Theoretical Model for e-Government Information Security Assesement, A Requirement for Passive Defense.

Article Type:
Research/Original Article (دارای رتبه معتبر)
Abstract:

E</strong>mbedding the direction of all matters, processes and activities with the information society in the context of Information and Communication Technology (ICT)  is a kind of movement towards safe IT Governance. If this process to be executed permanently and sustainable in the framework of vision, it can be a competitive advantage for achieving the ultimate goals of the document of vision, especially in science and technology section the Infrastructure of e-government includes the basic requirements of information society and IT Governance. The purpose of this research is to present a valid and theoretical model for e-government information security assessment as a basic and prerequisite for passive defense in the field of IT and production, storage, processing, retrieval and exchange of information. In this work, by addressing newest best practice and successful experiences in this field and reviewing outputs, outcomes and challenges of laws, regulations, programs, projects, strategic documents and comprehensive plans, the appropriate framework in different dimensions, requirements, drivers and  barriers will be presented. Then the parameters and criterias of model are deposited to experts in the public and private sectors to test their validity, reliability and validation. For assessing validity, accuracy and reliability of model, First, we should collect the rate of parameters and elements which assigned by selected experts via questionnaire in the form of a table. Second, calculating total score of each parameter by using geometric mean, then based on experts view, the parameters relations with the higher degree of importance, accuracy are collected and the result is inserted in the interaction table. Using DEMATEL method, decision about hierarchy of influence, importance and priority ranking of the basic elements and parameters of the proposed model will be made. The result of this process will be a valid theoretical model for Iran e-government information security assessment which is approved by ICT and Passive Deffence experts.

Language:
Persian
Published:
Emergency Management, Volume:8 Issue: 1, 2019
Pages:
5 to 23
magiran.com/p2052778  
دانلود و مطالعه متن این مقاله با یکی از روشهای زیر امکان پذیر است:
اشتراک شخصی
با عضویت و پرداخت آنلاین حق اشتراک یک‌ساله به مبلغ 1,390,000ريال می‌توانید 70 عنوان مطلب دانلود کنید!
اشتراک سازمانی
به کتابخانه دانشگاه یا محل کار خود پیشنهاد کنید تا اشتراک سازمانی این پایگاه را برای دسترسی نامحدود همه کاربران به متن مطالب تهیه نمایند!
توجه!
  • حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران می‌شود.
  • پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانه‌های چاپی و دیجیتال را به کاربر نمی‌دهد.
In order to view content subscription is required

Personal subscription
Subscribe magiran.com for 70 € euros via PayPal and download 70 articles during a year.
Organization subscription
Please contact us to subscribe your university or library for unlimited access!