2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT) 2017
DOI: 10.1109/icicict1.2017.8342761
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced eGovemment integration framework for higher interoperability in eGovernment initiatives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…SOA is not a new concept and is usually implemented to model government services and integrate them in a, e.g., service catalog (Yli-Huomo et al, 2018;Paul et al, 2012;Ma, 2010;Echevarria et al, 2015;Penna et al, 2015;Riyanto et al, 2018;Abdullah et al, 2017;Sedek et al, 2015;Tebib et al, 2015). However, due to the diversity of government agencies, a middleware component is usually implemented to ease the integration of information systems within SOA architectures (Mecca et al, 2016).…”
Section: Icts Implemented In Mature E-government Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…SOA is not a new concept and is usually implemented to model government services and integrate them in a, e.g., service catalog (Yli-Huomo et al, 2018;Paul et al, 2012;Ma, 2010;Echevarria et al, 2015;Penna et al, 2015;Riyanto et al, 2018;Abdullah et al, 2017;Sedek et al, 2015;Tebib et al, 2015). However, due to the diversity of government agencies, a middleware component is usually implemented to ease the integration of information systems within SOA architectures (Mecca et al, 2016).…”
Section: Icts Implemented In Mature E-government Systemsmentioning
confidence: 99%
“…One of the solutions is to move all the security logic to a dedicated server to create a single authentication point for the whole system (Ma, 2010;Riyanto et al, 2018;Sedek et al, 2015;Tebib et al, 2015;Mecca et al, 2016;Setiawan et al, 2018). Another system to guarantee network security is the public key infrastructure (PKI), which is an identity authentication scheme based on digital certificates, and provides identity authentication even in the open cloud environment (Abdullah et al, 2017;Sedek et al, 2015). Another technology enabling privacy and security is an eSignature, where a qualified electronic signature has the equivalent legal effect of a handwritten signature (Marsalek et al, 2017).…”
Section: Icts Implemented In Mature E-government Systemsmentioning
confidence: 99%
“…The public sector strives to provide the greatest service to citizens through efficient and reliable technologies. The implementation of the electronic government (e-Government) is an effort to enhance the efficiency and effectiveness of public sector services [22]. The coverage of e-Government has also expanded to a larger domain that requires collaboration with partners, suppliers, and customers for excellent service delivery.…”
Section: Legacy Systems In the Public Sectormentioning
confidence: 99%
“…These systems are also difficult to expand and integrate with new information systems [9]. Legacy systems are unable to meet the requirement of information access that has now taken place across organisational and national boundaries [22]. Sharing information through the integration process poses significant challenges to the public sector agencies that are still using legacy systems [3,9].…”
Section: Legacy Systems In the Public Sectormentioning
confidence: 99%