Relating Social Media Diffusion, Education Level and Cybersecurity Protection Mechanisms to E-Participation Initiatives: Insights from a Cross-Country Analysis

Virtual Social Networks (VSN) act as a catalyst for the success of the active participation of citizens in information sharing, collaboration, and decision making. VSN based e-participation tools allow many-to-many communication and collaboration near real-time with users who might be in geographica...

Full description

Saved in:
Bibliographic Details
Published inInformation systems frontiers Vol. 25; no. 5; pp. 1695 - 1711
Main Author Ahangama, Supunmali
Format Journal Article
LanguageEnglish
Published New York Springer US 01.10.2023
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1387-3326
1572-9419
DOI10.1007/s10796-023-10385-7

Cover

Abstract Virtual Social Networks (VSN) act as a catalyst for the success of the active participation of citizens in information sharing, collaboration, and decision making. VSN based e-participation tools allow many-to-many communication and collaboration near real-time with users who might be in geographically dispersed locations. It provides a platform to voice opinions and perspectives and share them with others in new and innovative ways. Cybersecurity is a key area that needs to be considered for the success and continuous use of e-participation systems as it protects user privacy and helps to avoid scams, harassment, and misinformation. The intervening effect of cybersecurity protection mechanisms and citizens’ education level on the relationship between VSN diffusion and e-participation initiatives is explored in the proposed research model presented in this paper. Moreover, this research model is explored for different stages of e-participation (e-information, e-consultation, and e-decision making) and the five dimensions of cybersecurity (legal, technical, organizational, capacity building, and cooperation). The findings indicate that improved VSN usage has increased e-participation (especially in e-consultation and e-decision making) as a result of improved cybersecurity protection and public education, highlighting the varying importance of different cybersecurity protection measures for three stages of e-participation. Thus, considering the recent problems like platform manipulation, misinformation and data breaches associated with the use of VSN for e-participation, this study emphasizes the importance of regulations, policies, partnerships, technical frameworks, and research to ensure cybersecurity, as well as the importance of education to enable the public to interact productively in e-participation activities. This study is performed using publicly available data from 115 countries and the research model is developed, drawing theoretical basis from the Protection Motivation Theory, Structuration Theory, and Endogenous Growth Theory. This paper recognizes the theoretical and practical implications, and limitations while recommending future research directions.
AbstractList Virtual Social Networks (VSN) act as a catalyst for the success of the active participation of citizens in information sharing, collaboration, and decision making. VSN based e-participation tools allow many-to-many communication and collaboration near real-time with users who might be in geographically dispersed locations. It provides a platform to voice opinions and perspectives and share them with others in new and innovative ways. Cybersecurity is a key area that needs to be considered for the success and continuous use of e-participation systems as it protects user privacy and helps to avoid scams, harassment, and misinformation. The intervening effect of cybersecurity protection mechanisms and citizens’ education level on the relationship between VSN diffusion and e-participation initiatives is explored in the proposed research model presented in this paper. Moreover, this research model is explored for different stages of e-participation (e-information, e-consultation, and e-decision making) and the five dimensions of cybersecurity (legal, technical, organizational, capacity building, and cooperation). The findings indicate that improved VSN usage has increased e-participation (especially in e-consultation and e-decision making) as a result of improved cybersecurity protection and public education, highlighting the varying importance of different cybersecurity protection measures for three stages of e-participation. Thus, considering the recent problems like platform manipulation, misinformation and data breaches associated with the use of VSN for e-participation, this study emphasizes the importance of regulations, policies, partnerships, technical frameworks, and research to ensure cybersecurity, as well as the importance of education to enable the public to interact productively in e-participation activities. This study is performed using publicly available data from 115 countries and the research model is developed, drawing theoretical basis from the Protection Motivation Theory, Structuration Theory, and Endogenous Growth Theory. This paper recognizes the theoretical and practical implications, and limitations while recommending future research directions.
Virtual Social Networks (VSN) act as a catalyst for the success of the active participation of citizens in information sharing, collaboration, and decision making. VSN based e-participation tools allow many-to-many communication and collaboration near real-time with users who might be in geographically dispersed locations. It provides a platform to voice opinions and perspectives and share them with others in new and innovative ways. Cybersecurity is a key area that needs to be considered for the success and continuous use of e-participation systems as it protects user privacy and helps to avoid scams, harassment, and misinformation. The intervening effect of cybersecurity protection mechanisms and citizens' education level on the relationship between VSN diffusion and e-participation initiatives is explored in the proposed research model presented in this paper. Moreover, this research model is explored for different stages of e-participation (e-information, e-consultation, and e-decision making) and the five dimensions of cybersecurity (legal, technical, organizational, capacity building, and cooperation). The findings indicate that improved VSN usage has increased e-participation (especially in e-consultation and e-decision making) as a result of improved cybersecurity protection and public education, highlighting the varying importance of different cybersecurity protection measures for three stages of e-participation. Thus, considering the recent problems like platform manipulation, misinformation and data breaches associated with the use of VSN for e-participation, this study emphasizes the importance of regulations, policies, partnerships, technical frameworks, and research to ensure cybersecurity, as well as the importance of education to enable the public to interact productively in e-participation activities. This study is performed using publicly available data from 115 countries and the research model is developed, drawing theoretical basis from the Protection Motivation Theory, Structuration Theory, and Endogenous Growth Theory. This paper recognizes the theoretical and practical implications, and limitations while recommending future research directions.Virtual Social Networks (VSN) act as a catalyst for the success of the active participation of citizens in information sharing, collaboration, and decision making. VSN based e-participation tools allow many-to-many communication and collaboration near real-time with users who might be in geographically dispersed locations. It provides a platform to voice opinions and perspectives and share them with others in new and innovative ways. Cybersecurity is a key area that needs to be considered for the success and continuous use of e-participation systems as it protects user privacy and helps to avoid scams, harassment, and misinformation. The intervening effect of cybersecurity protection mechanisms and citizens' education level on the relationship between VSN diffusion and e-participation initiatives is explored in the proposed research model presented in this paper. Moreover, this research model is explored for different stages of e-participation (e-information, e-consultation, and e-decision making) and the five dimensions of cybersecurity (legal, technical, organizational, capacity building, and cooperation). The findings indicate that improved VSN usage has increased e-participation (especially in e-consultation and e-decision making) as a result of improved cybersecurity protection and public education, highlighting the varying importance of different cybersecurity protection measures for three stages of e-participation. Thus, considering the recent problems like platform manipulation, misinformation and data breaches associated with the use of VSN for e-participation, this study emphasizes the importance of regulations, policies, partnerships, technical frameworks, and research to ensure cybersecurity, as well as the importance of education to enable the public to interact productively in e-participation activities. This study is performed using publicly available data from 115 countries and the research model is developed, drawing theoretical basis from the Protection Motivation Theory, Structuration Theory, and Endogenous Growth Theory. This paper recognizes the theoretical and practical implications, and limitations while recommending future research directions.
Author Ahangama, Supunmali
Author_xml – sequence: 1
  givenname: Supunmali
  orcidid: 0000-0001-8045-4958
  surname: Ahangama
  fullname: Ahangama, Supunmali
  email: supunmali@uom.lk
  organization: Faculty of Information Technology, University of Moratuwa
BackLink https://www.ncbi.nlm.nih.gov/pubmed/37361893$$D View this record in MEDLINE/PubMed
BookMark eNp9Ustu1DAUjVARfcAPsECW2LAgYMdxnGGDqjCFSlNR8VhbjnM94yqxB9sZKV_Dr9YzKQW66MrX8jnnnut7TrMj6yxk2UuC3xGM-ftAMF9UOS5oTjCtWc6fZCeE8SJflGRxlGpa85zSojrOTkO4wZhUBWfPsmPKaUXqBT3Jfn-DXkZj1-i7U0b26Ao6I9Eno_UYjLNv0bIbVUI4i1awgx5J26FmasEHUKM3cULX3kVQB8gVqI20JgwBRYeW-bX00SiznQUurYkmlTsIH9IlmPUmBqS9G5BEjXch5I0bbfQTOreyn4IJz7OnWvYBXtydZ9nPi-WP5ku--vr5sjlf5arkLOZU1rCoSkkUEAoFo5zgSre4TdNrTEErRhSnIGvd0ZK1lDMOgFsJFeelLulZ9nHW3Y7tAJ2C5EL2YuvNIP0knDTi_xdrNmLtdoLgtAXGqqTw5k7Bu18jhCgGExT0vbTgxiCKmuKiwFW1b_b6AfTGjT5NvEdxUta85kVCvfrX0r2XP8tLgGIGqP3XedD3EILFPiFiTohICRGHhAieSPUDkjLxsJ40lukfp9KZGlIfuwb_1_YjrFtIeNMG
CitedBy_id crossref_primary_10_1002_asi_24953
crossref_primary_10_5604_01_3001_0054_2880
crossref_primary_10_1016_j_techsoc_2024_102809
crossref_primary_10_1080_18366503_2025_2480943
crossref_primary_10_1016_j_techfore_2024_123839
crossref_primary_10_1002_jsc_2622
crossref_primary_10_59324_ejtas_2024_2_2__67
crossref_primary_10_1007_s10796_023_10407_4
crossref_primary_10_1016_j_giq_2024_101935
crossref_primary_10_59324_ejtas_2024_2_3__19
crossref_primary_10_1007_s10796_024_10493_y
Cites_doi 10.1016/j.giq.2014.06.004
10.1016/j.giq.2019.02.002
10.1016/j.chb.2015.01.046
10.1057/ejis.2009.6
10.1016/j.giq.2020.101537
10.1007/s10796-020-10039-y
10.1007/s10551-020-04598-y
10.1145/2096140.2096147
10.1016/j.giq.2011.05.003
10.1016/S2589-7500(20)30315-0
10.1016/j.giq.2019.101422
10.1016/j.giq.2013.12.006
10.4135/9781412985604
10.1016/j.elerap.2015.06.001
10.4018/978-1-5225-2854-8
10.2979/eservicej.12.3.01
10.1007/s10796-018-9848-5
10.4135/9781412985796
10.1016/j.giq.2010.03.001
10.1108/EBR-11-2018-0203
10.1016/j.giq.2013.05.018
10.1057/ejis.2008.56
10.1145/1409360.1409385
10.1007/978-3-662-43459-8_6
10.1007/978-1-349-16221-5
10.4018/jgim.2007100102
10.2979/eservicej.11.3.02
10.1504/IJMDA.2017.087624
10.4337/9781848442818.00046
10.3390/admsci2020148
10.1007/978-3-642-03781-8_5
10.4018/978-1-59140-144-5.ch005
10.1007/s10796-020-09984-5
10.1109/TEM.2005.844464
10.3233/978-1-61499-429-9-276
10.2307/2061986
10.1016/j.giq.2014.07.005
10.1111/j.1540-6210.2004.00343.x
10.3758/BRM.40.3.879
10.1016/j.im.2016.09.006
10.1111/j.1540-6210.2005.00431.x
10.1016/j.ins.2017.08.063
10.1080/07421222.2015.1138374
10.1016/j.giq.2012.06.003
10.1080/14719037.2015.1066418
10.1891/0889-8391.13.2.158
10.1007/s41111-020-00167-w
10.1016/j.giq.2018.01.005
10.1080/02681102.2013.814040
10.1007/s10796-013-9431-z
10.1016/j.giq.2011.04.004
10.1007/s10796-017-9808-5
10.1080/19331680801975789
10.1109/HICSS.2005.688
10.1093/jopart/mug010
10.1086/651257
10.1007/978-3-642-03781-8_1
10.1016/j.giq.2011.07.005
10.1109/CONGRESS.2009.26
10.1080/14719037.2014.930505
10.1080/07352166.2019.1572455
10.3233/IP-2012-0273
10.1016/j.im.2013.08.006
10.1080/15309576.2015.1108798
10.1016/j.giq.2019.01.001
10.1016/j.ijhcs.2018.11.003
10.1177/109019810002700506
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023
The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.
Copyright Springer Nature B.V. Oct 2023
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023
– notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.
– notice: Copyright Springer Nature B.V. Oct 2023
DBID AAYXX
CITATION
NPM
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8AO
8FD
8FE
8FG
8FK
8FL
ABUWG
AFKRA
ALSLI
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
CNYFK
DWQXO
FRNLG
F~G
GNUQQ
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
M1O
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PRQQA
Q9U
7X8
5PM
DOI 10.1007/s10796-023-10385-7
DatabaseName CrossRef
PubMed
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Social Science Premium Collection
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One Community College
Library & Information Science Collection
ProQuest Central Korea
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global (OCUL)
Computing Database
Library Science Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest One Social Sciences
ProQuest Central Basic
MEDLINE - Academic
PubMed Central (Full Participant titles)
DatabaseTitle CrossRef
PubMed
ProQuest Business Collection (Alumni Edition)
Computer Science Database
ProQuest Central Student
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
ProQuest Central China
ABI/INFORM Complete
ProQuest One Applied & Life Sciences
Library & Information Science Collection
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
Business Premium Collection
Social Science Premium Collection
ABI/INFORM Global
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest Business Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ABI/INFORM Global (Corporate)
ProQuest One Business
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest Pharma Collection
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Library Science
ProQuest Central Korea
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
ProQuest Computing
ProQuest One Social Sciences
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Business (Alumni)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
MEDLINE - Academic
DatabaseTitleList
MEDLINE - Academic
PubMed
ProQuest Business Collection (Alumni Edition)

Database_xml – sequence: 1
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Education
EISSN 1572-9419
EndPage 1711
ExternalDocumentID PMC10107556
37361893
10_1007_s10796_023_10385_7
Genre Journal Article
GroupedDBID -Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
1N0
1SB
203
29I
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5VS
67Z
6NX
7WY
8AO
8FE
8FG
8FL
8TC
8UJ
95-
95.
95~
96X
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAPKM
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBRH
ABBXA
ABDBE
ABDZT
ABECU
ABFTD
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADHKG
ADKFA
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFDYV
AFDZB
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGQPQ
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHPBZ
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALSLI
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYFIA
AYQZM
AZFZN
AZQEC
B-.
BA0
BAPOH
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
CNYFK
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EDO
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ7
GQ8
GROUPED_ABI_INFORM_RESEARCH
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
LAK
LLZTM
M0C
M1O
M4Y
MA-
MK~
ML~
N2Q
NB0
NPVJJ
NQJWS
NU0
O9-
O93
O9G
OAM
OVD
P62
P9O
PF0
PHGZT
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QOS
R89
R9I
RNI
RNS
ROL
RPX
RSV
RZC
RZD
RZK
S16
S1Z
S27
S3B
SAP
SBE
SDH
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TEORI
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
ZMTXR
~A9
AAYXX
ABFSG
ACSTC
AEZWR
AFHIU
AFOHR
AHWEU
AIXLP
ATHPR
CITATION
PHGZM
-57
-5G
-BR
-EM
AAAVM
ADINQ
GQ6
GROUPED_ABI_INFORM_COMPLETE
NPM
O9J
Z7R
Z7S
Z7X
Z7Z
Z81
Z83
Z88
3V.
7SC
7XB
8AL
8FD
8FK
ABRTQ
JQ2
L.-
L7M
L~C
L~D
M0N
PKEHL
PQEST
PQGLB
PQUKI
PRINS
PRQQA
Q9U
7X8
PUEGO
5PM
ID FETCH-LOGICAL-c475t-3a8e964a1ce13e2537106fb0b332f03efc51c73ea8fd345b3757ee0bae6774f43
IEDL.DBID U2A
ISSN 1387-3326
IngestDate Thu Aug 21 18:37:51 EDT 2025
Fri Sep 05 04:58:34 EDT 2025
Sat Aug 16 18:42:39 EDT 2025
Wed Feb 19 02:23:27 EST 2025
Thu Apr 24 23:07:08 EDT 2025
Tue Jul 01 05:16:22 EDT 2025
Wed Apr 09 21:58:32 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 5
Keywords Citizen education level
E-Participation
Cybersecurity
Protection Motivation Theory
VSN diffusion
Language English
License The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.
This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c475t-3a8e964a1ce13e2537106fb0b332f03efc51c73ea8fd345b3757ee0bae6774f43
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0001-8045-4958
OpenAccessLink https://pubmed.ncbi.nlm.nih.gov/PMC10107556
PMID 37361893
PQID 2871487872
PQPubID 26108
PageCount 17
ParticipantIDs pubmedcentral_primary_oai_pubmedcentral_nih_gov_10107556
proquest_miscellaneous_2830220664
proquest_journals_2871487872
pubmed_primary_37361893
crossref_primary_10_1007_s10796_023_10385_7
crossref_citationtrail_10_1007_s10796_023_10385_7
springer_journals_10_1007_s10796_023_10385_7
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2023-10-01
PublicationDateYYYYMMDD 2023-10-01
PublicationDate_xml – month: 10
  year: 2023
  text: 2023-10-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: United States
PublicationSubtitle A Journal of Research and Innovation
PublicationTitle Information systems frontiers
PublicationTitleAbbrev Inf Syst Front
PublicationTitleAlternate Inf Syst Front
PublicationYear 2023
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References A Beldad (10385_CR9) 2012; 29
MW Osmani (10385_CR56) 2014; 21
10385_CR19
DM West (10385_CR86) 2004; 64
10385_CR3
10385_CR18
10385_CR17
KJ Preacher (10385_CR63) 2008; 40
10385_CR15
CW Phang (10385_CR60) 2008; 51
K Witte (10385_CR88) 2000; 27
10385_CR6
10385_CR7
JC Bertot (10385_CR12) 2012; 29
J Fox (10385_CR22) 1991
A Ullah (10385_CR80) 2021; 6
SA Chun (10385_CR14) 2012; 17
T Herath (10385_CR32) 2009; 18
H Latan (10385_CR41) 2020; 1
10385_CR24
BR Pflughoeft (10385_CR59) 2020; 37
10385_CR66
AB Woszczynski (10385_CR89) 2004
10385_CR20
T Tang (10385_CR74) 2021; 43
10385_CR61
S Ahangama (10385_CR2) 2021; 12
P Meso (10385_CR49) 2009; 18
Y Zheng (10385_CR91) 2014; 31
M Toots (10385_CR76) 2019; 36
MJ Magro (10385_CR48) 2012; 2
A Das (10385_CR16) 2017; 54
WH Voorberg (10385_CR85) 2015; 17
A Khan (10385_CR39) 2022; 24
JD Twizeyimana (10385_CR79) 2019; 36
10385_CR13
10385_CR57
X Zhao (10385_CR90) 2010; 37
10385_CR10
D Linders (10385_CR45) 2012; 29
M Siponen (10385_CR70) 2014; 51
10385_CR51
S Takieddine (10385_CR73) 2015; 14
10385_CR50
Ø Sæbø (10385_CR68) 2009
JL Jenkins (10385_CR37) 2014; 20
R Shillair (10385_CR69) 2015; 48
EJ Wilson (10385_CR87) 2004
A Khan (10385_CR38) 2020; 11
A Macintosh (10385_CR47) 2009; 25694
SC Srivastava (10385_CR72) 2007; 15
P Ifinedo (10385_CR34) 2011; 42
T Nam (10385_CR53) 2012; 29
S Rathore (10385_CR65) 2017; 421
10385_CR82
D Amick (10385_CR5) 1974; 3
E Ferro (10385_CR21) 2013; 30
10385_CR81
H-S Lyu (10385_CR46) 2008; 4
JC Bertot (10385_CR11) 2010; 27
DF Norris (10385_CR55) 2005; 65
R van Bavel (10385_CR83) 2019; 123
C Posey (10385_CR62) 2015; 32
JC Thomas (10385_CR75) 2003; 13
RJ Freeman (10385_CR23) 2009
JF Hair (10385_CR27) 2017; 1
GJ Jeff Gulati (10385_CR36) 2014; 31
10385_CR42
10385_CR40
A Mukhopadhyay (10385_CR52) 2019; 21
NP Rana (10385_CR64) 2015; 17
A Bandura (10385_CR8) 1999; 13
10385_CR29
T Nam (10385_CR54) 2018; 35
10385_CR28
SF Tsao (10385_CR78) 2021; 3
10385_CR26
10385_CR25
RW Rogers (10385_CR67) 1983
A Alarabiat (10385_CR4) 2021; 38
C Song (10385_CR71) 2016; 39
MJ Park (10385_CR58) 2016; 18
P Aghion (10385_CR1) 1998
JK Lee (10385_CR43) 2015; 39
MR Vicente (10385_CR84) 2014; 31
10385_CR35
10385_CR33
10385_CR77
10385_CR31
10385_CR30
JK Lee (10385_CR44) 2020; 22
References_xml – volume: 31
  start-page: 653
  issue: 4
  year: 2014
  ident: 10385_CR91
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2014.06.004
– ident: 10385_CR33
– volume: 36
  start-page: 546
  issue: 3
  year: 2019
  ident: 10385_CR76
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2019.02.002
– ident: 10385_CR81
– ident: 10385_CR10
– volume: 48
  start-page: 199
  year: 2015
  ident: 10385_CR69
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2015.01.046
– volume: 18
  start-page: 106
  issue: 2
  year: 2009
  ident: 10385_CR32
  publication-title: European Journal of Information Systems
  doi: 10.1057/ejis.2009.6
– volume: 38
  start-page: 101537
  issue: 1
  year: 2021
  ident: 10385_CR4
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2020.101537
– volume: 24
  start-page: 415
  year: 2022
  ident: 10385_CR39
  publication-title: Information Systems Frontiers.
  doi: 10.1007/s10796-020-10039-y
– ident: 10385_CR66
– volume: 1
  start-page: 3
  year: 2020
  ident: 10385_CR41
  publication-title: Journal of Business Ethics
  doi: 10.1007/s10551-020-04598-y
– volume: 42
  start-page: 98
  issue: 4
  year: 2011
  ident: 10385_CR34
  publication-title: Data Base for Advances in Information Systems
  doi: 10.1145/2096140.2096147
– volume: 29
  start-page: 41
  issue: 1
  year: 2012
  ident: 10385_CR9
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2011.05.003
– volume: 3
  start-page: e175
  issue: 3
  year: 2021
  ident: 10385_CR78
  publication-title: The Lancet Digital Health
  doi: 10.1016/S2589-7500(20)30315-0
– volume: 37
  start-page: 101422
  issue: 1
  year: 2020
  ident: 10385_CR59
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2019.101422
– volume: 31
  start-page: 379
  issue: 3
  year: 2014
  ident: 10385_CR84
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2013.12.006
– volume-title: Regression Diagnostics
  year: 1991
  ident: 10385_CR22
  doi: 10.4135/9781412985604
– volume: 14
  start-page: 361
  issue: 5
  year: 2015
  ident: 10385_CR73
  publication-title: Electronic Commerce Research and Applications
  doi: 10.1016/j.elerap.2015.06.001
– ident: 10385_CR20
  doi: 10.4018/978-1-5225-2854-8
– volume: 12
  start-page: 1
  issue: 3
  year: 2021
  ident: 10385_CR2
  publication-title: E-Service Journal
  doi: 10.2979/eservicej.12.3.01
– ident: 10385_CR19
  doi: 10.1007/s10796-018-9848-5
– ident: 10385_CR82
– ident: 10385_CR40
  doi: 10.4135/9781412985796
– volume: 27
  start-page: 264
  issue: 3
  year: 2010
  ident: 10385_CR11
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2010.03.001
– ident: 10385_CR28
  doi: 10.1108/EBR-11-2018-0203
– volume: 30
  start-page: 359
  issue: 4
  year: 2013
  ident: 10385_CR21
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2013.05.018
– volume: 18
  start-page: 52
  issue: 1
  year: 2009
  ident: 10385_CR49
  publication-title: European Journal of Information Systems
  doi: 10.1057/ejis.2008.56
– ident: 10385_CR24
– volume: 51
  start-page: 128
  issue: 12
  year: 2008
  ident: 10385_CR60
  publication-title: Communications of the ACM
  doi: 10.1145/1409360.1409385
– ident: 10385_CR3
  doi: 10.1007/978-3-662-43459-8_6
– ident: 10385_CR61
– ident: 10385_CR25
  doi: 10.1007/978-1-349-16221-5
– volume: 15
  start-page: 20
  issue: 4
  year: 2007
  ident: 10385_CR72
  publication-title: Journal of Global Information Management (JGIM)
  doi: 10.4018/jgim.2007100102
– volume: 11
  start-page: 36
  issue: 3
  year: 2020
  ident: 10385_CR38
  publication-title: E-Service Journal
  doi: 10.2979/eservicej.11.3.02
– volume: 1
  start-page: 107
  issue: 2
  year: 2017
  ident: 10385_CR27
  publication-title: International Journal of Multivariate Data Analysis
  doi: 10.1504/IJMDA.2017.087624
– ident: 10385_CR18
  doi: 10.4337/9781848442818.00046
– volume: 2
  start-page: 148
  issue: 2
  year: 2012
  ident: 10385_CR48
  publication-title: Administrative Sciences
  doi: 10.3390/admsci2020148
– start-page: 46
  volume-title: In Electronic Participation: First International Conference, ePart 2009 Linz, Austria, September 1-3, 2009 Proceedings 1
  year: 2009
  ident: 10385_CR68
  doi: 10.1007/978-3-642-03781-8_5
– ident: 10385_CR13
– ident: 10385_CR30
– start-page: 66
  volume-title: The handbook of information systems research
  year: 2004
  ident: 10385_CR89
  doi: 10.4018/978-1-59140-144-5.ch005
– volume: 22
  start-page: 45
  issue: 1
  year: 2020
  ident: 10385_CR44
  publication-title: Information Systems Frontiers
  doi: 10.1007/s10796-020-09984-5
– ident: 10385_CR17
  doi: 10.1109/TEM.2005.844464
– volume: 21
  start-page: 276
  year: 2014
  ident: 10385_CR56
  publication-title: Innovation and the Public Sector
  doi: 10.3233/978-1-61499-429-9-276
– ident: 10385_CR31
– volume: 3
  start-page: 412
  issue: 5
  year: 1974
  ident: 10385_CR5
  publication-title: Contemporary Sociology
  doi: 10.2307/2061986
– volume: 31
  start-page: 526
  issue: 4
  year: 2014
  ident: 10385_CR36
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2014.07.005
– volume: 64
  start-page: 15
  issue: 1
  year: 2004
  ident: 10385_CR86
  publication-title: Public Administration Review
  doi: 10.1111/j.1540-6210.2004.00343.x
– ident: 10385_CR29
– volume: 40
  start-page: 879
  issue: 3
  year: 2008
  ident: 10385_CR63
  publication-title: Behavior Research Methods
  doi: 10.3758/BRM.40.3.879
– volume: 54
  start-page: 415
  issue: 4
  year: 2017
  ident: 10385_CR16
  publication-title: Information and Management
  doi: 10.1016/j.im.2016.09.006
– volume: 65
  start-page: 64
  issue: 1
  year: 2005
  ident: 10385_CR55
  publication-title: Public Administration Review
  doi: 10.1111/j.1540-6210.2005.00431.x
– volume: 421
  start-page: 43
  year: 2017
  ident: 10385_CR65
  publication-title: Information Sciences
  doi: 10.1016/j.ins.2017.08.063
– volume: 39
  start-page: iii
  issue: 2
  year: 2015
  ident: 10385_CR43
  publication-title: MIS Quarterly
– ident: 10385_CR50
– volume: 32
  start-page: 179
  issue: 4
  year: 2015
  ident: 10385_CR62
  publication-title: Journal of Management Information Systems
  doi: 10.1080/07421222.2015.1138374
– ident: 10385_CR7
– volume: 29
  start-page: 446
  issue: 4
  year: 2012
  ident: 10385_CR45
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2012.06.003
– volume: 18
  start-page: 1265
  issue: 9
  year: 2016
  ident: 10385_CR58
  publication-title: Public Management Review
  doi: 10.1080/14719037.2015.1066418
– ident: 10385_CR77
– ident: 10385_CR35
– volume: 13
  start-page: 158
  issue: 2
  year: 1999
  ident: 10385_CR8
  publication-title: Journal of Cognitive Psychotherapy
  doi: 10.1891/0889-8391.13.2.158
– volume: 6
  start-page: 86
  issue: 1
  year: 2021
  ident: 10385_CR80
  publication-title: Chinese Political Science Review
  doi: 10.1007/s41111-020-00167-w
– volume: 35
  start-page: 273
  issue: 2
  year: 2018
  ident: 10385_CR54
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2018.01.005
– volume: 20
  start-page: 196
  issue: 2
  year: 2014
  ident: 10385_CR37
  publication-title: Information Technology for Development
  doi: 10.1080/02681102.2013.814040
– ident: 10385_CR57
– volume: 17
  start-page: 547
  issue: 3
  year: 2015
  ident: 10385_CR64
  publication-title: Information Systems Frontiers
  doi: 10.1007/s10796-013-9431-z
– start-page: 153
  volume-title: Social Psychophysiology: A Sourcebook
  year: 1983
  ident: 10385_CR67
– volume: 29
  start-page: 30
  issue: 1
  year: 2012
  ident: 10385_CR12
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2011.04.004
– volume: 21
  start-page: 997
  issue: 5
  year: 2019
  ident: 10385_CR52
  publication-title: Information Systems Frontiers
  doi: 10.1007/s10796-017-9808-5
– ident: 10385_CR26
– volume: 4
  start-page: 65
  issue: 4
  year: 2008
  ident: 10385_CR46
  publication-title: Journal of Information Technology & Politics
  doi: 10.1080/19331680801975789
– ident: 10385_CR51
  doi: 10.1109/HICSS.2005.688
– volume: 13
  start-page: 83
  issue: 1
  year: 2003
  ident: 10385_CR75
  publication-title: Journal of Public Administration Research and Theory
  doi: 10.1093/jopart/mug010
– volume: 37
  start-page: 197
  issue: 2
  year: 2010
  ident: 10385_CR90
  publication-title: Journal of Consumer Research
  doi: 10.1086/651257
– volume: 25694
  start-page: 1
  year: 2009
  ident: 10385_CR47
  publication-title: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
  doi: 10.1007/978-3-642-03781-8_1
– volume: 29
  start-page: 12
  issue: 1
  year: 2012
  ident: 10385_CR53
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2011.07.005
– start-page: 70
  volume-title: 2009 World Congress on Privacy, Security, Trust and the Management of e-Business
  year: 2009
  ident: 10385_CR23
  doi: 10.1109/CONGRESS.2009.26
– ident: 10385_CR42
– volume-title: The information revolution and developing countries
  year: 2004
  ident: 10385_CR87
– volume: 17
  start-page: 1333
  issue: 9
  year: 2015
  ident: 10385_CR85
  publication-title: Public Management Review
  doi: 10.1080/14719037.2014.930505
– volume: 43
  start-page: 563
  issue: 4
  year: 2021
  ident: 10385_CR74
  publication-title: Journal of Urban Affairs
  doi: 10.1080/07352166.2019.1572455
– volume: 17
  start-page: 129
  issue: 2
  year: 2012
  ident: 10385_CR14
  publication-title: Information Polity
  doi: 10.3233/IP-2012-0273
– volume-title: Endogenous Growth Theory
  year: 1998
  ident: 10385_CR1
– volume: 51
  start-page: 217
  issue: 2
  year: 2014
  ident: 10385_CR70
  publication-title: Information and Management
  doi: 10.1016/j.im.2013.08.006
– ident: 10385_CR15
– volume: 39
  start-page: 430
  issue: 2
  year: 2016
  ident: 10385_CR71
  publication-title: Public Performance and Management Review
  doi: 10.1080/15309576.2015.1108798
– volume: 36
  start-page: 167
  issue: 2
  year: 2019
  ident: 10385_CR79
  publication-title: Government Information Quarterly
  doi: 10.1016/j.giq.2019.01.001
– ident: 10385_CR6
– volume: 123
  start-page: 29
  year: 2019
  ident: 10385_CR83
  publication-title: International Journal of Human Computer Studies
  doi: 10.1016/j.ijhcs.2018.11.003
– volume: 27
  start-page: 591
  issue: 5
  year: 2000
  ident: 10385_CR88
  publication-title: Health Education and Behavior
  doi: 10.1177/109019810002700506
SSID ssj0016275
Score 2.4174693
Snippet Virtual Social Networks (VSN) act as a catalyst for the success of the active participation of citizens in information sharing, collaboration, and decision...
SourceID pubmedcentral
proquest
pubmed
crossref
springer
SourceType Open Access Repository
Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 1695
SubjectTerms Business and Management
Collaboration
Control
Cooperation
Cybersecurity
Decision making
Education
False information
Information systems
IT in Business
Management of Computing and Information Systems
Operations Research/Decision Theory
Public participation
Social networks
Systems Theory
Virtual networks
Voice communication
SummonAdditionalLinks – databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Nb9QwELWgXOCAaPkKtMhI3KhFEjt2wgWhbZeCAPVApd4i27HLSpAtTfbQX8NfZcZxst1W9LarjLXrnbH91vPmDSFvNFfKSAsLSfiUiTzVzEiRsQpe5VVpTOkDy_e7PDoRX06L03jh1kVa5bgnho26WVq8I3-HyB7AdanyD-d_GHaNwuxqbKFxl9zL4KTBOC_nn6YsAirwhj9cuJAAp8SimVg6pwL9FplZvCyY2jyYbqDNm6TJa5nTcCDNH5GHEUnSj4Prt8kd1-5gE-ZI2NghD65oDT4mfwfaW3tGh4pciikaTQ8W3q_wxmyfTkPpV2QSUd02dHZpAB_GHnf0eBB1QJNvDkuGF93vjvZLesiO9RV-Nv2MlKQgKd69hzcd3gB0FEtZqKYznD_DYvj-4pKOqihPyMn88MfsiMXuDMwKVfSM69JVUujMuoy7vOCAVaQ3qYFf2qfceVtkVnGnS99wURiuCuVcarSTADm94E_JVrts3XNC88YLY0zFG84FWGtZecub3Htjc2FVQrLRNbWN0uXYQeNXvRZdRnfW4M46uLOGMW-nMeeDcMet1rujx-u4iLt6HXIJeT09huWHORXduuUKbTjWKkspEvJsCJDp47jiMgM8mJByI3QmA5T23nzSLn4GiW_YKAHLFTIh-2OUrb_X_6fx4vZpvCT38yHiWZrtkq3-YuX2AFP15lVYOP8AmYUgFw
  priority: 102
  providerName: ProQuest
Title Relating Social Media Diffusion, Education Level and Cybersecurity Protection Mechanisms to E-Participation Initiatives: Insights from a Cross-Country Analysis
URI https://link.springer.com/article/10.1007/s10796-023-10385-7
https://www.ncbi.nlm.nih.gov/pubmed/37361893
https://www.proquest.com/docview/2871487872
https://www.proquest.com/docview/2830220664
https://pubmed.ncbi.nlm.nih.gov/PMC10107556
Volume 25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9NAEF7R9gIHxLsuJVokbnQl27vetXsLIWl5tESISOVk7a53IRI4qHYO_TX8VWb8akIBiZPteOzEnh37m8w33xLyQnOljLQQSMKHTMShZkaKiGWwFmepMalvWL7n8nQh3l4kF11TWNWz3fuSZPOk3mh2Uw1hFrlUPE2Y2iF7CeTuGI6LeDzUDlB3t0mzMHwAnXStMn8-x_br6AbGvEmV_K1e2ryGZvfI3Q4_0nHr8PvklisfkDsbqoIPyc-W4FZ-oW3vLcVijKavl96v8b-xIzqwOuh75AxRXRZ0cmUACXaz2dF5K9-AJmcOm4OX1feK1is6ZXO9wcSmb5B81IiHV8ewUWGuX1FsWqGaTvCaGba915dXtNc_eUQWs-mnySnr5mFgVqikZlynLpNCR9ZF3MUJB1QivQkN3F0fcudtElnFnU59wUViuEqUc6HRTgK49II_JrvlqnT7hMaFF8aYjBecC7DWMvOWF7H3xsbCqoBEvTty24mU41wZ3_JreWV0YQ4uzBsX5nDMy-GYH61Exz-tD3sv5124VjmmjZC5pSoOyPNhNwQaVk906VZrtOHYlSylCMiTdlAMX8cVlxEgv4CkW8NlMEAR7-095fJrI-YNj0RAbYkMyFE_sq5_198v4-D_zJ-S23E76lkYHZLd-nLtngGaqs2I7KSzkxHZG598fjeF5avp-fwjfHoWfRg1gfUL_kUeQA
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1fb9MwED-N7gF4QDD-FQYYCZ6YRWI7doqEEHSdVtZVFdqkvWV2YkMlSMfSCvXT8A34jPjyrysTe9tbo5zTWHdn_-K7-x3AK82VMjL1jiRcQAULNDVShLTnf7FebEzsyizfsdw_Fp9PopMN-NPUwmBaZbMmlgt1NkvxjPwtInsPrmPFPpz9pNg1CqOrTQuNyiwO7PKX_2Qr3g93vX5fM7Y3OOrv07qrAE2FiuaU69j2pNBhakNuWcT9HiudCQznzAXcujQKU8Wtjl3GRWS4ipS1gdFWeqjkBPfPvQGbAitaO7D5aTCefGnjFsj5W37ioet6ZFSX6dTFeqpM-MVcMB5HVK1vhZfw7eU0zX9iteUWuHcX7tTYlXysjO0ebNh8C9s-1ykiW3D7ArvhffhdJdrlX0lVA0wwKKTJ7tS5BZ7R7ZB2KBlh7hLReUb6S-MRad1Vj0wqGgkUObRYpDwtfhRkPiMDOtEXMsLJEJOgShLz4p2_KPDMoSBYPEM06eP8KZbfz8-XpOFheQDH16K5h9DJZ7l9DIRlThhjejzjXHhpLXsu5RlzzqRMpKoLYaOaJK3J0rFnx_dkRfOM6ky8OpNSnYkf86Ydc1ZRhVwpvd1oPKmXjSJZGXkXXra3vcNjFEfndrZAGY7V0VKKLjyqDKT9O664DD0C7UK8ZjqtAJKJr9_Jp99KUnG_NHv0GMku7DRWtnqv_0_jydXTeAE3948OR8loOD54CrdYZf00CLehMz9f2Gce0c3N89qNCJxet-f-BaXvXoQ
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1fb9MwELfGkBA8IBj_AgOMBE_MWuJz7AQJIdSurGxMfWDS3oKd2FAJ0rG0Qv00fA8-Hb7868rE3vbWKuc21t3ZP_t-d0fISw1KGZl7RxIuZIKHmhkpIpb6TzxNjElczfI9kvvH4uNJfLJB_nS5MEir7NbEeqEuZjneke8isvfgOlF817W0iMlw9O70J8MOUhhp7dppNCZyYJe__PGtejseel2_4ny093mwz9oOAywXKp4z0IlNpdBRbiOwPAa_30pnQgPAXQjW5XGUK7A6cQWI2ICKlbWh0VZ62OQE-N-9Rq4rUCke_JLRhz6CgdV_68MeOrHHSG3CTpu2p2rqL7LCIImZWt8ULyDdi4TNf6K29WY4ukNutyiWvm_M7i7ZsOUWNoBuySJb5Na5Oof3yO-Gcld-pU02MMXwkKbDqXMLvK3bof1QeogsJqrLgg6WxmPTtr8enTQFJVDkk8V05Wn1o6LzGd1jE32OG07HSIeqy5lXb_yXCm8fKoppNFTTAc6fYSL-_GxJu4os98nxlejtAdksZ6V9RCgvnDDGpFAACC-tZepyKLhzJuciVwGJOtVkeVs2Hbt3fM9WBZ9RnZlXZ1arM_NjXvdjTpuiIZdKb3caz9oFpMpW5h6QF_1j7_oYz9GlnS1QBjBPWkoRkIeNgfR_Bwpk5LFoQJI10-kFsKz4-pNy-q0uL-4XaY8jYxmQnc7KVu_1_2k8vnwaz8kN76_Z4fjo4Am5yRvjZ2G0TTbnZwv71EO7uXlW-xAlX67aaf8CBlZhVA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Relating+Social+Media+Diffusion%2C+Education+Level+and+Cybersecurity+Protection+Mechanisms+to+E-Participation+Initiatives%3A+Insights+from+a+Cross-Country+Analysis&rft.jtitle=Information+systems+frontiers&rft.au=Ahangama%2C+Supunmali&rft.date=2023-10-01&rft.pub=Springer+US&rft.issn=1387-3326&rft.eissn=1572-9419&rft.volume=25&rft.issue=5&rft.spage=1695&rft.epage=1711&rft_id=info:doi/10.1007%2Fs10796-023-10385-7&rft.externalDocID=10_1007_s10796_023_10385_7
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1387-3326&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1387-3326&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1387-3326&client=summon