{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:48:35Z","timestamp":1772556515798,"version":"3.50.1"},"reference-count":91,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T00:00:00Z","timestamp":1681689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T00:00:00Z","timestamp":1681689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s10796-023-10385-7","type":"journal-article","created":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T09:09:04Z","timestamp":1681722544000},"page":"1695-1711","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Relating Social Media Diffusion, Education Level and Cybersecurity Protection Mechanisms to E-Participation Initiatives: Insights from a Cross-Country Analysis"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8045-4958","authenticated-orcid":false,"given":"Supunmali","family":"Ahangama","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,17]]},"reference":[{"key":"10385_CR1","volume-title":"Endogenous Growth Theory","author":"P Aghion","year":"1998","unstructured":"Aghion, P., & Howitt, P. (1998). Endogenous Growth Theory. Cambridge, MA: MIT Press."},{"issue":"3","key":"10385_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2979\/eservicej.12.3.01","volume":"12","author":"S Ahangama","year":"2021","unstructured":"Ahangama, S., & Krishnan, S. (2021). Are E-Participation Initiatives Related to Quality of Life of Nations Dependent on Cultural Dimensions? A Country-Level Empirical Investigation. E-Service Journal, 12(3), 1\u201342. https:\/\/doi.org\/10.2979\/eservicej.12.3.01","journal-title":"E-Service Journal"},{"key":"10385_CR3","doi-asserted-by":"publisher","unstructured":"Ahangama, S., & Poo, D. C. C. (2014). The Interaction Effect of Complimentary Assets on Relationship between Information and Communication Technology and Public Health Outcomes. In B. Bergvall-K\u00e5reborn & P. A. Nielsen (Eds.), Creating Value for All Through IT. TDIT 2014. IFIP Advances in Information and Communication Technology.\u00a0vol. 49. Berlin, Heidelberg: Springer.\u00a0\u00a0https:\/\/doi.org\/10.1007\/978-3-662-43459-8_6","DOI":"10.1007\/978-3-662-43459-8_6"},{"issue":"1","key":"10385_CR4","doi-asserted-by":"publisher","first-page":"101537","DOI":"10.1016\/j.giq.2020.101537","volume":"38","author":"A Alarabiat","year":"2021","unstructured":"Alarabiat, A., Soares, D., & Estevez, E. (2021). Determinants of citizens\u2019 intention to engage in government-led electronic participation initiatives through Facebook. Government Information Quarterly, 38(1), 101537. https:\/\/doi.org\/10.1016\/j.giq.2020.101537","journal-title":"Government Information Quarterly"},{"issue":"5","key":"10385_CR5","doi-asserted-by":"publisher","first-page":"412","DOI":"10.2307\/2061986","volume":"3","author":"D Amick","year":"1974","unstructured":"Amick, D., Kerlinger, F. N., & Pedhazur, E. J. (1974). Multiple Regression in Behavioral Research. Contemporary Sociology, 3(5), 412. https:\/\/doi.org\/10.2307\/2061986","journal-title":"Contemporary Sociology"},{"key":"10385_CR6","unstructured":"Bagchi, K., Udo, G., & Kesh, M. (2005). An empirical study identifying the factors that impact EHealth infrastructure and EHealth use. Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale, 5, 2065\u20132073. https:\/\/aisel.aisnet.org\/amcis2005\/295"},{"key":"10385_CR7","unstructured":"Baller, S., Dutta, S., & Lanvin, B. (2016). The global information technology report 2016 innovating in the digital economy. In The Global Information Technology Report 2016. https:\/\/www.weforum.org\/reports\/the-global-information-technology-report-2016. Accessed 01 Oct 2021"},{"issue":"2","key":"10385_CR8","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1891\/0889-8391.13.2.158","volume":"13","author":"A Bandura","year":"1999","unstructured":"Bandura, A., Freeman, W. H., & Lightsey, R. (1999). Self-Efficacy: The Exercise of Control. Journal of Cognitive Psychotherapy, 13(2), 158\u2013166. https:\/\/doi.org\/10.1891\/0889-8391.13.2.158","journal-title":"Journal of Cognitive Psychotherapy"},{"issue":"1","key":"10385_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.giq.2011.05.003","volume":"29","author":"A Beldad","year":"2012","unstructured":"Beldad, A., van der Geest, T., De Jong, M., & Steehouder, M. (2012). A cue or two and I\u2019ll trust you: Determinants of trust in government organizations in terms of their processing and usage of citizens\u2019 personal information disclosed online. Government Information Quarterly, 29(1), 41\u201349. https:\/\/doi.org\/10.1016\/j.giq.2011.05.003","journal-title":"Government Information Quarterly"},{"key":"10385_CR10","unstructured":"Bergquist, M., Ljungberg, J., Remneland, B., & Rolandsson, B. (2017). From e-government to e-governance: Social media and public authorities legitimacy work. Proceedings of the 25th European Conference on Information Systems, ECIS 2017, 858\u2013872. http:\/\/aisel.aisnet.org\/ecis2017_rp"},{"issue":"3","key":"10385_CR11","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.giq.2010.03.001","volume":"27","author":"JC Bertot","year":"2010","unstructured":"Bertot, J. C., Jaeger, P. T., & Grimes, J. M. (2010). Using ICTs to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies. Government Information Quarterly, 27(3), 264\u2013271. https:\/\/doi.org\/10.1016\/j.giq.2010.03.001","journal-title":"Government Information Quarterly"},{"issue":"1","key":"10385_CR12","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.giq.2011.04.004","volume":"29","author":"JC Bertot","year":"2012","unstructured":"Bertot, J. C., Jaeger, P. T., & Hansen, D. (2012). The impact of polices on government social media usage: Issues, challenges, and recommendations. Government Information Quarterly, 29(1), 30\u201340. https:\/\/doi.org\/10.1016\/j.giq.2011.04.004","journal-title":"Government Information Quarterly"},{"key":"10385_CR13","unstructured":"Chin, W. W. (1998). The partial least squares approach for structural equation modeling. In Modern methods for business research (pp. 295\u2013336). http:\/\/www.researchgate.net\/publication\/232569511"},{"issue":"2","key":"10385_CR14","doi-asserted-by":"publisher","first-page":"129","DOI":"10.3233\/IP-2012-0273","volume":"17","author":"SA Chun","year":"2012","unstructured":"Chun, S. A., & Cho, J. S. (2012). E-participation and transparent policy decision making. Information Polity, 17(2), 129\u2013145. https:\/\/doi.org\/10.3233\/IP-2012-0273","journal-title":"Information Polity"},{"key":"10385_CR15","unstructured":"CISA. (2019). What is Cybersecurity? National Cyber Awareness System. https:\/\/www.cisa.gov\/uscert\/ncas\/tips\/ST04-001. Accessed 2 Dec 2021"},{"issue":"4","key":"10385_CR16","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/j.im.2016.09.006","volume":"54","author":"A Das","year":"2017","unstructured":"Das, A., Singh, H., & Joseph, D. (2017). A longitudinal study of e-government maturity. Information and Management, 54(4), 415\u2013426. https:\/\/doi.org\/10.1016\/j.im.2016.09.006","journal-title":"Information and Management"},{"key":"10385_CR17","doi-asserted-by":"publisher","unstructured":"Di Gregorio, D., Kassicieh, S. K., & De Gouvea Neto, R. (2005). Drivers of e-business activity in developed and emerging markets. IEEE Transactions on Engineering Management, 52(2), 155\u2013166. https:\/\/doi.org\/10.1109\/TEM.2005.844464","DOI":"10.1109\/TEM.2005.844464"},{"key":"10385_CR18","doi-asserted-by":"publisher","unstructured":"Dutt, A. K., & Ros, J. (2008). International handbook of development economics, Volumes 1 & 2. In International Handbook of Development Economics, Volumes 1 & 2. Edward Elgar. https:\/\/doi.org\/10.4337\/9781848442818.00046","DOI":"10.4337\/9781848442818.00046"},{"key":"10385_CR19","doi-asserted-by":"publisher","unstructured":"Dwivedi, Y. K., Kelly, G., Janssen, M., Rana, N. P., Slade, E. L., & Clement, M. (2018). Social Media: The good, the bad, and the ugly. In Information Systems Frontiers (Vol. 20, Issue 3, pp. 419\u2013423). Springer New York LLC. https:\/\/doi.org\/10.1007\/s10796-018-9848-5","DOI":"10.1007\/s10796-018-9848-5"},{"key":"10385_CR20","doi-asserted-by":"publisher","unstructured":"Endong, F. P.\u00a0 (2018). Exploring the Role of Social Media in Transnational Advocacy. IGI Global. https:\/\/doi.org\/10.4018\/978-1-5225-2854-8","DOI":"10.4018\/978-1-5225-2854-8"},{"issue":"4","key":"10385_CR21","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/j.giq.2013.05.018","volume":"30","author":"E Ferro","year":"2013","unstructured":"Ferro, E., Loukis, E. N., Charalabidis, Y., & Osella, M. (2013). Policy making 2.0: From theory to practice. Government Information Quarterly, 30(4), 359\u2013368. https:\/\/doi.org\/10.1016\/j.giq.2013.05.018","journal-title":"Government Information Quarterly"},{"key":"10385_CR22","doi-asserted-by":"publisher","DOI":"10.4135\/9781412985604","volume-title":"Regression Diagnostics","author":"J Fox","year":"1991","unstructured":"Fox, J. (1991). Regression Diagnostics. Newbury Park, CA: Sage. https:\/\/doi.org\/10.4135\/9781412985604"},{"key":"10385_CR23","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/CONGRESS.2009.26","volume-title":"2009 World Congress on Privacy, Security, Trust and the Management of e-Business","author":"RJ Freeman","year":"2009","unstructured":"Freeman, R. J., & Loo, P. (2009). Web 2.0 and E-government at the municipal level. 2009 World Congress on Privacy, Security, Trust and the Management of e-Business (pp. 70\u201378). https:\/\/doi.org\/10.1109\/CONGRESS.2009.26"},{"key":"10385_CR24","unstructured":"Gujarati, D. N., Porter, D. C., & Gunasekar, S. (2012). Basic econometrics. Tata McGraw-Hill Education."},{"key":"10385_CR25","doi-asserted-by":"publisher","unstructured":"Hacche, G. (1979). The theory of economic growth. In The Theory of Economic Growth. Macmillan Education UK. https:\/\/doi.org\/10.1007\/978-1-349-16221-5","DOI":"10.1007\/978-1-349-16221-5"},{"key":"10385_CR26","unstructured":"Hair, J. F., Black, W., Babin, B., & Anderson, R. (2010). Multivariate data analysis: A global perspective. In Multivariate Data Analysis: A Global Perspective (Vol. 7th)"},{"issue":"2","key":"10385_CR27","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1504\/IJMDA.2017.087624","volume":"1","author":"JF Hair","year":"2017","unstructured":"Hair, J. F., Matthews, L. M., Matthews, R. L., & Sarstedt, M. (2017). PLS-SEM or CB-SEM: Updated guidelines on which method to use. International Journal of Multivariate Data Analysis, 1(2), 107\u2013123.","journal-title":"International Journal of Multivariate Data Analysis"},{"key":"10385_CR28","doi-asserted-by":"publisher","unstructured":"Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. In European Business Review (Vol. 31, Issue 1, pp. 2\u201324). Emerald Group Publishing Ltd. https:\/\/doi.org\/10.1108\/EBR-11-2018-0203","DOI":"10.1108\/EBR-11-2018-0203"},{"key":"10385_CR29","unstructured":"Hair, J.F., Hult, G.T.M., Ringle, C.M. and Sarstedt, M. (2017a), A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), Sage, Thousand Oaks, CA."},{"key":"10385_CR30","unstructured":"Hayes, A. F. (2017). Introduction to mediation, moderation, and conditional process analysis: A regression-based approach. In Guilford Publications (2nd ed., Issue March). Guilford Publications"},{"key":"10385_CR31","unstructured":"Heinze, N., & Hu, Q. (2005). E-government research: A review via the lens of structuration theory. 9th Pacific Asia Conference on Information Systems: I.T. and Value Creation, PACIS 2005, 891\u2013904"},{"issue":"2","key":"10385_CR32","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1057\/ejis.2009.6","volume":"18","author":"T Herath","year":"2009","unstructured":"Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106\u2013125. https:\/\/doi.org\/10.1057\/ejis.2009.6","journal-title":"European Journal of Information Systems"},{"key":"10385_CR33","unstructured":"Hrdinov\u00e1, J., Helbig, N., & Peters, C. (2010). Designing social media policy for government: Eight essential elements. In Designing social media policy for government: Eight essential elements. www.ctg.albany.edu. Accessed 15 Feb 2021"},{"issue":"4","key":"10385_CR34","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1145\/2096140.2096147","volume":"42","author":"P Ifinedo","year":"2011","unstructured":"Ifinedo, P. (2011). Factors influencing e-government maturity in transition economies and developing countries: A longitudinal perspective. Data Base for Advances in Information Systems, 42(4), 98\u2013116. https:\/\/doi.org\/10.1145\/2096140.2096147","journal-title":"Data Base for Advances in Information Systems"},{"key":"10385_CR35","unstructured":"ITU. (2018). Global Cybersecurity Index (GCI) 2018 ITUPublications Studies & research"},{"issue":"4","key":"10385_CR36","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1016\/j.giq.2014.07.005","volume":"31","author":"GJ Jeff Gulati","year":"2014","unstructured":"Jeff Gulati, G. J., Williams, C. B., & Yates, D. J. (2014). Predictors of on-line services and e-participation: A cross-national comparison. Government Information Quarterly, 31(4), 526\u2013533. https:\/\/doi.org\/10.1016\/j.giq.2014.07.005","journal-title":"Government Information Quarterly"},{"issue":"2","key":"10385_CR37","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1080\/02681102.2013.814040","volume":"20","author":"JL Jenkins","year":"2014","unstructured":"Jenkins, J. L., Grimes, M., Proudfoot, J. G., & Lowry, P. B. (2014). Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals. Information Technology for Development, 20(2), 196\u2013213. https:\/\/doi.org\/10.1080\/02681102.2013.814040","journal-title":"Information Technology for Development"},{"issue":"3","key":"10385_CR38","doi-asserted-by":"publisher","first-page":"36","DOI":"10.2979\/eservicej.11.3.02","volume":"11","author":"A Khan","year":"2020","unstructured":"Khan, A., & Krishnan, S. (2020). Virtual social networks diffusion, governance mechanisms, and e-participation implementation: A cross-country investigation. E-Service Journal, 11(3), 36. https:\/\/doi.org\/10.2979\/eservicej.11.3.02","journal-title":"E-Service Journal"},{"key":"10385_CR39","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/s10796-020-10039-y","volume":"24","author":"A Khan","year":"2022","unstructured":"Khan, A., Krishnan, S., & Arayankalam, J. (2022). The role of ICT laws and national culture in determining ICT diffusion and well-being: A cross-country examination. Information Systems Frontiers., 24, 415\u2013440. https:\/\/doi.org\/10.1007\/s10796-020-10039-y","journal-title":"Information Systems Frontiers."},{"key":"10385_CR40","doi-asserted-by":"publisher","unstructured":"Kiecolt, K. J., & Nathan, L. E. (1985). Secondary analysis of survey data (Vol. 53). Sage Publications Beverly Hills, CA, https:\/\/doi.org\/10.4135\/9781412985796","DOI":"10.4135\/9781412985796"},{"key":"10385_CR41","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10551-020-04598-y","volume":"1","author":"H Latan","year":"2020","unstructured":"Latan, H., ChiappettaJabbour, C. J., de Sousa, L., & Jabbour, A. B. (2020). Social media as a form of virtual whistleblowing: Empirical evidence for elements of the diamond model. Journal of Business Ethics, 1, 3. https:\/\/doi.org\/10.1007\/s10551-020-04598-y","journal-title":"Journal of Business Ethics"},{"key":"10385_CR42","unstructured":"Le Blanc, D. (2020). E-participation: a quick overview of recent qualitative trends. In DESA Working Paper (Issue 163). https:\/\/www.un.org\/development\/desa\/CONTENTS. Accessed 18 Jan 2021"},{"issue":"2","key":"10385_CR43","first-page":"iii","volume":"39","author":"JK Lee","year":"2015","unstructured":"Lee, J. K. (2015). Guest Editorial: Research Framework for AIS Grand Vision of the Bright ICT Initiative. MIS Quarterly, 39(2), iii\u2013xii. https:\/\/aisel.aisnet.org\/misq\/vol39\/iss2\/2\/.","journal-title":"MIS Quarterly"},{"issue":"1","key":"10385_CR44","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s10796-020-09984-5","volume":"22","author":"JK Lee","year":"2020","unstructured":"Lee, J. K., Chang, Y., Kwon, H. Y., & Kim, B. (2020). Reconciliation of privacy with preventive cybersecurity: The bright internet approach. Information Systems Frontiers, 22(1), 45\u201357. https:\/\/doi.org\/10.1007\/s10796-020-09984-5","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"10385_CR45","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1016\/j.giq.2012.06.003","volume":"29","author":"D Linders","year":"2012","unstructured":"Linders, D. (2012). From e-government to we-government: Defining a typology for citizen coproduction in the age of social media. Government Information Quarterly, 29(4), 446\u2013454. https:\/\/doi.org\/10.1016\/j.giq.2012.06.003","journal-title":"Government Information Quarterly"},{"issue":"4","key":"10385_CR46","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1080\/19331680801975789","volume":"4","author":"H-S Lyu","year":"2008","unstructured":"Lyu, H.-S. (2008). The public\u2019s e-participation capacity and motivation in Korea: A web survey analysis from a new institutionalist perspective. Journal of Information Technology & Politics, 4(4), 65\u201379.","journal-title":"Journal of Information Technology & Politics"},{"key":"10385_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-03781-8_1","volume":"25694","author":"A Macintosh","year":"2009","unstructured":"Macintosh, A., Coleman, S., & Schneeberger, A. (2009). eParticipation: The research gaps. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 25694, 1\u201311. https:\/\/doi.org\/10.1007\/978-3-642-03781-8_1","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"issue":"2","key":"10385_CR48","doi-asserted-by":"publisher","first-page":"148","DOI":"10.3390\/admsci2020148","volume":"2","author":"MJ Magro","year":"2012","unstructured":"Magro, M. J. (2012). A review of social media use in E-Government. Administrative Sciences, 2(2), 148\u2013161. https:\/\/doi.org\/10.3390\/admsci2020148","journal-title":"Administrative Sciences"},{"issue":"1","key":"10385_CR49","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1057\/ejis.2008.56","volume":"18","author":"P Meso","year":"2009","unstructured":"Meso, P., Musa, P., Straub, D., & Mbarika, V. (2009). Information infrastructure, governance, and socio-economic development in developing countries. European Journal of Information Systems, 18(1), 52\u201365. https:\/\/doi.org\/10.1057\/ejis.2008.56","journal-title":"European Journal of Information Systems"},{"key":"10385_CR50","unstructured":"Microsoft. (2009). The STRIDE Threat Model | Microsoft Docs. Microsoft Docs. https:\/\/docs.microsoft.com\/en-us\/previous-versions\/commerce-server\/ee823878(v=cs.20)?redirectedfrom=MSDN. 12 Feb 2021"},{"key":"10385_CR51","doi-asserted-by":"publisher","unstructured":"Moon, M. J., Welch, E. W., & Wong, W. (2005). What drives global E-governance? An exploratory study at a macro level. Proceedings of the Annual Hawaii International Conference on System Sciences, 131. https:\/\/doi.org\/10.1109\/HICSS.2005.688","DOI":"10.1109\/HICSS.2005.688"},{"issue":"5","key":"10385_CR52","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1007\/s10796-017-9808-5","volume":"21","author":"A Mukhopadhyay","year":"2019","unstructured":"Mukhopadhyay, A., Chatterjee, S., Bagchi, K. K., Kirs, P. J., & Shukla, G. K. (2019). Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance. Information Systems Frontiers, 21(5), 997\u20131018. https:\/\/doi.org\/10.1007\/s10796-017-9808-5","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"10385_CR53","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.giq.2011.07.005","volume":"29","author":"T Nam","year":"2012","unstructured":"Nam, T. (2012). Suggesting frameworks of citizen-sourcing via Government 2.0. Government Information Quarterly, 29(1), 12\u201320. https:\/\/doi.org\/10.1016\/j.giq.2011.07.005","journal-title":"Government Information Quarterly"},{"issue":"2","key":"10385_CR54","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.giq.2018.01.005","volume":"35","author":"T Nam","year":"2018","unstructured":"Nam, T. (2018). Examining the anti-corruption effect of e-government and the moderating effect of national culture: A cross-country study. Government Information Quarterly, 35(2), 273\u2013282. https:\/\/doi.org\/10.1016\/j.giq.2018.01.005","journal-title":"Government Information Quarterly"},{"issue":"1","key":"10385_CR55","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1111\/j.1540-6210.2005.00431.x","volume":"65","author":"DF Norris","year":"2005","unstructured":"Norris, D. F., & Moon, M. J. (2005). Advancing E-government at the grassroots: Tortoise or Hare? Public Administration Review, 65(1), 64\u201375. https:\/\/doi.org\/10.1111\/j.1540-6210.2005.00431.x","journal-title":"Public Administration Review"},{"key":"10385_CR56","doi-asserted-by":"publisher","first-page":"276","DOI":"10.3233\/978-1-61499-429-9-276","volume":"21","author":"MW Osmani","year":"2014","unstructured":"Osmani, M. W., Weerakkody, V., Sivarajah, U., & El-Haddadeh, R. (2014). The public value of social media in the UK public sector. Innovation and the Public Sector, 21, 276\u2013286. https:\/\/doi.org\/10.3233\/978-1-61499-429-9-276","journal-title":"Innovation and the Public Sector"},{"key":"10385_CR57","unstructured":"Othman, M. H., Razali, R., & Nasrudin, M. F. (2020). Key factors for e-government towards sustainable development goals. International Journal of Advanced Science and Technology, 29(6 Special Issue), 2864\u20132876. https:\/\/www.researchgate.net\/publication\/341509023"},{"issue":"9","key":"10385_CR58","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1080\/14719037.2015.1066418","volume":"18","author":"MJ Park","year":"2016","unstructured":"Park, M. J., Kang, D., Rho, J. J., & Lee, D. H. (2016). Policy role of social media in developing public trust: Twitter communication with government leaders. Public Management Review, 18(9), 1265\u20131288. https:\/\/doi.org\/10.1080\/14719037.2015.1066418","journal-title":"Public Management Review"},{"issue":"1","key":"10385_CR59","doi-asserted-by":"publisher","first-page":"101422","DOI":"10.1016\/j.giq.2019.101422","volume":"37","author":"BR Pflughoeft","year":"2020","unstructured":"Pflughoeft, B. R., & Schneider, I. E. (2020). Social media as E-participation: Can a multiple hierarchy stratification perspective predict public interest? Government Information Quarterly, 37(1), 101422. https:\/\/doi.org\/10.1016\/j.giq.2019.101422","journal-title":"Government Information Quarterly"},{"issue":"12","key":"10385_CR60","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/1409360.1409385","volume":"51","author":"CW Phang","year":"2008","unstructured":"Phang, C. W., & Kankanhalli, A. (2008). A framework of ICT exploitation for e-participation initiatives. Communications of the ACM, 51(12), 128\u2013132. https:\/\/doi.org\/10.1145\/1409360.1409385","journal-title":"Communications of the ACM"},{"key":"10385_CR61","unstructured":"Portulans Institute. (2019). In S. Dutta & B. Lanvin (Eds.), The Network Readiness Index 2019: Towards a future-ready society. Available online: https:\/\/networkreadinessindex.org\/wp-content\/uploads\/2020\/03\/The-Network-Readiness-Index-2019-New-version-March-2020.pdf\u00a0(accessed on 10 January 2021)."},{"issue":"4","key":"10385_CR62","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1080\/07421222.2015.1138374","volume":"32","author":"C Posey","year":"2015","unstructured":"Posey, C., Roberts, T. L., & Lowry, P. B. (2015). The impact of organizational commitment on insiders motivation to protect organizational information assets. Journal of Management Information Systems, 32(4), 179\u2013214. https:\/\/doi.org\/10.1080\/07421222.2015.1138374","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"10385_CR63","doi-asserted-by":"publisher","first-page":"879","DOI":"10.3758\/BRM.40.3.879","volume":"40","author":"KJ Preacher","year":"2008","unstructured":"Preacher, K. J., & Hayes, A. F. (2008). Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models. Behavior Research Methods, 40(3), 879\u2013891. https:\/\/doi.org\/10.3758\/BRM.40.3.879","journal-title":"Behavior Research Methods"},{"issue":"3","key":"10385_CR64","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/s10796-013-9431-z","volume":"17","author":"NP Rana","year":"2015","unstructured":"Rana, N. P., Dwivedi, Y. K., & Williams, M. D. (2015). A meta-analysis of existing research on citizen adoption of e-government. Information Systems Frontiers, 17(3), 547\u2013563. https:\/\/doi.org\/10.1007\/s10796-013-9431-z","journal-title":"Information Systems Frontiers"},{"key":"10385_CR65","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.ins.2017.08.063","volume":"421","author":"S Rathore","year":"2017","unstructured":"Rathore, S., Sharma, P. K., Loia, V., Jeong, Y. S., & Park, J. H. (2017). Social network security: Issues, challenges, threats, and solutions. Information Sciences, 421, 43\u201369. https:\/\/doi.org\/10.1016\/j.ins.2017.08.063","journal-title":"Information Sciences"},{"key":"10385_CR66","unstructured":"Ringle C. M., Wende, S., & Becker, J-M. (2015). SmartPLS 3. https:\/\/www.smartpls.com"},{"key":"10385_CR67","first-page":"153","volume-title":"Social Psychophysiology: A Sourcebook","author":"RW Rogers","year":"1983","unstructured":"Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In J. T. Cacioppo & R. E. Petty (Eds.), Social Psychophysiology: A Sourcebook (pp. 153\u2013176). New York: Guilford Press."},{"key":"10385_CR68","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-642-03781-8_5","volume-title":"In Electronic Participation: First International Conference, ePart 2009 Linz, Austria, September 1-3, 2009 Proceedings 1","author":"\u00d8 S\u00e6b\u00f8","year":"2009","unstructured":"S\u00e6b\u00f8, \u00d8., Rose, J., & Nyvang, T. (2009). The role of social networking services in eParticipation. In Electronic Participation: First International Conference, ePart 2009 Linz, Austria, September 1-3, 2009 Proceedings 1 (pp. 46\u201355). Berlin, Heidelberg: Springer. https:\/\/doi.org\/10.1007\/978-3-642-03781-8_5"},{"key":"10385_CR69","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.chb.2015.01.046","volume":"48","author":"R Shillair","year":"2015","unstructured":"Shillair, R., Cotten, S. R., Tsai, H. Y. S., Alhabash, S., Larose, R., & Rifon, N. J. (2015). Online safety begins with you and me: Convincing Internet users to protect themselves. Computers in Human Behavior, 48, 199\u2013207. https:\/\/doi.org\/10.1016\/j.chb.2015.01.046","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"10385_CR70","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.im.2013.08.006","volume":"51","author":"M Siponen","year":"2014","unstructured":"Siponen, M., Adam Mahmood, M., & Pahnila, S. (2014). Employees\u2019 adherence to information security policies: An exploratory field study. Information and Management, 51(2), 217\u2013224. https:\/\/doi.org\/10.1016\/j.im.2013.08.006","journal-title":"Information and Management"},{"issue":"2","key":"10385_CR71","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1080\/15309576.2015.1108798","volume":"39","author":"C Song","year":"2016","unstructured":"Song, C., & Lee, J. (2016). Citizens use of social media in government, perceived transparency, and trust in government. Public Performance and Management Review, 39(2), 430\u2013453. https:\/\/doi.org\/10.1080\/15309576.2015.1108798","journal-title":"Public Performance and Management Review"},{"issue":"4","key":"10385_CR72","doi-asserted-by":"publisher","first-page":"20","DOI":"10.4018\/jgim.2007100102","volume":"15","author":"SC Srivastava","year":"2007","unstructured":"Srivastava, S. C., & Teo, T. S. (2007). E-government payoffs: Evidence from cross-country data. Journal of Global Information Management (JGIM), 15(4), 20\u201340.","journal-title":"Journal of Global Information Management (JGIM)"},{"issue":"5","key":"10385_CR73","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.elerap.2015.06.001","volume":"14","author":"S Takieddine","year":"2015","unstructured":"Takieddine, S., & Sun, J. (2015). Internet banking diffusion: A country-level analysis. Electronic Commerce Research and Applications, 14(5), 361\u2013371. https:\/\/doi.org\/10.1016\/j.elerap.2015.06.001","journal-title":"Electronic Commerce Research and Applications"},{"issue":"4","key":"10385_CR74","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1080\/07352166.2019.1572455","volume":"43","author":"T Tang","year":"2021","unstructured":"Tang, T., Hou, J., Fay, D. L., & Annis, C. (2021). Revisit the drivers and barriers to e-governance in the mobile age: A case study on the adoption of city management mobile apps for smart urban governance. Journal of Urban Affairs, 43(4), 563\u2013585.","journal-title":"Journal of Urban Affairs"},{"issue":"1","key":"10385_CR75","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1093\/jopart\/mug010","volume":"13","author":"JC Thomas","year":"2003","unstructured":"Thomas, J. C., & Streib, G. (2003). The new face of government: Citizen-Initiated contacts in the Era of E-Government. Journal of Public Administration Research and Theory, 13(1), 83\u2013102. https:\/\/doi.org\/10.1093\/jopart\/mug010","journal-title":"Journal of Public Administration Research and Theory"},{"issue":"3","key":"10385_CR76","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1016\/j.giq.2019.02.002","volume":"36","author":"M Toots","year":"2019","unstructured":"Toots, M. (2019). Why E-participation systems fail: The case of Estonia\u2019s Osale.ee. Government Information Quarterly, 36(3), 546\u2013559. https:\/\/doi.org\/10.1016\/j.giq.2019.02.002","journal-title":"Government Information Quarterly"},{"key":"10385_CR77","unstructured":"Transparency International. (2016). Corruption Perceptions Index 2016. www.transparency.org. Accessed 10 Jan 2021"},{"issue":"3","key":"10385_CR78","doi-asserted-by":"publisher","first-page":"e175","DOI":"10.1016\/S2589-7500(20)30315-0","volume":"3","author":"SF Tsao","year":"2021","unstructured":"Tsao, S. F., Chen, H., Tisseverasinghe, T., Yang, Y., Li, L., & Butt, Z. A. (2021). What social media told us in the time of COVID-19: a scoping review. The Lancet Digital Health, 3(3), e175\u2013e194. https:\/\/doi.org\/10.1016\/S2589-7500(20)30315-0. Elsevier Ltd.","journal-title":"The Lancet Digital Health"},{"issue":"2","key":"10385_CR79","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.giq.2019.01.001","volume":"36","author":"JD Twizeyimana","year":"2019","unstructured":"Twizeyimana, J. D., & Andersson, A. (2019). The public value of E-Government \u2013 A literature review. Government Information Quarterly, 36(2), 167\u2013178. https:\/\/doi.org\/10.1016\/j.giq.2019.01.001. Elsevier Ltd.","journal-title":"Government Information Quarterly"},{"issue":"1","key":"10385_CR80","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/s41111-020-00167-w","volume":"6","author":"A Ullah","year":"2021","unstructured":"Ullah, A., Pinglu, C., Ullah, S., Abbas, H. S. M., & Khan, S. (2021). The role of E-Governance in combating COVID-19 and promoting sustainable development: A comparative study of China and Pakistan. Chinese Political Science Review, 6(1), 86\u2013118. https:\/\/doi.org\/10.1007\/s41111-020-00167-w","journal-title":"Chinese Political Science Review"},{"key":"10385_CR81","unstructured":"UNDP. (2020). Human Development Report 2020 - The next frontier Human development and the Anthropocene. http:\/\/hdr.undp.org"},{"key":"10385_CR82","unstructured":"United Nations. (2020). 2020 United Nations E-Government Survey: Digital Government in the Decade of Action for Sustainable Development.\u00a0Available:\u00a0\u00a0https:\/\/publicadministration.un.org\/egovkb\/en-us\/Reports\/UN-E-Government-Survey-2020. Accessed 20 Jan 2021"},{"key":"10385_CR83","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.ijhcs.2018.11.003","volume":"123","author":"R van Bavel","year":"2019","unstructured":"van Bavel, R., Rodr\u00edguez-Priego, N., Vila, J., & Briggs, P. (2019). Using protection motivation theory in the design of nudges to improve online security behavior. International Journal of Human Computer Studies, 123, 29\u201339. https:\/\/doi.org\/10.1016\/j.ijhcs.2018.11.003","journal-title":"International Journal of Human Computer Studies"},{"issue":"3","key":"10385_CR84","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.giq.2013.12.006","volume":"31","author":"MR Vicente","year":"2014","unstructured":"Vicente, M. R., & Novo, A. (2014). An empirical analysis of e-participation. The role of social networks and e-government over citizens\u2019 online engagement. Government Information Quarterly, 31(3), 379\u2013387. https:\/\/doi.org\/10.1016\/j.giq.2013.12.006","journal-title":"Government Information Quarterly"},{"issue":"9","key":"10385_CR85","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1080\/14719037.2014.930505","volume":"17","author":"WH Voorberg","year":"2015","unstructured":"Voorberg, W. H., Bekkers, V. J. J. M., & Tummers, L. G. (2015). A systematic review of Co-Creation and Co-Production: Embarking on the social innovation journey. Public Management Review, 17(9), 1333\u20131357. https:\/\/doi.org\/10.1080\/14719037.2014.930505","journal-title":"Public Management Review"},{"issue":"1","key":"10385_CR86","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1111\/j.1540-6210.2004.00343.x","volume":"64","author":"DM West","year":"2004","unstructured":"West, D. M. (2004). E-Government and the transformation of service delivery and citizen attitudes. Public Administration Review, 64(1), 15\u201327. https:\/\/doi.org\/10.1111\/j.1540-6210.2004.00343.x","journal-title":"Public Administration Review"},{"key":"10385_CR87","volume-title":"The information revolution and developing countries","author":"EJ Wilson","year":"2004","unstructured":"Wilson, E. J. (2004). The information revolution and developing countries. Cambridge, MA: MIT press."},{"issue":"5","key":"10385_CR88","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1177\/109019810002700506","volume":"27","author":"K Witte","year":"2000","unstructured":"Witte, K., & Allen, M. (2000). A meta-analysis of fear appeals: Implications for effective public health campaigns. Health Education and Behavior, 27(5), 591\u2013615. https:\/\/doi.org\/10.1177\/109019810002700506","journal-title":"Health Education and Behavior"},{"key":"10385_CR89","doi-asserted-by":"publisher","first-page":"66","DOI":"10.4018\/978-1-59140-144-5.ch005","volume-title":"The handbook of information systems research","author":"AB Woszczynski","year":"2004","unstructured":"Woszczynski, A. B., & Whitman, M. E. (2004). The problem of common method variance in IS research. The handbook of information systems research (pp. 66\u201374). Igi Global."},{"issue":"2","key":"10385_CR90","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1086\/651257","volume":"37","author":"X Zhao","year":"2010","unstructured":"Zhao, X., Lynch, J. G., & Chen, Q. (2010). Reconsidering Baron and Kenny: Myths and truths about mediation analysis. Journal of Consumer Research, 37(2), 197\u2013206. https:\/\/doi.org\/10.1086\/651257","journal-title":"Journal of Consumer Research"},{"issue":"4","key":"10385_CR91","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1016\/j.giq.2014.06.004","volume":"31","author":"Y Zheng","year":"2014","unstructured":"Zheng, Y., Schachter, H. L., & Holzer, M. (2014). The impact of government form on e-participation: A study of New Jersey municipalities. Government Information Quarterly, 31(4), 653\u2013659. https:\/\/doi.org\/10.1016\/j.giq.2014.06.004","journal-title":"Government Information Quarterly"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-023-10385-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-023-10385-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-023-10385-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T01:09:38Z","timestamp":1744160978000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-023-10385-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,17]]},"references-count":91,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["10385"],"URL":"https:\/\/doi.org\/10.1007\/s10796-023-10385-7","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,17]]},"assertion":[{"value":"14 March 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author has no conflicts of interest to declare. There are no financial interests to disclose. I certify that the submission is original work and is not under review at any other publication.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}