You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed conference proceedings of the 12th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2013, held in Athens, Greece, in April 2013. The 25 revised papers presented together with a keynote speech were carefully reviewed and selected from numerous submissions. They are organized in the following topical sections: trust and privacy; security, access control and legal requirements in cloud systems; protocols, regulation and social networking; adoption issues in e/m-services; new services adoption and ecological behavior; knowledge management and business processes; and management, policies and technologies in e/m-services.
The future of government as we know it is being shaped by the quickly-advancing progression of information and communication technology (ICT) eGovernment systems. eGov presents major challenges and advantages for policy makers and the public alike.
Rapidly advancing technology creates an overwhelming demand to remain informed of current research and discoveries. Cases on Emerging Information Technology Research and Applications strategically combines the latest studies encompassing the most current advancements in the IT arenas. This compilation of cases highlights relevant information for professionals, researchers, and students wishing to remain current with the ever-changing IT field.
"This book explores important and emerging advancements in digital identity and access management systems, providing innovative answers to an assortment of problems as system managers are faced with major organizational, economic and market changes"--Provided by publisher.
"This book presents a vital compendium of research detailing the latest case studies, architectures, frameworks, methodologies, and research on Digital Democracy"--Provided by publisher.
Recent developments in information and communication technology (ICT) have paved the way for a world of advanced communication, intelligent information processing and ubiquitous access to information and services. The ability to work, communicate, interact, conduct business, and enjoy digital entertainment virtually anywhere is r- idly becoming commonplace due to a multitude of small devices, ranging from mobile phones and PDAs to RFID tags and wearable computers. The increasing number of connected devices and the proliferation of networks provide no indication of a sl- down in this tendency. On the negative side, misuse of this same technology entails serious risks in various aspects, such ...
The papers in this publication address many topics in the context of knowledge-based software engineering, including new challenges that have arisen in this demanding area of research. Topics in this book are: knowledge-based requirements engineering, domain analysis and modeling; development processes for knowledge-based applications; knowledge acquisition; software tools assisting the development; architectures for knowledge-based systems and shells including intelligent agents; intelligent user interfaces and human-machine interaction; development of multi-modal interfaces; knowledge technologies for semantic web; internet-based interactive applications; knowledge engineering for process ...
This book constitutes the proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 62 papers presented in the HAS 2015 proceedings are organized in topical sections as follows: authentication, cybersecurity, privacy, security, and user behavior, security in social media and smart technologies, and security technologies.
E-Government describes the utilization of technologies to improve the lives of citizens and business organizations while facilitating the operation of the government. With the rise of new technologies, governments need to consider implementing Web 2.0 and mobile technologies as a way to offer relevant e-services to citizens so that they may fully participate in governmental affairs. Emerging Mobile and Web 2.0 Technologies for Connected E-Government highlights the latest technologies and how they can be implemented by the government and effectively used by citizens. This book aims to be an inclusive reference source for researchers, practitioners, students, and managers interested in the application of recent technological innovations to develop a more effective e-government system.
Effective administration of government and governmental organizations is a crucial part of achieving success in those organizations. To develop and implement best practices, policymakers and leaders must first understand the fundamental tenants and recent advances in public administration. Public Affairs and Administration: Concepts, Methodologies, Tools, and Applications explores the concept of governmental management, public policy, and politics at all levels of organizational governance. With chapters on topics ranging from privacy and surveillance to the impact of new media on political participation, this multi-volume reference work is an important resource for policymakers, government officials, and academicians and students of political science.