Systematic Literature Review on Data Security and Privacy for e-Government
Abstract
The use of e-Government is increasing along with efforts to improve the efficiency, transparency, and quality of public services. However, advances in digitalization are also accompanied by cybersecurity risks and threats to data privacy. This study aims to examine the implementation of data security and privacy in e-Government, as well as evaluate the technologies used to mitigate data leaks and misuse. The method used is Systematic Literature Review of articles published between 2021 and 2025 through Scopus, ScienceDirect, and Google Scholar databases. The research selection followed the PRISMA 2020 guidelines, resulting in 16 articles meeting the eligibility criteria. The study findings indicate that information security implementation in government institutions remains inconsistent, with key challenges related to weak security management, technical system vulnerabilities, and low public trust in personal data protection. Several technologies considered to have potential to improve security include blockchain, advanced cryptography, and automation for vulnerability detection, although their implementation remains hampered by cost, scalability, and human resource readiness. Overall, this study emphasizes that a comprehensive approach that combines technology, management, and increased security awareness is needed to strengthen data protection in e-Government.
Downloads
References
S. Weiland, “Open access and the unfinished transformation of scholarly communications,” in International Encyclopedia of Education, 4th ed., R. J. Tierney, F. Rizvi, and K. Ercikan, Eds. Amsterdam, The Netherlands: Elsevier, 2023, pp. 63–73, doi: 10.1016/B978-0-12-818630-5.02090-X.
N. Elisa, L. Yang, F. Chao, N. Naik, and T. Boongoen, “A Secure and Privacy-Preserving E-Government Framework Using Blockchain and Artificial Immunity,” IEEE Access, vol. 11, pp. 8773–8789, 2023, doi: 10.1109/ACCESS.2023.3239814.
K. M. Angnesia and S. A. Wiraguna, “Analisis Pertanggungjawaban Hukum Pemerintah dalam Menegakkan Pelindungan Data Pribadi di Era Digital,” Perspektif Administrasi Publik dan Hukum, vol. 2, no. 2, pp. 176–187, 2025, doi: 10.62383/perspektif.v2i2.249.
H. Alabdali, M. Albadawi, M. Sarrab, and A. Alhamadani, “Privacy preservation instruments influencing the trustworthiness of e-Government services,” Computers, vol. 10, no. 9, Sep. 2021, doi: 10.3390/computers10090114.
V. Figueroa, L. E. Sánchez Crespo, A. Santos-Olmo, D. G. Rosado, and E. Fernández-Medina, “Building a holistic cybersecurity framework for e-Government based on a systematic analysis of proposals,” Int J Inf Secur, vol. 24, no. 3, Jun. 2025, doi: 10.1007/s10207-025-01024-0.
L. P. A. Subarkah, B. Mulyani, and M. A. Idrus, “Implications of Government Policy on Digitalization of Public Services in Realizing Smart Government,” Journal La Sociale, vol. 6, no. 3, pp. 842–859, May 2025, doi: 10.37899/journal-la-sociale.v6i3.1702.
P. Gupta, A. Hooda, A. Jeyaraj, J. J. M. Seddon, and Y. K. Dwivedi, “Trust, Risk, Privacy and Security in e-Government Use: Insights from a MASEM Analysis,” Information Systems Frontiers, vol. 27, no. 3, pp. 1089–1105, Jun. 2025, doi: 10.1007/s10796-024-10497-8.
A. Bayaga, “Examining the predictive relevance of security, privacy risk factors, and institutional logics for e-Government service adoption,” Jan. 01, 2022, John Wiley and Sons Inc. doi: 10.1002/isd2.12201.
B. Distel, H. Koelmann, R. Plattfaut, and J. Becker, “Watch who you trust! A structured literature review to build a typology of e-Government risks,” Information Systems and e-Business Management, vol. 20, no. 4, pp. 789–818, Dec. 2022, doi: 10.1007/s10257-022-00573-4.
M. M. Ahmed and A. Musa Ahmed, “Citizens’ Data Protection in E-Government System,” International Journal of Innovative Computing, vol. 13, no. 2, pp. 1–9, Nov. 2023, doi: 10.11113/ijic.v13n2.389.
S. Malodia, A. Dhir, M. Mishra, and Z. A. Bhatti, “Future of e-Government: An integrated conceptual framework,” Technological Forecasting and Social Change, vol. 173, p. 121102, 2021, doi: 10.1016/j.techfore.2021.121102.
D. Ahmad, N. Lutfiani, A. D. A. Rizki Ahmad, U. Rahardja, and Q. Aini, “Blockchain Technology Immutability Framework Design in E-Government,” Jurnal Administrasi Publik: Public Administration Journal, vol. 11, no. 1, pp. 32–41, Jun. 2021, doi: 10.31289/jap.v11i1.4310.
M. Štaka, M. Stefanović, D. Stefanović, Đ. Pržulj, and V. Fabri, “Review of security issues in the application of blockchain technology in e-Government,” Centre for Evaluation in Education and Science (CEON/CEES), May 2024, pp. 84–93. doi: 10.5937/imcsm24059s.
A. Nguyen-Duc, M. V. Do, Q. Luong Hong, K. Nguyen Khac, and A. Nguyen Quang, “On the adoption of static analysis for software security assessment–A case study of an open-source e-Government project,” Comput Secur, vol. 111, Dec. 2021, doi: 10.1016/j.cose.2021.102470.
I. Savveli, M. Rigou, and S. Balaskas, “From E-Government to AI E-Government: A Systematic Review of Citizen Attitudes,” Sep. 01, 2025, Multidisciplinary Digital Publishing Institute (MDPI). doi: 10.3390/informatics12030098.
S. Mushtaq and M. Shah, “Mitigating Cybercrimes in E-Government Services: A Systematic Review and Bibliometric Analysis,” Mar. 01, 2025, Multidisciplinary Digital Publishing Institute (MDPI). doi: 10.3390/digital5010003.
M. J. Page et al., “The PRISMA 2020 statement: An updated guideline for reporting systematic reviews,” Mar. 29, 2021, BMJ Publishing Group. doi: 10.1136/bmj.n71.
M. B. Eriksen and T. F. Frandsen, “The impact of patient, intervention, comparison, outcome (Pico) as a search strategy tool on literature search quality: A systematic review,” Journal of the Medical Library Association, vol. 106, no. 4, pp. 420–431, Oct. 2018, doi: 10.5195/jmla.2018.345.
A. S. Alharbi, G. Halikias, M. Rajarajan, and M. Yamin, “A review of effectiveness of Saudi E-Government data security management,” International Journal of Information Technology (Singapore), vol. 13, no. 2, pp. 573–579, Apr. 2021, doi: 10.1007/s41870-021-00611-3.
D. Granata, M. Rak, G. Salzillo, G. Di Guida, and S. Petrillo, “Automated threat modelling and risk analysis in e-Government using BPMN,” Conn Sci, vol. 35, no. 1, 2023, doi: 10.1080/09540091.2023.2284645.
J. Yu, “Exploration of the application of blockchain in e-Government: Opportunities and risks coexist,” Inf Serv Use, vol. 44, no. 3, pp. 255–266, Nov. 2024, doi: 10.3233/ISU-240013.
C. Paguay-Chimarro, D. Cevallos-Salas, A. Rodríguez-Hoyos, and J. Estrada-Jiménez, “Transparency Unleashed: Privacy Risks in the Age of E-Government,” Informatics, vol. 12, no. 2, Jun. 2025, doi: 10.3390/informatics12020039.
G. Mandinyenya, V. Malele, and G. Mandinyenya, “‘A Blockchain-based Identity Management Solution for Secure Personal Data Sharing in Africa: A Systematic Literature Review’ A Blockchain-based Identity Management Solution for Secure Personal Data Sharing in Africa: A Systematic Literature Review A Blockchain-based Identity Management Solution for Secure Personal Data Sharing in Africa: A Systematic Literature Review,” Latin-American Journal of Computing (LAJC), vol. 12, no. 2, 2025, doi: 10.5281/zenodo.15742071.
Y. M. D. Ali, “Privacy-Preserving data analysis,” Advances in Engineering Innovation, vol. 7, no. 1, pp. 32–36, Apr. 2024, doi: 10.54254/2977-3903/7/2024029.
Kipkoech Denzel, “A survey of security in zero trust network architectures,” GSC Advanced Research and Reviews, vol. 22, no. 2, pp. 182–214, Feb. 2025, doi: 10.30574/gscarr.2025.22.2.0036.
Copyright (c) 2026 MelaFirdini Azzahra, Ardhan Aghsal Dwi Putra, Jingga Mustika Putri, Maulana Aditya, Risqy Siwi Pradini

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
