Mitigating Cybercrimes in E-Government Services: A Systematic Review and Bibliometric Analysis

Shahrukh Mushtaq*, Mahmood Shah

*Corresponding author for this work

    Research output: Contribution to journalReview articlepeer-review

    1 Citation (Scopus)
    20 Downloads (Pure)

    Abstract

    Cybercrime prevention is critical for the effective functioning of e-government services. Despite its importance, internal cybercrime mitigation processes within these services are underrepresented in the existing literature. This study addresses this gap by conducting a systematic review and bibliometric analysis of e-government research from January 2015 to January 2025. Using the Web of Science and Scopus databases, 3790 studies were identified; after removing duplicates, bibliometric analysis was performed using R Studio (Build 467). The analysis revealed that Government Information Quarterly was the leading journal, with China, the USA, and the UK contributing the most publications. Nineteen major themes emerged, with “adoption” identified as the dominant theme, followed by “governance” and “development”. Among 88 security-related studies, 19 specifically addressed cybersecurity in e-government services. Findings indicate a predominant focus on user-centric perspectives, such as service adoption and system vulnerabilities, while internal cybersecurity issues, including managerial practices and mitigation strategies, remain largely unexplored. Limited data availability may contribute to this gap. This study highlights the need for future research to adopt an integrated approach, emphasising management-level practices for cybercrime mitigation within e-government institutions from both developing and developed nations.
    Original languageEnglish
    Article number3
    Number of pages22
    JournalDigital
    Volume5
    Issue number1
    DOIs
    Publication statusPublished - 29 Jan 2025

    Keywords

    • e-government
    • digital government
    • cybercrimes
    • electronic government
    • cybercriminals
    • mitigation

    Cite this