Evaluate E-Government Security Strategy by using Fuzzy Logic Techniques

α
Dr. P.V.S.S.Gangadhar
Dr. P.V.S.S.Gangadhar
σ
Sirigiri Pavani
Sirigiri Pavani
ρ
Dr.R.N.Behera
Dr.R.N.Behera
α National Informatics Centre

Send Message

To: Author

Evaluate E-Government Security Strategy  by using Fuzzy Logic Techniques

Article Fingerprint

ReserarchID

E6RY9

Evaluate E-Government Security Strategy  by using Fuzzy Logic Techniques Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

The concept of an e-government system is to provide access to government services anywhere at any time over open networks. This leads to issues of security and privacy in the management of the information systems. Ensuring security of e-government applications and infrastructures is crucial to maintain trust among various departments to store, process and exchange information over the e-government systems. Due to dynamic and continuous threats on egovernment information security, policy makers need to perform evaluation on existing information security strategy as to deliver trusted and confidence e-government services. This paper presents an information security evaluation framework based on fuzzy logic techniques to help policy makers conduct comprehensive assessment of egovernment security strategy.

References

15 Cites in Article
  1. L Zadeh (1965). Fuzzy sets.
  2. L Zadeh (1973). Outline of A New Approach to the Analysis of of Complex Systems and Decision Processes.
  3. L Zadeh (1968). Fuzzy algorithms.
  4. Lotfi Zadeh (1984). Making computers think like people [fuzzy set theory].
  5. S Korner (1967). Laws of thought.
  6. C Lejewski (1967). Jan Lukasiewicz.
  7. J Baldwin (1981). Evidential Reasoning Under Probabilistic and Fuzzy Uncertainties.
  8. W Bandler,L Kohout (1981). Semantics of implication operators and fuzzy relational products.
  9. M Eschbach,J Cunnyngham (1984). Call for papers: International symposium on fuzzy information processing in artificial intelligence and operational research.
  10. F Eshragh,E Mamdani (1981). A general approach to linguistic approximation.
  11. Xiaohong Gan (2008). Research on Risk Aversion of E-government Network Security.
  12. Jin-Fu Wang (2009). E-government Security Management: Key Factors and Countermeasure.
  13. Irfan Syamsuddin,Junseok Hwang (2010). A new fuzzy MCDM framework to evaluate e-government security strategy.
  14. (2009). RISK-TAKING PROPENSITY AND INFORMATION SECURITY COMPLIANCE BEHAVIOR IN GOVERNMENT WORKERS.
  15. M Goncalves (1999). Firewalls A Complete Guide.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Dr. P.V.S.S.Gangadhar. 2012. \u201cEvaluate E-Government Security Strategy by using Fuzzy Logic Techniques\u201d. Global Journal of Computer Science and Technology - G: Interdisciplinary GJCST-G Volume 12 (GJCST Volume 12 Issue G10): .

Download Citation

Issue Cover
GJCST Volume 12 Issue G10
Pg. 23- 32
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Version of record

v1.2

Issue date

July 31, 2012

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 10313
Total Downloads: 2632
2026 Trends
Related Research

Published Article

The concept of an e-government system is to provide access to government services anywhere at any time over open networks. This leads to issues of security and privacy in the management of the information systems. Ensuring security of e-government applications and infrastructures is crucial to maintain trust among various departments to store, process and exchange information over the e-government systems. Due to dynamic and continuous threats on egovernment information security, policy makers need to perform evaluation on existing information security strategy as to deliver trusted and confidence e-government services. This paper presents an information security evaluation framework based on fuzzy logic techniques to help policy makers conduct comprehensive assessment of egovernment security strategy.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Evaluate E-Government Security Strategy by using Fuzzy Logic Techniques

Dr. P.V.S.S.Gangadhar
Dr. P.V.S.S.Gangadhar
Sirigiri Pavani
Sirigiri Pavani
Dr.R.N.Behera
Dr.R.N.Behera

Research Journals