E-Privacy Protection Techniques in the Context of E-Government: A Systematic Review
DOI:
https://doi.org/10.58971/b5ngbj28الملخص
Abstract
This systematic review explores e-privacy protection techniques in e-government systems by synthesizing findings from 15 peer reviewed studies (2020–2025). The goal is to identify, classify, and assess effective strategies for enhancing digital privacy, with a focus on their relevance to developing countries like Sudan. Using a thematic analysis, the reviewed techniques are grouped into four categories: legal frameworks, technical safeguards, user awareness and usability, and system design practices. Key methods identified include encryption, multi factor authentication (MFA), access control (RBAC, MAC), digital signatures, and homomorphic encryption. Tools like OWASP ZAP, Vega, and secure coding standards (OWASP, CWE) are widely used to counter threats such as SQL injection, XSS, and broken access control. Emerging solutions such as blockchain, Zero Trust models, and AI based threat detection are also gaining prominence. Case studies emphasize the importance of user centered design, recommending cultural adaptation, simpler policy language, and training to address low digital literacy—especially in contexts like Sudan. On the policy level, the need for strong regulatory frameworks aligned with GDPR, ISO 27001, NIST, and national laws is evident. Success depends on inter agency coordination, transparent data governance, and continuous audits.
Architectural approaches like Privacy by Design, data anonymization, and secure logging were highlighted to enhance accountability and resilience. This review concludes that a multi layered, context aware privacy framework—combining technical, legal, and organizational elements—is vital for protecting personal data in e-government. It offers a comparative view of global best practices, identifies implementation gaps in low resource settings, and proposes practical steps tailored to environments like Sudan.