{"title":"e-Government Security Method Evaluation by Using G-AHP: A MCDM Model","authors":"Proshikshya Mukherjee, S. Samanta, P. Pattnaik","doi":"10.1201/9781003131175-5","DOIUrl":"https://doi.org/10.1201/9781003131175-5","url":null,"abstract":"","PeriodicalId":207639,"journal":{"name":"Strategies for E-Service, E-Governance, and Cybersecurity","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124226855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suchismita Das, Poonam Biswal, N. Jaiswal, Sharmistha Banerjee
{"title":"e-Governance in the Health Sector","authors":"Suchismita Das, Poonam Biswal, N. Jaiswal, Sharmistha Banerjee","doi":"10.1201/9781003131175-6","DOIUrl":"https://doi.org/10.1201/9781003131175-6","url":null,"abstract":"","PeriodicalId":207639,"journal":{"name":"Strategies for E-Service, E-Governance, and Cybersecurity","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121209791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Subham Naskar, P. Dhruv, Pranjali Kumar, Soumya Mukherjee
{"title":"Vulnerability and Cybersecurity in the Natural Gas and Oil Industry","authors":"Subham Naskar, P. Dhruv, Pranjali Kumar, Soumya Mukherjee","doi":"10.1201/9781003131175-7","DOIUrl":"https://doi.org/10.1201/9781003131175-7","url":null,"abstract":"","PeriodicalId":207639,"journal":{"name":"Strategies for E-Service, E-Governance, and Cybersecurity","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115387394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Information Communication Systems and Some Social Issues","authors":"Balwinder Singh Brar","doi":"10.1201/9781003131175-12","DOIUrl":"https://doi.org/10.1201/9781003131175-12","url":null,"abstract":"","PeriodicalId":207639,"journal":{"name":"Strategies for E-Service, E-Governance, and Cybersecurity","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127352215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Management in SDN Using Fog Computing: A Survey","authors":"Manish Snehi, A. Bhandari","doi":"10.1201/9781003131175-9","DOIUrl":"https://doi.org/10.1201/9781003131175-9","url":null,"abstract":"","PeriodicalId":207639,"journal":{"name":"Strategies for E-Service, E-Governance, and Cybersecurity","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125675805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"e-Governance, Issues, and Challenges of m-Governance in India","authors":"Nishit Mishra","doi":"10.1201/9781003131175-15","DOIUrl":"https://doi.org/10.1201/9781003131175-15","url":null,"abstract":"M-Governance is the modern information and communication technology for reaching the unreached. It is a system which utilize internet, Local Area Network(LAN) and mobile device for the purpose of improving effectiveness ,efficiency and delivery of services to the common people. It is the governance through electronic media to promote and justify democracy. In a democracy the primary job of the government is to focus society on achieving the public interest. Governance is a means of link between govt. and political ,social and administrative environment. E-Governance can transform citizen service in order to empower them. It helps the public to participate in govt. and enhance citizen economic and social opportunity. This will help the society to lead a better life not only for the present period but also for the future. M-Governance otherwise known as governance through mobile devices/phones is a domain of E-Governance . It is more popular due to its low cost and easy accessibility. It is the cheapest way of communication even in rural areas. It can provide timely and accurate information which can lead to public empowerment. M-Governance is one web approach of the government in all the departments by using mobile device. Mobile Seva Delivery Gateway can be one of to its cost saving, proficiency, convenient and flexibility, easy and better access even in remote rural areas. Different factors like rules and regulations, establishment of information security system, optimization of business process and evaluation of E-Governance are responsible in order to have a reliable and good M-Governance.","PeriodicalId":207639,"journal":{"name":"Strategies for E-Service, E-Governance, and Cybersecurity","volume":"22 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120987687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}