{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T08:03:49Z","timestamp":1758873829418,"version":"3.41.2"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/icgs3.2019.8688252","type":"proceedings-article","created":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T02:09:15Z","timestamp":1555034955000},"page":"1-9","source":"Crossref","is-referenced-by-count":9,"title":["Security Perceptions in Cloud-Based e-Govemment Services:"],"prefix":"10.1109","author":[{"given":"Abeer","family":"Alkhwaldi","sequence":"first","affiliation":[{"name":"Department of Management Information Systems, School of Business Mutah University, AIKarak, Jordan"}]},{"given":"Mumtaz","family":"Kamala","sequence":"additional","affiliation":[{"name":"Bradford University, School of Electrical Engineering and Computer Science, Bradford, United Kingdom"}]},{"given":"Rami","family":"Qahwaji","sequence":"additional","affiliation":[{"name":"Bradford University, School of Electrical Engineering and Computer Science, Bradford, United Kingdom"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4018\/jicthd.2012010103"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1108\/TG-08-2013-0027"},{"key":"ref12","first-page":"29","article-title":"A general framework for e-government: definition maturity challenges, opportunities, and success","volume":"39","author":"almarabeh","year":"2010","journal-title":"European Journal of Scientific Research"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2015.7231017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1177\/0266666916656033"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6210.2012.02647.x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1504\/EG.2007.015040"},{"key":"ref17","article-title":"E-Gov Adoption in US Local Governments: Bridging Public Management and Institutional Explanations in a Pooled Time Series Model&#x00A9;","author":"coursey","year":"2007","journal-title":"The 9th Public Management Research Conference"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2014.10.005"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2010.05.006"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-08-2013-0057"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2014.12.004"},{"journal-title":"Business Research Methods","year":"2015","author":"bryman","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.06.025"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2013.10.001"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1108\/02635570710734316","article-title":"Exploring organizational culture for information security management","volume":"107","author":"ernest","year":"2007","journal-title":"Industrial Management & Data Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.11.075"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/ICITST.2017.8356405"},{"key":"ref7","first-page":"81","article-title":"Discussing E-Government Maturity Models for the Developing World-Security View","author":"karokola","year":"2009","journal-title":"Proceedings of ISSP A"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"556","DOI":"10.20533\/jitst.2046.3723.2018.0069","article-title":"Analysis of cloud-based e-government services acceptance in Jordan: challenges and barriers","volume":"6","author":"alkhwaldi","year":"2018","journal-title":"Journal of Internet Technology and Secured Transactions - JITST"},{"journal-title":"Microsoft in Government Customer Stories(The Hashemite Kingdom of Jordan) August 15 2014","year":"2014","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4236\/cn.2016.81001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2013.03.001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4018\/jebr.2012040102"},{"key":"ref21","first-page":"22","article-title":"Modeling user perceptions of e-commerce security using partial least square","volume":"23","author":"halaweh","year":"2012","journal-title":"Information Technology and Management"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/0144929042000320992"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2011.07.007"},{"journal-title":"Research methods for business students","year":"2016","author":"saunders","key":"ref26"},{"journal-title":"Doing research in the real world","year":"2014","author":"gray","key":"ref25"}],"event":{"name":"2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)","start":{"date-parts":[[2019,1,16]]},"location":"London, UK","end":{"date-parts":[[2019,1,18]]}},"container-title":["2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8672787\/8688013\/08688252.pdf?arnumber=8688252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T18:40:14Z","timestamp":1753900814000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8688252\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icgs3.2019.8688252","relation":{},"subject":[],"published":{"date-parts":[[2019,1]]}}}