Kontaktujte nás | Jazyk: čeština English
dc.title | Evaluating a proposed e-government stage model in terms of personal data protection | en |
dc.contributor.author | Muhammad, Hemin Akram | |
dc.contributor.author | Hromada, Martin | |
dc.relation.ispartof | Applied Sciences-Basel | |
dc.identifier.issn | 2076-3417 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.date.issued | 2023 | |
utb.relation.volume | 13 | |
utb.relation.issue | 6 | |
dc.type | article | |
dc.language.iso | en | |
dc.publisher | MDPI | |
dc.identifier.doi | 10.3390/app13063913 | |
dc.relation.uri | https://www.mdpi.com/2076-3417/13/6/3913 | |
dc.subject | e-government | en |
dc.subject | stage model | en |
dc.subject | protecting personal information | en |
dc.subject | SOAR | en |
dc.subject | AHP | en |
dc.description.abstract | In today's era, the e-government plays a significant role in providing better services to citizens. As a result, citizens are crucial in ensuring the success of the e-government and are involved in the government's policies. Hence, the protection of personal information must be taken into consideration when designing any e-government model. Previous studies have shown that privacy and security are the main challenges in implementing an e-government in developing countries. This study aims to evaluate an e-government stage model that is proposed based on protecting personal information in developing countries. The methodology of this study uses SOAR (Strengths, Opportunities, Aspirations, and Results) analysis to evaluate the stages and combines it with the Analytic Hierarchy Process (AHP) to determine the feasibility of the model. The results of the study show that the model is acceptable and suitable for adoption. Therefore, the model is a viable option for implementing an e-government in developing countries. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1011489 | |
utb.identifier.obdid | 43885010 | |
utb.identifier.scopus | 2-s2.0-85151566436 | |
utb.identifier.wok | 000954041600001 | |
utb.source | J-wok | |
dc.date.accessioned | 2023-04-18T13:35:28Z | |
dc.date.available | 2023-04-18T13:35:28Z | |
dc.rights | Attribution 4.0 International | |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | |
dc.rights.access | openAccess | |
utb.ou | Department of Security Engineering | |
utb.contributor.internalauthor | Muhammad, Hemin Akram | |
utb.contributor.internalauthor | Hromada, Martin | |
utb.fulltext.sponsorship | The work was not created with the support of the project. | |
utb.wos.affiliation | [Muhammad, Hemin; Hromada, Martin] Fac Appl Informat, Dept Secur Engn, nam T G Masaryka 5555, Zlin 76001, Czech Republic | |
utb.scopus.affiliation | Department of Security Engineering, Faculty of Applied Informatics, nám. T. G. Masaryka 5555, Zlín, 760 01, Czech Republic | |
utb.fulltext.projects | - |