{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:13:29Z","timestamp":1725563609676},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157165"},{"type":"electronic","value":"9783642157172"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15717-2_27","type":"book-chapter","created":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T13:25:30Z","timestamp":1283347530000},"page":"250-262","source":"Crossref","is-referenced-by-count":1,"title":["Identification of the Required Security Practices during e-Government Maturity"],"prefix":"10.1007","author":[{"given":"Ali","family":"Shayan","sequence":"first","affiliation":[]},{"given":"Behnam","family":"Abdi","sequence":"additional","affiliation":[]},{"given":"Malihe","family":"Qeisari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.tele.2005.07.003","volume":"23","author":"L. Mitrou","year":"2006","unstructured":"Mitrou, L., Karyda, M.: Employees_ privacy vs. employers_ security: Can they be balanced? Telematics and Informatics\u00a023, 164\u2013178 (2006)","journal-title":"Telematics and Informatics"},{"key":"27_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.ijinfomgt.2004.08.002","volume":"25","author":"P. Davies","year":"2005","unstructured":"Davies, P.: Constructing electronic government: the case of the UK Inland Revenue. International Journal of Information Management\u00a025, 3\u201320 (2005)","journal-title":"International Journal of Information Management"},{"key":"27_CR3","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.im.2005.04.001","volume":"43","author":"J. Fu","year":"2006","unstructured":"Fu, J., Farn, C., Chao, W.: Acceptance of electronic tax filing: A study of taxpayer intention. Information & Management\u00a043, 109\u2013126 (2006)","journal-title":"Information & Management"},{"key":"27_CR4","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.dss.2004.10.013","volume":"42","author":"R. Sarathy","year":"2006","unstructured":"Sarathy, R., Muralidhar, K.: Secure and useful data sharing. Decision Support Systems\u00a042, 204\u2013220 (2006)","journal-title":"Decision Support Systems"},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1016\/j.giq.2006.01.012","volume":"22","author":"P.T. Jaeger","year":"2005","unstructured":"Jaeger, P.T.: Deliberative democracy and the conceptual foundations of electronic government. Government Information Quarterly\u00a022, 702\u2013719 (2005)","journal-title":"Government Information Quarterly"},{"issue":"2","key":"27_CR6","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.dss.2007.02.005","volume":"45","author":"T. Chou","year":"2008","unstructured":"Chou, T., Chen, J., Pu, C.: Exploring the Collective Actions of Public Servants in e-government Development. Decision Support Systems\u00a045(2), 251\u2013265 (2008)","journal-title":"Decision Support Systems"},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1016\/j.giq.2005.10.001","volume":"22","author":"M. Parent","year":"2005","unstructured":"Parent, M., Vandebeek, C.A., Gemino, A.C.: Building citizen trust through e-government. Government Information Quarterly\u00a022, 720\u2013736 (2005)","journal-title":"Government Information Quarterly"},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.giq.2005.02.004","volume":"22","author":"L. Torres","year":"2005","unstructured":"Torres, L., Pina, V., Acerete, B.: E-government developments on delivering public services among EU cities. Government Information Quarterly\u00a022, 217\u2013238 (2005)","journal-title":"Government Information Quarterly"},{"key":"27_CR9","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/S0740-624X(01)00066-1","volume":"18","author":"K. Layne","year":"2001","unstructured":"Layne, K., Lee, J.: Developing fully functional E-government: A four stage model. Government Information Quarterly\u00a018, 122\u2013136 (2001)","journal-title":"Government Information Quarterly"},{"key":"27_CR10","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/S1353-4858(07)70033-8","volume":"5","author":"K. Anderson","year":"2007","unstructured":"Anderson, K.: Convergence: A holistic approach to risk management. Network Security\u00a05, 4\u20137 (2007)","journal-title":"Network Security"},{"issue":"2","key":"27_CR11","first-page":"79","volume":"18","author":"T. Whitson","year":"2001","unstructured":"Whitson, T., Davis, L.: Best Practices in Electronic Government: Comprehensive Electronic Information Dissemination for Science and Technology. Information Quarterly\u00a018(2), 79\u201391 (2001)","journal-title":"Information Quarterly"},{"key":"27_CR12","first-page":"361","volume":"58","author":"B. Gunter","year":"2006","unstructured":"Gunter, B.: Advances in e-democracy: overview Aslib. Proceedings: New Information Perspectives\u00a058, 361\u2013370 (2006)","journal-title":"Proceedings: New Information Perspectives"},{"key":"27_CR13","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.giq.2008.11.007","volume":"26","author":"N. Tsai","year":"2009","unstructured":"Tsai, N., Choi, B., Perry, M.: Improving the process of E-Government initiative: An in-depth case study of web-based GIS implementation. Government Information Quarterly\u00a026, 368\u2013376 (2009)","journal-title":"Government Information Quarterly"},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1016\/j.giq.2006.09.008","volume":"24","author":"W.E. Ebbers","year":"2007","unstructured":"Ebbers, W.E., Dijk, V.: Resistance and support to electronic government, building a model of innovation. Government Information Quarterly\u00a024, 554\u2013575 (2007)","journal-title":"Government Information Quarterly"},{"key":"27_CR15","unstructured":"General Accounting Office, Electronic Government: Challenges Must Be Addressed with Effective Leadership and Management. General Accounting Office, Washington, D.C. GAO-01-959T, July 11 (2001)"},{"key":"27_CR16","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.geoforum.2009.11.002","volume":"41","author":"B. Anderson","year":"2010","unstructured":"Anderson, B.: Security and the future: Anticipating the event of terror. Geoforum\u00a041, 227\u2013235 (2010)","journal-title":"Geoforum"},{"key":"27_CR17","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2006.03.004","volume":"25","author":"B. Solms Von","year":"2006","unstructured":"Von Solms, B.: Information Security \u2013 The Fourth Wave. Computers & security\u00a025, 165\u2013168 (2006)","journal-title":"Computers & security"},{"key":"27_CR18","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1016\/j.cose.2005.03.008","volume":"24","author":"T.L. Wiant","year":"2005","unstructured":"Wiant, T.L.: Information security policy\u2019s impact on reporting security incidents. Computers & Security\u00a024, 448\u2013459 (2005)","journal-title":"Computers & Security"},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1108\/09685229910255223","volume":"7","author":"R. Solms Von","year":"1999","unstructured":"Von Solms, R.: Information security management: why standards are important. Information Management & Computer Security\u00a07, 50\u201357 (1999)","journal-title":"Information Management & Computer Security"},{"key":"27_CR20","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1108\/09685220510614425","volume":"13","author":"A. Gupta","year":"2005","unstructured":"Gupta, A., Hammond, R.: Information systems security issues and decisions for small businesses: An empirical examination. Information Management & Computer Security\u00a013, 297\u2013310 (2005)","journal-title":"Information Management & Computer Security"},{"key":"27_CR21","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.elerap.2006.02.001","volume":"6","author":"G. Dias","year":"2006","unstructured":"Dias, G., Alo Paiva, R., Jos\u00e9, A.: A simple model and a distributed architecture for realizing one-stop e-government. Electronic Commerce Research and Applications\u00a06, 81\u201390 (2006)","journal-title":"Electronic Commerce Research and Applications"},{"key":"27_CR22","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1108\/03074809910285888","volume":"100","author":"R.C. Mitchell","year":"1999","unstructured":"Mitchell, R.C., Marcella, R., Baxter, G.: Corporate information security management. New Library World\u00a0100, 213\u2013227 (1999)","journal-title":"New Library World"},{"key":"27_CR23","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.jal.2005.12.015","volume":"5","author":"D. Hutter","year":"2006","unstructured":"Hutter, D., Mantel, H., Schaefer, I., Schairer, A.: Security of multi-agent systems: A case study on comparison shopping. Journal of Applied Logic\u00a05, 303\u2013332 (2006)","journal-title":"Journal of Applied Logic"},{"key":"27_CR24","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.giq.2004.08.002","volume":"21","author":"L.E. Halchin","year":"2004","unstructured":"Halchin, L.E.: Electronic government: Government capability and terrorist resource. Government Information Quarterly\u00a021, 406\u2013419 (2004)","journal-title":"Government Information Quarterly"},{"key":"27_CR25","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1016\/j.jgi.2004.10.001","volume":"30","author":"J.R. Gil-Garcia","year":"2004","unstructured":"Gil-Garcia, J.R.: Information technology policies and standards: A comparative review of the states. Journal of Government Information\u00a030, 548\u2013560 (2004)","journal-title":"Journal of Government Information"},{"key":"27_CR26","doi-asserted-by":"publisher","first-page":"1873","DOI":"10.1016\/S0140-3664(03)00082-3","volume":"26","author":"C. Lambrinoudakisa","year":"2003","unstructured":"Lambrinoudakisa, C., Gritzalisa, S., Dridib, F., Pernu, G.: Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computer Communications\u00a026, 1873\u20131883 (2003)","journal-title":"Computer Communications"},{"key":"27_CR27","unstructured":"Elahi, S., Abdi, B., Shayan, A.: E-banking and managerial challenges: change management. In: First annual e-banking summit, Tehran, Iran (2007)"},{"key":"27_CR28","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1016\/j.tourman.2005.02.006","volume":"27","author":"S. Tsaura","year":"2006","unstructured":"Tsaura, S., Linb, Y., Linc, J.: Evaluating ecotourism sustainability from the integrated perspective of resource, community and tourism. Tourism Management\u00a027, 640\u2013653 (2006)","journal-title":"Tourism Management"},{"key":"27_CR29","unstructured":"Sackman, H.: Delphi Critique. Rand Corporation (1975)"},{"key":"27_CR30","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0261-5177(84)90056-6","volume":"5","author":"E. Kaynak","year":"1984","unstructured":"Kaynak, E., Macauley, J.A.: The Delphi technique in the measurement of tourism market potential: The case of Nova Scotia. Tourism Management\u00a05, 87\u2013101 (1984)","journal-title":"Tourism Management"},{"key":"27_CR31","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1016\/j.techfore.2005.09.002","volume":"73","author":"J. Landeta","year":"2006","unstructured":"Landeta, J.: Current validity of the Delphi method in social sciences. Technological Forecasting & Social Change\u00a073, 467\u2013482 (2006)","journal-title":"Technological Forecasting & Social Change"},{"key":"27_CR32","doi-asserted-by":"crossref","unstructured":"Deshpande, M., Aniruddha, S., Richard, N., Prakash, M.: Metadata-driven Delphi rating on the Internet. Computer Methods and Programs in Biomedicine\u00a077 (2005)","DOI":"10.1016\/j.cmpb.2004.05.006"},{"key":"27_CR33","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1080\/09537329108524065","volume":"3","author":"V.M. Mitchell","year":"1991","unstructured":"Mitchell, V.M.: The Delphi technique: an exposition and application. Technol. Anal. Strateg. Manag.\u00a03, 333\u2013352 (1991)","journal-title":"Technol. Anal. Strateg. Manag."},{"key":"27_CR34","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1108\/09685220310500153","volume":"11","author":"K.S. Hong","year":"2003","unstructured":"Hong, K.S., Chi, Y.-P., Chao, L.R., Tang, J.-H.: An integrated system theory of information security management. Information management and computer security\u00a011, 243\u2013248 (2003)","journal-title":"Information management and computer security"}],"container-title":["Communications in Computer and Information Science","Global Security, Safety, and Sustainability"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15717-2_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T13:03:16Z","timestamp":1619787796000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15717-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157165","9783642157172"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15717-2_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}