{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:54:31Z","timestamp":1756385671070,"version":"3.28.0"},"reference-count":62,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/nextcomp.2019.8883653","type":"proceedings-article","created":{"date-parts":[[2019,10,29]],"date-time":"2019-10-29T00:25:08Z","timestamp":1572308708000},"page":"1-7","source":"Crossref","is-referenced-by-count":7,"title":["Determinants of E-Government Use in Developing Countries: The Influence of Privacy and Security Concerns"],"prefix":"10.1109","author":[{"given":"Anass","family":"Bayaga","sequence":"first","affiliation":[]},{"given":"Jacques","family":"Ophoff","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1","article-title":"Mobile government for improved public service provision in South Africa. In IST-Africa","author":"nkosi","year":"2010"},{"year":"2013","author":"ndii","article-title":"the effect of mobile phone technology innovations on financial deepening within the banking industry in Kenya","key":"ref38"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.18489\/sacj.v29i1.444"},{"key":"ref32","article-title":"Addressing trust, security and privacy concerns in e-government integration, interoperability and information sharing through policy: a case of South Africa","volume":"67","author":"manda","year":"2016","journal-title":"CONF-IRM 2016 Proceedings"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1016\/j.im.2008.11.008"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.4314\/jolte.v2i1.51998"},{"key":"ref37","first-page":"62","article-title":"Implementation of E-government in South Africa - successes and challenges: the way forward","volume":"1","author":"naidoo","year":"2012","journal-title":"International Journal of Advances in Computing and Management"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1080\/1331677X.2017.1305784","article-title":"Intention to use new mobile payment systems: a comparative analysis of SMS and NFC payments","volume":"30","author":"montoro-r\u00edos","year":"2017","journal-title":"Economic Research-Ekonomska Istra&#x017E;ivanja"},{"key":"ref35","first-page":"1","article-title":"Security and privacy trust in e- government: Understanding system and relationship trust antecedents","author":"mcleod","year":"2009","journal-title":"HICSS '09 42nd Hawaii International Conference on System Sciences"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/2987491.2987499"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1016\/B978-0-12-802301-3.00013-2"},{"key":"ref61","first-page":"430","article-title":"Factors Affecting the Successful Introduction of Mobile Payment Systems","author":"van der heijden","year":"0","journal-title":"2002 The 15th Bled Electronic Commerce Conference eReality Constructing the eEconomy Bled"},{"key":"ref28","article-title":"El paper de los sistemas de pago en los nuevos entornos electronicos [The role of payment systems in the new electronic environments]","author":"liebana-cabanillas","year":"2012","journal-title":"Doctoral thesis"},{"year":"2010","author":"kim","article-title":"An empirical examination of factor","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/s10257-015-0284-5"},{"key":"ref2","article-title":"A study of security in wireless and mobile payments","author":"ali","year":"2010","journal-title":"Master&#x2019;s thesis"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1080\/03056241003637870"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/0090-2616(80)90013-3"},{"key":"ref22","first-page":"111","article-title":"Android-based mobile payment service protected by 3-factor authentication and virtually private","author":"hu","year":"2012","journal-title":"Ad hoc networking[C]\/\/Computing Communications and Applications Conference (ComComAp)"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1287\/mnsc.40.1.4"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1177\/030630709802400202"},{"key":"ref23","article-title":"Analysis of Security Issues in Electronic Payment Systems Nigeria","volume":"108","author":"jackson","year":"2014","journal-title":"International Journal of Computer Applications"},{"year":"2013","author":"kehr","article-title":"Rethinking the privacy calculus: on the role of dispositional factors and affect","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1021\/acs.est.5b05756"},{"year":"2014","journal-title":"United Nation E-government Survey 2014 E-government for the Future We Want","first-page":"512","key":"ref50"},{"key":"ref51","first-page":"1","article-title":"Interoperability Framework for e-Governance (IFEG)","year":"2015","journal-title":"The government of India Ministry of Communications and Information Technology"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.3390\/fi4020528"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1016\/j.dss.2012.10.034"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1016\/j.chb.2011.08.019"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1109\/ICMB-GMR.2010.60"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.2307\/30036540"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1287\/mnsc.46.2.186.11926"},{"year":"2010","first-page":"1","key":"ref53"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1109\/HICSS.2010.177"},{"key":"ref10","first-page":"15","article-title":"Factors Affecting the Adoption of Mobile Payment Systems: An Empirical Analysis","volume":"6","author":"da?tan","year":"2016","journal-title":"Emerging Market Journal"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.2307\/249008"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1016\/j.techfore.2010.11.007"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"Extended Privacy Calculus Model for E- Commerce Transactions","volume":"17","author":"dinev","year":"2006","journal-title":"Information Systems Research"},{"year":"2010","journal-title":"A Report from the Economist Intelligence Unit","article-title":"Digital economy rankings 2010: Beyond e-readiness","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1504\/IJITM.2010.030942"},{"key":"ref15","first-page":"232","article-title":"Bringing Society Back in: Symbols, Practices, and Institutional Contradictions","author":"friedland","year":"1991","journal-title":"The New Institutionalism in Organizational Analysis"},{"key":"ref16","first-page":"97","article-title":"e-Government in Africa: Promise and practice","volume":"72","author":"heeks","year":"2002","journal-title":"Information Polity"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/769800.769801"},{"year":"2010","author":"hofstede","article-title":"Cultures and organizations: Software of the mind: Intercultural cooperation and its importance for survival","key":"ref18"},{"key":"ref19","first-page":"52","article-title":"Personality and culture revisited: Linking traits and dimensions of culture. Cross-Cultural Research","volume":"38","author":"hofstede","year":"2004","journal-title":"The Journal of Comparative Social Science"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/0749-5978(91)90020-T"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.20533\/jitst.2046.3723.2014.0040"},{"key":"ref6","first-page":"127","article-title":"The Future of the Mobile Payment as Electronic Payment System","volume":"8","author":"bezhovski","year":"2016","journal-title":"European Journal of Business and Management"},{"year":"2011","author":"avivah","article-title":"Best Practices in Mobile User Authentication and Layered Fraud Prevention","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/S0148-2963(02)00432-0"},{"key":"ref7","article-title":"Mobile commerce: core issues, products, and services","author":"carlsson","year":"2001","journal-title":"Bled Electronic Commerce Conference"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1177\/2056305116688035"},{"key":"ref9","first-page":"128","article-title":"E-government lessons from South Africa 2001-2011: Institutions, state of progress and measurement: Section II: Country perspectives on e-government emergence","volume":"12","author":"cloete","year":"2012","journal-title":"African Journal of Information and Communication Technology"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1108\/10662249810217759"},{"year":"2013","journal-title":"Conference Report","article-title":"Security of eGovernment Systems","key":"ref45"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.4135\/9781849200387.n4"},{"key":"ref47","first-page":"801","article-title":"Institutional Logics and the Historical Contingency of Power in Organizations","volume":"105","author":"thornton","year":"1999","journal-title":"Executive Succession in the Higher Education Publishing Industry 1958-1990 American Journal of Sociology"},{"key":"ref42","first-page":"1","article-title":"What Influences Consumers&#x2019; Intention to Use Mobile Payments?","author":"pousttchi","year":"2008","journal-title":"Mobile Commerce Working Group Chair of Business Informatics and Systems Engineering"},{"key":"ref41","article-title":"Security of Mobile Banking and Payments. GIAC (GSEC) Gold Certification","author":"pegueros","year":"2014","journal-title":"Sans Institute Infosec Reading Room"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1016\/j.elerap.2009.07.005"},{"key":"ref43","first-page":"1","article-title":"Cybercrimes and Cybersecurity Bill","year":"2017","journal-title":"Pretoria Creda Communications"}],"event":{"name":"2019 Conference on Next Generation Computing Applications (NextComp)","start":{"date-parts":[[2019,9,19]]},"location":"Mauritius","end":{"date-parts":[[2019,9,21]]}},"container-title":["2019 Conference on Next Generation Computing Applications (NextComp)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8882365\/8883436\/08883653.pdf?arnumber=8883653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:24:22Z","timestamp":1658262262000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8883653\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/nextcomp.2019.8883653","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}