Security Analysis of National E-Government Based on Information Systems

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 217)


The security of information system directly related to national e-government’s security, and also the guarantee of national government agencies and state secrets; this paper starts with the current security risks of information system and e-government affairs which combining the classification of governmental information resources, the characteristics of national e-government affairs, content infrastructure, and the attributes of functional bureaus. After the integration of each bureau’s business, a classification security program of information system is proposed to do multilevel security control, multilateral security control, and software security control. Finally, compared with the present situation of the information system, several security advices are put forward to safeguard the national e-government.


Security risk Information system E-government Classification security program 


  1. 1.
    The EDMS Project Team (New Mexico). Proposed EDMS/ERMS application standards. Retrieved on April 13, 2009, from 006_06_09.pps
  2. 2.
    Interoperability and Integration Committee. Using governance models to achieve data integration. Retrieved on April 15, 2009, from
  3. 3.
    Stockdale M, Morris H (2009) BS 10008:2008. Evidential weight and legal admissibility of electronic information–specification. Records Manage J 19(2):74–83Google Scholar
  4. 4.
    New Mexico. Proposed Edms/Erms Application standards. Retrieved on April 20, 2009, from http://www.ecmedms.
  5. 5.
    Heeks R, Bailur S (2006) Analyzing e-Government research: Perspectives, philosophies, theories, methods, and practice. Government Inf Q 24(2):243–265CrossRefGoogle Scholar
  6. 6.
    Carter L, Weerakkody V (2008) E-government adoption: a cultural comparison. Inf Syst Front 10(4):473–482CrossRefGoogle Scholar
  7. 7.
    Holliday I, Yep R (2005) E-government in China. Publ Administration Dev 25(3):239–249CrossRefGoogle Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  1. 1.Department of Information ManagementWuhan UniversityWuhanChina

Personalised recommendations