e-Infrastructure and e-Services for Developing Countries
暂无分享,去创建一个
[1] David F. Larcker,et al. Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics: , 1981 .
[2] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[3] Luis Guijarro,et al. Interoperability frameworks and enterprise architectures in e-government initiatives in Europe and the United States , 2007, Gov. Inf. Q..
[4] Gurvirender P. Tejay,et al. Building a better password: The role of cognitive load in information security training , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.
[5] Mikko T. Siponen,et al. A conceptual foundation for organizational information security awareness , 2000, Inf. Manag. Comput. Secur..
[6] Byoungsoo Kim. The diffusion of mobile data services and applications: Exploring the role of habit and its antecedents , 2012 .
[7] Rashid N. Khan,et al. Business Process Management: A Practical Guide , 2004 .
[8] William D. Wunderle,et al. Through the Lens of Cultural Awareness: A Primer for US Armed Forces Deploying to Arab and Middle Eastern Countries , 2006 .
[9] Elske Ammenwerth,et al. Evaluation of health information systems - problems and challenges , 2003, Int. J. Medical Informatics.
[10] Sven C. Voelpel,et al. Managing knowledge sharing in China: the case of Siemens ShareNet , 2005, J. Knowl. Manag..
[11] John A. Zachman,et al. A Framework for Information Systems Architecture , 1987, IBM Syst. J..
[12] Elmarie Kritzinger,et al. Cyber security for home users: A new way of protection through awareness enforcement , 2010, Comput. Secur..
[13] Naoufel Kraiem,et al. Developing a service oriented E-government architecture towards achieving E-government interoperability , 2014 .
[14] P. Seibert,et al. A checklist to facilitate cultural awareness and sensitivity , 2002, Journal of medical ethics.
[15] Harry Bouwman,et al. An organizational competence model for innovation intermediaries , 2014 .
[16] P. Drucker. The discipline of innovation. , 1998, Harvard business review.
[17] Sean B. Maynard,et al. Embedding Information Security Culture Emerging Concerns and Challenges , 2010, PACIS.
[18] Sanjiva Weerawarana,et al. Unraveling the Web services web: an introduction to SOAP, WSDL, and UDDI , 2002, IEEE Internet Computing.
[19] Joon Koh,et al. A Comparison of Online Trust Building Factors between Potential Customers and Repeat Customers , 2004, J. Assoc. Inf. Syst..
[20] E. Sadler‐Smith,et al. Knowledge‐based services and the Internet: an investigation of small UK accountancy practices , 2002 .
[21] Stevan Mrdalj,et al. A comparison of enterprise architecture frameworks , 2006 .
[22] Stephen Flowerday,et al. An assessment of the role of cultural factors in information security awareness , 2011, 2011 Information Security for South Africa.
[23] Yolanda Polo-Redondo,et al. Antecedents and consequences of e-business use for European retailers , 2012, Internet Res..
[24] Pavel Shvaiko,et al. E-Government Interoperability Framework: A Case Study in a Developing Country , 2010 .
[25] Shumaila Y. Yousafzai,et al. Strategies for Building and Communicating Trust in Electronic Banking: A Field Experiment , 2005 .
[26] Marcus A. Butavicius,et al. Human Factors and Information Security: Individual, Culture and Security Environment , 2010 .
[27] Barrack Okello,et al. EFFECT OF STAFF TRAINING ON LEVEL OF COMPLIANCE TO PUBLIC PROCUREMENT SYSTEM IN PARASTATALS IN KENYA , 2015 .
[28] Thilini Ariyachandra,et al. Critical Success Factors in Business Performance Management—Striving for Success , 2008, Inf. Syst. Manag..
[29] Stephanie D. Hight. The importance of a security , education , training and awareness program ( November 2005 ) , 2005 .
[30] Kevin F. McCrohan,et al. Influence of Awareness and Training on Cyber Security , 2010 .
[31] Rudolf R. Sinkovics,et al. The Use of Partial Least Squares Path Modeling in International Marketing , 2009 .
[32] Philip E. T. Lewis,et al. Research Methods for Business Students (5th edn) , 2007 .
[33] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[34] Christine Legner,et al. EA frameworks, modelling and tools , 2012 .
[35] Grace A. Lewis,et al. Interoperability in the e-Government Context , 2012 .
[36] Brian H. Cameron,et al. Analyzing the Current Trends in Enterprise Architecture Frameworks , 2013 .
[37] Jan H. Kroeze,et al. The Role of ICT within Small and Medium Enterprises in Gauteng. , 2011 .
[38] Marios Koufaris,et al. The development of initial trust in an online company by new customers , 2004, Inf. Manag..
[39] Saudi Arabia,et al. Information Security Awareness and Culture , 2012 .
[40] F. Aloul. The Need for Effective Information Security Awareness , 2011 .
[41] Tao Zhou,et al. An Empirical Examination of Initial Trust in Mobile Banking , 2011, Internet Res..
[42] e-Government Implementation in Nepal , 2007 .