-
1
-
-
70549090296
-
A longitudinal look at e-government in practice
-
Boggs R.A., and Walters D. A longitudinal look at e-government in practice. Issues in Information Systems 7 2 (2006) 161-164
-
(2006)
Issues in Information Systems
, vol.7
, Issue.2
, pp. 161-164
-
-
Boggs, R.A.1
Walters, D.2
-
3
-
-
70549091435
-
MoEIS increases accuracy and efficiency of e-government solutions
-
Retrieved January 10, 2007, from
-
Brush, M. (2007). MoEIS increases accuracy and efficiency of e-government solutions. Tier News. Retrieved January 10, 2007, from http://www.tier.com/news/pf.cfm?id=166
-
(2007)
Tier News
-
-
Brush, M.1
-
4
-
-
70549090297
-
Tomorrow's jobs
-
Retrieved January 10, 2008, from
-
Bureau of Labor Statistics. (2007). Tomorrow's jobs. The 2008-2009 Occupational Outlook Handbook. Retrieved January 10, 2008, from http://www.bls.gov/oco/home.htm
-
(2007)
The 2008-2009 Occupational Outlook Handbook
-
-
-
5
-
-
26244455982
-
Answering Allegations: The Use of the Corporate Website for Restorative Ethical and Social Disclosure
-
Campbell, D. & Beck, A. C. (2004). Answering Allegations: The Use of the Corporate Website for Restorative Ethical and Social Disclosure, Business Ethics,13(2), 100.
-
(2004)
Business Ethics
, vol.13
, Issue.2
, pp. 100
-
-
Campbell, D.1
Beck, A.C.2
-
6
-
-
33847704735
-
-
The IDABC eGovernment Observatory of European Communities. Retrieved January 9, 2007, from
-
Chevallerau, F. (2005). The impact of e-government on competitiveness, growth, and jobs. The IDABC eGovernment Observatory of European Communities. Retrieved January 9, 2007, from http://europa.eu.int/idabc/egovo
-
(2005)
The impact of e-government on competitiveness, growth, and jobs
-
-
Chevallerau, F.1
-
7
-
-
37349011758
-
-
Course Technology, Cengage Learning, Boston
-
rd ed. (2009), Course Technology, Cengage Learning, Boston
-
(2009)
rd ed.
-
-
Ciampa, M.1
-
8
-
-
0004092286
-
-
John Wiley and Sons, New York
-
rd ed. (1977), John Wiley and Sons, New York
-
(1977)
rd ed.
-
-
Cochran, W.G.1
-
9
-
-
70549109361
-
-
Digital Task Force, Retrieved October 20, 2007, from:, Accessed 26 October 2005
-
Digital Task Force. (2004). The Danish e-government strategy 2004-2006. Retrieved October 20, 2007, from: http://e.gov.dk/uploads/media/strategy_pixi.pdf. Accessed 26 October 2005
-
(2004)
The Danish e-government strategy 2004-2006
-
-
-
10
-
-
70549091436
-
-
Evans, K. S. (2008). Expanding e-government: Achieving results for the American people. Retrieved July 8, 2008, from http://www.whitehouse.gov/omb/egov/documents/2008_Expanding_E-Gov_Report.pdf
-
Evans, K. S. (2008). Expanding e-government: Achieving results for the American people. Retrieved July 8, 2008, from http://www.whitehouse.gov/omb/egov/documents/2008_Expanding_E-Gov_Report.pdf
-
-
-
-
11
-
-
33750928224
-
-
January 14, Retrieved October 2, 2005, from
-
European Commission. (2005, January 14). e-government services yield real benefits for EU citizens and businesses. Retrieved October 2, 2005, from http://europa.eu.int/rapid/pressReleasesAction.do?reference=IP/05/41&format=HTML&aged=0& language=EN&guiLanguage=en
-
(2005)
e-government services yield real benefits for EU citizens and businesses
-
-
-
12
-
-
70549099081
-
-
Executive Office of the President of USA, Retrieved June 5, 2006, from
-
Executive Office of the President of USA. (2003). The e-government Act of 2002. Retrieved June 5, 2006, from http://www.whitehouse.gov/omb/egov/g-4-act.html
-
(2003)
The e-government Act of 2002
-
-
-
13
-
-
21644481659
-
Network security: Mapping intrusion and anomaly detection to very-high-degree polynomials
-
Garcia R.C. Network security: Mapping intrusion and anomaly detection to very-high-degree polynomials. Signals, Systems, and Computers 2 7 (2004) 1449-1452
-
(2004)
Signals, Systems, and Computers
, vol.2
, Issue.7
, pp. 1449-1452
-
-
Garcia, R.C.1
-
14
-
-
70549100279
-
State e-government strategies: Identifying best practices and applications
-
LBJ School of Public Affairs, University of Taxes at Austin. Retrieved June 25, 2007, from
-
Greenberg, S. R. (2006). State e-government strategies: Identifying best practices and applications. Report for the Congressional Research Service. LBJ School of Public Affairs, University of Taxes at Austin. Retrieved June 25, 2007, from: http://www.utexas.edu/lbj/pubs/pdf/e-government.pdf
-
(2006)
Report for the Congressional Research Service
-
-
Greenberg, S.R.1
-
16
-
-
10844242946
-
Electronic government: Government capability and terrorist resources
-
Halcnin L.E. Electronic government: Government capability and terrorist resources. Government Information Quarterly 21 4 (2004) 406-419
-
(2004)
Government Information Quarterly
, vol.21
, Issue.4
, pp. 406-419
-
-
Halcnin, L.E.1
-
17
-
-
70549088268
-
-
Hurley, E. (2002, April 3). Audits confirm enterprise security. Tech Target. Retrieved July 10, 2008, from: http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci814796,00.html
-
Hurley, E. (2002, April 3). Audits confirm enterprise security. Tech Target. Retrieved July 10, 2008, from: http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci814796,00.html
-
-
-
-
18
-
-
70549112321
-
-
SANS Institute. Retrieved January 15, 2009, from
-
Jamieson, S. (2002). The ethics and legality of port scanning. SANS Institute. Retrieved January 15, 2009, from http://www.sans.org/reading_room/whitepapers/legal/ the_ethics_and_legality_of_port_scanning_71?show=71.php&cat=legal
-
(2002)
The ethics and legality of port scanning
-
-
Jamieson, S.1
-
20
-
-
84923041636
-
Vulnerabilities in e-governments
-
Retrieved October 20, 2007, from
-
Moen, V., Klingsheim, A. N., Simonsen, K. F., & Hole, K. J. (2007). Vulnerabilities in e-governments. International Journal of Electronic Security and Digital Forensics, 1(1), 89-100. Retrieved October 20, 2007, from: http://www.inderscience.com/storage/f110978361112425.pdf
-
(2007)
International Journal of Electronic Security and Digital Forensics
, vol.1
, Issue.1
, pp. 89-100
-
-
Moen, V.1
Klingsheim, A.N.2
Simonsen, K.F.3
Hole, K.J.4
-
23
-
-
0347178887
-
-
Computer Security Institute. Retrieved January 15, 2009, from
-
Richardson, R. (2008). The 2008 computer crime and security survey. Computer Security Institute. Retrieved January 15, 2009, from http://www.gocsi.com/forms/csi_survey.jhtml;jsessionid=1GW0KB43ZOYTKQSNDLPSKH0CJUNN2JVN
-
(2008)
The 2008 computer crime and security survey
-
-
Richardson, R.1
-
26
-
-
70549096340
-
-
State of Nebraska, Retrieved January 9, 2007, from
-
State of Nebraska. (2001). e-government to business initiative: Business portal action plan. Retrieved January 9, 2007, from http://www.nitc.state.ne.us/sgc/workgroups/businessportal/ documments/Business_Portal_Action_Pland.pdf
-
(2001)
e-government to business initiative: Business portal action plan
-
-
-
27
-
-
70549085230
-
September). Symantec internet Security Threat Report. Symantec Enterprise Security, 12, 1-30. Retrieved January 30, 2008, from
-
Symantec
-
Symantec. (2007, September). Symantec internet Security Threat Report. Symantec Enterprise Security, 12, 1-30. Retrieved January 30, 2008, from http://www.symantec.com
-
(2007)
-
-
-
28
-
-
70549113442
-
-
U.S. Department of Justice, 2003, Fraud and related activity in connection with computers. In the United States Code Annotated Title 18, Chapter 47, Section 1030. Washington, DC: Author. Retrieved December 18, 2008, from
-
U.S. Department of Justice. (2003). Fraud and related activity in connection with computers. In the United States Code Annotated Title 18, Chapter 47, Section 1030. Washington, DC: Author. Retrieved December 18, 2008, from http://www.usdoj.gov/criminal/cybercrime/1030NEW.htm
-
-
-
-
30
-
-
67651175205
-
Impact of economic prosperity and population on e-government involvement
-
Wilkinson V.O., and Cappel J.J. Impact of economic prosperity and population on e-government involvement. Issues in Information Systems 6 (2005) 204-209
-
(2005)
Issues in Information Systems
, vol.6
, pp. 204-209
-
-
Wilkinson, V.O.1
Cappel, J.J.2
-
31
-
-
70549113815
-
-
Winkler, I. (2004, July 19), What is a security audit? Tech Target. Retrieved July 10, 2008, from http://searchcio.techtarget.com/sDefinition/0,,sid182_gci955099,00.html
-
Winkler, I. (2004, July 19), What is a security audit? Tech Target. Retrieved July 10, 2008, from http://searchcio.techtarget.com/sDefinition/0,,sid182_gci955099,00.html
-
-
-
-
32
-
-
70549108253
-
State e-government service and economic competitiveness: a relational analysis
-
Zhao J.J., Truell A.D., Alexander M.W., and Davis R. State e-government service and economic competitiveness: a relational analysis. Issues in Information Systems 7 2 (2006) 171-176
-
(2006)
Issues in Information Systems
, vol.7
, Issue.2
, pp. 171-176
-
-
Zhao, J.J.1
Truell, A.D.2
Alexander, M.W.3
Davis, R.4
-
33
-
-
35448996738
-
internet Technologies Used by INC. 500 Corporate Websites
-
Zhao J.J., and Zhao S.Y. internet Technologies Used by INC. 500 Corporate Websites. Issues in Information Systems 4 (2004) 366-372
-
(2004)
Issues in Information Systems
, vol.4
, pp. 366-372
-
-
Zhao, J.J.1
Zhao, S.Y.2
|