{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:57Z","timestamp":1750306197706,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,7]],"date-time":"2017-03-07T00:00:00Z","timestamp":1488844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,7]]},"DOI":"10.1145\/3047273.3047285","type":"proceedings-article","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T12:59:39Z","timestamp":1495803579000},"page":"546-547","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Proposed Framework for Information Systems Security for e-Governance in Developing Nations"],"prefix":"10.1145","author":[{"given":"Rajan","family":"Gupta","sequence":"first","affiliation":[{"name":"University of Delhi, Department of Computer Science, Delhi, India"}]},{"given":"Sunil K.","family":"Muttoo","sequence":"additional","affiliation":[{"name":"University of Delhi, Department of Computer Science, Delhi, India"}]},{"given":"Saibal K.","family":"Pal","sequence":"additional","affiliation":[{"name":"DRDO, SAG Lab, DRDO, Delhi, India"}]}],"member":"320","published-online":{"date-parts":[[2017,3,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.09.002"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/792704.792706"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222220405"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.03.054"},{"key":"e_1_3_2_1_5_1","unstructured":"Sillaber C. and Breu R. 2015. Using Business Process Model Awareness to improve Stakeholder Participation in Information Systems Security Risk Management Processes. In Wirtschaftsinformatik 1177--1190.  Sillaber C. and Breu R. 2015. Using Business Process Model Awareness to improve Stakeholder Participation in Information Systems Security Risk Management Processes. In Wirtschaftsinformatik 1177--1190."},{"key":"e_1_3_2_1_6_1","first-page":"1","article-title":". Security for E-governance","volume":"3","author":"Joshi A.","year":"2012","journal-title":"Journal of Information and Operations Management"},{"key":"e_1_3_2_1_7_1","first-page":"50","article-title":"A Survey on E-Governance Security. International Journal of Computer Engineering and Computer Applications (IJCECA)","volume":"8","author":"Roy A.","year":"2011","journal-title":"Fall Edition"},{"key":"e_1_3_2_1_8_1","unstructured":"Godbole N. 2008. Information Systems Security: Security Management Metrics Frameworks And Best Practices (With CD). John Wiley & Sons.  Godbole N. 2008. Information Systems Security: Security Management Metrics Frameworks And Best Practices (With CD). John Wiley & Sons."},{"key":"e_1_3_2_1_9_1","unstructured":"ISG-IHE 2005. Information Security Governance Assessment tools for Higher Education. https:\/\/net.educause.edu\/ir\/library\/pdf\/SEC0421.pdf  ISG-IHE 2005. Information Security Governance Assessment tools for Higher Education. https:\/\/net.educause.edu\/ir\/library\/pdf\/SEC0421.pdf"},{"key":"e_1_3_2_1_10_1","unstructured":"Ismail R. and Zainab A.N. 2013. Information systems security in special and public libraries: an assessment of status.  Ismail R. and Zainab A.N. 2013. Information systems security in special and public libraries: an assessment of status."}],"event":{"name":"ICEGOV '17: 10th International Conference on Theory and Practice of Electronic Governance","sponsor":["UNESCO"],"location":"New Delhi AA India","acronym":"ICEGOV '17"},"container-title":["Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3047273.3047285","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3047273.3047285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:24Z","timestamp":1750218624000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3047273.3047285"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,7]]},"references-count":10,"alternative-id":["10.1145\/3047273.3047285","10.1145\/3047273"],"URL":"https:\/\/doi.org\/10.1145\/3047273.3047285","relation":{},"subject":[],"published":{"date-parts":[[2017,3,7]]},"assertion":[{"value":"2017-03-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}