Information Security On eGovernment As Information-Centric Networks
Main Article Content
Abstract
Information security is a major factor in the service of eGovernment. The using of host to host in previous services of eGovernment is considered as lacking in security. Therefore, it needs more security to serve clients more efficiently and to obtain reliable data provided from the host. One of approach ways to solve the previous security services are based on the safety approach on the contents. The approach on content is used to improve the security which has been used. The approach offered in this paper is called Information Centric Network, this approach is one of the alternatives that is used to secure the content on eGovernment, in addition to approaches by using encryption and captcha. Human aspect is also included as one of the factors of eGovernment security itself.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
F. Hadi, F.T. Muhaya, “Essentials for the eGovernment Security,” In : International Conference on Information Society (i-Society), 2011, pp.237-240
Y. Prayudi, T.K. Priyambodo, “ Secure and Trusted Environment as a Strategy to Maintain the Integrity and Authenticity of Digital Evidence,”” International Journal of Security and Its Applications, Vol. 9, No. 6, 2015, pp. 299-314.
E. Fraga, “Trends in e-Government: How to Plan, Design, and Measure e-Government,” Government Management Information Sciences (GMIS) Conference, June 17, Santa Fe, New Mexico, U.S.A. 2002
C. Leitner, “eGovernment in Europe: The State of Affairs,” European Institute of Public Administration, Maastricht, the Netherlands, 2003.
J.S. Djumadal, “Implementasi E-Government Sebuah Harapan Penuh Tantangan Di Provinsi Daerah Istimewa Yogyakarta,” e-Indonesia Initiative 2008 (eII2008), Konferensi dan Temu Nasional Teknologi Informasi dan Komunikasi untuk Indonesia, Jakarta 21- 23, Mei, 2008,
T.K. Priyambodo, Y. Prayudi, “A Proposed Strategy for Secure and Trusted Environment in eGovernment,” Springer International Publishing, Advanced Computer and Communication Engineering Technology, Lecture Notes in Electrical Engineering 362, Switzerland, 2016 DOI 10.1007/978-3-319-24584- 3_38, 2016, pp. 449-459.
Moen, N. Klingsheim, K. Inge, F. Simonsen, & K.J. Hole, “Vulnerabilities in E-Government Web portals,” International Journal of Electronic Security and Digital Forensics, 1(1), 2007, pp. 89–100. Retrieved from http://www.nowires.org/Papers-PDF/ICGeS_egov.pdf
M. Alshehri and S. Drew, “eGovernment Fundamentals,” (2010), 35–42.
A. Akbulut, “An investigation of the factors that influence electronic information sharing between state and local agencies,” Louisiana State University. 2003.
M. Sami and M. Mohd, “Best Practices in Egovernment: A review of Some Innovative Models Proposed in Different Countries,” International Journal of Electrical & Computer Sciences IJECS-IJENS, Vol. 12 No. 01, Februari 2012.
A.B. Setiawan, “Implementasi Tata Kelola Keamanan Informasi Nasional Dalam Keranka eGovernment,” Jakarta, 2011.
S. H. Bakry and F. B. Muhaya, “Assessing the Benefits of Egovernment,” Second Kuwait Conference on e-Services and eSystems, 2011.
W. Seifert, “A Primer on E-Government: Sectors, Stages, Opportunities, and Challenges of Online Governance,” Congressional Research Service: The Library of Congress. 2003.
OECD, OECD eGovernment Flagship Report “The eGovernment Imperative,” Public Management Committee, Paris:OECD. 2003.
M. Wimmer and B. Bredow, “A Holistic Approach for Providing Security Solutions in eGovernment,” Proceedings of the 35th Hawaii International Conference on System Sciences. 2002
L. Feng, “Implementing E-government Strategy is Scotland: Current Situation and Emerging Issues,” Journalof Electronic Commerce in Organizations 1(2), 44-6. 2003.
M. Wimmer, C. Codagnone, and M. Janssen, “Future e-Government Research: 13 Research Themes Identified in the eGovRTD2020 Project,” In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008) (pp. 223–223). Ieee. doi:10.1109/HICSS.2008.179
Abdallah, Hassanein, and Zulkernine, “A Survey of Security Attacks in Information-Centric Networking,” 1553-877X (c) 2015 IEEE.
A. Mahfouth, “Security Aspects of the Information Centric Networks Model,” International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013.
B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman, “A Survey of InformationCentric Networking,” IEEE Communications Magazine,. 0163-6804/12/ © 2012 IEEE.
A. Ghodsi, T. Koponen, Raghavan., S. Shenker, A. Singla, and J. Wilcox, “Information-Centric Networking: Seeing the Forest for the Trees,” ACM 978-1-4503-1059-8/11/11. 2011
M. Walfish, H. Balakrishnan, and S. Shenker, Untangling the Web from DNS. In Proc. of NSDI, 2004.
D. Wendlandt, I. Avramopoulos, D. Andersen and J. Rexford, “Don’t Secure Routing Protocols, Secure Data Delivery,” In Proc. of HotNets, 2006.
T.K. Priyambodo and Y. Prayudi, “Information Security Strategy On Mobile Device Based Egovernment,” ARPN Journal of Engineering and Applied Sciences. Vol. 10, No. 2, February 2015.
K. Parsons, A. Mccormac, M. Butavicius and L. Ferguson, “Human Factors and Information Security : Individual, Culture and Security Environment,” Edinburgh, 2010.
J.J. Gonzalez and A. Sawicka, “A framework for human factors in information security,” In:WSEAS International Conference on Information Security, Hardware/Software Codesign, E-Commerce and Computer Networks, 2002, pp. 1871–1877