Amenazas de los gobiernos electrónicos: el desafío de la e-seguridad

Esther García-Río, Pedro Baena-Luna, Pedro R. Palos-Sánchez, Mariano Aguayo-Camacho

Resumen


El fenómeno del gobierno electrónico (e-gov) ha cambiado la forma en que se relacionan las administraciones públicas (AAPP) con la ciudadanía en general. Esta ciudadanía adquiere un mayor protagonismo y participación gracias a gobiernos abiertos basados en los principios de transparencia, integridad, rendición de cuentas y participación. Esta circunstancia ha dado lugar a un mayor uso de las tecnologías de la información y la comunicación, acarreando en algunos casos la proliferación de delitos electrónicos y ciberdelincuencia en el ámbito de la intromisión y el robo de datos personales sensibles. Las AAPP que asumen modelos de gobierno abierto deben incluir la protección de la privacidad de sus usuarios entre sus prioridades a la hora diseñar e implementar los distintos servicios. El éxito de un e-gov va a depender de la consecución de los objetivos vinculados con la seguridad de la información, la confidencialidad, la integridad, la disponibilidad y la confianza. Este artículo presenta los resultados de la revisión bibliométrica de los términos e-gov y seguridad electrónica en el período 2000-2022. Puede constatarse el auge de estos fenómenos en los últimos años en la producción académica de carácter científico. Esto, sin duda, se encuentra en consonancia con su actualidad y relevancia actual tanto para la ciudadanía como para el sector público.

Texto completo:

PDF

Referencias


Abu-Shanab, E. (2014). Antecedents of trust in e-government services: An empirical test in Jordan. Transforming Government: People, Process and Policy, 8(4), 480–499. https://doi.org/10.1108/TG-08-2013-0027.

Alawneh, A.; Al-Refai, H.; Batiha, K. (2013). Measuring user satisfaction from e-Government services: Lessons from Jordan. Government Information Quarterly, 30(3), 277–288. https://doi.org/10.1016/j.giq.2013.03.001.

Alharbi, N., Papadaki, M., & Dowland, P. (2017). The impact of security and its antecedents in behaviour intention of using e-government services. Behaviour and Information Technology, 36(6), 620–636. https://doi.org/10.1080/0144929X.2016.1269198.

Alzahrani, L.; Al-Karaghouli, W.; Weerakkody, V. (2017). Analysing the critical factors influencing trust in e-government adoption from citizens’ perspective: A systematic review and a conceptual framework. International Business Review, 26(1), 164–175. https://doi.org/10.1016/j.ibusrev.2016.06.004.

Amend, J.; Kaiser, J.; Uhlig, L.; Urbach, N.; Völter, F. (2021). What Do We Really Need? A Systematic Literature Review of the Requirements for Blockchain-Based E-government Services. In F. Ahlemann, R. Schütte, & S. Stieglitz (Eds.), Innovation Through Information Systems (pp. 398–412). Cham: Springer International Publishing.

Batubara, F. R.; Ubacht, J.; Janssen, M. (2018). Challenges of blockchain technology adoption for e-government: A systematic literature review. ACM International Conference Proceeding Series. https://doi.org/10.1145/3209281.3209317.

Bélanger, F.; Carter, L. (2008). Trust and risk in e-government adoption. Journal of Strategic Information Systems, 17(2), 165–176. https://doi.org/10.1016/j.jsis.2007.12.002.

Bertot, J. C.; Gorham, U.; Jaeger, P. T.; Sarin, L. C.; Choi, H. (2014). Big data, open government and e-government: Issues, policies and recommendations. Information Polity, 19(1–2), 5–16. https://doi.org/10.3233/IP-140328.

Bertot, J. C.; Jaeger, P.; Hansen, D. (2012). The impact of polices on government social media usage: Issues, challenges, and recommendations. Government Information Quarterly, 29(1), 30–40. https://doi.org/10.1016/j.giq.2011.04.004.

Bertot, J. C.; Jaeger, P. T.; Grimes, J. M. (2010). Using ICTs to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies. Government Information Quarterly, 27(3), 264–271. https://doi.org/10.1016/j.giq.2010.03.001.

Bhattacharya, D.; Gulla, U.; Gupta, M. P. (2012). E-service quality model for Indian government portals: Citizens’ perspective. Journal of Enterprise Information Management, 25(3), 246–271. https://doi.org/10.1108/17410391211224408.

Carter, L.; Bélanger, F. (2005). The utilization of e-government services: Citizen trust, innovation and acceptance factors. Information Systems Journal, 15(1), 5–25. https://doi.org/10.1111/j.1365-2575.2005.00183.x.

Choejey, P.; Fung, C. C.; Wong, K. W.; Murray, D.; Xie, H. (2015). Cybersecurity Practices for E-Government: An Assessment in Bhutan. The 10th International Conference on E-Business (INCEB2015), (November), 1–8.

Ciborra, C. (2005). Interpreting e-government and development: Efficiency, transparency or governance at a distance? Information Technology and People, 18(3), 260–279. https://doi.org/10.1108/09593840510615879.

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 319–340.

Fletcher, P. D. (2002). The government paperwork elimination act: Operating instructions for an electronic government. International Journal of Public Administration, 25(5), 723–736. https://doi.org/10.1081/PAD-120003296.

Gilbert, D.; Balestrini, P.; Littleboy, D. (2004). Barriers and benefits in the adoption of e-government. International Journal of Public Sector Management, 17(4), 286–301. https://doi.org/10.1108/09513550410539794.

Halchin, L. E. (2004). Electronic government: Government capability and terrorist resource. Government Information Quarterly, 21(4), 406–419. https://doi.org/10.1016/j.giq.2004.08.002.

Hu, P. J.-H.; Brown, S. A.; Thong, J. Y. L.; Chan, F. K. Y.; Tam, K. Y. (2009). Determinants of service quality and continuance intention of online services: The case of eTax. Journal of the American Society for Information Science and Technology, 60(2), 292–306. https://doi.org/10.1002/asi.20956.

Kaisara, G.; Pather, S. (2011). The e-Government evaluation challenge: A South African Batho Pele-aligned service quality approach. Government Information Quarterly, 28(2), 211–221. https://doi.org/10.1016/j.giq.2010.07.008.

Kim, S.; Lee, H. (2006). The impact of organizational context and information technology on employee knowledge-sharing capabilities. Public Administration Review, 66(3), 370–385. https://doi.org/10.1111/j.1540-6210.2006.00595.x.

Krishna, B.; Sebastian, M. (2021). Examining the relationship between e-government development, nation’s cyber-security commitment, business usage and economic prosperity: a cross-country analysis. Information and Computer Security, 29(5), 737–760. https://doi.org/10.1108/ICS-12-2020-0205.

Lallmahomed, M. Z. I.; Lallmahomed, N.; Lallmahomed, G. M. (2017). Factors influencing the adoption of e-Government services in Mauritius. Telematics and Informatics, 34(4), 57–72. https://doi.org/10.1016/j.tele.2017.01.003.

Lambrinoudakis, C.; Gritzalis, S.; Dridi, F.; Pernul, G. (2003). Security requirements for e-government services: A methodological approach for developing a common PKI-based security policy. Computer Communications, 26(16), 1873–1883. https://doi.org/10.1016/S0140-3664(03)00082-3.

Layne, K.; Lee, J. (2001). Developing fully functional E-government: A four stage model. Government Information Quarterly 18,122–136.

Li, X.; Hess, T. J.; Valacich, J. S. (2008). Why do we trust new technology? A study of initial trust formation with organizational information systems. Journal of Strategic Information Systems, 17(1), 39–71. https://doi.org/10.1016/j.jsis.2008.01.001.

Lian, J.-W. (2015). Critical factors for cloud based e-invoice service adoption in Taiwan: An empirical study. International Journal of Information Management, 35(1), 98–109. https://doi.org/10.1016/j.ijinfomgt.2014.10.005.

Lizano-Mora, H.; Palos-Sanchez, P. R.; Aguayo-Camacho, M. (2021). The evolution of business process management: A bibliometric analysis. IEEE Access, 9, 51088–51105. https://doi.org/10.1109/ACCESS.2021.3066340.

López-Robles, J.-R.; Guallar, J.; Otegi-Olaso, J.-R.; Gamboa-Rosales, N.-K. (2019). El profesional de la información (EPI): Análisis bibliométrico y temático (2006-2017). Profesional de La Información, 28(4), 1–24.

Mahmood, M.; Osmani, M.; Sivarajah, U. (2014). The role of trust in E-government adoption: A systematic literature review. 20th Americas Conference on Information Systems, AMCIS 2014, 1–16.

Napitupulu, D. (2021). A Bibliometric Analysis of E-Government Research DigitalCommons @ University of Nebraska - Lincoln A Bibliometric Analysis of E-Government Research Darmawan Napitupulu. (July), 6–11.

ONU. (2020). Encuesta sobre E-Gobierno, 2020, Gobierno digital en la década de acción para el desarrollo sostenible Incluye anexo con respuesta al COVID-19. In Asuntos Económicos y Sociales. (https://publicadministration.un.org/egovkb/Portals/egovkb/Documents/un/2020-Survey/2020 UN E-Government Survey (Spanish Edition).pdf).

Onumo, A.; Gullen, A.; Ullah-Awan, I. (2017). Empirical study of the impact of e-government services on cybersecurity development. Proceedings - 2017 7th International Conference on Emerging Security Technologies, EST 2017, 85–90. https://doi.org/10.1109/EST.2017.8090404.

Parra-Olivares, J. E. (2011). Modelo de análisis de correspondencias múltiples. Revista de Ciencias Sociales, 2(2). https://doi.org/10.31876/rcs.v2i2.24801.

Perez-Morago, H.; Merino-Angulo, G. (2020). Bibliometría: herramienta para la identificación, 151–165.

Rabii, A.; Saliha, A.; Khadija, O. T.; Roudies, O. (2020). Information and cyber security maturity models: a systematic literature review. Information & Computer Security,28(4) 627-644. https://doi.org/10.1108/ICS-03-2019-0039.

Srisusilawati, P.; Rusydiana, A. S.; Sanrego, Y. D.; Tubastuvi, N. (2021). Biblioshiny R Application on Islamic Microfinance Research. Library Philosophy and Practice, 2021.

Sundberg, L. (2019). Electronic government: Towards e-democracy or democracy at risk? Safety Science, 118, 22–32. https://doi.org/10.1016/j.ssci.2019.04.030.

Teo, T. S. H.; Srivastava, S. C.; Jiang, L. (2008). Trust and electronic government success: An empirical study. Journal of Management Information Systems, 25(3), 99–132. https://doi.org/10.2753/MIS0742-1222250303.

Terzi, M. (2019). E-Government and Cyber Terrorism: Conceptual Framework, Theoretical Discussions and Possible Solutions. Turkish Journal of TESAM Academy, 6(1), 213–247.

Urbizagastegui, R. (1999). La ley de Lotka y la literatura de bibliometría. Investigación Bibliotecológica: Archivonomía, Bibliotecología e Información, 13(27), 125–141. https://doi.org/10.22201/iibi.0187358xp.1999.27.3913.

Venkatesh, V.; Chan, F. K. Y.; Thong, J. Y. L. (2012). Designing e-government services: Key service attributes and citizens’ preference structures. Journal of Operations Management, 30(1–2), 116–133. https://doi.org/10.1016/j.jom.2011.10.001.

Venkatesh, V.; Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204.

Venkatesh, V.; Morris, M. G.; Davis, G. B.; Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly 27(3), 425–478.

Vieira, E. S.; Gomes, J. A. N. F. (2009). A comparison of Scopus and Web of science for a typical university. Scientometrics, 81(2), 587–600. https://doi.org/10.1007/s11192-009-2178-0.

Wen, X.; Niu, X.; Ji, L.; Tian, Y. (2009). A weak blind signature scheme based on quantum cryptography. Optics Communications, 282(4), 666–669. https://doi.org/10.1016/j.optcom.2008.10.025.

Wirtz, B. W.; Weyerer, J. C. (2017). Cyberterrorism and Cyber Attacks in the Public Sector: How Public Administration Copes with Digital Threats. International Journal of Public Administration, 40(13), 1085–1100. https://doi.org/10.1080/01900692.2016.1242614.

Yang, L.; Elisa, N.; Eliot, N. (2019). Privacy and security aspects of E-government in smart cities. Smart Cities Cybersecurity and Privacy 89-102. https://doi.org/10.1016/B978-0-12-815032-0.00007-X.

Zhang, H.; Tang, Z.; Jayakar, K. (2018). A socio-technical analysis of China’s cybersecurity policy: Towards delivering trusted e-government services. Telecommunications Policy, 42(5), 409–420. https://doi.org/10.1016/j.telpol.2018.02.004.

Zhao, J. J.; Zhao, S. Y.; Zhao, S. Y. (2010). Opportunities and threats: A security assessment of state e-government websites. Government Information Quarterly, 27(1), 49–56. https://doi.org/10.1016/j.giq.2009.07.004.

Zissis, D.; Lekkas, D. (2011). Securing e-Government and e-Voting with an open cloud computing architecture. Government Information Quarterly, 28(2), 239–251. https://doi.org/10.1016/j.giq.2010.05.010.


Enlaces refback

  • No hay ningún enlace refback.


Revista de Pensamiento Estratégico y Seguridad CISDE

ISSN: 2529-8763

www.uajournals.com/cisdejournal

cisdejournal@uajournals.com