A comprehensive readiness assessment framework for identity theft safeguards in web-based electronic government systems
暂无分享,去创建一个
[1] Amir Hayat,et al. Proposed Framework for an Interoperable Electronic Identity Management System , 2006 .
[2] Paul Beynon-Davies,et al. Personal identity management and electronic government: The case of the national identity card in the UK , 2007, J. Enterp. Inf. Manag..
[3] Sebastian Clauß,et al. Identity management and its support of multilateral security , 2001, Comput. Networks.
[4] Ibrahim Kushchu,et al. Uses of Mobile Government in Developing Countries , 2004 .
[5] France Bélanger,et al. A framework for e-government: privacy implications , 2006, Bus. Process. Manag. J..
[6] Brendan Van Alsenoy,et al. Due processing of personal data in eGovernment? , 2008, Datenschutz und Datensicherheit - DuD.
[7] L. Jean Camp. Identity, authentication, and identifiers in digital government , 2003, Proceedings. International Symposium on Technology and Society, 2003. Crime Prevention, Security and Design. 2003..
[8] Jeffrey Roy. National identity and continental interoperablity: does Canada need a new identity card? , 2006 .
[9] L. Jean Camp,et al. Identity in Digital Government , 2004 .
[10] Peter Alterman. The US Federal PKI and the Federal Bridge Certification Authority , 2001, Comput. Networks.
[11] Milind Sathye,et al. Fraud in e-government transactions risks and remedies , 2004 .
[12] Stephen Mason. Validating identity for the electronic environment , 2004, Comput. Law Secur. Rev..
[13] M. Caloyannides,et al. US e-government authentication framework and programs , 2003 .
[14] Young B. Choi,et al. A quantification model using P3P in privacy control for telecommunications service management , 2005, Int. J. Serv. Stand..
[15] Abu Hassan,et al. IDENTITY THEFT: WHAT CAN WE LEARNED? , 2001 .
[16] Sharif As-Saber,et al. Information technology law and e-government: a developing country perspective , 2006 .
[17] A. Emigh,et al. Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures , 2005 .
[18] John A. Taylor,et al. Identity Management as Public Innovation: Looking beyond ID Cards and Authentication Systems , 2005 .