| E-Government Procurement Implementation: Necessity of National Procurement Law |
jklh |
May 30, 2012 11:03:05 PM |
| INFORMATION SECURITY BEHAVIOR: FACTORS AND RESEARCH DIRECTIONS |
jklh |
May 8, 2012 6:00:39 PM |
| A systematic, tool-supported method for conducting literature reviews in information systems |
jklh |
May 4, 2012 5:57:12 PM |
| Exploring the Influences of Implementation Intention on Information Security Behaviors |
jklh |
May 4, 2012 5:57:12 PM |
| Attitudes toward online availability of US public records |
jklh |
May 4, 2012 5:57:12 PM |
| Collaborative Government to Employee (G2E): Issues and Challenges to E-Government |
jklh |
May 4, 2012 5:57:12 PM |
| Whose e-democracy? The democratic divide in American electoral campaigns |
jklh |
May 4, 2012 5:57:12 PM |
| Is Web 2.0 a threat to representative democracy? A deliberation through the Australian carbon tax debate |
jklh |
May 4, 2012 5:57:12 PM |
| A statistical analysis of the construction of the United Nations E-Government Development Index |
jklh |
May 4, 2012 5:57:12 PM |
| Gender and digital divide 2000–2008 in two low-income economies in Sub-Saharan Africa: Kenya and Somalia in official statistics |
jklh |
May 4, 2012 5:57:12 PM |