-
2
-
-
84908330146
-
ICT and e-government in Nigeria: Opportunities and challenges
-
(available onon 7th December)
-
Akunyili D. ICT and e-government in Nigeria: Opportunities and challenges. World Congress on Information Technology, Amsterdam, The Netherlands, 25th-27th May 2010, 2013 2010, (available on http://goafrit.wordpress.com/2010/06/12/ict-and-e-government-in-nigeria-prof-akunyili/Accessed on 7th December).
-
(2010)
World Congress on Information Technology, Amsterdam, The Netherlands, 25th-27th May 2010, 2013
-
-
Akunyili, D.1
-
5
-
-
33947614734
-
Applying participatory design and collaboration in digital public services for discovering and re-designing e-government services
-
Anthopoulos L.G., Siozos P.T., Soukalas I.A. Applying participatory design and collaboration in digital public services for discovering and re-designing e-government services. Government Information Quarterly 2007, 24:353-376.
-
(2007)
Government Information Quarterly
, vol.24
, pp. 353-376
-
-
Anthopoulos, L.G.1
Siozos, P.T.2
Soukalas, I.A.3
-
6
-
-
85007110128
-
Technological assessment of e-government web presence in Nigeria
-
Awoleye O.M., Ojuloge B., Siyanbola W.O. Technological assessment of e-government web presence in Nigeria. The 6th International Conference on Theory and Practice of Electronic Governance, Albany, NY, USA, 22-25 October 2012.
-
(2012)
The 6th International Conference on Theory and Practice of Electronic Governance, Albany, NY, USA, 22-25 October
-
-
Awoleye, O.M.1
Ojuloge, B.2
Siyanbola, W.O.3
-
7
-
-
85007039634
-
Technological assessment of banking innovation in Nigeria
-
Awoleye O.M., Okogun O.A., Siyanbola W.O. Technological assessment of banking innovation in Nigeria. African Journal Accounting, Auditing and Finance 2013, 2(2):157-174.
-
(2013)
African Journal Accounting, Auditing and Finance
, vol.2
, Issue.2
, pp. 157-174
-
-
Awoleye, O.M.1
Okogun, O.A.2
Siyanbola, W.O.3
-
8
-
-
70349149001
-
Assessment of e-governance resource use in southwestern Nigeria
-
Proceedings of the 2nd international conference on theory and practice of electronic governance. Cairo, Egypt
-
Awoleye O.M., Oluwaranti A.I., Siyanbola W.O., Adagunodo E.R. Assessment of e-governance resource use in southwestern Nigeria. ACM International Conference Proceeding Series 2008, 154-159.
-
(2008)
ACM International Conference Proceeding Series
, pp. 154-159
-
-
Awoleye, O.M.1
Oluwaranti, A.I.2
Siyanbola, W.O.3
Adagunodo, E.R.4
-
9
-
-
0345323212
-
E-governance and developing countries: Introduction and examples
-
(Available onaccessed 12th April, 2013)
-
Backus M. E-governance and developing countries: Introduction and examples. Report No 3, April 2001 2001, (Available on http://www.ftpiicd.org/files/research/reports/report3.pdf accessed 12th April, 2013).
-
(2001)
Report No 3, April 2001
-
-
Backus, M.1
-
10
-
-
79957809946
-
Automated discovery of parameter pollution vulnerabilities in web applications
-
Balduzzi M., Gimenez C.T., Balzarotti D., Kirda E. Automated discovery of parameter pollution vulnerabilities in web applications. NDSS 2011, 18th Annual Network and Distributed System Security Symposium, 6-9 February 2011, San Diego, CA, USA 2010.
-
(2010)
NDSS 2011, 18th Annual Network and Distributed System Security Symposium, 6-9 February 2011, San Diego, CA, USA
-
-
Balduzzi, M.1
Gimenez, C.T.2
Balzarotti, D.3
Kirda, E.4
-
11
-
-
77956070935
-
-
WWW 2010, April 26-30, 2010, Raleigh, North Carolina, USA, ACM978-1-60558-799-8/10/04 Available on
-
Bandhakavi S., Bisht P., Madhusudan P., Venkatakrishnan V.N. CANDID: Preventing SQL injection attacks using dynamic candidate evaluations 2010, WWW 2010, April 26-30, 2010, Raleigh, North Carolina, USA, ACM978-1-60558-799-8/10/04 Available on http://cs.uiuc.edu/~madhu/ccs07.pdf.
-
(2010)
CANDID: Preventing SQL injection attacks using dynamic candidate evaluations
-
-
Bandhakavi, S.1
Bisht, P.2
Madhusudan, P.3
Venkatakrishnan, V.N.4
-
12
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
Barrantes E., Ackley D., Forrest S., Palmer T., Stefanovic D., Zovi D. Randomized instruction set emulation to disrupt binary code injection attacks. Proceedings of the 10th ACM conference on computer and communications security 2003, October, 281-289.
-
(2003)
Proceedings of the 10th ACM conference on computer and communications security
, pp. 281-289
-
-
Barrantes, E.1
Ackley, D.2
Forrest, S.3
Palmer, T.4
Stefanovic, D.5
Zovi, D.6
-
13
-
-
77954612255
-
Regular expression considered harmful in client-side XSS filters
-
(ACM 978-1-60558-799-8/10/04. Available on
-
Bates D., Barth A., Jackson C. Regular expression considered harmful in client-side XSS filters. WWW 2010, April 26-30, 2010, Raleigh, North Carolina, USA 2010, (ACM 978-1-60558-799-8/10/04. Available on http://www.collinjackson.com/research/xssauditor.pdf).
-
(2010)
WWW 2010, April 26-30, 2010, Raleigh, North Carolina, USA
-
-
Bates, D.1
Barth, A.2
Jackson, C.3
-
14
-
-
84908325213
-
-
Available on, (accessed 25th April, 2013), Cenzic
-
Cenzic Web Application Security Trends Report Q1-Q2, 2009 Available on, (accessed 25th April, 2013). http://www.cenzic.com/downloads/Cenzic_AppSecTrends_Q1-Q2-2009.pdf.
-
Web Application Security Trends Report Q1-Q2, 2009
-
-
-
16
-
-
40649094306
-
E-government implementation: A macro analysis of Singapore's e-government initiatives
-
Chan C.M.L., Lau Y., Pan S.L. E-government implementation: A macro analysis of Singapore's e-government initiatives. Government Information Quarterly 2008, 25(2008):239-255.
-
(2008)
Government Information Quarterly
, vol.25
, Issue.2008
, pp. 239-255
-
-
Chan, C.M.L.1
Lau, Y.2
Pan, S.L.3
-
17
-
-
0037290057
-
Digital government: Technologies and practices
-
Chen H. Digital government: Technologies and practices. Decision Support Systems 2002, 34(3):223-227.
-
(2002)
Decision Support Systems
, vol.34
, Issue.3
, pp. 223-227
-
-
Chen, H.1
-
18
-
-
0042907378
-
Transforming local e-government services: The use of application service providers
-
Chen Y., Gant J. Transforming local e-government services: The use of application service providers. Government Information Quarterly 2001, 18:343-355.
-
(2001)
Government Information Quarterly
, vol.18
, pp. 343-355
-
-
Chen, Y.1
Gant, J.2
-
19
-
-
84858452988
-
-
Available on, (accessed 16th November, 2012)
-
Chien E. Malicious Yahooligans Available on, (accessed 16th November, 2012). http://www.symantec.com/avcenter/reference/malicious.yahooligans.pdf.
-
Malicious Yahooligans
-
-
Chien, E.1
-
21
-
-
33244470126
-
-
Available on, (accessed on 12th April, 2013)
-
Cook S. A web developer's guide to cross scripting Available on, (accessed on 12th April, 2013). http://www.sans.org/reading_room/whitepapers/securecode/web-developers-guide-cross-site-scripting_988.
-
A web developer's guide to cross scripting
-
-
Cook, S.1
-
22
-
-
78650917831
-
-
(Accessed May 05, 2013)
-
CWE-SANS Top 25 most dangerous programming errors (Accessed May 05, 2013). http://www.applicure.com/blog/cwe-sans-top-25-dangerous-programming-errors.
-
Top 25 most dangerous programming errors
-
-
-
23
-
-
25444473131
-
E-government adoption: Architecture and barriers
-
Ebrahim, Irani E-government adoption: Architecture and barriers. Business Process Management Journal 2005, 11(5):589-611.
-
(2005)
Business Process Management Journal
, vol.11
, Issue.5
, pp. 589-611
-
-
Ebrahim1
Irani2
-
24
-
-
33751031748
-
The evolution of cross site scripting attacks
-
iDEFENSE Labs, (Available onaccessed 12th April, 2013)
-
Endler D. The evolution of cross site scripting attacks. Technical report 2002, iDEFENSE Labs, (Available on http://www.cgisecurity.com/lib/XSS.pdf accessed 12th April, 2013).
-
(2002)
Technical report
-
-
Endler, D.1
-
25
-
-
84908352211
-
End-to-end web application security
-
(Available on
-
Erlingsson U., Livshits B., Xie Y. End-to-end web application security. Microsoft Research 2009, (Available on http://static.usenix.org/event/hotos07/tech/full_papers/erlingsson/erlingsson.pdf).
-
(2009)
Microsoft Research
-
-
Erlingsson, U.1
Livshits, B.2
Xie, Y.3
-
26
-
-
84908344514
-
Electronic governance: Myth or opportunity for Nigerian public administration?
-
(available onaccessed 4th December, 2013)
-
Fatile J.O. Electronic governance: Myth or opportunity for Nigerian public administration?. International Journal of Academic Research in Business and Social Sciences 2012, 2(9). (available on http://www.hrmars.com/admin/pics/1104.pdf accessed 4th December, 2013).
-
(2012)
International Journal of Academic Research in Business and Social Sciences
, vol.2
, Issue.9
-
-
Fatile, J.O.1
-
27
-
-
84897754025
-
Exploring e-government evolution: The influence of systems of rules on organizational action
-
Gil-García J.R., Martinez-Moyano I.J. Exploring e-government evolution: The influence of systems of rules on organizational action. NCDG Working Paper No. 05-001 2005.
-
(2005)
NCDG Working Paper No. 05-001
-
-
Gil-García, J.R.1
Martinez-Moyano, I.J.2
-
28
-
-
84861099922
-
Noncespaces: Using randomization to defeat cross-site scripting attacks
-
Gundy M.V., Chen H. Noncespaces: Using randomization to defeat cross-site scripting attacks. Computers and Security 2012, 31(2012):612-628.
-
(2012)
Computers and Security
, vol.31
, Issue.2012
, pp. 612-628
-
-
Gundy, M.V.1
Chen, H.2
-
32
-
-
85007034975
-
Analysis on the improved effects of administrative transparency of the e-government
-
Hee-joon S. Analysis on the improved effects of administrative transparency of the e-government. Administrative Treaties 2002, 40(4):109-134.
-
(2002)
Administrative Treaties
, vol.40
, Issue.4
, pp. 109-134
-
-
Hee-joon, S.1
-
33
-
-
85012432202
-
Prospects and limitations of the e-government initiative in Korea
-
Hee-joon S. Prospects and limitations of the e-government initiative in Korea. International Review of Public Administration 2002, 7(2):45-53.
-
(2002)
International Review of Public Administration
, vol.7
, Issue.2
, pp. 45-53
-
-
Hee-joon, S.1
-
36
-
-
33144474667
-
Stateful session handoff for mobile WWW
-
Hsieh M.-D., Wang T.-P., Tsai C.-S., Tseng C.-C. Stateful session handoff for mobile WWW. Information Sciences 2006, 176:1241-1265.
-
(2006)
Information Sciences
, vol.176
, pp. 1241-1265
-
-
Hsieh, M.-D.1
Wang, T.-P.2
Tsai, C.-S.3
Tseng, C.-C.4
-
37
-
-
70350551674
-
Web application security assessment by fault injection and behaviour monitoring
-
(ACM 1-58113-680-3/03/0005. Available on
-
Huang Y.W., Huang S.K., Lin T.P. Web application security assessment by fault injection and behaviour monitoring. WWW2003, May 20-24, 2003, Budapest, Hungary 2003, (ACM 1-58113-680-3/03/0005. Available on http://www2003.org/cdrom/papers/refereed/p081/FINAL_WAVES_WWW2003.htm).
-
(2003)
WWW2003, May 20-24, 2003, Budapest, Hungary
-
-
Huang, Y.W.1
Huang, S.K.2
Lin, T.P.3
-
40
-
-
84908317484
-
-
Available at, (accessed 20th April, 2013)
-
infoDev/World Bank E-government primer, Washington DC Available at, (accessed 20th April, 2013). http://www.infodev.org/publications.
-
E-government primer, Washington DC
-
-
-
42
-
-
56949095150
-
An institutional analysis of an e-government system for anti-corruption: The case of OPEN
-
Kim S., Jeong S.K., Lee H. An institutional analysis of an e-government system for anti-corruption: The case of OPEN. Government Information Quarterly 2009, 26:42-50.
-
(2009)
Government Information Quarterly
, vol.26
, pp. 42-50
-
-
Kim, S.1
Jeong, S.K.2
Lee, H.3
-
43
-
-
70349595106
-
Client-side cross-site scripting protection
-
Kirda E., Jovanovic N., Kruegel C., Vigna G. Client-side cross-site scripting protection. Computer and Security 2009, 28(7):592-604.
-
(2009)
Computer and Security
, vol.28
, Issue.7
, pp. 592-604
-
-
Kirda, E.1
Jovanovic, N.2
Kruegel, C.3
Vigna, G.4
-
44
-
-
0035373510
-
Developing fully functional e-government: A four stage model
-
Layne K., Lee J. Developing fully functional e-government: A four stage model. Government Information Quarterly 2001, 18(2001):122-136.
-
(2001)
Government Information Quarterly
, vol.18
, Issue.2001
, pp. 122-136
-
-
Layne, K.1
Lee, J.2
-
45
-
-
82755194883
-
A novel method for SQL injection attack detection based on removing SQL query attribute values
-
Lee I., Jeong S., Yeo S., Moon J. A novel method for SQL injection attack detection based on removing SQL query attribute values. Mathematical and Computer Modeling 2011, 55(1-2):58-68.
-
(2011)
Mathematical and Computer Modeling
, vol.55
, Issue.1-2
, pp. 58-68
-
-
Lee, I.1
Jeong, S.2
Yeo, S.3
Moon, J.4
-
46
-
-
0002708094
-
History friendly models of industry-evolution: The computer industry
-
Malerba F., Nelson R., Orsenigo L., Winter S. History friendly models of industry-evolution: The computer industry. Industrial and Corporate Change 1999, 8(1):3-41.
-
(1999)
Industrial and Corporate Change
, vol.8
, Issue.1
, pp. 3-41
-
-
Malerba, F.1
Nelson, R.2
Orsenigo, L.3
Winter, S.4
-
48
-
-
0028551230
-
Evolutionary Economics & Technology Policy
-
Metcalfe J.S. Evolutionary Economics & Technology Policy. The Economic Journal 1994, 104(425):931-944.
-
(1994)
The Economic Journal
, vol.104
, Issue.425
, pp. 931-944
-
-
Metcalfe, J.S.1
-
49
-
-
63049106185
-
SDriver: Location-specific signatures prevent SQL injection attacks
-
Mitropoulos D., Spinellis D. SDriver: Location-specific signatures prevent SQL injection attacks. Computer and Security 2009, 28(3-4):121-129.
-
(2009)
Computer and Security
, vol.28
, Issue.3-4
, pp. 121-129
-
-
Mitropoulos, D.1
Spinellis, D.2
-
50
-
-
85007038572
-
Vulnerabilities in e-governments
-
Moen V., Klingsheim A.N., Simonsen K.I.F., Hole K.J. Vulnerabilities in e-governments. Proc. 2nd International Conference on Global E-Security (ICGeS-06), London, England, April 20-22 2006, 2006.
-
(2006)
Proc. 2nd International Conference on Global E-Security (ICGeS-06), London, England, April 20-22
, pp. 2006
-
-
Moen, V.1
Klingsheim, A.N.2
Simonsen, K.I.F.3
Hole, K.J.4
-
51
-
-
84923041636
-
Vulnerabilities in e-governments
-
Moen V., Klingsheim A.N., Simonsen K.I., Hole K.J. Vulnerabilities in e-governments. International Journal of Electronic Security and Digital Forensics 2007, 1(1):89-100.
-
(2007)
International Journal of Electronic Security and Digital Forensics
, vol.1
, Issue.1
, pp. 89-100
-
-
Moen, V.1
Klingsheim, A.N.2
Simonsen, K.I.3
Hole, K.J.4
-
52
-
-
84908340597
-
E-government in Nigeria: A catalyst for national development
-
University of Abuja, F.C.T., Nigeria, (Available onaccessed on 4th December, 2013)
-
Mohammed S., Abubakar M.K., Bashir A. E-government in Nigeria: A catalyst for national development. International conference on development studies 2010, University of Abuja, F.C.T., Nigeria, (Available on http://www.abu.edu.ng/publications/2009-06-23-113825_373.doc accessed on 4th December, 2013).
-
(2010)
International conference on development studies
-
-
Mohammed, S.1
Abubakar, M.K.2
Bashir, A.3
-
53
-
-
0005281380
-
The evolution of e-government among municipalities: Rhetoric or reality?
-
Moon M.J. The evolution of e-government among municipalities: Rhetoric or reality?. Public Administration Review 2002, 62(4):424-433.
-
(2002)
Public Administration Review
, vol.62
, Issue.4
, pp. 424-433
-
-
Moon, M.J.1
-
55
-
-
31744452097
-
-
Open Web Application Security Project, (Available on
-
OWASP The ten most critical web application security vulnerabilities 2004, Open Web Application Security Project, (Available on http://umn.dl.sourceforge.net/sourceforge/owasp/OWASPTopTen2004.pdf).
-
(2004)
The ten most critical web application security vulnerabilities
-
-
-
59
-
-
85027969939
-
Study on the development and application of e-government maturity assessment model
-
Sang-ho Y. Study on the development and application of e-government maturity assessment model. Korea Policy Academy Society News 2002, 11(4):243-271.
-
(2002)
Korea Policy Academy Society News
, vol.11
, Issue.4
, pp. 243-271
-
-
Sang-ho, Y.1
-
60
-
-
84880475446
-
-
Available on
-
SANS Institute Top cyber security risks Available on. http://www.sans.org/top-cyber-security-risks/summary.php.
-
Top cyber security risks
-
-
-
62
-
-
0346268913
-
The adoption of electronic tax filing systems: An empirical study
-
Wang Y. The adoption of electronic tax filing systems: An empirical study. Government Information Quarterly 2002, 20:333-352.
-
(2002)
Government Information Quarterly
, vol.20
, pp. 333-352
-
-
Wang, Y.1
-
64
-
-
0035373678
-
Best practices in electronic government: Comprehensive electronic information dissemination for science and technology
-
Whitson T.L., Davis L. Best practices in electronic government: Comprehensive electronic information dissemination for science and technology. Government Information Quarterly 2001, 18(2001):79-91.
-
(2001)
Government Information Quarterly
, vol.18
, Issue.2001
, pp. 79-91
-
-
Whitson, T.L.1
Davis, L.2
-
65
-
-
84910681237
-
Static detection of security vulnerability in scripting languages
-
(Available on
-
Xie Y., Aiken A. Static detection of security vulnerability in scripting languages. 15th USENIX Security Symposium, 2006 2006, (Available on http://theory.stanford.edu/~aiken/publications/papers/usenix06.pdf).
-
(2006)
15th USENIX Security Symposium, 2006
-
-
Xie, Y.1
Aiken, A.2
-
66
-
-
84908340657
-
A methodology for designing counter measures against current and future code injection attacks
-
IEEE Press, College Park, Maryland, USA
-
Yves Y., Wouter J., Frank P. A methodology for designing counter measures against current and future code injection attacks. Proceedings of the third IEEE international information assurance workshop 2005, IEEE Press, College Park, Maryland, USA.
-
(2005)
Proceedings of the third IEEE international information assurance workshop
-
-
Yves, Y.1
Wouter, J.2
Frank, P.3
-
67
-
-
70549093057
-
Opportunities and threats: A security assessment of state e-government websites
-
Zhao J.J., Zhao S.Y. Opportunities and threats: A security assessment of state e-government websites. Government Information Quarterly 2010, 27:49-56.
-
(2010)
Government Information Quarterly
, vol.27
, pp. 49-56
-
-
Zhao, J.J.1
Zhao, S.Y.2
|