{"id":"https://openalex.org/W4403278627","doi":"https://doi.org/10.1109/mcna63144.2024.10703931","title":"A Model for Adaptive Bug Bounty Programs and Responsible Disclosure in E-Government Vulnerability Management","display_name":"A Model for Adaptive Bug Bounty Programs and Responsible Disclosure in E-Government Vulnerability Management","publication_year":2024,"publication_date":"2024-09-17","ids":{"openalex":"https://openalex.org/W4403278627","doi":"https://doi.org/10.1109/mcna63144.2024.10703931"},"language":"en","primary_location":{"id":"doi:10.1109/mcna63144.2024.10703931","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcna63144.2024.10703931","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Multimedia Computing, Networking and Applications (MCNA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027857056","display_name":"Ibrahim Obeidat","orcid":null},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Ibrahim Obeidat","raw_affiliation_strings":["Faculty of Prince Al-Hussien bin Abdullah for IT The Hashemite University,Department of Information Technology,Zarqa,Jordan,P.O. Box 330127"],"affiliations":[{"raw_affiliation_string":"Faculty of Prince Al-Hussien bin Abdullah for IT The Hashemite University,Department of Information Technology,Zarqa,Jordan,P.O. Box 330127","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108184197","display_name":"Esraa Alhayek","orcid":null},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Esraa Alhayek","raw_affiliation_strings":["Faculty of Prince Al-Hussien bin Abdullah for IT The Hashemite University,Department of Information Technology,Zarqa,Jordan,P.O. Box 330127"],"affiliations":[{"raw_affiliation_string":"Faculty of Prince Al-Hussien bin Abdullah for IT The Hashemite University,Department of Information Technology,Zarqa,Jordan,P.O. Box 330127","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108184198","display_name":"Ala Obeidat","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ala Obeidat","raw_affiliation_strings":["University Science Malaysia,School of Computer Science,Penang,11700"],"affiliations":[{"raw_affiliation_string":"University Science Malaysia,School of Computer Science,Penang,11700","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027857056"],"corresponding_institution_ids":["https://openalex.org/I157392197"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27558294,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"102","last_page":"107"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9767000079154968,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9767000079154968,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9422000050544739,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9316999912261963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6551880240440369},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.592233419418335},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5023801326751709},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.48453229665756226},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46470868587493896},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.44633376598358154},{"id":"https://openalex.org/keywords/adaptive-management","display_name":"Adaptive management","score":0.4390198290348053},{"id":"https://openalex.org/keywords/environmental-resource-management","display_name":"Environmental resource management","score":0.1685592234134674},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.0926329493522644},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.08604678511619568},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.08575442433357239}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6551880240440369},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.592233419418335},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5023801326751709},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.48453229665756226},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46470868587493896},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.44633376598358154},{"id":"https://openalex.org/C2775917145","wikidata":"https://www.wikidata.org/wiki/Q4680750","display_name":"Adaptive management","level":2,"score":0.4390198290348053},{"id":"https://openalex.org/C107826830","wikidata":"https://www.wikidata.org/wiki/Q929380","display_name":"Environmental resource management","level":1,"score":0.1685592234134674},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0926329493522644},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.08604678511619568},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.08575442433357239},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mcna63144.2024.10703931","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcna63144.2024.10703931","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Multimedia Computing, Networking and Applications (MCNA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2036829732","https://openalex.org/W2084967079","https://openalex.org/W2157217003","https://openalex.org/W2159847651","https://openalex.org/W2345814641","https://openalex.org/W2471549692","https://openalex.org/W2513442265","https://openalex.org/W2520816865","https://openalex.org/W2747484939","https://openalex.org/W2767122007","https://openalex.org/W2911002801","https://openalex.org/W2946540753","https://openalex.org/W2999191767","https://openalex.org/W4288103030","https://openalex.org/W4387221236","https://openalex.org/W6686664692"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W1756374135","https://openalex.org/W2947584067","https://openalex.org/W3118510577","https://openalex.org/W2280562859","https://openalex.org/W230721595","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2062873522"],"abstract_inverted_index":{"The":[0,89,174],"rapid":[1],"digital":[2,197,205],"transformation":[3],"of":[4,31,44,86,98,114,145,157,171,181,191],"government":[5,58,204],"services":[6],"into":[7],"e-government":[8,45,172,192],"platforms":[9],"has":[10],"necessitated":[11],"an":[12],"evolution":[13],"in":[14,57,71,95,135,203],"cybersecurity":[15,65,147,189],"strategies":[16],"to":[17,103,140,167],"protect":[18],"sensitive":[19,87,107],"information":[20,54],"and":[21,36,74,77,111,132,163,183,199],"maintain":[22],"public":[23,201],"trust.":[24],"This":[25,152],"research":[26],"paper":[27,122],"explores":[28],"the":[29,42,63,79,84,96,112,121,142,146,155,169,178,188],"integration":[30,180],"Bug":[32,129],"Bounty":[33,130],"Programs":[34,131],"(BBP)":[35],"Responsible":[37,133],"Disclosure":[38,134],"(RD)":[39],"mechanisms":[40],"within":[41],"framework":[43],"vulnerability":[46],"management.":[47],"By":[48],"conducting":[49],"a":[50,92,124,158,195],"comprehensive":[51],"survey":[52],"among":[53],"technology":[55],"staff":[56],"sectors,":[59],"this":[60],"study":[61,175],"assesses":[62],"current":[64],"knowledge":[66],"base,":[67],"identifies":[68],"key":[69],"challenges":[70],"implementing":[72],"BBP":[73,182],"RD":[75,184],"programs,":[76],"evaluates":[78],"perceived":[80],"risks":[81],"associated":[82],"with":[83],"disclosure":[85],"information.":[88],"findings":[90],"reveal":[91],"significant":[93],"gap":[94],"adoption":[97],"crowdsourced":[99],"security":[100,170],"methods":[101],"due":[102],"concerns":[104],"about":[105],"exposing":[106],"data,":[108],"trust":[109],"issues,":[110],"absence":[113],"supportive":[115],"legislation.":[116],"To":[117],"address":[118],"these":[119],"challenges,":[120],"proposes":[123],"novel":[125],"Model":[126],"for":[127],"Adaptive":[128],"E-Government":[136],"Vulnerability":[137],"Management,":[138],"designed":[139],"leverage":[141],"collective":[143],"expertise":[144],"community":[148],"while":[149],"mitigating":[150],"risks.":[151],"model":[153],"emphasizes":[154],"importance":[156],"unified":[159],"platform,":[160],"exclusive":[161],"participation,":[162],"clear":[164],"regulatory":[165],"frameworks":[166],"enhance":[168],"services.":[173],"concludes":[176],"that":[177],"strategic":[179],"can":[185],"significantly":[186],"improve":[187],"posture":[190],"services,":[193],"fostering":[194],"safer":[196],"environment":[198],"enhancing":[200],"confidence":[202],"initiatives.":[206]},"counts_by_year":[],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
