Mitigating Cybercrimes in E-Government Services: A Systematic Review and Bibliometric Analysis
Abstract
:1. Introduction
2. A Literature Review
2.1. Cybercrimes
2.2. Rise of Cybercrime in E-Government
2.3. Cybercrime Mitigation: A Multidisciplinary Approach
2.4. Purpose and Scope of This Study
- Mapping the existing literature on e-government services;
- Conducting a bibliometric analysis to identify key research, authors, and affiliations;
- Assessing the extent to which cybercrime mitigation is addressed in e-government services;
- Proposing a future research agenda based on this literature review.
3. Materials and Methods
3.1. Publication Selection
3.2. Data Extraction
4. Results
4.1. Journals
4.2. Author Influence and Affiliation Statistics
- > biblioshiny();
- Loading required package: shiny;
- Listening on http://127.0.0.1:4129;
- Converting your df collection into a bibliographic data frame.
4.3. Countries’ Statistics and Collaboration
4.4. Citation Network Analysis
4.5. Trend Topics and Keywords
4.6. Keyword Occurrences Network
4.7. Identified Themes
4.8. Cybersecurity and E-Government Research
5. Discussion
5.1. Development
5.2. Adoption
5.3. Implementation
5.4. Corruption
5.5. Performance
5.6. Value
5.7. Governance
5.8. Security in E-Government Services
6. Conclusions
7. Future Research Implications
Author Contributions
Funding
Conflicts of Interest
Appendix A
E-Government Services and Cybercrime Mitigation | ||||||
---|---|---|---|---|---|---|
NO | Focus | Location | Findings | Sources | Data | Technique |
1 | Software Security Assessment | Norway and Vietnam | For security, SAST tools should be used for practical performance and in combination with triangulated approaches for human-driven vulnerability assessment in real-world projects of e-government. | [90] | Semi Structured Interviews | Static Application Security Testing (SAST) |
2 | Moderating effect of Cybersecurity | Asian Countries | Secured and strong cybersecurity and corruption control network systems speed up digitalization, development, and sustainability. | [35] | Cybersecurity Index | Fixed-effect regression analysis and random forest (RF) algorithm |
3 | Socio-Technical Analysis | China | There is lack of resources to implement cybersecurity in e-government portals. Collaborative construction of cybersecurity systems and centralized procurement of cybersecurity services are recommended, especially at the county level and in smaller prefecture-level cities and when planning to strengthen cybersecurity capabilities of existing e-government systems. | [91] | Open-ended interviews | Based on constructs from Prior Survey Research |
4 | Legal Aspects | Ukraine | The implementation of e-government causes problems related to information security. Modern computer security is a complex phenomenon whose perspectives are influenced by different internal and external factors, the most important being the political situation. The issues in functioning aspect of information security in e-government are quite difficult, which explains its little scientific research. | [92] | Review of Ukrainian Information legislation | N/A |
5 | E-Government Website Security | Australia and Thailand | Standardised templates of government websites ensure validity of the content. Delivered through a content management system, which can result in improving security administration. Routine site audits should be scheduled to alert security administrators. | [33] | Review of Australian and Thailand’s e-government websites | Web Content Analysis of Policies and encryption + Security Vulnerability testing |
6 | Relationship between e-gov development and cybersecurity | 127 countries | E-government development demonstrated a stronger association with cybersecurity commitment and business usage. Mitigating cybercrimes is one way of saving cost in billions of USD for the nation, and thus keeping a tab on the budget balance. | [43] | Publicly available archival data | Structural equation modelling to analyse the country level variable |
7 | Perceived risk and security levels in building trust | Poland | The statistically important relationship between perceived security and trust in e-government technology indicated the practical utility of using a security variable in the promotion and encouragement of the public to use e-government services. | [89] | Quantitative Data | Correlation and Structural Equation Modelling |
8 | Privacy, Security, Trust, Risk and Optimism bias in e-government use | Zimbabwe and Zambia | Robust security measures on e-government transactions mitigate fears associated with a potential loss by citizens. Perceived lack of privacy, security, trust; perceived risk and optimism bias were all confirmed as salient factors affecting the utilisation of e-government systems by citizens. | [36] | Quantitative Data from E-Government Users | Structural Equation Modelling |
9 | Information System Security for sustainable development | Korea | Information system security effectiveness depends on the path through legitimacy, influenced by normative and coercive isomorphism, which is stronger than that through organizational cynicism. | [93] | Quantitative Data from 30 departments of government | Partial Least Square |
10 | Social Networks in e-government | AZERBAIJAN | Social media threats can cause reputation loss in government-to-citizen relations, which may result in social–political conflicts. | [94] | Experimental Design | Fuzzy TOPSIS |
11 | Financial and information security of country | 10 different countries | The main reasons leading to the problems of safe operation of e-government systems can be attributed to the complexity and heterogeneity of software and hardware used in e-government systems; a large number of control nodes in e-government systems; external access to the e-government system; functioning of maintenance and information security groups. | [34] | E-Government Development Index, Global Cybersecurity Index indicators | Comparison |
12 | Impact of information systems security laws and standards on the e-government. Cyberthreats and vulnerabilities | Saudi Arabia | The cyber-attackers intend to steal information; therefore, NIST and ISO developed standard operating procedures required for the safety and security of information to prevent data breach. The major vulnerabilities found in the literature are weak security systems, lack of awareness, and enterprise failure. | [100] | N/A | Mixed Method |
13 | E-Government Systems –Increasing its Security | Ukraine | Identification of critical quality of service concepts and security parameters that influence the operational security of Ukraine’s electronic government system. | [95] | Reports | Qualitative |
14 | E-Government Projects Security | South Africa | The main problems identified were the lack of software integration and information security governance, policy, and administration. | [74] | Government Databases | Qualitative |
15 | E-Government Information System Security | South Korea | Using institutional theory and organisational behaviour, this study concludes that innovative culture and legitimacy positively influence ISS effectiveness. | [101] | Questionnaire—security managers | Quantitative—PLS SEM |
16 | Security in Intention of Using E-Government | Saudi Arabia | User interface quality, security culture, and cybersecurity law affect security perception positively. | [96] | Both collected from Saudi citizens | Mixed Method—Focus Group and SEM |
17 | Cybersecurity practices and quality of e-government services | Saudi Arabia | Financial investment in cybersecurity, employee training, and adherence to regulations significantly influence the adoption of strong cybersecurity practices. | [97] | Users | PLS—SEM |
18 | Perceived Security in Adoption Behaviour | Pakistan | Perceived privacy, perceived security, technology anxiety, effort expectancy, and performance expectancy positively influence citizens’ adoption behaviour. It suggests that policymakers and relevant authorities in the Pakistani government should focus on enhancing citizens’ trust. | [98] | Citizens | PLS—SEM |
19 | Legal, technical and ethical security in E-Government | Pakistan | It identifies blockchain’s potential in data governance and its role in ensuring legal compliance. However, challenges around privacy, decentralization, and regulatory alignment remain unresolved. | [99] | N/A | Qualitative Evaluation. |
References
- Malodia, S.; Dhir, A.; Mishra, M.; Bhatti, Z.A. Future of e-Government: An integrated conceptual framework. Technol. Forecast. Soc. Change 2021, 173, 121102. [Google Scholar] [CrossRef]
- Kumar, R.; Mukherjee, A.; Sachan, A. Factors influencing indirect adoption of e-Government services: A qualitative study. Inf. Syst. E-Bus. Manag. 2023, 21, 471–504. [Google Scholar] [CrossRef]
- Cremer, F.; Sheehan, B.; Fortmann, M.; Kia, A.N.; Mullins, M.; Murphy, F.; Materne, S. Cyber risk and cybersecurity: A systematic review of data availability. Geneva Pap. Risk Insur.-Issues Pract. 2022, 47, 698–736. [Google Scholar] [CrossRef] [PubMed]
- Chandra, A.; Snowe, M.J. A taxonomy of cybercrime: Theory and design. Int. J. Account. Inf. Syst. 2020, 38, 100467. [Google Scholar] [CrossRef]
- Lee, C.S.; Wang, Y. Typology of cybercrime victimization in Europe: A multilevel latent class analysis. Crime Delinq. 2024, 70, 1196–1223. [Google Scholar] [CrossRef]
- Van de Weijer, S.; Leukfeldt, R.; Moneva, A. Cybercrime during the COVID-19 pandemic: Prevalence, nature and impact of cybercrime for citizens and SME owners in the Netherlands. Comput. Secur. 2024, 139, 103693. [Google Scholar] [CrossRef]
- Florido-Benítez, L. The types of hackers and cyberattacks in the aviation industry. J. Transp. Secur. 2024, 17, 13. [Google Scholar] [CrossRef]
- Schmitt, M. Securing the Digital World: Protecting Smart Infrastructures and Digital Industries with Artificial Intelligence (Ai)-Enabled Malware and Intrusion Detection. J. Ind. Inf. Integr. 2023, 36, 100520. [Google Scholar] [CrossRef]
- Mee, P.; Chandrasekhar, C. Cybersecurity Is Too Big a Job for Governments or Business to Handle Alone; European Union Agency for Law Enforcement Training (CEPOL): Budapest, Hungary, 2021. [Google Scholar]
- Yeboah-Ofori, A.; Opoku-Boateng, F.A. Mitigating cybercrimes in an evolving organizational landscape. Contin. Resil. Rev. 2023, 5, 53–78. [Google Scholar] [CrossRef]
- Soomro, Z.A.; Shah, M.H.; Ahmed, J. Information security management needs more holistic approach: A literature review. Int. J. Inf. Manag. 2016, 36, 215–225. [Google Scholar] [CrossRef]
- Lohrke, F.T.; Frownfelter-Lohrke, C. Cybersecurity research from a management perspective: A systematic literature review and future research agenda. J. Gen. Manag. 2023, 48, 03063070231200512. [Google Scholar] [CrossRef]
- Estimated Cost of Cybercrime Worldwide 2018–2029; Statista: Hamburg, Germany, 2024.
- CloudSEK. Share of Cyber Incidents Targeting Government Agencies Worldwide in 2022, by Attack Vector. Available online: https://www.statista.com/statistics/1428581/government-worldwide-targeted-cyber-incidents-by-attack-vector/ (accessed on 20 October 2024).
- Blackberry. Number of Cyber Incidents Targeting Government Agencies Worldwide from December 2022 to August 2023. Available online: https://www.statista.com/statistics/1428595/government-worldwide-targeted-cyber-incidents-number/ (accessed on 20 October 2024).
- Annarelli, A.; Clemente, S.; Nonino, F.; Palombi, G. Effectiveness and Adoption of NIST Managerial Practices for Cyber Resilience in Italy; Springer: Berlin/Heidelberg, Germany, 2021. [Google Scholar]
- Anwary, I. Evaluating Legal Frameworks for Cybercrime in Indonesian Public Administration: An Interdisciplinary Approach. Int. J. Cyber Criminol. 2023, 17, 12–22. [Google Scholar] [CrossRef]
- Brumfield, C.; Haugli, B. Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, 1st ed.; Wiley: Newark, NJ, USA, 2022. [Google Scholar]
- National Institute of Standards and Technology. NIST Cybersecurity Framework. Available online: https://www.nist.gov/cyberframework/framework (accessed on 15 December 2023).
- Roy, P.P. A high-level comparison between the nist cyber security framework and the iso 27001 information security standard. In Proceedings of the 2020 National Conference on Emerging Trends on Sustainable Technology and Engineering Applications (NCETSTEA), Durgapur, India, 7–8 February 2020. [Google Scholar]
- Thompson, E.C. Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information, 1st ed.; Apress: Berkeley, CA, USA, 2017. [Google Scholar]
- Dias, G.P. Fifteen years of e-government research in Ibero-America: A bibliometric analysis. Gov. Inf. Q. 2019, 36, 400–411. [Google Scholar] [CrossRef]
- Ramzy, M.; Ibrahim, B. The evolution of e-government research over two decades: Applying bibliometrics and science mapping analysis. Libr. Hi Tech 2022, 42, 227–260. [Google Scholar] [CrossRef]
- Leukfeldt, R.; Holt, T.J. The Human Factor of Cybercrime; Routledge: Abingdon, UK, 2019. [Google Scholar]
- Dupont, B.; Holt, T. The Human Factor of Cybercrime. Soc. Sci. Comput. Rev. 2021, 40, 860–864. [Google Scholar] [CrossRef]
- Tremblay-Cantin, C.-A.; Mellouli, S.; Cheikh-Ammar, M.; Khechine, H. E-government Service Adoption by Citizens: A Literature Review and a High-level Model of Influential Factors. Digit. Gov. Res. Pract. 2023, 4, 1–24. [Google Scholar] [CrossRef]
- Dupont, B. Enhancing the effectiveness of cybercrime prevention through policy monitoring. J. Crime Justice 2019, 42, 500–515. [Google Scholar] [CrossRef]
- Donthu, N.; Kumar, S.; Mukherjee, D.; Pandey, N.; Lim, W.M. How to conduct a bibliometric analysis: An overview and guidelines. J. Bus. Res. 2021, 133, 285–296. [Google Scholar] [CrossRef]
- Radanliev, P. Digital security by design. Secur. J. 2024, 37, 1640–1679. [Google Scholar] [CrossRef]
- Lu, J.; Wu, D.; Mao, M.; Wang, W.; Zhang, G. Recommender system application developments: A survey. Decis. Support Syst. 2015, 74, 12–32. [Google Scholar] [CrossRef]
- Dwivedi, Y.K.; Rana, N.P.; Jeyaraj, A.; Clement, M.; Williams, M.D. Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model. Inf. Syst. Front. 2019, 21, 719–734. [Google Scholar] [CrossRef]
- Mergel, I.; Edelmann, N.; Haug, N. Defining digital transformation: Results from expert interviews. Gov. Inf. Q. 2019, 36, 101385. [Google Scholar] [CrossRef]
- Thompson, N.; Mullins, A.; Chongsutakawewong, T. Does high e-government adoption assure stronger security? Results from a cross-country analysis of Australia and Thailand. Gov. Inf. Q. 2020, 37, 101408. [Google Scholar] [CrossRef]
- Yarovoy, T.S.; Kozyrieva, O.V.; Bielska, T.V.; Zhuk, I.I.; Mokhova, I.L. The e-Government Development in Ensuring the Country Financial and Information Security. Financ. Credit Act.-Probl. Theory Pract. 2020, 2, 268–275. [Google Scholar] [CrossRef]
- Abbas, H.S.M.; Qaisar, Z.H.; Xu, X.D.; Sun, C.X. Nexus of E-government, cybersecurity and corruption on public service (PSS) sustainability in Asian economies using fixed-effect and random forest algorithm. Online Inf. Rev. 2022, 46, 754–770. [Google Scholar] [CrossRef]
- Munyoka, W.; Maharaj, M.S. Privacy, security, trust, risk and optimism bias in e-government use: The case of two Southern African Development Community countries. S. Afr. J. Inf. Manag. 2019, 21, 9. [Google Scholar] [CrossRef]
- Ravanos, P.; Karagiannis, G. Tricks with the BoD model and an application to the e-Government Development Index. Socio-Econ. Plan. Sci. 2022, 81, 100955. [Google Scholar] [CrossRef]
- Zhang, Y.; Kimathi, F.A. Exploring the stages of E-government development from public value perspective. Technol. Soc. 2022, 69, 101942. [Google Scholar] [CrossRef]
- Butt, N.; Warraich, N.F.; Tahira, M. Development level of electronic government services an empirical study of e-government websites in Pakistan. Glob. Knowl. Mem. Commun. 2019, 68, 33–46. [Google Scholar] [CrossRef]
- Aljukhadar, M.; Belisle, J.F.; Dantas, D.C.; Senecal, S.; Titah, R. Measuring the service quality of governmental sites: Development and validation of the e-Government service quality (EGSQUAL) scale. Electron. Commer. Res. Appl. 2022, 55, 101182. [Google Scholar] [CrossRef]
- Wallis, J.; Zhao, F. e-Government Development and Government Effectiveness: A Reciprocal Relationship. Int. J. Public Adm. 2018, 41, 479–491. [Google Scholar] [CrossRef]
- Kumar, S.; Baishya, K.; Sreen, N.; Sadarangani, P.H.; Samalia, H.V. Impact of National Culture on E-Government Development: A Longitudinal Study. J. Glob. Inf. Manag. 2021, 29, 1–22. [Google Scholar] [CrossRef]
- Krishna, B.; Sebastian, M.P. Examining the relationship between e-government development, nation’s cyber-security commitment, business usage and economic prosperity: A cross-country analysis. Inf. Comput. Secur. 2021, 29, 737–760. [Google Scholar] [CrossRef]
- Ma, D.; Zhou, J.J.; Zuo, M.Y. Inter-agency information sharing for Chinese e-government development: A comparison between vertical and horizontal dimensions. Inf. Technol. Dev. 2022, 28, 297–318. [Google Scholar] [CrossRef]
- Zakovec, L.; Ondria, P. Development and Current State of E-government in the Federal Republic of Germany. Politicke Vedy 2022, 25, 231–260. [Google Scholar] [CrossRef]
- Silal, P.; Saha, D. E-Government as a Tool for Human Development: The Moderating Influence of National Culture. J. Glob. Inf. Technol. Manag. 2021, 24, 235–258. [Google Scholar] [CrossRef]
- Cho, B.; Rethemeyer, R.K. Whom do we learn from? The impact of global networks and political regime types on e-government development. Int. Public Manag. J. 2022, 26, 507–527. [Google Scholar] [CrossRef]
- Tan, H.B.; Zhao, X.J.; Zhang, N. Technology symbolization: Political mechanism of local e-government adoption and implementation(1). Int. Rev. Adm. Sci. 2022, 88, 511–532. [Google Scholar] [CrossRef]
- Aranyossy, M. User adoption and value of e-government services (Citizen-centric empirical study from Hungary). Acta Oeconomica 2022, 72, 477–497. [Google Scholar] [CrossRef]
- Mensah, I.K. Impact of Government Capacity and E-Government Performance on the Adoption of E-Government Services. Int. J. Public Adm. 2020, 43, 303–311. [Google Scholar] [CrossRef]
- Chen, L.J.; Aklikokou, A.K. Determinants of E-government Adoption: Testing the Mediating Effects of Perceived Usefulness and Perceived Ease of Use. Int. J. Public Adm. 2020, 43, 850–865. [Google Scholar] [CrossRef]
- Zhang, B.H.; Zhu, Y.H. Comparing attitudes towards adoption of e-government between urban users and rural users: An empirical study in Chongqing municipality, China. Behav. Inf. Technol. 2021, 40, 1154–1168. [Google Scholar] [CrossRef]
- Al Mansoori, K.A.; Sarabdeen, J.; Tchantchane, A.L. Investigating Emirati citizens’ adoption of e-government services in Abu Dhabi using modified UTAUT model. Inf. Technol. People 2018, 31, 455–481. [Google Scholar] [CrossRef]
- Monteiro, J.; Bernando, M.; Ferreira, M.; Rocha, T. Validation of e-Government Information Delivery Attributes: The Adoption of the Focus Group Method. J. Univers. Comput. Sci. 2021, 27, 1069–1095. [Google Scholar] [CrossRef]
- Mohammadi, M.K. Factors influencing the adoption of e-government websites in Afghanistan from the citizens’ perspective. Electron. J. Inf. Syst. Dev. Ctries. 2022, 88, e12216. [Google Scholar] [CrossRef]
- Bayaga, A. Examining the predictive relevance of security, privacy risk factors, and institutional logics for e-government service adoption. Electron. J. Inf. Syst. Dev. Ctries. 2022, 88, e12201. [Google Scholar] [CrossRef]
- Mensah, I.K.; Mi, J.N. Exploring the Impact of Demographic Factors on E-Government Services Adoption. Inf. Resour. Manag. J. 2018, 31, 1–16. [Google Scholar] [CrossRef]
- Kumar, R.; Sachan, A.; Mukherjee, A.; Kumar, R. Factors influencing e-government adoption in India: A qualitative approach. Digit. Policy Regul. Gov. 2018, 20, 413–433. [Google Scholar] [CrossRef]
- Vazquez-Lopez, A.; Marey-Perez, M. Factors Affecting e-Government Adoption by Dairy Farmers: A Case Study in the North-West of Spain. Future Internet 2021, 13, 206. [Google Scholar] [CrossRef]
- Ramirez-Madrid, J.P.; Escobar-Sierra, M.; Lans-Vargas, I.; Hincapie, J.M.M. Factors influencing citizens’ adoption of e-government: An empirical validation in a Developing Latin American Country. Public Manag. Rev. 2022, 26, 185–218. [Google Scholar] [CrossRef]
- Barbosa, J.D.S.; Mota, F.P.B. Adoption of e-government: A study on the role of trust. Rev. De Adm. Publica 2022, 56, 441–464. [Google Scholar] [CrossRef]
- Alzahrani, L.; Al-Karaghouli, W.; Weerakkody, V. Investigating the impact of citizens’ trust toward the successful adoption of e-government: A multigroup analysis of gender, age, and internet experience. Inf. Syst. Manag. 2018, 35, 124–146. [Google Scholar] [CrossRef]
- Verkijika, S.F.; De Wet, L. E-government adoption in sub-Saharan Africa. Electron. Commer. Res. Appl. 2018, 30, 83–93. [Google Scholar] [CrossRef]
- Olesen, K.; Wood, L.C.; Chong, J.L.L. Citizen Adoption in E-Government Systems: A Meta Analysis. J. Glob. Inf. Manag. 2021, 29, 1–28. [Google Scholar] [CrossRef]
- Glyptis, L.; Christofi, M.; Vrontis, D.; Del Giudice, M.; Dimitriou, S.; Michael, P. E-Government implementation challenges in small countries: The project manager’s perspective. Technol. Forecast. Soc. Change 2020, 152, 119880. [Google Scholar] [CrossRef]
- Olumoye, M.Y.; Govender, I. An empirical investigation of factors influencing integrated e-Government implementation in Nigeria: A case of housing and urban development agency. Electron. J. Inf. Syst. Dev. Ctries. 2018, 84, e12012. [Google Scholar] [CrossRef]
- Dias, G.P. Determinants of e-government implementation at the local level: An empirical model. Online Inf. Rev. 2020, 44, 1307–1326. [Google Scholar] [CrossRef]
- Gerunov, A.A. A Privacy-by-Design Implementation Methodology for E-Government. Int. J. Electron. Gov. Res. 2022, 18, 1–20. [Google Scholar] [CrossRef]
- Park, C.H.; Kim, K. E-government as an anti-corruption tool: Panel data analysis across countries. Int. Rev. Adm. Sci. 2020, 86, 691–707. [Google Scholar] [CrossRef]
- Wu, A.M.; Yan, Y.F.; Vyas, L. Public sector innovation, e-government, and anticorruption in China and India: Insights from civil servants. Aust. J. Public Adm. 2020, 79, 370–385. [Google Scholar] [CrossRef]
- Khan, A.; Krishnan, S. Conceptualizing the impact of corruption in national institutions and national stakeholder service systems on e-government maturity. Int. J. Inf. Manag. 2019, 46, 23–36. [Google Scholar] [CrossRef]
- Nam, T. Examining the anti-corruption effect of e-government and the moderating effect of national culture: A cross-country study. Gov. Inf. Q. 2018, 35, 273–282. [Google Scholar] [CrossRef]
- Wang, L.H.; Luo, X.; Jurkat, M.P. Understanding Inconsistent Corruption Control through E-government Participation: Updated Evidence from a Cross-Country Investigation. Electron. Commer. Res. 2022, 22, 979–1006. [Google Scholar] [CrossRef]
- Ramtohul, A.; Soyjaudah, K.M.S. Information security governance for e-services in southern African developing countries e-Government projects. J. Sci. Technol. Policy Manag. 2016, 7, 26–42. [Google Scholar] [CrossRef]
- Zou, Q.; Mao, Z.; Yan, R.; Liu, S.; Duan, Z. Vision and reality of e-government for governance improvement: Evidence from global cross-country panel data. Technol. Forecast. Soc. Change 2023, 194, 122667. [Google Scholar] [CrossRef]
- Lulaj, E.; Zarin, I.; Rahman, S. A Novel Approach to Improving E-Government Performance from Budget Challenges in Complex Financial Systems. Complexity 2022, 2022, 2507490. [Google Scholar] [CrossRef]
- Ma, L.; Zheng, Y.P. National e-government performance and citizen satisfaction: A multilevel analysis across European countries. Int. Rev. Adm. Sci. 2019, 85, 506–526. [Google Scholar] [CrossRef]
- Chen, Y.C.; Hu, L.T.; Tseng, K.C.; Juang, W.J.; Chang, C.K. Cross-boundary e-government systems: Determinants of performance. Gov. Inf. Q. 2019, 36, 449–459. [Google Scholar] [CrossRef]
- Sharma, P.N.; Morgeson, F.V.; Mithas, S.; Aljazzaf, S. An empirical and comparative analysis of E-government performance measurement models: Model selection via explanation, prediction, and parsimony. Gov. Inf. Q. 2018, 35, 515–535. [Google Scholar] [CrossRef]
- Abdulkareem, A.K.; Ramli, R.M. Evaluating the Performance of e-government: Does Citizens’ Access to ICT Matter? Pertanika J. Soc. Sci. Humanit. 2021, 29, 1507–1534. [Google Scholar] [CrossRef]
- Deng, H.P.; Karunasena, K.; Xu, W. Evaluating the performance of e-government in developing countries A public value perspective. Internet Res. 2018, 28, 169–190. [Google Scholar] [CrossRef]
- Verkijika, S.F.; De Wet, L. Quality assessment of e-government websites in Sub-Saharan Africa: A public values perspective. Electron. J. Inf. Syst. Dev. Ctries. 2018, 84, e12015. [Google Scholar] [CrossRef]
- Li, Y.; Shang, H.P. Service quality, perceived value, and citizens’ continuous-use intention regarding e-government: Empirical evidence from China. Inf. Manag. 2020, 57, 103197. [Google Scholar] [CrossRef]
- Kumar, R.; Kumar, R.; Sachan, A.; Gupta, P. An examination of the e-government service value chain. Inf. Technol. People 2021, 34, 889–911. [Google Scholar] [CrossRef]
- Mensah, I.K.; Adams, S. A Comparative Analysis of the Impact of Political Trust on the Adoption of E-Government Services. Int. J. Public Adm. 2020, 43, 682–696. [Google Scholar] [CrossRef]
- Sukhonos, V.; Pakhomov, V.; Pylypenko, V.; Kolesnikova, M.; Maletov, D. Administrative and legal bases of implementation of e-government in Ukraine. Amazon. Investig. 2022, 11, 24–36. [Google Scholar] [CrossRef]
- Arayankalam, J.; Khan, A.; Krishnan, S. How to deal with corruption? Examining the roles of e-government maturity, government administrative effectiveness, and virtual social networks diffusion. Int. J. Inf. Manag. 2021, 58, 102203. [Google Scholar] [CrossRef]
- Ma, L.; Zheng, Y.P. Does e-government performance actually boost citizen use? Evidence from European countries. Public Manag. Rev. 2018, 20, 1513–1532. [Google Scholar] [CrossRef]
- Ejdys, J.; Ginevicius, R.; Rozsa, Z.; Janoskova, K. The Role of Perceived Risk and Security Level in Building Trust in e-Government Solutions. Econ. Manag. 2019, 22, 220–235. [Google Scholar] [CrossRef]
- Nguyen-Duc, A.; Do, M.V.; Hong, Q.L.; Khac, K.N.; Quang, A.N. On the adoption of static analysis for software security assessment-A case study of an open-source e-government project. Comput. Secur. 2021, 111, 102470. [Google Scholar] [CrossRef]
- Zhang, H.P.; Tang, Z.W.; Jayakar, K. A socio-technical analysis of China’s cybersecurity policy: Towards delivering trusted e-government services. Telecommun. Policy 2018, 42, 409–420. [Google Scholar] [CrossRef]
- Politanskyi, V.; Lukianov, D.; Ponomarova, H.; Gyliaka, O. Information Security in E-Government: Legal Aspects. Cuest. Politicas 2021, 39, 361–372. [Google Scholar] [CrossRef]
- Choi, M.; Lee, J.; Hwang, K. Information Systems Security (ISS) of E-Government for Sustainability: A Dual Path Model of ISS Influenced by Institutional Isomorphism. Sustainability 2018, 10, 1555. [Google Scholar] [CrossRef]
- Alguliyev, R.; Aliguliyev, R.; Yusifov, F. Role of Social Networks in E-government: Risk Security Threats. Online J. Commun. Media Technol. 2018, 8, 363–376. [Google Scholar] [CrossRef]
- Zubareva, O.O.; Byelov, S.V. Electronic Government System of Ukraine and a Method for Increasing Its Security. Cybern. Syst. Anal. 2015, 51, 481–488. [Google Scholar] [CrossRef]
- Alharbi, N.; Papadaki, M.; Dowland, P. The impact of security and its antecedents in behaviour intention of using e-government services. Behav. Inf. Technol. 2017, 36, 620–636. [Google Scholar] [CrossRef]
- Al-Hawamleh, A.M. Investigating the multifaceted dynamics of cybersecurity practices and their impact on the quality of e-government services: Evidence from the KSA. Digit. Policy Regul. Gov. 2024, 26, 317–336. [Google Scholar] [CrossRef]
- Muneer, F.; Azam, A.; Yang, H.; Saeed, M. Examining Perceived Privacy, Perceived Security and Technology Anxiety into UMEGA in Improving Adoption Behavior of E-Government Services: An Evidence from Pakistan. Int. J. Hum.-Comput. Interact. 2024, 40, 1–13. [Google Scholar] [CrossRef]
- Mustafa, G.; Rafiq, W.; Jhamat, N.; Arshad, Z.; Rana, F.A. Blockchain-based governance models in e-government: A comprehensive framework for legal, technical, ethical and security considerations. Int. J. Law Manag. 2025, 67, 37–55. [Google Scholar] [CrossRef]
- Mishra, S.; Alowaidi, M.A.; Sharma, S.K. Impact of security standards and policies on the credibility of e-government. J. Ambient Intell. Humaniz. Comput. 2021, 12, 1–15. [Google Scholar] [CrossRef]
- Hwang, K.; Choi, M. Effects of innovation-supportive culture and organizational citizenship behavior on e-government information system security stemming from mimetic isomorphism. Gov. Inf. Q. 2017, 34, 183–198. [Google Scholar] [CrossRef]
Authors | Articles |
---|---|
DWIVEDI Y | 33 |
MENSAH I | 31 |
ABU-SHANAB E | 20 |
JANSSEN M | 20 |
RANA N | 20 |
LEE J | 19 |
WANG S | 19 |
WANG Y | 19 |
WEERAKKODY V | 19 |
LI Y | 18 |
Country | Freq |
---|---|
CHINA | 1129 |
USA | 787 |
UK | 417 |
INDIA | 373 |
SPAIN | 358 |
AUSTRALIA | 220 |
UKRAINE | 217 |
GERMANY | 208 |
SOUTH KOREA | 206 |
MALAYSIA | 202 |
Author and Publisher | Total Citations |
---|---|
LU J, 2015, DECIS SUPPORT SYST | 962 |
DWIVEDI Y, 2019, INFORM SYST FRONT | 862 |
MERGEL I, 2019, GOV INFORM Q | 531 |
LI L, 2018, INFORM SYST J | 435 |
DWIVEDI Y, 2017, GOV INFORM Q | 368 |
JANSSEN M, 2017, J BUS RES | 366 |
WIRTZ B, 2019, INT J PUBLIC ADMIN | 328 |
BONSÓN E, 2015, GOV INFORM Q | 302 |
CUCCINIELLO M, 2017, PUBLIC ADMIN REV | 253 |
DWIVEDI Y, 2015, INFORM SYST FRONT | 252 |
Mapping of E-Government Research Themes | |||
---|---|---|---|
Theme | Interest | Concepts | Sources |
Development | Widespread | Decision-making, evolution, public value, transparency, efficiency, engagement, website useability, user’s perception of quality, government effectiveness, culture, cybersecurity, information sharing, interconnection of services, human development, international collaborations. | [34,36,37,38,39,40,41,42,43,44,45,46,47] |
Adoption | Widespread | Environment, process, information, value, capacity, usefulness, behaviour, resistance to change, content delivery, interactions, and emotional aspects. | [48,49,50,51,52,53,54] |
Factors | Website quality, technology adoption, trust, privacy, security risk, age, transparency, corruption, forced adoption, fairness in customer support, internet connection quality, complexity, performance, and cost–benefit expectancy and security. | [55,56,57,58,59,60,61,62,63,64] | |
Implementation | Widespread | National financial position, e-readiness, infrastructure, innovation, communication, political and legal framework, promotion, technological, organisational, and environmental tools, e-participation, e-transparency and e-services, population size, age, privacy. | [48,65,66,67,68] |
Corruption | Widespread | Mitigation, income inequality, maturity, e-government participation. | [69,70,71,72,73] |
Governance | Factors | E-governance, social role, public value. | [74,75] |
Performance | Factors | Budget, satisfaction, relationship with adoption, measurement models, access, public value. | [76,77,78,79,80,81] |
Value | Factors | Public value of websites, perceived value, service value chain, relation with performance. | [49,81,82,83,84] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mushtaq, S.; Shah, M. Mitigating Cybercrimes in E-Government Services: A Systematic Review and Bibliometric Analysis. Digital 2025, 5, 3. https://doi.org/10.3390/digital5010003
Mushtaq S, Shah M. Mitigating Cybercrimes in E-Government Services: A Systematic Review and Bibliometric Analysis. Digital. 2025; 5(1):3. https://doi.org/10.3390/digital5010003
Chicago/Turabian StyleMushtaq, Shahrukh, and Mahmood Shah. 2025. "Mitigating Cybercrimes in E-Government Services: A Systematic Review and Bibliometric Analysis" Digital 5, no. 1: 3. https://doi.org/10.3390/digital5010003
APA StyleMushtaq, S., & Shah, M. (2025). Mitigating Cybercrimes in E-Government Services: A Systematic Review and Bibliometric Analysis. Digital, 5(1), 3. https://doi.org/10.3390/digital5010003