top of page

Influence Of Cybercrime On E-Governance. Is Cybercrime Affecting The Confidentiality Of Government

Influence Of Cybercrime On E-Governance. Is Cybercrime Affecting The Confidentiality Of Government Data?




Aravamudhan G & Nithin K, Kristu Jayanti College of Law, Bengaluru

ABSTRACT

E-governance emerged as a result of government’s efforts to improve their interactions with citizens. If certain conditions are met, electronic transactions can have the same legal value as other forms of communication, such as written. To protect e-governance initiatives, it is important to implement information security best practices. This involves establishing security policies, practices, and techniques, as well as using security technologies to protect e-Government systems from attack, detection of anomalous activity, and potentially harmful effects. well-defined crisis management plan. Key elements include a trusted public key infrastructure for authentication and integrity, as well as ongoing awareness and training programs to ensure everyone understands possible security risks. identify potential issues and respond accordingly in an appropriate manner to keep e- Government services secure. This article aims to classify user communities for governance and highlight the role each community plays in promoting cybersecurity in the context of information and communication technology and governance.

Keywords: Cybercrime, E-Governance, Cyber Security.

Comments


Indian Journal of Law and Legal Research

Abbreviation: IJLLR

ISSN: 2582-8878

Website: www.ijllr.com

Accessibility: Open Access

License: Creative Commons 4.0

Submit Manuscript: Click here

Open Access Logo

Licensing:

​All research articles published in The Indian Journal of Law and Legal Research are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the IJLLR or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the IJLLR.

bottom of page