{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T10:04:09Z","timestamp":1766311449961,"version":"build-2065373602"},"reference-count":67,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T00:00:00Z","timestamp":1631491200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Trust is one of the most critical factors that determine willingness to use e-government services. Despite its significance, most previous studies investigated the factors that lead to trusting such services in theoretical aspects without examining the technical solutions. Therefore, more effort is needed to preserve privacy in the current debate on trust within integrated e-government services. Specifically, this study aims to develop a model that examines instruments extracted from privacy by design principles that could protect personal information from misuse by the e-government employee, influencing the trust to use e-government services. This study was conducted with 420 respondents from Oman who were familiar with using e-government services. The results show that different factors influencing service trust, including the need for privacy lifecycle protection, privacy controls, impact assessments, and personal information monitors. The findings reveal that the impeding factors of trust are organizational barriers and lack of support. Finally, this study assists e-government initiatives and decision-makers to increase the use of services by facilitating privacy preservation instruments in the design of e-government services.<\/jats:p>","DOI":"10.3390\/computers10090114","type":"journal-article","created":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T21:37:12Z","timestamp":1631569032000},"page":"114","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Privacy Preservation Instruments Influencing the Trustworthiness of e-Government Services"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4071-9661","authenticated-orcid":false,"given":"Hilal","family":"AlAbdali","sequence":"first","affiliation":[{"name":"Department of Computer Science, Sultan Qaboos University, Muscat 123, Oman"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6613-5950","authenticated-orcid":false,"given":"Mohammed","family":"AlBadawi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Sultan Qaboos University, Muscat 123, Oman"}]},{"given":"Mohamed","family":"Sarrab","sequence":"additional","affiliation":[{"name":"Communication & Information Research Center, Sultan Qaboos University, Muscat 123, Oman"}]},{"given":"Abdullah","family":"AlHamadani","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Sultan Qaboos University, Muscat 123, Oman"}]}],"member":"1968","published-online":{"date-parts":[[2021,9,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"02038","DOI":"10.1051\/e3sconf\/202125702038","article-title":"Construction of E-government Data Sharing Framework Based on Big Data Technology","volume":"257","author":"Qin","year":"2021","journal-title":"E3S Web Conf."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Kim, H.Y., and Cho, J.-S. (2018). Data governance framework for big data implementation with NPS Case Analysis in Korea. J. Bus. Retail. Manag. Res., 12.","DOI":"10.24052\/JBRMR\/V12IS03\/ART-04"},{"key":"ref_3","first-page":"344","article-title":"Perception of privacy and data protection in the context of the development of artificial intelligence","volume":"6","author":"Mazurek","year":"2019","journal-title":"J. Manag. Anal."},{"key":"ref_4","unstructured":"Al-Khanjari, Z., Al-Hosni, N., Kraiem, N., and Jamoussi, Y. (2014). Developing e-Government interoperability driven methodology. J. Emerg. Technol. Web Intell., 6."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1080\/01972240500253582","article-title":"Authentication, Privacy, and the Federal E-Government","volume":"21","author":"Holden","year":"2005","journal-title":"Inf. Soc."},{"key":"ref_6","first-page":"1","article-title":"Towards a Model for Engaging Citizens via Gov2.0 to Meet Evolving Public Value","volume":"5","author":"Aladalah","year":"2018","journal-title":"Int. J. Public Adm. Digit. Age"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.giq.2011.05.003","article-title":"A cue or two and I\u2019ll trust you: Determinants of trust in government organizations in terms of their processing and usage of citizens\u2019 personal information disclosed online","volume":"29","author":"Beldad","year":"2012","journal-title":"Gov. Inf. Q."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s12394-010-0053-z","article-title":"Privacy by Design: Essential for organizational accountability and strong business practices","volume":"3","author":"Cavoukian","year":"2010","journal-title":"Identit-Inf. Soc."},{"key":"ref_9","first-page":"2223","article-title":"Oman e-readiness: A paradigm shift for businesses","volume":"13","author":"Jamil","year":"2016","journal-title":"Int. J. Econ. Res."},{"key":"ref_10","unstructured":"Portulans, I. (2019). Oman\u2013Network Readiness Index 2019, Portulans Institute."},{"key":"ref_11","unstructured":"Portulans, I. (2020). Oman\u2013Network Readiness Index, Portulans Institute."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"193","DOI":"10.2307\/1321160","article-title":"The Right to Privacy","volume":"4","author":"Samuel","year":"1890","journal-title":"Harvard Law Rev."},{"key":"ref_13","unstructured":"Al-Fedaghi, S.S. (2005, January 25\u201328). The \u201cright to be let alone\u201d and private information. Proceedings of the Seventh International Conference on Enterprise Information Systems, Miami, FL, USA."},{"key":"ref_14","first-page":"233","article-title":"Redefining privacy","volume":"12","author":"Gerety","year":"1977","journal-title":"Harv. Civ. Rights Civ. Liberties Law Rev."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Koops, B.-J., and Gali\u010d, M. (2021). Unity in Privacy Diversity: A Kaleidoscopic View of Privacy Definitions. SSRN Electron. J., 73.","DOI":"10.2139\/ssrn.3864099"},{"key":"ref_16","unstructured":"Westin, A.F. (2021, August 20). Privacy and Freedom, Atheneum. Available online: https:\/\/scholarlycommons.law.wlu.edu\/wlulr\/vol25\/iss1\/20."},{"key":"ref_17","first-page":"33","article-title":"An international perspective on protecting personal information","volume":"44","author":"Beckles","year":"2014","journal-title":"Inf. Manag. J."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1111\/j.1745-6606.2009.01152.x","article-title":"Privacy in the Information Economy","volume":"43","author":"Langenderfer","year":"2009","journal-title":"J. Consum. Aff."},{"key":"ref_19","unstructured":"Laudon, K., and Laudon, J. (2009). Management Information Systems: International Edition, 11\/E, Pearson Higher Education."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1111\/j.1745-6606.2006.00071.x","article-title":"Promoting i-Safety: Effects of Privacy Warnings and Privacy Seals on Risk Assessment and Online Privacy Behavior","volume":"41","author":"LaRose","year":"2007","journal-title":"J. Consum. Aff."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1509\/jppm.19.1.20.16944","article-title":"Protecting Privacy Online: Is Self-Regulation Working?","volume":"19","author":"Culnan","year":"2000","journal-title":"J. Public Policy Mark."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Bekara, K., and Laurent, M. (2010, January 17\u201319). Enabling User Privacy in Identity Management Systems. Proceedings of the 2010 IEEE International Conference on Information Theory and Information Security, Institute of Electrical and Electronics Engineers (IEEE), Beijing, China.","DOI":"10.1109\/ICITIS.2010.5689547"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1728","DOI":"10.1080\/1369118X.2020.1732440","article-title":"The power to structure: Exploring social worlds of privacy, technology and power in the Tor Project","volume":"24","author":"Collier","year":"2021","journal-title":"Inf. Commun. Soc."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"79694","DOI":"10.1109\/ACCESS.2019.2922236","article-title":"Privacy Management in Social Internet of Vehicles: Review, Challenges and Blockchain Based Solutions","volume":"7","author":"Butt","year":"2019","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Sabani, A., Deng, H., and Thai, V. (2018, January 3\u20135). A Conceptual Framework for the Adoption of E-Government in Indonesia. Proceedings of the Australasian Conference on Information Systems 2018, University of Technology, Sydney (UTS), Sydney, Australia.","DOI":"10.5130\/acis2018.bi"},{"key":"ref_26","first-page":"1257","article-title":"A Review in E-Government Service Quality Measurement","volume":"10","author":"Maan","year":"2018","journal-title":"Indones. J. Electr. Eng. Comput. Sci."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1080\/10580530.2016.1220216","article-title":"Are U.K. Citizens Satisfied With E-Government Services? Identifying and Testing Antecedents of Satisfaction","volume":"33","author":"Weerakkody","year":"2016","journal-title":"Inf. Syst. Manag."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Agozie, D.Q., and Kaya, T. (2021). Discerning the effect privacy information transparency on privacy fatigue in e-government. Gov. Inf. Q., 101601.","DOI":"10.1016\/j.giq.2021.101601"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/j.giq.2018.04.002","article-title":"The role of privacy policy on consumers\u2019 perceived privacy","volume":"35","author":"Chang","year":"2018","journal-title":"Gov. Inf. Q."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1108\/02635571111115146","article-title":"The impact of privacy concern on user adoption of location-based services","volume":"111","author":"Zhou","year":"2011","journal-title":"Ind. Manag. Data Syst."},{"key":"ref_31","first-page":"9","article-title":"Privacy, security, trust, risk and optimism bias in e-government use: The case of two Southern African Development Community countries","volume":"21","author":"Munyoka","year":"2019","journal-title":"SA J. Inf. Manag."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/j.aci.2017.04.001","article-title":"How to make them use it? Citizens acceptance of M-government","volume":"13","author":"Almarashdeh","year":"2017","journal-title":"Appl. Comput. Inform."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"101413","DOI":"10.1016\/j.giq.2019.101413","article-title":"Information privacy in e-service: Effect of organizational privacy assurances on individual privacy concerns, perceptions, trust and self-disclosure behavior","volume":"37","author":"Mutimukwe","year":"2020","journal-title":"Gov. Inf. Q."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3865","DOI":"10.19026\/rjaset.5.4447","article-title":"Investigating the Effect of Information Systems Factors on Trust in E-Government Initiative Adoption in Palestinian Public Sector","volume":"5","author":"Ahmad","year":"2013","journal-title":"Res. J. Appl. Sci. Eng. Technol."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"101400","DOI":"10.1016\/j.techsoc.2020.101400","article-title":"Antecedents of trust in using social media for E-government services: An empirical study in Pakistan","volume":"64","author":"Khan","year":"2021","journal-title":"Technol. Soc."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1177\/0894439314524701","article-title":"Social Media Risks and Benefits","volume":"32","author":"Khan","year":"2014","journal-title":"Soc. Sci. Comput. Rev."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"e12074","DOI":"10.1002\/isd2.12074","article-title":"Information privacy practices in e-government in an African least developing country, Rwanda","volume":"85","author":"Mutimukwe","year":"2019","journal-title":"Electron. J. Inf. Syst. Dev. Ctries."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Anand, A. (2020). Exploring Net Benefits in the Context of an E-Government Project. Proceedings of the Collaboration in a Hyperconnected World, Springer Science and Business Media LLC.","DOI":"10.1007\/978-3-030-64849-7_37"},{"key":"ref_39","first-page":"1","article-title":"Attitudes towards privacy by design in e-government: Views from the trenches","volume":"7","author":"Gerunov","year":"2020","journal-title":"J. Soc. Ad-Min. Sci."},{"key":"ref_40","first-page":"1","article-title":"Smart Monitoring and Controlling of Government Policies Using Social Media and Cloud Computing","volume":"22","author":"Singh","year":"2019","journal-title":"Inf. Syst. Front."},{"key":"ref_41","unstructured":"Kurtz, C., and Semmann, M. (2018). Privacy by Design to Comply with GDPR: A Review on Third-Party Data Processors, Americas Conference on Information Systems."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1136\/amiajnl-2012-001011","article-title":"Privacy by Design at Population Data BC: A case study describing the technical, administrative, and physical controls for privacy-sensitive secondary use of personal information for research in the public interest","volume":"20","author":"Hertzman","year":"2013","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1108\/14684520710832324","article-title":"A conceptual model of trust in the online environment","volume":"31","author":"Salo","year":"2007","journal-title":"Online Inf. Rev."},{"key":"ref_44","first-page":"101","article-title":"E-Government\u2019s Service Quality; User perception Significance and Measurement","volume":"20","author":"Fraihat","year":"2020","journal-title":"IJCSNS"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Larson, M., Oostdijk, N., and Borgesius, F.Z. (2021, January 21\u201325). Not Directly Stated, Not Explicitly Stored. Proceedings of the Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization; Association for Computing Machinery (ACM), Utrecht, The Netherlands.","DOI":"10.1145\/3450614.3463601"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","article-title":"Information Privacy Research: An Interdisciplinary Review","volume":"35","author":"Smith","year":"2011","journal-title":"MIS Q."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.giq.2018.03.007","article-title":"Social identity and trust in internet-based voting adoption","volume":"35","author":"Warkentin","year":"2018","journal-title":"Gov. Inf. Q."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Liu, D., and Carter, L. (2018). Impact of citizens\u2019 privacy concerns on e-government adoption. Annual International Conference on Mobile Computing & Networking-MobiCom \u201913, ACM.","DOI":"10.1145\/3209281.3209340"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"293","DOI":"10.2307\/23044045","article-title":"Construct Measurement and Validation Procedures in MIS and Behavioral Research: Integrating New and Existing Techniques","volume":"35","author":"MacKenzie","year":"2011","journal-title":"MIS Q."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1287\/isre.2.3.192","article-title":"Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation","volume":"2","author":"Moore","year":"1991","journal-title":"Inf. Syst. Res."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1057\/palgrave.ejis.3000552","article-title":"A methodology for construct development in MIS research","volume":"14","author":"Lewis","year":"2005","journal-title":"Eur. J. Inf. Syst."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Dillman, D.A., Smyth, J.D., and Christian, L.M. (2014). Internet, Phone, Mail, and Mixed-Mode Surveys: The Tailored Design Method, John Wiley & Sons.","DOI":"10.1002\/9781394260645"},{"key":"ref_53","unstructured":"(2021, June 21). Information N.C.f.S, Available online: https:\/\/www.ncsi.gov.om\/Pages\/NCSI.aspx."},{"key":"ref_54","unstructured":"NCSI (2021). Community Statistics, NCSI."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1177\/104973239600600408","article-title":"Q Methodology and Qualitative Research","volume":"6","author":"Brown","year":"1996","journal-title":"Qual. Heal. Res."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1177\/001316446002000104","article-title":"A Coefficient of Agreement for Nominal Scales","volume":"20","author":"Cohen","year":"1960","journal-title":"Educ. Psychol. Meas."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"159","DOI":"10.2307\/2529310","article-title":"The Measurement of Observer Agreement for Categorical Data","volume":"33","author":"Landis","year":"1977","journal-title":"Biometrics"},{"key":"ref_58","first-page":"1","article-title":"A technique for the measurement of attitudes","volume":"140","author":"Likert","year":"1932","journal-title":"Arch. Psychol."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"209","DOI":"10.13106\/jafeb.2020.vol7.no7.209","article-title":"Factors Affecting Tax Compliance among Small- and Medium-sized Enterprises: Evidence from Vietnam","volume":"7","author":"Le","year":"2020","journal-title":"J. Asian Financ. Econ. Bus."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Islam, T.U. (2019). Ranking of Normality Tests: An Appraisal through Skewed Alternative Space. Symmetry, 11.","DOI":"10.20944\/preprints201905.0190.v1"},{"key":"ref_61","unstructured":"Murtagh, F., and Heck, A. (2012). Multivariate Data Analysis, Springer Science & Business Media."},{"key":"ref_62","first-page":"8","article-title":"What is Construct Validity","volume":"Volume 4","author":"Brown","year":"2005","journal-title":"Encyclopedia of Evaluation"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Alnaser, F.M., Ghani, M.A., and Rahi, S. (2018). Service quality in Islamic banks: The role of PAKSERV model, customer satisfaction and customer loyalty. Accounting, 63\u201372.","DOI":"10.5267\/j.ac.2017.8.001"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1177\/014662169501900308","article-title":"Book Review: Psychometric Theory (3rd ed.) by Jum Nunnally and Ira Bernstein New York: McGraw-Hill, 1994, xxiv + 752 pp","volume":"19","author":"Thorndike","year":"1995","journal-title":"Appl. Psychol. Meas."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1108\/EBR-10-2013-0128","article-title":"Partial least squares structural equation modeling (PLS-SEM)","volume":"26","author":"Hair","year":"2014","journal-title":"Eur. Bus. Rev."},{"key":"ref_66","unstructured":"Core Team, R. (2013). R: A Language and Environment for Statistical Computing, R Foundation for Statistical Computing."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1089\/cyber.2013.0585","article-title":"Transparency of Intentions Decreases Privacy Concerns in Ubiquitous Surveillance","volume":"17","author":"Oulasvirta","year":"2014","journal-title":"Cyberpsychology Behav. Soc. Netw."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/10\/9\/114\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:01:39Z","timestamp":1760166099000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/10\/9\/114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,13]]},"references-count":67,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2021,9]]}},"alternative-id":["computers10090114"],"URL":"https:\/\/doi.org\/10.3390\/computers10090114","relation":{},"ISSN":["2073-431X"],"issn-type":[{"type":"electronic","value":"2073-431X"}],"subject":[],"published":{"date-parts":[[2021,9,13]]}}}