-
3
-
-
10444231516
-
E-Government and developing countries: An overview
-
DOI 10.1080/13600860410001674779
-
Busu, S. (2004). e-Government and developing countries: An overview. International Review of Law Computers & Technology, 18(1), 109-132. do i:10.1080/13600860410001674779 (Pubitemid 38803900)
-
(2004)
International Review of Law Computers & Technology
, vol.18
, Issue.1
, pp. 109-132
-
-
Basu, S.1
-
7
-
-
21144440584
-
The citizen as customer
-
Deloitte & Touche.
-
Deloitte & Touche. (2001). The citizen as customer. CMA Management, 74(10), 58.
-
(2001)
CMA Management
, vol.74
, Issue.10
, pp. 58
-
-
-
8
-
-
10444220938
-
Developing a Generic framework for e-Government. Governance
-
doi:10.4018/jgim.2005010101
-
Grant, G., & Chau, D. (2005). Developing a Generic framework for e-Government. Governance . Journal of Global Information Management, 13(1), 1-30. doi:10.4018/jgim.2005010101
-
(2005)
Journal of Global Information Management
, vol.13
, Issue.1
, pp. 1-30
-
-
Grant, G.1
Chau, D.2
-
9
-
-
31944444891
-
Introducing e-Gov: History, definitions, and issues
-
Gronlund, A., & Haron, T. (2005). Introducing e-Gov: History, definitions, and issues. Communications of the AIS, 15(39), 713-729.
-
(2005)
Communications of the AIS
, vol.15
, Issue.39
, pp. 713-729
-
-
Gronlund, A.1
Haron, T.2
-
10
-
-
80053977257
-
The human side of information security
-
Tipton, H. F., & Krause, M. (Eds.) (5th ed.). Boca Raton, FL: Auerbach
-
Henry, K. (2004). The human side of information security. In Tipton, H. F., & Krause, M. (Eds.), Information security handbook (5th ed.). Boca Raton, FL: Auerbach.
-
(2004)
Information Security Handbook
-
-
Henry, K.1
-
13
-
-
51849124935
-
Challenges in e-government and security of information. Information and Security
-
Hwang, M., Li, C., Shen, J., & Chu, Y. (2004). Challenges in e-government and security of information. Information and Security . International Journal (Toronto, Ont.), 15(1), 9-20.
-
(2004)
International Journal (Toronto, Ont.)
, vol.15
, Issue.1
, pp. 9-20
-
-
Hwang, M.1
Li, C.2
Shen, J.3
Chu, Y.4
-
18
-
-
84876673035
-
Lessons learnt in the process of computerization, automation and management of ICT security in the developing world: A case study of the University of Dar es Salaam, Tanzania
-
Johannesburg, South Africa
-
Karokola, G., & Yngström, L. (2008). Lessons learnt in the process of computerization, automation and management of ICT security in the developing world: A case study of the University of Dar es Salaam, Tanzania. In Proceedings of the 7th ISSA Conference on Information Security, Johannesburg, South Africa (pp. 331-354).
-
(2008)
Proceedings of the 7th ISSA Conference on Information Security
, pp. 331-354
-
-
Karokola, G.1
Yngström, L.2
-
19
-
-
80053951685
-
Discussing e-government maturity models for the developing world - Security view
-
Johannesburg, South Africa
-
Karokola, G., & Yngström, L. (2009a). Discussing e-government maturity models for the developing world - security view. In Proceedings of the 8th ISSA Conference on Information Security, Johannesburg, South Africa (pp. 81-98).
-
(2009)
Proceedings of the 8th ISSA Conference on Information Security
, pp. 81-98
-
-
Karokola, G.1
Yngström, L.2
-
21
-
-
84993035702
-
E-Government maturity model using the capability maturity model integration
-
doi:10.1108/13287261011070858
-
Kim, D., & Grant, G. (2010). e-Government maturity model using the capability maturity model integration. Journal of Systems and Information Technology, 12(3), 230-244. doi:10.1108/13287261011070858
-
(2010)
Journal of Systems and Information Technology
, vol.12
, Issue.3
, pp. 230-244
-
-
Kim, D.1
Grant, G.2
-
22
-
-
12344297038
-
-
(Unpublished doctoral dissertation). University of Stockholm and Royal Institute of Technology, Stockholm, Sweden
-
Kowalski, S. (1994). IT Insecurity: A Multi-disciplinary Inquiry (Unpublished doctoral dissertation). University of Stockholm and Royal Institute of Technology, Stockholm, Sweden.
-
(1994)
IT Insecurity: A Multi-disciplinary Inquiry
-
-
Kowalski, S.1
-
23
-
-
0042879531
-
Security requirements for e-Government services: A methodological approach for developing a common PKI-based security policy
-
doi:10.1016/ S0140-3664(03)00082-3
-
Lambrinoudakis, C., Gritzalis, S., Dridi, F., & Pernul, G. (2003). Security requirements for e-Government services: a methodological approach for developing a common PKI-based security policy. Computer Communications, 26, 1873-1883. doi:10.1016/ S0140-3664(03)00082-3
-
(2003)
Computer Communications
, vol.26
, pp. 1873-1883
-
-
Lambrinoudakis, C.1
Gritzalis, S.2
Dridi, F.3
Pernul, G.4
-
24
-
-
0035373510
-
Developing fully functional E-government: A four stage model
-
DOI 10.1016/S0740-624X(01)00066-1, PII S0740624X01000661
-
Layne, K., & Lee, L. (2001). Developing fully functional e-government: A four stage model. Government Information Quarterly, 8, 122-136. doi:10.1016/ S0740-624X(01)00066-1 (Pubitemid 33379949)
-
(2001)
Government Information Quarterly
, vol.18
, Issue.2
, pp. 122-136
-
-
Layne, K.1
Lee, J.2
-
26
-
-
34047231428
-
-
Reading, MA: Addison-Wesley
-
McGraw, G. (2005). Software security. Reading, MA: Addison-Wesley.
-
(2005)
Software Security
-
-
McGraw, G.1
-
31
-
-
0003884555
-
-
New York, NY: Richard D. Irwin
-
Schoderbek, P., Schoderbek, C., & Kefalas, A. (1985). Management systems, conceptual considerations. New York, NY: Richard D. Irwin.
-
(1985)
Management Systems, Conceptual Considerations
-
-
Schoderbek, P.1
Schoderbek, C.2
Kefalas, A.3
-
32
-
-
21144448342
-
Synthesizing e-government stage models - A meta-synthesis based on meta-ethnography approach
-
DOI 10.1108/02635570510592352
-
Siau, K., & Long, Y. (2005). Synthesizing e- Government stage models - A meta-synthesis based on meta-ethnography approach. Industrial Management & Data Systems, 105(4), 443-458. doi:10.1108/02635570510592352 (Pubitemid 40878206)
-
(2005)
Industrial Management and Data Systems
, vol.105
, Issue.4
, pp. 443-458
-
-
Siau, K.1
Long, Y.2
-
33
-
-
77649324071
-
-
Retrieved March 14, 2009
-
Signore, O., Chesi, F., & Pallotti, F. (2005). e-Government: challenges and Opportunities. Retrieved March 14, 2009, from http://www.w3c.it/papers/ cmg2005Italy.pdf
-
(2005)
E-Government: Challenges and Opportunities
-
-
Signore, O.1
Chesi, F.2
Pallotti, F.3
-
34
-
-
84860500192
-
-
TZ-eGov
-
TZ-eGov. (2008). Tanzania e-Government Strategy. Retrieved http://dgroups.org/file2. axd/a9704dec-5600-487a-aca6-2600cc22aa20/ Tanzania-National-e-Government-Strategy-Ver-2-0-02-12-2008.pdf
-
(2008)
Tanzania E-Government Strategy
-
-
-
35
-
-
85089217268
-
-
United Nations. (UN). Retrieved June 16, 2010
-
United Nations. (UN). (2008). United Nation e- Government Survey report 2007/08. Retrieved June 16, 2010, from http://www.unpan.org/egovkb/
-
(2008)
United Nation E- Government Survey Report 2007/08
-
-
-
37
-
-
17144412242
-
Meta-synthesis method for qualitative research: A literature review
-
DOI 10.1111/j.1365-2648.2005.03380.x
-
Walsh, D., & Downe, S. (2005). Meta-synthesis method for qualitative research: A literature review. Journal of Advanced Nursing, 50(2), 204-211. doi:10.1111/j.1365-2648.2005.03380.x (Pubitemid 40515990)
-
(2005)
Journal of Advanced Nursing
, vol.50
, Issue.2
, pp. 204-211
-
-
Walsh, D.1
Downe, S.2
-
39
-
-
0346961553
-
E-Government and the transformation of service delivery and citizen attitudes
-
DOI 10.1111/j.1540-6210.2004.00343.x
-
West, D. (2004). E-government and the transformation of service delivery and citizen attitudes. Public Administration Review, 64(1), 15-27. doi:10.1111/ j.1540-6210.2004.00343.x (Pubitemid 38059187)
-
(2004)
Public Administration Review
, vol.64
, Issue.1
, pp. 15-27
-
-
West, D.M.1
-
44
-
-
0004172670
-
-
Retrieved January 10, 2009
-
World Bank. (2003). World development indicators. Retrieved January 10, 2009, from http://www. worldbank.org/data/wdi2003/
-
(2003)
World Development Indicators
-
-
-
45
-
-
1242318250
-
-
(Unpublished doctoral dissertation). University of Stockholm and the Royal Institute of Technology, Stockholm, Sweden
-
Yngström, L. (1996). A systemic-holistic approach to academic programmes in IT security (Unpublished doctoral dissertation). University of Stockholm and the Royal Institute of Technology, Stockholm, Sweden.
-
(1996)
A Systemic-holistic Approach to Academic Programmes in IT Security
-
-
Yngström, L.1
|