Information Systems Security Audits in Cameroon's Public Administration
Abstract
References
Index Terms
- Information Systems Security Audits in Cameroon's Public Administration
Recommendations
Public Key Infrastructure Deployment in Cameroon's Public Administration
EGOSE '14: Proceedings of the 2014 Conference on Electronic Governance and Open Society: Challenges in EurasiaGovernments have long played an authoritative role in ensuring citizen security and identity in the physical world, and are now faced with demands to establish digital security models in order to support e-government initiatives.
Strong credentials ...
Public Administration and Information and Communication Technologies: The Case of the Greater Bangalore Municipal Corporation
This article critically examines the role of Information and Communication Technologies (ICTs) in governmental reform processes in development through a case study of the Greater Bangalore Municipal Corporation. The study explores the increasing use of ...
Public Works and Infrastructure: Improvement Initiative for Federal Government in Mexico
dg.o '16: Proceedings of the 17th International Digital Government Research Conference on Digital Government ResearchThe Ministry of Communications and Transportation of the Federal Government in Mexico adopted the principles of the Strategy of Opening Government data. So in this poster we describe "Follow Public Works and Infrastructure", an initiative for Public ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 178Total Downloads
- Downloads (Last 12 months)8
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in