1. Abbas, N., Tanveer A., Ullah Shah, S. H., Omar, M., & Woo Park, H. (2019). Investigating the applications of artificial intelligence in cyber security.
Scientometricsvolume, 121(2):1189–1211.
2. Aftergood, S. (2017). Cybersecurity: The cold war online,'' Nature, 547(2):30-31.
3. Akhtar, N. & Mian, A. (2018). Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access, 6:14410 - 14430.
4. Al Lily, A., Fathy Ismail, A., Abunasser, F., & Alqahtani, R. (2020). Distance Education as a Response to Pandemics: Coronavirus and Arab Culture. Technology in Society,63(2): 105-120.
5. AliAkbar, I., Ahmadpour, A., & Jalalabadi, L. (1397). Identifying drivers for the future of sustainable tourism in Kerman with a futures research approach. Journal of Tourism and Development. 7: 156-175. (In Persian)
7. Barth, T., Arnold, E. .(1999). Artificial intelligence and administrative discretion: implications forpublic administration.Am. Rev. Public Adm,29(4): 332–351.
8. Bhatele, K., Sharivastava, H., & Kumari, N. (2017) The Role of ArtificialIntelligence in Cyber Security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems, 2017: 175-176.
9. Bournaris, T. (2020). Evaluation of e-GovernmentWeb Portals: The Case of Agricultural e-Government Services in Greece.
Agronomy, 10(7):932.
10. Bredillet, C., Tywoniak, S., & Tootoonchy, M. (2018). Why and how do project management offices change? A structural analysis approach. International Journal of Project Management, 36(5), 744–761.
11. Bughin, J., Hazan, E., Ramaswamy, S., Chui, M., Allas, T., Dahlström, P., Henke, N., & Trench, M. (2018). Artificial intelligence–the next digital frontier. McKinsey Glob Institute, 17: 224-226.
12. Dasoriya R., Rajpopat J., Jamar R., & Maurya, M. (2018). The Uncertain Future of Artificial Intelligence,2018 8th International Conference on Cloud Computing, Data Science & Engineering,: 458-461.
13. Deibert, R. & Rohozinski, R. (2010).risking security: Policies and paradoxes of cyberspace security. International Political Sociology, 4 (1): 15– 32.
14. Duperrin, J., & Godet, M. (1973). Methode de hierarchisation des elements d'un Systeme, Rapport Economique du CEA, 5: 45-51.
15. Dubey, R. & Ali, S. (2014). Identification of flexible manufacturing system dimensions and their interrelationship using total interpretive structural modelling and fuzzy MICMAC analysis. Global Journal of Flexible Systems Management, 15 (2), 131–143.
16. Gasova, K. & Stofkova, K. (2017). E-Government as a quality improvement tool for citizens' services. TRANSCOM 2017: International scientific conference on sustainable, modern and safe transport,192(1): 225 – 230.
17. Geluvaraj, B., Satwik, P., & Ashok Kumar, T. (2019). The Future of Cybersecurity: Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Cyberspace. Conference: International Conference on SecurityAt: Garden City University, Bangalore.
18. Godet, A. J., Meunier, M. F., & Roubelat, F.,(2003). Structural analysis with the MICMAC,method & actors’ strategy with MACTOR method, FuturesResearch Methodology, 2:135-140.
19. Godet, M. (1991). From anticipation to action, UNESCO publishing. Paris.
20. Golovko, V. (2017). Deep learning: an overview and main paradigms. Opt Memory Neur Netw, 26(1):1-17.
21. Guan, ZT., Li J., & Wu L. F. (2017). Achieving efficient and secure data acquisition for cloud-supported Internet of Things in smart grid.IEEE Internet Things, 4(6): 1934-1944.
22. Hamet, P. & Tremblay, J. (2017) Artificial intelligence in medicine. Metabolism journal, 2017: 89-12.
23. Hung, S., Chang, C., & Yu, T. (2006). Determinants of user acceptance of the e-government services:the case of online tax filing and payment system. Gov. Inf. Q, 23(1): 97–122.
24. Iqbal, S. & Pippon-Young, L. (2009). The Delphi method. Nursing Research, 46(2), 116–118.
25. Janevski, Z et al. (2014). Business benefits from e-government services: case of Slovenia and Macedonia. Economic Development, 12(3): 13-27.
27. Johnson, J. (2019). Artificial intelligence & future warfare:implications for international security
Defense & Security Analysis,35: 1-23.
28. Kalbaska, N., Janowski, T., Estevez, E,. & Cantoni, L. (2016). E-Government Relationships Framework in the Tourism Domain. A First Map. Information and Communication Technologies in Tourism - Proceedings of the International Conference in Bilbao (Spain). New York, pp: 73-87.
29. Kahn, H. & Wiener, A. (1967). The Next Thirty-Three Years: A Framework for Speculation. Dædalus: 705-732.
30. Kitsing, M. (2017). Internet Banking as a Platform for E-Government. Annual International Conference on Innovation and Entrepreneurship,30: 99-107
31. Kumar, N., Kharkwal, N., Kohli, R., & Choudhary, S. (2016). Ethical aspects and future of artificial intelligence.2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH: 111-114
32. Lamberti, L., Benedetti, M., & Chen, S.(2014). Benefits sought by citizens and channel attitudes formultichannel payment services: evidence from Italy. Gov. Inf. Q. 31(4): 596-609.
33. Larrocha, E., Minguet, J., Díaz, G., Castro, M., & Vara, A. (2010). Filling the gap of Information Security Management inside ITIL: proposals for postgraduate students. IEEE EDUCON Edu. Engg, pp: 907-912.
34. Lengler, R. & Eppler, M. (2007). Towards a periodic table of visualization methods for management. InProceedings of the IASTED International Conference on Graphics and Visualization in Engineering, pp: 83–88.
35. Li, L., Ota, K., & Dong, M. X. (2018). Deep learning for smart industry. efficient manufacture inspection system with fog computing. IEEE Trans Ind Inform, 14(10): 4665- 4673.
36. Liu, S., Cui, W., Wu, Y., & Liu, M. (2014). A survey on information visualization: Recent advances and challenges. The Visual Computer, 30(12): 1373–1393
37. Lv, Z,. Li, X,. Wang, W,. Zhang, B,. Hu, J,. & Feng, S. (2017).Government affairs service platform for smart city.
Future Generation Computer Systems: 81.
39. Meyer, J. A. (1997). The acceptance of visual information in management. Information & Management, 32(6): 275–287.
40. Mikhaylov, S., Esteve, M., & Campion, A. (2018). Artificial intelligence for the public sector:opportunities and challenges of cross-sector collaboration. Philos. Trans. R. Soc, 37(5): 124-140.
41. Milenkoski A., Vieira M., Kounev S., Avritzer A., & Payne, B. D. (2015). Evaluating computer intrusion detection systems: A survey of commonpractices, ACM Comput. Surv.,48(2):1-41.
42. Mirza, E. & Ehsan, N. (2017). Quantification of project execution complexity and its effect on performance of infrastructure development projects. Engineering Management Journal, 29(2), 108–123.
43. Mohd Saman, W. & Haider, A. (2012). Electronic court records management in Malaysia: A case study. Journal of e-Government Studies and Best Practices. 2: 1122-1133.
44. Nappo, S. (2017). The Role of Artificial Intelligencein Cyber Security. Goodreads.75(2): 112-138.
45. Pereira, T. & Santos, H. (2010). A security audit framework to manage Information. Global Security, Safety and Sustainability: 9-18.
46. Reis, J., Amorim, M., Melão, N., & Matos, P. (2018). Digital transformation: a literature review andguidelines for future research. In: Trends and Advances in Information Systems andTechnologies, WorldCIST, Springer, 2018: 411-421.
48. Shanmugam K., Khairunnisha Zainal, N., & Gnanasekaren, Ch.(2019). Technology Foresight In The Virtual Learning Environment in Malaysia. Journal of Physics: Conference Series. 1228.
49. Shojaan, A., Taghavifard, T,. Elyasi, M., & Mohammadi, M. (2018). The Realization of Electronic Governance in Iran: A Step to the Intelligent Government. Journal of Emergency Management (JOEM).8: 49-59. (In Persian).
50. Sundberg, L. (2019). Electronic government: Towards e-democracy or democracy at risk?.Safety Science,118:22:23.
51. Tabaeyan, K. (1388). Delphi is one of the techniques used in Futurology, Concepts and Methods), Defense Educational and Research Institute, 1388:127-1.(In Persian)
52. Thuraisingham, B. M. (2020). Can AI be for Good in the Midst of Security Attacks and Privacy Violations?.Proceedings ACM CODASPY, 2020: 1-10.
53. Wazid M., Zeadally S., & Das A. K. (2019). Mobile banking: Malware threats and security solutions, IEEE ConsumerElectronics Magazine, 8: 56-60.
54. Wegmann, A., Regev, G., Garret, G., & Maréchal, F. (2008). Specifying Services for ITIL Service Management. Proc. Int. Workshop Service-Oriented Computing Consequences for Engineering Requirements, 2008:1-8.
55. Wirtz, B., Weyerer, J., & Geyer, C. (2018). Artificial intelligence and the public sector–applicationsand challenges. Int. J. Public Adm, 13(7): 1–20
56. Wong, M. & Jackson, S. (2017). User Satisfaction Evaluation of Malaysian E-Government Education Services. 2017 International Conference on Engineering, Technology and Innovation (ICE/ITMC): 27-29.
57. Woudenberg, f.(1991). an evaluation of Delphi . Technological forecasting and social change, 40: 131-150.
58. Zegers, N. (2006). A methodology for improving information security incident identification and response. Master Thesis Inform.& Econom, Erasmus Univ. Rotterdam, 18: 57-60