Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Strategies for e-Service, e-Governance, and Cybersecurity : Challenges and Solutions for Efficiency and Sustainability, EPUB eBook

Strategies for e-Service, e-Governance, and Cybersecurity : Challenges and Solutions for Efficiency and Sustainability EPUB

Edited by Bhaswati Sahoo, Rabindra Narayana Behera, Sasmita Rani Samanta, Prasant Kumar Pattnaik

EPUB

Please note: eBooks can only be purchased with a UK issued credit card and all our eBooks (ePub and PDF) are DRM protected.

Description

In the world of digitization today, many services of government and industry are carried out in electronic mode in order to avoid the misuse of natural resources.

The implementation of e-services also provides transparency and efficiency.

However, these e-services are vulnerable to cyber threats and need special measures in place to provide safety and security as they are being used in the cyber space. This new volume provides an introduction to and overview of cybersecurity in e-services and e-governance systems.

The volume presents and discusses the most recent innovations, trends, and concerns, as well as the practical challenges encountered and solutions adopted in the fields of security and e-services.

The editors bring together leading academics, scientists, researchers, and research scholars to share their experiences and research results on many aspects of e-services, e-governance, and cybersecurity.

The chapters cover diverse topics, such as using digital education to curb gender violence, cybersecurity threats and technology in the banking industry, e-governance inthe healthcare sector, cybersecurity in the natural gas and oil industry, developing information communication systems, and more.

The chapters also include the uses and selection of encryption technology and software.

Information

Information