메뉴 건너뛰기




Volumn 18, Issue 1, 2012, Pages 117-131

A sustainable information security framework for e-Government - case of Tanzania

Author keywords

e Governance; e Government; e Government in Tanzania; information security; information security framework

Indexed keywords


EID: 84866333210     PISSN: 20294913     EISSN: 20294921     Source Type: Journal    
DOI: 10.3846/20294913.2012.661196     Document Type: Article
Times cited : (12)

References (33)
  • 1
    • 84866342192 scopus 로고    scopus 로고
    • E-government security in developing countries: a managerial conceptual framework
    • Brisbane: Queensland University of Technology 26-28 March 2008
    • Alfawaz, S.; May, L.; Mohanak, K. 2008. E-government security in developing countries: a managerial conceptual framework, in International Research Society for Public Management Conference, 26-28 March 2008. Queensland University of Technology, Brisbane.
    • (2008) International Research Society for Public Management Conference
    • Alfawaz, S.1    May, L.2    Mohanak, K.3
  • 3
    • 79955906988 scopus 로고    scopus 로고
    • Using OWL and SWRL to represent and reason with situation-based access control policies
    • Beimel, D.; Peleg, M. 2011. Using OWL and SWRL to represent and reason with situation-based access control policies, Data & Knowledge Engineering 70 6: 596-615. http://dx.doi.org/10.1016/j.datak.2011.03.006
    • (2011) Data & Knowledge Engineering , vol.70 , Issue.6 , pp. 596-615
    • Beimel, D.1    Peleg, M.2
  • 4
    • 85015736552 scopus 로고
    • The use of critical success factors in evaluation of information systems
    • Bergeron, F.; Bégin, C. 1989. The use of critical success factors in evaluation of information systems, Journal of Management Information Systems: 111-124.
    • (1989) Journal of Management Information Systems , pp. 111-124
    • Bergeron, F.1    Bégin, C.2
  • 5
    • 84889913711 scopus 로고    scopus 로고
    • HMG Security Policy Framework
    • Cabinet Office UK Available from Internet:
    • Cabinet Office UK. 2008. HMG Security Policy Framework. Available from Internet: http://www.cabi-netoffice.gov.uk/media/111428/spf.pdf
    • (2008)
  • 7
    • 84860144119 scopus 로고    scopus 로고
    • A Study on technology architecture and serving approaches of electronic Government system, Intelligent Computing and Information Science
    • Chunnian, L., Yiyun, H. and Qin, P. 2011. A Study on technology architecture and serving approaches of electronic Government system, Intelligent Computing and Information Science. Communications in Computer and Information Science, 134(1): 112-117.
    • (2011) Communications in Computer and Information Science , vol.134 , Issue.1 , pp. 112-117
    • Chunnian, L.1    Yiyun, H.2    Qin, P.3
  • 10
    • 84866338517 scopus 로고    scopus 로고
    • Tasmanian Government Information Security Framework
    • Department of Premier and Government, Tasmania
    • Department of Premier and Government, Tasmania. 2009. Tasmanian Government Information Security Framework.
    • (2009)
  • 12
    • 56349121964 scopus 로고    scopus 로고
    • Towards the development of privacy-aware systems
    • Guarda, P.; Zannone, N. 2009. Towards the development of privacy-aware systems, Information and Software Technology 51 2: 337-350. http://dx.doi.org/10.1016/j.infsof.2008.04.004
    • (2009) Information and Software Technology , vol.51 , Issue.2 , pp. 337-350
    • Guarda, P.1    Zannone, N.2
  • 14
    • 79959729769 scopus 로고    scopus 로고
    • A framework to support alignment of secure software engineering with legal regulations
    • Islam, S.; Mouratidis, H.; Jurjens, J. 2011. A framework to support alignment of secure software engineering with legal regulations, Software and Systems Modeling 10 3: 369-397. http://dx.doi.org/10.1007/s10270-010-0154-z
    • (2011) Software and Systems Modeling , vol.10 , Issue.3 , pp. 369-397
    • Islam, S.1    Mouratidis, H.2    Jurjens, J.3
  • 15
    • 70149084205 scopus 로고    scopus 로고
    • ISO/IEC 27002:2005 - Information technology - Security techniques - Code of practice for information security management
    • ISO/IEC
    • ISO/IEC. 2005. ISO/IEC 27002:2005 - Information technology - Security techniques - Code of practice for information security management.
    • (2005)
  • 16
    • 77952341262 scopus 로고    scopus 로고
    • Information technology - Security techniques - Information security management systems - Overview and vocabulary
    • ISO/IEC
    • ISO/IEC. 2009. Information technology - Security techniques - Information security management systems - Overview and vocabulary.
    • (2009)
  • 18
    • 79955640807 scopus 로고    scopus 로고
    • Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations
    • Marin-Lopez, R.; Pereniguez, F.; Lopez, G.; Perez-Mendez, A. 2011. Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations, Computer Standards and Interfaces 33 5: 494-504. http://dx.doi.org/10.1016/j.csi.2011.02.005
    • (2011) Computer Standards and Interfaces , vol.33 , Issue.5 , pp. 494-504
    • Marin-Lopez, R.1    Pereniguez, F.2    Lopez, G.3    Perez-Mendez, A.4
  • 19
    • 15744385102 scopus 로고    scopus 로고
    • National Information and Communications Technologies Policy
    • Ministry of Communications and Transport United Republic of Tanzania, Dar es Salaam
    • Ministry of Communications and Transport. 2003. National Information and Communications Technologies Policy. United Republic of Tanzania, Dar es Salaam.
    • (2003)
  • 21
    • 84866341856 scopus 로고    scopus 로고
    • Volume IV Public expenditure Estimates, Development Votes for 2010/11
    • Ministry of Finance and Economic Affairs
    • Ministry of Finance and Economic Affairs. 2010b. Volume IV Public expenditure Estimates, Development Votes for 2010/11.
    • (2010)
  • 22
    • 84866342197 scopus 로고    scopus 로고
    • Spanish National Interoperability Framework
    • Ministry of the Presidency, Spain
    • Ministry of the Presidency, Spain. 2010. Spanish National Interoperability Framework.
    • (2010)
  • 23
    • 84889909927 scopus 로고    scopus 로고
    • Available from Internet
    • OASIS
    • OASIS. 2010. Available from Internet: http://www.oasis-open.org/specs/
    • (2010)
  • 24
    • 84866342196 scopus 로고    scopus 로고
    • Parliament of Tanzania
    • Parliament of Tanzania. 2008. Finance Act No. 13.
    • (2008) Finance Act No. 13
  • 25
    • 84866339998 scopus 로고    scopus 로고
    • Tanzania e-Government Strategy
    • President's Office United Republic of Tanzania
    • President's Office United Republic of Tanzania. 2009. Tanzania e-Government Strategy.
    • (2009)
  • 27
    • 36549080037 scopus 로고    scopus 로고
    • Intercultural aspects of online communication a comparison of mandarin-speaking, US, Egyptian and German user preferences
    • Seidenspinner, M.; Theuner, G. 2007. Intercultural aspects of online communication a comparison of mandarin-speaking, US, Egyptian and German user preferences, Journal of Business Economics and Management 8 2: 101-109. http://dx.doi.org/10.1080/16111699.2007.9636157
    • (2007) Journal of Business Economics and Management , vol.8 , Issue.2 , pp. 101-109
    • Seidenspinner, M.1    Theuner, G.2
  • 29
    • 84869601807 scopus 로고    scopus 로고
    • Minimum Interoperability Standards for Information Systems in Government
    • SITA Available from Internet:
    • SITA. 2007. Minimum Interoperability Standards for Information Systems in Government. Available from Internet: http://www.sita.co.za/standard/MIOSv4.12007.pdf
    • (2007)
  • 30
    • 85015715200 scopus 로고    scopus 로고
    • An Approach to Enhance ICT Infrastrcutures Security through Legal, Regulatory Influence
    • Tarimo, C. N.; Yngstrom, L.; Kowalski, S. 2005. An Approach to Enhance ICT Infrastrcutures Security through Legal, Regulatory Influence, ISSA, 1-12.
    • (2005) ISSA , pp. 1-12
    • Tarimo, C.N.1    Yngstrom, L.2    Kowalski, S.3
  • 32
    • 44649199808 scopus 로고    scopus 로고
    • Guidelines for government-to-government initiative architecture in developing countries
    • Zarei, B.; Ghapanchi, A. 2008. Guidelines for government-to-government initiative architecture in developing countries, International Journal of Information Management 28: 277-284. http://dx.doi.org/10.1016/j.ijinfomgt.2008.02.008
    • (2008) International Journal of Information Management , vol.28 , pp. 277-284
    • Zarei, B.1    Ghapanchi, A.2
  • 33
    • 79954986542 scopus 로고    scopus 로고
    • Securing e-Government and e-Voting with an open cloud computing architecture
    • Zissis, D.; Lekkas, D. 2011. Securing e-Government and e-Voting with an open cloud computing architecture, Government Information Quarterly 28 2: 239-251. http://dx.doi.org/10.1016/j.giq.2010.05.010
    • (2011) Government Information Quarterly , vol.28 , Issue.2 , pp. 239-251
    • Zissis, D.1    Lekkas, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.