Reference: [1] Li Junwei, Jiang Xuedong. Comprehensive Evaluation Model of Information Security Risk in E-Government System[J]. Modern Electronic Technology, 2017, 40(7): 74-77. [2] Wang Lianfeng, Song Gang, Zhang Nan. The Core Elements and Interaction of “Five in One” Smart City Management: An Analysis Based on the Perspective of Innovation 2.0[J]. Urban Development Research, 2017, 24(3): 67-73. [3] Wen Qianyu, Hu Guangwei. Research on Value Co-creation Mechanism of E-Government Service Based on Value Network[J]. Journal of Information, 2017, 20 (12): 152-158. [4] Long Yi, Li Guoqiu. Research on Cooperation Game of Information Sharing in G2C E-government under the View of “Internet + Government Affairs”[J]. Information Science, 2017, V35(5): 34-41. [5] Zhang Huiping, Guo Ning, Yang Guofu, et al. Research on Network Security Mechanism of “Internet + Government Service” Based on Social-Technical Framework[J]. Journal of Information, 2017, 15 (12): 16-21. [6] Li Yan, Zhu Chunkui. How does e-government affect government trust?——An empirical study based on survey data of Wuhan, Tianjin and Chongqing[J]. Nanjing Social Sciences, 2017, 12 (5): 65-73. [7] Ding Yi, Liu Binfang, Liu Yuenan. Evaluation of the current status of e-government online service development in China*--An empirical study based on 338 cities in China[J]. Journal of Information, 2017, 36(1): 136-141. [8] Li Yongzhong, Cai Jia. Evolution and Visual Analysis of Domestic E-government Research Subjects Based on LDA[J]. Modern Information, 2017, 37(4): 158-164. [9] Zhang Yanlin, Xie Weihong, Wu Xueyan. Empirical Research on Public Trust in E-government Based on Attribution Theory[J]. Chinese Journal of Management, 2017, 14(7): 1088-1094. [10] Wang Yu, Wu Yuxin. Simulation of Internet User Communication Information Data Transmission Accuracy Monitoring[J]. Computer Simulation, 2018, 35(03): 373-376.
|