Mobile Government Applications Based on Security and Privacy: A Literature Review

  • Authors

    • Ala'a Saeb Al-Sherideh
    • Roesnita Ismail
    • Fauziah Abdul Wahid
    • Norasikin Fabil
    • Waidah Ismail
    2018-09-12
    https://doi.org/10.14419/ijet.v7i4.1.19492
  • Security, Privacy, Mobile Applications, Government Services.
  • Mobile applications available in anytime and from anywhere. The utilizing of mobile governmental applications is significant to reduce the efforts and time that are required to accomplish the public services by citizens. The main challenges that face the acceptance and adoption of mobile governmental applications are the privacy and security issues. The users, who do not trust the security of mobile governmental applications, may reject the use of these applications which discourages the government to adopt the mobile services. This study focuses in investigating the security and privacy requirements of mobile government applications. Many related works are reviewed and discussed to understand the important security requirements of mobile government applications. The main results indicate that effective privacy and security of mobile government applications should be assured so as to enhance the level of adopting and using these applications. The security requirements involve many considerations such as the hardware characteristics, software characteristics, and communication characteristics. This article mainly gives better understanding of security requirements of mobile government applications. 

     

     

  • References

    1. [1] H. K. Flora, X. Wang., & S. V. Chande, An investigation on the characteristics of mobile applications: A survey study. International Journal of Information Technology and Computer Science (IJITCS), Vol. 6, No. 11, pp.21-27, 2014.

      [2] B. Unhelkar, S. Murugesan, The enterprise mobile applications development framework. IT Professional Magazine, Vol. 12, No. 3, pp.33-39, 2010.

      [3] R. Islam, R. Islam., & A. T. Mazumder, Mobile applic-ation and its global impact. International Journal of Engineering & Technology IJET-IJENS, Vol. 10, No. 06, pp. 72-78, 2010.

      [4] O. Al-Hujran, Toward the utilization of m-government services in developing countries: a qualitative investigation. International Journal of Business and Social Science, Vol. 3, No. 5, pp. 155-160, 2012.

      [5] A. Althunibat, T. A. Alrawashdeh., & M. Muhairat, The acceptance of using m-government services in Jordan. Journal of Theoretical and Applied Information Technology, Vol. 63, No.3, pp.733-740. (2014).

      [6] H. M. ElSherif, K. M. Alomari, A. S. AlHaddad., & A. O. Alkatheer, Mobile Government Services Satisfa-ction and Usage Analysis: UAE Government Smart Services Case Study. A Monthly Journal of Computer Science and Information Technology, Vol. 5, Issue. 3, pp.291 – 302. 2016.

      [7] M. H. Kuscu, I. Kushchu., & B. Yu, Introducing mobile government. In A. Anttiroiko (Ed.), Electronic Government: Concepts, Methodologies, Tools and Applications IGI Global, pp. 227-235, 2008.

      [8] M. Ntaliani, C. Costopoulou., & S. Karetsos, Mobile government: a challenge for agriculture. Government Information Quarterly, Vol. 25, No. 4, pp. 699-716, 2008.

      [9] H. T. Dinh, C. Lee, D. Niyato., & P. Wang, A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, Vol. 13, No. 18, pp.1587-1611, 2013.

      [10] D. Huang, Z. Zhou, L. Xu, T. Xing., & Y. Zhong, Secure data processing framework for mobile cloud computing. In Computer Communications Workshops (INFOCOM WKSHPS) 2011 IEEE Conference, pp. 614-618, 2011.

      [11] S. K. V. Ko, J. H. Lee., & S. W. Kim, Mobile cloud computing security considerations. Journal of Security Engineering, Vol. 9, No. 2, pp. 143-150, 2012.

      [12] H. Zhu, H. Xiong, Y. Ge., & E. Chen, Mobile app recommendations with security and privacy awareness. In Proceedings of the 20th ACM SIGKDD inter-national conference on Knowledge discovery and data mining, ACM, pp. 951-960, 2014.

      [13] E. Ibukun, O. Daramola, A systematic literature review of mobile cloud computing. International Journal of Multimedia and Ubiquitous Engineering, Vol. 10, No. 12, pp.135-152, 2015.

      [14] A. N. Khan, M. M. Kiah, S. U. Khan., & S. A. Madani, Towards secure mobile cloud computing: A survey. Future Generation Computer Systems, Vol. 29, No. 5, pp. 1278-1299, 2013.

      [15] H. Qi, A. Gani, Research on mobile cloud computing: Review, trend and perspectives. In Proceedings of the Second International Conference on Digital Information and Communication Technology and its Applications (DICTAP), IEEE, pp. 195-202, 2012.

      [16] H. Abdelghaffar, Y. Magdy, The adoption of mobile government services in developing countries: the case of Egypt. International Journal of Information and Communication Technology Research, Vol. 2, No. 4, pp. 333 – 341, 2012.

      [17] N. B. Osman, Extending the technology acceptance model for mobile government systems. The International Arab Conference on Information Technology ACIT, 2013.

      [18] A. N. Bahar, M. A. Habib., & M. M. Islam, Security architecture for mobile cloud computing. International Journal of Scientific Knowledge Computing and Information Technology, Vol. 3, No. 3, pp.11-17, 2013.

      [19] R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi., & Z. Song, Authentication in the clouds: a framework and its application to mobile users. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pp. 1-6, 2010.

      [20] F. Stajano, M. Spencer, G. Jenkinson., & Q. Stafford-Fraser, Password-manager friendly (PMF): Semantic annotations to improve the effectiveness of password managers. In: Passwords. Volume 9393 of Lecture Notes in Computer Science. Springer, pp. 61–73, 2014.

      [21] I. A. Rassan, H. Al Shaher, Securing mobile cloud using finger print authentication. International Journal of Network Security & Its Applications, Vol. 5, No. 6, pp.41-53, 2013.

      [22] Y. Wang, R. Chen., & D. C. Wang, A survey of mobile cloud computing applications: Perspectives and chall-enges, Wireless Personal Communications, Vol. 80, No. 4, pp. 1607-1623, 2015.

      [23] A. I. Wasserman, Software engineering issues for mobile application development. In Proceedings of the FSE/SDP workshop on Future of software engineering research, ACM, pp. 397-400, 2010.

      [24] W. McIver, Software engineering processes for mobile application development. Technical report, Nserc Industrial Research Chair in Mobile First Technology. New Brunswick Community College, Canada, 2015.

  • Downloads

  • How to Cite

    Saeb Al-Sherideh, A., Ismail, R., Abdul Wahid, F., Fabil, N., & Ismail, W. (2018). Mobile Government Applications Based on Security and Privacy: A Literature Review. International Journal of Engineering & Technology, 7(4.1), 51-56. https://doi.org/10.14419/ijet.v7i4.1.19492