M. Ghonge, N. Pradeep, Renjith V. Ravi, Ramchandra S. Mangrulkar
{"title":"A Comprehensive Review of the Security and Privacy Issues in Blockchain Technologies","authors":"M. Ghonge, N. Pradeep, Renjith V. Ravi, Ramchandra S. Mangrulkar","doi":"10.4018/978-1-7998-8493-4.ch008","DOIUrl":"https://doi.org/10.4018/978-1-7998-8493-4.ch008","url":null,"abstract":"The development of blockchain technology relies on a variety of disciplines, including cryptography, mathematics, algorithms, and economic models. All cryptocurrency transactions are recorded on a digital and decentralized public ledger known as the blockchain. Customers may keep track of their crypto-transactions by looking at a chronological list rather than a centralized ledger. The blockchain's application potential is bright, and it has already produced results. In various fields, blockchain technology has been incorporated and deployed, from the earliest days of cryptocurrencies to the present day with new-age smart contracts. No comprehensive study on blockchain security and privacy has yet been done despite numerous studies in this area over the years. In this chapter, the authors talked about blockchain's security and privacy issues as well as the impact they've had on various trends and applications. This chapter covers both of these topics.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129633320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Policymakers and Intelligence Analysts as Decision-Making Agents","authors":"","doi":"10.4018/978-1-7998-1562-4.ch001","DOIUrl":"https://doi.org/10.4018/978-1-7998-1562-4.ch001","url":null,"abstract":"Decision making is a process of choosing among alternative courses of action to attain a goal(s). Specifically, managerial decision-making is a complex task in today's political/business environment. Information analysis is gathered by an intelligence analyst, as someone who is primarily responsible for the analysis, processing, and distribution of strategic and tactical intelligence. The chapter explores the main approaches to both policy cycle and intelligence cycle to make decisions.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125760054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Significant Trends of Smart Technologies","authors":"","doi":"10.4018/978-1-6684-3509-0.ch004","DOIUrl":"https://doi.org/10.4018/978-1-6684-3509-0.ch004","url":null,"abstract":"Although technology advances in a high speed and in different tracks and sectors, among the many major areas of trends of smart technologies are clouds and artificial intelligence. This chapter presents such significant trends in smart technologies with emphasis on clouds and their applications which make the implementation of smart cities efficient. It focuses on the general paradigm for smart technology platforms with five different levels, including edge and fog computing as well as the internet of things. In the chapter, other trends are covered such as data analytics for strategic decision making, artificial intelligence, machine learning, blockchain, open data, and cloud-based data. It also introduces the significance of using predictive analytics and using data for effective deep learning for smart applications.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132439244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Azeem Khan, Noor Zaman Jhanjhi, M. Humayun, Muneer Ahmad
{"title":"The Role of IoT in Digital Governance","authors":"Azeem Khan, Noor Zaman Jhanjhi, M. Humayun, Muneer Ahmad","doi":"10.4018/978-1-7998-1851-9.ch007","DOIUrl":"https://doi.org/10.4018/978-1-7998-1851-9.ch007","url":null,"abstract":"The acronym IoT stands for internet of things. The IoT ecosystem can be envisioned as a set of physical electronic devices embedded with intelligence, connected through a network, enabling them to collect and exchange data, and allowing these devices to be sensed and handled remotely between the physical and cyber worlds. The devices connected through the internet has been influencing all walks of our life ranging from individual, societal, educational, industrial, entrepreneurial, and related to governance as well. As we are connected and surrounded with a plethora of connected smart devices, it seems there is a great risk of security and privacy in several aspects, such as device authentication, data theft, device manipulation, data falsification, etc., to name a few. Hence, the current chapter has been undertaken to explore and comprehend the security and privacy related implications, opportunities, future directions, and challenges involved in implementing digital governance with IoT.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133258065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Systematic Review of Information Technologies to Assist Policymaking in Crisis Management","authors":"M. Ali","doi":"10.4018/978-1-7998-9815-3.ch001","DOIUrl":"https://doi.org/10.4018/978-1-7998-9815-3.ch001","url":null,"abstract":"The COVID-19 crisis has engulfed several countries, leaving policymakers perplexed and unprepared to deal with the situation. Choosing the most appropriate course of action has become more challenging as a result of the infection and its effects on the body. While dealing with the coronavirus crisis and the stress that goes with it, new information technologies are critical in addressing and alleviating that stress. As a result, new information technology capabilities are required to address the challenges confronting policymakers when dealing with pandemic diseases such as COVID-19 in the past. As a result of the systematic review process used in this study, the best available evidence is synthesised from text and opinion to provide actionable advice to policymakers. The findings indicate that the challenges fall into two categories: battling the disease and mitigating its effects. Furthermore, the internet of things, cloud computing, machine learning, and social networking all contribute significantly to resolving these issues.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130024699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DBMS Log Analytics for Detecting Insider Threats in Contemporary Organizations","authors":"Muhammad Imran Khan, S. Foley, B. O’Sullivan","doi":"10.4018/978-1-5225-5984-9.CH010","DOIUrl":"https://doi.org/10.4018/978-1-5225-5984-9.CH010","url":null,"abstract":"Insiders are legitimate users of a system; however, they pose a threat because of their granted access privileges. Anomaly-based intrusion detection approaches have been shown to be effective in the detection of insiders' malicious behavior. Database management systems (DBMS) are the core of any contemporary organization enabling them to store and manage their data. Yet insiders may misuse their privileges to access stored data via a DBMS with malicious intentions. In this chapter, a taxonomy of anomalous DBMS access detection systems is presented. Secondly, an anomaly-based mechanism that detects insider attacks within a DBMS framework is proposed whereby a model of normative behavior of insiders n-grams are used to capture normal query patterns in a log of SQL queries generated from a synthetic banking application system. It is demonstrated that n-grams do capture the short-term correlations inherent in the application. This chapter also outlines challenges pertaining to the design of more effective anomaly-based intrusion detection systems to detect insider attacks.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"62 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114133770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Success Stories of ICT Implementation in Saudi Arabia","authors":"Saira Muzafar, Noor Zaman Jhanjhi","doi":"10.4018/978-1-7998-1851-9.ch008","DOIUrl":"https://doi.org/10.4018/978-1-7998-1851-9.ch008","url":null,"abstract":"Information and communication technology (ICT) has a great role in the development, growth, and economy of the country. ICT refers to any system, device, or product that can store, manipulate, and receive and transmit digital data effectively. ICT brings clear differences in the economy of countries wherever it is successfully implemented. It becomes a reason of timely, accurate, and efficient operations and becomes a source of user satisfaction by providing them fast, better, easy service around the clock. As timely access of information and communication plays a vital role in the success of any organization either public or private, many developed countries are already competing in digitalization. It is not only convenience, but it is the prime ingredient of good governance and an indispensable part of modern life. This chapter discusses the successful implementation of ICT infrastructures in the context of good governance and builds a vibrant society, the main agenda of Vision 2030 of KSA.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"74 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114608699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet Service Provider Liability in Relation to P2P Sites","authors":"Nisha Dhanraj Dewani","doi":"10.4018/978-1-5225-5984-9.CH008","DOIUrl":"https://doi.org/10.4018/978-1-5225-5984-9.CH008","url":null,"abstract":"Different systems require different levels of security according to the services they provide to their users. Cyberspace is the alliance of various networks together connected through internet service providers (ISPs). However, the alliance of these networks often faces security issues. Some use the internet as a path for illegal activities such as breaching of others computer or networks, damaging and stealing information, and blocking or denying legitimate users from services they subscribe. So, the purpose of this chapter is to review the responsibilities of ISPs in securing their customers' network, and find out whether there are legal provisions, or liabilities that are bindings on the ISPs to provide security for their customers. What protections are envisaged under the umbrella of safe harbors? Are ISPs responsible for end users' network security? The Swedish Court recently found The Pirate Bay (TPB) guilty of making copyright works available. Finally, this chapter will analyze the issues raised in the TPB along with ISPs liability.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"168 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134127643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Building of Democracy","authors":"Raúl Alfonsín","doi":"10.4018/978-1-7998-4291-0.ch002","DOIUrl":"https://doi.org/10.4018/978-1-7998-4291-0.ch002","url":null,"abstract":"This chapter looks at the events leading up to the fall of communism in Czechoslovakia and Hungary in 1989. It addresses the overall climate that allowed communism to fall, along with specific events that took place in each country. The aftermath of the regime change is discussed as well as people's reactions to it. The chapter also looks at how democratic structures were built in each country. Finally, European Union membership is briefly discussed including how Czechs and Hungarians feel about the EU today.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132740422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging Digital Innovation for Governance, Public Administration, and Citizen Services","authors":"","doi":"10.4018/978-1-5225-5412-7","DOIUrl":"https://doi.org/10.4018/978-1-5225-5412-7","url":null,"abstract":"","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121839878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}