Personal identity management and electronic government: The case of the national identity card in the UK
暂无分享,去创建一个
[1] Jeffrey W. Seifert. Data mining and the search for security: Challenges for connecting the dots and databases , 2004, Gov. Inf. Q..
[2] John A. Taylor,et al. PUBLIC ADMINISTRATION AND THE INFORMATION POLITY , 1991 .
[3] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[4] Paul Beynon-Davies,et al. Constructing electronic government: the case of the UK inland revenue , 2005, Int. J. Inf. Manag..
[5] Roger A. Clarke,et al. Information technology and dataveillance , 1988, CACM.
[6] Stephen Saxby. Editorial: Privacy and Data Sharing: The Way forward for Public Services? , 2002, Comput. Law Secur. Rev..
[7] Vasilios Zorkadis,et al. On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements , 2004, Inf. Manag. Comput. Secur..
[8] Paul Beynon-Davies. A case study in electronic democracy: Electronic voting in the UK , 2004 .
[9] P. Beynon-Davies. E-Business , 2004 .
[10] C. Parolini. The Value Net: A Tool for Competitive Strategy , 1999 .
[11] Paul Beynon-Davies,et al. Evaluating electronic local government in the UK , 2003, J. Inf. Technol..
[12] Rob Kling,et al. The Web of Computing: Computer Technology as Social Organization , 1982, Adv. Comput..
[13] Grahame F. Thompson. Between Hierarchies and Markets: The Logic and Limits of Network Forms of Organization , 2003 .
[14] D. Osborne,et al. Reinventing Government: How the En-trepreneurial Spirit is Transforming the Public Sector , 1992 .
[15] H Margetts,et al. Electronic Government: Method or Madness? , 2003 .
[16] M. Castells. The rise of the network society , 1996 .
[17] Barrie Gunter,et al. The prospects for e-government on digital television , 2004, Aslib Proc..
[18] M. Porter. Competitive Advantage: Creating and Sustaining Superior Performance , 1985 .
[19] Perri,et al. On the Cards: Privacy, Identity and Trust in the Age of Smart Technologies , 1996 .
[20] Phillip J. Windley. Digital identity , 2005 .
[21] Edgar A. Whitley,et al. The identity project: an assessment of the UK Identity Cards Bill and its implications , 2005 .
[22] D. Burnham. The rise of the computer state , 1983 .
[23] Peter Checkland,et al. Soft Systems Methodology: a 30-year retrospective , 1999 .
[24] C. K. Ogden,et al. The Meaning of Meaning , 1923 .
[25] Shoshana Zuboff,et al. In the Age of the Smart Machine: The Future of Work and Power , 1989 .
[26] Roger Clarke,et al. Human Identification in Information Systems , 1994 .
[27] T. P. Hughes,et al. The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology , 1989 .
[28] Richard M. Nunno. Electronic signatures: technology developments and legislative issues , 2000, Gov. Inf. Q..
[29] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[30] L. Jean Camp,et al. Digital identity , 2004, IEEE Technology and Society Magazine.
[31] Lynda M. Applegate,et al. Corporate information strategy and management , 2003 .
[32] Leslie P. Willcocks,et al. Risk assessment and information systems , 1993, ECIS.
[33] George Kuk,et al. The digital divide and the quality of electronic service delivery in local government in the United Kingdom , 2003, Gov. Inf. Q..
[34] Richard T. Vidgen,et al. Interactive E-Government: Evaluating the Web Site of the UK Inland Revenue , 2004, J. Electron. Commer. Organ..
[35] David C. Yen,et al. Biometric authentication: assuring access to information , 2002, Inf. Manag. Comput. Secur..
[36] R. Stamper. Information in business and administrative systems , 1973 .
[37] Roger A. Clarke. Just another piece of plastic in your wallet: the `Australian card' scheme , 1988, CSOC.
[38] Eleanor Burt,et al. Not-for-profits in the democratic polity , 2001, CACM.