Abstract: This paper shows that more than 80 % of the E-Governments in the world are vulnerable to common Web-application attacks such as Cross Site Scripting and SQL injection. Industrialized countries were found to be more vulnerable than under-developed countries (90 % vs. 50%). The paper also describes some malicious data mining possibilities on the Norwegian E-Government, and how information can be combined and used to create other practical attacks. 1
Nowadays when usage of web-based applications and other interaction possibilities is becoming more a...
The article considers peculiarities of modern information technologies introduction including e-stat...
Abstract As the web expands in size and adoption, so does the interest of attackers who seek to expl...
We present the first comprehensive audit and comparison of e-government website security in two coun...
Purpose: E-Government system emerged as a novel public service provision platform that enables gover...
The growth in the number of computers, along with the popularization of the Internet, has contribute...
The new information technologies facilitate the transformation of traditional administrative process...
peer reviewedSlowly, but consistently, the digital gap between developing and developed countries is...
Online working of a government or providing its services online to its citizens at their access is k...
As the web expands in size and adoption, so does the interest of attackers who seek to exploit web a...
Recently Web based applications takes a noteworthy palace in people’s daily routine furthermore as i...
E-government cannot be a panacea for fighting corruption, but per a lot of studies, it should be con...
As the use of web applications is increasing among a number of different industries, many companies ...
In the recent past, the so-called “Web 2.0” became a powerful tool to enable various eGovernment pro...
The rise of online commerce has brought about advantages for consumers wishing to research and purch...
Nowadays when usage of web-based applications and other interaction possibilities is becoming more a...
The article considers peculiarities of modern information technologies introduction including e-stat...
Abstract As the web expands in size and adoption, so does the interest of attackers who seek to expl...
We present the first comprehensive audit and comparison of e-government website security in two coun...
Purpose: E-Government system emerged as a novel public service provision platform that enables gover...
The growth in the number of computers, along with the popularization of the Internet, has contribute...
The new information technologies facilitate the transformation of traditional administrative process...
peer reviewedSlowly, but consistently, the digital gap between developing and developed countries is...
Online working of a government or providing its services online to its citizens at their access is k...
As the web expands in size and adoption, so does the interest of attackers who seek to exploit web a...
Recently Web based applications takes a noteworthy palace in people’s daily routine furthermore as i...
E-government cannot be a panacea for fighting corruption, but per a lot of studies, it should be con...
As the use of web applications is increasing among a number of different industries, many companies ...
In the recent past, the so-called “Web 2.0” became a powerful tool to enable various eGovernment pro...
The rise of online commerce has brought about advantages for consumers wishing to research and purch...
Nowadays when usage of web-based applications and other interaction possibilities is becoming more a...
The article considers peculiarities of modern information technologies introduction including e-stat...
Abstract As the web expands in size and adoption, so does the interest of attackers who seek to expl...