[1] | Alfawaz, S., May, L. J., and Mohannak, K. (2008). E-government Security in Developing Countries: A Managerial Conceptual Framework. International Research Society for Public Management Conference, 26-28 March 2008, Queensland University of Technology, Brisbane, Australia. |
[2] | AL-Qaisoum, A. M. A. (2009). Assessing of E-government Readiness in the Kingdom of Saudi Arabia, unpublished MSC Thesis, Arabian Gulf University, Bahrain. |
[3] | AL-Shehry, A., Rogerson, S., Fairweather, N. B., and Prior, M. (2006). The Motivations for Change Towards E-government Adoption: Case Studies from Saudi Arabia. Retrieved 3rd January 2014, fromwww.iseing.org/egov/eGOV06/Accepted%20Papers/604/CRC/eGOV06-604%20CRC.pdf. |
[4] | Colesca, S. E. (2009). Understanding Trust in E-government. Engineering Economics, 3, 7-15. Retrieved January 2nd 2014, fromhttp://www.ktu.edu/lt/mokslas/zurnalai/inzeko/63/1392-2758-2009-3-63-07.pdf |
[5] | Elssied, N. O. F., Ibrahim, O., A. Alaziz, A. A., and Yousif, A. (2011). Review Paper: Security in E-government Using Fuzzy Methods. International Journal of Advanced Science and Technology, 37, 99-112. |
[6] | Hair, J., Anderson, R., Tatham, R. and Black, W., (1998). Multivariate Data Analysis. 5th ed., Upper Saddle River, NJ: Prentice-Hall. |
[7] | Hox, L. L. and Boeije, H. R. (2005). Data Collection, Primary vs. Secondary. Social management, 1, 593-599. |
[8] | Karokola, G. and Yngstrom, L. (2009). Discussing E-government Maturity Models for Developing World – Security View. Proceedings of ISSA Conference, University of Johannesburg, 6-8 July 2009, Johannesburg, South Africa. |
[9] | Kurose, J. F. and Ross, K. W. (2005). Computer Networking: A Top-Down Approach Featuring the Internet. 3rd ed. Institute Eurecom, France. |
[10] | Malhotra, N. K. (2006). Questionnaire Design and Scale Development, in the Handbook of Marketing Research: Uses, Misuses, and Future Advances, R. Grover and M. Vriens, eds. Thousand Oaks, CA, USA: SAGE Publications, 83-94. |
[11] | Moen, V., Klingsheim, A. N., Simonsen, K. I. F., and Hole, K. J. (2007). Vulnerabilities in E-governments. Retrieved 9th January 2014, from http://www.nowires.org/Papers-PDF/ ICGeS_egov.pdf |
[12] | Muthanna, Y. M. A. (2009). Assessment of Information Security Risk Management in Enhancing Information Security Network _ Applied Study: Bahrain Government Data Network, unpublished MSC Thesis, Arabian Gulf University, Bahrain. |
[13] | Panda, P., Sahu, G. P. and Gupta, P. (2010). Promoting Transparency and Efficiency in Public Procurement: E-Procurement Initiatives by Government of India. 7th International Conference on E-government (ICEG) 2010, 22-24 April 2010, IIM Banglore, India. |
[14] | Saha, S., Bhattacharyya, D., Kim, T. H., and Bandyopadhyay, S. K. (2010). Model Based Threat and Vulnerability Analysis of E-Governance Systems. Science and Technology, 3(2), 7-22. |
[15] | Saint Corporation (2009) Saint Corporation. (2009). Integrated Network Vulnerability Scanning and Penetration Testing. USA. Retrieved 3rd January 2014, from http://www.saintcorporation.com/resources/SAINT_integrated_pen_testing.html |
[16] | Scarfone, K. and Mell, P. (2010). The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities. USA. |
[17] | Schneier, B. (2005). The failure of two-factor Authentication. Retrieved 10th March 2014, fromwww.schneier.com/blog/archives/2005/03/thefailureof.htm |
[18] | Schwester, R. W. (2009(. Examining the Barriers to E-government Adoption. Journal of E-government, 7(1), 113-122. |
[19] | Syamsuddin, I. and Hwang, J. (2010). A New Fuzzy MCDM Framework to Evaluate E-government Security Strategy. IEEE 4th International Conference on Intelligence and Security Informatics, Hellenic American University, 9-11 August 2010, Athens, Greece. |
[20] | United Nations Department of Economic and Social Affairs (2007). Managing knowledge to build trust in government. 1st ed. United Nations Publication No.: ST/ESA/PAD/SER.E/ 118, NY, USA. |
[21] | Upadhyaya, P., Shakya, S. and Pokharel, M. (2012). Information Security Framework for E-government Implementation in Nepal. Journal of Emerging Trends in Computing and Information Sciences, 3(7), 1074-1078. |
[22] | Williams, C. (2007). Research Methods. Business & Economic Research, 5(3), 65-72. |
[23] | Wong, M. S., Hideki, N., and George, P. (2011). The Use of Importance Performance Analysis (IPA) in Evaluating Japan’s E-government Services. Theoretical and Applied Electronic Commerce Research, 6(2), 17- 30. |
[24] | Zhao, J. J., Truell, A. D., Alexander, M. W., and Davis, R. (2008). A vulnerability Audit of the U.S. state E-government Network Systems. Journal of Information Systems, 9(2), 8-13. |