600
Views
29
CrossRef citations to date
0
Altmetric
E-Government

Determining Key Factors in E-Government Information System Security

&

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (3)

Bernd W. Wirtz & Jan C. Weyerer. (2017) Cyberterrorism and Cyber Attacks in the Public Sector: How Public Administration Copes with Digital Threats. International Journal of Public Administration 40:13, pages 1085-1100.
Read now
Frederik Mijnhardt, Thijs Baars & Marco Spruit. (2016) Organizational Characteristics Influencing SME Information Security Maturity. Journal of Computer Information Systems 56:2, pages 106-115.
Read now
Jaehun Joo & Anat Hovav. (2016) The influence of information security on the adoption of web-based integrated information systems: an e-government study in Peru. Information Technology for Development 22:1, pages 94-116.
Read now

Articles from other publishers (26)

Rémy Février, Olivier Lasmoles & Marc Bidan. (2050) Les dirigeants de collectivités territoriales françaises confrontés à la gestion opérationnelle des cybermenaces : une approche typologique. Gestion et management public Pub. anticipées:3, pages 1-21.
Crossref
João Marco Silva, Luis Felipe M. Ramos, Diogo Ribeiro & Victor Fonte. (2023) A Worldwide Overview on the Information Security Posture of Online Public Services. SSRN Electronic Journal.
Crossref
Ismail Bile Hassan, Masrah Azrifah Azmi Murad, Ibrahim El-Shekeil & Jigang Liu. (2022) Extending the UTAUT2 Model with a Privacy Calculus Model to Enhance the Adoption of a Health Information Application in Malaysia. Informatics 9:2, pages 31.
Crossref
Eunjung Shin & Eric W. Welch. 2020. Open Government. Open Government 2295 2317 .
Mitja Dečman. 2020. Open Government. Open Government 1488 1507 .
Aji Supriyanto, Dwi Agus Diartono, Budi Hartono & Herny Februariyanti. (2019) Inclusive Security Models To Building E-Government Trust. Inclusive Security Models To Building E-Government Trust.
Chooi Shi Teoh, Ahmad Kamil Mahmood & Suhazimah Dzazali. (2018) Cyber Security Challenges in Organisations: A Case Study in Malaysia. Cyber Security Challenges in Organisations: A Case Study in Malaysia.
Cindy Zhiling Tu, Yufei Yuan, Norm Archer & Catherine E. Connelly. (2018) Strategic value alignment for information security management: a critical success factor analysis. Information & Computer Security 26:2, pages 150-170.
Crossref
Chia-Ping Yu, Chih-Ping Chu & Pin-Hui Lu. (2018) Applying a Security Management Mechanism to a System Development Lifecycle. International Journal of E-Adoption 10:1, pages 1-17.
Crossref
Ahmed AlKalbani, Hepu Deng, Booi Kam & Xiaojuan Zhang. (2017) Information Security Compliance in Organizations: An Institutional Perspective. Data and Information Management 1:2, pages 104-114.
Crossref
Gunjan Tomer, Gaurav Singh Chauhan & Prabin Kumar Panigrahi. (2016) Feasibility of m-governance in agriculture: insights from a multimodal study in rural India. Transforming Government: People, Process and Policy 10:3, pages 434-456.
Crossref
Sameera Mubarak. (2016) Developing a theory-based information security management framework for human service organizations. Journal of Information, Communication and Ethics in Society 14:3, pages 254-271.
Crossref
Lucio Lamberti, Michele Benedetti & Shan Chen. (2014) Benefits sought by citizens and channel attitudes for multichannel payment services: Evidence from Italy. Government Information Quarterly 31:4, pages 596-609.
Crossref
Claudia Mihaela Balan. (2014) E-government quality of data. E-government quality of data.
Claudio Russo, Carlo M. Ghezzi, Giulio Fiamengo & Michele Benedetti. (2014) Benefits Sought by Citizens in Multichannel e-government Payment Services: Evidence from Italy. Procedia - Social and Behavioral Sciences 109, pages 1261-1276.
Crossref
Rong Yi Chen & Xiu Fen Fu. (2013) Research of E-Government Security Plan System. Advanced Materials Research 756-759, pages 1580-1584.
Crossref
Huong Ha. 2013. Integrated Information and Computing Systems for Natural, Spatial, and Social Sciences. Integrated Information and Computing Systems for Natural, Spatial, and Social Sciences 74 95 .
Rahmath Safeena & Abdullah Kammani. 2013. Advances in Computing and Information Technology. Advances in Computing and Information Technology 67 76 .
Alok Mishra & Deepti Mishra. (2012) E-government. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 42:4, pages 23-37.
Crossref
Spyridoula Lakka, Teta Stamati & Draculis Martakos. 2012. Open Source Systems: Long-Term Sustainability. Open Source Systems: Long-Term Sustainability 292 297 .
Vishanth Weerakkody, Ramzi El‐Haddadeh & Shafi Al‐Shafi. (2011) Exploring the complexities of e‐government implementation and diffusion in a developing country. Journal of Enterprise Information Management 24:2, pages 172-196.
Crossref
Mahmud Akhter Shareef & Yogesh K. Dwivedi. 2011. Stakeholder Adoption of E-Government Services. Stakeholder Adoption of E-Government Services 27 85 .
J W Brady. (2011) Securing Health Care: Assessing Factors That Affect HIPAA Security Compliance in Academic Medical Centers. Securing Health Care: Assessing Factors That Affect HIPAA Security Compliance in Academic Medical Centers.
Chien-Chih Yu. 2009. Electronic Government. Electronic Government 364 375 .
Cyril E. Azenabor & Charles A. Shoniregun. (2008) Electronic government paradigm. Electronic government paradigm.
Stephen Smith, Rodger Jamieson & Donald Winchester. (2007) An Action Research Program to Improve Information Systems Security Compliance across Government Agencies. An Action Research Program to Improve Information Systems Security Compliance across Government Agencies.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.