{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:37:23Z","timestamp":1730248643638,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750278","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T11:20:46Z","timestamp":1395919246000},"page":"623-629","source":"Crossref","is-referenced-by-count":3,"title":["E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies"],"prefix":"10.1109","author":[{"given":"Love","family":"Adedayo","sequence":"first","affiliation":[]},{"given":"Sergey","family":"Butakov","sequence":"additional","affiliation":[]},{"given":"Ron","family":"Ruhl","sequence":"additional","affiliation":[]},{"given":"Dale","family":"Lindskog","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2013","journal-title":"Internet World Stats","key":"19"},{"year":"0","journal-title":"Computer Security & Critical Information Infrastructure Protection Bill 2005","key":"17"},{"key":"18","first-page":"106","author":"gross","year":"2009","journal-title":"Predicting Social Security Numbers from Public Data"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/ARES.2008.90"},{"year":"2011","journal-title":"Freedom of Information Act (FOI)","key":"16"},{"key":"13","article-title":"E-Govemment security implications' proceedings of advances in computing and technology, (AC&T)","author":"azenabor","year":"2009","journal-title":"The School of Computing and Technology 4th Annual Conference"},{"year":"2010","author":"sullivan","journal-title":"Balancing security and privacy in e-Govemment services 1ST-Africa","key":"14"},{"key":"11","article-title":"EGovernment in the context of developing countries","author":"tamara","year":"2011","journal-title":"MIPRO"},{"key":"12","first-page":"148","article-title":"Towards a framework for eGovemment development in nigeria","volume":"8","author":"mundy","year":"2010","journal-title":"Electronic Journal of e-Government"},{"year":"2008","journal-title":"Global EGovernment Readiness Report","key":"21"},{"year":"2013","journal-title":"Timetric Research Press Release","key":"20"},{"year":"2009","journal-title":"Identity Theft Info","key":"22"},{"key":"23","article-title":"Royal canadian","author":"police","year":"0","journal-title":"Royal Canadian Mounted Police"},{"key":"24","first-page":"5","article-title":"Privacy prot study comm'n, personal privacy in an information society","volume":"21","year":"1977","journal-title":"Technology and Privacy"},{"year":"2013","journal-title":"OW ASP Top 10 Vulnerabilities","key":"25"},{"key":"26","article-title":"A comparison of the risks in information technology outsourcing and business process outsourcing","author":"gewald","year":"2005","journal-title":"11th Americas Conference on Information Systems"},{"year":"0","journal-title":"High Commission of the Federal Republic of Nigeria","key":"3"},{"year":"2012","author":"adeniyi","journal-title":"The Need for Data Protection Law in Nigeria","key":"2"},{"key":"10","first-page":"280","article-title":"Information and communication technology penetration in nigeria prospects, challenges and metrics","volume":"3","author":"longe","year":"2007","journal-title":"Asian Journal of Information Technology"},{"key":"1","article-title":"Corporate privacy trend the \"value personally identifiable information (PH) equals the \"value of Financial Assets","volume":"11","author":"zachary","year":"2009","journal-title":"Rich J L & Tech"},{"year":"0","key":"7"},{"year":"2010","journal-title":"Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)","article-title":"National institute of standards and technology","key":"6"},{"year":"2008","journal-title":"GAO Report 08-536 Privacy Alternatives Exit for Enhancing Protection of Personally Identifiable Information","key":"5"},{"year":"0","journal-title":"IT-Statistics National Information Technology Development Agency","key":"4"},{"year":"0","journal-title":"The Electronic Journal of E-Government","key":"9"},{"year":"0","journal-title":"Section 37 of the 1999 Nigerian Constitution","key":"8"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750278.pdf?arnumber=6750278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T17:39:50Z","timestamp":1490290790000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750278\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750278","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}