Web application vulnerability assessment and policy direction towards a secure smart government

This paper carried out technological analysis of e-government platforms with a view of assessing possible application flaws that can inhibit smooth running of the available web services provided. Two sets of data were collected with an interval of two years on 64 Nigerian government websites. Five w...

Full description

Saved in:
Bibliographic Details
Published in:Government information quarterly Vol. 31; pp. S118 - S125
Main Authors: Awoleye, Olusesan M., Ojuloge, Blessing, Ilori, Mathew O.
Format: Journal Article
Language:English
Published: Elsevier Inc 01-06-2014
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract This paper carried out technological analysis of e-government platforms with a view of assessing possible application flaws that can inhibit smooth running of the available web services provided. Two sets of data were collected with an interval of two years on 64 Nigerian government websites. Five web vulnerability variables known to be notorious for web attacks were purposively investigated. In the overall assessment for the two datasets, the average result showed that about 67% are affected by broken links (BL), 43.8% by unencrypted password (UP), 35% by cross site scripting (XSS) and about one out of every four are affected by each of Structured Query Language Injection (SQLi) and cookie manipulation (CM). An independent t test statistic showed that there is a significant difference between the groups for three of the variables investigated, these are: XSS, SQLi and CM at 95% confidence interval. The motivation for this study is premised on the risk that these results pose to the smooth running of the e-government services and the possibility of financial loss. The research thus suggests some useful policy directions to enhance the provision of a secure smarter government. •We identified loopholes due to poor design of web platforms for e-government services.•Assessment of vulnerability propensity revealed XSS and SQLi as possible high attack.•All categories of government sector portals were found to be susceptible which could hinder quality service delivery.•Suggestions were advanced for a smarter e-government of the future.•Policies were advanced to alleviate the challenges.
AbstractList This paper carried out technological analysis of e-government platforms with a view of assessing possible application flaws that can inhibit smooth running of the available web services provided. Two sets of data were collected with an interval of two years on 64 Nigerian government websites. Five web vulnerability variables known to be notorious for web attacks were purposively investigated. In the overall assessment for the two datasets, the average result showed that about 67% are affected by broken links (BL), 43.8% by unencrypted password (UP), 35% by cross site scripting (XSS) and about one out of every four are affected by each of Structured Query Language Injection (SQLi) and cookie manipulation (CM). An independent t test statistic showed that there is a significant difference between the groups for three of the variables investigated, these are: XSS, SQLi and CM at 95% confidence interval. The motivation for this study is premised on the risk that these results pose to the smooth running of the e-government services and the possibility of financial loss. The research thus suggests some useful policy directions to enhance the provision of a secure smarter government. •We identified loopholes due to poor design of web platforms for e-government services.•Assessment of vulnerability propensity revealed XSS and SQLi as possible high attack.•All categories of government sector portals were found to be susceptible which could hinder quality service delivery.•Suggestions were advanced for a smarter e-government of the future.•Policies were advanced to alleviate the challenges.
Author Ilori, Mathew O.
Awoleye, Olusesan M.
Ojuloge, Blessing
Author_xml – sequence: 1
  givenname: Olusesan M.
  orcidid: 0000-0002-2587-9512
  surname: Awoleye
  fullname: Awoleye, Olusesan M.
  email: awoleye@yahoo.co.uk
  organization: African Institute for Science Policy and Innovation (AISPI), Faculty of Technology, Obafemi Awolowo University, Ile-Ife, Nigeria
– sequence: 2
  givenname: Blessing
  orcidid: 0000-0002-2318-7571
  surname: Ojuloge
  fullname: Ojuloge, Blessing
  organization: National Centre for Technology Management, Agency of the Federal Ministry of Science & Technology, Obafemi Awolowo University, Ile-Ife, Nigeria
– sequence: 3
  givenname: Mathew O.
  surname: Ilori
  fullname: Ilori, Mathew O.
  organization: African Institute for Science Policy and Innovation (AISPI), Faculty of Technology, Obafemi Awolowo University, Ile-Ife, Nigeria
BookMark eNp9kM1KAzEUhYMo2FYfwF1eYMYkk5nM4EqKf1BwU9BdyCQ3JWWajMm00rc3ta6FA3dzvsO5Z44uffCA0B0lJSW0ud-WG_dVMkJ5SWgWu0Az2gpWdDUVl2hGBCdFw_jnNZqntCWEMEbJDMkP6LEax8FpNbng8WE_eIiqd4ObjlilBCntwE9YeYPHkH1HbFwE_euewreKJmGFE-h9BJx2Kk54Ew4Q_Qm7QVdWDQlu_-4CrZ-f1svXYvX-8rZ8XBWatWwqOuh7bgUXXU9qRtrO6qrhXSWaSou6ppZB0zJleqsq3Whdm75WTHfciMzZaoHoOVbHkFIEK8focpWjpESeBpJbmQeSp4EkoVksMw9nBnKvg4Mok3bgNZzfkya4f-gf0fdy_w
CitedBy_id crossref_primary_10_1016_j_giq_2018_09_007
crossref_primary_10_1145_3465061
crossref_primary_10_4236_jcc_2015_39004
crossref_primary_10_1016_j_jclepro_2019_119926
crossref_primary_10_15388_Soctyr_45_1_5
crossref_primary_10_1108_AJIM_10_2022_0461
crossref_primary_10_1007_s10796_016_9673_7
crossref_primary_10_1016_j_giq_2019_101408
crossref_primary_10_1080_01900692_2016_1242614
crossref_primary_10_1007_s40860_017_0046_x
crossref_primary_10_1007_s12517_017_3296_2
crossref_primary_10_1108_ICS_12_2020_0205
crossref_primary_10_3233_IP_170067
crossref_primary_10_25046_aj050283
crossref_primary_10_3390_smartcities6020053
crossref_primary_10_1080_12460125_2022_2094528
crossref_primary_10_1142_S1363919620500322
crossref_primary_10_1080_1206212X_2018_1445352
crossref_primary_10_1007_s11432_016_0322_7
crossref_primary_10_1016_j_giq_2015_07_001
crossref_primary_10_1016_j_scs_2020_102416
Cites_doi 10.2307/2234988
10.1016/S0167-9236(02)00118-5
10.1016/j.cose.2011.12.004
10.1108/14637150510619902
10.1016/j.giq.2009.07.004
10.1016/j.cose.2009.04.008
10.1016/j.giq.2003.08.005
10.1504/AJAAF.2013.057077
10.1016/S0740-624X(01)00090-9
10.1016/j.cose.2008.09.005
10.1016/j.giq.2006.04.011
10.1111/0033-3352.00196
10.1016/j.ins.2005.02.009
10.1093/icc/8.1.3
10.1504/IJESDF.2007.013595
10.1016/S0740-624X(01)00062-4
10.1080/12294659.2002.10805005
10.1016/j.giq.2006.07.018
10.1016/j.giq.2008.09.002
10.1016/S0740-624X(01)00066-1
ContentType Journal Article
Copyright 2014 Elsevier Inc.
Copyright_xml – notice: 2014 Elsevier Inc.
DBID AAYXX
CITATION
DOI 10.1016/j.giq.2014.01.012
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Government
Library & Information Science
EISSN 1872-9517
EndPage S125
ExternalDocumentID 10_1016_j_giq_2014_01_012
S0740624X14000823
GroupedDBID --K
--M
-~X
.4I
.4L
.CB
.DC
.~1
0R~
13V
1B1
1RT
1~.
1~5
29I
4.4
41~
457
4G.
5GY
5VS
6TJ
7-5
71M
77K
8P~
8VB
9JO
AACTN
AAEDT
AAEDW
AAFJI
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
ABFNM
ABFRF
ABJNI
ABKBG
ABMAC
ABMMH
ABMVD
ABXDB
ABYKQ
ACBEA
ACDAQ
ACGFS
ACHQT
ACHRH
ACNTT
ACRLP
ADBBV
ADEZE
ADMUD
AEBSH
AEFWE
AEKER
AEMOZ
AETEA
AFFNX
AFKWA
AFTJW
AGHFR
AGJBL
AGUBO
AGUMN
AGYEJ
AHHHB
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
AKVCP
AKYCK
ALEQD
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOMHK
ASPBG
AVARZ
AVWKF
AXJTR
AZFZN
BKOJK
BLXMC
BNSAS
CS3
DO4
EBE
EBR
EBS
EBU
ECR
EFJIC
EFLBG
EHE
EHL
EIS
EJD
ELW
EMH
EMI
EMK
EO8
EO9
EP2
EP3
ESO
F5P
FDB
FEDTE
FGOYB
FIL
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
HMY
HVGLF
HZ~
IHE
J1W
K1G
KOM
M3Y
M41
MO0
MVM
N9A
O-L
O9-
OAUVE
OHT
OZT
P-8
P-9
PC.
PQQKQ
PRBVW
Q38
QWB
R2-
RIG
ROL
RPZ
SDF
SDG
SDP
SES
SEW
SPCBC
SSB
SSL
SSO
SSS
SSZ
T5K
TH9
TKY
TN5
UHS
UNMZH
UQL
VQA
WUQ
XPP
ZL0
ZMT
~8M
~G-
AAXKI
AAYXX
ADMHG
AFJKZ
AKRWK
CITATION
ID FETCH-LOGICAL-c282t-9ebb4f7479b052089fc36493763c7551f2e682adbfa3c6cc5db5a2c94d7b4ff3
ISSN 0740-624X
IngestDate Thu Nov 21 21:52:51 EST 2024
Fri Feb 23 02:27:12 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Policy
Cross site injection
Cookie manipulation
Web vulnerability
SQL injection
Smart government
E-government
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c282t-9ebb4f7479b052089fc36493763c7551f2e682adbfa3c6cc5db5a2c94d7b4ff3
ORCID 0000-0002-2587-9512
0000-0002-2318-7571
ParticipantIDs crossref_primary_10_1016_j_giq_2014_01_012
elsevier_sciencedirect_doi_10_1016_j_giq_2014_01_012
PublicationCentury 2000
PublicationDate 2014-06-01
PublicationDateYYYYMMDD 2014-06-01
PublicationDate_xml – month: 06
  year: 2014
  text: 2014-06-01
  day: 01
PublicationDecade 2010
PublicationTitle Government information quarterly
PublicationYear 2014
Publisher Elsevier Inc
Publisher_xml – name: Elsevier Inc
References Higgins (bb0170) 2006
Zhao, Zhao (bb0350) 2010; 27
Chen (bb0080) 2002; 34
Chen, Gant (bb0090) 2001; 18
Endler (bb0130) 2002
Christey, Martin (bb0105) 2007
Erlingsson, Livshits, Xie (bb0135) 2009
Halfond, Viegas, Orso (bb0160) 2006
Halkidis, Chtzigeorgiou, Stephanides (bb0165) 2006
Ifinedo (bb8000) 2005; 1
Kim, Jeong, Lee (bb0210) 2009; 26
OWASP (bb0275) 2004
Cook (bb0110) 2003
Kc, Keromytis, Prevelakis (bb0205) 2003, October
Balduzzi, Gimenez, Balzarotti, Kirda (bb0055) 2010
infoDev/World Bank (bb0200) 2009
Awoleye, Okogun, Siyanbola (bb0045) 2013; 2
Wang (bb0320) 2002; 20
Gil-García, Martinez-Moyano (bb0145) 2005
Mohammed, Abubakar, Bashir (bb0195) 2010
Anthopoulos, Siozos, Soukalas (bb0030) 2007; 24
Awoleye, Ojuloge, Siyanbola (bb0040) 2012
Ajayi (bb0005) 2003
Awoleye, Oluwaranti, Siyanbola, Adagunodo (bb0035) 2008
Akunyili (bb0010) 2010
Sang-ho (bb0340) 2002; 11
SANS Institute (bb0295) 2009
Metcalfe (bb0240) 1994; 104
Moon (bb0260) 2002; 62
Schelin (bb0300) 2003
Martinez-Romo, Araujo (bb0235) 2012; 48
Almgren, Debar, Dacier (bb0015) 2000
Cenzic (bb0070) 2009
Xie, Aiken (bb0335) 2006
Bandhakavi, Bisht, Madhusudan, Venkatakrishnan (bb9000) 2010
OWASP, Open Web Application Security Project (bb0280)
Malerba, Nelson, Orsenigo, Winter (bb0230) 1999; 8
Rokhman (bb0290) 2011; 2
Pauli, Engebretson, Ham, Zautke (bb0285) 2011
Yves, Wouter, Frank (bb0345) 2005
Lee, Jeong, Yeo, Moon (bb0225) 2011; 55
Wangpipatwong, Chutimaskul, Papasratorn (bb0325) 2005
Halfond, Orso (bb0155) 2005
Whitson, Davis (bb0330) 2001; 18
Fatile (bb0140) 2012; 2
Ifenedo (bb0185) 2006
Kirda, Jovanovic, Kruegel, Vigna (bb0215) 2009; 28
Mitropoulos, Spinellis (bb0245) 2009; 28
Gundy, Chen (bb0150) 2012; 31
Nelson, Winter (bb0270) 1982
Hsieh, Wang, Tsai, Tseng (bb0190) 2006; 176
Hee-joon (bb0315) 2002; 7
Huang, Huang, Lin (bb0180) 2003
Hee-joon (bb0310) 2002; 40
Bates, Barth, Jackson (bb0065) 2010
Howard, LeBlanc (bb0175) 2003
Ebrahim, Irani (bb0125) 2005; 11
CWE-SANS (bb0120) 2010
Moen, Klingsheim, Simonsen, Hole (bb0255) 2007; 1
Barrantes, Ackley, Forrest, Palmer, Stefanovic, Zovi (bb0060) 2003, October
Chien (bb0095) 2006
Layne, Lee (bb0220) 2001; 18
Moen, Klingsheim, Simonsen, Hole (bb0250) 2006
CERT (bb0075) 2000
Backus (bb0050) 2001
Anley (bb0020) 2002
Chan, Lau, Pan (bb0085) 2008; 25
Gundy (10.1016/j.giq.2014.01.012_bb0150) 2012; 31
CERT (10.1016/j.giq.2014.01.012_bb0075)
Rokhman (10.1016/j.giq.2014.01.012_bb0290) 2011; 2
Ebrahim (10.1016/j.giq.2014.01.012_bb0125) 2005; 11
Malerba (10.1016/j.giq.2014.01.012_bb0230) 1999; 8
Sang-ho (10.1016/j.giq.2014.01.012_bb0340) 2002; 11
Moen (10.1016/j.giq.2014.01.012_bb0255) 2007; 1
Ajayi (10.1016/j.giq.2014.01.012_bb0005) 2003
Gil-García (10.1016/j.giq.2014.01.012_bb0145) 2005
Awoleye (10.1016/j.giq.2014.01.012_bb0035) 2008
Halkidis (10.1016/j.giq.2014.01.012_bb0165)
Martinez-Romo (10.1016/j.giq.2014.01.012_bb0235) 2012; 48
Howard (10.1016/j.giq.2014.01.012_bb0175) 2003
Lee (10.1016/j.giq.2014.01.012_bb0225) 2011; 55
Metcalfe (10.1016/j.giq.2014.01.012_bb0240) 1994; 104
Chien (10.1016/j.giq.2014.01.012_bb0095)
Nelson (10.1016/j.giq.2014.01.012_bb0270) 1982
Awoleye (10.1016/j.giq.2014.01.012_bb0045) 2013; 2
OWASP, Open Web Application Security Project (10.1016/j.giq.2014.01.012_bb0280)
Akunyili (10.1016/j.giq.2014.01.012_bb0010) 2010
Cenzic (10.1016/j.giq.2014.01.012_bb0070)
Chen (10.1016/j.giq.2014.01.012_bb0090) 2001; 18
Kc (10.1016/j.giq.2014.01.012_bb0205) 2003
Yves (10.1016/j.giq.2014.01.012_bb0345) 2005
Hee-joon (10.1016/j.giq.2014.01.012_bb0310) 2002; 40
SANS Institute (10.1016/j.giq.2014.01.012_bb0295)
Moen (10.1016/j.giq.2014.01.012_bb0250) 2006
Bandhakavi (10.1016/j.giq.2014.01.012_bb9000) 2010
Hsieh (10.1016/j.giq.2014.01.012_bb0190) 2006; 176
Higgins (10.1016/j.giq.2014.01.012_bb0170)
Anley (10.1016/j.giq.2014.01.012_bb0020)
Endler (10.1016/j.giq.2014.01.012_bb0130) 2002
Ifenedo (10.1016/j.giq.2014.01.012_bb0185)
OWASP (10.1016/j.giq.2014.01.012_bb0275) 2004
Whitson (10.1016/j.giq.2014.01.012_bb0330) 2001; 18
Layne (10.1016/j.giq.2014.01.012_bb0220) 2001; 18
Xie (10.1016/j.giq.2014.01.012_bb0335) 2006
Kirda (10.1016/j.giq.2014.01.012_bb0215) 2009; 28
Almgren (10.1016/j.giq.2014.01.012_bb0015) 2000
infoDev/World Bank (10.1016/j.giq.2014.01.012_bb0200)
Backus (10.1016/j.giq.2014.01.012_bb0050) 2001
Moon (10.1016/j.giq.2014.01.012_bb0260) 2002; 62
Chan (10.1016/j.giq.2014.01.012_bb0085) 2008; 25
Hee-joon (10.1016/j.giq.2014.01.012_bb0315) 2002; 7
Cook (10.1016/j.giq.2014.01.012_bb0110)
Mohammed (10.1016/j.giq.2014.01.012_bb0195) 2010
Pauli (10.1016/j.giq.2014.01.012_bb0285) 2011
Halfond (10.1016/j.giq.2014.01.012_bb0160) 2006
Wangpipatwong (10.1016/j.giq.2014.01.012_bb0325) 2005
Bates (10.1016/j.giq.2014.01.012_bb0065) 2010
Huang (10.1016/j.giq.2014.01.012_bb0180) 2003
Erlingsson (10.1016/j.giq.2014.01.012_bb0135) 2009
Awoleye (10.1016/j.giq.2014.01.012_bb0040) 2012
Balduzzi (10.1016/j.giq.2014.01.012_bb0055) 2010
Halfond (10.1016/j.giq.2014.01.012_bb0155) 2005
Wang (10.1016/j.giq.2014.01.012_bb0320) 2002; 20
Mitropoulos (10.1016/j.giq.2014.01.012_bb0245) 2009; 28
Barrantes (10.1016/j.giq.2014.01.012_bb0060) 2003
Ifinedo (10.1016/j.giq.2014.01.012_bb8000) 2005; 1
Fatile (10.1016/j.giq.2014.01.012_bb0140) 2012; 2
Anthopoulos (10.1016/j.giq.2014.01.012_bb0030) 2007; 24
Chen (10.1016/j.giq.2014.01.012_bb0080) 2002; 34
Kim (10.1016/j.giq.2014.01.012_bb0210) 2009; 26
CWE-SANS (10.1016/j.giq.2014.01.012_bb0120)
Christey (10.1016/j.giq.2014.01.012_bb0105)
Schelin (10.1016/j.giq.2014.01.012_bb0300) 2003
Zhao (10.1016/j.giq.2014.01.012_bb0350) 2010; 27
References_xml – year: 1982
  ident: bb0270
  article-title: An evolutionary theory of economic change
  contributor:
    fullname: Winter
– year: 2009
  ident: bb0135
  article-title: End-to-end web application security
  publication-title: Microsoft Research
  contributor:
    fullname: Xie
– volume: 62
  start-page: 424
  year: 2002
  end-page: 433
  ident: bb0260
  article-title: The evolution of e-government among municipalities: Rhetoric or reality?
  publication-title: Public Administration Review
  contributor:
    fullname: Moon
– volume: 18
  start-page: 79
  year: 2001
  end-page: 91
  ident: bb0330
  article-title: Best practices in electronic government: Comprehensive electronic information dissemination for science and technology
  publication-title: Government Information Quarterly
  contributor:
    fullname: Davis
– start-page: 403
  year: 2011
  end-page: 407
  ident: bb0285
  article-title: CookieMonster: Automated session hijacking archival and analysis
  publication-title: Eighth International Conference on Information Technology: New generations
  contributor:
    fullname: Zautke
– year: 2009
  ident: bb0200
  article-title: E-government primer, Washington DC
  contributor:
    fullname: infoDev/World Bank
– ident: bb0280
  article-title: The ten most critical web application security vulnerabilities
  contributor:
    fullname: OWASP, Open Web Application Security Project
– year: 2009
  ident: bb0295
  article-title: Top cyber security risks
  contributor:
    fullname: SANS Institute
– year: 2002
  ident: bb0130
  article-title: The evolution of cross site scripting attacks
  publication-title: Technical report
  contributor:
    fullname: Endler
– volume: 176
  start-page: 1241
  year: 2006
  end-page: 1265
  ident: bb0190
  article-title: Stateful session handoff for mobile WWW
  publication-title: Information Sciences
  contributor:
    fullname: Tseng
– volume: 1
  start-page: 53
  year: 2005
  end-page: 71
  ident: bb8000
  article-title: Measuring Africa's e-readiness in the global networked economy: A nine-country data analysis
  publication-title: The International Journal of Education and Development using Information and Communication Technology
  contributor:
    fullname: Ifinedo
– volume: 7
  start-page: 45
  year: 2002
  end-page: 53
  ident: bb0315
  article-title: Prospects and limitations of the e-government initiative in Korea
  publication-title: International Review of Public Administration
  contributor:
    fullname: Hee-joon
– volume: 2
  start-page: 157
  year: 2013
  end-page: 174
  ident: bb0045
  article-title: Technological assessment of banking innovation in Nigeria
  publication-title: African Journal Accounting, Auditing and Finance
  contributor:
    fullname: Siyanbola
– year: 2010
  ident: bb0065
  article-title: Regular expression considered harmful in client-side XSS filters
  publication-title: WWW 2010, April 26–30, 2010, Raleigh, North Carolina, USA
  contributor:
    fullname: Jackson
– year: 2010
  ident: bb0055
  article-title: Automated discovery of parameter pollution vulnerabilities in web applications
  publication-title: NDSS 2011, 18th Annual Network and Distributed System Security Symposium, 6–9 February 2011, San Diego, CA, USA
  contributor:
    fullname: Kirda
– volume: 18
  start-page: 122
  year: 2001
  end-page: 136
  ident: bb0220
  article-title: Developing fully functional e-government: A four stage model
  publication-title: Government Information Quarterly
  contributor:
    fullname: Lee
– start-page: 174
  year: 2005
  end-page: 183
  ident: bb0155
  article-title: AMNESIA: Analysis and Monitoring for Neutralizing SQL-Injection Attacks
  publication-title: 20th IEEE/ACM International Conference on Automated Software Engineering, CA, USA
  contributor:
    fullname: Orso
– year: 2003
  ident: bb0180
  article-title: Web application security assessment by fault injection and behaviour monitoring
  publication-title: WWW2003, May 20–24, 2003, Budapest, Hungary
  contributor:
    fullname: Lin
– start-page: 2006
  year: 2006
  ident: bb0250
  article-title: Vulnerabilities in e-governments
  publication-title: Proc. 2nd International Conference on Global E-Security (ICGeS-06), London, England, April 20–22
  contributor:
    fullname: Hole
– year: 2010
  ident: bb0195
  article-title: E-government in Nigeria: A catalyst for national development
  publication-title: International conference on development studies
  contributor:
    fullname: Bashir
– year: 2003
  ident: bb0110
  article-title: A web developer's guide to cross scripting
  contributor:
    fullname: Cook
– volume: 24
  start-page: 353
  year: 2007
  end-page: 376
  ident: bb0030
  article-title: Applying participatory design and collaboration in digital public services for discovering and re-designing e-government services
  publication-title: Government Information Quarterly
  contributor:
    fullname: Soukalas
– start-page: 120
  year: 2003
  end-page: 137
  ident: bb0300
  article-title: E-government: An overview
  publication-title: Public information technology: Policy and management issues
  contributor:
    fullname: Schelin
– year: 2003
  ident: bb0175
  article-title: Writing secure code
  contributor:
    fullname: LeBlanc
– year: 2000
  ident: bb0075
  article-title: Advisory CA-2000-02: Malicious HTML tags embedded in client web requests
  contributor:
    fullname: CERT
– year: 2004
  ident: bb0275
  article-title: The ten most critical web application security vulnerabilities
  contributor:
    fullname: OWASP
– start-page: 281
  year: 2003, October
  end-page: 289
  ident: bb0060
  article-title: Randomized instruction set emulation to disrupt binary code injection attacks
  publication-title: Proceedings of the 10th ACM conference on computer and communications security
  contributor:
    fullname: Zovi
– volume: 40
  start-page: 109
  year: 2002
  end-page: 134
  ident: bb0310
  article-title: Analysis on the improved effects of administrative transparency of the e-government
  publication-title: Administrative Treaties
  contributor:
    fullname: Hee-joon
– year: 2006
  ident: bb0170
  article-title: Cross site scripting: Attackers' new favourite flaw
  contributor:
    fullname: Higgins
– volume: 20
  start-page: 333
  year: 2002
  end-page: 352
  ident: bb0320
  article-title: The adoption of electronic tax filing systems: An empirical study
  publication-title: Government Information Quarterly
  contributor:
    fullname: Wang
– year: 2002
  ident: bb0020
  article-title: Advanced SQL injection in sql server applications
  contributor:
    fullname: Anley
– volume: 18
  start-page: 343
  year: 2001
  end-page: 355
  ident: bb0090
  article-title: Transforming local e-government services: The use of application service providers
  publication-title: Government Information Quarterly
  contributor:
    fullname: Gant
– start-page: 157
  year: 2000
  end-page: 170
  ident: bb0015
  article-title: A lightweight tool for detecting web server attacks
  publication-title: Network and Distributed System Security Symposium (NDSS 2000)
  contributor:
    fullname: Dacier
– year: 2006
  ident: bb0165
  article-title: A practical evaluation of security patterns
  contributor:
    fullname: Stephanides
– volume: 48
  start-page: 183
  year: 2012
  end-page: 203
  ident: bb0235
  article-title: Updating broken web links: An automatic recommendation system information processing and management
  contributor:
    fullname: Araujo
– year: 2006
  ident: bb0160
  article-title: A classification of sql injection attacks and counter measures
  contributor:
    fullname: Orso
– volume: 104
  start-page: 931
  year: 1994
  end-page: 944
  ident: bb0240
  article-title: Evolutionary Economics & Technology Policy
  publication-title: The Economic Journal
  contributor:
    fullname: Metcalfe
– year: 2010
  ident: bb9000
  article-title: CANDID: Preventing SQL injection attacks using dynamic candidate evaluations
  contributor:
    fullname: Venkatakrishnan
– year: 2010
  ident: bb0010
  article-title: ICT and e-government in Nigeria: Opportunities and challenges
  publication-title: World Congress on Information Technology, Amsterdam, The Netherlands, 25th–27th May 2010, 2013
  contributor:
    fullname: Akunyili
– volume: 2
  year: 2012
  ident: bb0140
  article-title: Electronic governance: Myth or opportunity for Nigerian public administration?
  publication-title: International Journal of Academic Research in Business and Social Sciences
  contributor:
    fullname: Fatile
– year: 2006
  ident: bb0095
  article-title: Malicious Yahooligans
  contributor:
    fullname: Chien
– start-page: 272
  year: 2003, October
  end-page: 280
  ident: bb0205
  article-title: Countering code-injection attacks with instruction-set randomization
  publication-title: Proceedings of the 10th ACM conference on computer and communications security
  contributor:
    fullname: Prevelakis
– year: 2006
  ident: bb0335
  article-title: Static detection of security vulnerability in scripting languages
  publication-title: 15th USENIX Security Symposium, 2006
  contributor:
    fullname: Aiken
– volume: 25
  start-page: 239
  year: 2008
  end-page: 255
  ident: bb0085
  article-title: E-government implementation: A macro analysis of Singapore's e-government initiatives
  publication-title: Government Information Quarterly
  contributor:
    fullname: Pan
– volume: 8
  start-page: 3
  year: 1999
  end-page: 41
  ident: bb0230
  article-title: History friendly models of industry-evolution: The computer industry
  publication-title: Industrial and Corporate Change
  contributor:
    fullname: Winter
– volume: 1
  start-page: 89
  year: 2007
  end-page: 100
  ident: bb0255
  article-title: Vulnerabilities in e-governments
  publication-title: International Journal of Electronic Security and Digital Forensics
  contributor:
    fullname: Hole
– start-page: 154
  year: 2008
  end-page: 159
  ident: bb0035
  article-title: Assessment of e-governance resource use in southwestern Nigeria
  publication-title: Proceedings of the 2nd international conference on theory and practice of electronic governance. Cairo, Egypt
  contributor:
    fullname: Adagunodo
– volume: 55
  start-page: 58
  year: 2011
  end-page: 68
  ident: bb0225
  article-title: A novel method for SQL injection attack detection based on removing SQL query attribute values
  publication-title: Mathematical and Computer Modeling
  contributor:
    fullname: Moon
– volume: 2
  start-page: 228
  year: 2011
  end-page: 236
  ident: bb0290
  article-title: E-government adoption in developing countries; the case of Indonesia
  publication-title: Journal of Emerging Trends in Computing and Information Sciences
  contributor:
    fullname: Rokhman
– volume: 34
  start-page: 223
  year: 2002
  end-page: 227
  ident: bb0080
  article-title: Digital government: Technologies and practices
  publication-title: Decision Support Systems
  contributor:
    fullname: Chen
– year: 2009
  ident: bb0070
  article-title: Web Application Security Trends Report Q1–Q2, 2009
  contributor:
    fullname: Cenzic
– year: 2005
  ident: bb0325
  article-title: Factors influencing the adoption of Thai e-government websites: Information quality and system quality approach
  publication-title: Proceedings of the Fourth International Conference on eBusiness, Bangkok, Thailand
  contributor:
    fullname: Papasratorn
– year: 2005
  ident: bb0345
  article-title: A methodology for designing counter measures against current and future code injection attacks
  publication-title: Proceedings of the third IEEE international information assurance workshop
  contributor:
    fullname: Frank
– year: 2007
  ident: bb0105
  article-title: Vulnerability type distributions in CVE
  contributor:
    fullname: Martin
– year: 2003
  ident: bb0005
  article-title: E-government in Nigeria's e-strategy
  publication-title: The Fifth Annual African Computing and Telecommunications Summit, Abuja, Nigeria
  contributor:
    fullname: Ajayi
– volume: 11
  start-page: 243
  year: 2002
  end-page: 271
  ident: bb0340
  article-title: Study on the development and application of e-government maturity assessment model
  publication-title: Korea Policy Academy Society News
  contributor:
    fullname: Sang-ho
– year: 2006
  ident: bb0185
  article-title: Towards e-government in a sub-Saharan African country: Impediments and initiatives in Nigeria
  contributor:
    fullname: Ifenedo
– volume: 27
  start-page: 49
  year: 2010
  end-page: 56
  ident: bb0350
  article-title: Opportunities and threats: A security assessment of state e-government websites
  publication-title: Government Information Quarterly
  contributor:
    fullname: Zhao
– volume: 11
  start-page: 589
  year: 2005
  end-page: 611
  ident: bb0125
  article-title: E-government adoption: Architecture and barriers
  publication-title: Business Process Management Journal
  contributor:
    fullname: Irani
– volume: 26
  start-page: 42
  year: 2009
  end-page: 50
  ident: bb0210
  article-title: An institutional analysis of an e-government system for anti-corruption: The case of OPEN
  publication-title: Government Information Quarterly
  contributor:
    fullname: Lee
– year: 2012
  ident: bb0040
  article-title: Technological assessment of e-government web presence in Nigeria
  publication-title: The 6th International Conference on Theory and Practice of Electronic Governance, Albany, NY, USA, 22–25 October
  contributor:
    fullname: Siyanbola
– volume: 28
  start-page: 592
  year: 2009
  end-page: 604
  ident: bb0215
  article-title: Client-side cross-site scripting protection
  publication-title: Computer and Security
  contributor:
    fullname: Vigna
– year: 2010
  ident: bb0120
  article-title: Top 25 most dangerous programming errors
  contributor:
    fullname: CWE-SANS
– year: 2001
  ident: bb0050
  article-title: E-governance and developing countries: Introduction and examples
  publication-title: Report No 3, April 2001
  contributor:
    fullname: Backus
– volume: 31
  start-page: 612
  year: 2012
  end-page: 628
  ident: bb0150
  article-title: Noncespaces: Using randomization to defeat cross-site scripting attacks
  publication-title: Computers and Security
  contributor:
    fullname: Chen
– year: 2005
  ident: bb0145
  article-title: Exploring e-government evolution: The influence of systems of rules on organizational action
  publication-title: NCDG Working Paper No. 05-001
  contributor:
    fullname: Martinez-Moyano
– volume: 28
  start-page: 121
  year: 2009
  end-page: 129
  ident: bb0245
  article-title: SDriver: Location-specific signatures prevent SQL injection attacks
  publication-title: Computer and Security
  contributor:
    fullname: Spinellis
– volume: 104
  start-page: 931
  issue: 425
  year: 1994
  ident: 10.1016/j.giq.2014.01.012_bb0240
  article-title: Evolutionary Economics & Technology Policy
  publication-title: The Economic Journal
  doi: 10.2307/2234988
  contributor:
    fullname: Metcalfe
– year: 2003
  ident: 10.1016/j.giq.2014.01.012_bb0005
  article-title: E-government in Nigeria's e-strategy
  contributor:
    fullname: Ajayi
– volume: 34
  start-page: 223
  issue: 3
  year: 2002
  ident: 10.1016/j.giq.2014.01.012_bb0080
  article-title: Digital government: Technologies and practices
  publication-title: Decision Support Systems
  doi: 10.1016/S0167-9236(02)00118-5
  contributor:
    fullname: Chen
– volume: 31
  start-page: 612
  issue: 2012
  year: 2012
  ident: 10.1016/j.giq.2014.01.012_bb0150
  article-title: Noncespaces: Using randomization to defeat cross-site scripting attacks
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2011.12.004
  contributor:
    fullname: Gundy
– volume: 11
  start-page: 589
  issue: 5
  year: 2005
  ident: 10.1016/j.giq.2014.01.012_bb0125
  article-title: E-government adoption: Architecture and barriers
  publication-title: Business Process Management Journal
  doi: 10.1108/14637150510619902
  contributor:
    fullname: Ebrahim
– ident: 10.1016/j.giq.2014.01.012_bb0095
  contributor:
    fullname: Chien
– year: 2006
  ident: 10.1016/j.giq.2014.01.012_bb0160
  contributor:
    fullname: Halfond
– volume: 2
  start-page: 228
  issue: 5
  year: 2011
  ident: 10.1016/j.giq.2014.01.012_bb0290
  article-title: E-government adoption in developing countries; the case of Indonesia
  publication-title: Journal of Emerging Trends in Computing and Information Sciences
  contributor:
    fullname: Rokhman
– volume: 27
  start-page: 49
  year: 2010
  ident: 10.1016/j.giq.2014.01.012_bb0350
  article-title: Opportunities and threats: A security assessment of state e-government websites
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2009.07.004
  contributor:
    fullname: Zhao
– volume: 28
  start-page: 592
  issue: 7
  year: 2009
  ident: 10.1016/j.giq.2014.01.012_bb0215
  article-title: Client-side cross-site scripting protection
  publication-title: Computer and Security
  doi: 10.1016/j.cose.2009.04.008
  contributor:
    fullname: Kirda
– ident: 10.1016/j.giq.2014.01.012_bb0200
  contributor:
    fullname: infoDev/World Bank
– start-page: 120
  year: 2003
  ident: 10.1016/j.giq.2014.01.012_bb0300
  article-title: E-government: An overview
  contributor:
    fullname: Schelin
– year: 2010
  ident: 10.1016/j.giq.2014.01.012_bb0010
  article-title: ICT and e-government in Nigeria: Opportunities and challenges
  contributor:
    fullname: Akunyili
– year: 2003
  ident: 10.1016/j.giq.2014.01.012_bb0180
  article-title: Web application security assessment by fault injection and behaviour monitoring
  contributor:
    fullname: Huang
– volume: 20
  start-page: 333
  year: 2002
  ident: 10.1016/j.giq.2014.01.012_bb0320
  article-title: The adoption of electronic tax filing systems: An empirical study
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2003.08.005
  contributor:
    fullname: Wang
– start-page: 157
  year: 2000
  ident: 10.1016/j.giq.2014.01.012_bb0015
  article-title: A lightweight tool for detecting web server attacks
  contributor:
    fullname: Almgren
– year: 2003
  ident: 10.1016/j.giq.2014.01.012_bb0175
  contributor:
    fullname: Howard
– year: 2012
  ident: 10.1016/j.giq.2014.01.012_bb0040
  article-title: Technological assessment of e-government web presence in Nigeria
  contributor:
    fullname: Awoleye
– year: 2010
  ident: 10.1016/j.giq.2014.01.012_bb0055
  article-title: Automated discovery of parameter pollution vulnerabilities in web applications
  contributor:
    fullname: Balduzzi
– year: 2010
  ident: 10.1016/j.giq.2014.01.012_bb0065
  article-title: Regular expression considered harmful in client-side XSS filters
  contributor:
    fullname: Bates
– volume: 48
  start-page: 183
  issue: 2012
  year: 2012
  ident: 10.1016/j.giq.2014.01.012_bb0235
  article-title: Updating broken web links: An automatic recommendation system information processing and management
  contributor:
    fullname: Martinez-Romo
– volume: 2
  start-page: 157
  issue: 2
  year: 2013
  ident: 10.1016/j.giq.2014.01.012_bb0045
  article-title: Technological assessment of banking innovation in Nigeria
  publication-title: African Journal Accounting, Auditing and Finance
  doi: 10.1504/AJAAF.2013.057077
  contributor:
    fullname: Awoleye
– start-page: 174
  year: 2005
  ident: 10.1016/j.giq.2014.01.012_bb0155
  article-title: AMNESIA: Analysis and Monitoring for Neutralizing SQL-Injection Attacks
  contributor:
    fullname: Halfond
– year: 2002
  ident: 10.1016/j.giq.2014.01.012_bb0130
  article-title: The evolution of cross site scripting attacks
  contributor:
    fullname: Endler
– ident: 10.1016/j.giq.2014.01.012_bb0165
  contributor:
    fullname: Halkidis
– volume: 11
  start-page: 243
  issue: 4
  year: 2002
  ident: 10.1016/j.giq.2014.01.012_bb0340
  article-title: Study on the development and application of e-government maturity assessment model
  publication-title: Korea Policy Academy Society News
  contributor:
    fullname: Sang-ho
– start-page: 281
  year: 2003
  ident: 10.1016/j.giq.2014.01.012_bb0060
  article-title: Randomized instruction set emulation to disrupt binary code injection attacks
  contributor:
    fullname: Barrantes
– volume: 18
  start-page: 343
  year: 2001
  ident: 10.1016/j.giq.2014.01.012_bb0090
  article-title: Transforming local e-government services: The use of application service providers
  publication-title: Government Information Quarterly
  doi: 10.1016/S0740-624X(01)00090-9
  contributor:
    fullname: Chen
– start-page: 154
  year: 2008
  ident: 10.1016/j.giq.2014.01.012_bb0035
  article-title: Assessment of e-governance resource use in southwestern Nigeria
  contributor:
    fullname: Awoleye
– volume: 28
  start-page: 121
  issue: 3–4
  year: 2009
  ident: 10.1016/j.giq.2014.01.012_bb0245
  article-title: SDriver: Location-specific signatures prevent SQL injection attacks
  publication-title: Computer and Security
  doi: 10.1016/j.cose.2008.09.005
  contributor:
    fullname: Mitropoulos
– year: 1982
  ident: 10.1016/j.giq.2014.01.012_bb0270
  contributor:
    fullname: Nelson
– start-page: 403
  year: 2011
  ident: 10.1016/j.giq.2014.01.012_bb0285
  article-title: CookieMonster: Automated session hijacking archival and analysis
  contributor:
    fullname: Pauli
– ident: 10.1016/j.giq.2014.01.012_bb0105
  contributor:
    fullname: Christey
– ident: 10.1016/j.giq.2014.01.012_bb0280
  contributor:
    fullname: OWASP, Open Web Application Security Project
– ident: 10.1016/j.giq.2014.01.012_bb0075
  contributor:
    fullname: CERT
– ident: 10.1016/j.giq.2014.01.012_bb0295
  contributor:
    fullname: SANS Institute
– volume: 1
  start-page: 53
  issue: 1
  year: 2005
  ident: 10.1016/j.giq.2014.01.012_bb8000
  article-title: Measuring Africa's e-readiness in the global networked economy: A nine-country data analysis
  publication-title: The International Journal of Education and Development using Information and Communication Technology
  contributor:
    fullname: Ifinedo
– ident: 10.1016/j.giq.2014.01.012_bb0110
  contributor:
    fullname: Cook
– volume: 25
  start-page: 239
  issue: 2008
  year: 2008
  ident: 10.1016/j.giq.2014.01.012_bb0085
  article-title: E-government implementation: A macro analysis of Singapore's e-government initiatives
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2006.04.011
  contributor:
    fullname: Chan
– year: 2004
  ident: 10.1016/j.giq.2014.01.012_bb0275
  contributor:
    fullname: OWASP
– year: 2005
  ident: 10.1016/j.giq.2014.01.012_bb0145
  article-title: Exploring e-government evolution: The influence of systems of rules on organizational action
  contributor:
    fullname: Gil-García
– year: 2006
  ident: 10.1016/j.giq.2014.01.012_bb0335
  article-title: Static detection of security vulnerability in scripting languages
  contributor:
    fullname: Xie
– ident: 10.1016/j.giq.2014.01.012_bb0120
  contributor:
    fullname: CWE-SANS
– ident: 10.1016/j.giq.2014.01.012_bb0070
  contributor:
    fullname: Cenzic
– volume: 40
  start-page: 109
  issue: 4
  year: 2002
  ident: 10.1016/j.giq.2014.01.012_bb0310
  article-title: Analysis on the improved effects of administrative transparency of the e-government
  publication-title: Administrative Treaties
  contributor:
    fullname: Hee-joon
– volume: 62
  start-page: 424
  issue: 4
  year: 2002
  ident: 10.1016/j.giq.2014.01.012_bb0260
  article-title: The evolution of e-government among municipalities: Rhetoric or reality?
  publication-title: Public Administration Review
  doi: 10.1111/0033-3352.00196
  contributor:
    fullname: Moon
– volume: 176
  start-page: 1241
  year: 2006
  ident: 10.1016/j.giq.2014.01.012_bb0190
  article-title: Stateful session handoff for mobile WWW
  publication-title: Information Sciences
  doi: 10.1016/j.ins.2005.02.009
  contributor:
    fullname: Hsieh
– volume: 8
  start-page: 3
  issue: 1
  year: 1999
  ident: 10.1016/j.giq.2014.01.012_bb0230
  article-title: History friendly models of industry-evolution: The computer industry
  publication-title: Industrial and Corporate Change
  doi: 10.1093/icc/8.1.3
  contributor:
    fullname: Malerba
– year: 2010
  ident: 10.1016/j.giq.2014.01.012_bb0195
  article-title: E-government in Nigeria: A catalyst for national development
  contributor:
    fullname: Mohammed
– year: 2001
  ident: 10.1016/j.giq.2014.01.012_bb0050
  article-title: E-governance and developing countries: Introduction and examples
  contributor:
    fullname: Backus
– volume: 2
  issue: 9
  year: 2012
  ident: 10.1016/j.giq.2014.01.012_bb0140
  article-title: Electronic governance: Myth or opportunity for Nigerian public administration?
  publication-title: International Journal of Academic Research in Business and Social Sciences
  contributor:
    fullname: Fatile
– start-page: 2006
  year: 2006
  ident: 10.1016/j.giq.2014.01.012_bb0250
  article-title: Vulnerabilities in e-governments
  contributor:
    fullname: Moen
– volume: 1
  start-page: 89
  issue: 1
  year: 2007
  ident: 10.1016/j.giq.2014.01.012_bb0255
  article-title: Vulnerabilities in e-governments
  publication-title: International Journal of Electronic Security and Digital Forensics
  doi: 10.1504/IJESDF.2007.013595
  contributor:
    fullname: Moen
– volume: 18
  start-page: 79
  issue: 2001
  year: 2001
  ident: 10.1016/j.giq.2014.01.012_bb0330
  article-title: Best practices in electronic government: Comprehensive electronic information dissemination for science and technology
  publication-title: Government Information Quarterly
  doi: 10.1016/S0740-624X(01)00062-4
  contributor:
    fullname: Whitson
– ident: 10.1016/j.giq.2014.01.012_bb0170
  contributor:
    fullname: Higgins
– volume: 7
  start-page: 45
  issue: 2
  year: 2002
  ident: 10.1016/j.giq.2014.01.012_bb0315
  article-title: Prospects and limitations of the e-government initiative in Korea
  publication-title: International Review of Public Administration
  doi: 10.1080/12294659.2002.10805005
  contributor:
    fullname: Hee-joon
– year: 2009
  ident: 10.1016/j.giq.2014.01.012_bb0135
  article-title: End-to-end web application security
  publication-title: Microsoft Research
  contributor:
    fullname: Erlingsson
– ident: 10.1016/j.giq.2014.01.012_bb0185
  contributor:
    fullname: Ifenedo
– year: 2010
  ident: 10.1016/j.giq.2014.01.012_bb9000
  contributor:
    fullname: Bandhakavi
– ident: 10.1016/j.giq.2014.01.012_bb0020
  contributor:
    fullname: Anley
– volume: 24
  start-page: 353
  year: 2007
  ident: 10.1016/j.giq.2014.01.012_bb0030
  article-title: Applying participatory design and collaboration in digital public services for discovering and re-designing e-government services
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2006.07.018
  contributor:
    fullname: Anthopoulos
– year: 2005
  ident: 10.1016/j.giq.2014.01.012_bb0345
  article-title: A methodology for designing counter measures against current and future code injection attacks
  contributor:
    fullname: Yves
– year: 2005
  ident: 10.1016/j.giq.2014.01.012_bb0325
  article-title: Factors influencing the adoption of Thai e-government websites: Information quality and system quality approach
  contributor:
    fullname: Wangpipatwong
– volume: 26
  start-page: 42
  year: 2009
  ident: 10.1016/j.giq.2014.01.012_bb0210
  article-title: An institutional analysis of an e-government system for anti-corruption: The case of OPEN
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2008.09.002
  contributor:
    fullname: Kim
– volume: 55
  start-page: 58
  issue: 1–2
  year: 2011
  ident: 10.1016/j.giq.2014.01.012_bb0225
  article-title: A novel method for SQL injection attack detection based on removing SQL query attribute values
  publication-title: Mathematical and Computer Modeling
  contributor:
    fullname: Lee
– volume: 18
  start-page: 122
  issue: 2001
  year: 2001
  ident: 10.1016/j.giq.2014.01.012_bb0220
  article-title: Developing fully functional e-government: A four stage model
  publication-title: Government Information Quarterly
  doi: 10.1016/S0740-624X(01)00066-1
  contributor:
    fullname: Layne
– start-page: 272
  year: 2003
  ident: 10.1016/j.giq.2014.01.012_bb0205
  article-title: Countering code-injection attacks with instruction-set randomization
  contributor:
    fullname: Kc
SSID ssj0002210
Score 2.285851
Snippet This paper carried out technological analysis of e-government platforms with a view of assessing possible application flaws that can inhibit smooth running of...
SourceID crossref
elsevier
SourceType Aggregation Database
Publisher
StartPage S118
SubjectTerms Cookie manipulation
Cross site injection
E-government
Policy
Smart government
SQL injection
Web vulnerability
Title Web application vulnerability assessment and policy direction towards a secure smart government
URI https://dx.doi.org/10.1016/j.giq.2014.01.012
Volume 31
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9MwGLa67rILggFiwCYfEAesVKnjJvGxY0UbB3ZoJXaL7HxMVKVjtAHx7_f4Ix8dIAESUhVVbp04fh-9X378mpBXcQWrrLgMxCTJA6Glgh7UYaB1wiPEEzyKzUbh83ny4So9m4nZYNCUquja_quk0QZZm52zfyHt9qZowHfIHFdIHdc_kvvHUrPeqjT7Vq9MYWnLgf3BVFuI01UIsFWBmbNr5t9by6LdMMU2JhFfss1nPINdtyfy9p3Z7pxe5uuv2nvc3ueJTr_fQPXYzOnlqsYAzALRqE3vLmvoX_vr6cqQcr0tNXg19EC3o8gcSs4uR_0kxVh0ZCqXOWt2z-yQO-G9IHTljqE5Kp0CThMewOtL-hra2wmnYqF_0565no_dxumfTIHLSixH159uDYNP2OqsnrK9W2F7bgZixoFg06487pF9Dr0lhmR_ejG7et-ads5teYt24M0yuSUM3nvQrx2dnvOyeEge-KiDTh1cHpFBuT4kB538Dsmx38BCX9OLTpbUq_7HJAOuaA9XdAdXtMMVBa6owxVtcUU9rqiiDlfU4op2uHpCFu9mi7fngT-cI8gRpW8DWWotKgSjUhsqVSqrPIqFNPYqT-CGV7yMU64KXakoj_N8UuiJ4rkURYJ-VfSUDNc36_IZodGkSCUMAbQDYnMdyrRACwKDMA5VMhZH5E0zkdkXV4Ila7iJywyznplZz8IxPvyIiGaqM-9DunfNgIvfd3v-b91ekIMO7S_JcPu1Lo_J3qaoTzx07gALF5c1
link.rule.ids 315,782,786,27934,27935
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Web+application+vulnerability+assessment+and+policy+direction+towards+a+secure+smart+government&rft.jtitle=Government+information+quarterly&rft.au=Awoleye%2C+Olusesan+M.&rft.au=Ojuloge%2C+Blessing&rft.au=Ilori%2C+Mathew+O.&rft.date=2014-06-01&rft.pub=Elsevier+Inc&rft.issn=0740-624X&rft.eissn=1872-9517&rft.volume=31&rft.spage=S118&rft.epage=S125&rft_id=info:doi/10.1016%2Fj.giq.2014.01.012&rft.externalDocID=S0740624X14000823
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0740-624X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0740-624X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0740-624X&client=summon