Abstract

In developing technology, hackers are actively collecting personal information. To achieve their goals and acquire simple access to information about any individual, they use a range of methods and techniques. A privacy breach occurs when hackers gain access to complete information without the user's permission. Threats and dangers to security can arise for a variety of reasons, including technological flaws and targeted attacks. The government provides digital public facilities to people and the business community. Consumers have the expectation that e-government provides security and protects their data and personal information. Users have expressed concerns about their personal data privacy and safety. The main object of this chapter is to give strategies for IT specialists and e-government services because they need continuous improvement in privacy and security issues. The findings of this chapter may be useful to new researchers and may aid in the avoidance of security breaches and privacy issues.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.