

Author: Becker Shirley Ann
Publisher: Inderscience Publishers
ISSN: 1740-7494
Source: Electronic Government, an International Journal, Vol.2, Iss.3, 2005-09, pp. : 334-352
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


By McRobb Steve Stahl Bernd Carsten
International Journal of Information Technology and Management, Vol. 6, Iss. 2-3, 2007-06 ,pp. :




Authentication, Privacy, and the Federal E-Government
By Holden Stephen Millett Lynette
The Information Society, Vol. 21, Iss. 5, 2005-11 ,pp. :

