{"title":"尼日利亚电子政务系统中的隐私保护","authors":"David Alade, S. Butakov, P. Zavarsky","doi":"10.1109/ICAICT.2016.7991695","DOIUrl":null,"url":null,"abstract":"The paper examines and evaluates specific features of the collection and transmission of personal information on some e-Government websites in Nigeria. It presents the adoption of a special publication on security and privacy requirement controls intended for the protection of information on e-Government web services. Among the websites assessed, only one transmitted the citizens Personal Identifiable Information (PII) data through a secured communication channel. The findings indicated that Nigerian e-Government policymakers/authorities would benefit from best practices on how they protect the collection, use, disclosure, retention, and disposal of recorded individual's personal information in their information systems. The scope of this paper was limited to only the Nigerian e-Government but could be used in other developing nations.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Privacy protection in Nigerian E-Government systems\",\"authors\":\"David Alade, S. Butakov, P. Zavarsky\",\"doi\":\"10.1109/ICAICT.2016.7991695\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper examines and evaluates specific features of the collection and transmission of personal information on some e-Government websites in Nigeria. It presents the adoption of a special publication on security and privacy requirement controls intended for the protection of information on e-Government web services. Among the websites assessed, only one transmitted the citizens Personal Identifiable Information (PII) data through a secured communication channel. The findings indicated that Nigerian e-Government policymakers/authorities would benefit from best practices on how they protect the collection, use, disclosure, retention, and disposal of recorded individual's personal information in their information systems. The scope of this paper was limited to only the Nigerian e-Government but could be used in other developing nations.\",\"PeriodicalId\":446472,\"journal\":{\"name\":\"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAICT.2016.7991695\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2016.7991695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy protection in Nigerian E-Government systems
The paper examines and evaluates specific features of the collection and transmission of personal information on some e-Government websites in Nigeria. It presents the adoption of a special publication on security and privacy requirement controls intended for the protection of information on e-Government web services. Among the websites assessed, only one transmitted the citizens Personal Identifiable Information (PII) data through a secured communication channel. The findings indicated that Nigerian e-Government policymakers/authorities would benefit from best practices on how they protect the collection, use, disclosure, retention, and disposal of recorded individual's personal information in their information systems. The scope of this paper was limited to only the Nigerian e-Government but could be used in other developing nations.