Information Security Issues With E-Governance

##plugins.themes.academic_pro.article.main##

Mudassir Peeran
Dr. A.R. Mohamed Shanavas

Abstract

The rise of e-government has been quite possibly the most striking advancements of the web. As the Internet upheld advanced networks develop, and accepting that they do to be sure develop to join people around the nation (and globally), they present the public governments with various difficulties and openings. In an e-government project, a generous measure of documentation is done like upkeep of land records, police records, etc. Every office is basic so that solitary approved individuals get into the organization and access the data. A comprehension of the data security innovation and the requirement for its usage is key for more secure, made sure about and smooth working of e-administration undertaking.

##plugins.themes.academic_pro.article.details##

How to Cite
Peeran, M., & Shanavas, D. A. M. . (2022). Information Security Issues With E-Governance. International Journal of Next-Generation Computing, 13(3). https://doi.org/10.47164/ijngc.v13i3.649

References

  1. Machine learning techniques for diagnosis of lower gastrointestinal cancer: A systematic review. Iranian Red Crescent Medical Journal. BENIWAL, V. S. and SIKKA, K. 2017. E-governance in india: Prospects and challenges. International Journal of Computer and Communication Technology. Guo, J. 2022. Construction of carbon audit and verification system framework based on intelli­gent wireless sensor network. Mobile Information Systems 2022. Gupta, R., Muttoo, S. K., and Pal, S. K. 2020. Regional e-governance development index for developing nations. Digital Government: Research and Practice 1.
  2. Gupta, R., Muttoo, S. K., and Pal, S. K. 2021. Privacy data security policy of medical cloud platform based on lightweight algorithm model. Scientific Programming 2021. Gupta, S. and Gupta, M. K. 2021a. A comparative analysis of deep learning approaches for DOI: https://doi.org/10.1155/2021/5543714
  3. predicting breast cancer survivability. Archives of Computational Methods in Engineering. Gupta, S. and Gupta, M. K. 2021b. Prostate cancer prognosis using multi-layer perceptron and class balancing techniques. Gupta, S. and Gupta, M. K. 2022a. A comprehensive data-level investigation of cancer diagnosis on imbalanced data. Computational Intelligence 38. Gupta, S. and Gupta, M. K. 2022b. A review on machine learning techniques for the diagnosis of cancer. Lecture Notes in Electrical Engineering 832. DOI: https://doi.org/10.1111/coin.12452
  4. Jin, G., Song, L., Shi, X., Scherpelz, J., and Lu, S. 2017. Malwaretextdb: A database for annotated malware articles. In ACL 2017 -55th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference (Long Papers),.
  5. Kumar, R. and Nair, R. 2016. Multi-cryptosystem based privacy-preserving public auditing for regenerating code based cloud storage. International Journal of Computer Applications 12. McGuinness, D. and Simon, A. 2018. Information disclosure, privacy behaviours, and attitudes regarding employer surveillance of social networking sites. IFLA Journal 44. DOI: https://doi.org/10.1177/0340035218785389
  6. Mishra, A. K., Puthal, D., and Tripathy, A. K. 2021. Graphcrypto: Next generation data security approach towards sustainable smart city building. Sustainable Cities and Society Vol.72. DOI: https://doi.org/10.1016/j.scs.2021.103056
  7. Nair, R. and Bhagat, A. 2019a. An application of blockchain in stock market. IGI . Nair, R. and Bhagat, A. 2019b. Feature selection method to improve the accuracy of classifica­tion algorithm. International Journal of Innovative Technology and Exploring Engineering. DOI: https://doi.org/10.4018/978-1-7998-0186-3.ch006
  8. Nair, R., Nair, P., and Dwivedi, V. K. 2020. Fpga on cyber-physical systems for the implementation of internet of things. IGI . DOI: https://doi.org/10.4018/978-1-5225-9806-0.ch004
  9. Nair, R., Sharma, P., and Singh, D. K. 2020. Security attacks in internet of things. Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications. DOI: https://doi.org/10.1002/9781119670087.ch14
  10. Singh, S. and Silakari, S. 2009. A survey of cyber attack detection systems. IJCSNS Inter­national Journal of Computer Science and Network Security 9.