{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:47:08Z","timestamp":1762505228749,"version":"3.41.2"},"reference-count":26,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2007,4,24]],"date-time":"2007-04-24T00:00:00Z","timestamp":1177372800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,4,24]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper sets out to contribute to making the use of the Dubai e\u2010government services more secure and facilitating the process of introducing new services, while maintaining the integrity and security of the whole system.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>This work is based on the ISO 17799 standard. ISO 17799 a comprehensive set of controls comprising best practices in information security. It is essentially, in part, an internationally\u2010recognized generic information security standard (<jats:italic>The ISO 17799 Directory<\/jats:italic>).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The system has achieved its objectives in terms of performance, cost, reliability and flexibility.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The system assumes that the fed information is true and authenticated. However, this may not always be the case. Therefore, onsite manual verification may be required at the very end of the process.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The system would serve accelerating and facilitating the process of expanding the e\u2010services provided by the Dubai e\u2010government within the set timeframe.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14637150710740473","type":"journal-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T09:30:45Z","timestamp":1175765445000},"page":"223-246","source":"Crossref","is-referenced-by-count":11,"title":["Online security evaluation process for new e\u2010services"],"prefix":"10.1108","volume":"13","author":[{"given":"Mihyar","family":"Hesson","sequence":"first","affiliation":[]},{"given":"Hayder","family":"Al\u2010Ameed","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021720425101600_b1","doi-asserted-by":"crossref","unstructured":"Aldrich, D., Bertot, J. and McClure, C. (2002), \u201cE\u2010government: initiatives, developments, and issues\u201d, Government Information Quarterly, Vol. 19 No. 4, pp. 349\u201055.","DOI":"10.1016\/S0740-624X(02)00130-2"},{"key":"key2022021720425101600_b2","unstructured":"Al\u2010Shaer, S. (2003), \u201cFrom vision to reality\u201d, e4all, the official magazine of Dubai e\u2010government, No. 1, p. 1."},{"key":"key2022021720425101600_b3","unstructured":"Al\u2010Shaer, S. (2004), \u201cThe super city\u201d, e4all, the official magazine of Dubai e\u2010government, No. 11, p. 1."},{"key":"key2022021720425101600_b4","unstructured":"Applegate, L., McFarlan, F. and McKenney, J. (1999), Corporate Information Systems Management: The Challenges of Managing in an Information Age, Irwin McGraw\u2010Hill, Boston, MA."},{"key":"key2022021720425101600_b5","doi-asserted-by":"crossref","unstructured":"Burn, J. and Robins, G. (2003), \u201cMoving towards e\u2010government: a case study of organizational change processes\u201d, Logistics (Enterprise) Information Management, Vol. 16 No. 1, pp. 25\u201035.","DOI":"10.1108\/09576050310453714"},{"key":"key2022021720425101600_b6","doi-asserted-by":"crossref","unstructured":"Chen, Y. and Gant, J. (2001), \u201cTransforming local e\u2010government services: the use of application service providers\u201d, Government Information Quarterly, Vol. 18, pp. 343\u201055.","DOI":"10.1016\/S0740-624X(01)00090-9"},{"key":"key2022021720425101600_b7","doi-asserted-by":"crossref","unstructured":"Devadoss, P.R., Pan, S.L. and Huang, J.C. (2002), \u201cStructurational analysis of e\u2010government initiatives: a case study of SCO\u201d, Decision Support Systems, Vol. 34, pp. 253\u201069.","DOI":"10.1016\/S0167-9236(02)00120-3"},{"key":"key2022021720425101600_b8","unstructured":"Dridi, F., Pernul, G. and Unger, V. (2001), \u201cSecurity for the electronic government\u201d, Proceedings of the European Conference on e\u2010Government, Trinity College, Dublin, Ireland, September."},{"key":"key2022021720425101600_b9","unstructured":"e4all (2004), e4all, the official magazine of Dubai e\u2010government, No. 13, p. 3."},{"key":"key2022021720425101600_b10","unstructured":"General Accounting Office (2001), \u201cElectronic government: challenges must be addressed with effective leadership and management\u201d, GAO\u201001\u2010959T, pp. 1\u20102."},{"key":"key2022021720425101600_b11","doi-asserted-by":"crossref","unstructured":"Glassey, O. (2004), \u201cDeveloping a one\u2010stop government data model\u201d, Government Information Quarterly, No. 2, pp. 156\u201069, available at: www.sciencedirect.com.","DOI":"10.1016\/j.giq.2003.12.012"},{"key":"key2022021720425101600_b12","doi-asserted-by":"crossref","unstructured":"Gupta, M.P. and Jana, D. (2003), \u201cE\u2010government evaluation: a framework and case study\u201d, Government Information Quarterly, Vol. 20, pp. 365\u201087.","DOI":"10.1016\/j.giq.2003.08.002"},{"key":"key2022021720425101600_b13","unstructured":"Hunter, W. (2000), \u201cNew pilot program tests info technology solution\u201d, PA TIMES, Vol. 23 No. 1, pp. 1, 3."},{"key":"key2022021720425101600_b14","doi-asserted-by":"crossref","unstructured":"Jaeger, P. (2002), \u201cConstitutional principles and e\u2010government: an opinion about possible effects of federalism and the separation of powers on e\u2010government policies\u201d, Government Information Quarterly, Vol. 19 No. 4, pp. 357\u201068.","DOI":"10.1016\/S0740-624X(02)00119-3"},{"key":"key2022021720425101600_b15","doi-asserted-by":"crossref","unstructured":"Jaeger, P. and Thompson, K. (2003), \u201cE\u2010government around the world: lessons, challenges, and future directions\u201d, Government Information Quarterly, Vol. 20, pp. 389\u201094.","DOI":"10.1016\/j.giq.2003.08.001"},{"key":"key2022021720425101600_b16","doi-asserted-by":"crossref","unstructured":"Joshi, J., Ghafoor, A., Aref, W. and Spafford, E. (2001), \u201cDigital government security infrastructure design challenges\u201d, IEEE Computer, Vol. 34 No. 2.","DOI":"10.1109\/2.901169"},{"key":"key2022021720425101600_b17","doi-asserted-by":"crossref","unstructured":"Kaylor, C., Deshazo, R. and Eck, D.V. (2001), \u201cGauging e government: a report on implementing services among American cities\u201d, Government Information Quarterly, Vol. 18, pp. 293\u2010307.","DOI":"10.1016\/S0740-624X(01)00089-2"},{"key":"key2022021720425101600_b18","doi-asserted-by":"crossref","unstructured":"Lambrinoudakisa, C., Gritzalisa, S., Dridib, F. and Pernul, G. (2003), \u201cSecurity requirements for e\u2010government services: a methodological approach for developing a common PKI\u2010based security policy\u201d, Computer Communications, Vol. 26, pp. 1873\u201083.","DOI":"10.1016\/S0140-3664(03)00082-3"},{"key":"key2022021720425101600_b19","doi-asserted-by":"crossref","unstructured":"Layne, K. and Lee, J. (2001), \u201cDeveloping fully functional e\u2010government: a four stage model\u201d, Government Information Quarterly, Vol. 18, pp. 122\u201036.","DOI":"10.1016\/S0740-624X(01)00066-1"},{"key":"key2022021720425101600_b20","doi-asserted-by":"crossref","unstructured":"Martin, A. (1999), \u201cMalicious employees the biggest threat to IT security\u201d, Computer Fraud & Security, Elsevier Science Ltd, Oxford.","DOI":"10.1016\/S1361-3723(99)90128-8"},{"key":"key2022021720425101600_b21","unstructured":"Norris, D.F., Fletcher, P.D. and Holden, S.H. (2001), Is Your Local Government Plugged In? Highlights of the 2000 Electronic Government Survey, University of Maryland, Baltimore, MD, February 27."},{"key":"key2022021720425101600_b22","doi-asserted-by":"crossref","unstructured":"Norris, P. (2001), Digital Divide: Civic Engagement, Information Poverty, and the Internet Worldwide, Cambridge University Press, Cambridge, p. 232.","DOI":"10.1017\/CBO9781139164887"},{"key":"key2022021720425101600_b23","doi-asserted-by":"crossref","unstructured":"Reddick, C.G. (2004), \u201cA two\u2010stage model of e\u2010government growth: theories and empirical evidence for US cities\u201d, Government Information Quarterly, Vol. 21, pp. 51\u201064.","DOI":"10.1016\/j.giq.2003.11.004"},{"key":"key2022021720425101600_b24","doi-asserted-by":"crossref","unstructured":"Sharifi, H. and Zarie, B. (2004), \u201cAn adaptive approach for implementing e\u2010government in I.R. Iran\u201d, Journal of Government Information, Vol. 30, pp. 600\u201019.","DOI":"10.1016\/j.jgi.2004.10.005"},{"key":"key2022021720425101600_b25","unstructured":"Sultan, Q. (2004), \u201cLong\u2010term investment in our e\u2010services\u201d, e4all, No. 9, p. 6, The official magazine of Dubai e\u2010government."},{"key":"key2022021720425101600_b26","doi-asserted-by":"crossref","unstructured":"Teicher, J., Hughes, O. and Dow, N. (2002), \u201cE\u2010government: a new route to public sector quality\u201d, Managing Service Quality, Vol. 12 No. 6, pp. 384\u201093.","DOI":"10.1108\/09604520210451867"}],"container-title":["Business Process Management Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14637150710740473","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637150710740473\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637150710740473\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:35:58Z","timestamp":1753403758000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/bpmj\/article\/13\/2\/223-246\/258460"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4,24]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,4,24]]}},"alternative-id":["10.1108\/14637150710740473"],"URL":"https:\/\/doi.org\/10.1108\/14637150710740473","relation":{},"ISSN":["1463-7154"],"issn-type":[{"type":"print","value":"1463-7154"}],"subject":[],"published":{"date-parts":[[2007,4,24]]}}}