Cybersecurity Issues and Challenges for E-Government During COVID-19: A Review

Cybersecurity Issues and Challenges for E-Government During COVID-19: A Review

Imdad Ali Shah
Copyright: © 2022 |Pages: 36
DOI: 10.4018/978-1-7998-9624-1.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cyber-attacks can steal information by applying different methods and activities of cyber criminals, thereby destroying data, computer programs, and networking on one or more computers. There is an increase in new technology among users, and it provides them with more convenience. On the other hand, cyber-attacks are increasing dramatically today. The world is completely focused on creating social distancing between people. During the WHO-recommended COVID-19 pandemic, billions of people around the world are working from home, with shops and businesses closed. In their investigation of the environment, researchers have uncovered a notable type of cybercrime that has an impact on society and businesses. The pandemic has accelerated the transition of government employees and businesses to an actual workplace ecosystem. Dramatic changes in the workplace have created new and multi-layered challenges in dealing with cybersecurity risks and threats. Cyber-attacks can create problems that are detrimental to the economy, human privacy, and national security. These attacks have different perspectives on the problem and need to be understood first. In this chapter, the authors highlight several essential concerns and challenges facing e-government development as well as different departments that provide e-services. They also focus on and peer evaluate the major concerns and challenges facing e-government growth from a holistic perspective, offering methodologies and policy recommendations to address them in a complete and inclusive manner.
Chapter Preview
Top

1. Introduction

The COVID-19 pandemic has brought together public health and cybersecurity in unprecedented ways, revealing underlying problems and ignoring warnings that have plagued both sectors of the United States for decades. By providing fast data and allowing digital communication to the e-business (McKibbin & Fernando, 2020),(Rodela et al., 2020),(Ahmad, 2020). The government is re-using the information in the appropriate report and is taking advantage of the benefits of communication electronic transaction procedures. Electronic information has efficiently provided transaction services to the different parties (Lallie et al., 2021),(Samtani et al., 2020),(Razaque et al., 2019),(Williams et al., 2020). In particular, it is a modernization mechanism and plays a significant role in saving costs. In this system, there is no need to meet face-to-face for information and settlement. This is a national emergency and collectively steps are being taken by the world’s forums and organizations to face this disease until they get an accurate vaccine for it and can smoothly run life. In this situation, the WHO recommended creating social distance between the people. Billions of people around the world are working from home and operating businesses from home, such as financial transactions, buying and selling, shopping, etc. At the moment, the world is still reeling from the COVID-19 attacks and their widespread effects on business operations, as well as rising threats to many aspects such as the economy, politics, health, and security (Brohi et al., 2020; He et al., 2021; Hiscox, 2019; Khan, Brohi, & Zaman, 2020; Weil & Murugesan, 2020). Which could occur anywhere in the world, could result in massive economic losses, and that the pandemic has changed the way organizations and government departments operate. They are operating online activities and instruction from home. E-governance is being speedily implemented all over the world to give seamless facilities to the citizens. While threats and attacks on organizations and digital data are on the rise, Indonesia has predicted future threats and risks. It needs a huge investment to deal with this virus, especially in health (Carrapico & Farrand, 2020; Ferreira & Cruz-Correia, 2021; Wiggen, 2020; Wijayanto & Prabowo, 2020; World Health Organization, 2020). It is very important to estimate the current gap, strengthen health structure, funding, and management, and increase research measurements and evidence-based strategy making. Securing information and data is essential to government and private organizations. The detailed report of GESTR 2019 stated that 42% of endpoints are insecure (Burrell, 2020; Karpenko et al., 2021; Liang et al., 2017; Mensah, 2019; Okereafor & Adebola, 2020). Cybersecurity experts have estimated that $450 billion annually is the total universal cost of malicious hacking activities. CTI experts have suggested that investigation and examination are necessary for the international online hacker community (Gupta & Agarwal, 2017; Luh et al., 2017; Peng et al., 2017; Saleem et al., 2017; Williams et al., 2020). Medical information plays a significant part in human health. The primary object of this research is to conduct a comprehensive survey in connection with possible cyber-attacks and find proper solutions to these types of threats and attacks the world has estimated the cost of cybersecurity attacks and threats, while the number of threats and attacks has bigger increased after COVID-19 (Huang et al., 2018; Khandpur et al., 2017; Stellios et al., 2018; Tounsi & Rais, 2018). The large literature is available in the prospect of health care industries on threats technological vulnerabilities. The major revolutions are the advancement of information technology and the improvement of government functions. Different applications of e-government are working, more reliant on cyberspace, a lesser-known area of “business” especially in digital security (Ding et al., 2018), (Ramadan et al., 2021), (Scarfone et al., 2009). The practice of keeping the networks that make-up cyberspace safe from intrusion is called cybersecurity. Integrity of information. On the other hand, the changing risk landscape requires a more dynamic strategy. Governments develop cybersecurity plans and flexible approaches for governments to address cybersecurity issues (Bhuvana & Vasantha, 2021; Cradduck, 2019; Hussain et al., 2021; Lim, Abdullah, Jhanjhi et al, 2019; Ullah et al., n.d.). A modern city is seen as a collection of major elements such as quality of life and socio-economic development. The construction and management of smart cities must consider several important issues. These standards are used to create a framework to gain a deeper understanding of the efforts that have been made. Social, administrative, economic, and legal dimensions are all important pillar variables. The government has caught up with the technological revolution. The digitalization of public administration is inextricably linked to security issues. Digitization can be seen as one of the tools of effective governance, but it also has its own set of problems (Gaur et al., 2021; Lim, Abdullah, & Jhanjhi, 2019; Lim, Abdullah, Jhanjhi et al, 2019). This article will explore the current status and issues of cyber threats to Hungarian urban e-administrative services and practices. Hungary's fragmented municipal system limits the country's economic strength (Humayun, Niazi, Jhanjhi et al, 2020). The experiments and opportunities are huge. We take a look at the rules and we can see that they were created to develop horizontally integrated electronic management. Legislation governing the system has been passed in recent years, and the previous ban on electronic administration has been lifted. Hungarian e-governance practices differ in some respects (Almusaylim & Jhanjhi, 2020; Amir Latif et al., 2020; Khan, Jhanjhi, Humayun et al, 2020; Kumar et al., 2021; Lee et al., 2021). A new problem arises from the expanded e-administration, which partly addresses the radical nationalization and centralization of activities previously managed by municipalities. Municipal e-government systems are mainly established by large cities. Their functioning is likely to improve, so municipal cybersecurity is becoming an increasingly important part of Hungarian public administration. Apply e-government and communication technologies to government functions to improve transparency and accountability of government services. Increase the efficiency of various agencies and improve government interaction with business and industry. This often requires the effective use of ICTs for specific purposes by individual government entities. Loss or disclosure of confidential data and electronic resources of government departments and other corporate entities can be caused by various threat actors or agents (Najmi et al., 2021),(NSKT Global, n.d.),(Zong et al., 2019). Further research has been conducted on a variety of intentional and unintentional threats and their consequences Figure 1 shows the strategies for the chapter.

Complete Chapter List

Search this Book:
Reset