Author of the publication

Secure e-Government Services: A Comparative Analysis of e-Government Maturity Models for the Developing Regions-The Need for Security Services.

, , and . Int. J. Electron. Gov. Res., 8 (1): 1-25 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The SBC Model as a Conceptual Framework for Reporting IT Crimes.. Security and Control of Information Technology in Society, volume A-43 of IFIP Transactions, page 207-226. North-Holland, (1993)Teaching Enterprise Modeling Based on Multi-media Simulation: A Pragmatic Approach., , , and . MCETECH, volume 209 of Lecture Notes in Business Information Processing, page 239-254. Springer, (2015)Two Case Studies in Using Chatbots for Security Training., , and . World Conference on Information Security Education, volume 406 of IFIP Advances in Information and Communication Technology, page 265-272. Springer, (2009)Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models., , and . ISSA, ISSA, Pretoria, South Africa, (2011)Cybernetic analysis of the 12th U.S. National Computer Security Conference.. Comput. Secur., 10 (3): 228-235 (1991)Beyond Training and Awareness: From Security Culture to Security Risk Management., and . STPIS@CAiSE, volume 2107 of CEUR Workshop Proceedings, page 71-86. CEUR-WS.org, (2018)A Framework for Synchronizing Human Behavior, Processes and Support Systems Using a Socio-technical Approach., and . BMMDS/EMMSAD, volume 175 of Lecture Notes in Business Information Processing, page 109-123. Springer, (2014)The Impact of Business-IT Alignment on Information Security Process., , and . HCI (18), volume 8527 of Lecture Notes in Computer Science, page 25-36. Springer, (2014)ST(CS)2 - Featuring socio-technical cyber security warning systems., and . CyberSec, page 312-316. IEEE, (2012)A Framework for Evaluation of Information Systems Security., , and . ISSA, page 1-11. ISSA, Pretoria, South Africa, (2005)