A. L. Allen, Uneasy access: Privacy for women in a free society, Rowman & Littlefield, pp.1-25, 1988.

, Association agreement between the European Union and the European Atomic Energy Community and their Member States of the one part and Georgia, on the other part. Opened for signature 27, 2014.

, OJ L 261/4, p.11, 2019.

F. Bélanger and L. Carter, Trust and risk in e-government adoption, The Journal of Strategic Information Systems, vol.17, issue.2, pp.165-176, 2008.

A. Beldad, M. De-jong, and M. Steehouder, I trust not therefore it must be risky: Determinants of the perceived risks of disclosing personal data for e-government transactions, Computers in Human Behavior, vol.27, issue.6, pp.2233-2242, 2011.

A. Beldad, T. Van-der-geest, M. De-jong, and M. Steehouder, A cue or two and I'll trust you: Determinants of trust in government organizations in terms of their processing and usage of citizens' personal information disclosed online, Government information quarterly, vol.29, issue.1, pp.41-49, 2012.

R. Gavison, Privacy and the Limits of Law, The Yale Law Journal, vol.89, issue.3, pp.421-471, 1980.

M. Järvsoo, A. Norta, V. Tsap, I. Pappel, and D. Draheim, Implementation of information security in the EU information systems: an Estonian case study, Challenges and Opportunities in the Digital Era: 17th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2018, pp.150-163, 2018.

W. Jho, Challenges for e-governance: protests from civil society on the protection of privacy in e-government in Korea, International Review of Administrative Sciences, vol.71, issue.1, pp.151-166, 2005.

J. H. Moor, The ethics of privacy protection, Library Trends, vol.39, pp.69-82, 1991.

J. H. Moor, Towards a theory of privacy in the information age, ACM SIGCAS Computers and Society, vol.27, issue.3, pp.27-32, 1997.

J. Reidenberg, The use of technology to assure internet privacy: Adapting labels and filters for data protection, Texas Law Review, vol.3, issue.2, p.553, 1997.

V. Tsap, I. Pappel, D. Draheim, and T. Dang, Key Success Factors in Introducing National e-Identification Systems, Proceedings of FDSE'2107 -the 4th International Conference on Future Data and Security Engineering, pp.455-471, 2017.

V. M. Sue and L. A. Ritter, Conducting online surveys, pp.33-35, 2012.

, United Nations, General Assembly, 2014.

, Resolution A/RES/69/166 on the Right to Privacy in the Digital Age, p.11, 2019.

Y. Wu, Protecting personal data in e-government: A cross-country study, Government Information Quarterly, vol.31, issue.1, pp.150-159, 2014.

?. _???????, Government of Georgia on Approving Minimum Standard for Automated Document Management Systems in State Budget Institutions, 2012.