Visible to the public Inclusive Security Models To Building E-Government Trust

TitleInclusive Security Models To Building E-Government Trust
Publication TypeConference Paper
Year of Publication2019
AuthorsSupriyanto, Aji, Diartono, Dwi Agus, Hartono, Budi, Februariyanti, Herny
Conference Name2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)
Date PublishedOct. 2019
ISBN Number978-1-7281-4610-2
KeywordsAccess Control, authentication, authorisation, Authorization, Collaboration, cybersecurity, data privacy, e-gov, E-Government, e-government trust, government data processing, Human Behavior, inclusive security, inclusive security model, Internet, message authentication, nonrepudiation properties, policy-based governance, privacy, privacy properties, privacy relationships, Privacy Requirements, pubcrawl, resilience, Resiliency, security perspective, security requirements, security threats, Trust, trust of government, Trusted Computing, trusted security solution

The low attention to security and privacy causes some problems on data and information that can lead to a lack of public trust in e-Gov service. Security threats are not only included in technical issues but also non-technical issues and therefore, it needs the implementation of inclusive security. The application of inclusive security to e-Gov needs to develop a model involving security and privacy requirements as a trusted security solution. The method used is the elicitation of security and privacy requirements in a security perspective. Identification is carried out on security and privacy properties, then security and privacy relationships are determined. The next step is developing the design of an inclusive security model on e-Gov. The last step is doing an analysis of e-Gov service activities and the role of inclusive security. The results of this study identified security and privacy requirements for building inclusive security. Identification of security requirements involves properties such as confidentiality (C), integrity (I), availability (A). Meanwhile, privacy requirement involves authentication (Au), authorization (Az), and Non-repudiation (Nr) properties. Furthermore, an inclusive security design model on e-Gov requires trust of internet (ToI) and trust of government (ToG) as an e-Gov service provider. Access control is needed to provide solutions to e-Gov service activities.

Citation Keysupriyanto_inclusive_2019