Web application vulnerability assessment and policy direction towards a secure smart government
This paper carried out technological analysis of e-government platforms with a view of assessing possible application flaws that can inhibit smooth running of the available web services provided. Two sets of data were collected with an interval of two years on 64 Nigerian government websites. Five w...
Saved in:
Published in: | Government information quarterly Vol. 31; pp. S118 - S125 |
---|---|
Main Authors: | , , |
Format: | Journal Article |
Language: | English |
Published: |
Elsevier Inc
01-06-2014
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | This paper carried out technological analysis of e-government platforms with a view of assessing possible application flaws that can inhibit smooth running of the available web services provided. Two sets of data were collected with an interval of two years on 64 Nigerian government websites. Five web vulnerability variables known to be notorious for web attacks were purposively investigated. In the overall assessment for the two datasets, the average result showed that about 67% are affected by broken links (BL), 43.8% by unencrypted password (UP), 35% by cross site scripting (XSS) and about one out of every four are affected by each of Structured Query Language Injection (SQLi) and cookie manipulation (CM). An independent t test statistic showed that there is a significant difference between the groups for three of the variables investigated, these are: XSS, SQLi and CM at 95% confidence interval. The motivation for this study is premised on the risk that these results pose to the smooth running of the e-government services and the possibility of financial loss. The research thus suggests some useful policy directions to enhance the provision of a secure smarter government.
•We identified loopholes due to poor design of web platforms for e-government services.•Assessment of vulnerability propensity revealed XSS and SQLi as possible high attack.•All categories of government sector portals were found to be susceptible which could hinder quality service delivery.•Suggestions were advanced for a smarter e-government of the future.•Policies were advanced to alleviate the challenges. |
---|---|
AbstractList | This paper carried out technological analysis of e-government platforms with a view of assessing possible application flaws that can inhibit smooth running of the available web services provided. Two sets of data were collected with an interval of two years on 64 Nigerian government websites. Five web vulnerability variables known to be notorious for web attacks were purposively investigated. In the overall assessment for the two datasets, the average result showed that about 67% are affected by broken links (BL), 43.8% by unencrypted password (UP), 35% by cross site scripting (XSS) and about one out of every four are affected by each of Structured Query Language Injection (SQLi) and cookie manipulation (CM). An independent t test statistic showed that there is a significant difference between the groups for three of the variables investigated, these are: XSS, SQLi and CM at 95% confidence interval. The motivation for this study is premised on the risk that these results pose to the smooth running of the e-government services and the possibility of financial loss. The research thus suggests some useful policy directions to enhance the provision of a secure smarter government.
•We identified loopholes due to poor design of web platforms for e-government services.•Assessment of vulnerability propensity revealed XSS and SQLi as possible high attack.•All categories of government sector portals were found to be susceptible which could hinder quality service delivery.•Suggestions were advanced for a smarter e-government of the future.•Policies were advanced to alleviate the challenges. |
Author | Ilori, Mathew O. Awoleye, Olusesan M. Ojuloge, Blessing |
Author_xml | – sequence: 1 givenname: Olusesan M. orcidid: 0000-0002-2587-9512 surname: Awoleye fullname: Awoleye, Olusesan M. email: awoleye@yahoo.co.uk organization: African Institute for Science Policy and Innovation (AISPI), Faculty of Technology, Obafemi Awolowo University, Ile-Ife, Nigeria – sequence: 2 givenname: Blessing orcidid: 0000-0002-2318-7571 surname: Ojuloge fullname: Ojuloge, Blessing organization: National Centre for Technology Management, Agency of the Federal Ministry of Science & Technology, Obafemi Awolowo University, Ile-Ife, Nigeria – sequence: 3 givenname: Mathew O. surname: Ilori fullname: Ilori, Mathew O. organization: African Institute for Science Policy and Innovation (AISPI), Faculty of Technology, Obafemi Awolowo University, Ile-Ife, Nigeria |
BookMark | eNp9kM1KAzEUhYMo2FYfwF1eYMYkk5nM4EqKf1BwU9BdyCQ3JWWajMm00rc3ta6FA3dzvsO5Z44uffCA0B0lJSW0ud-WG_dVMkJ5SWgWu0Az2gpWdDUVl2hGBCdFw_jnNZqntCWEMEbJDMkP6LEax8FpNbng8WE_eIiqd4ObjlilBCntwE9YeYPHkH1HbFwE_euewreKJmGFE-h9BJx2Kk54Ew4Q_Qm7QVdWDQlu_-4CrZ-f1svXYvX-8rZ8XBWatWwqOuh7bgUXXU9qRtrO6qrhXSWaSou6ppZB0zJleqsq3Whdm75WTHfciMzZaoHoOVbHkFIEK8focpWjpESeBpJbmQeSp4EkoVksMw9nBnKvg4Mok3bgNZzfkya4f-gf0fdy_w |
CitedBy_id | crossref_primary_10_1016_j_giq_2018_09_007 crossref_primary_10_1145_3465061 crossref_primary_10_4236_jcc_2015_39004 crossref_primary_10_1016_j_jclepro_2019_119926 crossref_primary_10_15388_Soctyr_45_1_5 crossref_primary_10_1108_AJIM_10_2022_0461 crossref_primary_10_1007_s10796_016_9673_7 crossref_primary_10_1016_j_giq_2019_101408 crossref_primary_10_1080_01900692_2016_1242614 crossref_primary_10_1007_s40860_017_0046_x crossref_primary_10_1007_s12517_017_3296_2 crossref_primary_10_1108_ICS_12_2020_0205 crossref_primary_10_3233_IP_170067 crossref_primary_10_25046_aj050283 crossref_primary_10_3390_smartcities6020053 crossref_primary_10_1080_12460125_2022_2094528 crossref_primary_10_1142_S1363919620500322 crossref_primary_10_1080_1206212X_2018_1445352 crossref_primary_10_1007_s11432_016_0322_7 crossref_primary_10_1016_j_giq_2015_07_001 crossref_primary_10_1016_j_scs_2020_102416 |
Cites_doi | 10.2307/2234988 10.1016/S0167-9236(02)00118-5 10.1016/j.cose.2011.12.004 10.1108/14637150510619902 10.1016/j.giq.2009.07.004 10.1016/j.cose.2009.04.008 10.1016/j.giq.2003.08.005 10.1504/AJAAF.2013.057077 10.1016/S0740-624X(01)00090-9 10.1016/j.cose.2008.09.005 10.1016/j.giq.2006.04.011 10.1111/0033-3352.00196 10.1016/j.ins.2005.02.009 10.1093/icc/8.1.3 10.1504/IJESDF.2007.013595 10.1016/S0740-624X(01)00062-4 10.1080/12294659.2002.10805005 10.1016/j.giq.2006.07.018 10.1016/j.giq.2008.09.002 10.1016/S0740-624X(01)00066-1 |
ContentType | Journal Article |
Copyright | 2014 Elsevier Inc. |
Copyright_xml | – notice: 2014 Elsevier Inc. |
DBID | AAYXX CITATION |
DOI | 10.1016/j.giq.2014.01.012 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Government Library & Information Science |
EISSN | 1872-9517 |
EndPage | S125 |
ExternalDocumentID | 10_1016_j_giq_2014_01_012 S0740624X14000823 |
GroupedDBID | --K --M -~X .4I .4L .CB .DC .~1 0R~ 13V 1B1 1RT 1~. 1~5 29I 4.4 41~ 457 4G. 5GY 5VS 6TJ 7-5 71M 77K 8P~ 8VB 9JO AACTN AAEDT AAEDW AAFJI AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO ABFNM ABFRF ABJNI ABKBG ABMAC ABMMH ABMVD ABXDB ABYKQ ACBEA ACDAQ ACGFS ACHQT ACHRH ACNTT ACRLP ADBBV ADEZE ADMUD AEBSH AEFWE AEKER AEMOZ AETEA AFFNX AFKWA AFTJW AGHFR AGJBL AGUBO AGUMN AGYEJ AHHHB AIEXJ AIKHN AITUG AJBFU AJOXV AKVCP AKYCK ALEQD ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK ASPBG AVARZ AVWKF AXJTR AZFZN BKOJK BLXMC BNSAS CS3 DO4 EBE EBR EBS EBU ECR EFJIC EFLBG EHE EHL EIS EJD ELW EMH EMI EMK EO8 EO9 EP2 EP3 ESO F5P FDB FEDTE FGOYB FIL FIRID FNPLU FYGXN G-2 G-Q GBLVA HMY HVGLF HZ~ IHE J1W K1G KOM M3Y M41 MO0 MVM N9A O-L O9- OAUVE OHT OZT P-8 P-9 PC. PQQKQ PRBVW Q38 QWB R2- RIG ROL RPZ SDF SDG SDP SES SEW SPCBC SSB SSL SSO SSS SSZ T5K TH9 TKY TN5 UHS UNMZH UQL VQA WUQ XPP ZL0 ZMT ~8M ~G- AAXKI AAYXX ADMHG AFJKZ AKRWK CITATION |
ID | FETCH-LOGICAL-c282t-9ebb4f7479b052089fc36493763c7551f2e682adbfa3c6cc5db5a2c94d7b4ff3 |
ISSN | 0740-624X |
IngestDate | Thu Nov 21 21:52:51 EST 2024 Fri Feb 23 02:27:12 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Policy Cross site injection Cookie manipulation Web vulnerability SQL injection Smart government E-government |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c282t-9ebb4f7479b052089fc36493763c7551f2e682adbfa3c6cc5db5a2c94d7b4ff3 |
ORCID | 0000-0002-2587-9512 0000-0002-2318-7571 |
ParticipantIDs | crossref_primary_10_1016_j_giq_2014_01_012 elsevier_sciencedirect_doi_10_1016_j_giq_2014_01_012 |
PublicationCentury | 2000 |
PublicationDate | 2014-06-01 |
PublicationDateYYYYMMDD | 2014-06-01 |
PublicationDate_xml | – month: 06 year: 2014 text: 2014-06-01 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | Government information quarterly |
PublicationYear | 2014 |
Publisher | Elsevier Inc |
Publisher_xml | – name: Elsevier Inc |
References | Higgins (bb0170) 2006 Zhao, Zhao (bb0350) 2010; 27 Chen (bb0080) 2002; 34 Chen, Gant (bb0090) 2001; 18 Endler (bb0130) 2002 Christey, Martin (bb0105) 2007 Erlingsson, Livshits, Xie (bb0135) 2009 Halfond, Viegas, Orso (bb0160) 2006 Halkidis, Chtzigeorgiou, Stephanides (bb0165) 2006 Ifinedo (bb8000) 2005; 1 Kim, Jeong, Lee (bb0210) 2009; 26 OWASP (bb0275) 2004 Cook (bb0110) 2003 Kc, Keromytis, Prevelakis (bb0205) 2003, October Balduzzi, Gimenez, Balzarotti, Kirda (bb0055) 2010 infoDev/World Bank (bb0200) 2009 Awoleye, Okogun, Siyanbola (bb0045) 2013; 2 Wang (bb0320) 2002; 20 Gil-García, Martinez-Moyano (bb0145) 2005 Mohammed, Abubakar, Bashir (bb0195) 2010 Anthopoulos, Siozos, Soukalas (bb0030) 2007; 24 Awoleye, Ojuloge, Siyanbola (bb0040) 2012 Ajayi (bb0005) 2003 Awoleye, Oluwaranti, Siyanbola, Adagunodo (bb0035) 2008 Akunyili (bb0010) 2010 Sang-ho (bb0340) 2002; 11 SANS Institute (bb0295) 2009 Metcalfe (bb0240) 1994; 104 Moon (bb0260) 2002; 62 Schelin (bb0300) 2003 Martinez-Romo, Araujo (bb0235) 2012; 48 Almgren, Debar, Dacier (bb0015) 2000 Cenzic (bb0070) 2009 Xie, Aiken (bb0335) 2006 Bandhakavi, Bisht, Madhusudan, Venkatakrishnan (bb9000) 2010 OWASP, Open Web Application Security Project (bb0280) Malerba, Nelson, Orsenigo, Winter (bb0230) 1999; 8 Rokhman (bb0290) 2011; 2 Pauli, Engebretson, Ham, Zautke (bb0285) 2011 Yves, Wouter, Frank (bb0345) 2005 Lee, Jeong, Yeo, Moon (bb0225) 2011; 55 Wangpipatwong, Chutimaskul, Papasratorn (bb0325) 2005 Halfond, Orso (bb0155) 2005 Whitson, Davis (bb0330) 2001; 18 Fatile (bb0140) 2012; 2 Ifenedo (bb0185) 2006 Kirda, Jovanovic, Kruegel, Vigna (bb0215) 2009; 28 Mitropoulos, Spinellis (bb0245) 2009; 28 Gundy, Chen (bb0150) 2012; 31 Nelson, Winter (bb0270) 1982 Hsieh, Wang, Tsai, Tseng (bb0190) 2006; 176 Hee-joon (bb0315) 2002; 7 Huang, Huang, Lin (bb0180) 2003 Hee-joon (bb0310) 2002; 40 Bates, Barth, Jackson (bb0065) 2010 Howard, LeBlanc (bb0175) 2003 Ebrahim, Irani (bb0125) 2005; 11 CWE-SANS (bb0120) 2010 Moen, Klingsheim, Simonsen, Hole (bb0255) 2007; 1 Barrantes, Ackley, Forrest, Palmer, Stefanovic, Zovi (bb0060) 2003, October Chien (bb0095) 2006 Layne, Lee (bb0220) 2001; 18 Moen, Klingsheim, Simonsen, Hole (bb0250) 2006 CERT (bb0075) 2000 Backus (bb0050) 2001 Anley (bb0020) 2002 Chan, Lau, Pan (bb0085) 2008; 25 Gundy (10.1016/j.giq.2014.01.012_bb0150) 2012; 31 CERT (10.1016/j.giq.2014.01.012_bb0075) Rokhman (10.1016/j.giq.2014.01.012_bb0290) 2011; 2 Ebrahim (10.1016/j.giq.2014.01.012_bb0125) 2005; 11 Malerba (10.1016/j.giq.2014.01.012_bb0230) 1999; 8 Sang-ho (10.1016/j.giq.2014.01.012_bb0340) 2002; 11 Moen (10.1016/j.giq.2014.01.012_bb0255) 2007; 1 Ajayi (10.1016/j.giq.2014.01.012_bb0005) 2003 Gil-García (10.1016/j.giq.2014.01.012_bb0145) 2005 Awoleye (10.1016/j.giq.2014.01.012_bb0035) 2008 Halkidis (10.1016/j.giq.2014.01.012_bb0165) Martinez-Romo (10.1016/j.giq.2014.01.012_bb0235) 2012; 48 Howard (10.1016/j.giq.2014.01.012_bb0175) 2003 Lee (10.1016/j.giq.2014.01.012_bb0225) 2011; 55 Metcalfe (10.1016/j.giq.2014.01.012_bb0240) 1994; 104 Chien (10.1016/j.giq.2014.01.012_bb0095) Nelson (10.1016/j.giq.2014.01.012_bb0270) 1982 Awoleye (10.1016/j.giq.2014.01.012_bb0045) 2013; 2 OWASP, Open Web Application Security Project (10.1016/j.giq.2014.01.012_bb0280) Akunyili (10.1016/j.giq.2014.01.012_bb0010) 2010 Cenzic (10.1016/j.giq.2014.01.012_bb0070) Chen (10.1016/j.giq.2014.01.012_bb0090) 2001; 18 Kc (10.1016/j.giq.2014.01.012_bb0205) 2003 Yves (10.1016/j.giq.2014.01.012_bb0345) 2005 Hee-joon (10.1016/j.giq.2014.01.012_bb0310) 2002; 40 SANS Institute (10.1016/j.giq.2014.01.012_bb0295) Moen (10.1016/j.giq.2014.01.012_bb0250) 2006 Bandhakavi (10.1016/j.giq.2014.01.012_bb9000) 2010 Hsieh (10.1016/j.giq.2014.01.012_bb0190) 2006; 176 Higgins (10.1016/j.giq.2014.01.012_bb0170) Anley (10.1016/j.giq.2014.01.012_bb0020) Endler (10.1016/j.giq.2014.01.012_bb0130) 2002 Ifenedo (10.1016/j.giq.2014.01.012_bb0185) OWASP (10.1016/j.giq.2014.01.012_bb0275) 2004 Whitson (10.1016/j.giq.2014.01.012_bb0330) 2001; 18 Layne (10.1016/j.giq.2014.01.012_bb0220) 2001; 18 Xie (10.1016/j.giq.2014.01.012_bb0335) 2006 Kirda (10.1016/j.giq.2014.01.012_bb0215) 2009; 28 Almgren (10.1016/j.giq.2014.01.012_bb0015) 2000 infoDev/World Bank (10.1016/j.giq.2014.01.012_bb0200) Backus (10.1016/j.giq.2014.01.012_bb0050) 2001 Moon (10.1016/j.giq.2014.01.012_bb0260) 2002; 62 Chan (10.1016/j.giq.2014.01.012_bb0085) 2008; 25 Hee-joon (10.1016/j.giq.2014.01.012_bb0315) 2002; 7 Cook (10.1016/j.giq.2014.01.012_bb0110) Mohammed (10.1016/j.giq.2014.01.012_bb0195) 2010 Pauli (10.1016/j.giq.2014.01.012_bb0285) 2011 Halfond (10.1016/j.giq.2014.01.012_bb0160) 2006 Wangpipatwong (10.1016/j.giq.2014.01.012_bb0325) 2005 Bates (10.1016/j.giq.2014.01.012_bb0065) 2010 Huang (10.1016/j.giq.2014.01.012_bb0180) 2003 Erlingsson (10.1016/j.giq.2014.01.012_bb0135) 2009 Awoleye (10.1016/j.giq.2014.01.012_bb0040) 2012 Balduzzi (10.1016/j.giq.2014.01.012_bb0055) 2010 Halfond (10.1016/j.giq.2014.01.012_bb0155) 2005 Wang (10.1016/j.giq.2014.01.012_bb0320) 2002; 20 Mitropoulos (10.1016/j.giq.2014.01.012_bb0245) 2009; 28 Barrantes (10.1016/j.giq.2014.01.012_bb0060) 2003 Ifinedo (10.1016/j.giq.2014.01.012_bb8000) 2005; 1 Fatile (10.1016/j.giq.2014.01.012_bb0140) 2012; 2 Anthopoulos (10.1016/j.giq.2014.01.012_bb0030) 2007; 24 Chen (10.1016/j.giq.2014.01.012_bb0080) 2002; 34 Kim (10.1016/j.giq.2014.01.012_bb0210) 2009; 26 CWE-SANS (10.1016/j.giq.2014.01.012_bb0120) Christey (10.1016/j.giq.2014.01.012_bb0105) Schelin (10.1016/j.giq.2014.01.012_bb0300) 2003 Zhao (10.1016/j.giq.2014.01.012_bb0350) 2010; 27 |
References_xml | – year: 1982 ident: bb0270 article-title: An evolutionary theory of economic change contributor: fullname: Winter – year: 2009 ident: bb0135 article-title: End-to-end web application security publication-title: Microsoft Research contributor: fullname: Xie – volume: 62 start-page: 424 year: 2002 end-page: 433 ident: bb0260 article-title: The evolution of e-government among municipalities: Rhetoric or reality? publication-title: Public Administration Review contributor: fullname: Moon – volume: 18 start-page: 79 year: 2001 end-page: 91 ident: bb0330 article-title: Best practices in electronic government: Comprehensive electronic information dissemination for science and technology publication-title: Government Information Quarterly contributor: fullname: Davis – start-page: 403 year: 2011 end-page: 407 ident: bb0285 article-title: CookieMonster: Automated session hijacking archival and analysis publication-title: Eighth International Conference on Information Technology: New generations contributor: fullname: Zautke – year: 2009 ident: bb0200 article-title: E-government primer, Washington DC contributor: fullname: infoDev/World Bank – ident: bb0280 article-title: The ten most critical web application security vulnerabilities contributor: fullname: OWASP, Open Web Application Security Project – year: 2009 ident: bb0295 article-title: Top cyber security risks contributor: fullname: SANS Institute – year: 2002 ident: bb0130 article-title: The evolution of cross site scripting attacks publication-title: Technical report contributor: fullname: Endler – volume: 176 start-page: 1241 year: 2006 end-page: 1265 ident: bb0190 article-title: Stateful session handoff for mobile WWW publication-title: Information Sciences contributor: fullname: Tseng – volume: 1 start-page: 53 year: 2005 end-page: 71 ident: bb8000 article-title: Measuring Africa's e-readiness in the global networked economy: A nine-country data analysis publication-title: The International Journal of Education and Development using Information and Communication Technology contributor: fullname: Ifinedo – volume: 7 start-page: 45 year: 2002 end-page: 53 ident: bb0315 article-title: Prospects and limitations of the e-government initiative in Korea publication-title: International Review of Public Administration contributor: fullname: Hee-joon – volume: 2 start-page: 157 year: 2013 end-page: 174 ident: bb0045 article-title: Technological assessment of banking innovation in Nigeria publication-title: African Journal Accounting, Auditing and Finance contributor: fullname: Siyanbola – year: 2010 ident: bb0065 article-title: Regular expression considered harmful in client-side XSS filters publication-title: WWW 2010, April 26–30, 2010, Raleigh, North Carolina, USA contributor: fullname: Jackson – year: 2010 ident: bb0055 article-title: Automated discovery of parameter pollution vulnerabilities in web applications publication-title: NDSS 2011, 18th Annual Network and Distributed System Security Symposium, 6–9 February 2011, San Diego, CA, USA contributor: fullname: Kirda – volume: 18 start-page: 122 year: 2001 end-page: 136 ident: bb0220 article-title: Developing fully functional e-government: A four stage model publication-title: Government Information Quarterly contributor: fullname: Lee – start-page: 174 year: 2005 end-page: 183 ident: bb0155 article-title: AMNESIA: Analysis and Monitoring for Neutralizing SQL-Injection Attacks publication-title: 20th IEEE/ACM International Conference on Automated Software Engineering, CA, USA contributor: fullname: Orso – year: 2003 ident: bb0180 article-title: Web application security assessment by fault injection and behaviour monitoring publication-title: WWW2003, May 20–24, 2003, Budapest, Hungary contributor: fullname: Lin – start-page: 2006 year: 2006 ident: bb0250 article-title: Vulnerabilities in e-governments publication-title: Proc. 2nd International Conference on Global E-Security (ICGeS-06), London, England, April 20–22 contributor: fullname: Hole – year: 2010 ident: bb0195 article-title: E-government in Nigeria: A catalyst for national development publication-title: International conference on development studies contributor: fullname: Bashir – year: 2003 ident: bb0110 article-title: A web developer's guide to cross scripting contributor: fullname: Cook – volume: 24 start-page: 353 year: 2007 end-page: 376 ident: bb0030 article-title: Applying participatory design and collaboration in digital public services for discovering and re-designing e-government services publication-title: Government Information Quarterly contributor: fullname: Soukalas – start-page: 120 year: 2003 end-page: 137 ident: bb0300 article-title: E-government: An overview publication-title: Public information technology: Policy and management issues contributor: fullname: Schelin – year: 2003 ident: bb0175 article-title: Writing secure code contributor: fullname: LeBlanc – year: 2000 ident: bb0075 article-title: Advisory CA-2000-02: Malicious HTML tags embedded in client web requests contributor: fullname: CERT – year: 2004 ident: bb0275 article-title: The ten most critical web application security vulnerabilities contributor: fullname: OWASP – start-page: 281 year: 2003, October end-page: 289 ident: bb0060 article-title: Randomized instruction set emulation to disrupt binary code injection attacks publication-title: Proceedings of the 10th ACM conference on computer and communications security contributor: fullname: Zovi – volume: 40 start-page: 109 year: 2002 end-page: 134 ident: bb0310 article-title: Analysis on the improved effects of administrative transparency of the e-government publication-title: Administrative Treaties contributor: fullname: Hee-joon – year: 2006 ident: bb0170 article-title: Cross site scripting: Attackers' new favourite flaw contributor: fullname: Higgins – volume: 20 start-page: 333 year: 2002 end-page: 352 ident: bb0320 article-title: The adoption of electronic tax filing systems: An empirical study publication-title: Government Information Quarterly contributor: fullname: Wang – year: 2002 ident: bb0020 article-title: Advanced SQL injection in sql server applications contributor: fullname: Anley – volume: 18 start-page: 343 year: 2001 end-page: 355 ident: bb0090 article-title: Transforming local e-government services: The use of application service providers publication-title: Government Information Quarterly contributor: fullname: Gant – start-page: 157 year: 2000 end-page: 170 ident: bb0015 article-title: A lightweight tool for detecting web server attacks publication-title: Network and Distributed System Security Symposium (NDSS 2000) contributor: fullname: Dacier – year: 2006 ident: bb0165 article-title: A practical evaluation of security patterns contributor: fullname: Stephanides – volume: 48 start-page: 183 year: 2012 end-page: 203 ident: bb0235 article-title: Updating broken web links: An automatic recommendation system information processing and management contributor: fullname: Araujo – year: 2006 ident: bb0160 article-title: A classification of sql injection attacks and counter measures contributor: fullname: Orso – volume: 104 start-page: 931 year: 1994 end-page: 944 ident: bb0240 article-title: Evolutionary Economics & Technology Policy publication-title: The Economic Journal contributor: fullname: Metcalfe – year: 2010 ident: bb9000 article-title: CANDID: Preventing SQL injection attacks using dynamic candidate evaluations contributor: fullname: Venkatakrishnan – year: 2010 ident: bb0010 article-title: ICT and e-government in Nigeria: Opportunities and challenges publication-title: World Congress on Information Technology, Amsterdam, The Netherlands, 25th–27th May 2010, 2013 contributor: fullname: Akunyili – volume: 2 year: 2012 ident: bb0140 article-title: Electronic governance: Myth or opportunity for Nigerian public administration? publication-title: International Journal of Academic Research in Business and Social Sciences contributor: fullname: Fatile – year: 2006 ident: bb0095 article-title: Malicious Yahooligans contributor: fullname: Chien – start-page: 272 year: 2003, October end-page: 280 ident: bb0205 article-title: Countering code-injection attacks with instruction-set randomization publication-title: Proceedings of the 10th ACM conference on computer and communications security contributor: fullname: Prevelakis – year: 2006 ident: bb0335 article-title: Static detection of security vulnerability in scripting languages publication-title: 15th USENIX Security Symposium, 2006 contributor: fullname: Aiken – volume: 25 start-page: 239 year: 2008 end-page: 255 ident: bb0085 article-title: E-government implementation: A macro analysis of Singapore's e-government initiatives publication-title: Government Information Quarterly contributor: fullname: Pan – volume: 8 start-page: 3 year: 1999 end-page: 41 ident: bb0230 article-title: History friendly models of industry-evolution: The computer industry publication-title: Industrial and Corporate Change contributor: fullname: Winter – volume: 1 start-page: 89 year: 2007 end-page: 100 ident: bb0255 article-title: Vulnerabilities in e-governments publication-title: International Journal of Electronic Security and Digital Forensics contributor: fullname: Hole – start-page: 154 year: 2008 end-page: 159 ident: bb0035 article-title: Assessment of e-governance resource use in southwestern Nigeria publication-title: Proceedings of the 2nd international conference on theory and practice of electronic governance. Cairo, Egypt contributor: fullname: Adagunodo – volume: 55 start-page: 58 year: 2011 end-page: 68 ident: bb0225 article-title: A novel method for SQL injection attack detection based on removing SQL query attribute values publication-title: Mathematical and Computer Modeling contributor: fullname: Moon – volume: 2 start-page: 228 year: 2011 end-page: 236 ident: bb0290 article-title: E-government adoption in developing countries; the case of Indonesia publication-title: Journal of Emerging Trends in Computing and Information Sciences contributor: fullname: Rokhman – volume: 34 start-page: 223 year: 2002 end-page: 227 ident: bb0080 article-title: Digital government: Technologies and practices publication-title: Decision Support Systems contributor: fullname: Chen – year: 2009 ident: bb0070 article-title: Web Application Security Trends Report Q1–Q2, 2009 contributor: fullname: Cenzic – year: 2005 ident: bb0325 article-title: Factors influencing the adoption of Thai e-government websites: Information quality and system quality approach publication-title: Proceedings of the Fourth International Conference on eBusiness, Bangkok, Thailand contributor: fullname: Papasratorn – year: 2005 ident: bb0345 article-title: A methodology for designing counter measures against current and future code injection attacks publication-title: Proceedings of the third IEEE international information assurance workshop contributor: fullname: Frank – year: 2007 ident: bb0105 article-title: Vulnerability type distributions in CVE contributor: fullname: Martin – year: 2003 ident: bb0005 article-title: E-government in Nigeria's e-strategy publication-title: The Fifth Annual African Computing and Telecommunications Summit, Abuja, Nigeria contributor: fullname: Ajayi – volume: 11 start-page: 243 year: 2002 end-page: 271 ident: bb0340 article-title: Study on the development and application of e-government maturity assessment model publication-title: Korea Policy Academy Society News contributor: fullname: Sang-ho – year: 2006 ident: bb0185 article-title: Towards e-government in a sub-Saharan African country: Impediments and initiatives in Nigeria contributor: fullname: Ifenedo – volume: 27 start-page: 49 year: 2010 end-page: 56 ident: bb0350 article-title: Opportunities and threats: A security assessment of state e-government websites publication-title: Government Information Quarterly contributor: fullname: Zhao – volume: 11 start-page: 589 year: 2005 end-page: 611 ident: bb0125 article-title: E-government adoption: Architecture and barriers publication-title: Business Process Management Journal contributor: fullname: Irani – volume: 26 start-page: 42 year: 2009 end-page: 50 ident: bb0210 article-title: An institutional analysis of an e-government system for anti-corruption: The case of OPEN publication-title: Government Information Quarterly contributor: fullname: Lee – year: 2012 ident: bb0040 article-title: Technological assessment of e-government web presence in Nigeria publication-title: The 6th International Conference on Theory and Practice of Electronic Governance, Albany, NY, USA, 22–25 October contributor: fullname: Siyanbola – volume: 28 start-page: 592 year: 2009 end-page: 604 ident: bb0215 article-title: Client-side cross-site scripting protection publication-title: Computer and Security contributor: fullname: Vigna – year: 2010 ident: bb0120 article-title: Top 25 most dangerous programming errors contributor: fullname: CWE-SANS – year: 2001 ident: bb0050 article-title: E-governance and developing countries: Introduction and examples publication-title: Report No 3, April 2001 contributor: fullname: Backus – volume: 31 start-page: 612 year: 2012 end-page: 628 ident: bb0150 article-title: Noncespaces: Using randomization to defeat cross-site scripting attacks publication-title: Computers and Security contributor: fullname: Chen – year: 2005 ident: bb0145 article-title: Exploring e-government evolution: The influence of systems of rules on organizational action publication-title: NCDG Working Paper No. 05-001 contributor: fullname: Martinez-Moyano – volume: 28 start-page: 121 year: 2009 end-page: 129 ident: bb0245 article-title: SDriver: Location-specific signatures prevent SQL injection attacks publication-title: Computer and Security contributor: fullname: Spinellis – volume: 104 start-page: 931 issue: 425 year: 1994 ident: 10.1016/j.giq.2014.01.012_bb0240 article-title: Evolutionary Economics & Technology Policy publication-title: The Economic Journal doi: 10.2307/2234988 contributor: fullname: Metcalfe – year: 2003 ident: 10.1016/j.giq.2014.01.012_bb0005 article-title: E-government in Nigeria's e-strategy contributor: fullname: Ajayi – volume: 34 start-page: 223 issue: 3 year: 2002 ident: 10.1016/j.giq.2014.01.012_bb0080 article-title: Digital government: Technologies and practices publication-title: Decision Support Systems doi: 10.1016/S0167-9236(02)00118-5 contributor: fullname: Chen – volume: 31 start-page: 612 issue: 2012 year: 2012 ident: 10.1016/j.giq.2014.01.012_bb0150 article-title: Noncespaces: Using randomization to defeat cross-site scripting attacks publication-title: Computers and Security doi: 10.1016/j.cose.2011.12.004 contributor: fullname: Gundy – volume: 11 start-page: 589 issue: 5 year: 2005 ident: 10.1016/j.giq.2014.01.012_bb0125 article-title: E-government adoption: Architecture and barriers publication-title: Business Process Management Journal doi: 10.1108/14637150510619902 contributor: fullname: Ebrahim – ident: 10.1016/j.giq.2014.01.012_bb0095 contributor: fullname: Chien – year: 2006 ident: 10.1016/j.giq.2014.01.012_bb0160 contributor: fullname: Halfond – volume: 2 start-page: 228 issue: 5 year: 2011 ident: 10.1016/j.giq.2014.01.012_bb0290 article-title: E-government adoption in developing countries; the case of Indonesia publication-title: Journal of Emerging Trends in Computing and Information Sciences contributor: fullname: Rokhman – volume: 27 start-page: 49 year: 2010 ident: 10.1016/j.giq.2014.01.012_bb0350 article-title: Opportunities and threats: A security assessment of state e-government websites publication-title: Government Information Quarterly doi: 10.1016/j.giq.2009.07.004 contributor: fullname: Zhao – volume: 28 start-page: 592 issue: 7 year: 2009 ident: 10.1016/j.giq.2014.01.012_bb0215 article-title: Client-side cross-site scripting protection publication-title: Computer and Security doi: 10.1016/j.cose.2009.04.008 contributor: fullname: Kirda – ident: 10.1016/j.giq.2014.01.012_bb0200 contributor: fullname: infoDev/World Bank – start-page: 120 year: 2003 ident: 10.1016/j.giq.2014.01.012_bb0300 article-title: E-government: An overview contributor: fullname: Schelin – year: 2010 ident: 10.1016/j.giq.2014.01.012_bb0010 article-title: ICT and e-government in Nigeria: Opportunities and challenges contributor: fullname: Akunyili – year: 2003 ident: 10.1016/j.giq.2014.01.012_bb0180 article-title: Web application security assessment by fault injection and behaviour monitoring contributor: fullname: Huang – volume: 20 start-page: 333 year: 2002 ident: 10.1016/j.giq.2014.01.012_bb0320 article-title: The adoption of electronic tax filing systems: An empirical study publication-title: Government Information Quarterly doi: 10.1016/j.giq.2003.08.005 contributor: fullname: Wang – start-page: 157 year: 2000 ident: 10.1016/j.giq.2014.01.012_bb0015 article-title: A lightweight tool for detecting web server attacks contributor: fullname: Almgren – year: 2003 ident: 10.1016/j.giq.2014.01.012_bb0175 contributor: fullname: Howard – year: 2012 ident: 10.1016/j.giq.2014.01.012_bb0040 article-title: Technological assessment of e-government web presence in Nigeria contributor: fullname: Awoleye – year: 2010 ident: 10.1016/j.giq.2014.01.012_bb0055 article-title: Automated discovery of parameter pollution vulnerabilities in web applications contributor: fullname: Balduzzi – year: 2010 ident: 10.1016/j.giq.2014.01.012_bb0065 article-title: Regular expression considered harmful in client-side XSS filters contributor: fullname: Bates – volume: 48 start-page: 183 issue: 2012 year: 2012 ident: 10.1016/j.giq.2014.01.012_bb0235 article-title: Updating broken web links: An automatic recommendation system information processing and management contributor: fullname: Martinez-Romo – volume: 2 start-page: 157 issue: 2 year: 2013 ident: 10.1016/j.giq.2014.01.012_bb0045 article-title: Technological assessment of banking innovation in Nigeria publication-title: African Journal Accounting, Auditing and Finance doi: 10.1504/AJAAF.2013.057077 contributor: fullname: Awoleye – start-page: 174 year: 2005 ident: 10.1016/j.giq.2014.01.012_bb0155 article-title: AMNESIA: Analysis and Monitoring for Neutralizing SQL-Injection Attacks contributor: fullname: Halfond – year: 2002 ident: 10.1016/j.giq.2014.01.012_bb0130 article-title: The evolution of cross site scripting attacks contributor: fullname: Endler – ident: 10.1016/j.giq.2014.01.012_bb0165 contributor: fullname: Halkidis – volume: 11 start-page: 243 issue: 4 year: 2002 ident: 10.1016/j.giq.2014.01.012_bb0340 article-title: Study on the development and application of e-government maturity assessment model publication-title: Korea Policy Academy Society News contributor: fullname: Sang-ho – start-page: 281 year: 2003 ident: 10.1016/j.giq.2014.01.012_bb0060 article-title: Randomized instruction set emulation to disrupt binary code injection attacks contributor: fullname: Barrantes – volume: 18 start-page: 343 year: 2001 ident: 10.1016/j.giq.2014.01.012_bb0090 article-title: Transforming local e-government services: The use of application service providers publication-title: Government Information Quarterly doi: 10.1016/S0740-624X(01)00090-9 contributor: fullname: Chen – start-page: 154 year: 2008 ident: 10.1016/j.giq.2014.01.012_bb0035 article-title: Assessment of e-governance resource use in southwestern Nigeria contributor: fullname: Awoleye – volume: 28 start-page: 121 issue: 3–4 year: 2009 ident: 10.1016/j.giq.2014.01.012_bb0245 article-title: SDriver: Location-specific signatures prevent SQL injection attacks publication-title: Computer and Security doi: 10.1016/j.cose.2008.09.005 contributor: fullname: Mitropoulos – year: 1982 ident: 10.1016/j.giq.2014.01.012_bb0270 contributor: fullname: Nelson – start-page: 403 year: 2011 ident: 10.1016/j.giq.2014.01.012_bb0285 article-title: CookieMonster: Automated session hijacking archival and analysis contributor: fullname: Pauli – ident: 10.1016/j.giq.2014.01.012_bb0105 contributor: fullname: Christey – ident: 10.1016/j.giq.2014.01.012_bb0280 contributor: fullname: OWASP, Open Web Application Security Project – ident: 10.1016/j.giq.2014.01.012_bb0075 contributor: fullname: CERT – ident: 10.1016/j.giq.2014.01.012_bb0295 contributor: fullname: SANS Institute – volume: 1 start-page: 53 issue: 1 year: 2005 ident: 10.1016/j.giq.2014.01.012_bb8000 article-title: Measuring Africa's e-readiness in the global networked economy: A nine-country data analysis publication-title: The International Journal of Education and Development using Information and Communication Technology contributor: fullname: Ifinedo – ident: 10.1016/j.giq.2014.01.012_bb0110 contributor: fullname: Cook – volume: 25 start-page: 239 issue: 2008 year: 2008 ident: 10.1016/j.giq.2014.01.012_bb0085 article-title: E-government implementation: A macro analysis of Singapore's e-government initiatives publication-title: Government Information Quarterly doi: 10.1016/j.giq.2006.04.011 contributor: fullname: Chan – year: 2004 ident: 10.1016/j.giq.2014.01.012_bb0275 contributor: fullname: OWASP – year: 2005 ident: 10.1016/j.giq.2014.01.012_bb0145 article-title: Exploring e-government evolution: The influence of systems of rules on organizational action contributor: fullname: Gil-García – year: 2006 ident: 10.1016/j.giq.2014.01.012_bb0335 article-title: Static detection of security vulnerability in scripting languages contributor: fullname: Xie – ident: 10.1016/j.giq.2014.01.012_bb0120 contributor: fullname: CWE-SANS – ident: 10.1016/j.giq.2014.01.012_bb0070 contributor: fullname: Cenzic – volume: 40 start-page: 109 issue: 4 year: 2002 ident: 10.1016/j.giq.2014.01.012_bb0310 article-title: Analysis on the improved effects of administrative transparency of the e-government publication-title: Administrative Treaties contributor: fullname: Hee-joon – volume: 62 start-page: 424 issue: 4 year: 2002 ident: 10.1016/j.giq.2014.01.012_bb0260 article-title: The evolution of e-government among municipalities: Rhetoric or reality? publication-title: Public Administration Review doi: 10.1111/0033-3352.00196 contributor: fullname: Moon – volume: 176 start-page: 1241 year: 2006 ident: 10.1016/j.giq.2014.01.012_bb0190 article-title: Stateful session handoff for mobile WWW publication-title: Information Sciences doi: 10.1016/j.ins.2005.02.009 contributor: fullname: Hsieh – volume: 8 start-page: 3 issue: 1 year: 1999 ident: 10.1016/j.giq.2014.01.012_bb0230 article-title: History friendly models of industry-evolution: The computer industry publication-title: Industrial and Corporate Change doi: 10.1093/icc/8.1.3 contributor: fullname: Malerba – year: 2010 ident: 10.1016/j.giq.2014.01.012_bb0195 article-title: E-government in Nigeria: A catalyst for national development contributor: fullname: Mohammed – year: 2001 ident: 10.1016/j.giq.2014.01.012_bb0050 article-title: E-governance and developing countries: Introduction and examples contributor: fullname: Backus – volume: 2 issue: 9 year: 2012 ident: 10.1016/j.giq.2014.01.012_bb0140 article-title: Electronic governance: Myth or opportunity for Nigerian public administration? publication-title: International Journal of Academic Research in Business and Social Sciences contributor: fullname: Fatile – start-page: 2006 year: 2006 ident: 10.1016/j.giq.2014.01.012_bb0250 article-title: Vulnerabilities in e-governments contributor: fullname: Moen – volume: 1 start-page: 89 issue: 1 year: 2007 ident: 10.1016/j.giq.2014.01.012_bb0255 article-title: Vulnerabilities in e-governments publication-title: International Journal of Electronic Security and Digital Forensics doi: 10.1504/IJESDF.2007.013595 contributor: fullname: Moen – volume: 18 start-page: 79 issue: 2001 year: 2001 ident: 10.1016/j.giq.2014.01.012_bb0330 article-title: Best practices in electronic government: Comprehensive electronic information dissemination for science and technology publication-title: Government Information Quarterly doi: 10.1016/S0740-624X(01)00062-4 contributor: fullname: Whitson – ident: 10.1016/j.giq.2014.01.012_bb0170 contributor: fullname: Higgins – volume: 7 start-page: 45 issue: 2 year: 2002 ident: 10.1016/j.giq.2014.01.012_bb0315 article-title: Prospects and limitations of the e-government initiative in Korea publication-title: International Review of Public Administration doi: 10.1080/12294659.2002.10805005 contributor: fullname: Hee-joon – year: 2009 ident: 10.1016/j.giq.2014.01.012_bb0135 article-title: End-to-end web application security publication-title: Microsoft Research contributor: fullname: Erlingsson – ident: 10.1016/j.giq.2014.01.012_bb0185 contributor: fullname: Ifenedo – year: 2010 ident: 10.1016/j.giq.2014.01.012_bb9000 contributor: fullname: Bandhakavi – ident: 10.1016/j.giq.2014.01.012_bb0020 contributor: fullname: Anley – volume: 24 start-page: 353 year: 2007 ident: 10.1016/j.giq.2014.01.012_bb0030 article-title: Applying participatory design and collaboration in digital public services for discovering and re-designing e-government services publication-title: Government Information Quarterly doi: 10.1016/j.giq.2006.07.018 contributor: fullname: Anthopoulos – year: 2005 ident: 10.1016/j.giq.2014.01.012_bb0345 article-title: A methodology for designing counter measures against current and future code injection attacks contributor: fullname: Yves – year: 2005 ident: 10.1016/j.giq.2014.01.012_bb0325 article-title: Factors influencing the adoption of Thai e-government websites: Information quality and system quality approach contributor: fullname: Wangpipatwong – volume: 26 start-page: 42 year: 2009 ident: 10.1016/j.giq.2014.01.012_bb0210 article-title: An institutional analysis of an e-government system for anti-corruption: The case of OPEN publication-title: Government Information Quarterly doi: 10.1016/j.giq.2008.09.002 contributor: fullname: Kim – volume: 55 start-page: 58 issue: 1–2 year: 2011 ident: 10.1016/j.giq.2014.01.012_bb0225 article-title: A novel method for SQL injection attack detection based on removing SQL query attribute values publication-title: Mathematical and Computer Modeling contributor: fullname: Lee – volume: 18 start-page: 122 issue: 2001 year: 2001 ident: 10.1016/j.giq.2014.01.012_bb0220 article-title: Developing fully functional e-government: A four stage model publication-title: Government Information Quarterly doi: 10.1016/S0740-624X(01)00066-1 contributor: fullname: Layne – start-page: 272 year: 2003 ident: 10.1016/j.giq.2014.01.012_bb0205 article-title: Countering code-injection attacks with instruction-set randomization contributor: fullname: Kc |
SSID | ssj0002210 |
Score | 2.285851 |
Snippet | This paper carried out technological analysis of e-government platforms with a view of assessing possible application flaws that can inhibit smooth running of... |
SourceID | crossref elsevier |
SourceType | Aggregation Database Publisher |
StartPage | S118 |
SubjectTerms | Cookie manipulation Cross site injection E-government Policy Smart government SQL injection Web vulnerability |
Title | Web application vulnerability assessment and policy direction towards a secure smart government |
URI | https://dx.doi.org/10.1016/j.giq.2014.01.012 |
Volume | 31 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9MwGLa67rILggFiwCYfEAesVKnjJvGxY0UbB3ZoJXaL7HxMVKVjtAHx7_f4Ix8dIAESUhVVbp04fh-9X378mpBXcQWrrLgMxCTJA6Glgh7UYaB1wiPEEzyKzUbh83ny4So9m4nZYNCUquja_quk0QZZm52zfyHt9qZowHfIHFdIHdc_kvvHUrPeqjT7Vq9MYWnLgf3BVFuI01UIsFWBmbNr5t9by6LdMMU2JhFfss1nPINdtyfy9p3Z7pxe5uuv2nvc3ueJTr_fQPXYzOnlqsYAzALRqE3vLmvoX_vr6cqQcr0tNXg19EC3o8gcSs4uR_0kxVh0ZCqXOWt2z-yQO-G9IHTljqE5Kp0CThMewOtL-hra2wmnYqF_0565no_dxumfTIHLSixH159uDYNP2OqsnrK9W2F7bgZixoFg06487pF9Dr0lhmR_ejG7et-ads5teYt24M0yuSUM3nvQrx2dnvOyeEge-KiDTh1cHpFBuT4kB538Dsmx38BCX9OLTpbUq_7HJAOuaA9XdAdXtMMVBa6owxVtcUU9rqiiDlfU4op2uHpCFu9mi7fngT-cI8gRpW8DWWotKgSjUhsqVSqrPIqFNPYqT-CGV7yMU64KXakoj_N8UuiJ4rkURYJ-VfSUDNc36_IZodGkSCUMAbQDYnMdyrRACwKDMA5VMhZH5E0zkdkXV4Ila7iJywyznplZz8IxPvyIiGaqM-9DunfNgIvfd3v-b91ekIMO7S_JcPu1Lo_J3qaoTzx07gALF5c1 |
link.rule.ids | 315,782,786,27934,27935 |
linkProvider | Elsevier |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Web+application+vulnerability+assessment+and+policy+direction+towards+a+secure+smart+government&rft.jtitle=Government+information+quarterly&rft.au=Awoleye%2C+Olusesan+M.&rft.au=Ojuloge%2C+Blessing&rft.au=Ilori%2C+Mathew+O.&rft.date=2014-06-01&rft.pub=Elsevier+Inc&rft.issn=0740-624X&rft.eissn=1872-9517&rft.volume=31&rft.spage=S118&rft.epage=S125&rft_id=info:doi/10.1016%2Fj.giq.2014.01.012&rft.externalDocID=S0740624X14000823 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0740-624X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0740-624X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0740-624X&client=summon |