Ensuring Information Security In The Development Of Electronic Government Systems

Authors

  • Abdjalov Abdijabbar Makhamdievich Ministry of Internal Affairs of the Republic of Uzbekistan Training institute, Associate Professor of the Department of Special Professional Sciences

Keywords:

Electronic Government, Globalization, State Information Service, Data Confidentiality, Information Security

Abstract

This article explores the critical aspects of information security in the development and implementation of electronic government systems. Despite the increasing adoption of e-government initiatives, there is a significant knowledge gap in addressing the specific threats and vulnerabilities these systems face. Utilizing a comprehensive review and analysis of current e-government platforms, this study employs qualitative methods to identify key security challenges and evaluate existing protective measures. The findings reveal a high incidence of data breaches and unauthorized access, underscoring the need for robust security protocols. Results indicate that integrating advanced cryptographic techniques and continuous security audits significantly enhance system resilience. The study's implications highlight the necessity for policymakers and system developers to prioritize information security to safeguard sensitive data and maintain public trust in e-government services.

References

Z. Al-Aly, “High-dimensional characterization of post-acute sequelae of COVID-19,” Nature, vol. 594, no. 7862, pp. 259–264, 2021, doi: 10.1038/s41586-021-03553-9.

J. Baars, “Circular economy strategies for electric vehicle batteries reduce reliance on raw materials,” Nat. Sustain., vol. 4, no. 1, pp. 71–79, 2021, doi: 10.1038/s41893-020-00607-0.

M. Chen, “Recycling End-of-Life Electric Vehicle Lithium-Ion Batteries,” Joule, vol. 3, no. 11, pp. 2622–2646, 2019, doi: 10.1016/j.joule.2019.09.014.

N. Mehta, “Concurrence of big data analytics and healthcare: A systematic review,” Int. J. Med. Inform., vol. 114, pp. 57–65, 2018, doi: 10.1016/j.ijmedinf.2018.03.013.

L. Y. Lin, “Data resource profile: The National Health Insurance Research Database (NHIRD),” Epidemiol. Health, no. 40, 2018, doi: 10.4178/epih.e2018062.

D. P. Thipphavong, “Urban air mobility airspace integration concepts and considerations,” 2018 Aviat. Technol. Integr. Oper. Conf., 2018, doi: 10.2514/6.2018-3676.

J. H. Tseng, “Governance on the drug supply chain via gcoin blockchain,” Int. J. Environ. Res. Public Health, vol. 15, no. 6, 2018, doi: 10.3390/ijerph15061055.

T. Ahram, “Blockchain technology innovations,” 2017 IEEE Technol. Eng. Manag. Soc. Conf. TEMSCON 2017, pp. 137–141, 2017, doi: 10.1109/TEMSCON.2017.7998367.

L. Allen, “Socioeconomic status and non-communicable disease behavioural risk factors in low-income and lower-middle-income countries: a systematic review,” Lancet Glob. Heal., vol. 5, no. 3, 2017, doi: 10.1016/S2214-109X(17)30058-X.

S. Angraal, “Blockchain technology: Applications in health care,” Circ. Cardiovasc. Qual. Outcomes, vol. 10, no. 9, 2017, doi: 10.1161/CIRCOUTCOMES.117.003800.

N. P. Rana, “Citizens’ adoption of an electronic government system: towards a unified view,” Inf. Syst. Front., vol. 19, no. 3, pp. 549–568, 2017, doi: 10.1007/s10796-015-9613-y.

Alekseev D. Vzlomay menya, esli smojesh: kakimi budut glavnye IT-threats in 2023. Ataki zloumyshlennikov vsyo chashche budut nosit okrasku politicheskogo activisma // iz.ru/1438319/dmitrii-alekseev/vzlomai-menia-esli-smozhesh-kakimi-budut-glavnye-it-ugrozy-v-2023-godu

Actual cyberthreats: itogi in 2022 // www.ptsecurity.com/ru-ru/research/analytics/cybersecurity-threatscape-2022/

Iminova N. Issues of ensuring information security in the context of the introduction of electronic government // "Economics and innovative technologies" scientific electronic journal. #3, May-June, 2016. 1-8 p.

Afanasev E. Zaschchita informatsii v usloviyax primeneniya dokumentoorientirovannyx tehnologiy (na primere sistemy «Elektronnoe pravitelstvo») // cyberleninka.ru/article/n/zaschita-informatsii-v-usloviyah-primenenia-dokumentoorientirovannyh -tehnologiy-na-primere-sistemy-elektronnoe-pravitelstvo- 1

Anatskaya A. Zashchita elektronnogo dokumentooborota: Ucheb . p person. - Omsk: SibADI , 2019. - 87 p

Afanasev E. Zaschchita informatsii v usloviyax primeneniya dokumentoorientirovannyx tehnologiy (na primere sistemy «Elektronnoe pravitelstvo») // cyberleninka.ru/article/n/zaschita-informatsii-v-usloviyah-primenenia-dokumentoorientirovannyh -tehnologiy-na-primere-sistemy-elektronnoe-pravitelstvo- 1

Article 31 of the updated Constitution of Uzbekistan stipulates that "everyone has the right to the inviolability of his personal life, to have personal and family secrets, to protect his honor and dignity" // lex.uz/docs/6445145

Bakhtiyorov A. Yuldashev A. Methods of ensuring data confidentiality in the electronic government interactive service // The importance of information and communication technologies in the innovative development of real sectors of the economy. Tashkent - 2017. 36 p.

Jensen J. Zhao . Opportunities and threats: A security assessment of state e-government websites // www.sciencedirect.com/science/article/abs/pii/S0740624X09001099

Afanasev E. Zaschchita informatsii v usloviyax primeneniya dokumentoorientirovannyx tehnologiy (na primere sistemy «Elektronnoe pravitelstvo») // cyberleninka.ru/article/n/zaschita-informatsii-v-usloviyah-primenenia-dokumentoorientirovannyh -tehnologiy-na-primere-sistemy-elektronnoe-pravitelstvo- 1

Yapparov R. Nekotorye problemy zashchity konfidentialsnoy informatsii v sistemakh elektronnogo documentoborota // Pravozashchitnaya i pravoochranitelnaya deyatelnost . Str. 74-80

Downloads

Published

2024-07-29

How to Cite

Abdjalov Abdijabbar Makhamdievich. (2024). Ensuring Information Security In The Development Of Electronic Government Systems. Central Asian Journal of Social Sciences and History, 5(4), 140–146. Retrieved from https://cajssh.casjournal.org/index.php/CAJSSH/article/view/1108

Issue

Section

Articles