The Implementation of Pretty Good Privacy in eGovernment Applications (Case Study on the Official Scripts Electronic Applications in Bantul)

Full Text (PDF, 368KB), PP.1-6

Views: 0 Downloads: 0

Author(s)

Didit Suprihanto 1,* Tri Kuntoro Priyambodo 2

1. Department of Electrical Engineering Universitas Mulawarman, Kalimantan Timur, Indonesia, 75123

2. Department of Computer Sciences & Electronics, Universitas Gadjah Mada, Yogyakarta, Indonesia, 55281

* Corresponding author.

DOI: https://doi.org/10.5815/ijieeb.2017.04.01

Received: 13 Apr. 2017 / Revised: 2 May 2017 / Accepted: 10 Jun. 2017 / Published: 8 Jul. 2017

Index Terms

Official Electronic Papers Applications;eGovernment, PGP, Document Security, Online Transactions, Security Data

Abstract

eGovernment application has evolved from simply appearing as a website providing news and information, to the application that provides various services through online transactions. Provision of online transactions require the effectively and safely service, so the users can make sure that the entry data is secure and will not be used by other parties which are not authorized. Security is also necessary for the service provider side of online transactions, it is necessary to keep the system, and the data transactions sent through the communications media and the data stored in the database are secured. If the security guarantee is unavailable, the users will gradually lose their confidence to use the service through online transactions by using eGovernment application, and on the other hand the service provider will face the impact of the lost or corrupt data, and unauthorized access to the data which should be only accessed by involved parties based on the appropriate authority. This paper reveals the proposed strategy of Pretty Good Privacy implementation in protecting the security data messages of the Official Scripts Electronic Applications in a Local Government Regency. The proposed strategy is done by modifying on four process document letters’ management, such as an electronic form of incoming mail, print or hardcopy incoming letters, disposition letter, and outgoing mail.

Cite This Paper

Didit Suprihanto, Tri Kuntoro Priyambodo, "The Implementation of Pretty Good Privacy in eGovernment Applications (Case Study on the Official Scripts Electronic Applications in Bantul)", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.9, No.4, pp.1-6, 2017. DOI:10.5815/ijieeb.2017.04.01

Reference

[1]Chander, S., and Kush, A., 2012, Web Portal Analysis of Asian Region Countries, I.J. Information Engineering and Electronic Business,Vol. 4, 25-32
[2]A. B Adeyemo, e-Government Implementation in Nigeria: An Assessment of Nigeria's Global e-Gov Ranking, Journal of Internet and Information System, Vol. 2 (1), pp. 11-19, 2011
[3]Priyambodo, T.K., and Suprihanto, D. 2016. Information Security On Egovernment As Information-Centric Networks. International Journal Of Computer Engineering In Research Trends. Volume 3, Issue 06, July-2016, Pp.360-365.
[4]Singh, P.I., and Thakur, G.S.M., 2012, Enhanced Password Based Security System Based on User Behavior using Neural Networks, I.J. Information Engineering and Electronic Business, Vol. 2, 29-35
[5]Wimmer, M., and Bredow, B. Von. 2002. A Holistic Approach For Providing Security Solutions In E-Government. Pp.1–10.
[6]Upadhyaya, P., Shakya, S., and Pokharel, M. 2012. Information Security Framework for E-Government Implementation in Nepal. 3(7), pp.1074–1078.
[7]Mehta, M., Singh, S., and Lee, Y. 2007. Security in E-Services and Applications. Network Security: Current Status and Future Directions, pp.157–177.
[8]Rhee, M.Y. 2003. Internet Security : Cryptographic Principles, Algorithms and Protocols. The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England. John Wiley & Sons Ltd.
[9]Zhou, Z., and Hu, C. 2008. Study on the E-government Security Risk Management. 8(5), pp.208–213.
[10]Zhang, W. 2010. E-government Information Security: Challenges and Recommendations Wei. In 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[11]Office of the Government Chief Information Officer Ministry of Labour Citizens’ Services and Open Government. 2011. Information security policy British Colombia, version 1.0.
[12]Wimmer, M., and Bredow, B. Von. 2001. E-Government : Aspects of Security on Different Layers. pp.350–355.
[13]Priyambodo, T.K., and Prayudi, Y. 2016. A Proposed Strategy for Secure and Trusted Environment in e-Government. pp.449–459.
[14]Prayudi, Y., and Priyambodo, T.K. 2015. Secure and Trusted Environment as a Strategy to Maintain the Integrity and Authenticity of Digital Evidence. 9(6), pp.299–314.
[15]Peraturan daerah kabupaten bantul Nomor 17, 2007. Pembentukan Organisasi Lembaga Teknis Daerah di Lingkungan Pemerintah Kabupaten Bantul. , pp.1–16.
[16]Peraturan Bupati Bantul Nomor 91, 2007. Rincian Tugas dan Tata Kerja Kantor Pengolahan Data Telematika Kabupaten Bantul. , pp.1–10.
[17]Peraturan Bupati Bantul Nomor 72, 2012. Pedoman Tata Naskah Dinas Elektronik di Lingkungan Pemerintah Kabupaten Bantul. , pp.1–20.
[18]Zimmermann, P. 1997. PGP-Pretty Good Privacy.
[19]Ariyus, D. 2008. Pengantar Ilmu Kriptografi : Teori, Analisis dan Implementasi. Penerbti Andi. Yogyakarta.
[20]SANS Institute. 2003. A corporate implementation of PGP. Global Information Assurance Certification Paper, (Security 401).