1. Arayankalam, J., Khan, A., Krishnan, S.: How to deal with corruption? examining the roles of e-government maturity, government administrative effectiveness, and virtual social networks diffusion. Int. J. Inf. Manage. 58, 102203 (2021)
2. Baguma, R., Lubega, J.: Factors for success and failure of e-government projects: the case of e-government projects in Uganda. In: Proceedings of the 7th International Conference on Theory and Practice of Electronic Governance, pp. 194–197. ICEGOV (2013)
3. Bélanger, F., Carter, L.: Trust and risk in e-government adoption. J. Strateg. Inf. Syst. 17(2), 165–176 (2008)
4. Dolhansky, B., Ferrer, C.C.: Adversarial collision attacks on image hashing functions. arXiv preprint arXiv:2011.09473 (2020)
5. Elisa, N., Yang, L., Li, H., Chao, F., Naik, N.: Consortium blockchain for security and privacy-preserving in e-government systems. arXiv preprint arXiv:2006.14234 (2020)