{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:18:28Z","timestamp":1740201508531,"version":"3.37.3"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,9]]},"DOI":"10.1109\/snams64316.2024.10883784","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:04:34Z","timestamp":1740081874000},"page":"118-125","source":"Crossref","is-referenced-by-count":0,"title":["Understanding Trust in Authentication Methods for Icelandic Digital Public Services"],"prefix":"10.1109","author":[{"given":"Brynj\u00f3lfur","family":"Stef\u00e1nsson","sequence":"first","affiliation":[{"name":"University of Iceland,Reykjav&#x00ED;k,Iceland"}]},{"given":"Asta Gu\u00f3r\u00fan","family":"Helgad\u00f3ttir","sequence":"additional","affiliation":[{"name":"University of Iceland,Reykjav&#x00ED;k,Iceland"}]},{"given":"Martin","family":"Nizon-Deladoeuille","sequence":"additional","affiliation":[{"name":"University of Iceland,Reykjav&#x00ED;k,Iceland"}]},{"given":"Helmut","family":"Neukirchen","sequence":"additional","affiliation":[{"name":"University of Iceland,Reykjav&#x00ED;k,Iceland"}]},{"given":"Thomas","family":"Welsh","sequence":"additional","affiliation":[{"name":"University of Iceland,Reykjav&#x00ED;k,Iceland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6027\/anp2017-737"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1108\/978-1-78743-347-220181004"},{"issue":"1","key":"ref3","first-page":"87","article-title":"The relation between interpersonal and institutional trust in european countries: which came first?","volume":"213","author":"Doma\u0144ski","year":"2021","journal-title":"Polish Sociological Review"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1108\/978-1-78743-347-220181008"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5876\/9781607323358.c014"},{"volume-title":"The country\u2019s population was 383,726 at the beginning of 2024","year":"2024","author":"Iceland","key":"ref6"},{"volume-title":"Numbers of foreign visitors,\u201d 2024, follow link \u201cVisitors to Iceland through Keflavik Airport, 2002-2024\u201d to get tourist numbers for the airport that is the main point of arrival","year":"2024","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ms.2019.2897397"},{"volume-title":"Icelandic National Cybersecurity Strategy 2022\u20132037","year":"2022","key":"ref9"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1145\/3209415.3209422","article-title":"Digital government for e-government service quality: a literature review","volume-title":"Proceedings of the 11 th International Conference on Theory and Practice of Electronic Governance","author":"Arias","year":"2018"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.4324\/9781003258742-2","article-title":"Trustworthiness of digital government services: deriving a comprehensive theory through interpretive structural modelling","volume-title":"Digital Government and Public Management","author":"Janssen","year":"2021"},{"issue":"2","key":"ref12","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.giq.2019.01.001","article-title":"The public value of egovernment - a literature review","volume":"36","author":"Twizeyimana","year":"2019","journal-title":"Government information quarterly"},{"issue":"2","key":"ref13","doi-asserted-by":"crossref","first-page":"140","DOI":"10.30589\/pgr.v7i2.732","article-title":"The impact of the egovernment development index (EGDI) on the worldwide governance indicator (WGI) in European Union countries","volume":"7","author":"Yuliantini","year":"2023","journal-title":"Policy & Governance Review"},{"issue":"2","key":"ref14","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1177\/0894439320909507","article-title":"The gray digital divide in social networking site use in europe: Results from a quantitative study","volume":"40","author":"Sala","year":"2022","journal-title":"Social Science Computer Review"},{"key":"ref15","article-title":"Institutional trust: beyond transparency","volume-title":"European Commission, Joint Research Centre (JRC), Science and Policy Report","author":"Moreno","year":"2014"},{"volume-title":"trust","key":"ref16"},{"volume-title":"OECD Survey on Drivers of Trust in Public Institutions -2024 Results","year":"2024","key":"ref17"},{"key":"ref18","article-title":"A short history of national identification numbering in Iceland","volume":"4","author":"Watson","year":"2010","journal-title":"Bifr\u00f6st Journal of Social Science"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1057\/9781137367310_9","article-title":"An unusually open identification number system: the Icelandic kennitala","volume-title":"Identification and Registration Practices in Transnational Perspective: People, Papers and Practices","author":"Watson","year":"2013"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/978-3-030-67238-6_6","article-title":"eIDAS implementation challenges: the case of Estonia and the Netherlands","volume-title":"International conference on electronic governance and open society: challenges in Eurasia","author":"Lips","year":"2020"},{"key":"ref21","first-page":"100662","article-title":"How to choose a sampling technique and determine sample size for research: A simplified guide for researchers","author":"Ahmed","year":"2024","journal-title":"Operations Research"},{"volume-title":"Facebook users in Iceland","year":"2022","key":"ref22"},{"volume-title":"Calculating sample size","year":"2023","key":"ref23"},{"issue":"11","key":"ref24","doi-asserted-by":"crossref","first-page":"8781","DOI":"10.1007\/s12144-021-02197-2","article-title":"Give me your password! what are you hiding? associated factors of intimate partner violence through technological abuse","volume":"42","author":"Maftei","year":"2023","journal-title":"Current psychology"},{"issue":"3","key":"ref25","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1080\/01639625.2015.1012409","article-title":"Applying routine activity theory to cybercrime: A theoretical and empirical analysis","volume":"37","author":"Leukfeldt","year":"2016","journal-title":"Deviant Behavior"},{"volume-title":"Alone Together: Why We Expect More from Technology and Less from Each Other","year":"2017","author":"Turkle","key":"ref26"},{"issue":"1","key":"ref27","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1080\/13691180701858851","article-title":"Effects of internet use and social resources on changes in depression","volume":"11","author":"Bessi\u00e9re","year":"2008","journal-title":"Information, Community & Society"},{"issue":"9","key":"ref28","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.1037\/0003-066X.53.9.1017","article-title":"Internet paradox: A social technology that reduces social involvement and psychological well-being?","volume":"53","author":"Kraut","year":"1998","journal-title":"American psychologist"},{"volume-title":"Arvakur hit by major cyber attack","year":"2024","key":"ref29"},{"volume-title":"Hackers might have gotten hold of sensitive information - icelandmonitor.mbl.is","year":"2024","key":"ref30"},{"volume-title":"Eurostat regional yearbook - 2021 edition","year":"2021","key":"ref31"},{"volume-title":"CERT-IS varar vi\u00f3 svikaherfer\u00f3um sem beinast gegn rafraenum skilr\u00edkjum","year":"2024","key":"ref32"}],"event":{"name":"2024 11th International Conference on Social Networks Analysis, Management and Security (SNAMS)","start":{"date-parts":[[2024,12,9]]},"location":"Gran Canaria, Spain","end":{"date-parts":[[2024,12,11]]}},"container-title":["2024 11th International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10883770\/10883773\/10883784.pdf?arnumber=10883784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:56:27Z","timestamp":1740120987000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10883784\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,9]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/snams64316.2024.10883784","relation":{},"subject":[],"published":{"date-parts":[[2024,12,9]]}}}