DETECTION OF INFORMATION SECURITY VIOLATIONS IN DATA FLOWS IN THE ELECTRONIC GOVERNMENT SYSTEM

Authors

  • Gafurov Sh. R. Independent Researcher of TUIT named after Muhammad al-Khwarizmi

Keywords:

E-government, filtering , integrity , analysis , visualization, security monitoring.

Abstract

This article presents a proposal for analyzing messages to detect information security violations in the flow of information in the electronic government system, and visualizing messages based on the results of the analysis .

References

Alhitmi HK, Mardiah A, Al-Sulaiti KI, Abbas J (2024) Data security and privacy concerns of AI-driven marketing in the context of economics and business field: an exploration into possible solutions. Cogent Bus Manag 11(1).

Fayzullajon, B., Sharifjon, G., Sherzod, S. (2023). Methods for Assessing Information Security Incidents in the Enterprise and Making Decisions. In: Ranganathan, G., Fernando, X., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 383. Springer, Singapore. https://doi.org/10.1007/978

-981-19-4960-9_12.

Beckman L., Hultin Rosenberg J., Jebari K. Artificial intelligence and democratic legitimacy. The problem of publicity in public authority //AI & SOCIETY. – 2024. – Т. 39. – №. 3. – С. 975-984.

Downloads

Published

2024-12-31

Issue

Section

Articles