{"id":"https://openalex.org/W4383752506","doi":"https://doi.org/10.1145/3598469.3598529","title":"A Security-Evaluation Framework for Mobile Cross-Border e-Government Solutions","display_name":"A Security-Evaluation Framework for Mobile Cross-Border e-Government Solutions","publication_year":2023,"publication_date":"2023-07-10","ids":{"openalex":"https://openalex.org/W4383752506","doi":"https://doi.org/10.1145/3598469.3598529"},"language":"en","primary_location":{"id":"doi:10.1145/3598469.3598529","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3598469.3598529","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Annual International Conference on Digital Government Research","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057386847","display_name":"Thomas Zefferer","orcid":"https://orcid.org/0000-0001-5037-0657"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Thomas Zefferer","raw_affiliation_strings":["A-SIT Plus GmbH, Austria"],"raw_orcid":"https://orcid.org/0000-0001-5037-0657","affiliations":[{"raw_affiliation_string":"A-SIT Plus GmbH, Austria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053625444","display_name":"Bernd Pr\u00fcnster","orcid":"https://orcid.org/0000-0001-7902-0087"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bernd Prunster","raw_affiliation_strings":["A-SIT Plus GmbH, Austria"],"raw_orcid":"https://orcid.org/0000-0001-7902-0087","affiliations":[{"raw_affiliation_string":"A-SIT Plus GmbH, Austria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102849152","display_name":"Christian Kollmann","orcid":"https://orcid.org/0009-0002-2869-684X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Christian Kollmann","raw_affiliation_strings":["A-SIT Plus GmbH, Austria"],"raw_orcid":"https://orcid.org/0009-0002-2869-684X","affiliations":[{"raw_affiliation_string":"A-SIT Plus GmbH, Austria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013468912","display_name":"Andreea Ancuta Corici","orcid":"https://orcid.org/0000-0003-2938-6296"},"institutions":[{"id":"https://openalex.org/I2800804238","display_name":"Fraunhofer Institute for Open Communication Systems","ror":"https://ror.org/00px80p03","country_code":"DE","type":"facility","lineage":["https://openalex.org/I2800804238","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Andreea Ancuta Corici","raw_affiliation_strings":["Fraunhofer FOKUS Institute, Germany"],"raw_orcid":"https://orcid.org/0000-0003-2938-6296","affiliations":[{"raw_affiliation_string":"Fraunhofer FOKUS Institute, Germany","institution_ids":["https://openalex.org/I2800804238"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033696059","display_name":"Lukas Alber","orcid":"https://orcid.org/0009-0003-8312-5086"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Lukas Alber","raw_affiliation_strings":["Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria"],"raw_orcid":"https://orcid.org/0009-0003-8312-5086","affiliations":[{"raw_affiliation_string":"Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092438412","display_name":"Roland Czerny","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Roland Czerny","raw_affiliation_strings":["Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria"],"raw_orcid":"https://orcid.org/0009-0000-9230-0833","affiliations":[{"raw_affiliation_string":"Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021416938","display_name":"Bla\u017e Podgorelec","orcid":"https://orcid.org/0000-0002-6322-746X"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Blaz Podgorelec","raw_affiliation_strings":["Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria"],"raw_orcid":"https://orcid.org/0000-0002-6322-746X","affiliations":[{"raw_affiliation_string":"Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria","institution_ids":["https://openalex.org/I4092182"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5057386847"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6816,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.75060586,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"536","last_page":"543"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10953","display_name":"E-Government and Public Services","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6995168924331665},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.698587954044342},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.6224113702774048},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5157580375671387},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.501331090927124},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.485751211643219},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4735262393951416},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4435170888900757},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.4236328899860382},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.42222124338150024},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.3637896776199341},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.24310770630836487},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10830861330032349}],"concepts":[{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6995168924331665},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.698587954044342},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.6224113702774048},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5157580375671387},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.501331090927124},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.485751211643219},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4735262393951416},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4435170888900757},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.4236328899860382},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.42222124338150024},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.3637896776199341},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.24310770630836487},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10830861330032349},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3598469.3598529","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3598469.3598529","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Annual International Conference on Digital Government Research","raw_type":"proceedings-article"},{"id":"pmh:oai:publica.fraunhofer.de:publica/456799","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/456799","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1246619394","https://openalex.org/W1986117326","https://openalex.org/W2044961552","https://openalex.org/W2070958191","https://openalex.org/W2478098398","https://openalex.org/W2513599839","https://openalex.org/W2765923968","https://openalex.org/W2922330176","https://openalex.org/W4295788750"],"related_works":["https://openalex.org/W2784006287","https://openalex.org/W2907868081","https://openalex.org/W4206910357","https://openalex.org/W2000428303","https://openalex.org/W2222589037","https://openalex.org/W4252804791","https://openalex.org/W2056275442","https://openalex.org/W1976635772","https://openalex.org/W2037791655","https://openalex.org/W2113932201"],"abstract_inverted_index":{"Security":[0],"evaluation":[1,79,207],"is":[2,33],"crucial":[3],"for":[4,169],"any":[5,19],"security-critical":[6],"system.":[7],"In":[8,106,120],"this":[9,70,108,121,125],"context,":[10],"a":[11,43,55,95,129,182],"system":[12],"can":[13],"mean":[14],"technical":[15,118],"systems,":[16],"organizations,":[17],"or":[18],"other":[20],"entity":[21],"with":[22],"certain":[23,47],"security":[24,78,218],"requirements.":[25],"The":[26,142,205],"major":[27],"challenge":[28],"in":[29,192,203,220,227],"doing":[30],"risk":[31,59],"analysis":[32],"the":[34,111,135,148,170,175,193,210,214,221,229],"trade-off":[35,230],"between":[36,231],"completeness":[37,232],"and":[38,64,74,153,158,197,224,233],"complexity.":[39,234],"When":[40,52],"done":[41,53],"on":[42,54,85,94],"more":[44],"abstract":[45,97],"level,":[46,58],"risks":[48],"are":[49],"potentially":[50],"overlooked.":[51],"very":[56],"detailed":[57],"analyses":[60],"quickly":[61],"become":[62],"complex":[63],"exceed":[65],"available":[66],"resources.":[67],"To":[68],"tackle":[69,124],"challenge,":[71],"various":[72],"norms":[73,157],"standards":[75,91,115,159],"propose":[76],"different":[77,104],"methodologies.":[80],"These":[81],"methodologies":[82],"vary":[83],"depending":[84],"their":[86],"target":[87],"scope.":[88],"Also,":[89],"these":[90,114],"typically":[92],"remain":[93],"rather":[96],"level":[98],"to":[99,103,116,134,160,181],"ensure":[100],"broad":[101],"applicability":[102],"systems.":[105,119],"practice,":[107],"often":[109],"complicates":[110],"application":[112,216],"of":[113,138,155,184,217],"concrete":[117],"paper,":[122],"we":[123],"issue":[126],"by":[127,178],"proposing":[128],"customized":[130],"security-evaluation":[131],"framework":[132,144,177,212],"tailored":[133],"special":[136],"characteristics":[137],"cross-border":[139,200],"e-government":[140,201],"services.":[141],"proposed":[143,176,211],"does":[145],"not":[146],"re-invent":[147],"wheel":[149],"but":[150],"combines":[151],"aspects":[152,166],"approaches":[154],"established":[156],"cherry-pick":[161],"from":[162],"each":[163],"standard":[164],"those":[165],"most":[167],"beneficial":[168],"given":[171],"context.":[172],"We":[173],"evaluated":[174],"applying":[179],"it":[180],"set":[183],"software":[185],"building":[186],"blocks,":[187],"which":[188],"have":[189],"been":[190],"developed":[191],"Horizon-2020":[194],"project":[195],"mGov4EU":[196],"leverage":[198],"mobile":[199],"services":[202],"Europe.":[204],"conducted":[206],"shows":[208],"that":[209],"facilitates":[213],"practical":[215],"evaluations":[219],"targeted":[222],"domain":[223],"supports":[225],"evaluators":[226],"handling":[228]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
