Angebote zu "E-Government" (40 Treffer)

Kategorien

Shops

National Security Surveillance Act
59,00 € *
ggf. zzgl. Versand

The National Security Surveillance Act (S. 2453) was a bill in the United States Congress that would have established procedures for the review of electronic surveillance programs. It was similar to the Military Commissions Act of 2006.Redefine surveillance so that only programs that catch the substance of a communication need oversight. Any government surveillance that captures, analyzes and stores patterns of communications such as phone records, or e-mail and website addresses, is no longer considered surveillance.

Anbieter: Dodax
Stand: 30.03.2020
Zum Angebot
Enacting Electronic Government Success
139,05 € *
ggf. zzgl. Versand

Many countries around the world are investing a great amount of resources in government IT initiatives. However, few of these projects achieve their stated goals and some of them are complete failures. Therefore, understanding e-government success has become very important and urgent in recent years. In order to develop relevant knowledge about this complex phenomenon, researchers and practitioners need to identify and assess what are the main conditions, variables, or factors that have an impact on e-government success. However, before being able to evaluate these impacts, it is necessary to define what e-government success is and what some e-government success measures are. This book presents a review of both e-government success measures and e-government success factors. It also provides empirical evidence from quantitative analysis and two in-depth case studies. Although based on sound theory and rigorous empirical analysis, the book not only significantly contributes to academic knowledge, but also includes some practical recommendations for government officials and public managers.Theoretically, the book proposes a way to quantitatively operationalize Fountain's enactment framework. Based on the institutional tradition, the technology enactment framework attempts to explain the effects of organizational forms and institutional arrangements on the information technology used by government agencies. According to Fountain (1995, 2001) the technology enactment framework pays attention to the relationships among information technology, organizations, embeddedness, and institutions. This framework is very well known in the e-government field, but is normally used for qualitative analysis and there is no previous proposal of how to use it with quantitative data. The book proposes variables to measure each of the different constructs in this framework and also tests the relationships hypothesized by Fountain's theory. Finally, using the advantages of the selected quantitative analysis technique (Partial Least Squares), the study also proposes some adjustments and extensions to the original framework in a theory building effort.Methodologically, the book reports on one of the first multi-method studies in the field of e-government in general and e-government success in particular. This study uses a nested research design, which combines statistical analysis with two in depth case studies. The study begins with a statistical analysis using organizational, institutional, and contextual factors as the independent variables. An overall score representing e-government success in terms of the functionality of state websites is the dependent variable. Second, based on the statistical results two cases are selected based on their relative fitness to the model (residuals) and their position in the general ranking of website functionality (which includes four different measures). In order to complement the results of the statistical analysis, case studies were developed for the two selected states (New York and Indiana), using semi-structured interviews and document analysis. In terms of the statistical analysis, the book constitutes one of the first applications of Partial Least Squares (PLS) to an e-government success study. PLS is a structural equations modeling (SEM) technique and, therefore, allows estimating the measurement model and the structural model simultaneously. The use of this sophisticated statistical strategy helped to test the relationships between e-government success and different factors influencing it, as well as some of the relationships between several of the factors, thus allowing exploring some indirect effects too.

Anbieter: Dodax
Stand: 30.03.2020
Zum Angebot
Euro-Par 2002. Parallel Processing
139,09 € *
ggf. zzgl. Versand

Euro-Par – the European Conference on Parallel Computing – is an international conference series dedicated to the promotion and advancement of all aspects of parallel computing. The major themes can be divided into the broad categories of hardware, software, algorithms, and applications for parallel computing. The objective of Euro-Par is to provide a forum within which to promote the dev- opment of parallel computing both as an industrial technique and an academic discipline, extending the frontiers of both the state of the art and the state of the practice. This is particularlyimportant at a time when parallel computing is undergoing strong and sustained development and experiencing real industrial take-up. The main audience for and participants in Euro-Par are researchers in academic departments, government laboratories, and industrial organizations. Euro-Par aims to become the primarychoice of such professionals for the p- sentation of new results in their speci?c areas. Euro-Par is also interested in applications that demonstrate the e?ectiveness of the main Euro-Par themes. Euro-Par has its own Internet domain with a permanent website where the historyof the conference series is described: http://www. euro-par. org. The Euro-Par conference series is sponsored bythe Association of Computer - chineryand the International Federation of Information Processing. Euro-Par 2002 at Paderborn, Germany Euro-Par 2002 was organized bythe Paderborn Center for Parallel Comput- 2 2 ing (PC ) and was held at the Heinz Nixdorf MuseumsForum (HNF).

Anbieter: Dodax
Stand: 30.03.2020
Zum Angebot
Understanding Cryptography
35,11 € *
ggf. zzgl. Versand

Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography.After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

Anbieter: Dodax
Stand: 30.03.2020
Zum Angebot
Understanding Cryptography
37,40 € *
ggf. zzgl. Versand

Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography.After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

Anbieter: Dodax
Stand: 30.03.2020
Zum Angebot
Strategic Internet Business Management - An Ass...
45,90 CHF *
ggf. zzgl. Versand

Master's Thesis from the year 2011 in the subject Business economics - Marketing, Corporate Communication, CRM, Market Research, Social Media, grade: 12 (Distinction), , course: Strategic Business Communication, language: English, abstract: Abstract It is widely recognized that Small and Medium-Sized Enterprises play a significant role in the economic vitality of local and national economies in Denmark. Over the years, these sectors are faced with an increasingly unstable marketplace and stiff competition from large firms. It is believed that the advancement of internet and its related communication technologies have the ability to give these firms the potential advantage to reach wider geographical markets and compete with larger organizations for customers' attraction, market share, and sustainable growth. As a result, the Danish government has over the years collaborated with industry and commercial associations to bolster the integration of Information Technology and diffusion of e-commerce among SMEs. This thesis used quantitative survey questionnaire and qualitative interview approaches to assess how SMEs in Denmark are using the internet as a business strategy to enhance growth and sustainability. In accordance with the theoretical model developed by synthesizing existing internet adoption and business growth models, three key determinants such as: the level of internet adoption, growth strategy, and competitive environment were investigated. Result indicates that SMEs have a considerable integration of internet particularly at the lower level which includes e-mail and website. While more than half of the firms who have fully integrated internet as part of their growth strategy have experienced exponential growth by developing new product and reaching new markets. Competitively, these firms are also able to offer high and unique value of proposition mainly through niches.

Anbieter: Orell Fuessli CH
Stand: 30.03.2020
Zum Angebot
Trust and Reputation for Service-Oriented Envir...
192,00 CHF *
ggf. zzgl. Versand

Trustworthiness technologies and systems for service-oriented environments are re-shaping the world of e-business. By building trust relationships and establishing trustworthiness and reputation ratings, service providers and organizations will improve customer service, business value and consumer confidence, and provide quality assessment and assurance for the customer in the networked economy. Trust and Reputation for Service-Oriented Environments is a complete tutorial on how to provide business intelligence for sellers, service providers, and manufacturers. In an accessible style, the authors show how the capture of consumer requirements and end-user opinions gives modern businesses the competitive advantage. Trust and Reputation for Service-Oriented Environments: * Clarifies trust and security concepts, and defines trust, trust relationships, trustworthiness, reputation, reputation relationships, and trust and reputation models. * Details trust and reputation ontologies and databases. * Explores the dynamic nature of trust and reputation and how to manage them efficiently. * Provides methodologies for trustworthiness measurement, reputation assessment and trustworthiness prediction. * Evaluates current trust and reputation systems as employed by companies such as Yahoo, eBay, BizRate, Epinion and Amazon, etc. * Gives ample illustrations and real world examples to help validate trust and reputation concepts and methodologies. * Offers an accompanying website with lecture notes and PowerPoint slides. This text will give senior undergraduate and masters level students of IT, IS, computer science, computer engineering and business disciplines a full understanding of the concepts and issues involved in trust and reputation. Business providers, consumer watch-dogs and government organizations will find it an invaluable reference to establishing and maintaining trust in open, distributed, anonymous service-oriented network environments.

Anbieter: Orell Fuessli CH
Stand: 30.03.2020
Zum Angebot
E-Government Website Development
311,00 CHF *
ggf. zzgl. Versand

'This book provides fundamental clues about the direction forward in electronic government needed to achieve even greater value from websites and assist the continuing transformation of governmental interaction with citizens'--Provided by publisher.

Anbieter: Orell Fuessli CH
Stand: 30.03.2020
Zum Angebot
The Connection
10,90 CHF *
ggf. zzgl. Versand

Internet daters freely give information to dating websites seeking a fulfilling relationship-the perfect match, but what if this information was being used for a different kind of match Tripp Jason Michaels, CEO of A. E. Research, has created a website that profiles people to do tasks in which the government does not want to be seen involved. Rachel Gilbert and Caleb Prescott are brought together through this website and find themselves faced with the task of exposing a faith healer who is trafficking drugs. Mysteriously, the faith healer is murdered and Rachel and Caleb are wanted by the police as suspects. To save themselves, they are forced to unravel the mystery of Rachel's sister's murder, which happened ten years ago. What they find reveals how their pasts have been exploited by Michaels and only the truth will save them now.

Anbieter: Orell Fuessli CH
Stand: 30.03.2020
Zum Angebot