메뉴 건너뛰기




Volumn 27, Issue 1, 2010, Pages 49-56

Opportunities and threats: A security assessment of state e-government websites

Author keywords

Computer network systems; Cyber intrusion; E government; Hacker attack; IP address; NAT; PAT; Port 443 tcp; Port 80 tcp; Security; Vulnerability

Indexed keywords


EID: 70549093057     PISSN: 0740624X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.giq.2009.07.004     Document Type: Article
Times cited : (113)

References (33)
  • 1
    • 70549090296 scopus 로고    scopus 로고
    • A longitudinal look at e-government in practice
    • Boggs R.A., and Walters D. A longitudinal look at e-government in practice. Issues in Information Systems 7 2 (2006) 161-164
    • (2006) Issues in Information Systems , vol.7 , Issue.2 , pp. 161-164
    • Boggs, R.A.1    Walters, D.2
  • 3
    • 70549091435 scopus 로고    scopus 로고
    • MoEIS increases accuracy and efficiency of e-government solutions
    • Retrieved January 10, 2007, from
    • Brush, M. (2007). MoEIS increases accuracy and efficiency of e-government solutions. Tier News. Retrieved January 10, 2007, from http://www.tier.com/news/pf.cfm?id=166
    • (2007) Tier News
    • Brush, M.1
  • 4
    • 70549090297 scopus 로고    scopus 로고
    • Tomorrow's jobs
    • Retrieved January 10, 2008, from
    • Bureau of Labor Statistics. (2007). Tomorrow's jobs. The 2008-2009 Occupational Outlook Handbook. Retrieved January 10, 2008, from http://www.bls.gov/oco/home.htm
    • (2007) The 2008-2009 Occupational Outlook Handbook
  • 5
    • 26244455982 scopus 로고    scopus 로고
    • Answering Allegations: The Use of the Corporate Website for Restorative Ethical and Social Disclosure
    • Campbell, D. & Beck, A. C. (2004). Answering Allegations: The Use of the Corporate Website for Restorative Ethical and Social Disclosure, Business Ethics,13(2), 100.
    • (2004) Business Ethics , vol.13 , Issue.2 , pp. 100
    • Campbell, D.1    Beck, A.C.2
  • 6
    • 33847704735 scopus 로고    scopus 로고
    • The IDABC eGovernment Observatory of European Communities. Retrieved January 9, 2007, from
    • Chevallerau, F. (2005). The impact of e-government on competitiveness, growth, and jobs. The IDABC eGovernment Observatory of European Communities. Retrieved January 9, 2007, from http://europa.eu.int/idabc/egovo
    • (2005) The impact of e-government on competitiveness, growth, and jobs
    • Chevallerau, F.1
  • 7
    • 37349011758 scopus 로고    scopus 로고
    • Course Technology, Cengage Learning, Boston
    • rd ed. (2009), Course Technology, Cengage Learning, Boston
    • (2009) rd ed.
    • Ciampa, M.1
  • 8
    • 0004092286 scopus 로고
    • John Wiley and Sons, New York
    • rd ed. (1977), John Wiley and Sons, New York
    • (1977) rd ed.
    • Cochran, W.G.1
  • 9
    • 70549109361 scopus 로고    scopus 로고
    • Digital Task Force, Retrieved October 20, 2007, from:, Accessed 26 October 2005
    • Digital Task Force. (2004). The Danish e-government strategy 2004-2006. Retrieved October 20, 2007, from: http://e.gov.dk/uploads/media/strategy_pixi.pdf. Accessed 26 October 2005
    • (2004) The Danish e-government strategy 2004-2006
  • 10
    • 70549091436 scopus 로고    scopus 로고
    • Evans, K. S. (2008). Expanding e-government: Achieving results for the American people. Retrieved July 8, 2008, from http://www.whitehouse.gov/omb/egov/documents/2008_Expanding_E-Gov_Report.pdf
    • Evans, K. S. (2008). Expanding e-government: Achieving results for the American people. Retrieved July 8, 2008, from http://www.whitehouse.gov/omb/egov/documents/2008_Expanding_E-Gov_Report.pdf
  • 11
    • 33750928224 scopus 로고    scopus 로고
    • January 14, Retrieved October 2, 2005, from
    • European Commission. (2005, January 14). e-government services yield real benefits for EU citizens and businesses. Retrieved October 2, 2005, from http://europa.eu.int/rapid/pressReleasesAction.do?reference=IP/05/41&format=HTML&aged=0& language=EN&guiLanguage=en
    • (2005) e-government services yield real benefits for EU citizens and businesses
  • 12
    • 70549099081 scopus 로고    scopus 로고
    • Executive Office of the President of USA, Retrieved June 5, 2006, from
    • Executive Office of the President of USA. (2003). The e-government Act of 2002. Retrieved June 5, 2006, from http://www.whitehouse.gov/omb/egov/g-4-act.html
    • (2003) The e-government Act of 2002
  • 13
    • 21644481659 scopus 로고    scopus 로고
    • Network security: Mapping intrusion and anomaly detection to very-high-degree polynomials
    • Garcia R.C. Network security: Mapping intrusion and anomaly detection to very-high-degree polynomials. Signals, Systems, and Computers 2 7 (2004) 1449-1452
    • (2004) Signals, Systems, and Computers , vol.2 , Issue.7 , pp. 1449-1452
    • Garcia, R.C.1
  • 14
    • 70549100279 scopus 로고    scopus 로고
    • State e-government strategies: Identifying best practices and applications
    • LBJ School of Public Affairs, University of Taxes at Austin. Retrieved June 25, 2007, from
    • Greenberg, S. R. (2006). State e-government strategies: Identifying best practices and applications. Report for the Congressional Research Service. LBJ School of Public Affairs, University of Taxes at Austin. Retrieved June 25, 2007, from: http://www.utexas.edu/lbj/pubs/pdf/e-government.pdf
    • (2006) Report for the Congressional Research Service
    • Greenberg, S.R.1
  • 16
    • 10844242946 scopus 로고    scopus 로고
    • Electronic government: Government capability and terrorist resources
    • Halcnin L.E. Electronic government: Government capability and terrorist resources. Government Information Quarterly 21 4 (2004) 406-419
    • (2004) Government Information Quarterly , vol.21 , Issue.4 , pp. 406-419
    • Halcnin, L.E.1
  • 17
    • 70549088268 scopus 로고    scopus 로고
    • Hurley, E. (2002, April 3). Audits confirm enterprise security. Tech Target. Retrieved July 10, 2008, from: http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci814796,00.html
    • Hurley, E. (2002, April 3). Audits confirm enterprise security. Tech Target. Retrieved July 10, 2008, from: http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci814796,00.html
  • 18
    • 70549112321 scopus 로고    scopus 로고
    • SANS Institute. Retrieved January 15, 2009, from
    • Jamieson, S. (2002). The ethics and legality of port scanning. SANS Institute. Retrieved January 15, 2009, from http://www.sans.org/reading_room/whitepapers/legal/ the_ethics_and_legality_of_port_scanning_71?show=71.php&cat=legal
    • (2002) The ethics and legality of port scanning
    • Jamieson, S.1
  • 23
    • 0347178887 scopus 로고    scopus 로고
    • Computer Security Institute. Retrieved January 15, 2009, from
    • Richardson, R. (2008). The 2008 computer crime and security survey. Computer Security Institute. Retrieved January 15, 2009, from http://www.gocsi.com/forms/csi_survey.jhtml;jsessionid=1GW0KB43ZOYTKQSNDLPSKH0CJUNN2JVN
    • (2008) The 2008 computer crime and security survey
    • Richardson, R.1
  • 26
    • 70549096340 scopus 로고    scopus 로고
    • State of Nebraska, Retrieved January 9, 2007, from
    • State of Nebraska. (2001). e-government to business initiative: Business portal action plan. Retrieved January 9, 2007, from http://www.nitc.state.ne.us/sgc/workgroups/businessportal/ documments/Business_Portal_Action_Pland.pdf
    • (2001) e-government to business initiative: Business portal action plan
  • 27
    • 70549085230 scopus 로고    scopus 로고
    • September). Symantec internet Security Threat Report. Symantec Enterprise Security, 12, 1-30. Retrieved January 30, 2008, from
    • Symantec
    • Symantec. (2007, September). Symantec internet Security Threat Report. Symantec Enterprise Security, 12, 1-30. Retrieved January 30, 2008, from http://www.symantec.com
    • (2007)
  • 28
    • 70549113442 scopus 로고    scopus 로고
    • U.S. Department of Justice, 2003, Fraud and related activity in connection with computers. In the United States Code Annotated Title 18, Chapter 47, Section 1030. Washington, DC: Author. Retrieved December 18, 2008, from
    • U.S. Department of Justice. (2003). Fraud and related activity in connection with computers. In the United States Code Annotated Title 18, Chapter 47, Section 1030. Washington, DC: Author. Retrieved December 18, 2008, from http://www.usdoj.gov/criminal/cybercrime/1030NEW.htm
  • 30
    • 67651175205 scopus 로고    scopus 로고
    • Impact of economic prosperity and population on e-government involvement
    • Wilkinson V.O., and Cappel J.J. Impact of economic prosperity and population on e-government involvement. Issues in Information Systems 6 (2005) 204-209
    • (2005) Issues in Information Systems , vol.6 , pp. 204-209
    • Wilkinson, V.O.1    Cappel, J.J.2
  • 31
    • 70549113815 scopus 로고    scopus 로고
    • Winkler, I. (2004, July 19), What is a security audit? Tech Target. Retrieved July 10, 2008, from http://searchcio.techtarget.com/sDefinition/0,,sid182_gci955099,00.html
    • Winkler, I. (2004, July 19), What is a security audit? Tech Target. Retrieved July 10, 2008, from http://searchcio.techtarget.com/sDefinition/0,,sid182_gci955099,00.html
  • 32
    • 70549108253 scopus 로고    scopus 로고
    • State e-government service and economic competitiveness: a relational analysis
    • Zhao J.J., Truell A.D., Alexander M.W., and Davis R. State e-government service and economic competitiveness: a relational analysis. Issues in Information Systems 7 2 (2006) 171-176
    • (2006) Issues in Information Systems , vol.7 , Issue.2 , pp. 171-176
    • Zhao, J.J.1    Truell, A.D.2    Alexander, M.W.3    Davis, R.4
  • 33
    • 35448996738 scopus 로고    scopus 로고
    • internet Technologies Used by INC. 500 Corporate Websites
    • Zhao J.J., and Zhao S.Y. internet Technologies Used by INC. 500 Corporate Websites. Issues in Information Systems 4 (2004) 366-372
    • (2004) Issues in Information Systems , vol.4 , pp. 366-372
    • Zhao, J.J.1    Zhao, S.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.