{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T16:10:07Z","timestamp":1746375007709,"version":"3.40.4"},"publisher-location":"Cham","reference-count":76,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319119571"},{"type":"electronic","value":"9783319119588"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11958-8_22","type":"book-chapter","created":{"date-parts":[[2014,9,11]],"date-time":"2014-09-11T11:24:40Z","timestamp":1410434680000},"page":"272-290","source":"Crossref","is-referenced-by-count":15,"title":["Impact of Cloud Computing Technology on E-Government"],"prefix":"10.1007","author":[{"given":"Omar","family":"Ali","sequence":"first","affiliation":[]},{"given":"Jeffrey","family":"Soar","sequence":"additional","affiliation":[]},{"given":"Jianming","family":"Yong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"22_CR1","first-page":"411","volume":"3","author":"S. Alshomrani","year":"2012","unstructured":"Alshomrani, S.: A comparative study on United Nations E-Government indicators. Journal of Emerging Trends in Computing and Information Sciences\u00a03(3), 411\u2013420 (2012)","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"key":"22_CR2","unstructured":"Apps.gov, http:\/\/apps.gov (accessed December 23, 2013)"},{"key":"22_CR3","unstructured":"Barwick, H.: Cloud computing adoption increases in Australia, IDC (2013), http:\/\/www.cio.com.au\/article\/520964\/cloud_computing_adoption_increases_australia_idc_\/ (accessed August 24, 2013)"},{"key":"22_CR4","unstructured":"Beizer, D.: Cloud computing comes into focuses, Government Computer News (2008), http:\/\/gcn.com\/articles\/2008\/06\/11\/cloudcomputing-comes-into-focus.aspx (accessed December 17, 2013)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Catteddu, D., Hogben, G.: Cloud computing: Benefits, risks and recommendations for information security. In: European Network and Information Security Agency (ENISA) (2009)","DOI":"10.1007\/978-3-642-16120-9_9"},{"key":"22_CR6","unstructured":"CCIA, \u2018Public Policy for the Cloud: How Policy makers Can Enable Cloud Computing\u2019, Computer and Communications Industry Association (2011), http:\/\/www.ccianet.org\/CCIA\/files\/ccLibraryFiles\/Filename\/000000000528\/CCIA%20%20Public%20Policy%20for%20the%20Cloud.pdf (accessed October 17, 2013)"},{"key":"22_CR7","unstructured":"Chen, G.: IBM cloud computing and government cloud computing platforms. Programmer\u00a0(11), 1\u201310 (2008)"},{"key":"22_CR8","unstructured":"Copeland, M.V.: The client-server model: Not dead yet. Fortune (2009), http:\/\/money.cnn.com\/2009\/02\/16\/technology\/copeland_oracle.fortune\/index.htm (accessed September 28, 2013)"},{"key":"22_CR9","unstructured":"CSA 2009, \u2018Security Guidance for Critical Areas of Focus in Cloud Computing\u2019, Cloud Security Alliance"},{"key":"22_CR10","unstructured":"CSA 2010, \u2019Top Threats to Cloud Computing\u2019, Cloud Security Alliance"},{"key":"22_CR11","unstructured":"Cureton, L.: Cloud computing in the federal government: On a cloudy day how it will astound you. Goddard CIO Blog (2009), http:\/\/blogs.nasa.gov\/cm\/blog\/Goddard-CIOBlog.blog\/posts\/post_1237089048316.html (accessed November 02, 2013)"},{"key":"22_CR12","unstructured":"Data.gov, http:\/\/www.data.gov (accessed December 23, 2013)"},{"key":"22_CR13","unstructured":"Davis, J.: Gartner and Forrester now forecast, decline in IT spending, Channel Insider (2009), http:\/\/www.channelinsider.com\/c\/a\/News\/Gartner-anForrester-Now-Forecast-2009Decline-in-IT-Spending-204121\/ (accessed October 2013)"},{"key":"22_CR14","unstructured":"Davis, J.: Gartner: Outsourced IT services prices could fall 20%, Channel Insider (2009), http:\/\/www.channelinsider.com\/c\/a\/News\/GartnerOutsourced-ITServices-Prices-Could-Fall-20-145259\/ (accessed November 02, 2013)"},{"key":"22_CR15","unstructured":"Department of Finance and Deregulation, \u2019Cloud Computing Strategic Direction Paper, pp. 1\u201345 (2011)"},{"key":"22_CR16","unstructured":"DFDAG, Cloud Computing Strategic Direction Paper, Department of Finance and Deregulations Australian Government (2011)"},{"key":"22_CR17","unstructured":"Dustin Amrhein, P.A., de Andrade, A., Armstrong, E.A.B., Bartlett, J., Bruklis, R., Cameron, K.: Cloud computing use cases. White Paper. Version 3.0 ed., pp. 1\u20137 (2010)"},{"key":"22_CR18","unstructured":"EU Directorate General for Public Policies, Cloud Computing, http:\/\/ec.europa.eu\/information_society\/activities\/cloudcomputing\/docs\/cc_study_parliament.pdf (accessed October 16, 2013)"},{"key":"22_CR19","unstructured":"Ferguson, S.: Gartner says IT spending will decline 4 percent in 2009. e-Week (2009), http:\/\/www.eweek.com\/index2.php?option=content&task=view&id=52598&pop=1&hide_ads=1&page=0&hide_js=1 (accessed December 17, 2013)"},{"key":"22_CR20","unstructured":"Forbes, Australia, Italy and Denmark Lead Government Cloud Adoption (2012), http:\/\/www.forbes.com\/sites\/hugomoreno\/2012\/03\/20\/governments-tip-toe-toward-the-cloud\/ (accessed August 25, 2013)"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Gansen, Z., Chunming, R., Jin, L., Feng, Z., Yong, T.: Trusted data sharing over untrusted cloud storage providers. In: IEEE Second International Conference on Cloud Computing Technology and Science, p. 97 (2010)","DOI":"10.1109\/CloudCom.2010.36"},{"key":"22_CR22","unstructured":"Glick, B.: Digital Britain commits government to cloud computing. Computing (2009), http:\/\/www.computing.co.uk\/computing\/news\/2244229\/digital-Britaincommits (accessed October 27, 2013)"},{"key":"22_CR23","unstructured":"Golden. B.:The case against cloud computing, part one, CIO (2009), http:\/\/www.cio.com\/article\/477473\/The_Case_Against_Cloud_Computing_Part_One (accessed October 09, 2013)"},{"key":"22_CR24","unstructured":"Grance, T.: 2010,The NIST Cloud Definition Framework. NIST"},{"issue":"1","key":"22_CR25","first-page":"713","volume":"15","author":"A. Gronlund","year":"2004","unstructured":"Gronlund, A., Horan, T.A.: Introducing e-government: History, definitions, and issues. Communications of the Association for Information Systems\u00a015(1), 713\u2013729 (2004)","journal-title":"Communications of the Association for Information Systems"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Grossman, R.L.: The case for cloud computing, pp. 23\u201327. IEEE Computer Society (2009)","DOI":"10.1109\/MITP.2009.40"},{"key":"22_CR27","unstructured":"GUK, Department for Business Innovation and Skills and Department for Culture, Media and Sport, Government of the United Kingdom, Digital Britain: The Final Report (2009), http:\/\/www.culture.gov.uk\/images\/publications\/digitalbritain-finalreportjun09 (accessed October 27, 2013)"},{"key":"22_CR28","unstructured":"GUK, Department for Business Innovation & Skills and Department for Culture, Media and Sport, Government of the United Kingdom, Press Release: Building Britain\u2019s Digital Future (2009), http:\/\/www.culture.gov.uk\/reference_library\/media_releases\/6220.aspx (accessed October 27, 2013)"},{"issue":"3","key":"22_CR29","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/1226736.1226742","volume":"50","author":"J.A. Hall","year":"2007","unstructured":"Hall, J.A., Liedtka, S.L.: The sarbanes-oxley act: Implications for large-scale IT outsourcing. Communications of the ACM\u00a050(3), 95\u2013100 (2007)","journal-title":"Communications of the ACM"},{"key":"22_CR30","unstructured":"Hamm, S.: How cloud computing will change business. Business Week (2009), http:\/\/www.businessweek.com\/print\/magazine\/content\/09_24\/b4135042942270.htm (accessed August 11, 2013)"},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Hashizume, K., Rosado, D.G., Fern\u00e1ndez-Medina, E., Eduardo, B., Fernandez, E.B.: An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 1\u201313 (2013)","DOI":"10.1186\/1869-0238-4-5"},{"key":"22_CR32","unstructured":"Higginbotham, S.: Cloud computing is a tool, not a strategy. GigaOm (2009), http:\/\/gigaom.com\/2009\/02\/19\/cloudcomputing-is-a-tool-not-a-strategy\/ (accessed August 21, 2013)"},{"key":"22_CR33","unstructured":"Hoover, J.N.: Chief of the year, InformationWeek (2009), http:\/\/www.informationweek.com\/news\/government\/leadership\/showArticle.jhtml?articleID=222002611&pgno=1&queryText=&isPrev= (accessed November 19, 2013)"},{"key":"22_CR34","unstructured":"IDC 2008. Cloud Computing Entering Period of Accelerating Adoption and Poised to Capture IT Spending Growth over the Next Five Years, http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS21480708 (accessed October 15, 2013)"},{"key":"22_CR35","unstructured":"IDC 2009, Enterprise panel, http:\/\/www.slideshare.net\/JorFigOr\/cloud-computing-2010-an-idcupdate (accessed July 11, 2013)"},{"key":"22_CR36","unstructured":"IEEE Computer Society: Definition of Cloud Computing"},{"key":"22_CR37","unstructured":"IT Industry Innovation Council 2011, Cloud Computing- Opportunities and Challenges, pp. 1\u201331"},{"key":"22_CR38","unstructured":"Karunanithi, D., Kiruthika, B.: Efficient framework for ensuring the effectiveness of information security in cloud computing. In: International Conference on Signal, Image Processing and Applications With workshop of ICEEA, pp. 1\u201310 (2011)"},{"issue":"5","key":"22_CR39","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MITP.2010.128","volume":"12","author":"M.K. Khaled","year":"2010","unstructured":"Khaled, M.K., Qutaibah, M.: Establishing trust in cloud computing, cloud computing. IT Professional\u00a012(5), 20\u201327 (2010)","journal-title":"IT Professional"},{"key":"22_CR40","unstructured":"King, J.: 5 key questions about cloud storage, Computerworld (2009), http:\/\/www.computerworld.com\/s\/article\/340471\/Cloud_StorageIlluminated (accessed September 26, 2013)"},{"key":"22_CR41","unstructured":"Lv, Y.: \u2019Research on Construction of E-government Information Resources Sharing System Based on Cloud Computing. Information Studies: Theory and Application\u00a0(4), 1\u201339 (2010)"},{"key":"22_CR42","unstructured":"Macias, F., Thomas, G.: Cloud computing advantages in public sector, pp. 1\u20137. Cisco Press (2011)"},{"key":"22_CR43","unstructured":"Mell, P., Grance, T.: Draft NIST working definition of cloud computing, vol. 15, pp. 1\u20137 (2009)"},{"key":"22_CR44","unstructured":"NIST 2009, Cloud computing, Computer Security Resource Centre, http:\/\/csrc.nist.gov\/groups\/SNS\/cloudcomputing\/ (accessed August 27, 2013)"},{"key":"22_CR45","unstructured":"Nezhad, H.M., Stephenson, B., Singhal, S.: Outsourcing business to cloud computing services: Opportunities and challenges. IEEE Internet Computing, Special Issues on Cloud Computing, pp. 1\u201310 (2009)"},{"key":"22_CR46","unstructured":"O\u2019Gara, M.: Washington itching to take the lead on cloud computing. SOA (2009), http:\/\/govit.sys-con.com\/node\/1055764 (accessed December 23, 2013)"},{"key":"22_CR47","unstructured":"Pallis, G.: Cloud computing: The new frontier of Internet computing, pp. 1\u20138. IEEE Computer Society (2010)"},{"key":"22_CR48","doi-asserted-by":"crossref","unstructured":"Pearson, S.: Taking account of privacy when designing cloud computing services. In: ICSE Workshop on Software Engineering Challenges of Cloud Computing, p. 44 (2009)","DOI":"10.1109\/CLOUD.2009.5071532"},{"key":"22_CR49","unstructured":"Regulation of Investigatory Powers Act (RIPA), Part II, s 28, UK (2000)"},{"key":"22_CR50","unstructured":"Strecker, T.P.: Govt IT procurement in for shake- up. The Dominion Post (2009), http:\/\/www.stuff.co.nz\/technology\/2521317\/Govt-IT-procurement-in-forshake-up (accessed November 12, 2013)"},{"key":"22_CR51","doi-asserted-by":"crossref","unstructured":"Tripathi, A., Parihar, B.: E-governance challenges and cloud benefits. In: IEEE International Conference on Computer Science and Automating Engineering (CSAE), pp. 1\u201310 (2011)","DOI":"10.1109\/CSAE.2011.5953237"},{"key":"22_CR52","unstructured":"US Committee on Science, Technology and Space, Potentials of Cloud Computing, http:\/\/democrats.science.house.gov\/pressrelease\/subcommittee-examines-potential-cloud-computing (accessed November 23, 2013)"},{"issue":"2","key":"22_CR53","first-page":"43","volume":"9","author":"N. VijayKumar","year":"2011","unstructured":"VijayKumar, N.: Role of ICT in e-governance: Impact of cloud computing in driving new initiatives. SET-Labs Briefings\u00a09(2), 43\u201355 (2011)","journal-title":"SET-Labs Briefings"},{"key":"22_CR54","doi-asserted-by":"crossref","unstructured":"Vouk, M.A.: Cloud computing issues, research and implementations. Journal of Computing and Information Technology, 235\u2013246 (2008)","DOI":"10.2498\/cit.1001391"},{"key":"22_CR55","doi-asserted-by":"crossref","unstructured":"Wang, L.: Scientific cloud computing: Early definition and experience. In: IEEE International Conference on High Performance Computing and Communications, pp. 1\u201310 (2008)","DOI":"10.1109\/HPCC.2008.38"},{"key":"22_CR56","unstructured":"Zhu, J.: Smarter cloud computing, pp. 1\u20138. Publishing House of Electronics Industry China (2010)"},{"key":"22_CR57","doi-asserted-by":"crossref","unstructured":"Cellary, W., Strykowski, S.: E-government based on cloud computing and service-oriented architecture. ACM International Conference Proceedings Series, pp. 5\u201310 (2009)","DOI":"10.1145\/1693042.1693045"},{"issue":"2","key":"22_CR58","first-page":"1","volume":"2","author":"R. Sharma","year":"2012","unstructured":"Sharma, R., Sharma, A., Singh, R.R.: E-governance and cloud computing: Technology oriented government policies. International Journal of Research in IT and Management\u00a02(2), 1\u20138 (2012)","journal-title":"International Journal of Research in IT and Management"},{"key":"22_CR59","unstructured":"Aveek, M.A., Rahman, M.S.: Implementing E- Governance in Bangladesh Using Cloud Computing Technology, BRAC University, Dhaka, Bangladesh (2011)"},{"issue":"2","key":"22_CR60","first-page":"13","volume":"5","author":"S. Goel","year":"2012","unstructured":"Goel, S., Manuja, M., Dwivedi, R., Sherry, A.M.: Challenges of technology infrastructure availability in e- governance program implementations: A cloud based solution. Journal of Computer Engineering\u00a05(2), 13\u201317 (2012)","journal-title":"Journal of Computer Engineering"},{"issue":"6","key":"22_CR61","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/cseij.2013.3601","volume":"3","author":"N. Tewari","year":"2013","unstructured":"Tewari, N., Sharma, M.K.: Cloud based working concept for e-governance citizen charter. International Journal of Advanced Research in Computer Science and Software Engineering\u00a03(6), 1\u201312 (2013)","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"22_CR62","unstructured":"Grossman, R.L., Gu, Y.: On the varieties of clouds for data intensive computing. Data Engineering 44 (2009)"},{"issue":"1","key":"22_CR63","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","volume":"51","author":"S. Marston","year":"2011","unstructured":"Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing - The business perspective. Decision Support Systems\u00a051(1), 176\u2013189 (2011)","journal-title":"Decision Support Systems"},{"key":"22_CR64","unstructured":"West, F.: Ten Reasons Why Cloud Computing is the Wave of the Future for the Recruitment Sector (2011), http:\/\/www.westtek.co.uk\/Users\/frmBlogDetail.aspx?id=2 (accessed January 1, 2014)"},{"issue":"1","key":"22_CR65","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MC.2009.20","volume":"42","author":"N. Leavitt","year":"2009","unstructured":"Leavitt, N.: Is Cloud Computing Really Ready for Prime Time? Computer\u00a042(1), 15\u201320 (2009)","journal-title":"Computer"},{"key":"22_CR66","unstructured":"Staten, J.: USA.gov Achieves Cloud Bursting Efficiency Using Terre mark\u2019s Enterprise Cloud (Case study) (2013), http:\/\/www.terremark.com\/uploadedFiles\/Industry_Solutions\/Federal_Government\/Case%20Study%20USA.gov%20Achieves%20Cloud%20Bursting%20Efficiency%20Using%20Terremark%27s%20Enterprise%20Cloud.pdf (accessed January 27, 2014)"},{"issue":"2","key":"22_CR67","first-page":"1","volume":"1","author":"S. Singh","year":"2010","unstructured":"Singh, S.: Promoting e-governance through right to information: A case-study of india. International Journal of Scientific and Engineering Research\u00a01(2), 1\u201310 (2010)","journal-title":"International Journal of Scientific and Engineering Research"},{"key":"22_CR68","unstructured":"Rajkumar, B., James, B., Andrzej, M.G.: Cloud Computing: Principles and Paradigms, Hoboken, New Jersey (2011)"},{"key":"22_CR69","unstructured":"Melvin, B., Greer, J.: Software as a Service Inflection Point: Using Cloud Computing to Achieve Business Agility. iUniverse Star (2009)"},{"issue":"7","key":"22_CR70","doi-asserted-by":"publisher","first-page":"5","DOI":"10.5120\/1399-1888","volume":"9","author":"A. Rastogi","year":"2010","unstructured":"Rastogi, A.: A model based approach to implement cloud computing in e-governance. International Journal of Computer Applications\u00a09(7), 5\u201318 (2010)","journal-title":"International Journal of Computer Applications"},{"issue":"3","key":"22_CR71","doi-asserted-by":"publisher","first-page":"69","DOI":"10.5121\/ijnsa.2011.3306","volume":"3","author":"A.M. Al-Khouri","year":"2011","unstructured":"Al-Khouri, A.M.: PKI in government identity management systems. International Journal of Network Security and Its Applications\u00a03(3), 69\u201396 (2011)","journal-title":"International Journal of Network Security and Its Applications"},{"issue":"4","key":"22_CR72","first-page":"377","volume":"4","author":"K. Veljanovska","year":"2013","unstructured":"Veljanovska, K., Zdravevska, V.: E-government based on cloud computing. Journal of Emerging Trends in Computing and Information Sciences\u00a04(4), 377\u2013381 (2013)","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"issue":"4","key":"22_CR73","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/ijcac.2012100103","volume":"2","author":"P. Sasikala","year":"2012","unstructured":"Sasikala, P.: Cloud computing and e-governance: advances, opportunities and challenge. International Journal of Cloud Applications and Computing\u00a02(4), 1\u201321 (2012)","journal-title":"International Journal of Cloud Applications and Computing"},{"key":"22_CR74","doi-asserted-by":"crossref","unstructured":"Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: The 2nd IEEE International Conference on Cloud Computing Technology and Science, pp. 693\u2013702. IEEE Press (2010)","DOI":"10.1109\/CloudCom.2010.66"},{"key":"22_CR75","unstructured":"Karunanithi, D., Kiruthika, B.: Efficient framework for ensuring the effectiveness of information security in cloud computing. In: International Conference on Signal, Image Processing and Applications, pp. 1\u201310 (2011)"},{"key":"22_CR76","unstructured":"MSDN, \u2018Chapter 26: Designing Hosted and Cloud Services\u2019, Microsoft Application Architecture Guide, 2nd Edition Microsoft (2014), http:\/\/msdn.microsoft.com\/en-us\/library\/ee658110.aspx (accessed June 13 2014)"}],"container-title":["Communications in Computer and Information Science","Information and Software Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11958-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T15:48:10Z","timestamp":1746373690000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11958-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319119571","9783319119588"],"references-count":76,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11958-8_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}