{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:45:01Z","timestamp":1778168701650,"version":"3.51.4"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,11,16]],"date-time":"2015-11-16T00:00:00Z","timestamp":1447632000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Univ Access Inf Soc"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s10209-015-0446-8","type":"journal-article","created":{"date-parts":[[2015,11,16]],"date-time":"2015-11-16T04:51:23Z","timestamp":1447649483000},"page":"257-264","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":59,"title":["Web site accessibility, usability and security: a survey of government web sites in Kyrgyz Republic"],"prefix":"10.1007","volume":"16","author":[{"given":"Rita","family":"Ismailova","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,16]]},"reference":[{"issue":"3","key":"446_CR1","first-page":"99","volume":"3","author":"A Abanumy","year":"2005","unstructured":"Abanumy, A., Al-Badi, A., Mayhew, P.: e-Government Website accessibility: in-depth evaluation of Saudi Arabia and Oman. Electron. J. e-Gov. 3(3), 99\u2013106 (2005)","journal-title":"Electron. J. e-Gov."},{"key":"446_CR2","doi-asserted-by":"publisher","unstructured":"Abinaya, M.E.: Detect SQLI attacks in web apps using NVS. Int. J. Comput. Sci. Eng. Inf. Technol. (IJCSEIT) (2014). doi:\nhttps:\/\/doi.org\/10.5121\/ijcseit.2014.420435","DOI":"10.5121\/ijcseit.2014.420435"},{"key":"446_CR3","unstructured":"Aidraliev, A. (2009) e-Government development in the Kyrgyz Republic. In: Sub-regional Workshop on Strengthening ICT Policies and Applications to Achieve MDGs and WSIS Goals in South Asia and Central Asia"},{"issue":"4","key":"446_CR4","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s10209-011-0226-z","volume":"10","author":"A Aizpurua","year":"2011","unstructured":"Aizpurua, A., Arrue, M., Vigo, M., Abascal, J.: Validating the effectiveness of EvalAccess when deploying WCAG 2.0 tests. Univers. Access Inf. Soc. 10(4), 425\u2013441 (2011)","journal-title":"Univers. Access Inf. Soc."},{"key":"446_CR5","first-page":"3","volume":"13","author":"A Andreica","year":"2014","unstructured":"Andreica, A.: The European Commission in the electronic environment in the elections year 2014. Online J. Model. New Eur. 13, 3\u201323 (2014)","journal-title":"Online J. Model. New Eur."},{"issue":"1","key":"446_CR6","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1080\/13600860410001674779","volume":"18","author":"S Basu","year":"2004","unstructured":"Basu, S.: E-government and developing countries: an overview. Int. Rev. Law Comput. Technol. 18(1), 109\u2013132 (2004)","journal-title":"Int. Rev. Law Comput. Technol."},{"issue":"1","key":"446_CR7","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1108\/14637150610643751","volume":"12","author":"F Belanger","year":"2006","unstructured":"Belanger, F., Hiller, J.S.: A framework for e-government: privacy implications. Bus. Process Manag. J. 12(1), 48\u201360 (2006)","journal-title":"Bus. Process Manag. J."},{"issue":"1","key":"446_CR8","first-page":"39","volume":"12","author":"U Brimkulov","year":"2014","unstructured":"Brimkulov, U., & Baryktabasov, K.: Public transactional e-services through government web sites in Kyrgyzstan. Electron. J. e-Gov. 12(1), 39\u201353 (2014)","journal-title":"J. e-Gov."},{"issue":"1","key":"446_CR9","first-page":"1","volume":"8","author":"DH Byun","year":"2011","unstructured":"Byun, D.H., Finnie, G.: Evaluating usability, user satisfaction and intention to revisit for successful e-government websites. Electron. Gov. Int. J. 8(1), 1\u201319 (2011)","journal-title":"Electron. Gov. Int. J."},{"key":"446_CR10","unstructured":"State Information Resources of the Kyrgyz Republic. \nwww.okmot.kg\n\n. Retrieved 5\/25\/2015"},{"key":"446_CR11","unstructured":"Choudrie, J., Ghinea, G., Weerakkody, V.: Evaluating global e-government sites: a view using web diagnostics tools. In: Academic Conferences International (2004)"},{"key":"446_CR12","unstructured":"Constitution of the Kyrgyz Republic, art. I, \u00a7 10"},{"key":"446_CR13","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-14215-4_7","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Adam Doup\u00e9","year":"2010","unstructured":"Doup\u00e9, A., Cova, M., Vigna, G. (2010). Why Johnny can\u2019t pentest: an analysis of black-box web vulnerability scanners. In: Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 111\u2013131. Springer, Berlin"},{"key":"446_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D Gefen","year":"2003","unstructured":"Gefen, D., Karahanna, E., Straub, D.: Trust and TAM in online shopping: an integrated model. MIS Q. 27, 51\u201390 (2003)","journal-title":"MIS Q."},{"issue":"1","key":"446_CR15","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1080\/19331681.2010.508011","volume":"8","author":"M Goodwin","year":"2011","unstructured":"Goodwin, M., Susar, D., Nietzio, A., Snaprud, M., Jensen, C.S.: Global web accessibility analysis of national government portals and ministry web sites. J. Inf. Technol. Politics 8(1), 41\u201367 (2011)","journal-title":"J. Inf. Technol. Politics"},{"issue":"2","key":"446_CR16","first-page":"204","volume":"4","author":"A Henriksson","year":"2007","unstructured":"Henriksson, A., Yi, Y., Frost, B., Middleton, M.: Evaluation instrument for e-government websites. Electron. Gov. Int. J. 4(2), 204\u2013226 (2007)","journal-title":"Electron. Gov. Int. J."},{"key":"446_CR17","unstructured":"Internet Users by Country. \nhttp:\/\/www.internetlivestats.com\n\n (2014). Accessed 04 Apr 2015"},{"issue":"1","key":"446_CR18","first-page":"40","volume":"3","author":"WAM Isa","year":"2011","unstructured":"Isa, W.A.M., Suhami, M.R., Safie, N.I., Semsudin, S.S.: Assessing the usability and accessibility of Malaysia e-government website. Am. J. Econ. Bus. Adm. 3(1), 40 (2011)","journal-title":"Am. J. Econ. Bus. Adm."},{"key":"446_CR19","doi-asserted-by":"crossref","unstructured":"Jati, H., Dominic, D.D. (2009, April). Quality evaluation of e-government website using web diagnostic tools: Asian case. In Information Management and Engineering, 2009. ICIME\u201909. International Conference on, pp. 85\u201389. IEEE","DOI":"10.1109\/ICIME.2009.147"},{"key":"446_CR20","first-page":"15","volume":"3","author":"E Johnson","year":"2010","unstructured":"Johnson, E., Kolko, B.: e-Government and transparency in authoritarian regimes: comparison of national-and city-level e-government web sites in Central Asia. Digit. Icons Stud. Rus. Eurasian Cent. Eur. New Media 3, 15\u201348 (2010)","journal-title":"Digit. Icons Stud. Rus. Eurasian Cent. Eur. New Media"},{"key":"446_CR21","volume-title":"Website Optimization","author":"A King","year":"2008","unstructured":"King, A.: Website Optimization. O\u2019Reilly Media Inc., Sebastopol (2008)"},{"key":"446_CR22","unstructured":"Koga, T.: Policy issues regarding electronic government and Web accessibility in Japan. In: Proceeding of the World Library and Information Congress: 72nd IFLA General Conference and Council. Seoul, Korea, Aug. 20\u201324 (2006)"},{"issue":"1","key":"446_CR23","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s10209-009-0159-y","volume":"9","author":"H Kopackova","year":"2010","unstructured":"Kopackova, H., Michalek, K., Cejna, K.: Accessibility and findability of local e-government websites in the Czech Republic. Univers. Access Inf. Soc. 9(1), 51\u201361 (2010)","journal-title":"Univers. Access Inf. Soc."},{"key":"446_CR24","doi-asserted-by":"crossref","unstructured":"Koskinen, T., Ihantola, P., Karavirta, V.: Quality of WordPress plug-ins: an overview of security and user ratings. In: Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Conference on Social Computing (Social Com), pp. 834\u2013837. IEEE (2012, September)","DOI":"10.1109\/SocialCom-PASSAT.2012.31"},{"key":"446_CR25","unstructured":"Kuzma, J., Yen, D., Oestreicher, K.: Global e-government web accessibility: An empirical examination of EU, Asian and African sites.\u00a0Paper presented at the 2nd International Conference on Information and Communication Technology and Accessibility, Hammamet, Tunisia. \nhttp:\/\/eprints.worc.ac.uk\/591\/\n\n (2009)"},{"key":"446_CR26","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-73283-9_9","volume-title":"Universal Access in Human\u2013Computer Interaction. Applications and Services","author":"S Lee","year":"2007","unstructured":"Lee, S., Kim, B.G., Kim, J.G.: Accessibility evaluation of Korean e-government. In: Stephanidis, C. (ed.) Universal Access in Human\u2013Computer Interaction. Applications and Services,\u00a0pp. 73\u201378. Springer, Berlin (2007)"},{"key":"446_CR27","unstructured":"Masri, F., Luj\u00e1n-Mora, S. (2011). A combined agile methodology for the evaluation of web accessibility. In IADIS International Conference Interfaces and Human Computer Interaction (IHCI 2011), pp. 423\u2013428"},{"key":"446_CR28","unstructured":"McClure, D.L.: Statement of David L. McClure. In: U.S. General Accounting Office, before the Subcommittee on Government Management, Information and Technology, Committee on Government Reform, House of Representatives. \nhttp:\/\/www.gao.gov\n\n (2000)"},{"key":"446_CR29","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MSP.2009.104","volume":"4","author":"M Meike","year":"2009","unstructured":"Meike, M., Sametinger, J., Wiesauer, A.: Security in open source web content management systems. IEEE Secur. Priv. 4, 44\u201351 (2009)","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"446_CR30","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1504\/IJESDF.2007.013595","volume":"1","author":"V Moen","year":"2007","unstructured":"Moen, V., Klingsheim, A.N., Simonsen, K.I.F., Hole, K.J.: Vulnerabilities in e-governments. Int. J. Electron. Secur. Digit. Forensics 1(1), 89\u2013100 (2007)","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"446_CR31","unstructured":"Mustafa, S.H., Al-Zoua\u2019bi, L.F. (2008, December). Usability of the Academic websites of Jordan\u2019s Universities an evaluation study. In: Proceedings of the 9th International Arab Conference for Information Technology, pp. 31\u201340"},{"key":"446_CR32","doi-asserted-by":"crossref","unstructured":"Nielsen, J.: Usability inspection methods. In: Conference Companion on Human Factors in Computing Systems, pp. 413\u2013414. ACM (1994, April)","DOI":"10.1145\/259963.260531"},{"key":"446_CR33","unstructured":"Nielson, J.: Designing Web Usability, 1st edn, p. 419. New Riders Publishing, ISBN-13: 978-1562058104 (2000)"},{"issue":"04","key":"446_CR34","doi-asserted-by":"publisher","first-page":"15","DOI":"10.4236\/jsea.2013.64A003","volume":"6","author":"H Okamura","year":"2013","unstructured":"Okamura, H., Tokuzane, M., Dohi, T.: Quantitative security evaluation for software system from vulnerability database. J. Softw. Eng. Appl. 6(04), 15 (2013)","journal-title":"J. Softw. Eng. Appl."},{"key":"446_CR35","unstructured":"Open Web Application Security Project (OWASP): OWASP Top Ten Project. \nhttp:\/\/www.owasp.org\/index.php\/Top_10\n\n (2010)"},{"issue":"4","key":"446_CR36","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/s10209-003-0081-7","volume":"4","author":"M Paris","year":"2006","unstructured":"Paris, M.: Website accessibility: a survey of local e-government websites and legislation in Northern Ireland. Univers. Access Inf. Soc. 4(4), 292\u2013299 (2006)","journal-title":"Univers. Access Inf. Soc."},{"key":"446_CR37","doi-asserted-by":"crossref","unstructured":"Shah, B.P., Shakya, S.: Evaluating the web accessibility of websites of the central government of Nepal. In: Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, pp. 447\u2013448. ACM (2007, December)","DOI":"10.1145\/1328057.1328154"},{"issue":"3","key":"446_CR38","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1177\/0894439305283707","volume":"24","author":"Y Shi","year":"2006","unstructured":"Shi, Y.: E-government web site accessibility in Australia and China a longitudinal study. Soc. Sci. Comput. Rev. 24(3), 378\u2013385 (2006)","journal-title":"Soc. Sci. Comput. Rev."},{"issue":"2","key":"446_CR39","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.giq.2006.05.004","volume":"24","author":"Y Shi","year":"2007","unstructured":"Shi, Y.: The accessibility of Chinese local government web sites: an exploratory study. Gov. Inf. Q. 24(2), 377\u2013403 (2007)","journal-title":"Gov. Inf. Q."},{"key":"446_CR40","doi-asserted-by":"crossref","unstructured":"Smith, B., Williams, L.: Using SQL hotspots in a prioritization heuristic for detecting all types of web application vulnerabilities. In: Software Testing, Verification and Validation (ICST), 2011 IEEE Fourth International Conference on, pp. 220\u2013229. IEEE (2011, March)","DOI":"10.1109\/ICST.2011.15"},{"key":"446_CR41","volume-title":"The State of Federal Websites: the Pursuit of Excellence","author":"GNL Stowers","year":"2002","unstructured":"Stowers, G.N.L.: The State of Federal Websites: the Pursuit of Excellence. The PricewaterhouseCoopers Endowment for the Business of Government, Arlington (2002)"},{"key":"446_CR42","unstructured":"United Nations: UN global E-government Survey 2003. United Nations Division for Public Administration and Development Management. \nhttp:\/\/unpan1.un.org\/intradoc\/groups\/public\/documents\/un\/unpan016066.pdf\n\n. Retrieved 5\/25\/2015 (2003)"},{"key":"446_CR43","unstructured":"United Nations: Global E-government Readiness Report 2004\u2014Towards Access for Opportunity. United Nations Division for Public Administration and Development Management. \nhttp:\/\/unpan1.un.org\/intradoc\/groups\/public\/documents\/un\/unpan019207.pdf\n\n. Retrieved 5\/25\/2015 (2004)"},{"key":"446_CR44","unstructured":"United Nations: Global E-government Readiness Report 2005\u2014from E-Government to E-Inclusion. United Nations Division for Public Administration and Development Management. \nhttp:\/\/unpan1.un.org\/intradoc\/groups\/public\/documents\/un\/unpan021888.pdf\n\n. Retrieved 5\/25\/2015 (2005)"},{"key":"446_CR45","unstructured":"United Nations: Global E-government Readiness Report 2008\u2014from E-Government to Connected Governance. United Nations Division for Public Administration and Development Management, \nhttp:\/\/unpan1.un.org\/intradoc\/groups\/public\/documents\/un\/unpan028607.pdf\n\n. Retrieved 5\/25\/2015 (2008)"},{"key":"446_CR46","unstructured":"United Nations: UN E-government Survey 2010-Leveraging e-government at a time of financial and economic crisis. \nhttp:\/\/unpan1.un.org\/intradoc\/groups\/public\/documents\/un\/unpan038851.pdf\n\n. Retrieved 5\/25\/2015 (2010)"},{"key":"446_CR47","unstructured":"United Nations: UN E-government Survey 2012\u2014E-government for the People. \nhttp:\/\/unpan1.un.org\/intradoc\/groups\/public\/documents\/un\/unpan048065.pdf\n\n. Retrieved 5\/25\/2015 (2012)"},{"key":"446_CR48","unstructured":"United Nations: UN E-government Survey 2014\u2014E-government for the Future We Want. \nhttp:\/\/unpan3.un.org\/egovkb\/Portals\/egovkb\/Documents\/un\/2014-Survey\/E-Gov_Complete_Survey-2014.pdf\n\n. Retrieved 5\/25\/2015 (2014)"},{"key":"446_CR49","unstructured":"Web Content Accessibility Guidelines 1.0. \nhttp:\/\/www.w3.org\/TR\/WCAG10\/\n\n. Retrieved 5\/17\/2015"},{"issue":"4","key":"446_CR50","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1016\/j.giq.2011.12.010","volume":"29","author":"NE Youngblood","year":"2012","unstructured":"Youngblood, N.E., Mackiewicz, J.: A usability analysis of municipal government website home pages in Alabama. Gov. Inf. Q. 29(4), 582\u2013588 (2012)","journal-title":"Gov. Inf. Q."},{"key":"446_CR51","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.giq.2009.07.004","volume":"27","author":"J Zhao","year":"2010","unstructured":"Zhao, J., Zhao, S.: Opportunities and threats: a security assessment of state egovernment websites. Gov. Inf. Q. 27, 49\u201356 (2010)","journal-title":"Gov. Inf. Q."},{"key":"446_CR52","unstructured":"Zlatkovski, N.\u0160.D., Mileva, A.: Evaluation and Testing of Several Free\/Open Source Web Vulnerability Scanners.\u00a0In: Proceedings of the 10th International conference on Informatics and Information Technology (CIIT 2013), pp. 221\u2013224 (2013)"},{"issue":"5","key":"446_CR53","first-page":"14","volume":"2","author":"H \u041ay\u0442\u043dae\u0432a","year":"2014","unstructured":"\u041ay\u0442\u043dae\u0432a, H.: C\u043bo\u0436\u043doc\u0442\u0438 \u043a\u0438\u0431ep\u0431e\u0437o\u043fac\u043doc\u0442\u0438 \u0432 \u0426e\u043d\u0442pa\u043b\u044c\u043do\u0439 A\u0437\u0438\u0438 (The complexities of cyber security in Central Asia). per Concordiam 2(5), 14\u201319 (2014)","journal-title":"per Concordiam"}],"container-title":["Universal Access in the Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10209-015-0446-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10209-015-0446-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10209-015-0446-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10209-015-0446-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,26]],"date-time":"2019-12-26T05:06:49Z","timestamp":1577336809000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10209-015-0446-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,16]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["446"],"URL":"https:\/\/doi.org\/10.1007\/s10209-015-0446-8","relation":{},"ISSN":["1615-5289","1615-5297"],"issn-type":[{"value":"1615-5289","type":"print"},{"value":"1615-5297","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,16]]},"assertion":[{"value":"16 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}