Logo PTI
Polish Information Processing Society
Logo FedCSIS

Annals of Computer Science and Information Systems, Volume 8

Proceedings of the 2016 Federated Conference on Computer Science and Information Systems

An Information Security Framework for Ubiquitous Services in eGovernment Structures: A Peruvian Local Government Experience

, ,

DOI: http://dx.doi.org/10.15439/2016F72

Citation: Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 8, pages 13091316 ()

Full text

Abstract. This paper describes a framework designed to establish vital conditions of information security for ubiquitous services (U-Government) both in district and province municipalities (departments' capitals) within the Peruvian electronic (e-government) government structures. The framework contains current regulations concerning information security, data privacy, business continuity, and natural disasters management based on good international practices, including but not limited, ISO 27001, ISO 27002, ISO 22301 standards. The aim is to help implement security controls in the use of mobile services which are part of the e-government services catalogue. The framework structure is closely related to the COBIT 5.0 process model.


  1. H. Ranaweera, “Perspective of trust towards e-government initiatives in Sri Lanka”, SpringerPlus., vol. 5, no 22, pp. 1-11, 2016. http://dx.doi.org/10.1186/s40064-015-1650-y
  2. J. Batlle-Montserrat, J. Blat, and E. Abadal, “Local e-government Benchlearning: Impact analysis and applicability to smart cities benchmarking,” Information Polity., vol. 21, pp. 43-59, 2016. http://dx.doi.org/10.3233/IP-150366
  3. P. Pitchay Muthu Chelliah, R. Thurasamy, A. I. Alzahrani, O. Alfarraj, and N. Alalwan, “E-Government service delivery by a local government agency: The case of E-Licensing Telematics and Informatics”, vol. 33, pp. 925-935, 2016. http://dx.doi.org/10.1016/j.tele.2016.02.003
  4. A. Ramtohul, and K. M. S. Soyjaudah, “Information security governance for e-services in southern African developing countries e- Government projects”, Journal of Science and Technology Policy Management., vol. 7, pp. 26-42, 2016. http://dx.doi.org/10.1108/JSTPM-04-2014-0014
  5. R. Kennedy and H. J. Scholl, “E-regulation and the rule of law: Smart government, institutional information infrastructures, and fundamental values”, Information Polity., vol. 21, pp. 77-98, 2016. http://dx.doi.org/10.3233/IP-150368
  6. L. G. Anthopoulos and C. G. Reddick, “Understanding electronic government research and smart city: A framework and empirical evidence”, Information Polity., vol. 21, pp. 99-117, 2016. http://dx.doi.org/10.3233/IP-150371
  7. ISACA, COBIT 5.0 For Information Security. ISACA Publishing, USA, 2012.
  8. J. Krumm, Ubiquitous Computing Fundamentals. Chapman and Hall/CRC, USA, 2009.
  9. A. Anttiroiko, “Towards Citizen-Centered Local e-Government – The Case of the City of Tampere”, Idea Group Publishing, vol. 6, pp. 370–372, 2004. http://dx.doi.org/10.4018/978-1-59140-259-6.ch021
  10. J. Joo and A. Hovav, “The influence of information security on the adoption of web-based integrated information systems: an e- government study in Peru”, Information Technology for Development, vol. 22, pp. 94-116, 2016. http://dx.doi.org/10.1080/02681102.2014.979393
  11. B. W. Wirtz and O. T. Kurtz. “Determinants of Citizen Usage Intentions in e-Government: An Empirical Analysis”, Public Organization Review, pp. 1-20, 2016. http://dx.doi.org/10.1007/s11115-015-0338-7
  12. G. Sangeetha and L. Manjunatha Rao, “Modelling of E-governance framework for mining knowledge from massive grievance redressal data”, International Journal of Electrical and Computer Engineering, vol. 6, pp. 367-374, 2016. http://dx.doi.org/10.11591/ijece.v6i1.9019
  13. A. Djeddi and I. Djilali, “A user centered ubiquitous government design framework”, ACM International Conference Proceeding Series, 2015. http://dx.doi.org/10.13140/RG.2.1.4890.6000
  14. B. Schneir, “Ubiquitous Surveillance and Security [Keynote]”, IEEE Technology and Society Magazine, vol. 34, no. 7270448, pp. 39-40, 2015. http://dx.doi.org/10.1109/MTS.2015.2461232
  15. A. Asquer. “E-government, M-government, L-government: Exploring future ICT applications in public administration”, Public Affairs and Administration: Concepts, Methodologies, Tools, and Applications, 2015, vol. 4, pp. 2155-2168. http://dx.doi.org/10.4018/978-1-4666-8358-7.ch11
  16. K. Malladi, S. Sridharan and L. T. Jayprakash, “Architecting a large- scale ubiquitous e-voting solution for conducting government elections”, International Conference on Advances in Electronics, Computers and Communications, ICAECC 2014, no. 7002445, 2015. http://dx.doi.org/10.1109/ICAECC.2014.7002445
  17. E. Mello and J. Souza Neto, “A Governance and Management Model for the Public Sector Shared Services Center Based on COBIT 5”. COBIT Focus, ISACA Publishing, no. 3, on site http://www.isaca.org/COBIT/focus/Pages/a-governance-and-management-model-for-the-public-sector-shared-services-center-based-on-cobit5.aspx?utm_campaign=ISACA+Main&cid=sm_1202172&utm_content=1460055833&utm_source=facebook&utm_medium=social&appeal=sm, 2016.
  18. K. Maes, P. De Bruyn, G. Oorts and P. Huysmans, “On the Imperative Solicitude for Evolvability Evaluation in Value Management”, International Journal of IT/Business Alignment and Governance (IJITBAG), vol. 5, pp. 70-87, 2014. http://dx.doi.org/10.4018/ijitbag.2014070104
  19. International Organization for Standardization, ISO/IEC 27002:2013, Information technology – Security techniques – Code of practice for information security management, Switzerland, 2013.
  20. S. Alghamdi, N. Beloff, “Exploring Determinants of Adoption and Higher Utilisation for E-Government: A Study from Business Sector Perspective in Saudi Arabia”, 10th Conference on Information Systems Management, ISM 2015, vol. 5, pp. 1469 – 1479, 2015. http://dx.doi.org/10.15439/2015F257.
  21. P. Chatzoglou, D. Chatzoudes, S. Symeonidis, “Factors affecting the intention to use e-Government services”, 10th Conference on Information Systems Management, ISM 2015, vol. 5, pp. 1489–1498, 2015. http://dx.doi.org/10.15439/2015F171
  22. S. Alghamdi, N. Beloff, “Towards a Comprehensive Model for E- Government Adoption and Utilisation Analysis: The Case of Saudi Arabia”, 9th Conference on Information Systems Management, ISM 2014, vol. 2, pp. 1217–1225, 2014. http://dx.doi.org/10.15439/2014F146
  23. G. Wangen, E. A. Snekkenes, “A Comparison between Business Process Management and Information Security Management”, 1st Workshop on Emerging Aspects in Information Security, EAIS 2014, vol. 2, pp. 901 – 910, 2014. http://dx.doi.org/10.15439/2014F77