Towards a Secure Maturity Model for Protecting e-Government Services in Tanzania: A Stakeholders View
暂无分享,去创建一个
[1] M. Tan,et al. An Investigation of e‐Government Services in China , 2013, Electron. J. Inf. Syst. Dev. Ctries..
[2] Samir Chatterjee,et al. A Design Science Research Methodology for Information Systems Research , 2008 .
[3] Stewart Kowalski,et al. Evaluating a Framework for Securing E-Government Services -- A Case of Tanzania , 2013, 2013 46th Hawaii International Conference on System Sciences.
[4] Jungwoo Lee,et al. Developing fully functional E-government: A four stage model , 2001, Gov. Inf. Q..
[5] Louise Yngström,et al. Discussing E-Government Maturity Models for the Developing World - Security View , 2009, ISSA.
[6] Maria Wimmer,et al. A holistic approach for providing security solutions in e-government , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[7] Øystein Sæbø. E-government in Tanzania: Current Status and Future Challenges , 2012, EGOV.
[8] B. Hafiz,et al. Confirmatory factor analysis (CFA) of first order factor measurement model-ICT empowerment in Nigeria , 2013 .
[9] Nugi Nkwe,et al. E-Government: Challenges and Opportunities in Botswana , 2012 .
[10] Irina Zlotnikova,et al. Current Status of e-Government Services in Tanzania: A Security Perspective , 2014 .
[11] E. Guba. Criteria for assessing the trustworthiness of naturalistic inquiries , 1981 .
[12] Mohamed D. Waziri,et al. A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania , 2014 .
[13] Authors' Biographies , 2005 .
[14] Yuan Long,et al. Synthesizing e-government stage models - a meta-synthesis based on meta-ethnography approach , 2005, Ind. Manag. Data Syst..
[15] H. Sol,et al. Exploring issues underlying citizen adoption of eGovernment initiatives in developing countries: The case of Tanzania , 2010 .
[16] D. West. E‐Government and the Transformation of Service Delivery and Citizen Attitudes , 2004 .
[17] Viswanath Venkatesh,et al. Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..
[18] Abdoullah Fath-Allah and Laila Cheikhi and Rafa E. Al-Qutais Idri,et al. e-Government maturity models: a comparative study , 2014 .
[19] L. Krefting. Rigor in qualitative research: the assessment of trustworthiness. , 1991, The American journal of occupational therapy : official publication of the American Occupational Therapy Association.
[20] Maria Wimmer,et al. E-government: aspects of security on different layers , 2001, 12th International Workshop on Database and Expert Systems Applications.