Skip to Main Content
Keywords: Government
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Journal Articles
Information and Computer Security (2025) 33 (4): 547–572.
Published: 26 February 2025
..., 2021 ; Florencio and Herley, 2007). Password-based authentication systems have been ingrained in most organizational and governmental IT infrastructures, mainly because of their long history of use and ease of integration with existing systems (Imamaliyev and Khudoykulov, 2021). However, its...
Journal Articles
Information Management & Computer Security (2008) 16 (3): 235–250.
Published: 18 July 2008
...Stephen M. Mutula Purpose The purpose of this paper is to compare the e‐government status of sub‐Saharan African countries with developed and transitional countries. Design/methodology/approach The paper is based on an analysis of eRepublic.org web directory and desk research. Besides...
Journal Articles
Information Management & Computer Security (1997) 5 (3): 111–118.
Published: 01 August 1997
... . 13 Rand , Information War and Cyberspace Security , Rand Research Review , Vol XIX No. 2, Fall 1995. 14 Deutch , J.M. , DCI Testimony to the US Senate Committee on Governmental Affairs; Permanent Subcommittee on Investigations , 25 June 1996, at http://www.odci.gov/cia...
Journal Articles
Information Management & Computer Security (1994) 2 (1): 4–11.
Published: 01 March 1994
... a linkage between socioeconomic factors and information technology programs. © MCB UP Limited 1994 Analytical hierarchy process Government Information technology Policy Quality function deployment Social economics Strategic industries In this article, we present a strategic model...

or Create an Account

Close Modal
Close Modal