600
Views
29
CrossRef citations to date
0
Altmetric
E-Government

Determining Key Factors in E-Government Information System Security

&

References

  • AS/NZS ISO/IEC 1779, 9 . 2001 . 2001: Information technology - Code of practice for information security management Standards, , Australia
  • AS/NZS ISO/IEC 17799 . 2004 . 2001/Amdt 1–2004: Information technology - Code of practice for information security management Standards, , Australia
  • AS/NZS 7799 . 2000 . 2000 - Information technology - Code of practice for information security management Standards, , Australia
  • AS/NZS 7799.2 . 2003 . 2003 - Information Security Management - Part 2: Specification for Information Security Management Systems Standards, , Australia
  • Backhouse , J. and Dhillon , G. 2001 . Current direction in IS security research: towards socio-organizational perspectives . Information Systems Journal , 11 : 127 – 153 .
  • Baird Jamieson , A. R. and Cerpa , N. 2002 . “ Development of a framework for risks and Security in B2C E-Business ” . In Towards the Knowledge Society: eCommerce, eBusiness and eGovernment , Edited by: Monteiro , J L , Swatman , P M C and Tavares , L V . 399 – 414 . Kluwer Academic Publishers .
  • Bell , G. 2001 . Information Security Risk and Assessment , 2001 UNC Charlotte Symposium on Information Security and Privacy, http://www.sis.uncc.edu/LIISP/slides01/Greg-Bell.pdf (Accessed 28 April 2005)
  • Blaikie , N. 2000 . Designing Social Research , Cambridge, UK : Polity .
  • BS 7799-2 . 2002 . 2002 : Information security management. Specification with guidance for use Standards, , Australia
  • Evans , N. 2003 . Information Security Guideline for NSW Government - Part 1 Information Security Risk Management . Office of Information and Communication Technology Sydney , http://www.oict.nsw.gov.au/pdf/4.4.16.IS1.pdf (Accessed 28 April 2005)
  • Frank , D. 2003 . Policy would secure users, transactions . Federal Computer Week, Falls Church, Jan 27 , 17 ( 2 ) : 10
  • Gartner . 2002 . Executive Presentation of Business Recovery Planning , New York State Forum . 02 Consulting, http://www.nysfirm.org/documents/ppt/bc_02/8–13GartnerBCP% 20Pres.ppt (Accessed 28 April 2005)
  • Kraemer , K. L. and Dedrick , J. 2000 . “ European E-Commerce Report ” . In Working Paper Center for Research on Information Technology and Organizations , Irvine : University of California . August 2000. http://www.crito.uci.edu/git/publications/pdf/european-e-commerce-report2.pdf (accessed 28 April 2005)
  • NSTISSC . 1999 . National Security Telecommunications and Information Systems Security Committee (NSTISSC) . NSTISSI No. 4009 National Information Systems Security (INFOSEC) Glossary , : 4
  • OICT . 2004 . Office of Information and Communications Technology - connect.NSW: an Internet Strategy for NSW , http://www.oict.nsw.gov.au/content/1.3.1.Imp _Frame_Summary.asp (Accessed 28 April 2005)
  • Ross , K. L. 2004 . Foundationalism and Hermeneutics , http://www.friesian.com/hermenut.htm (Accessed 28 April 2005)
  • Schmidt , R. , Lyytinen , K. , Keil , M. and Cule , P. 2001 . Identifying software project risks: An international Delphi Study , 17 ( 4 ) : 5 – 36 . Journal of Management Information Systems, Spring
  • Scott , R.W. 2003 . Planners need to plan for disaster , 18 – 20 . New York : Accounting Today . Jan 2003
  • Spinellis , D. , Kokolakis , S. and Gritzalis , S. 1999 . Security requirements, risks and recommendations for small enterprise and home-office environments . Information Management & Computer Security , 7 ( 3 ) : 121 – 128 .
  • Straub , D. W. and Welke , R. J. 1998 . Coping with systems risk: Security planning models for management decision-making . MIS Quarterly , 22 ( 4 ) : 441 – 469 . December 1998
  • Teo , H. H. , Wei , K. K. and Benbasat , I. 2003 . Predicting intention to adopt interorganizational linkages: An institutional perspective . Management Information Systems Quarterly , 27 ( 1 ) : 19 – 49 .
  • Worthington , J. 2005 . Flying blind . Risk Management , : 16 – 17 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.