<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Privacy Level Agreements for Public Administration Information Systems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Vasiliki</forename><surname>Diamantopoulou</surname></persName>
							<email>v.diamantopoulou@brighton.ac.uk</email>
							<affiliation key="aff0">
								<orgName type="department">School of Computing, Engineering and Mathematics</orgName>
								<orgName type="institution">University of Brighton</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Michalis</forename><surname>Pavlidis</surname></persName>
							<email>m.pavlidis@brighton.ac.uk</email>
							<affiliation key="aff0">
								<orgName type="department">School of Computing, Engineering and Mathematics</orgName>
								<orgName type="institution">University of Brighton</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Haralambos</forename><surname>Mouratidis</surname></persName>
							<email>h.mouratidis@brighton.ac.uk</email>
							<affiliation key="aff0">
								<orgName type="department">School of Computing, Engineering and Mathematics</orgName>
								<orgName type="institution">University of Brighton</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">Privacy Level Agreements for Public Administration Information Systems</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">EE2861157D002AEEDE3F084469A5BB63</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T06:10+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Privacy Level Agreement</term>
					<term>Privacy Management</term>
					<term>Citizen</term>
					<term>Public Administration</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Improving Public Administration (PA) operations and services is a major focus globally; they should be transparent, accountable and provide services that improve citizens' confidence and trust. In this context, it is important that PAs have the ability to define agreements between citizens and PAs and that such agreements can be used in the context of PAs Information Systems to specify citizens' privacy needs, provide feedback on data sharing and enable PA departments to analyse privacy threats and vulnerabilities, compliance with laws and regulations and analyse trust relationships. We propose the use of the concept of Privacy Level Agreement (PLA) to address the aforementioned issues. The PLA is formally specified, based on an XML schema, which enables its automated use.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Advancements in ICT have enabled Public Administration (PA) to offer an increasing number of e-services to citizens <ref type="bibr" target="#b1">[2]</ref>. The benefits provided to citizens, such as increase in efficiency, productivity, and growth <ref type="bibr" target="#b6">[7]</ref>, can be significantly improved when information is shared across multiple information systems belonging to different PAs (one-stop concept <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b12">13]</ref>) and when citizens do not need to input the same information across different PA information systems.</p><p>On the other hand, a recent EC initiative for capturing European citizens' opinion concerning their attitude to data protection <ref type="bibr" target="#b2">[3]</ref> revealed that 69% are concerned that the personal data they provide may be used for a purpose other than that for which it was collected. Moreover, the General Data Protection Regulation (GDPR) <ref type="bibr" target="#b11">[12]</ref> on data privacy forces organisations to manage data in a specific way with regards to privacy. In such context, it is crucial that PA information systems are developed and operate in a way that improve transparency of citizen data sharing. In doing so, it is important that PAs are able to clearly specify citizen privacy needs, provide them with feedback on how their data is shared and on whether sharing of their data conflicts with their needs. In addition, PAs should enable citizens to understand potential threats and vulnerabilities to their privacy needs, as well as trust relationships that might endanger their privacy. We address this challenge by proposing the use of the concept of Privacy Level Agreement (PLA), which formalises a mutual agreement between a citizen and a PA regarding the citizens privacy needs and supports the transparency of citizens' data sharing. The PLA is delivered in a form of a structured agreement that consists of fields, each of them capturing important and obligatory information with regards to privacy of citizens' data. We also propose an XML schema to enable the creation and management of machine-readable PLAs, allowing its utilisation by distributed information systems, thus addressing interoperability issues.</p><p>The paper is structured as follows: Section 2 discusses related work while Section 3 presents the context and the definition of the PLA and also provides the specification of it. In Section 4 we provide the outcome of this work and finally, Section 5 summarises the paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Related Work</head><p>The concept of PLA has been launched as an initiative to capture privacy aspects of cloud providers. The Privacy Level Agreement Working Group of the Cloud Security Alliance has defined a PLA in the context of cloud services <ref type="bibr" target="#b3">[4]</ref>. Similarly, the concept of PLA has been presented by <ref type="bibr" target="#b4">[5]</ref> as a standardised way for cloud providers to describe their data protection practices. In this environment the PLA is considered as a means for the cloud providers to ensure that their privacy policy is communicated to the service consumers. However, these works are limited only to privacy aspects of cloud provision and do not provide support for specification of user preferences and needs or ways to define privacy threats and vulnerabilities related to these needs.</p><p>On the other hand, the literature provides many examples of works that focus on the specification of Service Level Agreements (SLAs) which refer to the mutual agreement that ensures the obligations and the requirements both of a service provider and a customer (e.g., <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b8">9]</ref>). In contrast to PLA, an SLA does not take into account privacy aspects of the agreement between a service provider and a service consumer.</p><p>Concerning the privacy policies enforcement, the idea of a standardised way for web sites to communicate with users about their privacy policies in a standard machine-readable format has been introduced by the Platform of Privacy Preferences (P3P) project <ref type="bibr" target="#b15">[16]</ref>. This standard enables web browsers and other user agents to interpret privacy policies on behalf of their users, assisting them to decide when to exchange data with web sites. However, P3P was designed for static environments where users privacy preferences are not expected to change and it also provides limited support for specification of privacy threats and vulnerabilities that might endanger the privacy needs. Finally, in <ref type="bibr" target="#b5">[6]</ref> the authors propose an architecture that promotes the employment of privacy policies and preferences. They introduce the Privacy Controller Agent for storing and com-paring service providers' privacy policies and user privacy preferences. However, this work does not provide an agreement between the interested entities but rather an architecture to define privacy policies.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Specification of a Privacy Level Agreement</head><p>In the context of our work we define a PLA as the mutual agreement of the privacy settings between a service provider (i.e. Public Administration (PA)) and a user (i.e. citizen), where the former will commit to provide and maintain these settings throughout the provision of the service. Thus, the PAs can (i) handle the personal data they keep taking into account citizens' privacy needs, (ii) provide information concerning the processes they follow and the management of personal data and (iii) demonstrate that they have proceeded to all the necessary actions to make their systems robust, mitigating all possible threats.</p><p>The structure of the proposed PLA is depicted in Fig. <ref type="figure" target="#fig_0">1</ref> as a UML class diagram which shows the concepts of the PLA, their hierarchy, and their relationships with each other. The PLA is represented as a class that contains two subclasses, the first with information related to the PA and the second with information related to the citizen. In turn, each section contains a number of fields that includes information related to the privacy of the citizens' data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Public Administration PLA Section</head><p>The PA section has the following fields. For each field we provide a short description and we specify them using an xml schema <ref type="foot" target="#foot_0">1</ref> . The schema enables us to represent the PLA with the potential to be machine readable and to allow information systems to further process the information included in the PLA, for example, for enforcing privacy polices.</p><p>Identity: This field describes the publication of administration's name, place of establishment, and the contact details of the PA's data controller administrator. Assigning such a responsibility to an employee of the organisation is important so that the citizen has a point of contact in case they want to make a query, contributing to the accountability of the service <ref type="bibr" target="#b9">[10]</ref>.</p><p>Data: Specifies which personal data the citizen needs to provide to the PA.</p><p>Data processing rights: Provides information about processing and storing of citizens' data. Acquiring complete information about processing and storing of their personal data to the PAs' information systems, citizens are fully informed, e.g., on the location of their stored data, on the processing rights, etc.</p><p>Data Sharing Preferences: Provides information about third parties that can have access to citizens' data, since as the PA has the ability to collect huge amount of citizen data, this may attract external parties that want to acquire the data <ref type="bibr" target="#b9">[10]</ref>. Data Privacy Measures: Specifies the technical, physical and organisational measures in place to protect citizens' personal data against accidental or unlawful destruction or loss, alteration, unauthorised use, modification, disclosure of access, and against all other unlawful forms of processing. These measures can ensure the satisfaction of the relevant privacy requirements.</p><p>Privacy Threat Analysis: Provides the threat analysis of the PA's privacy needs and requirements. Citizens need assurances that the PA introduces appropriate mechanisms and processes to support the privacy needs, and inform them when these needs are not followed due to either PA policies or legislation. Having such information improves the transparency of PA's operations in terms of data management, and it therefore helps to improve citizens' trust.</p><p>Privacy Trust Analysis: Provides the trust analysis of the PA's privacy needs and requirements. Since trust is considered a very important factor for the adoption of e-government services <ref type="bibr" target="#b13">[14]</ref>, PA's have to demonstrate that the infrastructure and the staff responsible for the operation of the infrastructure can be trusted <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b10">11]</ref>.</p><p>Law compliance: Provides information on whether privacy requirements are complaint with privacy laws at a national and EU level. In particular, it specifies the constraints imposed by regulations and laws and also how the PA uses/man-ages citizen data. Also, it verifies if the data management specified by the PAs respects the constraints specified in laws and regulations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Citizen PLA Section</head><p>The citizen section has the following fields:</p><p>National Public Authority: Contains the details of the National Public Authority responsible for protecting citizens' personal data rights. Adding such information to the PLA will raise the awareness of the citizens about the protection of their data rights by the specific national public authority.</p><p>Citizen Privacy Preferences: Contains the privacy preferences of the citizen that have been collected by the PA. The study of <ref type="bibr" target="#b16">[17]</ref> reveals that the government applications that engage citizens and allow interactivity with them, have positive payoffs for trust in government.</p><p>History based assessment: Consists of an analysis of the citizens' privacy preferences and the generation of a prediction of the possible outcomes of subsequent requests. It contains an estimation of the accepted or denied requests for citizens data, based on their requirements available and the aggregated statistics about other citizens, collected up to that moment.</p><p>Data Value: Contains the citizens' perspective concerning their data and the valuation of citizens' data by the PA and the average valuation of all the citizens. This information can increase transparency since it communicates to the citizen the relative value of data and consequently, it will increase the trust of the citizen in the PA.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Illustrative example of a Privacy Level Agreement</head><p>To better demonstrate the applicability of the PLA in the context of a PA information system, we apply the defined PLA to a real-case study. In this scenario, a local Public Administration, the Municipality of Athens (MoA), makes use of their information system MACS (Municipality Athens Citizen System) to provide e-services to Athenian citizens and to store all their data. Although multiple services are provided through MACS, in this paper, due to space limitations, we focus on the e-service related to the issue of a birth certificate. As part of that service, the PA supports the creation and enforcement of a PLA. In doing so, the PA requests that all citizens requiring the birth certificate e-service are provided with the option to provide their privacy preferences and create a PLA. The interaction among the citizen and the PA is depicted in Fig. <ref type="figure" target="#fig_1">2</ref> and described as follows. A citizen requests the issue of a birth certificate, using the MACS system. The MACS receives the request and presents a questionnaire that enables the citizen to declare their privacy preferences. Based on the citizen's answers, the PA information system proceeds to the creation of the PLA which is presented to the citizen. After the citizen has received their personalised PLA, they are requested by the MACS to give all the necessary data for requesting the issue of a birth certificate. The citizen proceeds and provides the MACS with all the necessary information. The MACS receives the data and, after its storage, it sends a notification to an MoA employee to process the request. When the request has been processed, then citizen receives their birth certificate. The creation of the PLA requires that all fields described in the previous section are filled in with relevant information. Some of the fields (such as the identity and National Public Authority) can be pre-defined by the PA. Others, such as Citizen Privacy Preferences, are filled in based on the answers the citizen provides to the questionnaire. The rest of the fields are filled in following privacy related analysis that PA performs using appropriate tools and systems.</p><p>The PLA, depicted in Fig. <ref type="figure" target="#fig_2">3</ref>, gives the citizen the ability to be aware of exactly the data the PA has about them, how this data is processed, with whom this data will be shared, the privacy mechanisms implemented by the PA along with the threats that can endanger citizen's privacy and the corresponding mitigation actions. In addition, the citizen knows the PA employee assigned as the data controller of their data, has an estimation of the value of their data and information about past events that enables them to make more informed decisions about the sharing of their data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>PAs should realise the importance of the adoption of a privacy culture that enhances their trustworthiness, by making their systems and procedures trans- parent. Towards this goal, the establishment of a PLA can contribute to the achievement of the desired degree of PAs transparency, increasing the awareness of citizens concerning the preservation of their personal data and allowing them to set their preferences concerning the handling of their data.</p><p>The idea of PLA can also be applied in other contexts where online services are provided, especially in situations where the provision of individuals' personal data is necessary for the service to be carried out. These contexts can include relationships between healthcare institutions and patients, business to business, and customers to business.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. PLA stucture</figDesc><graphic coords="4,134.77,116.83,345.83,276.10" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Process flow of the PLA</figDesc><graphic coords="6,181.90,174.42,251.56,215.46" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Instance of a PLA</figDesc><graphic coords="7,134.77,116.83,345.83,243.18" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">http://www.sense-brighton.eu/xml_pla/</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgement This research was supported by the Visual Privacy Management in User Centric Open Environments (VisiOn) project, supported by the EU Horizon 2020 programme, Grant Agreement No. 653642.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Specification of service level agreements, clarifying concepts on the basis of practical research</title>
		<author>
			<persName><forename type="first">J</forename><surname>Bouman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Trienekens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Van Der Zwan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Software Technology and Engineering Practice</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="1999">1999. 1999</date>
			<biblScope unit="page" from="169" to="178" />
		</imprint>
	</monogr>
	<note>STEP&apos;99. Proceedings.</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">The utilization of e-government services: citizen trust, innovation and acceptance factors</title>
		<author>
			<persName><forename type="first">L</forename><surname>Carter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Bélanger</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information systems journal</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="5" to="25" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">E</forename><surname>Commission</surname></persName>
		</author>
		<title level="m">Eurobarometer 431 -data protection report</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
	<note type="report_type">Tech. rep</note>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m">CSA: Privacy level agreement outline for the sale of cloud services in the european union</title>
				<imprint>
			<date type="published" when="2013-02">February 2013</date>
		</imprint>
		<respStmt>
			<orgName>Tech. rep., Cloud Security Alliance, Privacy Level Agreement Working Group</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Towards a formalised representation for the technical enforcement of privacy level agreements</title>
		<author>
			<persName><forename type="first">M</forename><surname>Derrico</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Pearson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2015">2015. 2015</date>
			<biblScope unit="page" from="422" to="427" />
		</imprint>
	</monogr>
	<note>Cloud Engineering (IC2E)</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Employing privacy policies and preferences in modern e-government environments</title>
		<author>
			<persName><forename type="first">P</forename><surname>Drogkaris</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gritzalis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Lambrinoudakis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Electronic Governance</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="101" to="116" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">E-government adoption: architecture and barriers</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Ebrahim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Irani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Business process management journal</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="589" to="611" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Perceived usefulness, personal experiences, risk perception and trust as determinants of adoption of e-government services in the netherlands</title>
		<author>
			<persName><forename type="first">M</forename><surname>Horst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kuttschreuter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Gutteling</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers in Human Behavior</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="1838" to="1852" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">The wsla framework: Specifying and monitoring service level agreements for web services</title>
		<author>
			<persName><forename type="first">A</forename><surname>Keller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Ludwig</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Network and Systems Management</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="57" to="81" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">E-government and e-governance: the future isn&apos;t what it used to be</title>
		<author>
			<persName><forename type="first">S</forename><surname>Marche</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Mcniven</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Canadian Journal of Administrative Sciences/Revue Canadienne des Sciences de l&apos;Administration</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="74" to="86" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Modeling online security and privacy to increase consumer purchasing intent</title>
		<author>
			<persName><forename type="first">M</forename><surname>Milloy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Fink</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Morris</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Informing Science &amp; IT Education Joint Conference (InSITE)</title>
				<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Regulation (eu)</title>
		<author>
			<persName><forename type="first">E</forename><surname>Parliament</surname></persName>
		</author>
		<ptr target="http://eur-lex.europa.eu/legal-content/EN/TXT/" />
	</analytic>
	<monogr>
		<title level="m">free movement of such data, and repealing directive 95/46/ec (general data protection regulation)</title>
				<imprint>
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
	<note>/679 of the european parliament and of the coucil of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">A systematic literature review of interoperable architecture for e-government portals</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">A</forename><surname>Sedek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sulaiman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Omar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Software Engineering (MySEC)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2011">2011. 2011</date>
			<biblScope unit="page" from="82" to="87" />
		</imprint>
	</monogr>
	<note>5th Malaysian Conference in</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Citizen trust development for e-government adoption: Case of singapore</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">C</forename><surname>Srivastava</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Teo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Proceedings</title>
		<imprint>
			<biblScope unit="page">59</biblScope>
			<date type="published" when="2005">2005. 2005</date>
		</imprint>
	</monogr>
	<note>PACIS</note>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Online one-stop government: A single point of access to. Electronic government strategies and implementation</title>
		<author>
			<persName><forename type="first">E</forename><surname>Tambouris</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Archetypon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M</forename><surname>Wimmer</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page">115</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">Platform for privacy preferences (p3p) project</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">W W C</forename><surname>W3c)</surname></persName>
		</author>
		<ptr target="https://www.w3.org/P3P/" />
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Linking citizen satisfaction with egovernment and trust in government</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">W</forename><surname>Welch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">C</forename><surname>Hinnant</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Moon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of public administration research and theory</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="371" to="391" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
