{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:17:17Z","timestamp":1742948237960,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031682100"},{"type":"electronic","value":"9783031682117"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-68211-7_8","type":"book-chapter","created":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T10:02:28Z","timestamp":1723629748000},"page":"88-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Assessment of\u00a0the\u00a0eID Ecosystem as\u00a0a\u00a0Part of\u00a0the\u00a0State\u2019s Critical Infrastructure: The Case of\u00a0Estonia"],"prefix":"10.1007","author":[{"given":"Karolina","family":"Bejussova","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7352-5965","authenticated-orcid":false,"given":"Silvia","family":"Lips","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2715-6219","authenticated-orcid":false,"given":"Rozha K.","family":"Ahmed","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3376-7489","authenticated-orcid":false,"given":"Dirk","family":"Draheim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,15]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Asgarkhani, M.: Digital government and its effectiveness in public management reform: a local government perspective. Public Manage. Rev. 7(3), 465\u2013487 (2005)","DOI":"10.1080\/14719030500181227"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Beduschi, A.: Rethinking digital identity for post-COVID-19 societies: data privacy and human rights considerations. Data Policy 3, e15 (2021)","DOI":"10.1017\/dap.2021.15"},{"key":"8_CR3","doi-asserted-by":"publisher","unstructured":"Bharosa, N., Lips, S., Draheim, D.: Making e-government work: learning from the Netherlands and Estonia. In: Hofmann, S., Cs\u00e1ki, C., Edelmann, N., Lampoltshammer, T., Melin, U., Parycek, P., Schwabe, G., Tambouris, E. (eds.) ePart 2020. LNCS, vol. 12220, pp. 41\u201353. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58141-1_4","DOI":"10.1007\/978-3-030-58141-1_4"},{"issue":"2","key":"8_CR4","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Q. Res. Psychol. 3(2), 77\u2013101 (2006)","journal-title":"Q. Res. Psychol."},{"key":"8_CR5","unstructured":"Camp, L.: Identity, authentication, and identifiers in digital government. In: Proceedings of International Symposium on Technology and Society, 2003. Crime Prevention, Security and Design (2003)"},{"key":"8_CR6","unstructured":"Council of the European Union: Council Directive 2008\/114\/EC. Special edition in Croatian (2008)"},{"key":"8_CR7","unstructured":"Creswell, J.W., Poth, C.N.: Qualitative Inquiry and Research Design: Choosing Among Five Approaches. Sage, Thousand Oaks (2007)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-662-63519-3_8","volume-title":"Transactions on Large-Scale Data- and Knowledge-Centered Systems XLVIII","author":"D Draheim","year":"2021","unstructured":"Draheim, D., Krimmer, R., Tammet, T.: On state-level architecture of digital government ecosystems: from ICT-driven to data-centric. In: Hameurlain, A., Tjoa, A.M. (eds.) Transactions on Large-Scale Data- and Knowledge-Centered Systems XLVIII. LNCS, vol. 12670, pp. 165\u2013195. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-63519-3_8"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Fekete, A.: Common criteria for the assessment of critical infrastructures. Int. J. Disaster Risk Sci. 2(1) (2012)","DOI":"10.1007\/s13753-011-0002-y"},{"key":"8_CR10","unstructured":"Harrison, H., Birks, M., Franklin, R., Mills, J.: Case study research: Foundations and methodological orientations. In: Forum: Qualitative Social Research, vol. 18, no. 1 (2017)"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Leitner, B., M\u00f4cov\u00e1, L., Hromada, M.: A new approach to identification of critical elements in railway infrastructure. Procedia Eng. 187, 143\u2013149 (2017)","DOI":"10.1016\/j.proeng.2017.04.360"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-319-98349-3_5","volume-title":"Electronic Government and the Information Systems Perspective","author":"S Lips","year":"2018","unstructured":"Lips, S., Pappel, I., Tsap, V., Draheim, D.: Key factors in coping with large-scale security vulnerabilities in the eID field. In: K\u0151, A., Francesconi, E. (eds.) EGOVIS 2018. LNCS, vol. 11032, pp. 60\u201370. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98349-3_5"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-030-27523-5_16","volume-title":"Electronic Government and the Information Systems Perspective","author":"S Lips","year":"2019","unstructured":"Lips, S., Aas, K., Pappel, I., Draheim, D.: Designing an effective long-term identity management strategy for a mature e-state. In: K\u0151, A., Francesconi, E., Anderst-Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) EGOVIS 2019. LNCS, vol. 11709, pp. 221\u2013234. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-27523-5_16"},{"key":"8_CR14","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-030-67238-6_6","volume-title":"Electronic Governance and Open Society: Challenges in Eurasia","author":"S Lips","year":"2020","unstructured":"Lips, S., Bharosa, N., Draheim, D.: eIDAS implementation challenges: the case of Estonia and the Netherlands. In: Chugunov, A., Khodachek, I., Misnikov, Y., Trutnev, D. (eds.) EGOSE 2020. CCIS, vol. 1349, pp. 75\u201389. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-67238-6_6"},{"issue":"6","key":"8_CR15","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1007\/s10796-022-10363-5","volume":"25","author":"S Lips","year":"2023","unstructured":"Lips, S., Tsap, V., Bharosa, N., Krimmer, R., Tammet, T., Draheim, D.: Management of national eID infrastructure as a state-critical asset and public-private partnership: Learning from the case of Estonia. Inf. Syst. Front. 25(6), 2439\u20132456 (2023)","journal-title":"Inf. Syst. Front."},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Mir, U., Kar, A., Dwivedi, Y., Gupta, M., Sharma, R.: Realizing digital identity in government: prioritizing design and implementation objectives for Aadhaar in India. Govern. Inf. Q. 37(2), 101442 (2020)","DOI":"10.1016\/j.giq.2019.101442"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-319-70290-2_11","volume-title":"Secure IT Systems","author":"D Morgan","year":"2017","unstructured":"Morgan, D., Parsovs, A.: Using the Estonian electronic identity card for\u00a0authentication to a machine. In: Lipmaa, H., Mitrokotsa, A., Matulevi\u010dius, R. (eds.) NordSec 2017. LNCS, vol. 10674, pp. 175\u2013191. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70290-2_11"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Newbill, C.: efining critical infrastructure for a global application. Indiana J. Global Legal Stud. 26(2), 761 (2019)","DOI":"10.2979\/indjglolegstu.26.2.0761"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Novotny, P., Janosikova, M.: Designating regional elements system in a critical infrastructure system in the context of the czech republic. Systems 8(2), 13 (2020)","DOI":"10.3390\/systems8020013"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"OECD: good governance for critical infrastructure resilience, OECD reviews of risk management policies (2019). https:\/\/doi.org\/10.1787\/02f0e5a0-en","DOI":"10.1787\/02f0e5a0-en"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Parsovs, A.: Practical issues with TLS client certificate authentication. Cryptology ePrint Archive (2013)","DOI":"10.14722\/ndss.2014.23036"},{"key":"8_CR22","unstructured":"Parsovs, A.: Solving the Estonian ID card crisis: the legal issues. In: Proceedings of 17th International Conference on Information Systems for Crisis Response and Management (2020)"},{"issue":"1","key":"8_CR23","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.energy.2011.09.025","volume":"42","author":"C Popescu","year":"2012","unstructured":"Popescu, C., Simion, C.: A method for defining critical infrastructures. Energy 42(1), 32\u201334 (2012)","journal-title":"Energy"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Rasouli, H., Valmohammadi, C., Azad, N., Abbaspour\u00a0Esfeden, G.: Proposing a digital identity management framework: a mixed-method approach. Concurrency Comput. 33(17), e6271 (2021)","DOI":"10.1002\/cpe.6271"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Rehak, D.: Assessing and strengthening organisational resilience in a critical infrastructure system: case study of the Slovak Republic. Saf. Sci. 123, 104573 (2020)","DOI":"10.1016\/j.ssci.2019.104573"},{"key":"8_CR26","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.ijcip.2019.03.003","volume":"25","author":"D Rehak","year":"2019","unstructured":"Rehak, D., Senovsky, P., Hromada, M., Lovecek, T.: Complex approach to assessing resilience of critical infrastructure elements. Int. J. Crit. Infrastruct. Protect. 25, 125\u2013138 (2019)","journal-title":"Int. J. Crit. Infrastruct. Protect."},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Rehak, D., Senovsky, P., Slivkova, S.: Resilience of critical infrastructure elements and its main factors. Systems 6(2), 21 (2018)","DOI":"10.3390\/systems6020021"},{"key":"8_CR28","unstructured":"Republic of Estonia information system authority: eID (2021). https:\/\/www.ria.ee\/en\/state-informationsystem\/electronic-identity-eid.html"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Tsap, V., Lips, S., Draheim, D.: eID public acceptance in Estonia: towards understanding the citizen. In: Proceedings of dg.o\u20192020 \u2013 the 21st The 21st Annual International Conference on Digital Government Research, pp. 340\u2013341. ACM (2020)","DOI":"10.1145\/3396956.3397009"},{"key":"8_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-319-70004-5_33","volume-title":"Future Data and Security Engineering","author":"V Tsap","year":"2017","unstructured":"Tsap, V., Pappel, I., Draheim, D.: Key success factors in introducing national e-identification systems. In: Dang, T.K., Wagner, R., K\u00fcng, J., Thoai, N., Takizawa, M., Neuhold, E.J. (eds.) FDSE 2017. LNCS, vol. 10646, pp. 455\u2013471. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70004-5_33"},{"key":"8_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-030-86611-2_6","volume-title":"Electronic Government and the Information Systems Perspective","author":"A Valtna-Dvo\u0159\u00e1k","year":"2021","unstructured":"Valtna-Dvo\u0159\u00e1k, A., Lips, S., Tsap, V., Ottis, R., Priisalu, J., Draheim, D.: Vulnerability of state-provided electronic identification: the case of ROCA in\u00a0Estonia. In: K\u00f6, A., Francesconi, E., Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) EGOVIS 2021. LNCS, vol. 12926, pp. 73\u201385. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86611-2_6"},{"key":"8_CR32","unstructured":"Yin, R.K.: Case Study Research: Design and Methods, 5th edition. Sage, Thousand Oaks (2009)"}],"container-title":["Lecture Notes in Computer Science","Electronic Government and the Information Systems Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-68211-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T10:03:46Z","timestamp":1723629826000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-68211-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031682100","9783031682117"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-68211-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"15 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EGOVIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Electronic Government and the Information Systems Perspective","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Naples","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"egovis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dexa.org\/egovis2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}