{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T22:31:47Z","timestamp":1765233107979,"version":"3.41.2"},"reference-count":104,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2021,5,27]],"date-time":"2021-05-27T00:00:00Z","timestamp":1622073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2021,11,12]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This study aims to propose a model to examine the relationships between e-government development, cybersecurity commitment, business usage and economic prosperity of the country.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>Structural equation modeling was used to analyze the country-level variables to explain the second-order impact of e-government development through the mediating role of cybersecurity commitment.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Findings suggest that e-government development demonstrated a stronger association with cybersecurity commitment and business usage. There is preliminary evidence that the improvement of cybersecurity measures initiated by e-government development will drive business usage and improve macroeconomic conditions.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>This paper has constructed a theoretical model and validated it using publicly available archival data. Further, this study hypothesizes and demonstrates empirically the direct, as well as indirect relationships between e-government development, cybersecurity commitment, business usage and economic prosperity. To summarize, the study unearths the role of a nation\u2019s cybersecurity commitment and how it is associated with other macro parameters in a country.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>As an initial step, the present study highlights the pivotal role of e-government and its positive influence on cybersecurity commitment at the country level. Further, this study also recognizes the role of cyber commitment to boost information communication and technology usage in business, the use of e-government services for the profitability of the business and effectively influence economic prosperity.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-12-2020-0205","type":"journal-article","created":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T06:17:13Z","timestamp":1622182633000},"page":"737-760","source":"Crossref","is-referenced-by-count":18,"title":["Examining the relationship between e-government development, nation\u2019s cyber-security commitment, business usage and economic prosperity: a cross-country analysis"],"prefix":"10.1108","volume":"29","author":[{"given":"Ben","family":"Krishna","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"M.P.","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,5,27]]},"reference":[{"key":"key2021111012415209100_ref001","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CR.2018.8626862","article-title":"Security assessment of Libyan government websites","volume-title":"2018 Cyber Resilience Conference (CRC)","year":"2018"},{"key":"key2021111012415209100_ref002","doi-asserted-by":"publisher","first-page":"105396","DOI":"10.1016\/j.clsr.2020.105396","article-title":"The role of government regulations in the adoption of cloud computing: a case study of local government","volume":"36","year":"2020","journal-title":"Computer Law and Security Review"},{"key":"key2021111012415209100_ref003","unstructured":"Allers, M.A. (1994), \u201cAdministrative and compliance costs of taxation and public transfers in The Netherlands\u201d, Groningen theses in economics, management and organization, Wolters-Noordhoff, Groningen."},{"year":"2010","key":"key2021111012415209100_ref004","article-title":"Implementation of e-government: advantages and challenges"},{"issue":"3","key":"key2021111012415209100_ref005","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1504\/EG.2016.078417","article-title":"e-government website security concerns and citizens\u2019 adoption","volume":"12","year":"2016","journal-title":"Electronic Government, an International Journal"},{"issue":"1","key":"key2021111012415209100_ref006","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.giq.2013.09.002","article-title":"Does e-government reduce the administrative burden of businesses? An assessment of business-to-government systems usage in The Netherlands","volume":"31","year":"2014","journal-title":"Government Information Quarterly"},{"key":"key2021111012415209100_ref007","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-85204-9_7","article-title":"Adoption of high impact governmental eServices: seduce or enforce","volume-title":"Electronic Government","year":"2008"},{"key":"key2021111012415209100_ref008","doi-asserted-by":"publisher","DOI":"10.1145\/2463728.2463774","article-title":"Technological assessment of e-government web presence in Nigeria","volume-title":"Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance - ICEGOV \u201812, 236","year":"2012"},{"key":"key2021111012415209100_ref009","doi-asserted-by":"publisher","first-page":"S118","DOI":"10.1016\/j.giq.2014.01.012","article-title":"Web application vulnerability assessment and policy direction towards a secure smart government","volume":"31","year":"2014","journal-title":"Government Information Quarterly"},{"issue":"1","key":"key2021111012415209100_ref010","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1177\/014920639101700108","article-title":"Firm resources and sustained competitive advantage","volume":"17","year":"1991","journal-title":"Journal of Management"},{"key":"key2021111012415209100_ref011","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-43696-8_14","article-title":"Vulnerabilities of government websites in a developing country \u2013 the case of Burkina Faso","volume-title":"E-Infrastructure and e-Services","year":"2016"},{"issue":"2","key":"key2021111012415209100_ref012","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1057\/ejis.2009.8","article-title":"If someone is watching, I\u2019ll do what I\u2019m asked: Mandatoriness, control, and information security","volume":"18","year":"2009","journal-title":"European Journal of Information Systems"},{"issue":"6","key":"key2021111012415209100_ref013","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1111\/1540-6210.00337","article-title":"Information technology, e-government, and institutional change","volume":"63","year":"2003","journal-title":"Public Administration Review"},{"volume-title":"Cyberspace 2025 Today\u2019s Decisions, Tomorrow\u2019s Terrain","year":"2014","key":"key2021111012415209100_ref014"},{"issue":"10","key":"key2021111012415209100_ref015","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1081\/PAD-200029114","article-title":"e-government to combat corruption: the case of Seoul metropolitan government","volume":"27","year":"2004","journal-title":"International Journal of Public Administration"},{"key":"key2021111012415209100_ref016","doi-asserted-by":"crossref","unstructured":"Clark, D.D., Gillett, S.E., Lehr, W., Sirbu, M.A. and Fountain, J.E. (2003), \u201cLocal government stimulation of broadband: Effectiveness, e-government, and economic development. E-Government, and economic development (january 2003)\u201d, KSG Working Papers Series RWP03-002.","DOI":"10.2139\/ssrn.372260"},{"key":"key2021111012415209100_ref017","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1016\/j.procs.2016.05.274","article-title":"E-Governance paradigm using cloud infrastructure: benefits and challenges","volume":"85","year":"2016","journal-title":"Procedia Computer Science"},{"issue":"2","key":"key2021111012415209100_ref018","doi-asserted-by":"publisher","first-page":"147","DOI":"10.2307\/2095101","article-title":"The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields","volume":"48","year":"1983","journal-title":"American Sociological Review"},{"key":"key2021111012415209100_ref019","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-0-387-75462-8_2","article-title":"Cyber security: Are economic incentives adequate","volume-title":"Critical Infrastructure Protection","year":"2007"},{"key":"key2021111012415209100_ref020","unstructured":"e-government survey (2018), \u201cUnited nations e-government survey 2018 \u2013 now available \u2013 operating unit on Policy-Driven electronic governance\u201d, available at: https:\/\/egov.unu.edu\/news\/news\/un-egov-survey-2018.html"},{"key":"key2021111012415209100_ref021","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ISTAFRICA.2014.6880605","article-title":"The development of a cybersecurity policy in developing regions and the impact on stakeholders","volume-title":"2014 IST-Africa Conference Proceedings","year":"2014"},{"key":"key2021111012415209100_ref022","unstructured":"Evers, T. (2010), \u201cDoing business and making peace. UI occasional papers (no. 3)\u201d, available at: www.ui.se\/globalassets\/ui.se-eng\/publications\/ui-publications\/doing-business-and-making-peace-min.pdf"},{"issue":"2","key":"key2021111012415209100_ref023","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s00191-008-0126-4","article-title":"Innovation in services: a review of the debate and a research agenda","volume":"19","year":"2009","journal-title":"Journal of Evolutionary Economics"},{"key":"key2021111012415209100_ref024","unstructured":"Global cybersecurity report (2018), available at: www.itu.int\/en\/ITU-D\/Cybersecurity\/Pages\/global-cybersecurityindex.aspx"},{"issue":"2","key":"key2021111012415209100_ref025","doi-asserted-by":"publisher","first-page":"139","DOI":"10.2753\/MTP1069-6679190202","article-title":"PLS-SEM: Indeed a silver bullet","volume":"19","year":"2011","journal-title":"Journal of Marketing Theory and Practice"},{"issue":"4","key":"key2021111012415209100_ref026","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.giq.2004.08.002","article-title":"Electronic government: government capability and terrorist resource","volume":"21","year":"2004","journal-title":"Government Information Quarterly"},{"issue":"1","key":"key2021111012415209100_ref027","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10209-015-0446-8","article-title":"Web site accessibility, usability and security: a survey of government web sites in Kyrgyz republic","volume":"16","year":"2017","journal-title":"Universal Access in the Information Society"},{"key":"key2021111012415209100_ref028","unstructured":"ITU Cyber (2014), \u201cGlobal cyber security index\u201d, available at: www.itu.int\/en\/ITU-D\/Cybersecurity\/Pages\/GCI-2014.aspx"},{"key":"key2021111012415209100_ref029","unstructured":"ITU Cyber (2017), \u201cGlobal cyber security index\u201d, available at: www.itu.int\/en\/ITU-D\/Cybersecurity\/Pages\/GCI-2017.aspx"},{"key":"key2021111012415209100_ref030","unstructured":"ITU Cyber (2018), \u201cGlobal cyber security index\u201d, available at: www.itu.int\/dms_pub\/itu-d\/opb\/str\/D-STR-GCI.01-2018-PDF-E.pdf"},{"key":"key2021111012415209100_ref031","unstructured":"ITU (2014), \u201cGlobal information technology report\u201d, available at: http:\/\/reports.weforum.org\/global-information-technology-report-2014\/"},{"key":"key2021111012415209100_ref032","unstructured":"ITU (2016), \u201cGlobal information technology report\u201d, available at: www.weforum.org\/reports\/the-global-information-technology-report-2016"},{"key":"key2021111012415209100_ref033","unstructured":"ITU (2019), \u201cNetwork readiness report\u201d, available at: https:\/\/networkreadinessindex.org\/wp-content\/uploads\/2020\/03\/The-Network-Readiness-Index-2019-New-version-March-2020-2.pdf"},{"issue":"1","key":"key2021111012415209100_ref034","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/15536548.2009.10855855","article-title":"Business and security executives views of information security investment drivers: results from a delphi study","volume":"5","year":"2009","journal-title":"Journal of Information Privacy and Security"},{"issue":"3","key":"key2021111012415209100_ref035","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSP.2007.59","article-title":"Embedding information security into the organization","volume":"5","year":"2007","journal-title":"IEEE Security and Privacy Magazine"},{"issue":"1","key":"key2021111012415209100_ref036","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.elerap.2009.04.014","article-title":"An empirical study of customers\u2019 perceptions of security and trust in e-payment systems","volume":"9","year":"2010","journal-title":"Electronic Commerce Research and Applications"},{"key":"key2021111012415209100_ref037","unstructured":"Knickrehm, M., Berthon, B. and Daugherty, P. (2015), \u201cDigital disruption: the growth multiplier: Accenture strategy\u201d, available at: www.accenture.com\/_acnmedia\/pdf-14\/accenture-strategy-digital-disruption-growth-multiplier-brazil.pdf"},{"issue":"1","key":"key2021111012415209100_ref038","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/ijec.2015010101","article-title":"How likely is Simpson\u2019s paradox in path models?","volume":"11","year":"2015","journal-title":"International Journal of eCollaboration"},{"volume-title":"WarpPLS User Manual: Version 7.0","year":"2020","key":"key2021111012415209100_ref039"},{"issue":"3","key":"key2021111012415209100_ref040","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1504\/IJANS.2016.077025","article-title":"Simpson\u2019s paradox, moderation, and the emergence of quadratic relationships in path models: an information systems illustration","volume":"2","year":"2016","journal-title":"International Journal of Applied Nonlinear Science"},{"issue":"8","key":"key2021111012415209100_ref041","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1016\/j.im.2013.07.003","article-title":"Examining the relationships among e-government maturity, corruption, economic prosperity and environmental degradation: a cross-country analysis","volume":"50","year":"2013","journal-title":"Information and Management"},{"issue":"8","key":"key2021111012415209100_ref042","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/S0378-7206(01)00073-8","article-title":"A perception-based model for EDI adoption in small businesses using a technology\u2013organization\u2013environment framework","volume":"38","year":"2001","journal-title":"Information and Management"},{"issue":"2","key":"key2021111012415209100_ref043","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.giq.2010.07.007","article-title":"The willingness of e-government service adoption by business users: the role of offline service quality and trust in technology","volume":"28","year":"2011","journal-title":"Government Information Quarterly"},{"issue":"1","key":"key2021111012415209100_ref044","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.giq.2006.05.001","article-title":"Grounded theory analysis of e-government initiatives: exploring perceptions of government authorities","volume":"24","year":"2007","journal-title":"Government Information Quarterly"},{"issue":"3","key":"key2021111012415209100_ref045","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.giq.2009.12.009","article-title":"10-year retrospect on stage models of e-government: a qualitative meta-synthesis","volume":"27","year":"2010","journal-title":"Government Information Quarterly"},{"issue":"2","key":"key2021111012415209100_ref046","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1057\/ejis.2009.11","article-title":"Threat or coping appraisal: determinants of SMB executives\u2019 decision to adopt anti-malware software","volume":"18","year":"2009","journal-title":"European Journal of Information Systems"},{"volume-title":"Cyber Security: Turning National Solutions into International Cooperation","year":"2003","key":"key2021111012415209100_ref047"},{"issue":"1\/2","key":"key2021111012415209100_ref048","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1504\/IJCIS.2013.051608","article-title":"Nineteen national cyber security strategies","volume":"9","year":"2013","journal-title":"International Journal of Critical Infrastructures"},{"issue":"3","key":"key2021111012415209100_ref049","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.giq.2010.08.007","article-title":"Using institutional theory and dynamic simulation to understand complex e-Government phenomena","volume":"28","year":"2011","journal-title":"Government Information Quarterly"},{"key":"key2021111012415209100_ref050","unstructured":"McAfee (2014), \u201cNet losses: estimating the global cost of cybercrime\u201d, available at: https:\/\/csis-website-prod.s3.amazonaws.com\/s3fs-public\/legacy_files\/files\/attachments\/140609_McAfee_PDF.pdf"},{"issue":"1","key":"key2021111012415209100_ref051","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1146\/annurev-criminol-032317-092057","article-title":"Cyber-dependent crimes: an interdisciplinary review","volume":"2","year":"2019","journal-title":"Annual Review of Criminology"},{"issue":"6","key":"key2021111012415209100_ref052","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1145\/214762.214766","article-title":"Electronic markets and electronic hierarchies","volume":"30","year":"1987","journal-title":"Communications of the ACM"},{"issue":"1-2","key":"key2021111012415209100_ref053","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s00191-002-0106-z","article-title":"A resource-based view of schumpeterian economic dynamics","volume":"12","year":"2002","journal-title":"Journal of Evolutionary Economics"},{"article-title":"Innovations in services","volume-title":"In the Handbook of Innovations","year":"2004","key":"key2021111012415209100_ref054"},{"issue":"1","key":"key2021111012415209100_ref055","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1504\/IJESDF.2007.013595","article-title":"Vulnerabilities in e-governments","volume":"1","year":"2007","journal-title":"International Journal of Electronic Security and Digital Forensics"},{"issue":"1","key":"key2021111012415209100_ref056","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.clsr.2012.11.005","article-title":"Combating the threats of cybercrimes in Malaysia: the efforts, the cyberlaws and the traditional laws","volume":"29","year":"2013","journal-title":"Computer Law and Security Review"},{"issue":"1","key":"key2021111012415209100_ref057","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/j.1681-4835.2004.tb00117.x","article-title":"E-Government for developing countries: opportunities and challenges","volume":"18","year":"2004","journal-title":"The Electronic Journal of Information Systems in Developing Countries"},{"key":"key2021111012415209100_ref058","unstructured":"Osula, A.M. and Kaska, K. (2013), \u201cNATO, national cyber security strategy guidelines. CCDCOE, editor\u201d, Estonia, Tallinn, available at: https:\/\/ccdcoe.org\/uploads\/2018\/10\/NCSS-Guidelines_2013.pdf"},{"volume-title":"Causality: Models, Reasoning, and Inference","year":"2009","key":"key2021111012415209100_ref059"},{"volume-title":"The Competitive Advantage of Nations","year":"1990","key":"key2021111012415209100_ref060"},{"issue":"3","key":"key2021111012415209100_ref061","doi-asserted-by":"publisher","first-page":"879","DOI":"10.3758\/BRM.40.3.879","article-title":"Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models","volume":"40","year":"2008","journal-title":"Behavior Research Methods"},{"issue":"2","key":"key2021111012415209100_ref062","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1057\/palgrave.ejis.3000673","article-title":"Collaborative e-Government: impediments and benefits of information-sharing projects in the public sector","volume":"16","year":"2007","journal-title":"European Journal of Information Systems"},{"key":"key2021111012415209100_ref063","unstructured":"Ringle, C.M., Wende, S. and Becker, J.M. (2015), \u201cSmartpls3. SmartPLS GmbH\u201d, available at: www.smartpls.com"},{"year":"2004","key":"key2021111012415209100_ref064","article-title":"EGovernment leadership; high performance, maximum value. Accenture"},{"issue":"5, Part 2","key":"key2021111012415209100_ref065","doi-asserted-by":"publisher","first-page":"S71","DOI":"10.1086\/261725","article-title":"Endogenous technological change","volume":"98","year":"1990","journal-title":"Journal of Political Economy"},{"issue":"1","key":"key2021111012415209100_ref066","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.ijinfomgt.2010.05.005","article-title":"e-government stakeholders \u2013 who are they and what do they want?","volume":"31","year":"2011","journal-title":"International Journal of Information Management"},{"issue":"6","key":"key2021111012415209100_ref067","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1080\/02680930010000245","article-title":"Education, nation states and the globalization of information networks","volume":"15","year":"2000","journal-title":"Journal of Education Policy"},{"issue":"2","key":"key2021111012415209100_ref068","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1080\/07421222.2015.1063315","article-title":"Estimating the contextual risk of data breach: an empirical approach","volume":"32","year":"2015","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"key2021111012415209100_ref069","first-page":"353","article-title":"How businesses can promote cyber peace","volume":"36","year":"2014","journal-title":"University of Pennsylvania Journal of International Law"},{"issue":"4","key":"key2021111012415209100_ref070","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1108\/02635570510592352","article-title":"Synthesizing e-government stage models - a meta-synthesis based on meta ethnography approach","volume":"105","year":"2005","journal-title":"Industrial Management and Data Systems"},{"issue":"2","key":"key2021111012415209100_ref071","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1108\/17506161111131159","article-title":"Is e-government providing the promised returns? A value framework for assessing e-government impact","volume":"5","year":"2011","journal-title":"Transforming Government: People, Process and Policy"},{"issue":"4","key":"key2021111012415209100_ref072","doi-asserted-by":"publisher","first-page":"20","DOI":"10.4018\/jgim.2007100102","article-title":"e-government payoffs: evidence from cross-country data","volume":"15","year":"2007","journal-title":"Journal of Global Information Management"},{"key":"key2021111012415209100_ref073","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.02305","article-title":"The relationship between e-government and national competitiveness: the moderating influence of environmental factors","volume":"23","year":"2008","journal-title":"Communications of the Association for Information Systems"},{"key":"key2021111012415209100_ref074","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.02614","article-title":"e-government, e-Business, and national economic performance","volume":"26","year":"2010","journal-title":"Communications of the Association for Information Systems"},{"issue":"1","key":"key2021111012415209100_ref075","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2307\/25148624","article-title":"How do suppliers benefit from information technology use in supply chain relationships?","volume":"28","author":"Subramani","year":"2004","journal-title":"MIS Quarterly"},{"key":"key2021111012415209100_ref076","unstructured":"Symantec (2014), \u201cSymantec internet security threat report\u201d, available at: https:\/\/docs.broadcom.com\/doc\/istr-14-april-volume-19-en"},{"issue":"2","key":"key2021111012415209100_ref077","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.giq.2018.09.010","article-title":"A path-dependence perspective on the adoption of internet of things: evidence from early adopters of smart and connected sensors in the United States","volume":"36","year":"2019","journal-title":"Government Information Quarterly"},{"key":"key2021111012415209100_ref078","first-page":"19","article-title":"Predicting intention to adopt interorganizational linkages: an institutional perspective","year":"2003","journal-title":"MIS Quarterly"},{"key":"key2021111012415209100_ref079","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICRIIS.2017.8002519","article-title":"National cyber security strategies for digital economy","volume-title":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","year":"2017"},{"issue":"1","key":"key2021111012415209100_ref080","doi-asserted-by":"publisher","first-page":"101408","DOI":"10.1016\/j.giq.2019.101408","article-title":"Does high e-government adoption assure stronger security? Results from a cross-country analysis of Australia and Thailand","volume":"37","year":"2020","journal-title":"Government Information Quarterly"},{"year":"1990","key":"key2021111012415209100_ref081","article-title":"The process of technological innovation. Lexington young books"},{"issue":"2","key":"key2021111012415209100_ref082","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.giq.2019.01.001","article-title":"The public value of e-government \u2013 a literature review","volume":"36","year":"2019","journal-title":"Government Information Quarterly"},{"key":"key2021111012415209100_ref083","unstructured":"UN (2014), \u201ce-government survey\u201d, available at: https:\/\/publicadministration.un.org\/egovkb\/Portals\/egovkb\/Documents\/un\/2014-Survey\/E-Gov_Complete_Survey-2014.pdf"},{"key":"key2021111012415209100_ref084","unstructured":"UN (2016), \u201ce-government survey\u201d, available at: https:\/\/publicadministration.un.org\/egovkb\/Portals\/egovkb\/Documents\/un\/2016-Survey\/e-government%20Survey%202016.pdf"},{"key":"key2021111012415209100_ref085","unstructured":"UN (2018), \u201ce-government survey\u201d, available at: https:\/\/publicadministration.un.org\/egovkb\/Portals\/egovkb\/Documents\/un\/2018-Survey\/e-government%20Survey%202018_FINAL%20for%20web.pdf"},{"key":"key2021111012415209100_ref086","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-642-27260-8_2","article-title":"Channel choice in the G2B context: towards a research agenda","volume-title":"Building the e-World Ecosystem","year":"2011"},{"issue":"2","key":"key2021111012415209100_ref087","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1080\/0957881042000220886","article-title":"Electronic government (e-government) and development","volume":"16","year":"2004","journal-title":"The European Journal of Development Research"},{"key":"key2021111012415209100_ref088","unstructured":"Wagstaff, K., Eng, J. and DeLuca, M. (2015), \u201cOPM: 21.5 million people affected by background check breach\u201d, available at: www.nbcnews.com\/tech\/security\/opm-hack-security-breach-n389476"},{"key":"key2021111012415209100_ref089","unstructured":"WEF Competitiveness (2014), \u201cGlobal competitiveness report\u201d, available at: www3.weforum.org\/docs\/WEF_GlobalCompetitivenessReport_2013-14.pdf"},{"key":"key2021111012415209100_ref090","unstructured":"WEF Competitiveness (2016), \u201cGlobal competitiveness report\u201d, available at: www3.weforum.org\/docs\/GCR2016-2017\/05FullReport\/TheGlobalCompetitivenessReport2016-2017_FINAL.pdf"},{"key":"key2021111012415209100_ref091","unstructured":"WEF Competitiveness (2019), \u201cGlobal competitiveness report\u201d, available at: www3.weforum.org\/docs\/WEF_TheGlobalCompetitivenessReport2019.pdf"},{"issue":"1","key":"key2021111012415209100_ref092","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1111\/j.1540-6210.2004.00343.x","article-title":"e-government and the transformation of service delivery and citizen attitudes","volume":"64","year":"2004","journal-title":"Public Administration Review"},{"issue":"10","key":"key2021111012415209100_ref093","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1002\/smj.492","article-title":"Schumpeter\u2019s ghost: is hypercompetition making the best of times shorter?","volume":"26","year":"2005","journal-title":"Strategic Management Journal"},{"issue":"2","key":"key2021111012415209100_ref094","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1177\/0266382116650299","article-title":"Cyber resilience: How important is your reputation? How effective are your people?","volume":"33","year":"2016","journal-title":"Business Information Review"},{"issue":"6","key":"key2021111012415209100_ref095","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1016\/j.clsr.2014.09.003","article-title":"Australia\u2019s national broadband network \u2013 a cybersecure critical infrastructure?","volume":"30","year":"2014","journal-title":"Computer Law and Security Review"},{"issue":"2","key":"key2021111012415209100_ref096","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1111\/j.1468-0491.2004.00246.x","article-title":"Does e-government promote accountability? A comparative analysis of website openness and government accountability","volume":"17","year":"2004","journal-title":"Governance"},{"issue":"3","key":"key2021111012415209100_ref097","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.giq.2007.01.002","article-title":"e-government research: reviewing the literature, limitations, and ways forward","volume":"24","year":"2007","journal-title":"Government Information Quarterly"},{"issue":"5","key":"key2021111012415209100_ref098","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1108\/IntR-02-2014-0055","article-title":"e-government development and the digital economy: a reciprocal relationship","volume":"25","year":"2015","journal-title":"Internet Research"},{"issue":"1","key":"key2021111012415209100_ref099","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.giq.2009.07.004","article-title":"Opportunities and threats: a security assessment of state e-government websites","volume":"27","year":"2010","journal-title":"Government Information Quarterly"},{"issue":"2","key":"key2021111012415209100_ref0100","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1057\/ejis.2012.28","article-title":"E-government adoption in public administration organizations: integrating institutional theory perspective and resource-based view","volume":"22","year":"2013","journal-title":"European Journal of Information Systems"},{"key":"key2021111012415209100_ref0101","article-title":"Study on the e-government security risk management","volume":"6","year":"2008","journal-title":"International Journal of Computer Science and Network Security"},{"issue":"1","key":"key2021111012415209100_ref0102","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1080\/07421222.2004.11045794","article-title":"The complementarity of information technology infrastructure and e-commerce capability: a resource-based assessment of their business value","volume":"21","year":"2004","journal-title":"Journal of Management Information Systems"},{"key":"key2021111012415209100_ref0103","article-title":"A cross-country study of electronic business adoption using the technology-organization-environment framework","volume":"14","year":"2002","journal-title":"ICIS 2002 Proceedings"},{"key":"key2021111012415209100_ref0104","unstructured":"Cyber-crime report (2018), available at: www.herjavecgroup.com\/wpcontent\/uploads\/2018\/12\/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf (accessed 22 October 2019)."}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-12-2020-0205\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-12-2020-0205\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:27Z","timestamp":1753406607000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/29\/5\/737-760\/105794"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,27]]},"references-count":104,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2021,5,27]]},"published-print":{"date-parts":[[2021,11,12]]}},"alternative-id":["10.1108\/ICS-12-2020-0205"],"URL":"https:\/\/doi.org\/10.1108\/ics-12-2020-0205","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"type":"print","value":"2056-4961"},{"type":"print","value":"2056-4961"}],"subject":[],"published":{"date-parts":[[2021,5,27]]}}}