Key points are not available for this paper at this time.
Abstract Security of data has always been a contested issue since the internet became the way of life. The internet and Web 2.0 followed by Web 3.0 have enabled many applications for the use of the citizens. E-government is one of them. Questions have always been raised about the security of data in E-government applications and services. Saudi Arabia is one of the developing countries when it comes to the internet-based services. This paper attempts to review the effectiveness of security policies when dealing with threats and vulnerabilities. We shall study these aspects in the context of Saudi Arabian E-government. E-government, anywhere in the world is a very sensitive area when it comes to ensuring security of the users as well as the corporate data. Breach in security of user data may have catastrophic implications in some cases.
Building similarity graph...
Analyzing shared references across papers
Loading...
Awad Saleh Alharbi
George Halikias
Muttukrishnan Rajarajan
International Journal of Information Technology
King Abdulaziz University
City, University of London
Building similarity graph...
Analyzing shared references across papers
Loading...
Alharbi et al. (Thu,) studied this question.
www.synapsesocial.com/papers/6a0fc15a01be78fe816001ff — DOI: https://doi.org/10.1007/s41870-021-00611-3
Synapse has enriched 5 closely related papers on similar clinical questions. Consider them for comparative context: