• Title/Summary/Keyword: e-GOV SW

Search Result 4, Processing Time 0.02 seconds

Evaluation Methodology of Diagnostic Tool for Security Weakness of e-GOV Software (전자정부 소프트웨어의 보안약점 진단도구 평가방법론)

  • Bang, Jiho;Ha, Rhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.4
    • /
    • pp.335-343
    • /
    • 2013
  • If the SW weaknesses, which are the main cause of cyber breaches, are analyzed and removed in the SW development stages, the cyber breaches can be prevented effectively. In case of Domestic, removing SW weaknesses by applying Secure SDLC(SW Development Life Cycle) has become mandatory. In order to analyze and remove the SW weaknesses effectively, reliable SW weakness diagnostic tools are required. Therefore, we propose the functional requirements of diagnostic tool which is suitable for the domestic environment and the evaluation methodology which can assure the reliability of the diagnostic tools. Then, to analyze the effectiveness of the proposed evaluation framework, both demonstration results and process are presented.

A Study on Analysis Model of E-government Business Regulation Using Delphi and AHP Method. (델파이와 AHP 기법을 활용한 전자정부사업 규제의 적정성 분석모델에 관한 연구)

  • Kim, Hoe-Soo
    • Informatization Policy
    • /
    • v.27 no.2
    • /
    • pp.40-65
    • /
    • 2020
  • The purpose of this study is to prevent enactment of regulations on the basis of fragmented claims by stakeholders about e-government business regulations, and to rather decide whether to introduce regulation by quantitative methods based on cost-benefit analysis. To this end, a quantitative regulatory analysis model is to be prepared based on the policy objectives to be pursued when preparing e-government regulations. First, for regulating e-government business, the policy objectives to be pursued were derived large and small categories by applying the Delphi technique. The importance of each policy objective item was then set by applying the AHP technique. Also, based on this analysis model, the appropriateness of the existing e-government regulations was analyzed. As a result of the analysis, many of the regulations partly met the objectives discussed at the time of enactment, but negative effects were also observed in terms of overall efficiency and consumer benefits.

An Empirical Study on Open Government Data: Focusing on ODB and OUR Index (공공데이터 개방에 관한 실증연구: ODB와 OUR Index를 중심으로)

  • Seo, Hyung-Jun
    • Informatization Policy
    • /
    • v.24 no.1
    • /
    • pp.48-78
    • /
    • 2017
  • In this study, to reveal determinant factors for degree of open data it conduct empirical analysis for ODB(Open Data Barometer) and OUR Index(Open, Useful, Reusable Government Data Index) that are global open data index among 26 countries. As a result of multiple regression analysis, First focus is on ODB. In the Model 1 with independent variables, e-Government, SW Market size and government efficacy are significantly positive effect for ODB. In the Model 2 with independent variables and moderating variable, e-Government, SW market size and social capital are significantly positive effect for ODB. In the Model 3 with independent variables, moderating variable and interaction term, e-Government and social capital are significantly positive effect for ODB. Second focus is on OUR Index. In the Model 1 and the Model 2 e-Government is significantly positive effect for OUR Index. In the Model, e-Government and SW market size ${\times}$ social capital(interaction term) are significantly positive effect for OUR Index. And in path analysis, only ODB alternative model show Government efficacy with social capital has full mediation effect. In OUR Index alternative model there is no mediation effect with social capital.

A study of how to input data validation from the central viewpoint using eGov framework (전자정부 표준프레임워크를 이용한 중앙집중적인 관점에서의 입력 데이터 검증 방법 연구)

  • Lee, Sang-Gu;Choi, Jin-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.666-669
    • /
    • 2013
  • 2012년 고시된 '정보시스템 구축 운영 지침'에 따라 행정안전부에서는 '전자정부 SW 개발 운영자를 위한 시큐어 코딩 가이드'를 배포하고 있다. 시큐어 코딩 기법을 예제 위주로 제시함으로써, 개발 실무에 활용도를 높이기 위하여 배포된 시큐어 코딩 가이드는 유용한 지침서임에는 틀림이 없으나, 개발자 개개인이 그 내용을 모두 숙지하기 위해서는 많은 시간과 노력을 필요로 한다. 특히 입력 데이터 검증 및 표현에 관한 시큐어 코딩은 시스템 아키텍쳐 차원의 중앙집중적인 관점이 아닌 개발자 개개인이 구현한 기능 단위 수준에서 수행되고 있는 필드의 현실상, 이를 중앙집중적인 관점에서의 입력 데이터 검증을 통하여, 보다 안전한 소프트웨어를 제작하기 위한 방법을 코드 중심의 사례로 설명하고자 한다.