Rémy Février, Olivier Lasmoles & Marc Bidan. (2050) Les dirigeants de collectivités territoriales françaises confrontés à la gestion opérationnelle des cybermenaces : une approche typologique. Gestion et management public Pub. anticipées:3, pages 1-21.
Crossref
João Marco Silva, Luis Felipe M. Ramos, Diogo Ribeiro & Victor Fonte. (2023) A Worldwide Overview on the Information Security Posture of Online Public Services. SSRN Electronic Journal.
Crossref
Ismail Bile Hassan, Masrah Azrifah Azmi Murad, Ibrahim El-Shekeil & Jigang Liu. (2022) Extending the UTAUT2 Model with a Privacy Calculus Model to Enhance the Adoption of a Health Information Application in Malaysia. Informatics 9:2, pages 31.
Crossref
Eunjung Shin & Eric W. Welch. 2020. Open Government. Open Government
2295
2317
.
Mitja Dečman. 2020. Open Government. Open Government
1488
1507
.
Aji Supriyanto, Dwi Agus Diartono, Budi Hartono & Herny Februariyanti. (2019) Inclusive Security Models To Building E-Government Trust. Inclusive Security Models To Building E-Government Trust.
Chooi Shi Teoh, Ahmad Kamil Mahmood & Suhazimah Dzazali. (2018) Cyber Security Challenges in Organisations: A Case Study in Malaysia. Cyber Security Challenges in Organisations: A Case Study in Malaysia.
Cindy Zhiling Tu, Yufei Yuan, Norm Archer & Catherine E. Connelly. (2018) Strategic value alignment for information security management: a critical success factor analysis. Information & Computer Security 26:2, pages 150-170.
Crossref
Chia-Ping Yu, Chih-Ping Chu & Pin-Hui Lu. (2018) Applying a Security Management Mechanism to a System Development Lifecycle. International Journal of E-Adoption 10:1, pages 1-17.
Crossref
Ahmed AlKalbani, Hepu Deng, Booi Kam & Xiaojuan Zhang. (2017) Information Security Compliance in Organizations: An Institutional Perspective. Data and Information Management 1:2, pages 104-114.
Crossref
Gunjan Tomer, Gaurav Singh Chauhan & Prabin Kumar Panigrahi. (2016) Feasibility of m-governance in agriculture: insights from a multimodal study in rural India. Transforming Government: People, Process and Policy 10:3, pages 434-456.
Crossref
Sameera Mubarak. (2016) Developing a theory-based information security management framework for human service organizations. Journal of Information, Communication and Ethics in Society 14:3, pages 254-271.
Crossref
Lucio Lamberti, Michele Benedetti & Shan Chen. (2014) Benefits sought by citizens and channel attitudes for multichannel payment services: Evidence from Italy. Government Information Quarterly 31:4, pages 596-609.
Crossref
Claudia Mihaela Balan. (2014) E-government quality of data. E-government quality of data.
Claudio Russo, Carlo M. Ghezzi, Giulio Fiamengo & Michele Benedetti. (2014) Benefits Sought by Citizens in Multichannel e-government Payment Services: Evidence from Italy. Procedia - Social and Behavioral Sciences 109, pages 1261-1276.
Crossref
Rong Yi Chen & Xiu Fen Fu. (2013) Research of E-Government Security Plan System. Advanced Materials Research 756-759, pages 1580-1584.
Crossref
Huong Ha. 2013. Integrated Information and Computing Systems for Natural, Spatial, and Social Sciences. Integrated Information and Computing Systems for Natural, Spatial, and Social Sciences
74
95
.
Rahmath Safeena & Abdullah Kammani. 2013. Advances in Computing and Information Technology. Advances in Computing and Information Technology
67
76
.
Alok Mishra & Deepti Mishra. (2012) E-government. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 42:4, pages 23-37.
Crossref
Spyridoula Lakka, Teta Stamati & Draculis Martakos. 2012. Open Source Systems: Long-Term Sustainability. Open Source Systems: Long-Term Sustainability
292
297
.
Vishanth Weerakkody, Ramzi El‐Haddadeh & Shafi Al‐Shafi. (2011) Exploring the complexities of e‐government implementation and diffusion in a developing country. Journal of Enterprise Information Management 24:2, pages 172-196.
Crossref
Mahmud Akhter Shareef & Yogesh K. Dwivedi. 2011. Stakeholder Adoption of E-Government Services. Stakeholder Adoption of E-Government Services
27
85
.
J W Brady. (2011) Securing Health Care: Assessing Factors That Affect HIPAA Security Compliance in Academic Medical Centers. Securing Health Care: Assessing Factors That Affect HIPAA Security Compliance in Academic Medical Centers.
Chien-Chih Yu. 2009. Electronic Government. Electronic Government
364
375
.
Cyril E. Azenabor & Charles A. Shoniregun. (2008) Electronic government paradigm. Electronic government paradigm.
Stephen Smith, Rodger Jamieson & Donald Winchester. (2007) An Action Research Program to Improve Information Systems Security Compliance across Government Agencies. An Action Research Program to Improve Information Systems Security Compliance across Government Agencies.