Joke Collection Website - Blessing messages - What technologies are mainly used in e-government system?
What technologies are mainly used in e-government system?
1. Basic information of the course:
E-government is an optional course for the major of administration, and the teaching target is students who have studied the undergraduate course of administration in China Central Radio and TV University, so this course is of an improved nature.
the task of this course is to give priority to several topics with complete and solid international administrative management theory and abundant and conclusive evidence as teaching contents on the basis of the aforementioned junior college courses, and to make further systematic explanations in the form of special topics, with appropriate addition of basic theories in the explanations, showing the logical process from theory to application, and revealing the meaning of representative research results.
the goal of this course is to help students establish and consolidate the basic beliefs that should be adhered to in the practice of administrative management, provide students with a favorable perspective on administrative and administrative management issues, and strive to make students form an enlightening cognitive structure, so as to facilitate them to reflect on their own experiences and improve their work.
complete the first chapter of information technology development and informatization in week 1-2 for 5 hours
complete the second chapter of the rise of e-government in week 2-3 for 7 hours
complete the third chapter of China's e-government construction for 6 hours in week 3-4
complete the fourth chapter of the technical basis of e-government for 6 hours in week 5-6
complete the fifth chapter of e-government security for 6 hours in week 6-7
. Chapter e-government legal policy and system construction 6 hours
Complete Chapter VII organization and management of e-government construction 6 hours in the 9th-1th week
Complete Chapter VIII overall e-government solution 6 hours in the 11th-12th week
Complete Chapter IX e-government evaluation and index system construction 6 hours in the 12th-14th week
Complete Chapter X e-government application 6 hours in the 14th-15th week
. -17 weeks to complete Chapter XI's influence on government management for 6 hours
17-18 weeks to complete Chapter XII's construction and development of e-government abroad for 6 hours
IV. Teaching contents and requirements:
Chapter I: Information technology development and informatization
Teaching objectives and requirements:
Clarify related concepts of information technology; Master the theoretical conception of information society; Focus on understanding the basic theoretical framework of e-government; Understand the importance of learning e-government and the fundamental method of learning e-government. Chapter II The Rise of E-government
Teaching purposes and requirements:
Understanding the rise and development of E-government; Master the development trend and degree of e-government; Defining the goal orientation of e-government in each development stage will enable the government to continuously expand the achievements of government informatization with rational thinking, careful planning and advance strategies.
the development process of e-government in the first section
1, The evolution of government informatization
(1) the stage of office automation
the definition of office automation
the development position of office automation
(2) the stage of government online
the information superhighway plan
the virtual government
(3) the stage of e-government construction
the e-government construction of state organs
. Development stage of e-government
(1) Initial stage
(2) One-way interaction between government and users
(3) Two-way interaction between government and users
(4) Online transaction processing stage
Section II Concept and characteristics of e-government
I, The concept and function of e-government
(1) the concept of e-government
the definition of information technology
the content of e-government
various definitions of e-government at home and abroad
(2) the basic content of e-government
1. Three parts from the composition of e-government
2. From the service object of e-government. (III) Functions of E-government
Five functions of E-government
II. Features and development difficulties of E-government
(I) Features of E-government
Advanced and practical government means and technology
Disclosure of government information and * * * Enjoy
interactive response between the government and the public
higher efficiency of the government
open management
(2) difficulties in the development of e-government
contradiction between brand-new forms of e-government work and outdated government organizational structure
contradiction between fast-developing information technology and conventional legal construction
contradiction between the security requirements of government activities and the openness of information serving the public
. > difficulties in implementing e-government
chapter iii e-government construction in China
teaching objectives and requirements:
understanding the development of e-government in China; Understand the current situation of e-government in China; Grasp the development direction of e-government in China; Clarify the development of e-government to China.
section 1: the overall framework and development model of e-government in China
1, The overall framework of e-government in China
(I) the formation of the overall framework of government internal and external networks
the "three gold projects"
the "three networks and one library" architecture of e-government
the three categories of "twelve gold"
"two networks, one station, four libraries and twelve gold"
(II) the architecture of e-government in China
twelve business system relationships
ii. e-government development model
(1), e-government macro model
e-government three actors
e-government five areas
(2) e-government business model
e-government vertical model
e-government horizontal model
e-government reference model
. Guiding ideology and principles of e-government construction in China
1. Unified planning, strengthening leadership
2. Demand-oriented, highlighting key points
3. Integrating resources and stimulating industries
4. Unified standards, Ensuring security
II. Main objectives of China's e-government construction
III. Main tasks of China's e-government construction
Main contents of e-government construction
Section III. Current situation and characteristics of China's e-government development
I. Current situation of China's e-government development
Establishing a public * * * Contents of the system
Building two supporting platforms
Three application contents
Key construction contents
Pilot contents around official document handling, business examination and approval, coordination of officials and cross-auditing
Decision-making and command of local governments, coordination of office work, administrative management, fresh exchange and * * * pilot demonstration
II, Characteristics of China's e-government development
(1) The comprehensive information environment for e-government construction is relatively weak
The main contents of the information environment for e-government construction
(2) Under the "push" and "pull" of the central government, China's e-government construction is multi-layered
(III) The optimization and reorganization of government business and operational processes generally lags behind the requirements of e-government construction
Section IV Problems to be solved urgently in China's e-government development
First, with standardization as the link, Realizing information sharing
1. Standardization is the foundation of e-government construction
Standard system of e-government construction in China
Principles of e-government system construction
2. Only information sharing can bring the benefits of e-government into play
2. Establish an open e-government system
Establish an open, compatible and extensible e-government system
. Strengthen the establishment and development of data gram
Countermeasures: develop e-government with information resource management as the support
V. Realize the integrity of e-government
Function layer
Supervision layer
Benefit layer
VI. Set specific goals of e-government construction with an eye to application according to conditions and needs
Establish the development priority of e-government. Realizing the rolling development
VII. Leading the government reform through e-government
Further designing the overall structure of e-government in China according to the needs of government institutional reform and the requirements of the government to exercise public functions
VIII. Strengthening the legislative work of e-government
Chapter IV Technical Basis of e-government
Teaching purposes and requirements: understanding the computer network's role in national informatization construction; Master the technical basis of e-government; Clarify the role of e-government technology foundation in national information construction.
Section 1 Fundamentals of Computer Technology
1. Computer hardware
Host
Microprocessor
Motherboard
Memory
Display cards and other expansion cards
External devices
2. Computer software
System software
Application software
Section 2 Computer network technology < Computer network hardware
server
workstation
network adapter
network transmission medium
network interconnection equipment
II. Network topology
III. Computer network software
network protocol software
network protocols and standards
network operating system
network application software
IV. Internet and Intranet technology
Internet
IP address and domain name
Main services on the Internet
WWW services
Internet
Section III Multimedia technology
I, Multimedia equipment
host
audio input and output equipment
video input and output equipment
image input equipment
multimedia storage equipment
control equipment
Second, multimedia software
text processing software
graphics and image processing software
animation editing and production software
sound editing and processing software
. Database technology
Structure of database
Types of database
Database system
Section 4 Security authentication technology
I. Authentication system and public key infrastructure
Content of public key infrastructure
II. CA authentication system
Digital certificate
Electronic signature
Electronic authentication
III. Public key infrastructure. Grasp the role of government in the construction of e-government; Clear the main measures of e-government security.
Section I Overview of E-government Security
1. Security threats faced by E-government
(1) Various attacks from outside or inside
(2) Security weaknesses or hidden dangers existing in the E-government system itself
2. The concept and content of e-government security
(1) the concept of e-government security
the concept of e-government security
the performance of e-government security
(2) the content of e-government security
the purpose of e-government security
classification according to the level of computer network
classification according to the means of ensuring e-government security
classification according to the network structure of e-government. > 1. Intranet security threats of e-government
Reasons for security risks:
1. Security risks of the application system itself
2. Security risks of directly accessing data by bypassing the application system
3. Security risks of viruses to the application system and data in the government intranet
2. Intranet security technology of e-government
(1) access control
network equipment
operating system
firewall
(2) application system security
identity authentication
rights management
data security
(3) virus prevention
desktop antivirus
server antivirus < Intranet security management of e-government
(I) access control strategy
network access control
network authority control
directory-level security control
attribute security control
(III) network server security control
Section III e-government extranet security
I. E-government extranet security threats
Types of cyber attacks. E-government extranet security technology
(1) file monitoring system
purpose of file monitoring system
(2) intrusion detection system
concept of intrusion detection system
(3) vulnerability scanner
three types of security scanning
3, E-government extranet security management
(1) Network security management system
Responsible for safety education and training for this network support
Strengthen the audit management of information distribution of source units and information release of BBS announcement system
Keep relevant original records during the audit process of information release, accept and cooperate with the security supervision, inspection and guidance of public security organs
(2) Information release registration system
(3). Master the construction of e-government legal system; Clarify the direction and trend of e-government law and system construction.
Section 1 Legal System of E-government
I. Framework of Legal System of E-government
Contents of Legal System of E-government
Contents of Policy System and System Construction of E-government
II. Basic laws of e-government
(1) Administrative order law and information disclosure law
Contents of disclosure system
Forms of federal hearings in the United States
(2) Information disclosure law and government information management
"transparent government"
USA
UK
III. Personal data protection law
situation in Britain
situation in Germany
situation in Japan
Legal system included in personal data protection law
Section 2 Electronic signature law
I. Legal mode of electronic signature
Single legal mode of electronic signature (taking Germany as an example)
Open legal mode of electronic signature (taking Japan as an example) < p The operating system of the certification body; The responsibility system of certification bodies; Power of the competent authority of the witness institution
Section 3 Legal prevention of computer crimes
I. Types and characteristics of computer crimes
(I) Types of computer crimes
Economic crimes such as computer theft and fraud
Crimes of infringing intellectual property rights
Crimes of illegally revealing computer order or data stored or being transmitted in computer systems
Crimes of infringing citizens' personal rights and democracy by using computers. Property rights and other crimes endangering society
The criminal act of publicly announcing illegal connection, intrusion and intervention in a computer or communication system
The production, sale and distribution are mainly used for illegal connection and intrusion in a computer or communication system.
- Previous article:How about Huawei's mobile video playing for a long time?
- Next article:How does ICBC check the balance by SMS?
- Related articles
- Is the academic proficiency test graded?
- JD.COM called to cancel the gold bars.
- Polite messages urging friends to pay back the money.
- How to solve the problem that WeChat can't open the file preview?
- What is the reason for the failure of sending SMS or the wrong reply result?
- A girl obviously has feelings for you, but sometimes she doesn't care much about your greeting messages. Why?
- I lost my social security card. Can I make a phone call?
- How to open pink diamond by SMS? Thank you, everyone.
- I don't want to be fooled by common sense of car maintenance. Look here.
- How to change the service password of mobile number?