메뉴 건너뛰기




Volumn 8, Issue 1, 2012, Pages 1-25

Secure e-government services: A comparative analysis of e-government maturity models for the developing regions - The need for security services

Author keywords

Developing Regions; E Government; E Government Maturity Model; Information Security; Security Services

Indexed keywords


EID: 84860519899     PISSN: 15483886     EISSN: 15483894     Source Type: Journal    
DOI: 10.4018/jegr.2012010101     Document Type: Article
Times cited : (28)

References (46)
  • 3
    • 10444231516 scopus 로고    scopus 로고
    • E-Government and developing countries: An overview
    • DOI 10.1080/13600860410001674779
    • Busu, S. (2004). e-Government and developing countries: An overview. International Review of Law Computers & Technology, 18(1), 109-132. do i:10.1080/13600860410001674779 (Pubitemid 38803900)
    • (2004) International Review of Law Computers & Technology , vol.18 , Issue.1 , pp. 109-132
    • Basu, S.1
  • 7
    • 21144440584 scopus 로고    scopus 로고
    • The citizen as customer
    • Deloitte & Touche.
    • Deloitte & Touche. (2001). The citizen as customer. CMA Management, 74(10), 58.
    • (2001) CMA Management , vol.74 , Issue.10 , pp. 58
  • 8
    • 10444220938 scopus 로고    scopus 로고
    • Developing a Generic framework for e-Government. Governance
    • doi:10.4018/jgim.2005010101
    • Grant, G., & Chau, D. (2005). Developing a Generic framework for e-Government. Governance . Journal of Global Information Management, 13(1), 1-30. doi:10.4018/jgim.2005010101
    • (2005) Journal of Global Information Management , vol.13 , Issue.1 , pp. 1-30
    • Grant, G.1    Chau, D.2
  • 9
    • 31944444891 scopus 로고    scopus 로고
    • Introducing e-Gov: History, definitions, and issues
    • Gronlund, A., & Haron, T. (2005). Introducing e-Gov: History, definitions, and issues. Communications of the AIS, 15(39), 713-729.
    • (2005) Communications of the AIS , vol.15 , Issue.39 , pp. 713-729
    • Gronlund, A.1    Haron, T.2
  • 10
    • 80053977257 scopus 로고    scopus 로고
    • The human side of information security
    • Tipton, H. F., & Krause, M. (Eds.) (5th ed.). Boca Raton, FL: Auerbach
    • Henry, K. (2004). The human side of information security. In Tipton, H. F., & Krause, M. (Eds.), Information security handbook (5th ed.). Boca Raton, FL: Auerbach.
    • (2004) Information Security Handbook
    • Henry, K.1
  • 13
    • 51849124935 scopus 로고    scopus 로고
    • Challenges in e-government and security of information. Information and Security
    • Hwang, M., Li, C., Shen, J., & Chu, Y. (2004). Challenges in e-government and security of information. Information and Security . International Journal (Toronto, Ont.), 15(1), 9-20.
    • (2004) International Journal (Toronto, Ont.) , vol.15 , Issue.1 , pp. 9-20
    • Hwang, M.1    Li, C.2    Shen, J.3    Chu, Y.4
  • 18
    • 84876673035 scopus 로고    scopus 로고
    • Lessons learnt in the process of computerization, automation and management of ICT security in the developing world: A case study of the University of Dar es Salaam, Tanzania
    • Johannesburg, South Africa
    • Karokola, G., & Yngström, L. (2008). Lessons learnt in the process of computerization, automation and management of ICT security in the developing world: A case study of the University of Dar es Salaam, Tanzania. In Proceedings of the 7th ISSA Conference on Information Security, Johannesburg, South Africa (pp. 331-354).
    • (2008) Proceedings of the 7th ISSA Conference on Information Security , pp. 331-354
    • Karokola, G.1    Yngström, L.2
  • 19
    • 80053951685 scopus 로고    scopus 로고
    • Discussing e-government maturity models for the developing world - Security view
    • Johannesburg, South Africa
    • Karokola, G., & Yngström, L. (2009a). Discussing e-government maturity models for the developing world - security view. In Proceedings of the 8th ISSA Conference on Information Security, Johannesburg, South Africa (pp. 81-98).
    • (2009) Proceedings of the 8th ISSA Conference on Information Security , pp. 81-98
    • Karokola, G.1    Yngström, L.2
  • 21
    • 84993035702 scopus 로고    scopus 로고
    • E-Government maturity model using the capability maturity model integration
    • doi:10.1108/13287261011070858
    • Kim, D., & Grant, G. (2010). e-Government maturity model using the capability maturity model integration. Journal of Systems and Information Technology, 12(3), 230-244. doi:10.1108/13287261011070858
    • (2010) Journal of Systems and Information Technology , vol.12 , Issue.3 , pp. 230-244
    • Kim, D.1    Grant, G.2
  • 22
    • 12344297038 scopus 로고
    • (Unpublished doctoral dissertation). University of Stockholm and Royal Institute of Technology, Stockholm, Sweden
    • Kowalski, S. (1994). IT Insecurity: A Multi-disciplinary Inquiry (Unpublished doctoral dissertation). University of Stockholm and Royal Institute of Technology, Stockholm, Sweden.
    • (1994) IT Insecurity: A Multi-disciplinary Inquiry
    • Kowalski, S.1
  • 23
    • 0042879531 scopus 로고    scopus 로고
    • Security requirements for e-Government services: A methodological approach for developing a common PKI-based security policy
    • doi:10.1016/ S0140-3664(03)00082-3
    • Lambrinoudakis, C., Gritzalis, S., Dridi, F., & Pernul, G. (2003). Security requirements for e-Government services: a methodological approach for developing a common PKI-based security policy. Computer Communications, 26, 1873-1883. doi:10.1016/ S0140-3664(03)00082-3
    • (2003) Computer Communications , vol.26 , pp. 1873-1883
    • Lambrinoudakis, C.1    Gritzalis, S.2    Dridi, F.3    Pernul, G.4
  • 24
    • 0035373510 scopus 로고    scopus 로고
    • Developing fully functional E-government: A four stage model
    • DOI 10.1016/S0740-624X(01)00066-1, PII S0740624X01000661
    • Layne, K., & Lee, L. (2001). Developing fully functional e-government: A four stage model. Government Information Quarterly, 8, 122-136. doi:10.1016/ S0740-624X(01)00066-1 (Pubitemid 33379949)
    • (2001) Government Information Quarterly , vol.18 , Issue.2 , pp. 122-136
    • Layne, K.1    Lee, J.2
  • 26
    • 34047231428 scopus 로고    scopus 로고
    • Reading, MA: Addison-Wesley
    • McGraw, G. (2005). Software security. Reading, MA: Addison-Wesley.
    • (2005) Software Security
    • McGraw, G.1
  • 32
    • 21144448342 scopus 로고    scopus 로고
    • Synthesizing e-government stage models - A meta-synthesis based on meta-ethnography approach
    • DOI 10.1108/02635570510592352
    • Siau, K., & Long, Y. (2005). Synthesizing e- Government stage models - A meta-synthesis based on meta-ethnography approach. Industrial Management & Data Systems, 105(4), 443-458. doi:10.1108/02635570510592352 (Pubitemid 40878206)
    • (2005) Industrial Management and Data Systems , vol.105 , Issue.4 , pp. 443-458
    • Siau, K.1    Long, Y.2
  • 34
    • 84860500192 scopus 로고    scopus 로고
    • TZ-eGov
    • TZ-eGov. (2008). Tanzania e-Government Strategy. Retrieved http://dgroups.org/file2. axd/a9704dec-5600-487a-aca6-2600cc22aa20/ Tanzania-National-e-Government-Strategy-Ver-2-0-02-12-2008.pdf
    • (2008) Tanzania E-Government Strategy
  • 35
    • 85089217268 scopus 로고    scopus 로고
    • United Nations. (UN). Retrieved June 16, 2010
    • United Nations. (UN). (2008). United Nation e- Government Survey report 2007/08. Retrieved June 16, 2010, from http://www.unpan.org/egovkb/
    • (2008) United Nation E- Government Survey Report 2007/08
  • 37
    • 17144412242 scopus 로고    scopus 로고
    • Meta-synthesis method for qualitative research: A literature review
    • DOI 10.1111/j.1365-2648.2005.03380.x
    • Walsh, D., & Downe, S. (2005). Meta-synthesis method for qualitative research: A literature review. Journal of Advanced Nursing, 50(2), 204-211. doi:10.1111/j.1365-2648.2005.03380.x (Pubitemid 40515990)
    • (2005) Journal of Advanced Nursing , vol.50 , Issue.2 , pp. 204-211
    • Walsh, D.1    Downe, S.2
  • 39
    • 0346961553 scopus 로고    scopus 로고
    • E-Government and the transformation of service delivery and citizen attitudes
    • DOI 10.1111/j.1540-6210.2004.00343.x
    • West, D. (2004). E-government and the transformation of service delivery and citizen attitudes. Public Administration Review, 64(1), 15-27. doi:10.1111/ j.1540-6210.2004.00343.x (Pubitemid 38059187)
    • (2004) Public Administration Review , vol.64 , Issue.1 , pp. 15-27
    • West, D.M.1
  • 44
    • 0004172670 scopus 로고    scopus 로고
    • Retrieved January 10, 2009
    • World Bank. (2003). World development indicators. Retrieved January 10, 2009, from http://www. worldbank.org/data/wdi2003/
    • (2003) World Development Indicators
  • 45
    • 1242318250 scopus 로고    scopus 로고
    • (Unpublished doctoral dissertation). University of Stockholm and the Royal Institute of Technology, Stockholm, Sweden
    • Yngström, L. (1996). A systemic-holistic approach to academic programmes in IT security (Unpublished doctoral dissertation). University of Stockholm and the Royal Institute of Technology, Stockholm, Sweden.
    • (1996) A Systemic-holistic Approach to Academic Programmes in IT Security
    • Yngström, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.