E-Devlet Kapısı Projesi Bilgi Güvenligi ve Risk Yönetimi: Türkiye Uygulaması

Kumasi, Erhan; RgÖren, Burak B.
May 2010
International Journal of InformaticsTechnologies;2010, Vol. 3 Issue 2, p29
Academic Journal
One of the most important factors that influences current century's social structure and life style is "Information and Communication Technologies". This technological development leads changes in producing, keeping, editing, manipulating, carrying, serving and using information. The rapid change in science and technology has also influenced future politics of states; developing substructures of information and communication technologies and promoting common use of technologies have become major priorities for many states. In parallel with the development all around the world in information and communication technologies, many strategies and many projects along with these strategies were produced in Turkey, especially in e-state issues. The most effective factor influencing demand to electronical services is security. Particularly in third and other advanced levels, in usage of personal information and electronical services including paying; security is very important. Any weakness in that issue will affect negatively all e-state services, and carry a risk causing decline in demand. In this article, a risk analysis including information security infrastructure within the framework of e-State Gate project is carried out and the results of the analysis are shared.


Related Articles

  • Ontoloji Tabanlı Bilgi Sistemlerinde Politika Yönetimi. Can, Özgü; Ünalir, Murat Osman // International Journal of InformaticsTechnologies;2010, Vol. 3 Issue 2, p1 

    The web as an information space improves towards Semantic Web, not only for the communication of people, but also for the information to be understood by machines. Semantic Web provides a common framework that allows data to be shared and reused. However, security and privacy concepts have...

  • Investigation into in-vehicie information security. Yue Huang; Gui He Qin; Tong Liu; Rui Zhao; Xiao Dan Wang // Advanced Materials Research;2014, Vol. 1003, p273 

    Along with the penetration of in-vehicle intelligent devices, the in-vehicle networks are changed from a closed environment to an open environment, and thus the concern of in-vehicle information security becomes increasingly prominent. In this paper, we analyzed the damages of in-vehicle...

  • A Framework for Comparison and Analysis of Information Security Investment Models. Pandey, Pankaj; Snekkenes, Einar Arthur // Norwegian Information Security Conference / Norsk Informasjonssi;2013, p25 

    In today's technology driven economy, organizations are highly dependent upon information technology for business processes. Thus, organizations need to invest in information security controls to protect the critical information infrastructure and business information. Various approaches have...

  • DATABASE SECURITY. Fulkerson, Cheryl L.; Gonsoulin, Mark A.; Walz, Diane B. // Strategic Finance;Dec2002, Vol. 84 Issue 6, p48 

    This article discusses the importance of and presents tips on database security management. The author stresses the establishment of an overall security plan for companies that includes the protection of both physical and digital documents. Some of the key areas that are mentioned include access...

  • SILVER BULLET. Niblett, Gareth // ITNOW;Summer2015, Vol. 57 Issue 2, p22 

    The article offers the author's views on factors that need be considered by organisations while selecting technology solutions for data management and security problems, including the organisation's risk management, policies required for the organisation's desired outcomes, and trained people.

  • Editorial. Dhillon, Gurpreet // Journal of Information System Security;2009, Vol. 5 Issue 2, p1 

    An introduction to the journal is presented in which the editor discusses several articles including a topic on distributed firewall by Andy Luse and colleagues, an article on computerized bureaucracy by Spyridon Samonas and Ian O. Angell, and intrusion detection by Anita Komlodi and colleagues.

  • Information Security: SETA Program Status at Jordanian Universities. Eyadat, Mohammad S. // Journal of Information Privacy & Security;2015, Vol. 11 Issue 3, p174 

    An information security education awareness training (SETA) program is considered one of the key factors for making the information technology environment more secure and efficient. This research aimed at investigating and determining the status of the SETA program in Jordanian universities. The...

  • EEG Identification Computing Based on Photo Stimulation. Zhen-dong Mu; De-rong Jiang; Jing-hai Yin // International Journal of Digital Content Technology & its Applic;Jul2012, Vol. 6 Issue 13, p549 

    In the information era, information security becomes more important, the use of EEG as identification tool become more and more. In this paper, we used the subjects' photos as stimulation. In order to obtain the Identification classifier of different subjects, we used AR model to convert the EEG...

  • Information Security Issues in a Digital Library Environment: A Literature Review. ANDAY, Audrey; FRANCESE, Enrico; HUURDEMAN, Hugo C.; YILMAZ, Muharrem; ZENGENENE, Dydimus // Information World / Bilgi Dunyasi;2012, Vol. 13 Issue 1, p117 

    This paper aimed to explore the literature on security issues that digital libraries should consider in managing digital resources. Books on information security and network security were consulted as well as several databases such as ERIC, Ebrary, LISA, Science Direct, EbscoHost, ISI, Google...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics