StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

E-government users identification - Research Proposal Example

Cite this document
Summary
The information technology with its huge scope has revolutionized the concept of the distance and time and thereby, given a new meaning to e-governance…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
E-government users identification
Read Text Preview

Extract of sample "E-government users identification"

Download file to see previous pages

Therefore all organizations strive to develop a comprehensive information system that would promote and accelerate the organizational aims and objectives in a manner that would help it to achieve higher level of efficiency and organizational growth which would offset a competitive advantage over their rivals. The e-governance based on information system with its wide variety of database, comprising of canonical and non canonical types of information, is not only complex by nature but also highly sensitive for its confidentiality.

Thus, security of user identification and login become vital ingredients of an effective e-government. The proposal would help identify and evaluate the various elements of e-security and measures that would help protect the risks of breach of information in the e-government of Saudi Arabia. Saudi Arabia is prominent country of the South East Asia with Islamic culture. It is a vast land of arid desert and hot climate. In the last 30 years, it has undergone tremendous transformation in almost all areas of public concern vis-à-vis health, education, transport, environment and infrastructure development (Saudi Arabia, 2006) Network of roads, application of technology for improving public health and local economy have been the key areas of development.

It has state of the art hospitals, education centers, universities and tourists attractions and recreational facilities. The oil and gas mining has been the major source of wealth creation that has been well utilized to improve the socio-economic status of 22.6 million population. The e-governance, would therefore, greatly facilitate transparency and improve and improvise the management of government departments for optimal outcome. In the last three decades, Saudi Arabia has seen tremendous changes in its socio-economic development processes.

The oil mining has greatly improved

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“E-government users identification Research Proposal”, n.d.)
E-government users identification Research Proposal. Retrieved from https://studentshare.org/miscellaneous/1569562-e-government-users-identification
(E-Government Users Identification Research Proposal)
E-Government Users Identification Research Proposal. https://studentshare.org/miscellaneous/1569562-e-government-users-identification.
“E-Government Users Identification Research Proposal”, n.d. https://studentshare.org/miscellaneous/1569562-e-government-users-identification.
  • Cited: 0 times

CHECK THESE SAMPLES OF E-government users identification

Introduction to Biometric Identification Database

But the evolution of biometrics in the form of automated identification of finger prints, geometry of hand, iris construction, facial structure, genetic makeup etc.... Applications to test the first hypothesis are called "positive identification" systems (verifying a positive claim of enrollment), while applications testing the latter are "negative identification" systems (verifying a claim of no enrollment).... In fact the nail is also included for identification in fingerprinting....
11 Pages (2750 words) Essay

Radio Frequency Identification Tags

Radio Frequency identification tags are not spared from viruses.... The viruses may come from a buffer overflow even if the identification tags can hold information even if its memory is only about 114 bytes.... Since RFID tags carry important information, it is very usefule not only in identification but for access into different databases as well.... Integration of RFID in any form of identification card, license, and document issued by the state....
3 Pages (750 words) Essay

The Current Efforts to Implement biometric Identification

The paper 'The Current Efforts to Implement biometric identification' presents biometric authentication which refers to the use of personal identification characteristics in association with information technology for the purposes of verification, security, and tracking.... hellip; Biometrics can be integrated with passports, identification cards, and driver's licenses which refer local users to a central database of information for wide-scale identity verification in society....
10 Pages (2500 words) Case Study

Social Problem Identification Report

The numbers of marijuana users rose from 5.... Today, majority of drug users lack basic access to rehabilitation centers, and... Drug abuse cases have increased in the society, and it is raising concern since it affects the society both economically and socially....
5 Pages (1250 words) Term Paper

Radio Frequency identification / Near field communication / Mobile Payment

Meanwhile, Radio Frequency identification (RFID) refers to the wireless use or application of electromagnetic fields for purposes of transferring data.... RFID allows for automatic identification and tracking of labels or tags to certain objects.... RFID is a typical example of methods for Automatic identification and Data Capture (AIDC)....
13 Pages (3250 words) Research Paper

Biometric Identification

From the paper "Biometric identification" it is clear that the ethical consideration of biometric technology is questionable particularly on security.... hellip; It is a clearly recognized fact that the customary security measures like identification cards and passwords cannot sufficiently satisfy all forms of security requirements.... As a result, biometrics is presently and continuously used for identification and authentication purposes in information systems (Frischholz, Robert and Ulrich 67)....
9 Pages (2250 words) Essay

Biometrics' Help to Address Crime, Shape Identification, Security

This work "Biometrics' Help to Address Crime, Shape identification, Security and Privacy" describes the development of technologies, beneficial use of biometrics to the society, the influence of security measures.... nbsp;There has been tremendous development in security, identification, privacy, and fight against crime.... It has brought many improvements in areas such as identification, security, privacy, and in combatting crime.... Often known as realistic authentication, it is used in computer science where it acts as a form of identification and access control....
6 Pages (1500 words) Coursework

E-Government Portals Efficiency and Performance in Saudi Arabia

The paper "e-government Portals Efficiency and Performance in Saudi Arabia" states that the research is a systematic literature review that focuses on the research questions by identifying, selecting and appraising all the possible evidence for that particular research question.... In some countries, e-government programs might come to be very useful as there are strict guidelines for what is legal and what is not.... Saudi Arabia stands out to be a country that has started to implement e-government services for its citizen....
8 Pages (2000 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us