The Influence of Cybersecurity Attacks on E-Governance

The Influence of Cybersecurity Attacks on E-Governance

Imdad Ali Shah, Riyaz Ahamed Ariyaluran Habeeb, Samina Rajper, Areeba Laraib
Copyright: © 2022 |Pages: 19
DOI: 10.4018/978-1-7998-9624-1.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The use of e-government is growing as the world is progressively becoming more interconnected. However, data security systems must be designed to address new and effective vulnerabilities that are increasing due to emerging technological innovations. In the dynamic and ever-changing world, the issues and challenges of protecting information infrastructure are growing. Due to various vulnerabilities in the system, these networks are vulnerable to cyber-attack. As a result, it is critical to speed security efforts that include application software and infrastructure to provide an efficient governance system without the risk of being rigged. It has been observed during review of associated articles that limited studies have been done on e-governance and cyber-attacks. The cyber-attacks influence e-governance and damage public trust. The main objective of this chapter is to review the last 15 years of associated research articles, and the result will be a comparison of every five years. The findings provide potential recommendations and solutions.
Chapter Preview
Top

1. Introduction

Improvement of the government’s service and its efficiency have to increase. One of the most significant revolutions has been increased advancement of IT and improving the functioning of the government. Different applications e-government are functioning, putting a greater reliance on cyberspace, an area of “business” that few people are familiar with, particularly in the sphere of digital security (Razuleu, 2018). The practice of making the networks that make up cyberspace secure against invasions is known as cybersecurity. Through identifying interferences, the goal is to protect information confidentiality, availability, and integrity. The changing risk landscape, on the other hand, necessitates a more dynamic strategy. The government establishes a cyber-security plan and the government’s flexible approach to solving cybersecurity concerns (Nzimakwe, 2018). Modern cities are viewed as a collection of main elements such as quality of life and socioeconomic development. Several important issues must be considered in the establishment and management of smart cities. These criteria were used to create a framework that conveys a more advanced understanding of efforts that have been made. Social, administration, economic, and legal dimensions are all significant pillars variables figure 1 (Nautiyal et al., 2018), (Pal, 2019) (Froehlich et al., 2020).

We hope that this chapter makes a complete overview last fifteen years associated on 
cyber-attacks. The primary object of this study is too focused following objectives:

  • i.

    Based on current literature, our peer-review will depict the relationship and associate challenges and security issues.

  • ii.

    Overview on e-governance and influence of cybersecurity

  • iii.

    To provide discussion, actual findings, and recommendations.

  • iv.

    Overview cybersecurity attacks on e-government

Complete Chapter List

Search this Book:
Reset