Usable Privacy and Security in Online Public Services

Usable Privacy and Security in Online Public Services

Author: Esther Ruiz Ben

Publisher: Springer Nature

Published: 2023-12-05

Total Pages: 99

ISBN-13: 3031433831

DOWNLOAD EBOOK

This practice-oriented book is a unique guide to the implementation of usable, privacy-compliant and secure online services in the area of e-government. Beginning with a clarification of basic concepts of usability, data privacy, and cybersecurity, the book provides lucid explanations of different methods (quantitative, qualitative, and mixed methods) that can be applied in the practice of designing, developing, and evaluating online public services in light of both usability criteria and data privacy and IT security compliance. A number of examples and exercises are included as well as awareness-raising measures that can serve as orientation both for practitioners and for teaching purposes. There is also a concise glossary of terms along with recommendations for further reading. This book provides comprehensive coverage of usability, data privacy and information security topics. At the time of going to press, it is also up to date with respect to the implementation of the EU Single Digital Gateway regulation. It is therefore aimed at anyone interested in understanding the principles of usable privacy and information security and in ways of contributing to the design, development, and evaluation of online public services that satisfy the needs of the public. The book’s audience thus includes not only students in the areas of e-government or public administration but also professionals developing online services or e-government applications.


Pivoting Government through Digital Transformation

Pivoting Government through Digital Transformation

Author: Jay Liebowitz

Publisher: CRC Press

Published: 2023-08-16

Total Pages: 209

ISBN-13: 1000919692

DOWNLOAD EBOOK

Affecting every sector and country in the world, digital technology is changing the way citizens engage in society, companies conduct business, and governments deliver public services. The COVID-19 pandemic accelerated the pace of digitalization and exposed such vulnerabilities as inadequate infrastructure, weak regulations, and a scarcity of skilled professionals capable of digitally transforming government. Not immune to the digital revolution, governments are slowly adapting to a digital world. Governments are implementing digital solutions to deliver services to their citizens, make payments, and engage the public. Focusing on how government can transition more effectively through digital transformation, Pivoting Government Through Digital Transformation covers the following key components: Setting the stage during the Great Resignation period Filling the digital talent pipeline Best practices and vignettes for applying digital transformation in government Looking ahead towards the future Key chapter contributors from U.S. and foreign governments, as well as state and local governments, discuss how they are coping with today’s environment and how they are using digital transformation efforts to enhance their organization’s effectiveness and digital talent pipeline. With chapters on theory and practice, this groundbreaking book offers an in-depth analysis of the most innovative approaches to e-government and discusses case studies from local, state, and federal government perspectives. This is an essential guide for government employees, scholars, and regular citizens who want to make government work more effectively and democratically in the digital age.


Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications

Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2019-06-07

Total Pages: 1875

ISBN-13: 1522588981

DOWNLOAD EBOOK

The internet is established in most households worldwide and used for entertainment purposes, shopping, social networking, business activities, banking, telemedicine, and more. As more individuals and businesses use this essential tool to connect with each other and consumers, more private data is exposed to criminals ready to exploit it for their gain. Thus, it is essential to continue discussions involving policies that regulate and monitor these activities, and anticipate new laws that should be implemented in order to protect users. Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications examines current internet and data protection laws and their impact on user experience and cybercrime, and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats. Highlighting a range of topics such as online privacy and security, hacking, and online threat protection, this multi-volume book is ideally designed for IT specialists, administrators, policymakers, researchers, academicians, and upper-level students.


Risks and Security of Internet and Systems

Risks and Security of Internet and Systems

Author: Nora Cuppens

Publisher: Springer

Published: 2018-03-09

Total Pages: 267

ISBN-13: 3319766872

DOWNLOAD EBOOK

This book constitutes the revised selected papers from the 12th International Conference on Risk and Security of Internet and Systems, CRISIS 2017, held in Dinard, France, in September 2017.The 12 full papers and 5 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They cover diverse research themes, ranging from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis.


Public Sector Reform in Developing and Transitional Countries

Public Sector Reform in Developing and Transitional Countries

Author: Christopher Rees

Publisher: Routledge

Published: 2013-09-13

Total Pages: 209

ISBN-13: 1135740720

DOWNLOAD EBOOK

Over recent decades, decentralization has emerged as a key Public Sector Reform strategy in a wide variety of international contexts. Yet, despite its emergence as a ubiquitous activity that cuts across disciplinary lines in international development, decentralization is understood and applied in many different ways by parties acting from contrary perspectives. This book offers a fascinating insight into theory and practice surrounding decentralization activities in the Public Sectors of developing and transitional countries. In drawing on the expertise of established scholars, the book explores the contexts, achievements, progress and challenges of decentralization and local governance. Notably, the contributions contained in this book are genuinely international in nature; the chapters explore aspects of decentralization and local governance in contexts as diverse as Ghana, Hong Kong, India, Indonesia, Kazakhstan, Morocco, Tanzania, Uganda, and Viet Nam. In summary, by examining the subject of decentralization with reference to specific developing and transitional Public Sector contexts in which it has been practiced, this book offers an excellent contribution towards a better understanding of the theory and practice of decentralization and local governance in international settings. This book was published as a special double issue of the International Journal of Public Administration.


Public Response to Alerts and Warnings Using Social Media

Public Response to Alerts and Warnings Using Social Media

Author: National Research Council

Publisher: National Academies Press

Published: 2013-02-04

Total Pages: 93

ISBN-13: 0309290333

DOWNLOAD EBOOK

Following an earlier NRC workshop on public response to alerts and warnings delivered to mobile devices, a related workshop was held on February 28 and 29, 2012 to look at the role of social media in disaster response. This was one of the first workshops convened to look systematically at the use of social media for alerts and warnings-an event that brought together social science researchers, technologists, emergency management professionals, and other experts on how the public and emergency managers use social media in disasters.In addition to exploring how officials monitor social media, as well as the resulting privacy considerations, the workshop focused on such topics as: what is known about how the public responds to alerts and warnings; the implications of what is known about such public responses for the use of social media to provide alerts and warnings to the public; and approaches to enhancing the situational awareness of emergency managers. Public Response to Alerts and Warnings Using Social Media: Report of a Workshop on Current Knowledge and Research Gaps summarizes presentations made by invited speakers, other remarks by workshop participants, and discussions during parallel breakout sessions. It also points to potential topics for future research, as well as possible areas for future research investment, and it describes some of the challenges facing disaster managers who are seeking to incorporate social media into regular practice.


Database and Expert Systems Applications

Database and Expert Systems Applications

Author: Qiming Chen

Publisher: Springer

Published: 2015-08-10

Total Pages: 542

ISBN-13: 3319228528

DOWNLOAD EBOOK

This two volume set LNCS 9261 and LNCS 9262 constitutes the refereed proceedings of the 26th International Conference on Database and Expert Systems Applications, DEXA 2015, held in Valencia, Spain, September 1-4, 2015. The 40 revised full papers presented together with 32 short papers, and 2 keynote talks, were carefully reviewed and selected from 125 submissions. The papers discuss a range of topics including: temporal, spatial and high dimensional databases; semantic Web and ontologies; modeling, linked open data; NoSQLm NewSQL, data integration; uncertain data and inconsistency tolerance; database system architecture; data mining, query processing and optimization; indexing and decision support systems; modeling, extraction, social networks; knowledge management and consistency; mobility, privacy and security; data streams, Web services; distributed, parallel and cloud databases; information retrieval; XML and semi-structured data; data partitioning, indexing; data mining, applications; WWW and databases; data management algorithms. These volumes also include accepted papers of the 8th International Conference on Data Management in Cloud, Grid and P2P Systems, Globe 2015, held in Valencia, Spain, September 2, 2015. The 8 full papers presented were carefully reviewed and selected from 13 submissions. The papers discuss a range of topics including: MapReduce framework: load balancing, optimization and classification; security, data privacy and consistency; query rewriting and streaming.


Financial Cryptography and Data Security

Financial Cryptography and Data Security

Author: Andrew A. Adams

Publisher: Springer

Published: 2013-10-01

Total Pages: 249

ISBN-13: 364241320X

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on Applied Homomorphic Cryptography, WAHC 2013, held in conjunction with the 17th International Conference on Financial Cryptology and Data Security, FC 2013, in Okinawa, Japan. The 16 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WAHC workshop was to bring together professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, secure function evaluation, private information retrieval or searchable encryption to present, discuss, and share the latest findings in the field, and to exchange ideas that address real-world problems with practical solutions using homomorphic cryptography.


Social Network Engineering for Secure Web Data and Services

Social Network Engineering for Secure Web Data and Services

Author: Luca Caviglione

Publisher: IGI Global

Published: 2013-01-01

Total Pages: 323

ISBN-13: 146663927X

DOWNLOAD EBOOK

"This book provides empirical research on the engineering of social network infrastructures, the development of novel applications, and the impact of social network- based services over the internet"--Provided by publisher.