Evaluate E-Government Security Strategy by using Fuzzy Logic Techniques

Article ID

E6RY9

Evaluate E-Government Security Strategy by using Fuzzy Logic Techniques

Dr. P.V.S.S.Gangadhar
Dr. P.V.S.S.Gangadhar
Sirigiri Pavani
Sirigiri Pavani
Dr.R.N.Behera
Dr.R.N.Behera
DOI

Abstract

The concept of an e-government system is to provide access to government services anywhere at any time over open networks. This leads to issues of security and privacy in the management of the information systems. Ensuring security of e-government applications and infrastructures is crucial to maintain trust among various departments to store, process and exchange information over the e-government systems. Due to dynamic and continuous threats on e-government information security, policy makers need to perform evaluation on existing information security strategy as to deliver trusted and confidence e-government services. This paper presents an information security evaluation framework based on fuzzy logic techniques to help policy makers conduct comprehensive assessment of egovernment security strategy.

Evaluate E-Government Security Strategy by using Fuzzy Logic Techniques

The concept of an e-government system is to provide access to government services anywhere at any time over open networks. This leads to issues of security and privacy in the management of the information systems. Ensuring security of e-government applications and infrastructures is crucial to maintain trust among various departments to store, process and exchange information over the e-government systems. Due to dynamic and continuous threats on e-government information security, policy makers need to perform evaluation on existing information security strategy as to deliver trusted and confidence e-government services. This paper presents an information security evaluation framework based on fuzzy logic techniques to help policy makers conduct comprehensive assessment of egovernment security strategy.

Dr. P.V.S.S.Gangadhar
Dr. P.V.S.S.Gangadhar
Sirigiri Pavani
Sirigiri Pavani
Dr.R.N.Behera
Dr.R.N.Behera

No Figures found in article.

Dr. P.V.S.S.Gangadhar. 2012. “. Global Journal of Computer Science and Technology – G: Interdisciplinary GJCST-G Volume 12 (GJCST Volume 12 Issue G10): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 12 Issue G10
Pg. 23- 32
Classification
Not Found
Article Matrices
Total Views: 10217
Total Downloads: 2705
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Evaluate E-Government Security Strategy by using Fuzzy Logic Techniques

Dr. P.V.S.S.Gangadhar
Dr. P.V.S.S.Gangadhar
Sirigiri Pavani
Sirigiri Pavani
Dr.R.N.Behera
Dr.R.N.Behera

Research Journals