메뉴 건너뛰기




Volumn 31, Issue S1, 2014, Pages S118-S125

Web application vulnerability assessment and policy direction towards a secure smart government

Author keywords

Cookie manipulation; Cross site injection; E government; Policy; Smart government; SQL injection; Web vulnerability

Indexed keywords


EID: 84908320286     PISSN: 0740624X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.giq.2014.01.012     Document Type: Article
Times cited : (39)

References (67)
  • 5
    • 33947614734 scopus 로고    scopus 로고
    • Applying participatory design and collaboration in digital public services for discovering and re-designing e-government services
    • Anthopoulos L.G., Siozos P.T., Soukalas I.A. Applying participatory design and collaboration in digital public services for discovering and re-designing e-government services. Government Information Quarterly 2007, 24:353-376.
    • (2007) Government Information Quarterly , vol.24 , pp. 353-376
    • Anthopoulos, L.G.1    Siozos, P.T.2    Soukalas, I.A.3
  • 9
    • 0345323212 scopus 로고    scopus 로고
    • E-governance and developing countries: Introduction and examples
    • (Available onaccessed 12th April, 2013)
    • Backus M. E-governance and developing countries: Introduction and examples. Report No 3, April 2001 2001, (Available on http://www.ftpiicd.org/files/research/reports/report3.pdf accessed 12th April, 2013).
    • (2001) Report No 3, April 2001
    • Backus, M.1
  • 13
    • 77954612255 scopus 로고    scopus 로고
    • Regular expression considered harmful in client-side XSS filters
    • (ACM 978-1-60558-799-8/10/04. Available on
    • Bates D., Barth A., Jackson C. Regular expression considered harmful in client-side XSS filters. WWW 2010, April 26-30, 2010, Raleigh, North Carolina, USA 2010, (ACM 978-1-60558-799-8/10/04. Available on http://www.collinjackson.com/research/xssauditor.pdf).
    • (2010) WWW 2010, April 26-30, 2010, Raleigh, North Carolina, USA
    • Bates, D.1    Barth, A.2    Jackson, C.3
  • 14
    • 84908325213 scopus 로고    scopus 로고
    • Available on, (accessed 25th April, 2013), Cenzic
    • Cenzic Web Application Security Trends Report Q1-Q2, 2009 Available on, (accessed 25th April, 2013). http://www.cenzic.com/downloads/Cenzic_AppSecTrends_Q1-Q2-2009.pdf.
    • Web Application Security Trends Report Q1-Q2, 2009
  • 16
    • 40649094306 scopus 로고    scopus 로고
    • E-government implementation: A macro analysis of Singapore's e-government initiatives
    • Chan C.M.L., Lau Y., Pan S.L. E-government implementation: A macro analysis of Singapore's e-government initiatives. Government Information Quarterly 2008, 25(2008):239-255.
    • (2008) Government Information Quarterly , vol.25 , Issue.2008 , pp. 239-255
    • Chan, C.M.L.1    Lau, Y.2    Pan, S.L.3
  • 17
    • 0037290057 scopus 로고    scopus 로고
    • Digital government: Technologies and practices
    • Chen H. Digital government: Technologies and practices. Decision Support Systems 2002, 34(3):223-227.
    • (2002) Decision Support Systems , vol.34 , Issue.3 , pp. 223-227
    • Chen, H.1
  • 18
    • 0042907378 scopus 로고    scopus 로고
    • Transforming local e-government services: The use of application service providers
    • Chen Y., Gant J. Transforming local e-government services: The use of application service providers. Government Information Quarterly 2001, 18:343-355.
    • (2001) Government Information Quarterly , vol.18 , pp. 343-355
    • Chen, Y.1    Gant, J.2
  • 19
    • 84858452988 scopus 로고    scopus 로고
    • Available on, (accessed 16th November, 2012)
    • Chien E. Malicious Yahooligans Available on, (accessed 16th November, 2012). http://www.symantec.com/avcenter/reference/malicious.yahooligans.pdf.
    • Malicious Yahooligans
    • Chien, E.1
  • 21
    • 33244470126 scopus 로고    scopus 로고
    • Available on, (accessed on 12th April, 2013)
    • Cook S. A web developer's guide to cross scripting Available on, (accessed on 12th April, 2013). http://www.sans.org/reading_room/whitepapers/securecode/web-developers-guide-cross-site-scripting_988.
    • A web developer's guide to cross scripting
    • Cook, S.1
  • 22
    • 78650917831 scopus 로고    scopus 로고
    • (Accessed May 05, 2013)
    • CWE-SANS Top 25 most dangerous programming errors (Accessed May 05, 2013). http://www.applicure.com/blog/cwe-sans-top-25-dangerous-programming-errors.
    • Top 25 most dangerous programming errors
  • 23
    • 25444473131 scopus 로고    scopus 로고
    • E-government adoption: Architecture and barriers
    • Ebrahim, Irani E-government adoption: Architecture and barriers. Business Process Management Journal 2005, 11(5):589-611.
    • (2005) Business Process Management Journal , vol.11 , Issue.5 , pp. 589-611
    • Ebrahim1    Irani2
  • 24
    • 33751031748 scopus 로고    scopus 로고
    • The evolution of cross site scripting attacks
    • iDEFENSE Labs, (Available onaccessed 12th April, 2013)
    • Endler D. The evolution of cross site scripting attacks. Technical report 2002, iDEFENSE Labs, (Available on http://www.cgisecurity.com/lib/XSS.pdf accessed 12th April, 2013).
    • (2002) Technical report
    • Endler, D.1
  • 25
    • 84908352211 scopus 로고    scopus 로고
    • End-to-end web application security
    • (Available on
    • Erlingsson U., Livshits B., Xie Y. End-to-end web application security. Microsoft Research 2009, (Available on http://static.usenix.org/event/hotos07/tech/full_papers/erlingsson/erlingsson.pdf).
    • (2009) Microsoft Research
    • Erlingsson, U.1    Livshits, B.2    Xie, Y.3
  • 26
    • 84908344514 scopus 로고    scopus 로고
    • Electronic governance: Myth or opportunity for Nigerian public administration?
    • (available onaccessed 4th December, 2013)
    • Fatile J.O. Electronic governance: Myth or opportunity for Nigerian public administration?. International Journal of Academic Research in Business and Social Sciences 2012, 2(9). (available on http://www.hrmars.com/admin/pics/1104.pdf accessed 4th December, 2013).
    • (2012) International Journal of Academic Research in Business and Social Sciences , vol.2 , Issue.9
    • Fatile, J.O.1
  • 27
    • 84897754025 scopus 로고    scopus 로고
    • Exploring e-government evolution: The influence of systems of rules on organizational action
    • Gil-García J.R., Martinez-Moyano I.J. Exploring e-government evolution: The influence of systems of rules on organizational action. NCDG Working Paper No. 05-001 2005.
    • (2005) NCDG Working Paper No. 05-001
    • Gil-García, J.R.1    Martinez-Moyano, I.J.2
  • 28
    • 84861099922 scopus 로고    scopus 로고
    • Noncespaces: Using randomization to defeat cross-site scripting attacks
    • Gundy M.V., Chen H. Noncespaces: Using randomization to defeat cross-site scripting attacks. Computers and Security 2012, 31(2012):612-628.
    • (2012) Computers and Security , vol.31 , Issue.2012 , pp. 612-628
    • Gundy, M.V.1    Chen, H.2
  • 32
    • 85007034975 scopus 로고    scopus 로고
    • Analysis on the improved effects of administrative transparency of the e-government
    • Hee-joon S. Analysis on the improved effects of administrative transparency of the e-government. Administrative Treaties 2002, 40(4):109-134.
    • (2002) Administrative Treaties , vol.40 , Issue.4 , pp. 109-134
    • Hee-joon, S.1
  • 33
    • 85012432202 scopus 로고    scopus 로고
    • Prospects and limitations of the e-government initiative in Korea
    • Hee-joon S. Prospects and limitations of the e-government initiative in Korea. International Review of Public Administration 2002, 7(2):45-53.
    • (2002) International Review of Public Administration , vol.7 , Issue.2 , pp. 45-53
    • Hee-joon, S.1
  • 37
    • 70350551674 scopus 로고    scopus 로고
    • Web application security assessment by fault injection and behaviour monitoring
    • (ACM 1-58113-680-3/03/0005. Available on
    • Huang Y.W., Huang S.K., Lin T.P. Web application security assessment by fault injection and behaviour monitoring. WWW2003, May 20-24, 2003, Budapest, Hungary 2003, (ACM 1-58113-680-3/03/0005. Available on http://www2003.org/cdrom/papers/refereed/p081/FINAL_WAVES_WWW2003.htm).
    • (2003) WWW2003, May 20-24, 2003, Budapest, Hungary
    • Huang, Y.W.1    Huang, S.K.2    Lin, T.P.3
  • 40
    • 84908317484 scopus 로고    scopus 로고
    • Available at, (accessed 20th April, 2013)
    • infoDev/World Bank E-government primer, Washington DC Available at, (accessed 20th April, 2013). http://www.infodev.org/publications.
    • E-government primer, Washington DC
  • 42
    • 56949095150 scopus 로고    scopus 로고
    • An institutional analysis of an e-government system for anti-corruption: The case of OPEN
    • Kim S., Jeong S.K., Lee H. An institutional analysis of an e-government system for anti-corruption: The case of OPEN. Government Information Quarterly 2009, 26:42-50.
    • (2009) Government Information Quarterly , vol.26 , pp. 42-50
    • Kim, S.1    Jeong, S.K.2    Lee, H.3
  • 44
    • 0035373510 scopus 로고    scopus 로고
    • Developing fully functional e-government: A four stage model
    • Layne K., Lee J. Developing fully functional e-government: A four stage model. Government Information Quarterly 2001, 18(2001):122-136.
    • (2001) Government Information Quarterly , vol.18 , Issue.2001 , pp. 122-136
    • Layne, K.1    Lee, J.2
  • 45
    • 82755194883 scopus 로고    scopus 로고
    • A novel method for SQL injection attack detection based on removing SQL query attribute values
    • Lee I., Jeong S., Yeo S., Moon J. A novel method for SQL injection attack detection based on removing SQL query attribute values. Mathematical and Computer Modeling 2011, 55(1-2):58-68.
    • (2011) Mathematical and Computer Modeling , vol.55 , Issue.1-2 , pp. 58-68
    • Lee, I.1    Jeong, S.2    Yeo, S.3    Moon, J.4
  • 48
    • 0028551230 scopus 로고
    • Evolutionary Economics & Technology Policy
    • Metcalfe J.S. Evolutionary Economics & Technology Policy. The Economic Journal 1994, 104(425):931-944.
    • (1994) The Economic Journal , vol.104 , Issue.425 , pp. 931-944
    • Metcalfe, J.S.1
  • 49
    • 63049106185 scopus 로고    scopus 로고
    • SDriver: Location-specific signatures prevent SQL injection attacks
    • Mitropoulos D., Spinellis D. SDriver: Location-specific signatures prevent SQL injection attacks. Computer and Security 2009, 28(3-4):121-129.
    • (2009) Computer and Security , vol.28 , Issue.3-4 , pp. 121-129
    • Mitropoulos, D.1    Spinellis, D.2
  • 52
    • 84908340597 scopus 로고    scopus 로고
    • E-government in Nigeria: A catalyst for national development
    • University of Abuja, F.C.T., Nigeria, (Available onaccessed on 4th December, 2013)
    • Mohammed S., Abubakar M.K., Bashir A. E-government in Nigeria: A catalyst for national development. International conference on development studies 2010, University of Abuja, F.C.T., Nigeria, (Available on http://www.abu.edu.ng/publications/2009-06-23-113825_373.doc accessed on 4th December, 2013).
    • (2010) International conference on development studies
    • Mohammed, S.1    Abubakar, M.K.2    Bashir, A.3
  • 53
    • 0005281380 scopus 로고    scopus 로고
    • The evolution of e-government among municipalities: Rhetoric or reality?
    • Moon M.J. The evolution of e-government among municipalities: Rhetoric or reality?. Public Administration Review 2002, 62(4):424-433.
    • (2002) Public Administration Review , vol.62 , Issue.4 , pp. 424-433
    • Moon, M.J.1
  • 55
    • 31744452097 scopus 로고    scopus 로고
    • Open Web Application Security Project, (Available on
    • OWASP The ten most critical web application security vulnerabilities 2004, Open Web Application Security Project, (Available on http://umn.dl.sourceforge.net/sourceforge/owasp/OWASPTopTen2004.pdf).
    • (2004) The ten most critical web application security vulnerabilities
  • 59
    • 85027969939 scopus 로고    scopus 로고
    • Study on the development and application of e-government maturity assessment model
    • Sang-ho Y. Study on the development and application of e-government maturity assessment model. Korea Policy Academy Society News 2002, 11(4):243-271.
    • (2002) Korea Policy Academy Society News , vol.11 , Issue.4 , pp. 243-271
    • Sang-ho, Y.1
  • 60
    • 84880475446 scopus 로고    scopus 로고
    • Available on
    • SANS Institute Top cyber security risks Available on. http://www.sans.org/top-cyber-security-risks/summary.php.
    • Top cyber security risks
  • 62
    • 0346268913 scopus 로고    scopus 로고
    • The adoption of electronic tax filing systems: An empirical study
    • Wang Y. The adoption of electronic tax filing systems: An empirical study. Government Information Quarterly 2002, 20:333-352.
    • (2002) Government Information Quarterly , vol.20 , pp. 333-352
    • Wang, Y.1
  • 64
    • 0035373678 scopus 로고    scopus 로고
    • Best practices in electronic government: Comprehensive electronic information dissemination for science and technology
    • Whitson T.L., Davis L. Best practices in electronic government: Comprehensive electronic information dissemination for science and technology. Government Information Quarterly 2001, 18(2001):79-91.
    • (2001) Government Information Quarterly , vol.18 , Issue.2001 , pp. 79-91
    • Whitson, T.L.1    Davis, L.2
  • 65
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerability in scripting languages
    • (Available on
    • Xie Y., Aiken A. Static detection of security vulnerability in scripting languages. 15th USENIX Security Symposium, 2006 2006, (Available on http://theory.stanford.edu/~aiken/publications/papers/usenix06.pdf).
    • (2006) 15th USENIX Security Symposium, 2006
    • Xie, Y.1    Aiken, A.2
  • 67
    • 70549093057 scopus 로고    scopus 로고
    • Opportunities and threats: A security assessment of state e-government websites
    • Zhao J.J., Zhao S.Y. Opportunities and threats: A security assessment of state e-government websites. Government Information Quarterly 2010, 27:49-56.
    • (2010) Government Information Quarterly , vol.27 , pp. 49-56
    • Zhao, J.J.1    Zhao, S.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.