{"title":"Privacy protection in Nigerian E-Government systems","authors":"David Alade, S. Butakov, P. Zavarsky","doi":"10.1109/ICAICT.2016.7991695","DOIUrl":null,"url":null,"abstract":"The paper examines and evaluates specific features of the collection and transmission of personal information on some e-Government websites in Nigeria. It presents the adoption of a special publication on security and privacy requirement controls intended for the protection of information on e-Government web services. Among the websites assessed, only one transmitted the citizens Personal Identifiable Information (PII) data through a secured communication channel. The findings indicated that Nigerian e-Government policymakers/authorities would benefit from best practices on how they protect the collection, use, disclosure, retention, and disposal of recorded individual's personal information in their information systems. The scope of this paper was limited to only the Nigerian e-Government but could be used in other developing nations.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2016.7991695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The paper examines and evaluates specific features of the collection and transmission of personal information on some e-Government websites in Nigeria. It presents the adoption of a special publication on security and privacy requirement controls intended for the protection of information on e-Government web services. Among the websites assessed, only one transmitted the citizens Personal Identifiable Information (PII) data through a secured communication channel. The findings indicated that Nigerian e-Government policymakers/authorities would benefit from best practices on how they protect the collection, use, disclosure, retention, and disposal of recorded individual's personal information in their information systems. The scope of this paper was limited to only the Nigerian e-Government but could be used in other developing nations.