Academia.eduAcademia.edu

Outline

E-Government Information Security Trust Assessment Model

2016, International Journal of Research Studies in Computer Science and Engineering

https://doi.org/10.20431/2349-4859.0302005

Abstract

The establishment of trust in e-government information security is of prominent importance for the full use of the actual potential of e-government. In this article, the trust creation mechanism to e-government information security is analyzed, and the model for the assessment of trust is suggested. The model is based on integration of reputation values calculated according to trust data collected from different sources by taking into consideration the weight coefficients.

References (10)

  1. Alguliev R, Imamverdiyev Y, Yusifov F. Some conceptual views on information security of the society. J Comm Comp. 2012;9:644-648.
  2. Schwester R. Examining the barriers to e-government adoption. El J E-Gov. 2009;7(1):113-122.
  3. Colesca SE. Increasing e-trust: A solution to minimize risk in e government adoption. J Ap Quant Meth. 2009;4(1):31-44.
  4. Rousseau D, Sitkin S, Burt R, Camerer C. Not so different after all: a cross-discipline view of trust. Ac Manag Rev. 1998;23(3):393-404.
  5. Grandison T, Sloman M. A survey of trust in internet applications. IEEE Comm Surv Tutor. 2000;3(4):2-16.
  6. ISO/IEC TR 15443-1:2012 Information technology -Security techniques -Security assurance framework -Part 1: Introduction and concepts. 2012.
  7. Jøsang A. Artificial reasoning with subjective logic. Proceedings of AWCR. 1997;48:1-17.
  8. Marsh S. Formalizing trust as a computational concept. PhD thesis. Stirling: University of Stirling; 1994.
  9. Firdhous M, Ghazali O, Hassan S. Trust management in cloud computing: a critical review. Int J Adv ICT Emerg Reg. 2011;4(2):24-36.
  10. Huynh TD, Jennings NR, Shadbolt NR. An integrated trust and reputation model for open multi- agent systems. Aut Ag Multi-Ag Sys. 2006;13(2):119-154.