{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:51:58Z","timestamp":1777657918006,"version":"3.51.4"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"Ministry of Education of the Republic of Korea and the National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2022S1A5C2A03093690"],"award-info":[{"award-number":["NRF-2022S1A5C2A03093690"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3293480","type":"journal-article","created":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T19:29:04Z","timestamp":1689017344000},"page":"69783-69797","source":"Crossref","is-referenced-by-count":51,"title":["The Influence of Artificial Intelligence on E-Governance and Cybersecurity in Smart Cities: A Stakeholder\u2019s Perspective"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9510-0359","authenticated-orcid":false,"given":"Syed Asad Abbas","family":"Bokhari","sequence":"first","affiliation":[{"name":"Center of Security Convergence and e-Governance, Inha University, Incheon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6730-2770","authenticated-orcid":false,"given":"Seunghwan","family":"Myeong","sequence":"additional","affiliation":[{"name":"Department of Public Administration, Inha University, Incheon, South Korea"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101589"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.5772\/16897"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/su14020620"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37858-5_3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600297CM"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s10726-007-9076-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/9781119816096.ch15"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666455"},{"key":"ref53","first-page":"62","article-title":"Scandinavian approaches to participatory design","volume":"19","author":"gregory","year":"2003","journal-title":"Int J Eng Educ"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2021.102447"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1800573"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/PL00010345"},{"key":"ref10","first-page":"564","article-title":"Artificial intelligence and problems of ensuring cyber security","volume":"13","author":"khisamova","year":"2019","journal-title":"International Journal of Cyber Criminology"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012727708439"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2018.08.020"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102665"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2018.01.003"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.103148"},{"key":"ref51","year":"2015","journal-title":"Commonwealth Approach for Developing National Cybersecurity Strategies A Guide to Creating a Cohesive and Inclusive Approach to Delivering a Safe Secure and Resilient Cyberspace"},{"key":"ref50","first-page":"67","article-title":"National cyber security strategies: Global trends in cyberspace","volume":"5","author":"sabillon","year":"2016","journal-title":"International Journal in Computer Science and Software Engineering"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2009.09.001"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33332-3_20"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16447-2_1"},{"key":"ref47","article-title":"National security personnel system (NSPS): An analysis of key stakeholders&#x2019; perceptions during DoD&#x2019;s implementation of NSPS","author":"alexander","year":"2010"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.34190\/ECDG.19.054"},{"key":"ref41","author":"pe na-l\u00f3pez","year":"2014","journal-title":"United Nation E-government Survey 2014 E-government for the Future We Want"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1201\/9781003131175-1"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2019.07.004"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1002\/j.1681-4835.2017.tb00590.x"},{"key":"ref8","author":"allen","year":"2017","journal-title":"Artificial Intelligence and National Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-816203-3.00004-6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-09976-0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00502-015-0289-2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4324\/9780203937419"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2021.103423"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103614"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2018.09.001"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0199-9_30"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2022.2140089"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3624487"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2022.101754"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5834-7"},{"key":"ref78","year":"2021","journal-title":"Ethics and Governance of Artificial Intelligence For Health WHO Guidance"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1108\/IR-02-2016-0073"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-014-0976-6"},{"key":"ref31","first-page":"1","article-title":"Cyber-security in smart cities: The case of Dubai","volume":"5","author":"efthymiopoulos","year":"2016","journal-title":"The International Journal of Entrepreneurship and Innovation"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1002\/csr.1637"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102328"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-014-0403-8"},{"key":"ref33","first-page":"1","author":"bonte","year":"2018","journal-title":"Role of Smart Cities for Economic Development"},{"key":"ref77","first-page":"217","article-title":"Conditional process modeling: Using structural equation modeling to examine contingent causal processes","volume":"2","author":"hayes","year":"2013","journal-title":"Structural Equation Modeling A Second Course"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1080\/13569775.2014.993906"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-10-2015-0449"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095208"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.02.531"},{"key":"ref39","first-page":"1","article-title":"Combating terrorist-related content through AI and information sharing","author":"heller","year":"2019","journal-title":"Algorithms"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102722"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-018-1088-6"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1177\/0193841X11412069"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1057\/s41270-019-00058-3"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1177\/0013164418783530"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1201\/9781003229018-4"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-04-2016-0130"},{"key":"ref23","article-title":"Deploying artificial intelligence for climate change adaptation","volume":"180","author":"filho","year":"2022","journal-title":"Technol Forecasting Social Change"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-011-0261-6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2019.02.003"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2018.04.024"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.emj.2016.08.001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s43684-023-00047-5"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1177\/0266666921997512"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-019-03222-9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/su132212589"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.jup.2016.04.015"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2022.112705"},{"key":"ref65","year":"2015","journal-title":"Government at a Glance 2015"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2017.09.004"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102208"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1186\/s40561-016-0026-2"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2012.08.002"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1177\/1094428105284955"},{"key":"ref61","first-page":"904","article-title":"Multivariate data analysis: An overview","author":"hair","year":"2010","journal-title":"International Encyclopedia of Statistical Science"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10177170.pdf?arnumber=10177170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T18:35:03Z","timestamp":1691433303000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10177170\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":81,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3293480","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}