{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T09:31:39Z","timestamp":1770975099676,"version":"3.50.1"},"reference-count":53,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2023,4,12]],"date-time":"2023-04-12T00:00:00Z","timestamp":1681257600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AJIM"],"published-print":{"date-parts":[[2024,6,26]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>The study focuses on influential factors of collaboration on government data security by the Chinese government.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>The article explores the case of e-government in the Chinese centralized unitary state system context, using a structured\u2013pragmatic\u2013situational (SPS) approach and the boundary theory as an analytical lens.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The findings indicate that e-government operates in highly interconnected environments where the\u00a0safe flow of government data requires collaborative and cross-boundary strategies. Any organization is a\u00a0potential \u201cweakest link\u201d. In addition, collaboration is fragmented by ambiguous accountability and organizational inertia across government departments, resources differences and limited visibility and measurability of security efforts across government levels and conflicts and uncertainties in principal\u2013agent relationships. The solutions for those obstacles are also discussed from the multi-function, multi-level and multi-actor dimensions, respectively. A multi-dimensional overarching security model for the flow of government data is proposed.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>The study advances the technology-oriented micro-analysis of previous studies on government data security to cross-organizational revealing at the macrolevel by connecting streams of research in information systems and public administration. These findings will contribute to making the safe flow of government data more resilient in the transformation of e-government.<\/jats:p><\/jats:sec>","DOI":"10.1108\/ajim-10-2022-0461","type":"journal-article","created":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T12:42:32Z","timestamp":1681130552000},"page":"629-652","source":"Crossref","is-referenced-by-count":6,"title":["Tension between the safe flow of government data across organizational boundaries and fragmentations in secure collaboration: the Chinese e-government"],"prefix":"10.1108","volume":"76","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5363-7617","authenticated-orcid":false,"given":"Zijun","family":"Mao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2398-1609","authenticated-orcid":false,"given":"Yuqian","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2023,4,12]]},"reference":[{"issue":"4","key":"key2024062606170591400_ref001","doi-asserted-by":"crossref","first-page":"1082","DOI":"10.1080\/07421222.2017.1394063","article-title":"Information security control theory: achieving a sustainable reconciliation between sharing and protecting the privacy of information","volume":"34","year":"2017","journal-title":"Journal of Management Information Systems"},{"key":"key2024062606170591400_ref002","doi-asserted-by":"crossref","first-page":"S118","DOI":"10.1016\/j.giq.2014.01.012","article-title":"Web application vulnerability assessment and policy direction towards a secure smart government","volume":"31","year":"2014","journal-title":"Government Information Quarterly"},{"issue":"1","key":"key2024062606170591400_ref003","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.im.2013.11.004","article-title":"Incident-centered information security: managing a strategic balance between prevention and response","volume":"51","year":"2014","journal-title":"Information and Management"},{"issue":"11","key":"key2024062606170591400_ref004","doi-asserted-by":"crossref","first-page":"1581","DOI":"10.1080\/14719037.2021.1878777","article-title":"Implementing collaborative governance: models, experiences, and challenges","volume":"23","year":"2021","journal-title":"Public Management Review"},{"key":"key2024062606170591400_ref005","volume-title":"Social Research Methods","year":"2016"},{"issue":"3","key":"key2024062606170591400_ref006","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s11077-016-9248-y","article-title":"Toward a processual understanding of policy integration","volume":"49","year":"2016","journal-title":"Policy Sciences"},{"issue":"1","key":"key2024062606170591400_ref007","doi-asserted-by":"crossref","first-page":"161","DOI":"10.4335\/20.1.161-192(2022)","article-title":"Cybersecurity in the local government sector in Poland: more work needs to be done","volume":"20","year":"2022","journal-title":"Lex Localis-Journal of Local Self-Government"},{"key":"key2024062606170591400_ref008","unstructured":"Cimpanu, C. (2020), \u201cBlueleaks: data from 200 us police departments and fusion centers published online\u201d, available at: https:\/\/www.zdnet.com\/article\/blueleaks-data-from-200-us-police-departments-fusion-centers-published-online\/ (accessed 10 October 2022)."},{"issue":"3","key":"key2024062606170591400_ref009","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1002\/(SICI)1520-6688(199622)15:3<377::AID-PAM3>3.0.CO;2-F","article-title":"Interagency information sharing: expected benefits, manageable risks","volume":"15","year":"1996","journal-title":"Journal of Policy Analysis and Management"},{"issue":"1","key":"key2024062606170591400_ref010","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.giq.2017.02.007","article-title":"Building cybersecurity awareness: the need for evidence-based framing strategies","volume":"34","year":"2017","journal-title":"Government Information Quarterly"},{"key":"key2024062606170591400_ref011","volume-title":"Introduction to Risk Management and Insurance","year":"1998"},{"issue":"4","key":"key2024062606170591400_ref012","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.giq.2009.04.004","article-title":"Information security landscape and maturity level: case study of Malaysian public service (mps) organizations","volume":"26","year":"2009","journal-title":"Government Information Quarterly"},{"key":"key2024062606170591400_ref013","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.cosust.2014.08.009","article-title":"Connective capacity in water governance practices: the meaning of trust and boundary spanning for integrated performance","volume":"12","year":"2015","journal-title":"Current Opinion in Environmental Sustainability"},{"issue":"1","key":"key2024062606170591400_ref014","doi-asserted-by":"crossref","first-page":"25","DOI":"10.5465\/amj.2007.24160888","article-title":"Theory building from cases: opportunities and challenges","volume":"50","year":"2007","journal-title":"Academy of Management Journal"},{"issue":"3","key":"key2024062606170591400_ref015","first-page":"31","article-title":"The politics of mandates in financing local government operations in China: an\u00a0administrative or fiscal dilemma?","volume":"17","year":"2017","journal-title":"China Review-An Interdisciplinary Journal on Greater China"},{"issue":"3","key":"key2024062606170591400_ref016","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1016\/j.giq.2016.01.006","article-title":"Government inter-organizational information sharing initiatives: understanding the main determinants of success","volume":"33","year":"2016","journal-title":"Government Information Quarterly"},{"issue":"3","key":"key2024062606170591400_ref017","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1016\/j.giq.2016.03.002","article-title":"Conceptualizing smartness in government: an\u00a0integrative and multi-dimensional view","volume":"33","year":"2016","journal-title":"Government Information Quarterly"},{"issue":"2","key":"key2024062606170591400_ref018","article-title":"Building the \u2018front door\u2019 within a web ecology: informational governance and institutional shaping of national government webportals","volume":"38","year":"2021","journal-title":"Government Information Quarterly"},{"issue":"2","key":"key2024062606170591400_ref019","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.giq.2017.02.001","article-title":"Effects of innovation-supportive culture and organizational citizenship behavior on e-government information system security stemming from mimetic isomorphism","volume":"34","year":"2017","journal-title":"Government Information Quarterly"},{"issue":"3","key":"key2024062606170591400_ref020","first-page":"163","article-title":"Effective information security requires a balance of social and technology factors","volume":"9","year":"2010","journal-title":"Mis Quarterly Executive"},{"issue":"1","key":"key2024062606170591400_ref021","doi-asserted-by":"crossref","first-page":"67","DOI":"10.2307\/249410","article-title":"A set of principles for conducting and evaluating interpretive field studies in information systems","volume":"23","year":"1999","journal-title":"Mis Quarterly"},{"issue":"2","key":"key2024062606170591400_ref022","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.giq.2008.12.007","article-title":"Realizing joined-up government\u2014dynamic capabilities and stage models for transformation","volume":"26","year":"2009","journal-title":"Government Information Quarterly"},{"issue":"4","key":"key2024062606170591400_ref023","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1016\/j.giq.2010.10.008","article-title":"Key issues in data center security: an investigation of government audit reports","volume":"28","year":"2011","journal-title":"Government Information Quarterly"},{"issue":"4","key":"key2024062606170591400_ref024","doi-asserted-by":"crossref","first-page":"691","DOI":"10.2307\/259349","article-title":"Strategies for theorizing from process data","volume":"24","year":"1999","journal-title":"Academy of Management Review"},{"issue":"2","key":"key2024062606170591400_ref025","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/j.giq.2016.01.012","article-title":"Beyond the castle model of cyber-risk and cyber-security","volume":"33","year":"2016","journal-title":"Government Information Quarterly"},{"issue":"1","key":"key2024062606170591400_ref026","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.giq.2017.10.006","article-title":"Economic solutions to improve cybersecurity of governments and smart cities via vulnerability markets","volume":"35","year":"2018","journal-title":"Government Information Quarterly"},{"key":"key2024062606170591400_ref027","article-title":"Policy integration: what does it mean and how can it be achieved? A\u00a0multi-disciplinary review","year":"2004"},{"key":"key2024062606170591400_ref028","article-title":"Government information sharing: a\u00a0model for classifying benefits, barriers and risks","year":"2014"},{"issue":"10","key":"key2024062606170591400_ref029","doi-asserted-by":"crossref","first-page":"33","DOI":"10.22215\/timreview\/837","article-title":"Cybersecurity capability maturity models for providers of critical infrastructure","volume":"4","year":"2014","journal-title":"Technology Innovation Management Review"},{"issue":"1","key":"key2024062606170591400_ref030","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1016\/j.infoandorg.2006.11.001","article-title":"The qualitative interview in is research: examining the craft","volume":"17","year":"2007","journal-title":"Information and Organization"},{"issue":"6","key":"key2024062606170591400_ref031","doi-asserted-by":"crossref","first-page":"895","DOI":"10.1111\/puar.13028","article-title":"Cyberattacks at the grass roots: American local governments and the need for high levels of cybersecurity","volume":"79","year":"2019","journal-title":"Public Administration Review"},{"issue":"8","key":"key2024062606170591400_ref032","doi-asserted-by":"crossref","first-page":"1173","DOI":"10.1080\/07352166.2020.1727295","article-title":"Managing cybersecurity at the grassroots: evidence from the first nationwide survey of local government cybersecurity","volume":"43","year":"2021","journal-title":"Journal of Urban Affairs"},{"issue":"1","key":"key2024062606170591400_ref033","doi-asserted-by":"crossref","first-page":"14","DOI":"10.14421\/csecurity.2020.3.1.1962","article-title":"Evaluation of e-government information security using the defense in depth model","volume":"3","year":"2020","journal-title":"Cyber Security Dan Forensik Digital"},{"issue":"1","key":"key2024062606170591400_ref034","doi-asserted-by":"crossref","first-page":"45","DOI":"10.2307\/976691","article-title":"Treating networks seriously: practical and research-based agendas in public administration","volume":"57","year":"1997","journal-title":"Public Administration Review"},{"issue":"3","key":"key2024062606170591400_ref035","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.infoandorg.2011.07.001","article-title":"Demystifying case research: a structured-pragmatic-situational (SPS) approach to conducting case studies","volume":"21","year":"2011","journal-title":"Information and Organization"},{"issue":"3","key":"key2024062606170591400_ref036","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.giq.2010.01.002","article-title":"Identifying the security risks associated with governmental use of cloud computing","volume":"27","year":"2010","journal-title":"Government Information Quarterly"},{"key":"key2024062606170591400_ref037","article-title":"Governance structures in cross-boundary information sharing: lessons from state and local criminal justice initiatives","year":"2008"},{"key":"key2024062606170591400_ref038","volume-title":"Towards Holistic Governance: The New Reform Agenda","year":"2002"},{"issue":"2","key":"key2024062606170591400_ref039","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1177\/1078087420973760","article-title":"Municipal cybersecurity: more work needs to be done","volume":"58","year":"2022","journal-title":"Urban Affairs Review"},{"issue":"8-9","key":"key2024062606170591400_ref040","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1080\/01900690701402668","article-title":"E-government integration and interoperability: framing the research agenda","volume":"30","year":"2007","journal-title":"International Journal of Public Administration"},{"issue":"1","key":"key2024062606170591400_ref041","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/j.0033-3298.2005.00440.x","article-title":"Joined-up government and privacy in the United Kingdom: managing tensions between data protection and social policy. Part i","volume":"83","year":"2005","journal-title":"Public Administration"},{"key":"key2024062606170591400_ref042","volume-title":"Basics of Qualitative Research","year":"1990"},{"key":"key2024062606170591400_ref043","unstructured":"Tham, I. (2022), \u201cPublic sector data leaks jump 65% to 178 cases last year, but none severe\u201d, available at: https:\/\/www.straitstimes.com\/tech\/tech-news\/public-sector-data-leaks-jump-65-to-178-cases-last-year-but-none-severe (accessed 10 October 2022)."},{"issue":"1","key":"key2024062606170591400_ref044","article-title":"Does high e-government adoption assure stronger security? Results from a cross-country analysis of Australia and Thailand","volume":"37","year":"2020","journal-title":"Government Information Quarterly"},{"key":"key2024062606170591400_ref045","article-title":"Security risk analysis and security technology research of government public data center","year":"2018"},{"key":"key2024062606170591400_ref046","article-title":"A holistic approach for providing security solutions in e-government","year":"2002"},{"issue":"1","key":"key2024062606170591400_ref047","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.giq.2013.07.003","article-title":"Protecting personal data in e-government: a cross-country study","volume":"31","year":"2014","journal-title":"Government Information Quarterly"},{"issue":"4","key":"key2024062606170591400_ref048","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1016\/j.giq.2014.05.002","article-title":"How is information shared across the boundaries of government agencies? An e-government case study","volume":"31","year":"2014","journal-title":"Government Information Quarterly"},{"issue":"1","key":"key2024062606170591400_ref049","first-page":"S51","article-title":"The boundaries of information sharing and integration: a\u00a0case study of taiwan e-government","volume":"29","year":"2012","journal-title":"Government Information Quarterly"},{"key":"key2024062606170591400_ref050","volume-title":"Case Study Research: Design and Methods","year":"2009"},{"issue":"1","key":"key2024062606170591400_ref051","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.giq.2009.07.004","article-title":"Opportunities and threats: a security assessment of state e-government websites","volume":"27","year":"2010","journal-title":"Government Information Quarterly"},{"key":"key2024062606170591400_ref052","article-title":"Understanding the \u2018boundary\u2019 in information sharing and integration","year":"2009"},{"issue":"2","key":"key2024062606170591400_ref053","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/j.giq.2010.05.010","article-title":"Securing e-government and e-voting with an open cloud computing architecture","volume":"28","year":"2011","journal-title":"Government Information Quarterly"}],"container-title":["Aslib Journal of Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-10-2022-0461\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-10-2022-0461\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:01:22Z","timestamp":1753398082000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ajim\/article\/76\/4\/629-652\/1216991"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,12]]},"references-count":53,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,4,12]]},"published-print":{"date-parts":[[2024,6,26]]}},"alternative-id":["10.1108\/AJIM-10-2022-0461"],"URL":"https:\/\/doi.org\/10.1108\/ajim-10-2022-0461","relation":{},"ISSN":["2050-3806"],"issn-type":[{"value":"2050-3806","type":"print"}],"subject":[],"published":{"date-parts":[[2023,4,12]]}}}