Pii: S1058-0530(06)80142-9

نویسنده

  • Rodger Jamieson
چکیده

RIOR TO E-GOVERNMENT, RECORDS and information were stored mainly on paper in files, filing cabinets, and vaults. Paper documents have a degree of separation between the client and the flow, storage, and retrieval of documents. Manual records management systems have established procedures to process and transfer documents through the system. These documents could also be tracked transparently through the organization; hence, if tampered with, the changes would be clearly evident. The security measures required to protect them focused mainly on the physical protection of the document and restricting permissions for people to physically access the records. They were written into polices and procedures and updated over many years. Although the documents could be copied, the paper type, the color, and the size would be difficult to match with or replace the original. Also, copying documents is traditionally a relatively slow process. This provided for documents a completely different degree of security to that of intranetor Internet-based systems, which have the capability for immediately downloading information, giving the client (end user) the ability to copy and retransmit this information in nanoseconds. This vulnerability exists for any organization, whether private or public, that has a Web presence (Straub & Welke, 1998; Backhouse & Dhillon, 2001). Information system security in government has previously concentrated on confidentiality of documents stored electronically (Spinellis et al., 1999). In terms of the public perception of government organizations, security means the protection of records and data that are held for the purpose of recording, administering, and monitoring the actions and policies of government agencies. The rapid growth in the volume of information stored electronically and E-commerce within government may increase the need for security to protect the privacy of this information and prevent fraud. From the public’s perspective, government is seen as one entity; hence, a security problem within one agency may be viewed as a failure of the whole of government process. Therefore, the P STEPHEN SMITH is a research student in the School of Information Systems Technology and Management at the University of New South Wales, Sydney, Australia.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pii: S1058-2746(99)90058-7

were examined arthroscopically The intraarticular disease was recorded on a special documentation sheet (containing 67 descriptive items). The patients were divided into 5 subgroups: first-time dislocation (n = 91; first or second recurrence (n = 12); 3 to 5 recurrences (n = 23); 6 or more recurrences (n = 32); and chronic subluxafions (n = 15). A// data were examined statistically. Each lesion...

متن کامل

Receptor-interacting Protein Shuttles between Cell Death and Survival Signaling Pathways

Cross-talk between apoptosis and survival signaling pathways is crucial for regulating tissue processes and mitigating disease. We report that anoikis-apoptosis triggered by loss of extracellular matrix contacts-activates a CD95/Fas-mediated signaling pathway regulated by receptor-interacting protein (RIP), a kinase that shuttles between CD95/Fas-mediated cell death and integrin/focal adhesion ...

متن کامل

Venous thromboembolism diagnosis: unresolved issues.

Recent advances in the management of patients with suspected VTE have both improved diagnostic accuracy and made management algorithms safer, easier to use and well standardised. These diagnostic algorithms are mainly based on the assessment of clinical pretest probability, D-dimer measurement and imaging tests, mainly represented by compression ultrasound (CUS) for suspected DVT and computed t...

متن کامل

LAS1L interacts with the mammalian Rix1 complex to regulate ribosome biogenesis

The coordination of RNA polymerase I transcription with pre-rRNA processing, preribosomal particle assembly, and nuclear export is a finely tuned process requiring the concerted actions of a number of accessory factors. However, the exact functions of some of these proteins and how they assemble in subcomplexes remain poorly defined. LAS1L was first described as a nucleolar protein required for...

متن کامل

Voltage-Sensing Residues in the S2 and S4 Segments of the Shaker K+ Channel

The activation of Shaker K+ channels is steeply voltage dependent. To determine whether conserved charged amino acids in putative transmembrane segments S2, S3, and S4 contribute to the gating charge of the channel, the total gating charge movement per channel was measured in channels containing neutralization mutations. Of eight residues tested, four contributed significantly to the gating cha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006