Science topics: Computer Security and ReliabilityCyber Defense
Science topic
Cyber Defense - Science topic
Explore the latest publications in Cyber Defense, and find Cyber Defense experts.
Publications related to Cyber Defense (2,181)
Sorted by most recent
As cyber threats become increasingly sophisticated, traditional security methods are often insufficient to combat emerging risks. Neural networks and artificial intelligence (AI) offer transformative potential in advancing cyber defense mechanisms, enhancing both the detection and prevention of complex attacks. Leveraging AI's capacity to analyze v...
The increasing sophistication of cyber threats necessitates innovative defense strategies capable of adapting to evolving attack patterns. This paper explores the synergy between game theory and artificial intelligence (AI) in developing advanced cyber defense mechanisms. By modeling the interactions between attackers and defenders as strategic gam...
This article examines the transformative role of Artificial Intelligence (AI) in revolutionizing cybersecurity practices, with a particular focus on threat modeling and vulnerability assessment. As cyber threats grow increasingly sophisticated, traditional security measures often fall short in providing comprehensive protection. We explore how AI a...
The rapid digitalization of Tamil Nadu's economy has been accompanied by a surge in cybercrime, threatening the sustainability of economic growth and social well-being. This paper explores the economic impact of cybercrime on society and its implications for sustainable economic development in the region, focusing on key trends, challenges, and con...
In an era marked by escalating cyber threats and sophisticated attack methodologies, organizations are increasingly turning to artificial intelligence (AI) to enhance their cyber defense strategies. This article explores the transformative impact of AI-driven predictive threat intelligence and automation on modern security frameworks. By leveraging...
The object of the study is a corporate network with a dynamic structure and centralized management. The subject of the research is the processes of ensuring the protection of information resources in the corporate network. The goal is to develop a method of protecting information in the corporate network. The development is based on the Zero Trust...
This article presents a comprehensive analysis of the role of machine learning in enhancing intrusion detection systems (IDS) within the field of cybersecurity. As cyber threats continue to evolve in complexity and frequency, traditional methods of threat detection often struggle to keep pace, leading to vulnerabilities that can be exploited by mal...
Recent advances in multi-agent reinforcement learning (MARL) have created opportunities to solve complex real-world tasks. Cybersecurity is a notable application area, where defending networks against sophisticated adversaries remains a challenging task typically performed by teams of security operators. In this work, we explore novel MARL strategi...
Modern network defense can benefit from the use of autonomous systems, offloading tedious and time-consuming work to agents with standard and learning-enabled components. These agents, operating on critical network infrastructure, need to be robust and trustworthy to ensure defense against adaptive cyber-attackers and, simultaneously, provide expla...
Manufacturers employ platforms’ IoT infrastructure services to produce IoT products and sell them through these platforms. However, consumer data stored within the IoT infrastructure is susceptible to cyber-security risks. Government regulations mandate that platforms invest in IoT cyber-defense improvements, necessitating supply chain collaboratio...
As the reliance on machine learning (ML) technologies in cyber defense intensifies, so too do the ethical considerations associated with their deployment. Machine learning algorithms have the potential to enhance the speed and effectiveness of threat detection, incident response, and overall cybersecurity posture. However, the integration of these...
Quantum Algorithms for Enhancing Cybersecurity in Computational Intelligence in Healthcare (QAECCIH-2024)
The computing landscape is rapidly evolving, with quantum computing at the forefront of this transformation. This book offers a comprehensive examination of foundational principles, Cybersecurity, advanced quantum machine learning algorithms,...
This short note contributes to the literature by showcasing a quantitative and comparative analysis of optimistic and pessimistic attacker modeling in automated cyber defense. It demonstrates, through simulation, that deviating from the conventional worst-case assumption can lead to significantly improved defender performance. This challenges estab...
This study examines the cyber warfare strategies employed during the 2021-2022 conflict between Russia and Ukraine, focusing on how technological developments in information and communication have influenced this aspect of modern warfare. The conflict escalated as Russia viewed Ukraine's desire to join NATO as a significant threat, leading to a mix...
The sophistication and breadth of cyber threats are continuously expanding, making it more difficult for traditional security measures to keep up. Artificial intelligence is revolutionizing cybersecurity by equipping businesses to proactively counter threats with automated reaction systems and predictive threat intelligence. Data analytics, behavio...
Deep learning (DL)-based malware detectors have shown promise in swiftly detecting unseen malware without expensive dynamic malware behavior analysis. These detectors have been shown to be susceptible to adversarial malware variants generated from meticulously modifying known malware to mislead detectors into recognizing them as benign. Being able...
This article comprehensively analyzes Israel’s experience in the legal regulation of cybersecurity and explores its potential adaptation for Ukraine. Israel is a leading cybersecurity nation due to its integrated approach to cyber protection. The paper examines key legislative acts and organizational measures implemented in Israel, such as establis...
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines needed to understand cybersecurity, and demonstrates...
The rise of cyber threats targeting cloud and network infrastructures has driven the demand for resilient, adaptive defense architectures. This paper explores the integration of artificial intelligence (AI) and machine learning (ML) into cybersecurity strategies, aiming to enhance threat detection, response speed, and predictive accuracy in cloud a...
The integration of drones into various sectors, such as logistics, surveillance, agriculture, and emergency response, has revolutionized operational capabilities. However, this advancement has also exposed drones to significant cybersecurity threats, necessitating robust forensic investigation techniques. This paper presents a comprehensive approac...
The Internet of Battlefield Things (IoBT) is revolutionizing military operations by integrating interconnected devices and autonomous systems into combat environments, significantly enhancing decision-making, communication, and battlefield efficiency. However, this reliance on IoBT introduces substantial cybersecurity risks, exposing military netwo...
The current legal framework in Ukraine defines a set of cybersecurity measures and the need to plan their further development, which allows us to formulate and describe a general approach to cybersecurity in the form of a systematic process. At the same time, there is a need to form specific cybersecurity parameters that allow quantifying cybersecu...
Cybersecurity threats have become increasingly complex and adaptive, requiring dynamic defense mechanisms that can keep pace with evolving attack vectors. The proposed hybrid cryptographic defense framework integrates machine learning through Llama, an open-source large language model, with traditional cryptographic techniques, enabling real-time a...
The Cybersecurity Test and Evaluation Workshop by Tonex is designed to equip participants with the knowledge and skills to effectively assess and validate cybersecurity measures.
This intensive workshop delves into cybersecurity testing methodologies, evaluation frameworks, and best practices to ensure robust protection of systems against modern c...
In the rapidly evolving digital landscape, technology permeates every aspect of global society. As revolutionary developments continue to unfold, we witness the seamless integration of automation, IoT devices, cloud platforms, and emerging technologies for human convenience and the betterment of society. However, this remarkable technological depen...
The exponential growth of the Internet of Things (IoT) and Cyber Physical Systems, coupled with the increasing frequency of accidental and malicious cyber events, has created a complex, ambiguous, and non-linear security environment. Traditional Cyber Resilience algorithms, often static and non-adaptive, struggle to keep pace with the dynamic natur...
The Certified Cyber Warfare Technician (CCWT) course by Tonex equips participants with the critical knowledge and advanced skills needed to effectively engage in and counter cyber warfare activities.
The program focuses on modern cyber defense and offensive strategies, bridging the gap between theoretical concepts and practical, hands-on technique...
The Certified Cyber Electromagnetic Warfare Analyst (CCEWA) Certification is designed to equip professionals with advanced knowledge and expertise in the intersection of cyber and electromagnetic warfare. This program provides a comprehensive understanding of the operational, strategic, and technical aspects of modern cyber and electromagnetic envi...
The Certified Cyber Capabilities Specialist (CCCS) Certification Course by Tonex is designed to provide professionals with a comprehensive understanding of the cyber landscape, focusing on identifying, analyzing, and mitigating cyber threats.
This certification equips participants with cutting-edge strategies, technologies, and tools to strengthen...
The impact of Artificial Intelligence (AI) on international security is unmistakable, as machines are now capable of undertaking tasks traditionally reserved for human intelligence. This shift brings forth a myriad of challenges in international security, affecting both conventional military capabilities and hybrid threats. Simultaneously, AI prese...
Cybersecurity remains a critical concern, even amidst global events like the COVID-19 pandemic. The rise of COVID-19 has deepened cybersecurity threats, with phishing emails and phone scams attempting to exploit the situation. This paper focuses on proactive strategies to protect enterprise environments against threats and vulnerabilities, specific...
In this human subjects study, we sought to enable user-based detection of malware within portable document format (PDF) files. Such malware is often difficult to detect with traditional malware detection tools. Humans are excellent sensors and pattern detectors and could be a key to more robust malware detection but need something to sense. By desi...
In the face of rapidly evolving cyber threats, integrating machine learning (ML) with Intrusion Detection Systems (IDS) has emerged as a pivotal strategy for enhancing cybersecurity measures. Traditional IDS often struggle to keep pace with sophisticated attack techniques and large volumes of data, leading to high rates of false positives and negat...
In an era where traditional perimeter-based security models are increasingly inadequate against sophisticated cyber threats, Zero Trust Architecture (ZTA) emerges as a robust framework designed to bolster cybersecurity. Zero Trust operates on the principle of "never trust, always verify," ensuring that every request-regardless of origin-undergoes r...
Establishing a policy of least privilege is a fundamental principle in cybersecurity that limits users' access rights to only those necessary for their job functions. This principle aims to minimize the risk of accidental or malicious misuse of sensitive information and systems. By integrating the concept of segregation of duties (SoD), organizatio...
In the rapidly evolving landscape of e-commerce, the need for a comprehensive cyber defense strategy is more critical than ever. As online transactions grow and digital platforms become more complex, they become increasingly attractive targets for cyber threats. To address these challenges, integrating AI-driven threat mitigation with blockchain se...
In an era where cyber threats are increasingly sophisticated and pervasive, traditional reactive defense mechanisms are no longer sufficient to protect complex and dynamic network infrastructures. This paper proposes a proactive cyber defense framework that leverages the synergistic integration of Artificial Intelligence (AI), specifically evolutio...
The exponential growth of e-commerce has necessitated the adoption of robust, scalable, and secure database technologies. This paper conducts a comparative analysis of three critical technologies-Blockchain, Scalable Storage Solutions, and Cyber Defense Strategies-within the context of e-commerce. Blockchain technology is explored for its decentral...
Big Data has become a transformative force in supply chain optimization, particularly within the rapidly evolving realm of e-commerce. The exponential growth of data generated by e-commerce platforms, from customer preferences to real-time logistics, requires businesses to adopt scalable data storage solutions. These solutions allow for efficient p...
In the ever-evolving landscape of cybersecurity, implementing robust defense strategies is crucial to safeguarding digital assets from sophisticated threats. This paper explores the integration of evolutionary algorithms, cyber forensics, and AI-driven solutions to enhance cyber defense mechanisms. Evolutionary algorithms, inspired by natural selec...
In the rapidly evolving landscape of cybersecurity, traditional defense mechanisms often fall short in addressing sophisticated and adaptive threats. To combat these challenges, a proactive approach that leverages artificial intelligence (AI) and evolutionary algorithms is emerging as a critical strategy. This paper explores the integration of AI-d...
Russian cyberattacks on Ukraine largely failed to produce meaningful outcomes not merely due to robust Ukrainian cyber defenses but were instead primarily a result of Ukraine's effective cyber resilience.
Growing apprehension among internet users regarding cyber-security threats, particularly Distributed Reflective Denial of Service (DRDoS) attacks, underscores a pressing issue. Despite considerable research endeavors, the efficacy of detecting DRDoS attacks remains unsatisfactory. This deficiency calls for the development of pioneering solutions to...
Traditional cybersecurity techniques are having trouble in keeping up with the increasing sophistication of cyber threats. Artificial intelligence (AI) is revolutionizing security capabilities by facilitating real-time protective response, automated threat detection, and predictive analysis. Recent research is pioneering groundbreaking innovations...
Research objective: This study evaluates the efficiency of cyber threat intelligence (CTI) for predicting and mitigating cyber threats, which is important in business today. Organisations endure cyber assaults and fight cyber crimes, which threaten commercial exposure. CTI is a proactive approach to these risks since it gives the finest methods and...
Artificial Intelligence (AI) is being widely adopted in modern cyber defense to weave automation and scalability into the operational fabric of cybersecurity firms. Today, AI aids in crucial cyber defense tasks such as malware and intrusion detection to keep Information Technology (IT) infrastructure secure. Despite their value, cyber defense AI ag...
The devastating health, societal, and economic impacts of the COVID-19 pandemic illuminate potential dangers of unpreparedness for catastrophic pandemic-scale cyber events. While the nature of these threats differs, the responses to COVID-19 illustrate valuable lessons that can guide preparation and response to cyber events. Drawing on the critical...
Cybersecurity ecosystem is an important facet in protecting sensitive information and securing critical infrastructure for countering modern cyber threats. With the increasing complexity and frequency of security incidents, there is an escalating demand for development of innovative solutions beyond current human capabilities pertaining to cybersec...
Cybersecurity ecosystem is an important facet in protecting sensitive information and securing critical infrastructure for countering modern cyber threats. With the increasing complexity and frequency of security incidents, there is an escalating demand for development of innovative solutions beyond current human capabilities pertaining to cybersec...
Phishing is a growing form of cybercrime that poses a serious threat to information security in the digital world. This article aims to analyze the latest trends in phishing attacks and evaluate effective prevention methods. Using data from cybersecurity reports, case studies, and academic literature, this research identifies the latest phishing te...
As the world of cybersecurity constantly changes, traditional cryptographic techniques have faced limitations against today's sophisticated and dynamic threats. Existing protections usually adopt static algorithms and key structure, making them difficult to resist the categories of modern attacks. This research paper, therefore, presents CryptoGenS...
This chapter covers cyber threats to the nuclear enterprise and suggests ways that India and the United States can mitigate such dangers. Indian author Pulkit Mohan describes the Indian government’s evolving regulatory approach to the problem. Mohan argues for measures including the creation of an effective security culture, addressing supply-chain...
This exhaustive report delves deep into the critical intersection between essential infrastructure and industrial control systems (ICS), painstakingly examining their vulnerabilities in an increasingly interconnected digital world. By meticulously analyzing the components and hierarchical structure of ICS, we shed light on their unique security cha...
The continued success of cyber attacks motivates the need for continued innovation in cyber defense. In particular, there is a need for novel methods to mitigate attacker reconnaissance, usually the first stage in planning an attack. One of the few general approaches in this stage is using deception and information manipulation to affect what the a...
Russian cyberattacks on Ukraine largely failed to produce meaningful outcomes not merely due to robust Ukrainian cyber defenses but also because of Ukraine’s effective cyber resilience.
As financial institutions increasingly rely on AI for cybersecurity, they face complex regulatory landscapes requiring robust security measures to ensure transparency, accountability, and fairness. This research aims to develop a comprehensive AI-based cybersecurity model for the financial sector, enhancing the capacity to recognize, stop, and reac...
Advancements in artificial intelligence, machine learning, and natural language processing have culminated in sophisticated technologies such as transformer models, generative AI models, and chatbots. Chatbots are sophisticated software applications created to simulate conversation with human users. Chatbots have surged in popularity owing to their...
Today's escalating cyber attacks are outpacing standard network security defenses and, once inside, malware rapidly subverts individual hosts. Automatic post-breach protection of enterprise networks is a challenging and fundamental research problem that requires understanding and exploiting malware targeting strategies. In this work, we focus on th...
This research focuses on the implementation of cyberspace cooperation between Indonesia and the United States in an effort to tackle cyber terrorism in Indonesia in the 2019-2023 period. The background of this research is based on the increasing cyber threats faced by Indonesia, including attacks on critical infrastructure and government data. This...
A company’s cyber defenses are based on a secure infrastructure and risk-aware behavior by employees. With rising cyber threats and normative training efforts showing limited impact, raising cyber risk awareness is emerging as a challenging effort. The review of the extant literature on awareness diagnosis shows interdisciplinary but mainly theoret...
Several types of cyber-attacks on automobiles and business firms keep on rising as we are preparing to counter cybercrimes with several new technologies and defense models. Cyber defense (also, counter intelligence) is a computer network defense mechanism that involves response to activities, critical infrastructure protection, and information assu...
Modern power systems undergo a continuous digitalization for a more reliable, secure, and environmentally friendly operation. However, this advancement opens a door to a wide range of digital threats, making electrical grids vulnerable to cyberattacks. These malicious activities mainly affect the monitoring and control systems of smart power infras...
Iran's convoluted geopolitical status, its centrality to locale-specific wars, plus the shifting balance of the global order make cyber security a key issue worldwide in addition to traditional security challenges. Iran is an appealing target for cyber enemies due to its numerous security vulnerabilities, which include ransomware infection, scams,...
The Industrial Control Systems (ICS) that govern critical infrastructure are increasingly targeted by cyber threats, particularly through communication protocols such as IEC 60870-5-104 (IEC104). This research paper focuses on enhancing the cybersecurity of ICS utilizing the IEC104 protocol, which is pivotal in Europe's critical infrastructure. Thr...
The CAGE-2 challenge is considered a standard benchmark to compare methods for autonomous cyber defense. Current state-of-the-art methods evaluated against this benchmark are based on model-free (offline) reinforcement learning, which does not provide provably optimal defender strategies. We address this limitation and present a formal (causal) mod...
As artificial intelligence (AI) rapidly infiltrates the realm of cybersecurity, its geopolitical implications have become a critical concern for nations and global security. This research presents a comprehensive analysis of the geopolitical implications of artificial intelligence in cybersecurity by drawing on an extensive review of scholarly lite...
In today's digital age, cybersecurity has emerged as a crucial component for safeguarding business information infrastructure from evolving threats. This article delves into comprehensive methods and strategies tailored for business environments to protect critical digital assets. It highlights the role of advanced technologies such as artificial i...
Japan has long been one of the most active global players in defending the free and open internet and the argument that international law applies in cyberspace. Its traditional preference for defensive defense policy and its position as a defender of the liberal world order have long determined Japan’s cyber diplomacy and the way it dealt with cybe...
This comprehensive article examines the profound and multifaceted influence of cutting-edge artificial intelligence (AI) technologies on the rapidly evolving cybersecurity landscape. Focusing on Large Language Models (LLMs), Reinforcement Learning (RL), Graph Neural Networks (GNNs), Diffusion Models, and Multimodal Systems, we provide an in-depth a...
Malicious URLs, posing threats such as phishing and malware, cause significant financial losses globally. Detecting these URLs automatically before users access them is essential for cybersecurity. This study explores various machine learning techniques to accurately identify malicious URLs. Decision trees, random forests, K-nearest neighbors (KNN)...
The development of the Internet of Things and the associated devices has made it necessary to establish and implement encryption standards to ensure secure data transmission. These standards need to be comply with fundamental encryption principles and cater to devices with limited computational resources. As a result, lightweight cryptography has e...
This paper examines the growing cyber threats facing the United States' vital infrastructure, particularly those posed by state-sponsored threat actors. It discusses the significant risks these threats pose to economic stability and national security. Ithighlights the difficulties in protecting U.S. critical infrastructures from the constantly adva...
The practice of cyber intelligence is a comprehensive data collection process aimed at identifying, identifying, classifying, and strategizing any threats or risks to information assets. This article aims to describe and explain the current relevance of cyber-intelligence practice in preventing cyber-threats, the methods and techniques of conductin...
Identifying the source of cyber-attacks is crucial to ensuring cybersecurity. This study examines different attribution techniques, obstacles, and real-world examples in the context of cyber warfare. It explores challenges such as incorrect attributions, ethical concerns, legal barriers, and complexities in the digital environment. The discussed to...
Defensive Cyber Operations (DCO) in complex environments, such as cyber wargames, require in-depth cybersecurity knowledge and the ability to make quick decisions. In a typical DCO, execution rarely follows a pre-planned path because of extensive adversary influence, challenging an already complex decision-making environment. Decision-making models...
The global energy sector faces escalating threats from cyber-attacks targeting critical infrastructure, necessitating robust resilience strategies to safeguard against potential disruptions. This research explores the diverse landscape of cyber threats confronting energy grids, encompassing various attack types such as ransomware, phishing, and adv...
За останні роки спецслужби росії продемонстрували, що спроможні подолати заходи безпеки навіть добре захищених компаній і урядових мереж по всьому світу, зокрема систему безпеки військової бази США на острові Гуам. За оцінками Служби безпеки України нині росія здійснює близько 10 кібератак на Україну щоденно. Тому підготовка фахівців із кібернетичн...
Cyber deception is a highly recommended technique in cyber defense and is being used more and more by cyber security experts to provide a more optimal network security defense. We propose a deception model adapted to cyber attacks on automotive systems that will not only thwart cyber attacks but also deceive the attacker who initiates the attack so...
This study presents a concise review for exploring the burgeoning intersection of Deep Reinforcement Learning (DRL) and cybersecurity, delving into its basics, applications, and open challenges. In particular, DRL is introduced as a dynamic approach to cybersecurity, permitting adaptive threat detection, intrusion prevention, and occurrence respons...
"Emerging Trends in Information System Security Using AI & Data Science for Next-Generation Cyber Analytics" is a comprehensive exploration into the intersection of cutting-edge technologies and the critical domain of cybersecurity, this book delves deep into the evolving landscape of cyber threats and the imperative for innovative solutions. From...
The banking industry is greatly threatened by cybercrime, which makes it necessary to do a thorough investigation to comprehend its effects and forthcoming developments for cybersecurity. Research highlights the constant evolution of cyber risks and the disastrous effects of cyberattacks on Indian banking systems. The study explores the rise in cyb...
Technological advancements since the early 1990s have increased the interconnectedness of
global economies, concurrently escalating the risk of cyber fraud, particularly in the financial sector. The study examined the prevalence and economic impact of cyber fraud within Canada’s financial sector, particularly in the post-COVID-19 landscape, which...
The last decade has shown the global society, especially South American society, the great challenges that democracies will face in the 21st century. Among the various threats observed in cyberspace are the so-called disinformation campaigns and hybrid interference. As a result, this new digital means of information socialization has caused serious...
The Industrial Control Systems (ICS) that govern critical infrastructure are increasingly targeted by cyber threats, particularly through communication protocols such as IEC 60870-5-104 (IEC104). This research paper focuses on enhancing the cybersecurity of ICS utilizing the IEC104 protocol, which is pivotal in Europe's critical infrastructure. Thr...
In the constantly expanding field of cybersecurity, Artificial Intelligence (AI), and more specifically Generative Artificial Intelligence (GenAI) impacts every aspect of the cybersecurity landscape. In today’s world, most manual transactions, interactions, and records have become digital, generating vast amounts of valuable data. Many devices are...
The rise of new complex attacks scenarios in Internet of things (IoT) environments necessitate more advanced and intelligent cyber defense techniques such as various Intrusion Detection Systems (IDSs) which are responsible for detecting and mitigating malicious activities in IoT networks without human intervention. To address this issue, deep reinf...
The Internet of Things (IoT) paradigm refers to a system of billions of Internet-enabled smart devices interconnected with each other. This study attempts to evaluate access control restrictions in smart devices through a penetration test of a lightweight IoT device such as a smartbulb. Very often, lightweight firmware for such devices become the f...
Although virtual reality (VR) is not a new technology, it has recently been used in various fields other than entertainment, and this has caused the information security research community to pay attention to the new cyber threats associated with it. The diversity of system components enables a wide range of cyber attacks that can be exploited by h...
Cyber threats continue to evolve in complexity, thereby traditional cyber threat intelligence (CTI) methods struggle to keep pace. AI offers a potential solution, automating and enhancing various tasks, from data ingestion to resilience verification. This paper explores the potential of integrating artificial intelligence (AI) into CTI. We provide...
The complicated nature of supply chain systems has heightened cyber security challenges for critical natural infrastructure (CNI). This is because supply chain processes expose critical infrastructure to third party vendors whose activities and exposure to cyber security threats cannot be completely controlled. Machine learning (ML) which is a rece...
To protect the vast amounts of data being stored on computers and transported over networks, cybersecurity is crucial. To prevent increasingly complex assaults in the future, methods for identifying threats must be regularly updated. Experts in security are using GAN to accomplish results in password cracking, anomaly generation, and intrusion dete...
This chapter introduces ML-Defend, a novel defense mechanism tailored for detecting and mitigating cyber-attacks in wireless sensor networks (WSNs). By combining support vector machines (SVMs) for anomaly detection and convolutional neural networks (CNNs) for classification, ML-Defend harnesses the complementary strengths of these algorithms. This...
Future-proofing cyber defenses through the integration of advanced security measures
The authors note that the digitization of public services has taken place, which has led to the transition of most or at least a significant number of public services to an electronic format and allowed us to talk about the emergence of concepts of electronic state (government) (e-government). The step-by-step transformation of state data managemen...