{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:49:05Z","timestamp":1742928545446,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319646763"},{"type":"electronic","value":"9783319646770"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64677-0_27","type":"book-chapter","created":{"date-parts":[[2017,8,3]],"date-time":"2017-08-03T09:56:46Z","timestamp":1501754206000},"page":"324-335","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Trusting and Adopting E-Government Services in Developing Countries? Privacy Concerns and Practices in Rwanda"],"prefix":"10.1007","author":[{"given":"Chantal","family":"Mutimukwe","sequence":"first","affiliation":[]},{"given":"Ella","family":"Kolkowska","sequence":"additional","affiliation":[]},{"given":"\u00c5ke","family":"Gr\u00f6nlund","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,4]]},"reference":[{"issue":"39","key":"27_CR1","first-page":"713","volume":"15","author":"\u00c5 Gr\u00f6nlund","year":"2005","unstructured":"Gr\u00f6nlund, \u00c5., Horan, T.A.: Introducing e-gov: history, definitions, and issues. Commun. Assoc. Inf. Syst. 15(39), 713\u2013729 (2005)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"27_CR2","volume-title":"Privacy and freedom","author":"F Westin","year":"1967","unstructured":"Westin, F.: Privacy and freedom. Atheneum, New York (1967)"},{"issue":"5","key":"27_CR3","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1080\/01972243.2010.511556","volume":"26","author":"J Fedorowicz","year":"2010","unstructured":"Fedorowicz, J., Gogan, J.L., Culnan, M.J.: Barriers to interorganizational information sharing in e-government: a Stakeholder analysis. Inf. Soc. 26(5), 315\u2013329 (2010)","journal-title":"Inf. Soc."},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Park, R.: Measuring factors that influence the success of e-government initiatives. In: Proceedings of the 41st Hawaii International Conference on System Sciences (HICSS-41). IEEE Computer Society Conference Publishing Services, Waikoloa, Big Island, Hawaii, p. 218 (1\u201310) (2008)","DOI":"10.1109\/HICSS.2008.244"},{"issue":"1","key":"27_CR5","first-page":"10","volume":"4","author":"L Carter","year":"2010","unstructured":"Carter, L., McBride, A.: Information privacy concerns and e-government: a research agenda. Transform. Gov. People Process Policy 4(1), 10\u201313 (2010)","journal-title":"Transform. Gov. People Process Policy"},{"issue":"2","key":"27_CR6","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.im.2004.01.003","volume":"24","author":"C Liu","year":"2005","unstructured":"Liu, C., Marchewka, J., Lu, J., Yu, C.-S.: Beyond cocnern a privacy-trust-behavior intention model of electronic commerce. Inf. Manag. 24(2), 289\u2013304 (2005)","journal-title":"Inf. Manag."},{"issue":"3","key":"27_CR7","doi-asserted-by":"crossref","first-page":"709","DOI":"10.2307\/258792","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Shoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709\u2013734 (1995)","journal-title":"Acad. Manag. Rev."},{"issue":"2","key":"27_CR8","first-page":"3","volume":"5","author":"D Abri","year":"2009","unstructured":"Abri, D., Mcgill, T., Dixon, M.: Examining the impact of E-privacy risk concerns on citizens\u2019 intentions to use E-government services: an oman perspective. J. Inf. Priv. Secur. 5(2), 3\u201326 (2009)","journal-title":"J. Inf. Priv. Secur."},{"issue":"1","key":"27_CR9","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1287\/isre.13.1.36.97","volume":"13","author":"KA Stewart","year":"2002","unstructured":"Stewart, K.A., Segars, A.H., Albert, H.: Examination empirical for information privacy of the concern instrument. Inf. Syst. Res. 13(1), 36\u201349 (2002)","journal-title":"Inf. Syst. Res."},{"issue":"3","key":"27_CR10","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1093\/idpl\/ips014","volume":"2","author":"AB Makulilo","year":"2012","unstructured":"Makulilo, A.B.: Privacy and data protection in Africa: a state of the art. Int. Data Priv. Law 2(3), 163\u2013178 (2012)","journal-title":"Int. Data Priv. Law"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"B\u00e9langer, F., Crossler, R.E.: Privacy in the digital age: a review of information privacy research in information system. 35(4), 1\u201336 (2011)","DOI":"10.2307\/41409971"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Almagwashi, H., Gray, A.: Citizens\u2019 perception towards preserving privacy in e-government services\u202f: a cross-sectional study (2014)","DOI":"10.1145\/2691195.2691272"},{"issue":"2","key":"27_CR13","first-page":"253","volume":"11","author":"QN Nkohkwo","year":"2013","unstructured":"Nkohkwo, Q.N., Islam, M.S.: Challenges to the successful implementation of e-government initiatives in sub-Saharan Africa: a literature review. Electron. J. e-Gov. 11(2), 253\u2013267 (2013)","journal-title":"Electron. J. e-Gov."},{"key":"27_CR14","unstructured":"UNPAN: Rwanda: Citizens Commend E-Government Services. http:\/\/www.unpan.org\/Library\/MajorPublications\/UNEGovernmentSurvey\/PublicEGovernanceSurveyintheNews\/tabid\/651\/mctl\/ArticleView\/ModuleId\/1555\/articleId\/50072\/Rwanda-Citizens-Commend-EGovernment-Services.aspx (2016)"},{"issue":"1","key":"27_CR15","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., Hart, P.: An extended privacy calculus transactions model for e-commerce transactions. Inf. Syst. Res. 17(1), 61\u201380 (2006)","journal-title":"Inf. Syst. Res."},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Cullen, R.C.R., Reilly, P.R.P.: Information privacy and trust in government: a citizen-based perspective from New Zealand. In: 2007 40th Annual Hawaii International Conference System Science, no. January 2007","DOI":"10.1109\/HICSS.2007.271"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Cullen, R.: Citizens\u2019 concerns about the privacy of personal information held by government: a comparative study, Japan and New Zealand. In: Proceedings of the 40th Annual Hawaii International Conference on System Science, pp. 1\u201310 (2008)","DOI":"10.1109\/HICSS.2008.91"},{"key":"27_CR18","unstructured":"Choudrie, J., Raza, S., Olla, P.: Exploring the issues of security, privacy and trust in eGovernment: UK Citizens\u2019 perspective. In: 15th Americas Conference on Information Systems (AMCIS 2009), vol. Paper 347. pp. 1\u20139, AIS, San Francisco, CA (2009)"},{"issue":"3","key":"27_CR19","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1080\/13600869.2014.904450","volume":"28","author":"J Sarabdeen","year":"2014","unstructured":"Sarabdeen, J., Rodrigues, G., Balasubramanian, S.: E-Government users\u2019 privacy and security concerns and availability of laws in Dubai. Int. Rev. Law Comput. Technol. 28(3), 261\u2013276 (2014)","journal-title":"Int. Rev. Law Comput. Technol."},{"issue":"2","key":"27_CR20","first-page":"283","volume":"8","author":"E Abu-Shanab","year":"2014","unstructured":"Abu-Shanab, E.: Antecedents of trust in e-government services: an empirical test in Jordan. Transform. Gov. People Process Policy 8(2), 283\u2013308 (2014)","journal-title":"Transform. Gov. People Process Policy"},{"issue":"1","key":"27_CR21","doi-asserted-by":"crossref","first-page":"275","DOI":"10.25300\/MISQ\/2013\/37.1.12","volume":"37","author":"W Hong","year":"2013","unstructured":"Hong, W., Thong, J.Y.L.: Internet privacy concerns: an integrated conceptualization and four empirical studies. MIS Q. 37(1), 275\u2013298 (2013)","journal-title":"MIS Q."},{"issue":"12","key":"27_CR22","first-page":"798","volume":"12","author":"H Xu","year":"2011","unstructured":"Xu, H., Dinev, T., Smith, J., Hart, P.: Information privacy concerns: linking individual perceptions with institutional privacy assurances information privacy concerns: linking individual perceptions with institutional privacy assurances. J. Assoc. Inf. Syst. 12(12), 798\u2013824 (2011)","journal-title":"J. Assoc. Inf. Syst."},{"key":"27_CR23","unstructured":"Al-Jamal, M., Abu-Shanab, E.: Privacy policy of e-government websites: an itemized checklist proposed and tested. Management Research and Practice U6-ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info:sid\/summon.serialssolutionscom&rft_val_fmt=info:ofi\/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=PRIVACY+POLICY+OF+E-GOVERNMENT+WEBSITES%3A+AN+IT, vol. 7, no. 3. Academia de Studii Economice din Bucuresti, Research Center in Public Administration and Public Management, Bucharest, p. 80 (2015)"},{"issue":"3","key":"27_CR24","first-page":"270","volume":"7","author":"J Kuzma","year":"2010","unstructured":"Kuzma, J.: An examination of privacy policies of US Government Senate websites. Electron. Gov. Int. J. 7(3), 270\u2013280 (2010)","journal-title":"Electron. Gov. Int. J."},{"issue":"2","key":"27_CR25","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1111\/1540-4560.00067","volume":"59","author":"M Culnan","year":"2003","unstructured":"Culnan, M., Bies, J.: Consumer privacy: balancing economic and justice considerations. J. Soc. Issues 59(2), 323\u2013342 (2003)","journal-title":"J. Soc. Issues"},{"key":"27_CR26","first-page":"23","volume":"1","author":"WMP Steijn","year":"2015","unstructured":"Steijn, W.M.P., Vedder, A.: Privacy under Construction: a developmental perspective on privacy perception. Sci. Technol. Hum. Values 1, 23 (2015)","journal-title":"Sci. Technol. Hum. Values"},{"key":"27_CR27","doi-asserted-by":"crossref","unstructured":"Hoofnagle, C., King, J., Li, S., Turow, J.: How young adults differ from older adults when it comes to informatin privacy attitudes and policies (2010)","DOI":"10.2139\/ssrn.1589864"},{"issue":"3","key":"27_CR28","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1080\/00913367.1999.10673588","volume":"28","author":"KB Sheehan","year":"1999","unstructured":"Sheehan, K.B., Hoy, M.G.: Flaming, complaining, abstaining: how online users respond to privacy concerns. J. Advert. 28(3), 37\u201351 (1999)","journal-title":"J. Advert."},{"key":"27_CR29","first-page":"21","volume":"II","author":"N Alasem","year":"2015","unstructured":"Alasem, N.: Privacy and eGovernment in Saudi Arabia. World Congr. Eng. Comput. Sci. II, 21\u201324 (2015)","journal-title":"World Congr. Eng. Comput. Sci."},{"issue":"4","key":"27_CR30","first-page":"487","volume":"28","author":"T Christensen","year":"2005","unstructured":"Christensen, T., L\u00e6greid, P.: Trust in government: the relative importance of service satisfaction, political factors, and demography. Public Perform. Manag. Rev. 28(4), 487\u2013511 (2005)","journal-title":"Public Perform. Manag. Rev."},{"key":"27_CR31","unstructured":"World Bank: Agricultural Development in Rwanda (2013). http:\/\/www.worldbank.org\/en\/results\/2013\/01\/23"},{"key":"27_CR32","unstructured":"Rwanda: Rwanda vision 2020. Revised in 2012, pp. 1\u201340 (2012)"},{"key":"27_CR33","unstructured":"N. I. I. Socio-economic: Government of Rwanda the Nici-2010 Plan, Development (2010)"},{"key":"27_CR34","unstructured":"RwandaOnline, Irembo. http:\/\/www.rwandaonline.rw\/in-the-works.php (2015)"},{"key":"27_CR35","unstructured":"G. of Rwanda, National ICT Strategy and Plan NICI 2011- 2015 (2011)"},{"key":"27_CR36","unstructured":"Rwanda Utility and Regulatory Authority: Statistics and tariff information in Telecom Sector as of December 2015 (2015)"},{"key":"27_CR37","unstructured":"R. N. C. for Human: The Rights to privacy in the digital age (2013)"},{"issue":"4","key":"27_CR38","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336\u2013355 (2004)","journal-title":"Inf. Syst. Res."},{"key":"27_CR39","first-page":"455","volume":"4","author":"LR BeVier","year":"1995","unstructured":"BeVier, L.R.: Information about individuals in the hands of government: some reflections on mechanisms for privacy protection. William Mary Bill Rights J 4, 455 (1995)","journal-title":"William Mary Bill Rights J"}],"container-title":["Lecture Notes in Computer Science","Electronic Government"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64677-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:16:07Z","timestamp":1709831767000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-64677-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319646763","9783319646770"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64677-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EGOV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Electronic Government","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"St. Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"egov2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/tinyurl.com\/IFIP-EGOV-EPART-2017","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}