-
1
-
-
84866342192
-
E-government security in developing countries: a managerial conceptual framework
-
Brisbane: Queensland University of Technology 26-28 March 2008
-
Alfawaz, S.; May, L.; Mohanak, K. 2008. E-government security in developing countries: a managerial conceptual framework, in International Research Society for Public Management Conference, 26-28 March 2008. Queensland University of Technology, Brisbane.
-
(2008)
International Research Society for Public Management Conference
-
-
Alfawaz, S.1
May, L.2
Mohanak, K.3
-
2
-
-
33749040748
-
-
: Tanzania Case Study. ICALT, 1007-1011
-
Bakari, J. K.; Tarimo, C. N.; Ynstrom, L.; Magnusson, C. 2005. State of ICT Security Management in the Institutions of Higher Learning in Developing Countries: Tanzania Case Study. ICALT, 1007-1011.
-
(2005)
State of ICT Security Management in the Institutions of Higher Learning in Developing Countries
-
-
Bakari, J.K.1
Tarimo, C.N.2
Ynstrom, L.3
Magnusson, C.4
-
3
-
-
79955906988
-
Using OWL and SWRL to represent and reason with situation-based access control policies
-
Beimel, D.; Peleg, M. 2011. Using OWL and SWRL to represent and reason with situation-based access control policies, Data & Knowledge Engineering 70 6: 596-615. http://dx.doi.org/10.1016/j.datak.2011.03.006
-
(2011)
Data & Knowledge Engineering
, vol.70
, Issue.6
, pp. 596-615
-
-
Beimel, D.1
Peleg, M.2
-
4
-
-
85015736552
-
The use of critical success factors in evaluation of information systems
-
Bergeron, F.; Bégin, C. 1989. The use of critical success factors in evaluation of information systems, Journal of Management Information Systems: 111-124.
-
(1989)
Journal of Management Information Systems
, pp. 111-124
-
-
Bergeron, F.1
Bégin, C.2
-
5
-
-
84889913711
-
HMG Security Policy Framework
-
Cabinet Office UK Available from Internet:
-
Cabinet Office UK. 2008. HMG Security Policy Framework. Available from Internet: http://www.cabi-netoffice.gov.uk/media/111428/spf.pdf
-
(2008)
-
-
-
7
-
-
84860144119
-
A Study on technology architecture and serving approaches of electronic Government system, Intelligent Computing and Information Science
-
Chunnian, L., Yiyun, H. and Qin, P. 2011. A Study on technology architecture and serving approaches of electronic Government system, Intelligent Computing and Information Science. Communications in Computer and Information Science, 134(1): 112-117.
-
(2011)
Communications in Computer and Information Science
, vol.134
, Issue.1
, pp. 112-117
-
-
Chunnian, L.1
Yiyun, H.2
Qin, P.3
-
10
-
-
84866338517
-
Tasmanian Government Information Security Framework
-
Department of Premier and Government, Tasmania
-
Department of Premier and Government, Tasmania. 2009. Tasmanian Government Information Security Framework.
-
(2009)
-
-
-
11
-
-
34548190327
-
Security Requirements for a Semantic Service-oriented Architecture
-
IEEE Computer Society
-
Durbeck, S.; Schillinger, R.; Kolter, J. 2007. Security Requirements for a Semantic Service-oriented Architecture, in The Second International Conference on Availability, Reliability and Security, 366-373. IEEE Computer Society.
-
(2007)
The Second International Conference on Availability, Reliability and Security
, pp. 366-373
-
-
Durbeck, S.1
Schillinger, R.2
Kolter, J.3
-
12
-
-
56349121964
-
Towards the development of privacy-aware systems
-
Guarda, P.; Zannone, N. 2009. Towards the development of privacy-aware systems, Information and Software Technology 51 2: 337-350. http://dx.doi.org/10.1016/j.infsof.2008.04.004
-
(2009)
Information and Software Technology
, vol.51
, Issue.2
, pp. 337-350
-
-
Guarda, P.1
Zannone, N.2
-
14
-
-
79959729769
-
A framework to support alignment of secure software engineering with legal regulations
-
Islam, S.; Mouratidis, H.; Jurjens, J. 2011. A framework to support alignment of secure software engineering with legal regulations, Software and Systems Modeling 10 3: 369-397. http://dx.doi.org/10.1007/s10270-010-0154-z
-
(2011)
Software and Systems Modeling
, vol.10
, Issue.3
, pp. 369-397
-
-
Islam, S.1
Mouratidis, H.2
Jurjens, J.3
-
15
-
-
70149084205
-
ISO/IEC 27002:2005 - Information technology - Security techniques - Code of practice for information security management
-
ISO/IEC
-
ISO/IEC. 2005. ISO/IEC 27002:2005 - Information technology - Security techniques - Code of practice for information security management.
-
(2005)
-
-
-
16
-
-
77952341262
-
Information technology - Security techniques - Information security management systems - Overview and vocabulary
-
ISO/IEC
-
ISO/IEC. 2009. Information technology - Security techniques - Information security management systems - Overview and vocabulary.
-
(2009)
-
-
-
18
-
-
79955640807
-
Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations
-
Marin-Lopez, R.; Pereniguez, F.; Lopez, G.; Perez-Mendez, A. 2011. Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations, Computer Standards and Interfaces 33 5: 494-504. http://dx.doi.org/10.1016/j.csi.2011.02.005
-
(2011)
Computer Standards and Interfaces
, vol.33
, Issue.5
, pp. 494-504
-
-
Marin-Lopez, R.1
Pereniguez, F.2
Lopez, G.3
Perez-Mendez, A.4
-
19
-
-
15744385102
-
National Information and Communications Technologies Policy
-
Ministry of Communications and Transport United Republic of Tanzania, Dar es Salaam
-
Ministry of Communications and Transport. 2003. National Information and Communications Technologies Policy. United Republic of Tanzania, Dar es Salaam.
-
(2003)
-
-
-
21
-
-
84866341856
-
Volume IV Public expenditure Estimates, Development Votes for 2010/11
-
Ministry of Finance and Economic Affairs
-
Ministry of Finance and Economic Affairs. 2010b. Volume IV Public expenditure Estimates, Development Votes for 2010/11.
-
(2010)
-
-
-
22
-
-
84866342197
-
Spanish National Interoperability Framework
-
Ministry of the Presidency, Spain
-
Ministry of the Presidency, Spain. 2010. Spanish National Interoperability Framework.
-
(2010)
-
-
-
23
-
-
84889909927
-
Available from Internet
-
OASIS
-
OASIS. 2010. Available from Internet: http://www.oasis-open.org/specs/
-
(2010)
-
-
-
24
-
-
84866342196
-
-
Parliament of Tanzania
-
Parliament of Tanzania. 2008. Finance Act No. 13.
-
(2008)
Finance Act No. 13
-
-
-
25
-
-
84866339998
-
Tanzania e-Government Strategy
-
President's Office United Republic of Tanzania
-
President's Office United Republic of Tanzania. 2009. Tanzania e-Government Strategy.
-
(2009)
-
-
-
27
-
-
36549080037
-
Intercultural aspects of online communication a comparison of mandarin-speaking, US, Egyptian and German user preferences
-
Seidenspinner, M.; Theuner, G. 2007. Intercultural aspects of online communication a comparison of mandarin-speaking, US, Egyptian and German user preferences, Journal of Business Economics and Management 8 2: 101-109. http://dx.doi.org/10.1080/16111699.2007.9636157
-
(2007)
Journal of Business Economics and Management
, vol.8
, Issue.2
, pp. 101-109
-
-
Seidenspinner, M.1
Theuner, G.2
-
29
-
-
84869601807
-
Minimum Interoperability Standards for Information Systems in Government
-
SITA Available from Internet:
-
SITA. 2007. Minimum Interoperability Standards for Information Systems in Government. Available from Internet: http://www.sita.co.za/standard/MIOSv4.12007.pdf
-
(2007)
-
-
-
30
-
-
85015715200
-
An Approach to Enhance ICT Infrastrcutures Security through Legal, Regulatory Influence
-
Tarimo, C. N.; Yngstrom, L.; Kowalski, S. 2005. An Approach to Enhance ICT Infrastrcutures Security through Legal, Regulatory Influence, ISSA, 1-12.
-
(2005)
ISSA
, pp. 1-12
-
-
Tarimo, C.N.1
Yngstrom, L.2
Kowalski, S.3
-
32
-
-
44649199808
-
Guidelines for government-to-government initiative architecture in developing countries
-
Zarei, B.; Ghapanchi, A. 2008. Guidelines for government-to-government initiative architecture in developing countries, International Journal of Information Management 28: 277-284. http://dx.doi.org/10.1016/j.ijinfomgt.2008.02.008
-
(2008)
International Journal of Information Management
, vol.28
, pp. 277-284
-
-
Zarei, B.1
Ghapanchi, A.2
-
33
-
-
79954986542
-
Securing e-Government and e-Voting with an open cloud computing architecture
-
Zissis, D.; Lekkas, D. 2011. Securing e-Government and e-Voting with an open cloud computing architecture, Government Information Quarterly 28 2: 239-251. http://dx.doi.org/10.1016/j.giq.2010.05.010
-
(2011)
Government Information Quarterly
, vol.28
, Issue.2
, pp. 239-251
-
-
Zissis, D.1
Lekkas, D.2
|