today, 2005, vol. 2, no. 3, pp.8-10.
  • Smith S., Jamieson R., Determining key factors in e-government information system security // Information Systems Management, 2006, vol. 23, no. 2, pp.23-32.
  • Wang J., E-government security management: key factors and countermeasure / Proc. of 5 th International Conference on Information Assurance and Security, 2009, pp. 483-486.
  • Benabdallah S., Guemara-ElFatmi S., Boudriga N., Security issues in e-government models: what governments should do? / IEEE International Conference on Systems, Man and Cybernetics, 2002, pp.398-403.
  • Gritzalis S., Lambrinoudakis C., Security requirements of e-government services: an organizational framework / Proc. of International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA’02), 2002, vol. 1, pp.127-131.
  • Lambrinoudakis C., Gritzalis S., Dridi F., Pernul G., Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy // Computer Communications, 2003, vol. 26, no. 16, pp. 1873-1883.
  • http//www.webocrat.com
  • Posch R., Leitold H., Identification and confidentiality for e-government / International Workshop on Certification and Security in E-Services (CSES 2002), IFIP (International Federation for Information Processing), vol. 127, 2003, pp. 267-279.
  • Wang H., Huang J.Z., Qu Y., Xie J., Web services: problems and future directions // Web Semantics: Science, Services and Agents on the World Wide Web, 2004, vol. 1, no. 3, pp. 309-320.
  • Zeng Z., Chen T., Zhang Y., E-government information security in the web environment based on role based access control technology / Proc. of the International Seminar on Business and Information Management (ISBIM), 2008, pp. 210-213.
  • Nnolim A., Steenkamp A., An architectural and process model approach to information security management // Information Systems Education Journal, 2008, vol. 6, no. 31, pp. 1-27.
  • Karokola G., Kowalski S., Yngström L., Towards an information security maturity models for secure e-government services: a stakeholders view / Proc. of the 5th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011), 2011, pp. 58-73.
  • Shayan A., Abdi B., Qeisari M., Identification of the required security practices during e-government maturity / Proc. of the 6th İnternational Conference Global Security, Safety, and Sustainability (ICGS3 2010), 2010, pp. 250-262.