Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "municipal administration" wg kryterium: Temat


Wyświetlanie 1-1 z 1
Tytuł:
E-administration, cybersecurity and municipalities – the challenges of cybersecurity issues for the municipalities in Hungary
Autorzy:
Hoffman, István
Cseh, Kristóf B.
Powiązania:
https://bibliotekanauki.pl/articles/2159387.pdf
Data publikacji:
2021-03-05
Wydawca:
Akademia Sztuki Wojennej
Tematy:
digitalization
e-administration
cybersecurity
Hungary
digitalization of municipal authorities
municipal administration
Opis:
Today, the digital revolution has also caught up with the administration. The digitalisation of the (public) administration has strong links to the security issues. Digitalisation could be interpreted as one of the tools for the good governance and it has several challenges, as well. In this article the situation and the challenges on the cybersecurity issues of e-administration services and practice of Hungarian municipalities will be analysed. The challenges and risks are significant, because of the fragmented Hungarian municipal system by which the economic power of the Hungarian municipalities is relatively limited. If we look at the regulation it was focused on the development a horizontally integrated e-administration. Although the acts on this system have been passed in the last years, and the former restrictions of the electronic administration have been eliminated, but the practice of the Hungarian e-administration is partly different. The new, enhanced e-administration resulted new challenges, which was partly solved by the radical nationalisation and centralisation of the former municipally performed tasks. The municipal e-administration systems have been built mainly by the largest municipalities, but their operation could be further developed, and thus the municipal cybersecurity is a developing part of the Hungarian public administration tasks, as well.
Źródło:
Cybersecurity and Law; 2020, 4, 2; 199-211
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-1 z 1

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies