{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:40:10Z","timestamp":1763664010849,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030275228"},{"type":"electronic","value":"9783030275235"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-27523-5_16","type":"book-chapter","created":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T23:02:41Z","timestamp":1566169361000},"page":"221-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Designing an Effective Long-Term Identity Management Strategy for a Mature e-State"],"prefix":"10.1007","author":[{"given":"Silvia","family":"Lips","sequence":"first","affiliation":[]},{"given":"Krista","family":"Aas","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Pappel","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Draheim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,28]]},"reference":[{"key":"16_CR1","unstructured":"e-Estonia Briefing Centre Homepage. https:\/\/e-estonia.com\/solutions\/e-identity\/id-card\/. Accessed 21 Feb 2019"},{"key":"16_CR2","volume-title":"Digital Identity Management","author":"M Laurent","year":"2015","unstructured":"Laurent, M., Bouzefrane, S., Pomerol, J.: Digital Identity Management. ISTE Press, London (2015)"},{"key":"16_CR3","unstructured":"Identity Management and Identity Documents. White Paper 1.0. https:\/\/www.ria.ee\/sites\/default\/files\/content-editors\/EID\/valge-raamat-2018.pdf. Accessed 13 Mar 2019"},{"key":"16_CR4","unstructured":"Identity Documents Act. https:\/\/www.riigiteataja.ee\/en\/eli\/526042018001\/consolide. Accessed 13 Mar 2019"},{"key":"16_CR5","volume-title":"The Strategic Management of Information Systems","author":"J Peppard","year":"2016","unstructured":"Peppard, J., Ward, J.: The Strategic Management of Information Systems, 4th edn. Wiley, Hoboken (2016)","edition":"4"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Muldme, A., Pappel, I., Lauk, M., Draheim, D.: A survey on customer satisfaction in national electronic ID user support. In: Ter\u00e1n, L., Meier, A. (ed.) Piscataway 5th International Conference on eDemocracy & eGovernment (ICEDEG), Piscataway, NJ, Quito, pp. 31\u201337 (2018)","DOI":"10.1109\/ICEDEG.2018.8372374"},{"key":"16_CR7","first-page":"222","volume-title":"Procedia 26th CIRP Design Conference","author":"A Petersson","year":"2016","unstructured":"Petersson, A., Lundberg, J.: Applying action design research (ADR) to develop concept generation and selection methods. In: Wang, L., Kjellberg, T. (eds.) Procedia 26th CIRP Design Conference, vol. 50, pp. 222\u2013227. Elseiver, Amsterdam (2016)"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-319-70004-5_33","volume-title":"Future Data and Security Engineering","author":"V Tsap","year":"2017","unstructured":"Tsap, V., Pappel, I., Draheim, D.: Key success factors in introducing national e-identification systems. In: Dang, T.K., Wagner, R., K\u00fcng, J., Thoai, N., Takizawa, M., Neuhold, E.J. (eds.) FDSE 2017. LNCS, vol. 10646, pp. 455\u2013471. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70004-5_33"},{"key":"16_CR9","volume-title":"Making Sense of Change Management","author":"E Cameron","year":"2015","unstructured":"Cameron, E., Green, M.: Making Sense of Change Management, 4th edn. Kogan Page Limited, London (2015)","edition":"4"},{"key":"16_CR10","first-page":"34","volume-title":"11th International Conference on Theory and Practice of Electronic Governance, ICEGOV 2018","author":"K Paide","year":"2018","unstructured":"Paide, K., Pappel, I., Vainsalu, H., Draheim, D.: On the systematic exploitation of the Estonian data exchange layer X-road for strengthening public private partnerships. In: Kankanhalli, A., Ojo, A., Soares, D. (eds.) 11th International Conference on Theory and Practice of Electronic Governance, ICEGOV 2018, pp. 34\u201341. ACM Press, Galaway (2018)"},{"key":"16_CR11","unstructured":"Development Plans. https:\/\/www.valitsus.ee\/et\/eesmargid-tegevused\/arengukavad. Accessed 24 Feb 2019"},{"key":"16_CR12","unstructured":"Internal Security Development Plan. https:\/\/www.valitsus.ee\/sites\/default\/files\/contenteditors\/arengukavad\/taiendatud_siseturvalisuse_arengukava_2015-2020.pdf. Accessed 13 Mar 2019"},{"key":"16_CR13","unstructured":"Estonian Information Society Development Plan. https:\/\/www.mkm.ee\/sites\/default\/files\/elfinder\/article_files\/eesti_infouhiskonna_arengukava.pdf. Accessed 25 Feb 2019"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-030-02131-3_15","volume-title":"Challenges and Opportunities in the Digital Era","author":"M J\u00e4rvsoo","year":"2018","unstructured":"J\u00e4rvsoo, M., Norta, A., Tsap, V., Pappel, I., Draheim, D.: Implementation of information security in the EU information systems. In: Al-Sharhan, S.A., et al. (eds.) I3E 2018. LNCS, vol. 11195, pp. 150\u2013163. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-02131-3_15"},{"key":"16_CR15","unstructured":"Electronic Identification and Trust Services for Electronic Transactions Act. https:\/\/www.riigiteataja.ee\/en\/eli\/511012019010\/consolide. Accessed 30 Mar 2019"},{"key":"16_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-319-98349-3_5","volume-title":"Electronic Government and the Information Systems Perspective","author":"S Lips","year":"2018","unstructured":"Lips, S., Pappel, I., Tsap, V., Draheim, D.: Key factors in coping with large-scale security vulnerabilities in the eID field. In: K\u0151, A., Francesconi, E. (eds.) EGOVIS 2018. LNCS, vol. 11032, pp. 60\u201370. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98349-3_5"},{"key":"16_CR17","unstructured":"E-Eesti n\u00f5ukogu toetas ID-kaardi ja eidentiteedi 10 aasta arenguplaani. https:\/\/www.ria.ee\/et\/uudised\/e-eesti-noukogu-toetas-id-kaardi-ja-eidentiteedi-10-aasta-arenguplaani.html. Accessed 24 Feb 2019"},{"key":"16_CR18","unstructured":"CAB Forum Homepage. About the CA\/Browser Forum - CAB Forum. https:\/\/cabforum.org\/about-us\/. Accessed 13 Mar 2019"},{"key":"16_CR19","unstructured":"APMG-international: Effective Change Manager\u2019s Handbook - Essential guidance to the change management body of knowledge, 1st ed. Kogan Page Limited, London (2015)"}],"container-title":["Lecture Notes in Computer Science","Electronic Government and the Information Systems Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-27523-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T16:38:25Z","timestamp":1710347905000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-27523-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030275228","9783030275235"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-27523-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EGOVIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Electronic Government and the Information Systems Perspective","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Linz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"egovis2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/egovis2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mixed (single-blind and double-blind)","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfDriver","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"68% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}