Joke Collection Website - Blessing messages - What technologies are mainly used in e-government system?

What technologies are mainly used in e-government system?

Introduction to E-government

1. Basic information of the course:

E-government is an optional course for the major of administration, and the teaching target is students who have studied the undergraduate course of administration in China Central Radio and TV University, so this course is of an improved nature.

the task of this course is to give priority to several topics with complete and solid international administrative management theory and abundant and conclusive evidence as teaching contents on the basis of the aforementioned junior college courses, and to make further systematic explanations in the form of special topics, with appropriate addition of basic theories in the explanations, showing the logical process from theory to application, and revealing the meaning of representative research results.

the goal of this course is to help students establish and consolidate the basic beliefs that should be adhered to in the practice of administrative management, provide students with a favorable perspective on administrative and administrative management issues, and strive to make students form an enlightening cognitive structure, so as to facilitate them to reflect on their own experiences and improve their work.

complete the first chapter of information technology development and informatization in week 1-2 for 5 hours

complete the second chapter of the rise of e-government in week 2-3 for 7 hours

complete the third chapter of China's e-government construction for 6 hours in week 3-4

complete the fourth chapter of the technical basis of e-government for 6 hours in week 5-6

complete the fifth chapter of e-government security for 6 hours in week 6-7

. Chapter e-government legal policy and system construction 6 hours

Complete Chapter VII organization and management of e-government construction 6 hours in the 9th-1th week

Complete Chapter VIII overall e-government solution 6 hours in the 11th-12th week

Complete Chapter IX e-government evaluation and index system construction 6 hours in the 12th-14th week

Complete Chapter X e-government application 6 hours in the 14th-15th week

. -17 weeks to complete Chapter XI's influence on government management for 6 hours

17-18 weeks to complete Chapter XII's construction and development of e-government abroad for 6 hours

IV. Teaching contents and requirements:

Chapter I: Information technology development and informatization

Teaching objectives and requirements:

Clarify related concepts of information technology; Master the theoretical conception of information society; Focus on understanding the basic theoretical framework of e-government; Understand the importance of learning e-government and the fundamental method of learning e-government. Chapter II The Rise of E-government

Teaching purposes and requirements:

Understanding the rise and development of E-government; Master the development trend and degree of e-government; Defining the goal orientation of e-government in each development stage will enable the government to continuously expand the achievements of government informatization with rational thinking, careful planning and advance strategies.

the development process of e-government in the first section

1, The evolution of government informatization

(1) the stage of office automation

the definition of office automation

the development position of office automation

(2) the stage of government online

the information superhighway plan

the virtual government

(3) the stage of e-government construction

the e-government construction of state organs

. Development stage of e-government

(1) Initial stage

(2) One-way interaction between government and users

(3) Two-way interaction between government and users

(4) Online transaction processing stage

Section II Concept and characteristics of e-government

I, The concept and function of e-government

(1) the concept of e-government

the definition of information technology

the content of e-government

various definitions of e-government at home and abroad

(2) the basic content of e-government

1. Three parts from the composition of e-government

2. From the service object of e-government. (III) Functions of E-government

Five functions of E-government

II. Features and development difficulties of E-government

(I) Features of E-government

Advanced and practical government means and technology

Disclosure of government information and * * * Enjoy

interactive response between the government and the public

higher efficiency of the government

open management

(2) difficulties in the development of e-government

contradiction between brand-new forms of e-government work and outdated government organizational structure

contradiction between fast-developing information technology and conventional legal construction

contradiction between the security requirements of government activities and the openness of information serving the public

. > difficulties in implementing e-government

chapter iii e-government construction in China

teaching objectives and requirements:

understanding the development of e-government in China; Understand the current situation of e-government in China; Grasp the development direction of e-government in China; Clarify the development of e-government to China.

section 1: the overall framework and development model of e-government in China

1, The overall framework of e-government in China

(I) the formation of the overall framework of government internal and external networks

the "three gold projects"

the "three networks and one library" architecture of e-government

the three categories of "twelve gold"

"two networks, one station, four libraries and twelve gold"

(II) the architecture of e-government in China

twelve business system relationships

ii. e-government development model

(1), e-government macro model

e-government three actors

e-government five areas

(2) e-government business model

e-government vertical model

e-government horizontal model

e-government reference model

. Guiding ideology and principles of e-government construction in China

1. Unified planning, strengthening leadership

2. Demand-oriented, highlighting key points

3. Integrating resources and stimulating industries

4. Unified standards, Ensuring security

II. Main objectives of China's e-government construction

III. Main tasks of China's e-government construction

Main contents of e-government construction

Section III. Current situation and characteristics of China's e-government development

I. Current situation of China's e-government development

Establishing a public * * * Contents of the system

Building two supporting platforms

Three application contents

Key construction contents

Pilot contents around official document handling, business examination and approval, coordination of officials and cross-auditing

Decision-making and command of local governments, coordination of office work, administrative management, fresh exchange and * * * pilot demonstration

II, Characteristics of China's e-government development

(1) The comprehensive information environment for e-government construction is relatively weak

The main contents of the information environment for e-government construction

(2) Under the "push" and "pull" of the central government, China's e-government construction is multi-layered

(III) The optimization and reorganization of government business and operational processes generally lags behind the requirements of e-government construction

Section IV Problems to be solved urgently in China's e-government development

First, with standardization as the link, Realizing information sharing

1. Standardization is the foundation of e-government construction

Standard system of e-government construction in China

Principles of e-government system construction

2. Only information sharing can bring the benefits of e-government into play

2. Establish an open e-government system

Establish an open, compatible and extensible e-government system

. Strengthen the establishment and development of data gram

Countermeasures: develop e-government with information resource management as the support

V. Realize the integrity of e-government

Function layer

Supervision layer

Benefit layer

VI. Set specific goals of e-government construction with an eye to application according to conditions and needs

Establish the development priority of e-government. Realizing the rolling development

VII. Leading the government reform through e-government

Further designing the overall structure of e-government in China according to the needs of government institutional reform and the requirements of the government to exercise public functions

VIII. Strengthening the legislative work of e-government

Chapter IV Technical Basis of e-government

Teaching purposes and requirements: understanding the computer network's role in national informatization construction; Master the technical basis of e-government; Clarify the role of e-government technology foundation in national information construction.

Section 1 Fundamentals of Computer Technology

1. Computer hardware

Host

Microprocessor

Motherboard

Memory

Display cards and other expansion cards

External devices

2. Computer software

System software

Application software

Section 2 Computer network technology < Computer network hardware

server

workstation

network adapter

network transmission medium

network interconnection equipment

II. Network topology

III. Computer network software

network protocol software

network protocols and standards

network operating system

network application software

IV. Internet and Intranet technology

Internet

IP address and domain name

Main services on the Internet

WWW services

Internet

Section III Multimedia technology

I, Multimedia equipment

host

audio input and output equipment

video input and output equipment

image input equipment

multimedia storage equipment

control equipment

Second, multimedia software

text processing software

graphics and image processing software

animation editing and production software

sound editing and processing software

. Database technology

Structure of database

Types of database

Database system

Section 4 Security authentication technology

I. Authentication system and public key infrastructure

Content of public key infrastructure

II. CA authentication system

Digital certificate

Electronic signature

Electronic authentication

III. Public key infrastructure. Grasp the role of government in the construction of e-government; Clear the main measures of e-government security.

Section I Overview of E-government Security

1. Security threats faced by E-government

(1) Various attacks from outside or inside

(2) Security weaknesses or hidden dangers existing in the E-government system itself

2. The concept and content of e-government security

(1) the concept of e-government security

the concept of e-government security

the performance of e-government security

(2) the content of e-government security

the purpose of e-government security

classification according to the level of computer network

classification according to the means of ensuring e-government security

classification according to the network structure of e-government. > 1. Intranet security threats of e-government

Reasons for security risks:

1. Security risks of the application system itself

2. Security risks of directly accessing data by bypassing the application system

3. Security risks of viruses to the application system and data in the government intranet

2. Intranet security technology of e-government

(1) access control

network equipment

operating system

firewall

(2) application system security

identity authentication

rights management

data security

(3) virus prevention

desktop antivirus

server antivirus < Intranet security management of e-government

(I) access control strategy

network access control

network authority control

directory-level security control

attribute security control

(III) network server security control

Section III e-government extranet security

I. E-government extranet security threats

Types of cyber attacks. E-government extranet security technology

(1) file monitoring system

purpose of file monitoring system

(2) intrusion detection system

concept of intrusion detection system

(3) vulnerability scanner

three types of security scanning

3, E-government extranet security management

(1) Network security management system

Responsible for safety education and training for this network support

Strengthen the audit management of information distribution of source units and information release of BBS announcement system

Keep relevant original records during the audit process of information release, accept and cooperate with the security supervision, inspection and guidance of public security organs

(2) Information release registration system

(3). Master the construction of e-government legal system; Clarify the direction and trend of e-government law and system construction.

Section 1 Legal System of E-government

I. Framework of Legal System of E-government

Contents of Legal System of E-government

Contents of Policy System and System Construction of E-government

II. Basic laws of e-government

(1) Administrative order law and information disclosure law

Contents of disclosure system

Forms of federal hearings in the United States

(2) Information disclosure law and government information management

"transparent government"

USA

UK

III. Personal data protection law

situation in Britain

situation in Germany

situation in Japan

Legal system included in personal data protection law

Section 2 Electronic signature law

I. Legal mode of electronic signature

Single legal mode of electronic signature (taking Germany as an example)

Open legal mode of electronic signature (taking Japan as an example) < p The operating system of the certification body; The responsibility system of certification bodies; Power of the competent authority of the witness institution

Section 3 Legal prevention of computer crimes

I. Types and characteristics of computer crimes

(I) Types of computer crimes

Economic crimes such as computer theft and fraud

Crimes of infringing intellectual property rights

Crimes of illegally revealing computer order or data stored or being transmitted in computer systems

Crimes of infringing citizens' personal rights and democracy by using computers. Property rights and other crimes endangering society

The criminal act of publicly announcing illegal connection, intrusion and intervention in a computer or communication system

The production, sale and distribution are mainly used for illegal connection and intrusion in a computer or communication system.