{"id":"https://openalex.org/W2065806364","doi":"https://doi.org/10.1108/14637150710740473","title":"Online security evaluation process for new e\u2010services","display_name":"Online security evaluation process for new e\u2010services","publication_year":2007,"publication_date":"2007-04-05","ids":{"openalex":"https://openalex.org/W2065806364","doi":"https://doi.org/10.1108/14637150710740473","mag":"2065806364"},"language":"en","primary_location":{"id":"doi:10.1108/14637150710740473","is_oa":false,"landing_page_url":"https://doi.org/10.1108/14637150710740473","pdf_url":null,"source":{"id":"https://openalex.org/S2508752","display_name":"Business Process Management Journal","issn_l":"1463-7154","issn":["1463-7154","1758-4116"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Business Process Management Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040891432","display_name":"Mihyar Hesson","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mihyar Hesson","raw_affiliation_strings":["College of Information Technology, UAE University, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, UAE University, Abu Dhabi, United Arab Emirates","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007829766","display_name":"Hayder Al\u2010Ameed","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hayder Al\u2010Ameed","raw_affiliation_strings":["College of Information Technology, UAE University, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, UAE University, Abu Dhabi, United Arab Emirates","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5040891432"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.4845,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.88556929,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"13","issue":"2","first_page":"223","last_page":"246"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10953","display_name":"E-Government and Public Services","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10953","display_name":"E-Government and Public Services","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6764665246009827},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.6480821371078491},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5672110319137573},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5445762276649475},{"id":"https://openalex.org/keywords/standard-of-good-practice","display_name":"Standard of Good Practice","score":0.5424154996871948},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.526495635509491},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5222499966621399},{"id":"https://openalex.org/keywords/information-security-management-system","display_name":"Information security management system","score":0.4528835117816925},{"id":"https://openalex.org/keywords/directory","display_name":"Directory","score":0.4434429705142975},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.4401484727859497},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4386245608329773},{"id":"https://openalex.org/keywords/information-security-standards","display_name":"Information security standards","score":0.43637973070144653},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.42774030566215515},{"id":"https://openalex.org/keywords/itil-security-management","display_name":"ITIL security management","score":0.4184093475341797},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.32613056898117065},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.2703903317451477},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.23170825839042664},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.2303772270679474},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.08502992987632751},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08371415734291077},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.0798577070236206}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6764665246009827},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.6480821371078491},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5672110319137573},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5445762276649475},{"id":"https://openalex.org/C47309137","wikidata":"https://www.wikidata.org/wiki/Q7598357","display_name":"Standard of Good Practice","level":5,"score":0.5424154996871948},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.526495635509491},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5222499966621399},{"id":"https://openalex.org/C111153917","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management system","level":5,"score":0.4528835117816925},{"id":"https://openalex.org/C2777683733","wikidata":"https://www.wikidata.org/wiki/Q201456","display_name":"Directory","level":2,"score":0.4434429705142975},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.4401484727859497},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4386245608329773},{"id":"https://openalex.org/C139547956","wikidata":"https://www.wikidata.org/wiki/Q6031202","display_name":"Information security standards","level":5,"score":0.43637973070144653},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.42774030566215515},{"id":"https://openalex.org/C114351632","wikidata":"https://www.wikidata.org/wiki/Q5974820","display_name":"ITIL security management","level":5,"score":0.4184093475341797},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.32613056898117065},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.2703903317451477},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.23170825839042664},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2303772270679474},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.08502992987632751},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08371415734291077},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0798577070236206},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/14637150710740473","is_oa":false,"landing_page_url":"https://doi.org/10.1108/14637150710740473","pdf_url":null,"source":{"id":"https://openalex.org/S2508752","display_name":"Business Process Management Journal","issn_l":"1463-7154","issn":["1463-7154","1758-4116"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Business Process Management Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.5400000214576721,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W11079898","https://openalex.org/W1552085058","https://openalex.org/W1968189045","https://openalex.org/W1975385385","https://openalex.org/W1977037734","https://openalex.org/W1992967779","https://openalex.org/W1993497167","https://openalex.org/W2013299382","https://openalex.org/W2040814058","https://openalex.org/W2042069313","https://openalex.org/W2053825348","https://openalex.org/W2054030698","https://openalex.org/W2054904780","https://openalex.org/W2057779782","https://openalex.org/W2066013707","https://openalex.org/W2126716625","https://openalex.org/W2149686728","https://openalex.org/W2160196038","https://openalex.org/W4205325953","https://openalex.org/W4213039493","https://openalex.org/W4240635303","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W578019356","https://openalex.org/W2003676537","https://openalex.org/W2948947981","https://openalex.org/W2483557577","https://openalex.org/W1982946593","https://openalex.org/W40842196","https://openalex.org/W203815982","https://openalex.org/W2000891179","https://openalex.org/W2609802486","https://openalex.org/W1573253764"],"abstract_inverted_index":{"Purpose":[0],"This":[1,37],"paper":[2],"sets":[3],"out":[4],"to":[5,7],"contribute":[6],"making":[8],"the":[9,12,20,28,33,42,97,110,120,124,134,138,142,146],"use":[10],"of":[11,22,32,51,85,123,136],"Dubai":[13,143],"e\u2010government":[14,144],"services":[15],"more":[16],"secure":[17],"and":[18,30,89,102,132],"facilitating":[19,133],"process":[21,135],"introducing":[23],"new":[24],"services,":[25],"while":[26],"maintaining":[27],"integrity":[29],"security":[31,68],"whole":[34],"system.":[35],"Design/methodology/approach":[36],"work":[38],"is":[39,60,100],"based":[40],"on":[41],"ISO":[43,46,72],"17799":[44,47,73],"standard.":[45],"a":[48],"comprehensive":[49],"set":[50,147],"controls":[52],"comprising":[53],"best":[54],"practices":[55],"in":[56,62,83],"information":[57,67,99],"security.":[58],"It":[59],"essentially,":[61],"part,":[63],"an":[64],"internationally\u2010recognized":[65],"generic":[66],"standard":[69],"(":[70],"The":[71,77,93,127],"Directory":[74],").":[75],"Findings":[76],"system":[78,94,128],"has":[79],"achieved":[80],"its":[81],"objectives":[82],"terms":[84],"performance,":[86],"cost,":[87],"reliability":[88],"flexibility.":[90],"Practical":[91],"implications":[92],"assumes":[95],"that":[96],"fed":[98],"true":[101],"authenticated.":[103],"However,":[104],"this":[105],"may":[106,116],"not":[107],"always":[108],"be":[109,117],"case.":[111],"Therefore,":[112],"onsite":[113],"manual":[114],"verification":[115],"required":[118],"at":[119],"very":[121],"end":[122],"process.":[125],"Originality/value":[126],"would":[129],"serve":[130],"accelerating":[131],"expanding":[137],"e\u2010services":[139],"provided":[140],"by":[141],"within":[145],"timeframe.":[148]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
