Visão Geral do e-Governo: Segurança e Privacidade dos Dados Pessoais = An Overview of e-Government: Security and Privacy of Personal Data

  1. José Avelino Victor 1
  2. Teresa Guarda 2
  3. Ana Dopico-Parada
  1. 1 Polytechnic Institute of Maia, Maia, Portugal
  2. 2 Universidad Estatal Península de Santa Elena, La Libertad, Ecuador
Journal:
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao

ISSN: 1646-9895

Year of publication: 2023

Volume: E (60)

Pages: 54-64

Type: Article

More publications in: RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao

Abstract

e-Government is considered like the use of information andcommunication technologies with the aim to facilitate and improving the efficiency,accessibility, and transparency of the public services; allowing an easily and fasterinteraction without having to move physically between citizens and enterpriseswith the government more easily, without having to move physically. Despitee-Government benefits, it is critical to bear in mind the challenges related tothe security and privacy of the personal data. In this sense Governments mustimplement robust and up-to-date security measures, and the processes of store andshare personal information must be transparent. In this sense Governments mustimplement robust and up-to-date security measures, and the processes of store and share personal information must be transparent. And the success keys thatpremises ensuring that governments and enterprises apply law and regulations inhandling personal data, are the regulation and inspection.

Bibliographic References

  • Alexopoulos, C., Charalabidis, Y., Androutsopoulou, A. L., & Lachana, Z. (2019). Benefits and obstacles of blockchain applications in e-government. 52nd Hawaii International Conference on System Sciences, (págs. 3377-3386). Hawaii. Obtenido de https://scholarspace.manoa.hawaii.edu/bitstream/10125/59773/1/0333.pdf
  • Avotra, A. A., Chengang, Y., Sandra Marcelline, T. R., Asad, A., & Yingfei, Y. (2021). Examining the impact of e-government on corporate social responsibility performance: the mediating effect of mandatory corporate social responsibility policy, corruption, and information and communication technologies development during the COVID era. Frontiers in Psychology, 12, 1-14. doi:12
  • Bannister, F., & Connolly, R. (2012). Forward to the past: Lessons for the future of e-government from the story so far. Information Polity, 17(3-4), 211-226. doi:10.3233./IP-2012-000282
  • Beldad, A., De Jong, M., & Steehouder, M. (2011). I trust not therefore it must be risky: Determinants of the perceived risks of disclosing personal data for e-government transactions. Computers in Human Behavior, 27(6), 2233, 2233-2242. doi:https:// doi.org/10.1016/j.chb.2011.07.002
  • Chadwick, A., & May, C. (2003). Interaction between States and Citizens in the Age of the Internet:“e-Government” in the United States, Britain, and the European Union. Governance, 16(2), 271-300.
  • de Lima, C. R. (2020). Comentários à Lei Geral de Proteção de Dados: Lei n. 13.709/2018, com alteração da Lei n. 13.853/2019. Almedina.
  • de-Miguel-Molina, M. (2009). E-government in Spain: an analysis of the right to quality e-government. International Journal of Public Administration, 1-10, 1-10. doi:https://doi.org/10.1080/01900690903178454
  • Gajendra, S. X., & Wang, Q. (2012). E-government: Public participation and ethical issues. Journal of e-Governance, 35(4), 195-204. doi:10.3233/GOV-2012-0320
  • Guarda, T., Augusto, M. F., Haz, L., & Díaz-Nafría, J. M. (2021). Blockchain and government transformation. nformation Technology and Systems: ICITS 2021, Volume 1 (pp. 88-95). Springer International Publishing., (págs. 88-95). La Libertad, Ecuador. doi:https://doi.org/10.1007/978-3-030-68285-9_9
  • Guarda, T., Fernandes, C., & Augusto, M. F. (2023). Technology, Business, Innovation, and Entrepreneurship in Industry 4.0. Springer Cham. doi:https://doi. org/10.1007/978-3-031-17960-0 Intersoft Consulting. (2022). General Data Protection Regulation (GDPR). Obtenido de GDPR Fines / Penalties: https://gdpr-info.eu/issues/fines-penalties/
  • Lambert, P. (2017). The Data Protection Officer: Profession, Rules, and Role. CRC Press.
  • Latre, J. L. (2003). Implementing e-government in Spain. International Conference on Electronic Government (págs. 442-447). Springer, Berlin, Heidelberg. doi:https:// doi.org/10.1007/10929179_80
  • Lindqvist, J. (2018). New challenges to personal data processing agreements: is the GDPR fit to deal with contract, accountability and liability in a world of the Internet of Things? International journal of law and information technology, 26(1), 45-63. doi:https://doi.org/10.1093/ijlit/eax024
  • Lopes, I. M., Guarda, T., & Oliveira, P. (2019). EU General Data Protection Regulation implementation: an institutional theory view. En T. Guarda, Guarda, & Teresa (Edits.), New Knowledge in Information Systems and Technologies (Vol. 1, págs. 383-393). Springer International Publishing. doi:https://doi.org/10.1007/978-3- 030-75123-4
  • Lopes, I. M., Guarda, T., & Oliveira, P. (2019). Políticas de Segurança e Privacidade: Forma e Fundo. Revista Ibérica de Sistemas e Tecnologias de Informação, E18, 332-342.
  • Mendes, L. S. (2017). Privacidade, proteção de dados e defesa do consumidor-Linhas gerais de um novo direito fundamental. Saraiva Educação SA.
  • Ndou, V. (2004). E-government for developing countries: Opportunities and challenges. Electron. J. Inf. Syst. Dev. Ctries, 18(1), 1-24. doi:https://onlinelibrary.wiley.com/ doi/10.1002/j.1681-4835.2004.tb00117.x
  • Palanisamy, R., & Mukerji, B. (2014). Security and Privacy issues in e-Government. En Cyber Behavior: Concepts, Methodologies, Tools, and Applications (págs. 880- 892). IGI Global. Priisalu, J. &. (2017). Personal control of privacy and data: Estonian experience. Health and technology, 7(4), 441-451. doi:https://link.springer.com/article/10.1007/ s12553-017-0195-1
  • Putra, D. A., Jasmi, K. A., Basiron, B., Huda, M., Maseleno, A., Shankar, K., & Aminudin, N. (2018). Tactical steps for e-government development. International. Journal of pure and applied mathematics, 119(15), 2251-2258.
  • Regulation, G. D. P. (2018). General data protection regulation (GDPR). ntersoft Consulting,. Obtenido de https://www.epsu.org/sites/default/files/article/files/ GDPR_FINAL_EPSU.pdf
  • Rodousakis, N., & Mendes dos Santos, A. (. (2008). The development of inclusive e-Government in Austria and Portugal: a comparison of two success stories. Innovation. The European Journal of Social Science Research, 21(4), 283-316. doi:https://doi.org/10.1080/13511610802591892
  • Sun, P. L., Ku, C. Y., & Shih, D. H. (2015). An implementation framework for E-Government 2.0. Telematics and Informatics, 32(3), 504-520. doi:https://doi. org/10.1016/j.tele.2014.12.003
  • Tikkinen-Piri, C., Rohunen, A., & Markkula, J. (2018). EU General Data Protection Regulation: Changes and implications for personal data collecting companies. Computer Law & Security Review, 34(1), 134-153. doi:https://doi.org/10.1016/j. clsr.2017.05.015
  • Tohidi, H. (Procedia Computer Science). E-government and its different dimensions: Iran. 2011, 3, 1101-1105. doi:http://dx.doi.org/10.1016/j.procs.2010.12.179
  • Vlahovic, N., & Vracic, T. (2015). An overview of e-government 3.0 implementation. Encyclopedia of Information Science and Technology,, 700-2708. Obtenido de https://www.igi-global.com/chapter/an-overview-of-e-government-30- implementation/112688
  • Voigt, P., & Von dem Bussche, A. (2017). A Practical Guide. En The EU General Data Protection Regulation (GDPR). 1st Ed., Cham: Springer International Publishing, 10(3152676), 10-5555.: Springer Cham. doi:https://doi.org/10.1007/978-3-319- 57959-7
  • Wu, Y. (2014). Protecting personal data in E-government: A cross-country study. Government Information Quarterly, 31(1), 150-159. doi:https://doi.org/10.1016/j. giq.2013.07.003
  • Yang, L. E. (2019). Privacy and security aspects of E-government in smart cities. In Smart cities cybersecurity and privacy (pp. 89-102). Elsevier. En K. Z. Danda B. Rawat, Smart Cities Cybersecurity and Privacy (págs. 89-102). doi:https://doi. org/10.1016/B978-0-12-815032-0.00007-X
  • Zhao, J. J., & Zhao, S. Y. (2010). Opportunities and threats: A security assessment of state e-government websites. Government Information Quarterly, 27(1), 49-56. doi:https://doi.org/10.1016/j.giq.2009.07.004