"This book addresses various aspects of building secure E-Government architectures and services; it presents views of experts from academia, policy and the industry to conclude that secure E-Government web services can be deployed in an application-centric, interoperable way. It addresses the narrow yet promising area of web services and sheds new light on this innovative area of applications"--Provided by publisher.
"This book discusses important concepts for public administration reformation, taking into account the complex social, administrative, cultural, and legal problems of implementing modern digital systems"--Provided by publisher.
Provides research on e-government and its implications within the global context. Covers topics such as digital government, electronic justice, government-to-government, information policy, and cyber-infrastructure research and methodologies.
As an application of information technology (IT), e-government is used for delivery in government for services and information exchange between the government and the public. This electronic service delivery is an important innovation to society; however, it also attracts hackers and cyberattacks. It is essential to provide fast protection application software and structure. Cybersecurity Measures for E-Government Frameworks provides security techniques and measures to e-governance applications. It further discusses emerging technologies in the cybersecurity field as well as the specific uses they have to e-government technologies. Covering topics such as cyberattack detection, deep learning, and preventive approaches, this book is an essential resource for government officials, security professionals, students and educators of higher education, IT professionals, researchers, and academicians.
This book presents the most interesting talks given at ISSE 2013 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Cloud Security, Trust Services, eId & Access Management - Human Factors, Awareness & Privacy, Regulations and Policies - Security Management - Cyber Security, Cybercrime, Critical Infrastructures - Mobile Security & Applications Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2013.
"This book collects a complete set of studies addressing the security and dependability challenges of Web services and the development of protocols to meet them. Encompassing a complete range of topics including specifications for message level security, transactions, and identity management, it enables libraries to provide researchers an authoritative guide to a most challenging technological topic"--Provided by publisher.
This book constitutes the refereed proceedings of the 4th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2015, held in Valencia, Spain, in September 2015, in conjunction with DEXA 2015. The 26 revised full papers presented together with one invited talk were carefully reviewed and selected from 30 submissions. The papers are organized in the following topical sections: semantic technologies in e-government; identity management in e-government; e-government cases; open innovation and G-cloud; intelligent systems in e-government; open government; e-government solutions and approaches.
This edited book presents scientific results of the International Semi-Virtual Workshop on Data Science and Digital Transformation in the Fourth Industrial Revolution (DSDT 2020) which was held on October 15, 2020, at Soongsil University, Seoul, Korea. The aim of this workshop was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The workshop organizers selected the best papers from those papers accepted for presentation at the workshop. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round of review, 17 of the conference’s most promising papers are then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will bring to the field of computer and information science.
The application of digital information and communication technologies (ICTs) to reform governmental structures and public service is widely and perhaps naively viewed as the 21st century "savior", the enlightened way to reinvigorate democracy, reduce costs, and improve the quality of public services. This book examines the transition from e-government to digital governance in light of the financial exigencies and political controversies facing many governments. The chapters concentrate on strategies for public sector organizational transformation and policies for improved and measurable government performance in the current contentious political environment. This fully updated second edition of Digital Governance provides strategies for public officials to apply advanced technologies, manage remote workforces, measure performance, and improve service delivery in current crisis-driven administrative and political environments. The full implementation of advanced digital governance requires fundamental changes in the relationship between citizens and their governments, using ICTs as catalysts for political as well as administrative communication. This entails attitudinal and behavioral changes, secure networks, and less dependence on formal bureaucratic structures (covered in Part I of this book); transformation of administrative, educational, and security systems to manage public services in a more citizen-centric way (covered in Part II); the integration of advanced digital technologies with remote broadband wireless internet services (Part III); and the creation of new forms of global interactive citizenship and self-governance (covered in Part IV). Author Michael E. Milakovich offers recommendations for further improvement and civic actions to stimulate important instruments of governance and public administration. This book is required reading for political science, public administration, and public policy courses, as well as federal, state, and local government officials.