{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:30:00Z","timestamp":1765438200690},"publisher-location":"Berlin, Heidelberg","reference-count":43,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_22","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T07:24:20Z","timestamp":1277796260000},"page":"298-307","source":"Crossref","is-referenced-by-count":4,"title":["Privacy Requirements Engineering for Trustworthy e-Government Services"],"prefix":"10.1007","author":[{"given":"Nikos","family":"Vrakas","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christos","family":"Kalloniatis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aggeliki","family":"Tsohou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Costas","family":"Lambrinoudakis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.giq.2004.08.002","volume":"21","author":"L.E. Halchin","year":"2004","unstructured":"Halchin, L.E.: Electronic government: Government capability and terrorist resource. Government Information Quarterly\u00a021, 406\u2013419 (2004)","journal-title":"Government Information Quarterly"},{"issue":"3","key":"22_CR2","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/S0167-9236(02)00120-3","volume":"34","author":"P.R. Devadoss","year":"2003","unstructured":"Devadoss, P.R., Pan, S.L., Huang, J.C.: Structurational analysis of e-government initiatives: a case study of SCO. Decision Support Systems\u00a034(3), 253\u2013269 (2003)","journal-title":"Decision Support Systems"},{"key":"22_CR3","unstructured":"ASPA: United Nations & American Society for Public Administration (ASPA). Benchmarking e-government: A global perspective. U.N. Publications, New York (2002)"},{"key":"22_CR4","volume-title":"Meta-capitalism: The e-business revolution and the design of 21st century companies and markets","author":"G. Means","year":"2000","unstructured":"Means, G., Schneider, D.: Meta-capitalism: The e-business revolution and the design of 21st century companies and markets. John Wiley & Sons Inc., New York (2000)"},{"issue":"4","key":"22_CR5","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1177\/1530957603026004002","volume":"26","author":"S.H. Holden","year":"2003","unstructured":"Holden, S.H., Norris, D.F., Fletcher, P.D.: Electronic Government at the Local Level: Progress to Date and Future Issues. Public Performance & Management Review\u00a026(4), 325\u2013344 (2003)","journal-title":"Public Performance & Management Review"},{"issue":"2","key":"22_CR6","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.giq.2005.02.001","volume":"22","author":"R.J. Gil-Garc\u00eda","year":"2005","unstructured":"Gil-Garc\u00eda, R.J., Pardo, T.A.: E-government success factors: Mapping practical tools to theoretical foundations. Government Information Quarterly\u00a022(2), 187\u2013216 (2005)","journal-title":"Government Information Quarterly"},{"issue":"4","key":"22_CR7","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1016\/j.dss.2009.04.009","volume":"47","author":"J.K. Lee","year":"2009","unstructured":"Lee, J.K., Rao, H.R.: Task Complexity and Different Decision Criteria for Online Service Acceptance: A Comparison of Two e-Government Compliance Service Domains. Decision Support Systems\u00a047(4), 424\u2013435 (2009)","journal-title":"Decision Support Systems"},{"key":"22_CR8","volume-title":"Belief, attitude, intention and behaviour: An introduction to theory and research Reading","author":"M. Fishbein","year":"1975","unstructured":"Fishbein, M., Ajzen, I.: Belief, attitude, intention and behaviour: An introduction to theory and research Reading. Addision-Wesley, Massachusetts (1975)"},{"issue":"2","key":"22_CR9","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I. Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organizational Behavior and Human Decision Processes\u00a050(2), 179\u2013211 (1991)","journal-title":"Organizational Behavior and Human Decision Processes"},{"key":"22_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-4446-9","volume-title":"Intrinsic motivation","author":"E.L. Deci","year":"1975","unstructured":"Deci, E.L.: Intrinsic motivation. Plenum Press, New York (1975)"},{"key":"22_CR11","volume-title":"Diffusion of innovations","author":"E.M. Rogers","year":"1995","unstructured":"Rogers, E.M.: Diffusion of innovations, 4th edn. The Free Press, New York (1995)","edition":"4"},{"issue":"3","key":"22_CR12","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F.D. Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly\u00a013(3), 319\u2013339 (1989)","journal-title":"MIS Quarterly"},{"issue":"2","key":"22_CR13","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.jretai.2004.04.002","volume":"80","author":"L.C. Harris","year":"2004","unstructured":"Harris, L.C., Goode, M.H.: The four levels of loyalty and the pivotal role of trust: a study of online service dynamics. Journal of Retailing\u00a080(2), 139\u2013158 (2004)","journal-title":"Journal of Retailing"},{"issue":"3","key":"22_CR14","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.giq.2005.05.002","volume":"22","author":"I.-C. Chang","year":"2005","unstructured":"Chang, I.-C., Chang, Y., Hung, W., Hwang, H.: An empirical study on the impact of quality antecedents on tax payers\u2019 acceptance of Internet tax-filing systems. Government Information Quarterly\u00a022(3), 389\u2013410 (2005)","journal-title":"Government Information Quarterly"},{"key":"22_CR15","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.jsis.2007.12.002","volume":"17","author":"A. Belanger","year":"2008","unstructured":"Belanger, A., Carter, L.: Trust and risk in e-government adoption. Journal of Strategic Information Systems\u00a017, 165\u2013176 (2008)","journal-title":"Journal of Strategic Information Systems"},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"1838","DOI":"10.1016\/j.chb.2005.11.003","volume":"23","author":"M. Horst","year":"2007","unstructured":"Horst, M., Kuttschreuter, M.T., Gutteling, J.M.: Perceived usefulness, personal experiences, risk perception and trust as determinants of adoption of e-Government services in The Netherlands. Computers in Human Behavior\u00a023, 1838\u20131852 (2007)","journal-title":"Computers in Human Behavior"},{"issue":"6","key":"22_CR17","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1016\/j.ijinfomgt.2009.03.012","volume":"29","author":"O.K. Lean","year":"2009","unstructured":"Lean, O.K., Zailani, S., Ramayah, T., Fernando, Y.: Factors influencing intention to use e-government services among citizens in Malaysia. International Journal of Information Management\u00a029(6), 458\u2013475 (2009)","journal-title":"International Journal of Information Management"},{"key":"22_CR18","unstructured":"GAO (General Accounting Office), Electronic government challenges must be addressed with effective leadership and management (2001), http:\/\/www.gao.gov\/new.items\/d01959t.pdf"},{"issue":"3","key":"22_CR19","doi-asserted-by":"publisher","first-page":"709","DOI":"10.2307\/258792","volume":"20","author":"R.C. Mayer","year":"2003","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integration model of organizational trust. Academy of Management Review\u00a020(3), 709\u2013734 (2003)","journal-title":"Academy of Management Review"},{"issue":"3","key":"22_CR20","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1080\/101967802320245929","volume":"12","author":"M. Warkentin","year":"2002","unstructured":"Warkentin, M., Gefen, D., Pavlou, P.A., Rose, M.G.: Encouraging citizen adoption of e-government by building trust. Electronic Markets\u00a012(3), 157\u2013162 (2002)","journal-title":"Electronic Markets"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Felix, B.T., Paul, S.: Online consumer trust: A multiple-dimensional model. Journal of Electronic Commerce in Organizations\u00a040 (2004)","DOI":"10.4018\/jeco.2004070103"},{"key":"22_CR22","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/1252217","volume":"57","author":"G.T. Gundlach","year":"1993","unstructured":"Gundlach, G.T., Murphy, P.E.: Ethical and legal foundations of relational marketing exchanges. Journal of Marketing\u00a057, 35\u201346 (1993)","journal-title":"Journal of Marketing"},{"key":"22_CR23","unstructured":"Tanase, M.: IP spoofing: an introduction. In: Security Focus,\u00a0vol. 11 (2003)"},{"key":"22_CR24","unstructured":"Heberlein, L., Bishop, M.: Attack class: Address spoofing. In: National Information Systems Security Conference, Baltimore, pp. 371\u2013377 (1996)"},{"key":"22_CR25","unstructured":"Ping, Z., Zhuosheng, J.: Sniffer and Interruption of TCP\/IP Communication. Computer Engineering\u00a031, 119\u2013120"},{"key":"22_CR26","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/378444.378449","volume":"19","author":"S. Bellovin","year":"1989","unstructured":"Bellovin, S.: Security problems in the TCP\/IP protocol suite. ACM SIGCOMM Computer Communication Review\u00a019, 48 (1989)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Postel, J.: RFC 791: IP: Internet Protocol (September 1981)","DOI":"10.17487\/rfc0791"},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Postel, J.: RFC 793: TCP: Transmission Control Protocol (1980)","DOI":"10.17487\/rfc0761"},{"key":"22_CR29","unstructured":"Anley, C.: Advanced SQL Injection In SQL Server Applications (2002), http:\/\/www.nextgenss.com\/papers\/advanced_sql_injection.pdf"},{"key":"22_CR30","unstructured":"Geneiatakis, D., Kambourakis, G., Dagiuklas, T., Lambrinoudakis, C., Gritzalis, S.: SIP message tampering: The SQL code injection attack. In: Proceedings of 13th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2005), Split, Croatia (2005)"},{"key":"22_CR31","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/COMST.2006.253270","volume":"8","author":"D. Geneiatakis","year":"2006","unstructured":"Geneiatakis, D., et al.: Survey of security vulnerabilities in Session Initiation Protocol. IEEE Communications Surveys and Tutorials\u00a08, 68\u201381 (2006)","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"22_CR32","unstructured":"Cerrudo, C.: Manipulating microsoft sql server using sql injection. Application Security Inc., http:\/\/www.appsecinc.com\/presentations\/Manipulating_SQL_Server_Using_SQL_Injection.pdf"},{"key":"22_CR33","unstructured":"Klein, A.: BIND 9 DNS cache poisoning (2007), http:\/\/www.trusteer.com\/docs\/bind9dns.html"},{"key":"22_CR34","doi-asserted-by":"crossref","unstructured":"Franks, J., et al.: RFC 2617: HTTP authentication: basic and digest access authentication (1999)","DOI":"10.17487\/rfc2617"},{"key":"22_CR35","unstructured":"Cavoukia, A.: Privacy by Design, www.privacybydesign.ca"},{"key":"22_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/3-540-45150-1_3","volume-title":"IT-Security and Privacy","author":"S. Fischer-H\u00fcbner","year":"2001","unstructured":"Fischer-H\u00fcbner, S.: IT-Security and Privacy, Design and Use of Privacy Enhancing Security Mechanisms. In: Fischer-H\u00fcbner, S. (ed.) IT-Security and Privacy. LNCS, vol.\u00a01958, p. 35. Springer, Heidelberg (2001)"},{"key":"22_CR37","volume-title":"Privacy, What Developers and IT Professionals Should Know","author":"J. Cannon","year":"2004","unstructured":"Cannon, J.: Privacy, What Developers and IT Professionals Should Know. Addison-Wesley, Reading (2004)"},{"key":"22_CR38","unstructured":"Koorn, R., van Gils, H., ter Hart, J., Overbeek, P., Tellegen, R.: Privacy Enhancing Technologies, White paper for Decision Makers. Ministry of the Interior and Kingdom Relations, The Netherlands (December 2004)"},{"key":"22_CR39","volume-title":"Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics (with international participation)","author":"C. Kalloniatis","year":"2009","unstructured":"Kalloniatis, C., Kavakli, E., Gritzalis, S.: Methods for Designing Privacy Aware Information Systems: A review. In: Alexandris, N., Chryssikopoulos, V., Douligeris, C., Kanellopoulos, N. (eds.) Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics (with international participation), Corfu, Greece, September 2009. IEEE CPS Conference Publishing Services, Los Alamitos (2009)"},{"key":"22_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/3-540-45017-3_7","volume-title":"Advanced Information Systems Engineering","author":"H. Mouratidis","year":"2003","unstructured":"Mouratidis, H., Giorgini, P., Manson, G.: Integrating security and systems engineering: Towards the modelling of secure information systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol.\u00a02681, pp. 63\u201378. Springer, Heidelberg (2003a)"},{"issue":"3","key":"22_CR41","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s00766-008-0067-3","volume":"13","author":"C. Kalloniatis","year":"2008","unstructured":"Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: The PriS method. Requirements Eng.\u00a013(3), 241\u2013255 (2008)","journal-title":"Requirements Eng."},{"key":"22_CR42","unstructured":"Perini, P., Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Towards an agent-oriented approach to software engineering, Modena-Italy (2001)"},{"key":"22_CR43","series-title":"LNAI","doi-asserted-by":"crossref","first-page":"1387","DOI":"10.1007\/978-3-540-45224-9_187","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"H. Mouratidis","year":"2003","unstructured":"Mouratidis, H., Giorgini, P., Manson, G.: An ontology for modelling security:The tropos project. In: Palade, V., Howlett, R.J., Jain, L. (eds.) KES 2003. LNCS (LNAI), vol.\u00a02773, pp. 1387\u20131394. Springer, Heidelberg (2003b)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:44:44Z","timestamp":1606167884000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}