“E-Governance” or “e-Gov” means using electronic media, particularly the web, to deliver public information and public services. E-Governance applications empower citizens and businesses to transact Governance business on-line that might otherwise require “a trip downtown”. Agencies benefit, too, from reduced paperwork, improved databases, and increased efficiency.
There are four pillars of E-Governance:-
1. CONNECTIVITY:-Connectivity is required to connect the people to the services of the Governance. There should be a strong connectivity for an effective e-governance.
2. KNOWLEDGE: – Here knowledge refers to IT knowledge. Governance should employ skill full engineers who can handle the e-governance in an efficient way. These engineers also handle all kind of fault that may occur during the working of egovernance.
3. DATA CONTENT: – To share any kind of knowledge or information over the internet, there should be its database. This database should have the data content which is related to Governance services.
4. CAPITAL:-Capital can be on public or private partnership. It refers to money used by Governance to provide their services or to that sector of the economy based on its operation.
Cyber security concept in e Governance
Cyber Security is traditionally concerned with information properties of confidentiality, integrity and availability. These properties underpin services such as user authentication, authorization, accountability and reliability. In the broader sense cyber /information security involves people as well as technologies. A small number of publications in the literature address the social acceptance of security technologies, known as the organizational security culture.
Information security standards are well represented in the open literature. These standards attempt to describe the various processes and controls needed for successfully implementing an information security policy, rather than advising what the policy should look like. In general these standards have been developed through the experiences of leading technological countries.
ICT programs such as e-Governance in developing countries fail with 35% being classified as total failures and 50% partial failures. The author attributes these figures to the gap between the current reality (physical, cultural, economic and other contexts) and the design of the ICT program – the greater the gap, the greater the chances of failure. Security has always been identified as one of an information system’s important components. Contemporary information assurance management recognizes the imperative to include people and processes, as well as the more traditional technology security issues, in ensuring the quality of information in all modern organizations. To a large extent technological solutions for the majority of security issues have been previously developed.
There are however still many application challenges, the people and processes components of information assurance management. This leads to the need for the socio-technical approach to focusing on these issues in the required context for
technologically-developing countries. ICT in developing countries is generally underrepresented in the open literature. A few publications fleetingly concede that there can be major issues with transitional countries developing their systems, but the subject is not treated in any depth or breadth. Given the widespread prescription of IT, particularly e-Governance for developing countries, the urgency of their needs, and the often paucity of their economic resources, it would be useful to understand in depth the factors and issues that underpin them. Yet there are very few published empirical studies directly addressing the issue.
e-Governance is at the forefront of current public sector reform policies across Europe and the rest of the world where the use of information and communication technologies (ICTs) to digitize transactions and deliver public services is seen as a major leverage of public sector innovation. However, providing public sector information and services online also poses profound challenges to security and citizens’ trust in Governances, including threats to identity, privacy and data systems. Thus, safeguarding data and systems is of pivotal importance since it can influence Governances’ and users’ willingness to adopt the online services offered.
Feel free to contact E-SPIN for cyber security infrastructure and application security, infrastructure availability and performance monitoring solution.