{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T13:25:58Z","timestamp":1724333158557},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/icdim.2017.8244644","type":"proceedings-article","created":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T21:18:26Z","timestamp":1515532706000},"source":"Crossref","is-referenced-by-count":9,"title":["Compliance evaluation of information privacy protection in e-government systems in Anglophone West Africa using ISO\/IEC 29100:2011"],"prefix":"10.1109","author":[{"given":"Amarachi Chinwendu","family":"Nwaeze","sequence":"first","affiliation":[]},{"given":"Pavol","family":"Zavarsky","sequence":"additional","affiliation":[]},{"given":"Ron","family":"Ruhl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"The State of the Art of E-Government Services in Africa: An Analysis of Relevant Websites","author":"rorissa","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2013.07.003"},{"key":"ref12","article-title":"Balancing Security and Privacy in e-Government Services","author":"sullivan","year":"2010","journal-title":"IST-Africa 2010 Conference Proceedings"},{"key":"ref13","author":"makulilo","year":"2012","journal-title":"Privacy and Data Protection In Africa A state of the Art"},{"key":"ref14","author":"banisar","year":"2014","journal-title":"National Comprehensive Data Protection\/Privacy Laws and Bills 2014"},{"key":"ref15","year":"2010","journal-title":"Economic Community of West African States"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(12)70061-1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2008.01.006"},{"key":"ref18","author":"dyson","year":"2014","journal-title":"DLP PIPER Data Protection Laws of the World Handbook Third Edition"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.20533\/ijmip.2042.4647.2014.0026"},{"key":"ref4","author":"pulication","year":"2010","journal-title":"Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)"},{"key":"ref3","article-title":"Information Technology-Security trechnologies-Privacy framework","year":"2011","journal-title":"First editioin"},{"key":"ref6","author":"akunyili","year":"2010","journal-title":"ICT and e-Government in Nigeria"},{"key":"ref5","article-title":"IRS: Cyber-thieves stole up to $39M","author":"mccoy","year":"2015","journal-title":"USA Today"},{"key":"ref8","author":"adedayo","year":"2012","journal-title":"E-Government Web Services and Security of Personally Identifiable Infromation in Dveloping Nations A case of Nigerian Embassies"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2013.07.003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICT.2016.7991695"}],"event":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","location":"Fukuoka","start":{"date-parts":[[2017,9,12]]},"end":{"date-parts":[[2017,9,14]]}},"container-title":["2017 Twelfth International Conference on Digital Information Management (ICDIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8231152\/8244639\/08244644.pdf?arnumber=8244644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T22:59:31Z","timestamp":1518476371000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8244644\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icdim.2017.8244644","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}