The Affected To Public Sector And Private Sector

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Information technology is mainly use for manage and process information for various techniques used general. Information technology is mainly to use computer science and communications technology to design, develop, installation and carry out of information system and some application software. We also call it as information and communication technology (ICT).

Information Technology is becoming more prevalent in this social. It is impacts us all. We need to protect and accountable for this technology that we use every day. We also need to consider this technology will bring a lot of impact to our society.

1.2 Information and Communication Technology

ICT also called as Information and Communication Technology. It is refers to the technology that are using telecommunications to access to the information. Information and Communication technology is mainly on the communications technology and it is almost same like information technology. There are some technologies or mediums that can use to communicate with each other which are internet, wireless network, hand phone and other technology or communications mediums.

Nowadays, information and communication technology security issues and concerns are becoming more prevalent and increasingly complex as the pace of technology implementation continues to accelerate. This phenomenon has affected the public sector and the private sector in our country.

1.1 E-Government

E-Government also called as Electronic Government. The e-Gov field emerged in the late 1990’s as a context within which to share experiences among practitioners. Over few years e-Gov gave rise to several conferences with more and more scientific content. Some specialized journals now appear. Because the field grew too considerable size, both its contents and position with respect to other research fields and disciplines needs to be explained and discussed.

2.0 Information and Communication Technology

Information and Communication Technology encompasses systems and services that gather, store, recover, maintain, manage, transmit process, interpret, present and protect information. Information and Communication Technology is embodied in large-scale and complex systems such as telecommunications networks and the World Wide Web, in devices such as mobile telephones and Personal Computer, and in services such as banking, digital television and e-Government. It provides necessary tools and infrastructures for many branches of science and design including environmental science, bioscience and automotive design.

ICT systems and services are composed of both electronic and software components, which are supplied by sizeable industries with different characteristics, though, related value chain.

2.1 Security Issues

One of the main issues with Information and Communication Technology is security. At present, security issues are very complex issues. Information and communication technology are both more and more complex and vulnerable with a growing presence of bugs at a developing stage as well as in their production. Launching damaging attacks against the systems requires less complex skills. The classification of attacks that is being used is simple and easily understandable by those who received the questionnaire: persons in charge of the information and communication technology divisions and information and communication technology security.

The following are the categories of attacks referred to:

Virus contamination (both at workstation and server levels)

Theft of information equipment containing data (laptops, hard disk, floppy disks, tapes and etc)

Denial of service

Trojan horses

Piracy and information frauds (abuse of information and communication technology resources, illegal copying of software or data and etc)

Non authorized access and changes of information

Non authorized use of computers

Non authorized access and changes to system and applications

This section summarizes the main issues that organizations will need to consider in terms of Information and Communication Technology security, and covers the relevant legislation – principally the Copyright, Designs and Patents Act 1988, the Computer Misuse Act 1990, the Data Protection Act 1998, and the Regulation of Investigatory Powers Act 2000 (RIPA). The section also provides an overview of BS 7799/ISO/IEC 27002, which is a code of practice for information security management.

2.2 Affected to Public Sector and Private Sector

According to recent studies, security is the biggest challenge facing in the public sector and private sector. Ever-changing security threats from both inside and outside the can severely impair the whole project operations, affecting profitability and our live. In addition, small and medium-sized businesses must comply with new regulations and laws created to protect consumer privacy and secure electronic information. For the personal computer user, keep our personal information and important data safe. Here, I listed 5 security issues that can affected the public, private or in business.

Security Issue No. 1: Worms and Viruses

Computer worms and viruses remain the most common security threat, almost all of small and medium-sized businesses affected by at least one virus in the last year. Worms and viruses can have a devastating effect on business continuity and profitability. Smarter, more destructive strains are spreading faster than ever, infecting entire offices in seconds. Cleaning the infected computers takes much longer, and the process often results in lost orders, corrupted databases, and angry customers. As businesses struggle to update their computers with the latest operating system patches and antivirus software, new viruses can penetrate their defenses at any time. Meanwhile, employees spread viruses and spyware by unwittingly accessing malicious Websites, downloading untrustworthy material, or opening e-mail attachments. These attacks are unintentionally invited into the organization, but can still cause significant financial losses. Security systems must detect and repel worms, viruses, and spyware at all points in the network.

Security Issue No. 2: Information Theft

Information theft is lucrative. Hackers break into business networks to steal credit card or social security numbers for profit. Small and medium sized businesses are seen as an easier target than large corporations. Protecting the perimeter of the network is a good start, but it is not enough, since many information thefts are assisted by a trusted insider, such as an employee or contractor.

Information theft can be costly to small and medium-sized businesses, since they rely on satisfied customers and a good reputation to help grow their business. Businesses that do not adequately protect their information could face negative publicity, government fines, or even lawsuits. For example, new consumer laws enacted in California require any business that suspects customer information has been viewed by unauthorized people must notify all their customers. Any security strategy must prevent theft of sensitive electronic information from both inside and outside the business.

Security Issue No. 3: Business Availability

Computer worms and viruses are not the only threat to business availability. Denial-of-service (DoS) attacks can shut down Websites and ecommerce operations by sending large volumes of traffic to a critical network element and causing it to fail or to be unable to process legitimate traffic. Once again, the results are disastrous: data and orders are lost and customer requests are not answered. If these attacks become public, a company’s credibility is damaged. While most of the publicity surrounding DoS outages has focused on major banks and global 500 companies, small and medium-sized businesses are not immune. They are viewed as less prepared for attacks than large corporations.

Many less dramatic but more likely attacks also threaten business availability. For example, a resource theft attack breaches business computers and networks, using them for illegal file sharing of music, movies, or software. Often, businesses are unaware that a security breach is underway. Meanwhile, their computers and networks are slow to respond to customers, and their unwitting participation in illegal file sharing leaves them vulnerable to lawsuits.

Security Issue No. 4: The Unknown

With every advance in computing and communications comes new ways to exploit that technology for gain or mischief. New hardware or software releases present such opportunities. When peer-to-peer networking and instant messaging were still relatively new applications, for example, their users were attacked by malicious code written specifically for them. Now, mobile phones are frequent targets of viruses. Without the ability to predict what is coming next, the best defense is one that can easily adapt to future threats, and that is affordable.

Security Issue No. 5: Security Legislation

Aside from these security threats, new laws and regulations require that small and medium-sized businesses protect the privacy and integrity of the information entrusted to them. In the European Union, for example, the EU Data Protection Act governs the protection of personal data in the hands of organizations. Nearly every industry has an example of legislation that regulates businesses and requires additional security measures. In the United States, the Health Insurance Portability and Accountability Act (HIPAA) requires healthcare organizations, including every doctor’s office, to put safeguards in place to ensure the privacy of health information and prevent unauthorized access.

The onus is on businesses to comply with laws and regulations that apply to their business in their markets. Customers want assurance that their information will be kept private. All businesses must take steps to secure their business infrastructure, but with their limited budgets, small and medium-sized businesses, in particular, require simple, right-sized, affordable solutions.

2.4 Conclusion

Information and Communication Technologies will provide benefits to our society for years to come. The proliferation of these technologies or their decline will be affected amongst all by security issues on these areas: lack of security awareness and training, operating system design and security, open source issues, design complexity and multiple layer approach. Therefore, designing better operating systems, improving on security awareness, training and multiple layer complexity are some of the challenges for the future.

3.0 E-Government and its Value

We live in an increasingly interconnected society, where the Internet has spawned tremendous improvements in efficiency and customer service. People use the telephone and the Internet to get service 24 hours a day, seven days a week. All Internet users also can access to the government websites or interact with government websites. E-Government will save taxpayers a significant amount of money, while adding value to citizens’ experience with government and better serving their needs. Consequently, the President has made "Expanding E-Government" integral to a five-part Management Agenda for making government more focused on citizens and results. E-Government provides many opportunities to improve the quality service to the citizen. Citizens should be able to get service or information in minutes or hours, versus today’s standard of days or weeks.

An effective strategy will result in significant improvements in the federal government, including:

Simplifying delivery of services to citizens

Eliminating layers of government management

Makin it easy and possible for the public, easy to find information and service from it

Integration and eliminating redundant systems, it can help to reducing the costs and simplifying agencies business processes.

Respond to the citizen need

This focuses on four citizen-centered groups, each providing opportunities to transform delivery of services.

Individuals/Citizens: Government-to-Citizens (G2C); Build easy to find, easy to use, one stop points-of-service that make it easy for citizens to access high-quality government services.

Businesses: Government-to-Business (G2B); Reduce government’s burden on businesses by eliminating redundant collection of data and better leveraging E-business technologies for communication.

Intergovernmental: Government-to-Government (G2G); Make it easier for states and localities to meet reporting requirements and participate as full partners with the federal government in citizen services, while enabling better performance measurement, especially for grants. Other levels of government will see significant administrative savings and will be able to improve program delivery because more accurate data is available in a timely fashion.

Intra-governmental: Internal Efficiency and Effectiveness (IEE); Make better use of modern technology to reduce costs and improve quality of federal government agency administration, by using industry best practices in areas such as supply-chain management, financial management and knowledge management. Agencies will be able to improve E-Government Strategy effectiveness and efficiency, eliminating delays in processing and improving employee satisfaction and retention.

3.1 E-Government Framework

In every project of e-Government, also need a framework to execute the project. Integration Framework enables the integration of applications and data across the extended enterprise, thus maximizing an agency’s ability to protect its constituents and help improve operational efficiencies. Elements of the Integration Framework include: Program Manager, Technology, Process and People.

Program Manager

Program Manager is the one who have the most critical and manage the project manager. In program of E-government, there have a lot of project like Electronic Service, Electronic Procurement, Project Monitoring System, Human Resource Management Information System, Generic Office Environment, Electronic Labour Exchange and Electronic Syariah. Each project is need a project manager and all the project manager is in charge by the program manager. Program Manager ensures development e-government flagship is coordinated, timely and meets its objectives. Provide standard guidelines in system design and testing, GUI, BPR, transition planning, security and benefit capture. Program Manager is a Malaysian Administrative Modernization and Management Planning Unit (MAMPU) group members.

Technology

Technology is mean the technology which support behind the e-government program. Due to e-government is doing the interaction between citizen and business through internet, so the facilities of technology such as Internet speed or other else is necessarily. So, the government must use the right technology to support their services. This technology should provide information and tools support user which is Shared Infrastructure, Security and Privacy and Technologies Usage.

Process

Process means the work flow of the e-government system. Look for opportunities where government process can be improved, Reengineered or Redesigned. Define operating business standards and procedures to meet business objectives of the program. In process section, it controlled three things which are business model, Business Process Reengineering and cyber law.

Business Model

So far, business models have been investigated in the context of e-commerce focusing on economic issues but they do not consider the viewpoints of authorities embarking on public private partnerships for citizen services. This paper describes our modeling method BMeG that is dedicated to the planning of business models for e-Government services. BMeG allows one to model options of value chains with various perspectives including advantages and disadvantages with impacts on policies. BMeG depicts the added value of potential partnerships and thus supports authorities to decide on alliances for public private partnerships or other financing models for e-Government services

Business Processing Reengineering

BPR is known by many names, such as ‘core process redesign’, ‘new industrial engineering’ or ‘working smarter’. All of them imply the same concept which focuses on integrating both business process redesign and deploying IT to support the reengineering work. In this section we attempt to explore two questions: where does BPR come from and what is involved in BPR. Generally the topic of BPR involves discovering how business processes currently operate, how to redesign these processes to eliminate the wasted or redundant effort and improve efficiency, and how to implement the process changes in order to gain competitiveness. The aim of BPR, according to Sherwood-Smith (1994), is "seeking to devise new ways of organizing tasks, organizing people and redesigning IT systems so that the processes support the organization to realize its goals".

Cyber Law

Cyber law refers to any laws relating to protecting the Internet and other online communication technologies. In the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet.

The Malaysian Government has already passed several cyber laws to control and reduce the Internet abuse. These cyber laws include:

Digital Signature Act 1997

Computer Crimes Act 1997

Telemedicine Act 1997

Communications and Multimedia Act 1998

Beside these cyber laws, there are three other cyber laws being drafted.

Private Data Protection Bill

Electronic Government Activities Bill

Electronic Transactions Bill

People

People are mean when u turn all the government system into electronic system and people is the group which can help to manage and control the facilities of system machine. Organizing, motivating and empowering will help people to succeed in embracing and sustaining e-government. Provide clear communicating goals of objective of e-government which is Managing Change and Human Resource and Training.

Conclusion

Each e-Government project has its own versions of the framework, where elements within the four components may differ according to the individual agency’s business or technical needs.

4.0 Conclusion and Recommendation

A better information and communication technology security can help us protect our information and privacy. Security threats and concerns are becoming more prevalent and increasingly complex as the pace of technology implementation continues to accelerate.

E-Government is a best websites that citizen can interact with government. Citizen can updated news on this websites also can know about government activities.

In my opinion, Computer users must upgrade their computer software that can protect and prevents the security issues. Computer users also can review the government websites. Users can get the latest news about government and country on this websites. Users also can give some comment on this websites that can help government to improve this websites.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now