E-Government Information Security Trust Assessment Model
2016, International Journal of Research Studies in Computer Science and Engineering
https://doi.org/10.20431/2349-4859.0302005…
6 pages
1 file
Sign up for access to the world's latest research
Abstract
The establishment of trust in e-government information security is of prominent importance for the full use of the actual potential of e-government. In this article, the trust creation mechanism to e-government information security is analyzed, and the model for the assessment of trust is suggested. The model is based on integration of reputation values calculated according to trust data collected from different sources by taking into consideration the weight coefficients.
Related papers
Implementation of e-government requires certain level of transparency and development in order to be successful and trusted. With the improvement of national strategies, regulations and legal framework as a starting point, the competent institutions should take into account security improvements as the most important aspect of achieving trusted e- government. The main goal of achieving the interconnection between different national governmental bodies and services at the transnational level is achieved by exchange of identification and authentication credentials. In this paper the authors introduce the main difficulties the EU countries have in implementing national e-government and achieving the interoperability between e-services.
Active Citizen Participation in E-Government
Although trust aspects have been investigated in e-commerce context, the e-government field is still significantly lacking from empirical studies that explore trust in e-government from the citizen's perspective. The lack of trust in e-government in developing countries is another persuasive impetus for conducting this study. The few recent studies investigating citizens' trust in e-government are conducted in developed countries. This study employed a qualitative approach (focus groups) to gain in depth understanding of the citizen's perception of e-government adoption. E-government initiative in Saudi Arabia is the main focus of this research. Based on the literature review, the key antecedent factors that affect citizen trust in e-government are identified, and a research model is build. Based on the results of the analysis of three focus groups, managerial recommendations are provided.
2010 43rd Hawaii International Conference on System Sciences, 2010
Trust in e-government is of vital importance for the effective adoption and use of electronic public services. Understanding the concept of trust and the different types it involves in the e-government context is a key challenge for both research and practice. Aiming to address this need, this paper proposes a parsimonious yet comprehensive typology of trust in e-government. Trust in e-government is analyzed into seven different types conceptualized around the different targets they are related to. Each trust type is further delineated into its composing dimensions and the approach by which it can enabled. The paper continues to present an example of the practical applicability of the proposed typology by showing how the identified types of trust have been addressed in an online taxation portal.
2006
The advent of the internet has resulted in the exponential growth in availability of information as well as the sources from which this information can be gathered. Information has become an asset as well as a vital tool for decision making processes. In order to gain new information, a business is often required to give some information, it is already in possession of, up. This information could be of a sensitive nature and a business needs to know if the source it is exchanging information with can be trusted. Trust models have been proposed to solve this dilemma. Trust models use logical rules to analyze the nature of interactions. An agent, which is a computer running a trust model, analyzes other agents it comes into contact with and determines a trust level. The trust level is a single value that controls all interactions occurring between participating agents. Values above a certain threshold are seen as trusted and values below are seen as distrusted. The problem is that these trust models were found to be wide and varied, with no common set of features between them, making it difficult to determine which models address which particular issues of the concept of trust. This paper proposes a set of criteria that is to be used to evaluate various trust models in order to identify the issues addressed by specific models. Four main categories into which these criteria fall have been identified. Due to space constraints one of these is discussed in detail followed by an example analysis of a trust model in order to illustrate how these criteria are used during trust model evaluation.
2008
The advent of the internet has resulted in the exponential growth in availability of information as well as the sources from which this information can be gathered. Information has become an asset as well as a vital tool for decision making processes. In order to gain new information, a business is often required to give some information, it is already in possession of, up. This information could be of a sensitive nature and a business needs to know if the source it is exchanging information with can be trusted. Trust models have been proposed to solve this dilemma. Trust models use logical rules to analyze the nature of interactions. An agent, which is a computer running a trust model, analyzes other agents it comes into contact with and determines a trust level. The trust level is a single value that controls all interactions occurring between participating agents. Values above a certain threshold are seen as trusted and values below are seen as distrusted. The problem is that these trust models were found to be wide and varied, with no common set of features between them, making it difficult to determine which models address which particular issues of the concept of trust. This paper proposes a set of criteria that is to be used to evaluate various trust models in order to identify the issues addressed by specific models. Four main categories into which these criteria fall have been identified. Due to space constraints one of these is discussed in detail followed by an example analysis of a trust model in order to illustrate how these criteria are used during trust model evaluation.
2006
The advent of the internet has resulted in the exponential growth in availability of information as well as the sources from which this information can be gathered. Information has become an asset as well as a vital tool for decision making processes. In order to gain new information, a business is often required to give some information, it is already in possession of, up. This information could be of a sensitive nature and a business needs to know if the source it is exchanging information with can be trusted. Trust models have been proposed to solve this dilemma. Trust models use logical rules to analyze the nature of interactions. An agent, which is a computer running a trust model, analyzes other agents it comes into contact with and determines a trust level. The trust level is a single value that controls all interactions occurring between participating agents. Values above a certain threshold are seen as trusted and values below are seen as distrusted. The problem is that the...
Social, administrative and technological developments have made government electronic. E-government has paved the way for the services provided by governments today. However, one should not forget that, e-government has some problems and disabilities as well as many opportunities. Among these problems, trust issue makes it harder to adopt and widespread e-government implementations. In this sense, trust is a key concept for the governments and public agencies providing information and services through e-government. There are many factors affecting trust in e-government. The subject of this study is the effect of -among the other factors- trust propensity and trust in technology on trust in e-government implementations. In the study e-government concept, importance of trust in e-government implementations, trust propensity and trust in technology concept will be discussed briefly, and some dimensions of the issue will be put forward through the literature. In the field study part, the results of the questionnaire study made in Konya will be evaluated. In this concept, divergently from other studies, the aim of this study is to discuss trust dimension of e-government and try to put forward trust in e-government and effect of the factors; trust propensity and trust in technology on this trust, using the sample of Konya.
International Journal of Technology Diffusion, 2012
Many governments around the world aim seriously to make their services available online and deliver it to their citizens in professional and secure manner. E-government services aims to improve and facilitate the communication between government and citizens by increasing the usage of Information and Communications Technology (ICT) in government operations. It will provide all government services in electronic form to all citizens in a timely, easy, high quality and effective manner with great productivity and time savings. However, user acceptance is one of the essential keys for adoption and success of e-government application and services. Many studies emphasize that trust is one of the important factors in the adoption studies of e-government. This paper examines the effect of trust as independent variable of the unified theory of acceptance and use of technology (UTAUT) model on user’s acceptance and use of e-government services in the Kingdom of Saudi Arabia (KSA). Based on th...
PACIS 2007 Proceedings, 2007
The process of building consumer trust in e-Commerce is based on the presence of trust features or trust attributes in the websites. Trust attributes are usually presented to the consumer by some clues on the homepage. For example, the clue 'contact us' will be linked to the trust attribute 'company address'. Consumers may examine e-Commerce websites for the existence of trust attributes. However, to date, which trust attributes contribute to the website's trustworthiness and which trust attributes give more value to consumers has not been adequately explored. Therefore, the purpose of the paper is: (1) to look for relevant trust attributes that should be placed in e-Commerce websites and (2) to identify the importance ranking of trust attributes that contribute to the trustworthiness of e-Commerce website. Five e-Commerce trust models were used for deriving the trust attributes. An online survey that received 1230 respondents was carried out to investigate the importance ranking of important trust attributes. This paper contributes to the discussion on how to build trust in e-Commerce for various stakeholders that include consumers, business organizations, system developers, and also to the researchers. Table 2: Categories of trust attributes Categories of trust attributes
Technological advancements have enabled governments across the globe to explore online facilities in offering a range of services to their citizens. One necessary element of offering quality online services is to understand citizens' views and perception towards using such services in contrast with the traditional service methods that they are accustomed to. Therefore, periodical performance assessment of online services is critical to any e-government. In this paper, the authors attempt to explore the underlying factors and various dimensions of e-government service delivery, and propose a performance assessment framework that will assess the quality and trust dimensions of the e-services from citizens' standpoint. A systematic study of the existing performance assessment models such as SERVQAUAL, E-S-Qual and D & M model, has been carried out in establishing the basis for conceptualising a new framework called e-GSQTA (egovernment Service Quality and Trust Assessment Framework). The proposed framework will be validated by using the e-tax service offered by the Indian government in subsequent studies.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
References (10)
- Alguliev R, Imamverdiyev Y, Yusifov F. Some conceptual views on information security of the society. J Comm Comp. 2012;9:644-648.
- Schwester R. Examining the barriers to e-government adoption. El J E-Gov. 2009;7(1):113-122.
- Colesca SE. Increasing e-trust: A solution to minimize risk in e government adoption. J Ap Quant Meth. 2009;4(1):31-44.
- Rousseau D, Sitkin S, Burt R, Camerer C. Not so different after all: a cross-discipline view of trust. Ac Manag Rev. 1998;23(3):393-404.
- Grandison T, Sloman M. A survey of trust in internet applications. IEEE Comm Surv Tutor. 2000;3(4):2-16.
- ISO/IEC TR 15443-1:2012 Information technology -Security techniques -Security assurance framework -Part 1: Introduction and concepts. 2012.
- Jøsang A. Artificial reasoning with subjective logic. Proceedings of AWCR. 1997;48:1-17.
- Marsh S. Formalizing trust as a computational concept. PhD thesis. Stirling: University of Stirling; 1994.
- Firdhous M, Ghazali O, Hassan S. Trust management in cloud computing: a critical review. Int J Adv ICT Emerg Reg. 2011;4(2):24-36.
- Huynh TD, Jennings NR, Shadbolt NR. An integrated trust and reputation model for open multi- agent systems. Aut Ag Multi-Ag Sys. 2006;13(2):119-154.